text
stringlengths
2.85k
2.55M
label
class label
11 classes
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 1 Analysis of Agent Expertise in Ms. Pac-Man using Value-of-Information-based Policies arXiv:1702.08628v3 [cs.LG] 4 Nov 2017 Isaac J. Sledge, Student Member, IEEE and José C. Príncipe, Life Fellow, IEEE Abstract—Conventional reinforcement learning methods for Markov decision processes rely on weakly-guided, stochastic searches to drive the learning process. It can therefore be difficult to predict what agent behaviors might emerge. In this paper, we consider an information-theoretic cost function for performing constrained stochastic searches that promote the formation of risk-averse to risk-favoring behaviors. This cost function is the value of information, which provides the optimal trade-off between the expected return of a policy and the policy’s complexity; policy complexity is measured by number of bits and controlled by a single hyperparameter on the cost function. As the policy complexity is reduced, the agents will increasingly eschew risky actions. This reduces the potential for high accrued rewards. As the policy complexity increases, the agents will take actions, regardless of the risk, that can raise the long-term rewards. The obtainable reward depends on a single, tunable hyperparameter that regulates the degree of policy complexity. We evaluate the performance of value-of-information-based policies on a stochastic version of Ms. Pac-Man. A major component of this paper is the demonstration that ranges of policy complexity values yield different game-play styles and explaining why this occurs. We also show that our reinforcementlearning search mechanism is more efficient than the others we utilize. This result implies that the value of information theory is appropriate for framing the exploitation-exploration trade-off in reinforcement learning. Index Terms—Value of information, constrained search, reinforcement learning, information theory 1 Introduction Learning to successfully play a game is the process of discovering the correct actions to achieve both primary and secondary goals. Players typically do this in a trial-and-error-based manner: by taking risks, in the form of trying novel actions in particular game states, they begin to connect when to take certain actions. Eventually, given a diverse range of scenarios, players can relate sequences of actions and game states with the ability to obtain a given score. They can also refine the action sequences once this occurs. There are a variety of machine-learning paradigms for mimicking this process. One example is reinforcement learning [1]. Reinforcement learning can be applied to sequential decision-making problems, such as games, in which the outcome of an action might not be immediately apparent. Reinforcement learning methods do this by assigning credit to actions leading to an outcome, which provides feedback in the form of expected rewards obtained from performing those actions. The expected rewards can then be manipulated to infer a mapping between environmental states and actions. A great amount of reinforcement learning research has been conducted since the field’s inception [2]. Despite these efforts, there are some shortcomings with many conventional approaches. For instance, there are few direct ways to guide the selection of risk-prone, -neutral, or -averse behaviors, as the learning process is typically driven by stochastic search. This applies to exploration heuristics such as epsilon-greedy and soft-max selection. Engaging in certain types of risky behaviors, at a certain frequency, may be necessary for agents to uncover high-performing policies. Moreover, it can be troublesome to construct policies that switch between different strategies during an episode when relying on many existing exploration heuristics, as we will show. This can occur because instances where different strategies are viable may be brief and rarely happen. If the agent avoids taking seemingly non-optimal actions in such instances, then it may seldom deviate from its current policy to determine if a new strategy would be appropriate under the given circumstances. Both of these issues can be illustrated with the arcade game Ms. Pac-Man [3]. Ms. Pac-Man is a predator-prey scenario set in a maze-like environment. The game requires the use of multiple strategies to maximize its score. Throughout a majority of the game, the agent, Ms. Pac-Man, is being chased by invulnerable entities, which are ghosts. The Isaac J. Sledge is with the Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA (email: [email protected]). He is also with the Computational NeuroEngineering Laboratory (CNEL) at the University of Florida. José C. Príncipe is the Don D. and Ruth S. Eckis Chair and Distinguished Professor with both the Department of Electrical and Computer Engineering and the Department of Biomedical Engineering, University of Florida, Gainesville, FL 32611, USA (email: [email protected]). He is the director of the Computational NeuroEngineering Laboratory (CNEL) at the University of Florida. The work of the authors was funded via grant N00014-15-1-2103 from the US Office of Naval Research. The first author was additionally funded by a University of Florida Research Fellowship, a Robert C. Pittman Research Fellowship, and an ASEE Naval Research Enterprise Fellowship. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 2 objective of the agent is to clear the environment of pellets while navigating around the ghosts. However, after activating certain power-ups, the ghosts become vulnerable for a brief period of time. The agent can consume these ghosts for a score boost. The switch in ghost dynamics necessitates a change in the game-play strategy, since multiple distinct modes of behavior are required under different conditions [4, 5]. Despite the need for multi-modal behaviors, conventional reinforcement-learning approaches have focused on constructing monolithic policies. Such policies would implement the same agent behaviors regardless of the vulnerability of the ghosts. Although it is possible to represent multimodal behavior with these policies, it can be difficult to learn such behavior. This is, in part, due to risk. For instance, throughout the learning process, an agent may have learned to avoid colliding with the ghosts. Without straying from this behavior, the agent will not learn that there are instances where it can safely chase the ghosts. In this paper, we consider an information-theoretic learning [6] approach for performing constrained stochastic searches that promote a continuum of risk-averse to risk-favoring agent behaviors during reinforcement learning. This, in turn, leads to a principled exploration of the state-action space that aids in the promotion of multi-modal behaviors. Other schemes, such as epsilon-greedy and soft-max selection, also implement action exploration. The novelty of our approach is that we frame exploration as a tractable optimization problem and understand the source of optimality. As well, existing theory shows that our approach leads to optimal decision making under uncertainty; similar guarantees are not known for other exploration mechanisms. Our approach is based upon Stratonovich’s value-of-information criterion [7–9], which provides an optimal conversion between rewards and information. Here, the goal is to analyze the evolution of the agent expertise, for the arcade game Ms. Pac-Man, when using the value of information. The value of information possesses a single hyperparameter that specifies the policy complexity and influences the agent’s game-playing expertise. This parameter arises automatically from optimization of the value of information. The policy complexity dictates the exploration granularity of the policy search space. If the complexity is low, then the policy space will be searched coarsely. The agent will implement cautious action-selection behaviors. That is, the agent will often avoid choosing actions that deviate from the policy. This can lead to low to modest long-term rewards if the policy does not accurately capture the environment dynamics. The amount of computational effort needed to learn in this case is low, however. When the policy complexity is high, the policy space is finely searched. The agent is prone to taking risky actions in this case. In doing so, the policies typically produce action sequences that lead to high long-term rewards. Such high-complexity policies are also likely to promote the formation of multimodal behaviors. In either case, optimal-reward policies are found, where the actual best rewards are pre-determined by the policy complexity. This comes at the expense of computation, as many learning episodes may be needed for this to occur. We show that distinct policy types, for Ms. Pac-Man, materialize for three ranges of parameter values. The agent merely clears the level of pellets and avoids the ghosts in the lowest-complexity case. It does not implement multimodal behaviors. As the policy complexity is increased, the agent exhibits improved game-play styles, which come about from engaging in risky behaviors during training. For moderately low to moderately high policy complexities, the policies compel the agent to clear the pellets in an expeditious manner. It also has the agents chase after fruit power-ups. In the latter case, the agent switches between avoiding and sometimes chasing the ghosts whenever they are invulnerable and vulnerable, respectively. High-complexity policies attempt to produce the best rewards. Agents will continuously seek out power pellets, so as to remain invulnerable while clearing the level and pursuing nearby ghosts. The agents will also lure one or more ghosts to power pellets. The remainder of this paper is organized as follows. We begin, in section 2, with a survey of the research that has been performed using Pac-Man and Ms. Pac-Man. Section 3 outlines our methodology. We first provide an overview of reinforcement learning using Markov decision processes. We then introduce the value of information from a Markov-decision-processes perspective. Risk-based interpretations of this criterion are provided. We also discuss implementational aspects. Our reinforcement learning simulations of the Ms. Pac-Man game are given in section 4. We begin this section by covering our experimental protocols. We then transition to our simulation results and corresponding analyses. These analyses include the qualitative and quantitative improvement in the agent’s behaviors during training process. Performance comparisons against other reinforcement learning exploration strategies are provided to demonstrate the potential of our approach. Lastly, we conclude in section 5 and list possible avenues of future research. 2 Literature Review Many approaches developed to play either Pac-Man or Ms. Pac-Man rely on computational intelligence principles [10–17]. The work of Lucas [10] is one of the earliest examples. He used evolutionary heuristics to train neural networks to play Ms. Pac-Man. His approach relied on the calculation of features relevant for gameplay, such as the distances to notable items and ghosts. A great deal of user intervention is needed for feature selection, though. Wittkamp et al. [11] also evolved neural networks, which were applied to learn ghost movement strategies for Pac-Man. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 3 Their approach was based on the neuro-evolution of augmenting topologies paradigm. Using a manually-coded agent, they uncovered ghost strategies that can outperform those from the original game. Evolutionary-inspired optimization tactics have also appeared in other works. Gallagher and Ryan [12] developed a finite-state machine approach to encode simple movement strategies. The movement strategies were evolved according to a population-based incremental learning algorithm. In [16], Gallagher and Ledwich described an approach to developing agents that learn the game from minimal on-screen information. The agents were created by evolving neural network controllers using straightforward evolutionary algorithms. Their results showed that neuro-evolution is able to produce agents that could play the game reasonably well, despite not having knowledge of the game rules. As indicated by the results in [4, 5], neuro-evolution frameworks can lead to agents with much higher performance. There is a complicated relationship, however, between the various hyperparameters and the expected agent behaviors for these types of methods. This makes it difficult to a priori assess the expected performance. Alhejali and Lucas [14] used genetic programming to construct a variety of Pac-Man agents. Their results demonstrated that the agent behaviors functioned well for the training environment and could generalize well to novel environments. Brandstetter and Ahmadi [15] also relied on genetic programming, which was used as a reactive control mechanism for a Ms. Pac-Man agent. These evolutionary-inspired methods provide the ability to implement important game-playing behaviors. Nevertheless, there is currently little understanding about the connection between hyperparameter values and expected behaviors. Such methods also often do not leverage all of the agent’s experiences when stochastically updating the policy during the crossover and mutation procedures. A great many training episodes may therefore be required before the stochastic search process uncovers a reasonable policy. There have been a variety of non-computational-intelligence-, heuristic-based approaches that have been developed [18–20]. For instance, Szita and Lorincz proposed simple rule-based policies for controlling a Ms. Pac-Man agent. Their rules were organized into distinct action modules and the decision about which direction to move is based on the priorities associated with each action module. Policies for choosing the best action modules were uncovered using cross-entropy optimization. However, there is substantial user involvement in initially specifying the rules. More recently, Wirth and Gallagher [19] outlined how to utilize influence map models when playing Ms. Pac-Man. Their models highlight desirable and undesirable locations for the agents to visit in the game. They do not provide a means of learning influence maps from the agent’s experiences, though. Human intervention is hence needed to identify parameter values for good maps. Many of the above approaches can specify reasonably good agent behaviors. For some of them, though, it may be difficult to update the agent’s response for a single situation or even a set of situations without also changing its behaviors for other instances. Some of them also may not adequately use the agent-environment interactions. Both issues complicate the efficient construction of good action-selection policies. A means of resolving such issues is through the use of reinforcement learning. This style of learning has been employed to create Pac-Man and Ms. Pac-Man agents [21–26]. Such approaches also have the appeal that the user is out of the learning loop. The agent learns solely from its interactions with the environment, which mimics the biological archetype. In [21], Burrow and Lucas applied interpolation-based temporal-difference learning to the task of constructing Ms. Pac-Man agents. Their experiments demonstrated that this style of learning led to more reliable performance than neuro-evolution. They also showed that the chosen reward structure can have a dramatic effect on the agent behaviors. In [23], Griffiths et al. addressed the problem of feedback integration with reinforcement learning. They showed that their style of policy-shaping-based reinforcement learning can be highly competitive compared to conventional learning approaches. Vezhnevets et al., in [24], applied deep neural networks for learning multi-step action strategies in a reinforcement learning setting. They showed that their agents strongly outperformed those derived from feedforward neural networks and long short-term memory networks. Another popular means of constructing agents has been through the use of Monte-Carlo tree search [27–31]. Robles and Lucas [27] applied a simple tree search heuristic on a Ms. Pac-Man agent to evaluate the danger of any particular course of action. Ikehata and Ito [28] applied upper confidence bounds to Monte Carlo search trees, which considers potential moves and formulates an average reward of action action sequence. Like the work of Robles and Lucas, that of Ikehata and Ito evaluates dangerous routes for the agent to take, based upon its location in the environment and any nearby ghosts. More recently, Samothrakis et al. [29] and Pepels et al. [31] applied Monte Carlo tree search to create high-performing agents. Foderaro et al. [32, 33] relied on tree searches as well. They first decompose the environment into a series of convex cells, which outlined locations where the agent could travel. The set of decomposed cells is used to create a decision tree for selecting a path that minimizes the risk of colliding with the ghosts. Our approach for developing Ms. Pac-Man agents in this paper is related to those given in [21–26], as we also rely on reinforcement learning. It is also related to Monte-Carlo tree search [27–29, 31–33], since it can be viewed as a special case of reinforcement learning. There are key differences, though. First, the action-selection scheme that we propose weights available infor- IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 4 mation in the policy versus pay-off, which implicitly controls the quantization of the state-action decision space. That is, states are partitioned in accordance with the value function and a single action is assigned to each partition group. The number of partitions is dictated by the amount of risk, which is controlled by a single hyperparameter in the information-theoretic cost function. Provided that the amount of risk is properly chosen, this quantization functionality has the benefit of optimizing the efficiency of the learning process. We show that high-performing policies therefore emerge early during training. In contrast, policies that rely on conventional exploration strategies, which are used in some of the aforementioned works, lag in performance. This is because they must search over the original action policy space without an appropriate metric for the goal. Such exploration strategies also often fail to implement multi-modal behaviors, even when training over a great many episodes. Another distinction is that we are combining information, which is a measure of uncertainty, with the rewards. As indicated by our simulation results, this appears to be a good framework to understand the variables at play for intelligent behavior. Our approach should also outperform existing reinforcement-learning methods that do not account for uncertainty in decision making, such as [10, 12, 14–16]. The reason why were able to obtain good performance is because the value of information combines the rigorous theory of utility, in the sense of von Neumann and Morgenstern [34], with uncertainty, as quantified by entropy. That is, the criterion is defined as a conditional extremum of expected utility under a relative entropy constraint. It therefore satisfies all of the axioms for expected utility and hence describes means of decision making under uncertainty that is independent of any specific definition of information [35]. It also does not, as noted by Belavkin [36], suffer from some of the perceived flaws of utility theory [37, 38]. This is because it includes a non-linear component that reflects the agent’s preferences about potential information. Agents will therefore reason about expected improvements in the score differently than potential losses [39], which is necessary or optimal decision making. Further advantages of our approach are provided in an associated online supplement. We also encourage readers to consult [40, 41] for more comparisons of the value of information with existing reinforcement learning strategies. There are other minor advantages to our approach compared to some of the others that are used to provide Ms. Pac-Man agents. One example is that we have fewer parameter values that need to be chosen and tuned by the investigator. Two of the hyperparameters relate to the reinforcement learning updates, which are easy to specify based on previous studies. The remaining hyperparameter, which controls the amount of risk, is more difficult to set. Thus far, its influence appears to be application dependent. However, our simulation results provide insights into this hyperparameter, which will be useful in our future endeavors for understanding how it should be optimally chosen. In our current work, we consider an annealing-based approach for setting the risk hyperparameter. This largely relieves the need for significant testing to a priori determine reasonably good values that are appropriate across all episodes. Provided that the annealing occurs at a sufficiently slow pace during training, existing reinforcementlearning theory ensures that the policy iterates will converge to the globally optimal action-selection strategy in the limit. Convergence guarantees are another advantage of our approach. They indicate that the best-scoring agent will be uncovered after a sufficiently large number of state-action transitions. The more heuristic-based approaches like the ones in [18–20], in contrast, do not necessarily possess these guarantees. The same is largely true for Monte Carlo tree search [27–29, 31–33]. Convergence for many of these tree-search procedures is, currently, only guaranteed for simplified problem domains and for certain exploration strategies [30]. Their theoretical performance, in terms of a criterion known as regret, is not optimal in these domains, unlike the value of information [40]. 3 Methodology 3.1 Markov Decision Processes The value of information can be used for decision making when the agent-environment interactions are described by a general dynamical system. Here, we take this system to be a Markov decision process. The Markov-decision-process framework is used heavily in the theory of stochastic decision-making for discretespace and discrete-time settings [42]. In a Markov decision process, the system being considered is assumed to be driven by underlying Markov chains. That is, the system jumps randomly from one state st ∈ S to the next st+1 ∈ S for discrete time steps t. The probability of transitioning from one state to another depends only on the current state and not on the history of states. Moreover, in a Markov decision process, the agent is required to choose an action at ∈ A from a set of available of actions. An immediate real-valued reward gt+1 ∈ R is earned during the transition between states st and st+1 whenever an action at is taken. A corresponding policy dictates the action that is selected at each state. A policy πst+1 (at , st ) characterizes the probability distribution over actions given the state. We will sometimes use πat (st ) : S → A to denote the optimal action at ∈ A that is chosen for st ∈ S according to the current probabilistic policy. Each policy has an associated real-valued action-value function q(st , at ) : S ×A → R. The goal of a reinforcement-learning agent is to find a policy that optimizes the value function for all state-action pairs: πa∗t (st ) = arg supπa (st ):S→A E[q(s, πat (st ))]. Here, the t IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 5 value function is defined in terms of the discounted future rewards associated with a particular sequence of actions ! ∞ X t γ gt+t0 +1 (st+t0 , at+t0 ) st = s, at = a , (1) q(s, a) = Eπat (st ) t0 =0 for some discount factor γ in the unit interval. The discounting factor ensures that the summation in (1) is finite. The problem of finding the best policy can be written in terms of the reward function as ! ! X X X sup p(st )πst+1 (at , st )q(st , πat (st )) = p(st ) sup πst+1 (at , st )q(st , at ) . πat (st ):S→A st ∈S at ∈A st ∈S (2) at ∈A Markov decision processes are considered to be solved whenever the policy maximizes the future expected rewards from any starting state. Markov decision processes are known to have an optimal policy. Finding this policy can be difficult, however. Most investigators therefore consider the construction of near-optimal policies, which can come about through the use of model-free, approximate dynamic programming approaches [43–45]. Model-free reinforcement learning approaches operate by constructing stochastic approximations of the value function in an attempt to circumvent the intractable nature of direct estimation. A mechanism behind this approximation is a selection of actions at each stage of the learning process. Actions can be selected based upon the current policy, which introduces no new information about the optimal value function. Novel actions, which deviate from the current policy, may also be chosen. This latter option leads to an exploration of the policy space and, oftentimes, the formation of accurate value-function approximations. 3.2 Value of Information Our approach to the experience-based learning of policies for playing Ms. Pac-Man follows from the theory of Stratonovich [7, 8]. Stratonovich proposed a mathematical framework for bounded, rational decision making under information constraints. This took the form of an optimization criterion known as the value of information. We show that the value of information can be used to determine when it is advantageous to deviate from the current policy. It therefore defines a type of reinforcement-learning exploration scheme, which, apart from setting a single hyperparameter, does not require user intervention. Our experiments will analyze the agent’s expertise at playing Ms. Pac-Man when relying on different hyperparameter values. The value of information is based on the premise that there is a trade-off between policy information and obtainable rewards. That is, the greater the amount of information, the better the long-term rewards should be. More time may be needed to find the optimal policy, though. Here, information takes the form of the number of bits to codify different policies. We sometimes refer to this as the policy complexity. More specifically, we assume that an initial probabilistic action-selection policy is provided. The value of information is a constrained optimization problem that seeks a transformed version of this initial policy that yields the highest rewards. The initial policy is not necessarily allowed to change arbitrarily, though. Rather, the transformation is governed by a information-constraint term that assesses the divergence between the initial policy and the current policy. The total divergence cannot exceed a specified bound. The lower the bound, the less that the initial policy can be modified during learning. This will cause the agent to implement risk-adverse action-selection behaviors, which can impact the obtainable rewards if the initial policy does not encode the environment dynamics well. Conversely, the higher the information bound, the higher the diversity of policies and hence the greater the reward improvement. The agent will therefore favor risky actions. The degree of policy transformation must be delicately balanced to obtain the base possible rewards. As we will show, the information bounds are dictated by a single parameter that emerges from converting this constrained optimization problem into an unconstrained optimization problem. This parameter simultaneously dictates how frequently actions that differ from the current policy are taken and hence how risky the agent’s actions will be. It is important to note that we are not the first to consider the application of information-theoretic concepts to reinforcement learning. For example, Tishby et al. [46, 47] proposed a Markov decision process formulation in which rewards are traded off against control information. In these papers, the authors noted that optimizing the amount of information yields Bellman-like equations, which they utilized to provide a dynamic programming formulation for solving the Markov decision processes. However, there is no attempt to couple information value, in the form of Shannon entropy, with rewards. Only a simple information bottleneck is implemented. Despite that we also utilize information in our cost function, our approach differs in a few ways. For example, in the work of Tishby, they rely on control information, which corresponds to the amount of information gleaned by the agent about the environment from sensory perception. In our approach, information is related to policy transformation costs, which dictates the amount action-state-space exploration. Moreover, in [46, 47], the control information IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 6 term becomes mixed with the action-value function, which complicates its estimation. Additionally, the value function no longer solely expresses discounted rewards, which makes its convergence analysis difficult. In our approach, we are still able to obtain an action-value function, and hence a policy, that reflects reward optimization. This allows us to easily apply existing convergence theory to value-of-information-based learning. 3.2.1 Quantifying Information Value In the context of reinforcement learning, the value of information assumes that the agent’s initial game-play behavior is defined by a prior distribution π(at ). Here, at ∈ A represents the action that that is chosen in the tth iteration; a single iteration, which we also refer to as an episode, is equivalent to taking a single action and transitioning from one state to the next. By accruing experiences through interacting with the environment, the agent changes its game-play behavior to a posterior-like distribution πst+1 (at , st ), at ∈ A and st ∈ S, which is the probabilistic policy. This change occurs in a way that optimally trades off the expected utility against the transformation costs for going from π(at ) to πst+1 (at , st ). The trade-off is given by the following extremization problem, which is the value of information for the Shannon information case, ! ! X X X ∗ (3) sup − sup p(st )q(st , at ) + p(st )πst+1 (at , st )q(st , πa0t (st )) ; at ∈A | st ∈S  {z  supat ∈A Ep(st ) [q(st ,at )] } πst+1 (at ,st ) | st ∈S at ∈A sup πs t+1 (at ,st )  Ep(st ) [Eπs {z t+1 (at ,st ) [supat ∈A q(st ,at )]]  } here, we use πa∗0 (st ) to denote the optimal action a0t ∈ A that is taken in state st ∈ S according to the optimal policy. t The optimization of the probabilistic policy is subject to the constraint ! X X πst+1 (at , st ) πst+1 (at , st ) such that : p(st ) πst+1 (at , st )log ≤ ϕinf , ϕinf > 0, (4) π(at ) st ∈S at ∈A {z } | DKL (πst+1 (at ,st )kπ(at )) that measures the amount of information that the prior contains about the policy. This expressions in (3) and (4) can be viewed as problem of finding a version πst+1 (at , st ) of the prior π(at ) that achieves maximal rewards in the case where π(at ) can only diverge by a prescribed amount ϕinf . The constrained criterion given by (3) and (4) can be converted into an unconstrained variational expression. This unconstrained maximization problem follows from the theory of Lagrange multipliers. The expression is composed of the expected utility of the agent under the posterior policy minus the information transformation cost that is required for forming the posterior, ! ! X X X πst+1 (at , st ) 1 X ∗ p(st ) πst+1 (at , st )log , ϑt > 0, p(st )πst+1 (at , st )q(st , πa0t (st )) − ϑt π(at ) st ∈S at ∈A st ∈S at ∈A | {z }   ϑ−1 t log P at ∈A π(at )eϑt q(st ,at ) (5) for some positive ϑt that is allowed to change across iterations. The parameter ϑt sets the relative importance between the transformation cost and the reward maximization. Adjusting ϑt across each iteration modifies the amount of policy-space exploration that is performed and hence the riskiness of the agent’s action-selection behaviors. Criterion Explanation. The two terms in (3) define a difference in expected rewards. They can be described as follows: First Term: No-Information Returns. The first term captures the possible returns supat ∈A Ep(st ) [q(st , at )] for a policy in which the divergence between the states and actions are zero. That is, the states carry no information about what action should be taken. This is used to establish the baseline agent performance. If the states are not informative, then the optimal action is based solely on the state random-variable distribution and the action-value function. If, however, the actions are informative, then the returns for the simplest policy will be offset by a second term. Second Term: Informative Returns. This second term quantifies the returns associated with policies whose transformation costs are non-zero. It is based on the expected return using a modified action-value function, supπs (at ,st ) Ep(st ) [Eπst+1 (at ,st ) [supat ∈A q(st , at )]]. The optimal action-selection strategy πst+1 (at , st ) is t+1 initially unknown. However, it is assumed to be related to the specified prior π(at ), in some manner, as described by the information-constraint bound. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 7 For this term, the divergence between states and actions is assumed to be non-zero. States therefore carry some information about what action should be chosen, which allows for the formation of a non-uniform policy. As the number of training episodes becomes unbounded, the agent will have complete knowledge of the environment, assuming that the information-constraint bound DKL (πst+1 (at , st )kπ(at )) ≤ ϕinf is equal to the P state random variable entropy; that is, ϕinf = − st ∈S p(st )log(p(st )). This second term will eventually produce returns that converge to those from the full-information case. Optimal pay-outs can also be achieved if the information constraint bound is annealed at a sufficiently rapid pace. The agent’s action-selection behavior becomes entirely deterministic in such situations, as only the best-performing action will be chosen. The optimal policy becomes a delta function in the limit. Otherwise, the agent’s behavior will be semi-random. That is, the policy will be described by a discrete distribution that is not quite uniform and not quite a delta function. The constraint term in (4) can be described as follows: Constraint Term: Transformation Cost. The constraint term, DKL (πst+1 (at , st )kπ(at )), a KullbackLeibler divergence, quantifies the amount of informational overlap between the posterior πst+1 (at , st ) and the prior π(at ). This term is bounded above by some non-negative value ϕinf , which implies that the amount of overlap will be artificially limited by the chosen ϕinf . The value of ϕinf dictates by how much the prior π(at ) can change to become the posterior πst+1 (at , st ). If ϕinf is zero, then the transformation costs are infinite. The posterior will therefore be equivalent to the prior and no exploration will be performed; the agent’s action-selection behaviors will be extremely cautious. The expected reward will not be maximized for non-optimal priors. If ϕinf is larger than the state random-variable entropy, then the transformation costs are ignored. The prior is free to change to the optimal-reward policy, since the exploration of actions dominates. The agent’s action-selection is therefore incredibly risky and hence may differ from the current policy. For values of ϕinf between these two extremes, the agent weighs the expected improvement in rewards against the transformation costs. A mixture of new-action exploration and exploitation of the current best-scoring actions will take place. Some amount of risk-taking behaviors will emerge. The constraint can also be viewed as describing the amount of information available to the agent about the environment. That is, for small values of ϕinf , the agent has little knowledge about the problem domain. It is unable to determine how to best adapt its action-selection strategy. As ϕinf increases, more information is made available to the agent, which allows it to refine its behavior. In the limit, the agent has the potential for complete knowledge about the environment, which means the action choice will be reward-optimal. The value of information, as defined by either (3) and (4) or (5), therefore describes the best pay-out that can be achieved for a specified policy transformation cost. Criterion Risk Promotion. The expression in (3) defines an upper frontier on utility. We can write this upper P ϑt q(st ,at ) frontier in the form shown in (5): κϑt (πat ) = ϑ−1 ). We also define a lower frontier on t log( at ∈A π(at )e utility, which corresponds to the worst-case scenario of minimal reward. In either case, the optimizations are subject to an information bound (4). These two frontiers stem directly from the theory and are referred to as the abnormal and normal branches. They represent the maximal gain and maximal reduction in reward over the prior, respectively. Properties of these two branches give insights into the riskiness of the action-selection behaviors. Toward this end, we note that action-state spaces with non-zero entropy have a non-zero information potential. This means that after taking an action, the Shannon information may increase or decrease by the some amount, which corresponds to changing the information bound by some amount: Low Information Bound. If the constraint is decreased, then the value of information will shift toward the normal branch. The normal branch implies risk-aversion in action choices [36]. This is because the potential increase of κϑt +ϑ0t (πat ) − κϑt (πat ), associated with an increase in ϑt , is less than the potential decrease of κϑt (πat ) − κϑt −ϑ0t (πat ), associated with a decrease in ϑt . Empirical and theoretical evidence indicates that risk-aversion is related to a quantization of the state-action space in homogenous risk regions. That is, as the information constraint parameter is decreased, many states will be grouped together. Visiting a particular state group will elicit the same action response. Sub-groups of states may be uncoupled and assigned a different action response during the learning process, but this rarely occurs. Consequently, there is little impetus for an agent to undertake risky actions, as once a policy has been found that leads to a reasonably high score, it is usually not modified much. High Information Bound. If the information constraint parameter value is increased, then the value of information will shift away from the normal branch and toward the abnormal branch. The convexity of the abnormal branch promotes risk-taking behaviors when choosing actions [36]. This is because the potential increase κϑt (πat ) − κϑt +ϑ0t (πat ) is greater than the potential decrease κϑt −ϑ0t (πat ) − κϑt (πat ). Our experiences indicate that the action-state space is finely quantized when this occurs; ranges of the information constraint parameter give rise to different policies. Every state therefore has the potential to be paired with a unique action. Groups of states that are formed early in the learning process may be uncoupled in the later stages. Taking actions that IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 8 deviate from the current policy is naturally more probable, as they will alter the state-action mapping and lead to potentially higher-reward policies. As noted by Belavkin [36], risk is inherently asymmetric: rational agents should act differently when taking risks versus when they are avoiding risks. The value of information naturally implements this behavior when weighting action choices, as it produces an asymmetric value function mirroring the one found in prospect theory [39]. 3.2.2 Finding Policies using Information Value The preceding form of the value of information criterion has some practical difficulties. In particular, investigators must have knowledge of the maximum expected reward associated with the globally optimal policy. Even just estimating this amount can be troublesome for many environments. We demonstrated, in [48], that the criterion could be reformulated, in an equivalent manner, to sidestep this issue. As a byproduct of this reformulation, we obtain a constrained convex criterion that can be converted into an unconstrained one using the theory of Lagrange multipliers. This unconstrained criterion can be globally optimized according to an expectation-maximization-like update, which define a weighted-random exploration scheme for reinforcement learning. This exploration strategy can be combined with a model-free reinforcement learning approaches. Here, we have use tabular Q-learning, which relies on the estimation of action-value functions for each state-action combination. The resulting discrete, probabilistic policy can be found from these value functions, in an iterative manner, as shown in algorithm 1. We assume that all of the actions for a given state in the policy are initialized to have discrete uniform probabilities. The corresponding optimization Algorithm 1: Value-of-Information-Based Q-Learning steps for the value of information are given in algorithm 1, steps 7 and 8. 1 Choose unit-interval values for the discount and step-size parameters γt ∈ R0,1 , αt ∈ R0,1 . Step 7 is the expected value of the conditional action-selection probabil- 2 Choose non-negative values for the agent risk-taking parameters ϑt . 3 Initialize the action-value function q(a, s) and hence the policy π(a, s), s ∈ S, ities over all states. It defines the avera ∈ A. age action-selection probability. The 4 for t = 0, 1, 2, . . . do update in step 8 leads to a process for 5 For all relevant st ∈ S and at ∈ A, update the state probabilities t X Y weighting action choices in each state p(st ) ← p(s0 ) p(sj |aj−1 , sj−1 )πsj (aj−1 |sj−1 ). according to a Boltzmann distribution s0 a0 ,...,st−1 at−1 j=1 parameterized by the expected reward. 6 for k = 0, 1, 2, . . . do X This resembles soft-max-based action 7 Update π (k) (at ) ← πs(k) (at , st )p(st ), at ∈ A. t+1 selection. The difference is that an exst ∈S 8 For st ∈ S, at ∈ A, update tra term, whose form is given in step , X (k) 7, has been included to account for (k+1) (k) q(st ,at )/ϑt π (at )eq(st ,at )/ϑt . πst+1 (at , st ) ← π (at )e the promotion or suppression of risky at ∈A actions. This term, along with an 9 Choose an action, in a weighted random fashion, according to the policy associated parameter, weights the ex(k+1) πst+1 (at , st ); perform a state transition st → st+1 ∈ S. Obtain a reward pected rewards according to the level gt+1 ∈ R. of risk that an investigator wishes an 10 Update the action-value function estimates q(at , st ) ← ! agent to possess. It is straightforward q(st , at )+αt gt+1 (st , at )+γt supa q(st+1 , a)−q(st , at ) . to show that this action weighting is greedy in the limit, under some relatively mild conditions. Therefore, it will produce optimal-reward policies [49]. The inner loop of algorithm 1, given from steps 7 to 8, covers the expectation-maximization-like update of the policy according to the value of information. We have shown that the policy approximation error for this loop is proportional to one over the number of updates; here, we consider only ten updates. The outer loop of algorithm 1, given from steps 5 to 10, defines the main reinforcement-learning process. In our experiments, we iterate over this loop for only a few thousand episodes. Note that alternate stopping criteria for both of these loops can be defined based upon reaching some steady-state solution. The parameter ϑt that arises upon minimization of the unconstrained value of information dictates the rate of change the reward difference with respect to the Shannon information constraint. As the value of the parameter goes to infinity, the policy complexity constraints are ignored. As the value of the parameter goes to zero, the relative entropy between the actions and states is minimized. This implies that all states elicit the same response, since the transformation costs are so high that the agent cannot change its behavior. Despite this limitation, though, the agent will still select actions that attempt to optimize the expected policy returns. For values of the rationality parameter IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 9 between these two extremes, there is a trade-off that occurs. As the parameter value increases, the agent may favor state-specific actions that yield a better expected return for particular states. As the parameter value decreases, the agent will favor actions that yield high rewards for many observations, which produces a lower relative entropy. Choosing good parameter values can be challenging, as their influence over agent risk is application dependent. There are a few strategies that can be used for this purpose, though. The option that we espouse is to apply an annealing proces to iteratively adjust the amount of agent risk. Under this scheme, an initial value for ϑ0 could be selected for the parameter. This value can be chosen using expert knowledge so that there is potential for reward improvement. After each episode, the value of ϑt would then be decreased. This forces the agent to take less risks as the learning progresses. This adjustment process repeats until the parameter reaches some minimal value. By this time, assuming that the annealing rate was not too quick, the agent should choose high-reward actions in a deterministic manner. 4 Simulations and Discussions We now assess our reinforcement learning strategy for a Ms. Pac-Man agent, which is a sufficiently challenging problem. Foremost, it is a dynamic environment in which there are moving obstacles, which are the ghosts. The ghosts’ movements are random, which makes the entire problem stochastic. As well, the game requires switching between different play styles, upon consuming power pellets, so as to maximize the total rewards. This shift in play styles is predominantly risk driven. Without an ability to promote risky agent behaviors, the development of multimodal strategies may not occur. The aims of our reinforcement learning simulations are multi-fold. First, we would like to quantify the influence of the information constraint parameter on the agent’s game-playing expertise. Secondly, we want to determine how much risk is needed for multi-modal behaviors to emerge. Both of these aims help in understanding the role of the risk hyperparameter. Lastly, we want to see how the behaviors obtained through use of the value of information compare with those from other reinforcement-learning exploration strategies. 4.1 Simulation Preliminaries 4.1.1 Agent Rewards We utilize a dual scoring system for our simulations. The first score that we report is directly from the Ms PacMan game environment. We refer to this as the original score in our plots. For this score, the agent earns +10 and +50 points for consuming a pill and power pill, respectively. The values of bonus items range from +100 to +5000 points, depending on the level. The points obtained for consuming ghosts increases exponentially, +200, +400, +800, +1600, according to the number of ghosts eaten during the effects of a single power pellet. For the purposes of reinforcement learning, we rely on a modification of the above scoring scheme. We refer to this as the modified score in our plots. In particular, a negative reward is incurred whenever Ms. Pac-Man moves in one of four cardinal directions to a new location (−1). Remaining within the same location across a state transition is also penalized (−1). Both of these penalties spur the agent to avoid unnecessary backtracking and wandering. Colliding with a ghost, without having recently eaten a power pellet, results in a high penalty (−500). This is done to ensure that the agent implements ghost avoidance behaviors early during training. All of the other rewards are the same, except those for eating vulnerable ghosts. We quadruple the points to better promote the formation of multimodal strategies. 4.1.2 State Spaces There are a variety of features that can be used to codify the decision-process state space. Here, we compute a series of holistic features. Such features include the distance to the nearest pellet, power pellet, fruit, nearest ghost, and second nearest ghost, all of which are in relation to the agent. These distances are measured by the number of steps the agent would need to reach those locations in the most direct fashion. We quantize the distances into two categories: near and far. We also include the cardinal direction in which the agent would need to travel to reach those locations, assuming no obstacles are present in the level. Directional ties are broken randomly. We also have binary features that determine if the two nearest ghosts are in the same tunnel as the agent, if the fruit has spawned, if a power pellet is active, if the nearest and second nearest ghosts are vulnerable, and if the agent is in a tunnel or a junction. Lastly, we have a feature that quantifies the remaining steps before the power pellet wears off. In total, there are eighteen features. We chose these holistic features, as they encode important details about the game-play mechanics. They can also be quantized significantly without much loss in the agent’s decision-making capability. Such global features therefore facilitate the formation of good-performing policies in relatively few training episodes. Comparatively, features that rely on more local information tend to require significantly more training episodes to reach the same performance levels. As well, the holistic features are not dependent on the level configuration. Policies obtained from them should hence generalize well to a variety of situations. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) Ms. Pac-Man Level Configuration Training Episode: 100, Step: 11 Orig. Score: 60, Mod. Score: 49 Ms. Pac-Man Level Configuration Training Episode: 100, Step: 23 Orig. Score: 110, Mod. Score: 89 Ms. Pac-Man Level Configuration Training Episode: 100, Step: 54 Orig. Score: 150, Mod. Score: 77 Ms. Pac-Man Level Configuration Training Episode: 100, Step: 75 Orig. Score: 270, Mod. Score: 166 Ms. Pac-Man Level Configuration Training Episode: 100, Step: 78 Orig. Score: 300, Mod. Score: 193 (a) Ms. Pac-Man Level Configuration Training Episode: 500, Step: 14 Orig. Score: 140, Mod. Score: 126 Ms. Pac-Man Level Configuration Training Episode: 500, Step: 37 Orig. Score: 310, Mod. Score: 273 (b) Ms. Pac-Man Level Configuration Training Episode: 500, Step: 50 Orig. Score: 360, Mod. Score: 310 Ms. Pac-Man Level Configuration Training Episode: 500, Step: 63 Orig. Score: 470, Mod. Score: 407 Ms. Pac-Man Level Configuration Training Episode: 500, Step: 71 Orig. Score: 520, Mod. Score: 449 10 Feature Weights Feature Weights Feature Weights 0.13 0.04 0.12 0.03 0.09 0.02 0.10 0.05 0.09 0.04 0.06 0.03 0.04 0.04 0.03 0.03 0.02 0.02 0.04 0.01 0.03 0.01 0.02 0.01 0.02 0.02 0.01 0.01 0.01 0.01 0.02 0.02 0.01 0.01 0.01 0.01 0.07 0.01 0.06 0.01 0.04 0.01 0.06 0.14 0.05 0.11 0.03 0.09 0.05 0.01 0.04 0.01 0.02 0.01 Feature Weights Feature Weights Feature Weights 0.19 0.08 0.16 0.06 0.12 0.04 0.15 0.08 0.11 0.06 0.09 0.04 0.18 0.06 0.06 0.05 0.03 0.03 0.05 0.01 0.04 0.01 0.03 0.01 0.04 0.03 0.02 0.03 0.02 0.03 0.04 0.04 0.03 0.04 0.03 0.04 0.15 0.03 0.13 0.03 0.08 0.03 0.14 0.19 0.12 0.17 0.07 0.11 0.09 0.03 0.07 0.03 0.05 0.02 Figure 1: An overview of the agent’s ghost avoidance behavior improvements over multiple training episodes. In row (a), the agent does not yet possess knowledge of the dynamics of the environment. It therefore moves about seemingly at random and often collides with ghosts after only a few steps. In row (b), the agent has learned to move around the level less haphazardly so as to consume more pellets. It still sometimes collides with ghosts, however. The images in rows (a) and (b) on the left-hand side of the figure highlight the environment state over multiple actions for a given training episode. These images were obtained from the moderate-complexity case. In each of these images, the colored lines indicate the paths that the agent (yellow line) and the ghosts (red, pink, cyan, and orange lines) took through the environment across a number of action choices. At the end of each row, we provide a table of the normalized feature weights for each of the eighteen holistic features. These tables are the features for the low-, moderate-, and high-complexity policies, respectively. Darker colors indicate greater feature importance. The features are presented in the same order as they were introduced from the discussions, where the numbering is from top to bottom then left to right. A policy complexity of 3760 bits was used for the results given in rows (a) and (b). 4.2 Simulation Results The simulation results that we present are obtained from Microsoft’s Revenge of the Arcade software package, which is identical to the original arcade version of Ms. Pac-Man. We use the color- and pattern-based screen capture methodology described in [32] to interact with this application. We assume that each episode provides the agent with five lives, instead of the usual three. A new life can be gained once per episode in accordance with the game’s natural scoring system. A life is lost if the agent collides with an invulnerable ghost. A training episode ends if the agent has no lives. We have three free parameters that need to be set during the learning process. The first parameter determines the amount of policy-space search granularity. Based upon initial simulations, we have found that a reasonable value for this is 3760 bits. This value is the halfway point between a minimal policy complexity, 1880 bits, and the maximal policy complexity that we consider, 5640 bits. The minimal policy complexity describes the least number of control bits needed to clear the given level, assuming a minimal amount of backtracking is performed. The maximal policy complexity was obtained assuming that the agent may have to visit each location in the entire level three times. A parameter value of 3760 bits should therefore allow the agent to evade ghosts and still complete the level. It should also strike a good risk balance. For all of our experiments, we anneal the policy complexity from its initial value toward zero. We do this by reducing the policy complexity by anywhere from 0.01 to 0.05% of its current value across each episode. The remaining two parameters are the learning rate and the discount factor, which dictate the action-value update behavior when using Q-learning. We set the learning rate to 0.3 so that more weight is given to previously acquired action-value magnitudes than those that were more recently acquired. We temporarily increase the learning rate to 0.7 for a single episode if that episode has the highest reward compared to all previous episodes. This ensures that the policy quickly implements new agent behaviors to better play the game. A discount factor to 0.9 was used so that the agent would seek action sequences with high long-term rewards. Each of these values was chosen based upon previous applications of Q-learning to stochastic game environments. 4.2.1 Emergent Agent Behaviors The first aspect of the value of information that we consider is the relationship between risk, as dictated by the policy complexity, and the emergent agent behaviors. That is, we look to see what strategies are implemented by the policies when the number of bits used to represent them changes. We also assess how these behaviors are altered for different risk amounts. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) Ms. Pac-Man Level Configuration Training Episode: 1000, Step: 38 Orig. Score: 5380, Mod. Score: 4737 Ms. Pac-Man Level Configuration Training Episode: 1000, Step: 68 Orig. Score: 5660, Mod. Score: 4987 Ms. Pac-Man Level Configuration Training Episode: 1000, Step: 103 Orig. Score: 5870, Mod. Score: 5162 Ms. Pac-Man Level Configuration Training Episode: 1000, Step: 124 Orig. Score: 6100, Mod. Score: 5371 Ms. Pac-Man Level Configuration Training Episode: 1000, Step: 144 Orig. Score: 6160, Mod. Score: 5411 (a) Ms. Pac-Man Level Configuration Training Episode: 3000, Step: 28 Orig. Score: 5280, Mod. Score: 4657 (b) Ms. Pac-Man Level Configuration Training Episode: 3000, Step: 67 Orig. Score: 5560, Mod. Score: 4898 Ms. Pac-Man Level Configuration Training Episode: 3000, Step: 90 Orig. Score: 5760, Mod. Score: 5075 Ms. Pac-Man Level Configuration Training Episode: 3000, Step: 111 Orig. Score: 5970, Mod. Score: 5264 Ms. Pac-Man Level Configuration Training Episode: 3000, Step: 125 Orig. Score: 6850, Mod. Score: 6130 11 Feature Weights Feature Weights Feature Weights 0.24 0.17 0.21 0.15 0.17 0.11 0.23 0.11 0.20 0.11 0.16 0.07 0.06 0.10 0.09 0.10 0.08 0.07 0.06 0.01 0.07 0.01 0.07 0.01 0.04 0.04 0.05 0.04 0.04 0.04 0.05 0.04 0.05 0.04 0.04 0.04 0.19 0.03 0.17 0.04 0.13 0.04 0.19 0.24 0.16 0.22 0.12 0.19 0.18 0.03 0.16 0.04 0.11 0.03 Feature Weights Feature Weights Feature Weights 0.26 0.17 0.26 0.19 0.22 0.14 0.24 0.11 0.25 0.16 0.20 0.12 0.06 0.10 0.11 0.15 0.09 0.12 0.06 0.01 0.09 0.01 0.08 0.01 0.12 0.04 0.16 0.06 0.09 0.05 0.11 0.04 0.16 0.05 0.09 0.05 0.19 0.03 0.20 0.06 0.17 0.05 0.19 0.24 0.19 0.25 0.15 0.19 0.18 0.03 0.19 0.05 0.15 0.04 Figure 2: An overview of the agent’s fruit chasing improvements over multiple training episodes. Before a few thousand episodes, the agent often does not know that fruits are a source of extra points. It therefore ignores them, even when they are only one or two steps away. This is highlighted in row (b). Through random chance, the agent will eventually consume fruits. If this occurs frequently enough, the agent will update its policy to implement fruit-chasing behaviors. As shown in row (b), the policy will direct the agent to consume fruits even when they are somewhat far away. We refer readers to the caption in the first figure for information about each of the plots. Basic Game-Play Behaviors. We encountered three sets of behaviors at different stages of the learning process, depending on the policy complexity. The first set of behaviors focused on the tasks of avoiding ghosts and seeking pellets. This functionality emerged over 500 to 1000 episodes and was refined across another 1000 to 3000 episodes, depending on the policy complexity. Figures 1(a)–1(b) give a visual overview of the agent’s behavior at different points during the first 500 episodes. As shown in figure 1(a), the agent’s initial performance is poor, regardless of the policy complexity. The agent often either remains stationary or executes unnecessary actions, increasing the agent’s chance to be eaten by ghosts. Additionally, the agent has not yet learned that colliding with ghosts results in a large, negative response. The agent therefore clears only small sections of the level. Such behaviors arise since many relevant value-function entries do not yet have meaningful values. As the agent accrues more experiences, the action-value function estimates become more accurate. The agent can thus more effectively clear the level. This is highlighted in figure 1(b). The results in figure 1(b) demonstrate that the agent spends less time uselessly backtracking through already cleared sections of the level. The agent also actively avoids ghosts. However, the agent tends to not keep a conservative distance between itself and nearby ghosts, as indicated in tables A.1(a)–A.1(c) of an associated online supplement. This can lead to it being trapped when the ghosts launch a two- or three-pronged pincer attack, as is the case in figure 1(b). As shown in tables A.1(a)–A.1(c), later in the learning process, the agent increases the average distance between it and the ghosts. Many flanking strategies that the ghosts employ are no longer effective at this point, since the agent typically leaves enough of a gap to escape. These behaviors emerged due to an increased utilization of the state-space features. We have included plots of the normalized feature weights as found using the approach of Emigh et al. [50]. The weights indicate the importance of the features for decision-making, with higher values implying greater importance. The features are listed from top to bottom, left to right in the order that they were introduced in the previous subsection. As shown in figure 1(a), the weights are mostly homogeneous for the three policy complexity cases by episode 100. This suggests that there is little preference, with some exceptions, for using various features to take certain actions. By episode 500, more emphasis is given to features related to the distance and position of the nearest pellet and nearest ghosts, if the agent is in a tunnel, and if the ghosts are in the same tunnel as the agent. This is highlighted in figure 1(b). Such changes correspond with the ability for the agent to clear larger portions of the level. Note that lower-complexity policies have larger feature weights than policies of higher complexity by this time, implying that they better account for the environment dynamics. After around 1500 to 3000 episodes, policies of higher complexity will have larger weights and hence yield better scores. The rate at which these basic game-playing skills are acquired is based on the policy complexity. Low complexities, which for this application are around 1500-2500 bits, often implement ghost-chasing and pellet-seeking behaviors more quickly than policies with a higher complexity. This is due to an inherent quantization of the action-state space. Many states are grouped together, in this case, and actions can be chosen that work reasonably well for all of the states in a given group. Only a moderate amount of agent experience over a few hundred to thousand episodes is needed to determine which actions are appropriate. Higher-complexity policies, which range from 2600-6600 bits IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) Ms. Pac-Man Level Configuration Training Episode: 5000, Step: 43 Orig. Score: 340, Mod. Score: 297 Ms. Pac-Man Level Configuration Training Episode: 5000, Step: 74 Orig. Score: 630, Mod. Score: 556 Ms. Pac-Man Level Configuration Training Episode: 5000, Step: 111 Orig. Score: 890, Mod. Score: 779 Ms. Pac-Man Level Configuration Training Episode: 5000, Step: 139 Orig. Score: 1120, Mod. Score: 981 Ms. Pac-Man Level Configuration Training Episode: 5000, Step: 152 Orig. Score: 1250, Mod. Score: 1098 (a) Ms. Pac-Man Level Configuration Training Episode: 8000, Step: 32 Orig. Score: 270, Mod. Score: 238 (b) Ms. Pac-Man Level Configuration Training Episode: 8000, Step: 67 Orig. Score: 790, Mod. Score: 1323 Ms. Pac-Man Level Configuration Training Episode: 8000, Step: 98 Orig. Score: 1460, Mod. Score: 3162 Ms. Pac-Man Level Configuration Training Episode: 8000, Step: 139 Orig. Score: 1790, Mod. Score: 3451 Ms. Pac-Man Level Configuration Training Episode: 8000, Step: 160 Orig. Score: 2110, Mod. Score: 4350 12 Feature Weights Feature Weights Feature Weights 0.28 0.20 0.36 0.29 0.30 0.25 0.27 0.15 0.36 0.26 0.29 0.22 0.07 0.14 0.18 0.24 0.16 0.20 0.06 0.01 0.18 0.01 0.16 0.01 0.13 0.04 0.27 0.17 0.24 0.15 0.12 0.04 0.27 0.15 0.24 0.12 0.22 0.03 0.32 0.14 0.27 0.10 0.21 0.24 0.32 0.31 0.26 0.28 0.21 0.03 0.30 0.13 0.25 0.09 Feature Weights Feature Weights Feature Weights 0.30 0.21 0.36 0.29 0.39 0.35 0.30 0.19 0.36 0.26 0.39 0.29 0.09 0.15 0.19 0.24 0.25 0.28 0.08 0.01 0.18 0.02 0.25 0.01 0.15 0.05 0.27 0.25 0.29 0.30 0.15 0.04 0.27 0.26 0.29 0.30 0.23 0.03 0.32 0.23 0.38 0.27 0.23 0.24 0.32 0.31 0.38 0.38 0.22 0.03 0.30 0.19 0.35 0.25 Figure 3: An overview of the agent’s ghost-chasing behavior improvements over multiple training episodes. Initially, the agent does not know that vulnerable ghosts can be eaten. It therefore avoids them, as shown in (a). After several thousand episodes, the agent will sometimes consume vulnerable ghosts. This can happen, for instance, when the agent is stuck between two or more ghosts with no path for escape. If the agent consumes enough ghosts, the policy will begin to associate such actions with increased rewards. It will then implement multi-modal behaviors that depend on the ghost state. As shown in (b), the agent will eventually chase after vulnerable ghosts. We refer readers to the caption in the first figure for information about each of the plots. for this application, require many more agent-environment interactions to reach the same skill level. This is because the state-action space quantization is much finer, which leads to more state groups with fewer states. The agent is also more risky with its action-selection strategy, so poor choices may be made early in the learning process. However, as we highlight in the next subsection, this greater amount of risk offers the opportunity to refine these behaviors. Fruit-Chasing Behavior. The next set of behaviors focused on chasing spawned fruit. Consuming fruits provide varying amounts of points: it starts from a reward of +100 and increases to +5000 as more levels are cleared before the agent loses all of its lives. During the first 2000-3000 episodes, the agent often ignores any spawned fruit that maneuver through the level, regardless of the policy complexity. This is because the policy has not yet associated eating fruit with higher scores. In fact, the agent will not pursue fruit, even if it is adjacent to the agent. This is highlighted in figure 2(a). Eventually, by coincidence, the agent will be in the same corridors as fruits and consume them. By about episodes 3000 to 4500, this will have happened frequently enough for the agent to actively chase fruits from a few cells away, assuming that there are no ghosts along that path. Supporting statistics are provided in tables A.2(a)–A.2(c). This reliably occurs only for moderate- and high-complexity policies, though. The transformation costs for low-complexity policies are too great to consistently implement this behavior; the scores for such policies tend to lag by this point as a result, which we show in the next subsection. After anywhere from 6000 to 9000 episodes, the agent will seek out fruits at a greater distance. It will even do so if the chosen path has few pellets along it, since the score improvements offset the movement penalties. Supporting statistics are given in tables A.2(a)–A.2(c), which show that high-complexity policies tend to chase fruits over longer distances than moderate-complexity policies. Beyond a certain distance, the agent tends to overlook such bonus items, especially if it is within the same corridor as a ghost. The feature weights in figures 2(a) and 2(b) signal that this happens because ghost avoidance is a more prominent behavior. Eventually, knowing the location of both fruit and ghosts become equally important for the purposes of maximizing the rewards. The agent has three features it can use to determine when a fruit has spawned. The first two are related to the distance and direction of the fruit in the environment, which has special values for non-existent fruit. The other is a binary-valued feature that determines if a fruit has spawned or not. As shown in figures 1 to 3, this latter feature consistently has a low weight, even after many episodes. It is therefore not important for decision making, as similar information can be inferred from the other features. We found that the fruit-spawned binary feature could be removed without adversely impacting the agent’s performance. In many cases, when re-starting the learning process using this reduced feature set, a slight increase in the rate of skill acquisition was observed for the three different policy complexities. Ghost-Chasing Behavior. Another behavior that materializes is that of eating vulnerable ghosts. This adds anywhere from +200 to +1600 points to the original score and +800 to +6400 points to the modified score, depending on the number of ghosts consumed per power pellet. Initially, the agent does not know if vulnerable ghosts can be eaten while under the effects of a power pellet. It IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) Ms. Pac-Man Reinforcement Learning Policy Performance Ms. Pac-Man Value of Information Policy Exploration 20 000. 15 000. 10 000. 5000. 0. 2500. 5000. 7500. Training Episode 10 000. 0. Exploration Amount Original Score Low Complexity: 1880 bits Moderate Complexity: 3760 bits High Complexity: 5160 bits Epsilon Greedy Exploration: epsilon 1.0 to 0.3 Soft Max Exploration: tau 1.0 to 0.3 13 1. 0.8 0.6 0.4 Low Complexity: 1880 bits Moderate Complexity: 3760 bits High Complexity: 5160 bits 0. 2500. 0.2 5000. 7500. Training Episode 10 000. 0. (a) (b) Figure 4: Plots of the value-of-information learning process. (a) Plot of the smoothed average original game score versus the number of episodes for different levels of complexity. This plot shows that lower complexity policies initially perform better than higher complexity ones due to a coarser quantization of the joint state-action space. The original scores versus the number of episodes for the best tested epsilon-greedy and soft-max exploration parameters are also shown in (a). (b) Plot of the smoothed, normalized average exploration amount versus the number of episodes for the value of information. This plot shows where the value of information is on the abnormal branch throughout training. Lower-risk policies move quickly away from the abnormal branch (one) toward the normal branch (zero). In both (a) and (b), results for the low-, moderate-, and high-complexity policies are represented using blue, green and red curves, respectively. In (a), results for epsilon-greedy and soft-max exploration and represented using yellow and purple curves, respectively. Darker lines show the average obtained over the independent trials. The lower and upper boundaries of the shaded area represent the 10 percentile (z score: -1.25) and 90 percentile (z score: 1.25) of the various quantities, respectively. therefore defaults to evading the enemies whenever possible, which is illustrated in figure 3(a). It is not until those situations where the agent becomes trapped between two or more vulnerable ghosts that the policy shifts to actively eating ghosts. Being surrounded by ghosts is a somewhat rare occurrence, though, as the agent quickly learns to outpace them. We found that short-term increases in the learning rate helped to increase the adoption rate of this multi-modal behavior. By around episode 7000 to 9500, the policies compel the agent to seek out ghosts whenever a power pellet is activated. This is demonstrated in figure 3(b), where the agent goes after two ghosts in rapid succession. We observed that only moderate- and high-complexity policies led the agents to chase vulnerable ghosts. High-complexity policies took the longest to implement this behavior, as shown in tables A.3(a)–A.3(c). They tended to lead to far superior strategies, though, after a sufficient number of episodes. This was due to a thorough investigation of the action space brought about by the high amount of risk. Low-complexity policies, in comparison, were too risk-adverse to stray from the initially learned behaviors. Moreover, the state-action space was too coarsely quantized to permit adequate action specialization to the relevant states. These capabilities arose due to increased weighting of certain features. When comparing the feature weights in figures 1 and 2 to those in figure 3, it can be seen that the distance and direction to the nearest ghosts and power pellets become more prominent. The agent is not only trying to determine if it should head to the nearest power pellet, but also if there are any nearby ghosts for it to consume once it does. The feature associated with ghost vulnerability also had a larger influence over the action choices. We observed that that moderate-complexity searches led to larger initial increases of these feature values than higher-complexity searches when this skill was implemented. Better scores are therefore produced during this time. This was to be expected, since the action space could be more quickly explored for the latter case. Moreover, once the agent found a state-action correspondence that led to good rewards, it would be more inclined to retain that correspondence versus choosing a different action. Repeatedly selecting different actions does offer some benefit, however. It leads to a more thorough investigation of the joint space and, with enough experience, a better understanding of the environment dynamics. High-complexity policies therefore will have higher feature weights than other types later in the learning process; they hence will yield superior multi-modal behaviors. Removing the power-pellet-steps-remaining feature and restarting the simulations led to a modest learning-rate improvement for low-complexity policies. In fact, removing all of the power-pellet features allowed for the formation of pellet-seeking and ghost-avoidance behaviors more quickly in the low-risk case. For the higher-complexity cases, removing the former feature had a detrimental impact. The agent would chase after ghosts right until the effects of the power pellet wore off. They would therefore often be trapped by two or more nearby ghosts. Summary. In this subsection, we covered basic game-playing behaviors that emerge during the simulations: seeking pellets and avoiding ghosts. We showed that this functionality arose due to an increased reliance on subsets of features used to represent the state space. The rate at which these features rose to prominence depended on the risktaking parameter. Lower amounts of risk typically yielded faster feature-usage rates than higher amounts of risk. Only around 1000 episodes were needed before such behaviors could reliably clear the pellets on the initial levels. This was due to a coarse quantization of the action-state space, which could be thoroughly investigated in a relatively few number of episodes. Higher amounts of risk required more training episodes, typically on the order of 1000 to 2000. However, the behaviors could be refined to a greater degree for these cases, leading to better game-play performance. We also covered two other behaviors could emerge: consuming fruit bonus items and chasing after vulnerable ghosts after eating power pellets. Both behaviors reliably materialized after around 3000 and 7000 episodes, respectively, for moderate and high policy complexities. This was due to a fine quantization of the action-state space, which permitted adequate specialization of action responses. It was also a byproduct of a high level of action-selection risk IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 14 and hence experimenting with different strategies. Low complexity policies, in contrast, rarely implemented these two behaviors. This stemmed from an insufficient amount of action exploration. 4.2.2 Policy Performance The next aspect of the value of information that we consider is the relationship between risk and the obtainable score. We also analyze how such scores were obtained by looking at properties of the normal and abnormal branches, along with game-play metrics. Agent Score Analysis. Figure 4(a) highlights the policies’ original game scores across 12000 episodes for 25 independent trials. Figure 4(b) provides a plot of the normalized exploration amount on the abnormal branch across 12000 episodes for 25 independent trials. In figure 4(b), values close to one indicate a high amount of risk and hence exploration. Values close to zero correspond with low amounts of risk in the action-selection process and an exploitation of learned behaviors. Figure 4(a) shows a sharp increase in rewards for all three policy complexities at the beginning of the learning process. This is due to the implementation of beneficial early-game behaviors. Figure 4(b) captures that these behaviors materialized due to a period of high exploration in the joint state-action space. When considering an initial policy complexity of 5160 bits, the agent’s performance is worse than for either 1880 or 3760 bits over the first 6000-7000 episodes. This is to be expected, as the policy solution space is being finely searched. The agent is therefore often attempting actions that deviate from the prescribed policy. Few behaviors are retained across multiple episodes at this stage. Figure 4(b) corroborates this claim. It shows that the high-complexity policy entries, and hence the action-value function estimates, are continuously revised. The search process is far into the abnormal branch during this time. During the first 3000 episodes, high-complexity policies tend to leave more islands of pellets than the lowercomplexity cases, as indicated in tables A.4(a)–A.4(c) of an associated online appendix. The agent also routinely out paces the ghosts, which is highlighted in table A.1(c). However, this is a marked decrease from the balanced-search case statistics given in table A.1(a) and A.1(b). Additionally, the agent also maneuvers to adjacent tunnels more slowly than the balanced-search case if it detects that one or more ghosts are present in the current tunnel. This is highlighted in tables A.5(a)–A.5(c). In short, high-complexity policies yield behaviors that lower the agent’s chances of successfully completing the level early in the training process. This explains why the score is low for such policies at this stage of learning. Given enough time to explore the space, though, high-complexity policies will perform just as well if not better than those of lower complexity. This typically occurs after 7000 to 8000 episodes. During this period, the highcomplexity policies start to more aggressively chase after vulnerable ghosts over longer distances, as illustrated in tables A.3(a)–A.3(c). More ghosts are eaten per power pellet too, which can be seen from tables A.6(a)–A.6(c). The statistics in tables A.2(a)–A.2(c) indicate that the agents also pursue fruit bonus items over longer distances, thereby further improving the chance for large score improvements. Lastly, due to a refinement of the basic game-playing behaviors, the agents cleared more levels of pellets in a single episode. We refer to tables A.7(a)–A.7(c) for the details. All of these improvements were possible due to a thorough exploration of the action space. They also came about since the period of exploration was long enough to adjust to the multi-modal environment dynamics. Annealing the policy complexity additionally helped enable the agent to retain the highest-performing actions for each state group. When considering an initial policy complexity 1880 bits, the performance improved in the first 3000 episodes compared to when 3760 or 5160 bits were used. The policy solution space is being coarsely searched in this case, which can be inferred from figure 4(b). The agent will only possess the most basic behaviors for winning the game, though, which include navigating to the nearest pellets and fleeing nearby ghosts. Rarely will these abilities be honed so that the agent consistently clears many levels as training progresses. This is because the amount of exploration is much lower in the later stages of learning, as indicated in figure 4(b), which prohibits the acquisition of new behaviors. The cost to transform the policy across episodes is also greater, which causes a shift away from the abnormal branch toward the normal branch. During the first 3000 episodes, low-complexity policies outperform both moderate- and high-complexity policies. For instance, such policies typically remain more grid cells away from ghosts, which is noted in tables A.1(a)–A.1(c). It also takes, on average, fewer steps for the agent to evade ghosts by move to an empty tunnel. This is highlighted in tables A.5(a)–A.5(c). Both these statistics indicate that the agent will not be as easily caught in coordinated attacks from the ghosts. Lastly, such policies leave fewer islands of pellets than the moderate-complexity case, as shown in tables A.4(a)–A.7(c). Backtracking through the level is thus less necessary, which reduces the agent’s risk of dying. After about 3000 episodes, the performance of low-complexity policies lags behind the others. This is due to a few factors. First, moderate- and high-complexity policies tend to visit more levels per episode, as noted in tables A.7(a)–A.7(c). More pellets are consumed, which naturally improves the score. These higher-complexity policies also implement fruit-chasing behaviors. Since fruits are worth more in later levels, there is a potential for large score IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 15 jumps. Secondly, low-complexity policies never capitalize on the relationship between power pellets and vulnerable ghosts. These policies therefore miss out on another score-increasing opportunity. Score Comparisons. As shown in figure 4(a), the agent is able to accrue an average of about 20000 points after 12000 episodes. This score is competitive with the contest-winning scores of some of the earliest IEEE CEC and CIG Ms. Pac-Man competitions [3]. It is several thousand points away from the best scores obtained in later competitions, though; many of the competitor’s approaches could reach scores in the 30000 point range. It is important to note that such scores are not necessarily the best that can be obtained by our methodology. Figure 4(b) indicates that the highest-complexity policy is being adapted a fair amount once 12000 episodes is reached. It is possible that additional refinements to the game-play behaviors can be made after this point in the learning process. We tested this hypothesis by increasing the learning period duration from 12000 to 25000 episodes for the highestcomplexity policy. After 25000 episodes, the agent was achieving average scores of approximately 58000 points, indicating that it had adjusted better to the game-play dynamics. The best score that we obtained from this policy, out of ten independent games with three initial lives, was 69210. This score is competitive with other approaches that rely on a similar simulation environment. For exmaple, the best sores obtained in the IEEE CIG 2009, 2010, and 2011 competitions were 30010 (H. Matsumoto, et al.), 21250 (M. Emilio, et al.), and 26280 points (N. Ikehata and T. Ito), respectively. Ten Monte Carlo trials were run for each of the entries of these competitions, and only the highest score from the trials was used as a basis for comparison. Our scores also exceed those of the recent entry by Foderaro, et al. [32], who published an agent that could obtain 44630 points. Summary. In this subsection, we assessed the scoring performance of the policies for different levels of risk. Our results illustrate that low-risk policies tended to increase the accrued rewards at a much faster pace than higher-risk policies during the first 1000 to 2500 episodes. This performance improvement rate was possible due to a coarse quantization of the action-state space, which could be explored quickly. We additionally showed that the score increases were connected with leaving fewer islands of pellets and quickly darting into tunnels that are not occupied by ghosts. After this time, such low risk policies lagged, which was caused by a lack of adequate action specialization to different environment configurations. Both moderate- and high-risk policies dominated due the increased scores from consuming fruit bonus items and vulnerable ghosts. Eventually, high-risk policies produced the best results, as the agent’s behaviors were steadily refined across episodes 7000 to 12000. Large score improvements were seen during this time. The improvement for moderate-risk policies, in contrast, slowed after around 10000 episodes. This occurred because such searches eventually became too risk adverse to yield significant behavior improvements. These results signal that the risk hyperparameter directly influences many factors of the learning process. We will be using this knowledge in our future endeavors to determine how to automatically adjust the hyperparameter so as to optimally improve the score across each episode. 4.2.3 Methodological Comparisons In the two previous subsections, we have detailed the effects of risk on the agent’s performance. We now highlight how this performance compares with existing reinforcement-learning search mechanisms. We utilize two prominent stochastic schemes: epsilon-greedy exploration and soft-max-based exploration. Epsilon-Greedy Exploration Comparisons. Epsilon-greedy exploration is based on the notion that random actions should be taken at random times. The choice of when to take a random action is governed by single parameter. It is well known that this type of approach can converge to optimal values, in certain situations, as the number of episodes grows [51]. For our application, this did not occur. The average scores are reported in table A.8(a) of an associated online appendix when annealing from an epsilon parameter value of 1.0 to 0.5. This corresponds to the situation of selecting a random action after every two steps. Increasing the final value of the annealed parameter to 0.7, which encourages a high degree of exploration, led to worse results. These results are presented in table A.8(b). Decreasing the final annealed parameter value to 0.3, which promotes exploitation, yielded a marginal improvement, as we show in table A.8(c); comparisons are provided in figure 4(a). Learning over anywhere from two to four times more episodes did little to enhance the agent’s performance. Adjusting the learning rate and discount factor had only a marginal impact as well. One of the changes that we found to work well involved a constant annealing of epsilon from 1.0 to 0.05 during training. This case corresponds to initially choosing a random action at every step to only choosing a random action every twenty steps. We found that this amount of exploration enabled the agent to implement basic game-play behaviors of pellet seeking and ghost avoidance at almost the same rate as policies using the value of information. This was because the policies would often retain good behaviors. Soft-Max Exploration Comparisons. Part of the reason why epsilon-greedy exploration performs poorly is that there is no weighting of the actions being considered. The influence of the state-action pairs on the expected returns should, at the very least, guide the selection of appropriate actions, as in soft-max-based exploration. In our application, implementing soft-max-based exploration yielded modest benefits. When annealing the exploration-parameter IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 16 value from 1.0 to 0.5, the average scores were higher than epsilon greedy across almost all of the episodes, as indicated in table A.9(a). This parameter value corresponds to an even mixture of exploration and exploitation. Biasing toward the best-performing action, with a final annealed parameter value of 0.3, led to slightly better scores. This is highlighted in table A.9(c); it is also presented in figure 4(a). Promoting near-equi-probable action selection, with a final annealed parameter value of 0.7, led to the rewards reported in table A.9(b). While these policies outperform those from epsilon-greedy exploration, they behaved worse than those produced by the value of information. Moreover, they did not implement any fruit-chasing capabilities. Neither epsilon-greedy- nor soft-max-based policies implemented multi-modal agent behaviors well in the number of training episodes that we considered. The agents would often avoid vulnerable and invulnerable ghosts alike. This was largely expected, as such exploration schemes tend to define monolithic policies. Without either substantially more training episodes or the use of learning heuristics like action replay, it would be difficult for these schemes to promote the formation of multi-modal policies. Comparison Explanations. For these simulations, value-of-information-based policies performed better because they induce a non-linear quantization of the state-action space according to the action-value function. The magnitude of the risk-taking parameter dictates the number of state clusters that are formed. The policy-complexity values that we considered were less than the state random-variable entropy, which led to a partitioning of the space. Much less effort was required to perform reinforcement learning over this partitioned space. Both epsilon-greedy and soft-max selection, in contrast, correspond to the value of information with a policy complexity equal to the state randomvariable entropy. No quantization is performed in this case, and each state must be visited to be paired with an action. A great deal of agent-environment interactions are required for the agent to arrive at meaningful action-value function estimates. Another reason why the value of information performed well is that it inherently accounts for the deviations in expected utility, or risk, when choosing actions. The value of information also weights action choices differently in risk-adverse situations compared to risk-favoring cases. Both of these properties ensure that the value of information is maximizing the action-value function over the potential outcomes at an optimal rate. Many previous works suggest that risk is also connected with high-order culmulants of the utility function. In our case, we use a conditional Shannon entropy difference to model the risk, or uncertainty, associated with deviating from the supplied prior policy. It is well known that entropy accounts for all statistical moments [6]. Value-ofinformation-based agents hence operate with complete knowledge of the uncertainty associated with a particular action choice. Other exploration approaches often account for risk using, at most, only a single statistical moment. Some methods, such as epsilon-greedy, do not rely on any moments of the utility function. The rate at which such methods converge to optimal value functions can lag significantly behind the value of information, which we surmise is due to not accounting for uncertainty in the action-selection process. Summary. We have shown that the value of information leads to the timely formation of high-performing policies. Comparatively, two of the most popular exploration heuristics, epsilon-greedy and soft-max selection, return subpar policies. This is because they do not have the ability to quantize the state-action space and therefore must search over the entirety of it. It is also because these methods are not entirely risk sensitive. Although some methods, like soft-max selection, do weight action choices by their expected utility, they reason about risk in a symmetric manner. Asymmetry in risk-based decision making is needed for optimal decision-making under uncertainty [36]. In our future endeavors, we will demonstrate that this performance improvement occurs because such heuristics do not induce an aggregation of Markov chains underlying the Markov decision processes. The value of information, in contrast, performs this type of dynamics reduction, which further explains why it is quicker at uncovering good policies. 5 Conclusions In this paper, we have considered an information-theoretic approach for either promoting or eschewing risky agent behaviors during reinforcement learning. Our approach is based on a value-of-information criterion, which optimally trades off between information and expected rewards. The value of information can be utilized within a variety of dynamical-systems-based decision-making frameworks. When applied to Markov decision processes, the criterion quantifies the expected improvement in rewards that can be achieved for probabilistic policies of a specified complexity. The value of information possesses a free hyperparameter whose value must be selected. This parameter dictates the amount of policy quantization. For the first form of this criterion, small parameter values correspond with lowcomplexity policies. It also corresponds with risk-avoiding agent behaviors. Higher parameter values lead to lower policy compression levels. Agents are more likely to frequently take risks in these cases, which can promote the formation of multi-modal strategies. What constitutes large and small values depends on the problem domain. To gauge the performance of the value of information, we considered the creation of Ms. Pac-Man agents. We showed that the risk hyperparameter had a profound influence on the policy return quality for this game. High levels IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 17 of risk yielded policies whose expected reward approached those for the optimal solution. They also facilitated the switching of game-play strategies, which, for this environment, involved chasing vulnerable ghosts. A great many learning episodes were needed to construct such multi-modal policies, though. Lower levels of risk allowed for the quick generation of policies that performed reasonably well. As the number of episodes increased, the policies’ qualities lagged behind those found with higher levels of risk. They were also unable to reliably produce multi-modal game-play strategies. These findings indicate that the value of information offers a good framework to understand the variables at play. We have only a single hyperparameter whose value must be chosen. This hyperparameter dictates a great deal of functionality, such as the amount of action-selection risk and hence the amount of exploration. Many other approaches for producing Ms. Pac-Man agents have multiple parameters and hyperparameters whose values must be chosen. Such a large number of parameters makes the connections between scores and variable values more difficult to understand. It can also impede the construction of automated, principled parameter-tuning methods. In our simulations, we additionally compared the results of value-of-information-based exploration with two other reinforcement-learning search mechanisms: soft-max-based and epsilon-greedy action selection. Both schemes produced worse policies. They also did not implement multi-modal behaviors. This is because such selection procedures assume that the policies can be unboundedly complex. A great many episodes would therefore be needed to explore the joint state-action space. For many problems, value-of-information-based policies with finite complexity can approach the same levels of performance in fewer episodes. This is because not every state in a given problem may need to be paired with a unique action. It may hence be possible to group several states and assign them the same action without impacting performance. These comparative results illustrate that the value-of-information criterion’s merger of prospect theory and utility theory with uncertainty provides an excellent means of addressing the exploration dilemma. Neither epsilon-greedy exploration nor soft-max selection, in contrast, let alone many other search mechanisms, adequately account for uncertainty when choosing actions. They can therefore be ill equipped to understand the dynamics of highly complex, stochastic environments like the Ms. Pac-Man game world in only a few episodes. Our emphasis in this paper has been on demonstrating that the value of information provides a principled trade-off between exploration and exploitation. Our future endeavors will involve extensions of this criterion to effectively address many classes of problems. One extension will a more principled selection of the criterion’s free hyperparameter. Currently, we manually specified an initial value based upon the early simulation results. For certain domains, however, such trial-and-error-based testing may be prohibitively time consuming. To sidestep this issue, we will investigate information-theoretic approaches for adapting the parameter value. A useful procedure may be to choose values that monotonically decrease the action-state entropy. By minimizing entropy, we are forcing the policies to eventually become deterministic. No further risks will need to be taken by the agent, as complete knowledge of that environment will have been obtained. Another possibility would be to utilize the policy cross-entropy to tune the hyperparameter value. Policy cross-entropy can be viewed as a bounded measure of how much the policy is changing across episodes. By adjusting the hyperparameter value so that the policy crossentropy does not stagnate early in the learning process, we can be assured that a thorough exploration of the joint space will be being conducted. Moreover, high-performing policies should be found much more quickly than by a naive annealing procedures, such as the one that we considered. References [1] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction. Cambridge, MA, USA: MIT Press, 1998. [2] L. P. Kaelbling, M. L. Littman, and A. W. Moore, “Reinforcement learning: A survey,” Journal of Artificial Intelligence Research, vol. 4, no. 1, pp. 237–285, 1996. Available: http://dx.doi.org/10.1613/jair.301 [3] P. Rohlfshagen, J. Liu, D. Perez-Liebana, and S. M. Lucas, “Pac-Man conquers academia: Two decades of research using a classic arcade game,” IEEE Transactions on Computational Intelligence and AI in Games, pp. 1–25, 2017, (accepted, in press). [4] J. Schrum and R. Miikkulainen, “Discovering multimodal behavior in Ms. Pac-Man through evolution of modular neural networks,” IEEE Transactions on Computational Intelligence and AI in Games, vol. 8, no. 1, pp. 67–81, 2016. Available: http://dx.doi.org/10.1109/TCIAIG.2015.2390615 [5] ——, “Solving multiple isolated, interleaved, and blended tasks through modular neuroevolution,” Evolutionary Computation, vol. 24, no. 3, pp. 459–490, 2016. Available: http://dx.doi.org/10.1162/EVCO_a_00181 [6] J. C. Príncipe, Information Theoretic Learning. New York City, NY, USA: Springer-Verlag, 2010. [7] R. L. Stratonovich, “On value of information,” Izvestiya of USSR Academy of Sciences, Technical Cybernetics, vol. 5, no. 1, pp. 3–12, 1965. [8] R. L. Stratonovich and B. A. Grishanin, “Value of information when an estimated random variable is hidden,” Izvestiya of USSR Academy of Sciences, Technical Cybernetics, vol. 6, no. 1, pp. 3–15, 1966. [9] R. L. Stratonovich, Information Theory. Moscow, Soviet Union: Sovetskoe Radio, 1975. [10] S. M. Lucas, “Evolving a neural network location evaluator to play Ms. Pac-Man,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Colchester, UK, April 4-6 2005, pp. 203–210. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 18 [11] M. Wittikamp, L. Barone, and P. Hingston, “Using NEAT for continuous adaptation and teamwork formation in Pac-Man,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Perth, Australia, December 15-18 2008, pp. 234–242. Available: http://dx.doi.org/10.1109/CIG.2008.5035645 [12] M. Gallagher and M. Ledwich, “Evolving Pac-Man players: Can we learn from raw input?” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Honolulu, HI, USA, April 1-5 2007, pp. 282–287. Available: http://dx.doi.org/10.1109/CIG.2007.368110 [13] R. Thawonmas and T. Ashida, “Evolution strategy for optimizing parameters in Ms. Pac-Man controller ICE Pambush 3,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Copenhagen, Denmark, August 18-21 2010, pp. 235–240. Available: http://dx.doi.org/10.1109/ITW.2010.5593350 [14] A. M. Alhejali and S. M. Lucas, “Using a training camp with genetic programming to Ms. Pac-Man agents,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Seoul, South Korea, August 31-September 3 2011, pp. 118–125. Available: http://dx.doi.org/10.1109/CIG.2011.6031997 [15] M. F. Brandstetter and S. Ahmadi, “Reactive control of Ms. Pac-Man using information retrieval based on genetic programming,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Granada, Spain, September 11-14 2012, pp. 250–256. Available: http://dx.doi.org/10.1109/CIG.2012.6374163 [16] M. Gallagher and A. Ryan, “Learning to play Pac-Man: An evolutionary, rule-based approach,” in Proceedings of the IEEE Congress on Evolutionary Computation (CEC), Canberra, Australia, December 8-12 2003, pp. 2462–2469. Available: http://dx.doi.org/10.1109/CEC.2003.1299397 [17] P. Rohlfshagen and S. M. Lucas, “Ms. Pac-Man versus Ghost Team CEC 2011 competition,” in Proceedings of the IEEE Congress on Evolutionary Computation (CEC), New Orleans, LA, USA, June 5-8 2011, pp. 70–77. Available: http://dx.doi.org/10.1109/CEC.2011.5949599 [18] A. Fitzgerald and C. B. Congdon, “RAMP: A rule-based agent for Ms. Pac-Man,” in Proceedings of the IEEE Congress on Evolutionary Computation (CEC), Trondheim, Norway, May 18-21 2009, pp. 2646–2653. Available: http://dx.doi.org/10.1109/CEC.2009.4983274 [19] N. Wirth and M. Gallagher, “An influence map model for playing Ms. Pac-Man,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Perth, Australia, December 15-18 2008, pp. 228–233. Available: http://dx.doi.org/10.1109/CIG.2008.5035644 [20] D. J. Gagne and C. B. Congdon, “FRIGHT: A flexible rule-based intelligent ghost team for Ms. Pac-Man,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Granada, Spain, September 11-14 2012, pp. 273–280. Available: http://dx.doi.org/10.1109/CIG.2012.6374166 [21] P. Burrow and S. M. Lucas, “Evolution versus temporal difference learning for learning to play Ms. Pac-Man,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Milan, Italy, September 7-10 2009, pp. 53–60. Available: http://dx.doi.org/10.1109/CIG.2009.5286495 [22] L. L. DeLooze and W. R. Viner, “Fuzzy Q-learning in a nondeterministic environment: Developing an intelligent Ms. Pac-Man agent,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Milan, Italy, September 7-10 2009, pp. 162–169. Available: http://dx.doi.org/10.1109/CIG.2009.5286478 [23] S. Griffith, K. Subramanian, J. Scholz, C. Isbell, and A. L. Thomaz, “Policy shaping: Integrating human feedback with reinforcement learning,” in Advances in Neural Information Processing Systems (NIPS), C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger, Eds. Cambridge, MA, USA: MIT Press, 2013, pp. 2625–2633. [24] A. Vezhnevets, V. Mnih, S. Osindero, A. Graves, O. Vinyals, J. Agapiou, and K. Kavukcuoglu, “Strategic attentive writer for learning macro-actions,” in Advances in Neural Information Processing Systems (NIPS), D. D. Lee, M. Sugiyama, U. V. Luxburg, I. Guyon, and R. Garnett, Eds. Cambridge, MA, USA: MIT Press, 2016, pp. 3486–3494. [25] J. Oh, X. Guo, H. Lee, R. L. Lewis, and S. Singh, “Action-conditional video prediction using deep networks in Atari games,” in Advances in Neural Information Processing Systems (NIPS), C. Cortes, N. D. Lawrence, D. D. Lee, M. Sugiyama, and R. Garnett, Eds. Cambridge, MA, USA: MIT Press, 2015, pp. 2863–2871. [26] H. P. van Hasselt, A. Guez, M. Hessel, V. Mnih, and D. Silver, “Learning values across many orders of magnitude,” in Advances in Neural Information Processing Systems (NIPS), D. D. Lee, M. Sugiyama, U. V. Luxburg, I. Guyon, and R. Garnett, Eds. Cambridge, MA, USA: MIT Press, 2016, pp. 4287–4295. [27] D. Robles and S. M. Lucas, “A simple tree search method for playing Ms. Pac-Man,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Milan, Italy, September 7-10 2009, pp. 249–255. Available: http://dx.doi.org/10.1109/CIG.2009.5286469 [28] N. Ikehata and T. Ito, “Monte Carlo tree search in Ms. Pac-Man,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Seoul, South Korea, August 31-September 3 2011, pp. 39–46. Available: http://dx.doi.org/10.1109/CIG.2011.6031987 [29] S. Samothrakis, D. Robles, and S. M. Lucas, “Fast approximate Max-n Monte Carlo tree search for Ms. Pac-Man,” IEEE Transactions on Computational Intelligence and AI in Games, vol. 3, no. 2, pp. 142–154, 2011. Available: http://dx.doi.org/10.1109/TCIAIG.2011.2144597 [30] C. Browne, E. Powley, D. Whitehouse, S. Lucas, P. I. Cowling, P. Rohlfshagen, S. Tavener, D. Perez, S. Samothrakis, and S. Colton, “A survey of Monte Carlo tree search methods,” IEEE Transactions on Computational Intelligence and Artificial Intelligence in Games, vol. 4, no. 1, pp. 1–49, 2012. Available: http://dx.doi.org/10.1109/TCIAIG.2012.2186810 [31] T. Pepels, M. H. M. Winands, and M. Lanctot, “Real-time Monte Caro tree search in Ms. Pac-Man,” IEEE Transactions on Computational Intelligence and AI in Games, vol. 6, no. 3, pp. 245–257, 2014. Available: http://dx.doi.org/10.1109/TCIAIG.2013.2291577 [32] G. Foderaro, A. Swingler, and S. Ferrari, “A model-based cell decomposition approach to on-line pursuit-evasion path planning and the video game Ms. Pac-Man,” in Proceedings of the IEEE Symposium on Computational IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] 19 Intelligence and Games (CIG), Granada, Spain, September 11-14 2012, pp. 281–287. Available: http://dx.doi.org/10.1109/CIG.2012.6374167 ——, “A model-based approach to optimizing Ms. Pac-Man game strategies in real time,” IEEE Transactions on Computational Intelligence and AI in Games, 2016, (accepted, in press). Available: http://dx.doi.org/10.1109/TCIAIG.2016.2523508 J. von Neumann and O. Morgenstern, Theory of Games and Economic Behavior. Princeton, NJ, USA: Princeton University Press, 2007. R. V. Belavkin, “Optimal measures and Markov transition kernels,” Journal of Global Optimization, vol. 55, no. 2, pp. 387–416, 2013. Available: http://dx.doi.org/10.1007/s10898-012-9851-1 ——, “Asymmetry of risk and value of information,” in Dynamics of Information Systems, C. Vogiatzis, J. Walteros, and P. Pardalos, Eds. New York, NY, USA: Springer-Verlag, 2014, pp. 1–20. M. Allais, “Le comportement de l’homme rationnel devant le risque: Critique des postulats et axiomes de l’Ecole americaine,” Econometrica, vol. 21, no. 4, pp. 503–546, 1953. Available: http://dx.doi.org/10.2307/1907921 S. Huck and W. Müller, “Allais for all: Revisiting the paradox in a large representative sample,” Journal of Risk and Uncertainty, vol. 44, no. 3, pp. 261–293, 2012. Available: http://dx.doi.org/10.1007/s11166-012-9142-8 D. Kahneman and A. Tversky, “Prospect theory: An analysis of decision under risk,” Econometrica, vol. 47, no. 2, pp. 263–292, 1979. Available: http://dx.doi.org/10.2307/1914185 I. J. Sledge and J. C. Príncipe, “Using the value of information to explore stochastic, discrete multi-armed bandits,” Entropy, 2017, (under review). Available: https://arxiv.org/abs/1710.02869 I. J. Sledge, M. S. Emigh, and J. C. Príncipe, “Guided policy exploration for Markov decision processes using an uncertainty-based value-of-information criterion,” IEEE Transactions on Neural Networks and Learning Systems, 2017, (under review). Available: https://www.dropbox.com/s/1v2wo4bn2szdcm4/Sledge-TNN-2017-1col-2.pdf?dl=0 R. E. Bellman, Dynamic Programming. Mineola, NY, USA: Dover Publications, 2003. R. S. Sutton, “Learning to predict by the methods of temporal differences,” Machine Learning, vol. 3, no. 1, pp. 9–44, 1988. Available: http://dx.doi.org/10.1023/A:1022633531479 C. J. C. H. Watkins and P. Dayan, “Q-learning,” Machine Learning, vol. 8, no. 3, pp. 279–292, 1992. Available: http://dx.doi.org/0.1023/A:1022676722315 M. Wiering and J. Schmidhuber, “Fast online Q(λ),” Machine Learning, vol. 33, no. 1, pp. 105–115, 1998. Available: http://dx.doi.org/10.1023/A:1007562800292 N. Tishby and D. Polani, “Information theory of decisions and actions,” in Perception-Reason-Action Cycle: Models, Algorithms and Systems, V. Cutsuridis, A. Hussain, and J. G. Taylor, Eds. New York City, NY, USA: Springer, 2010, pp. 601–636. Available: http://dx.doi.org/10.1007/978-1-4419-1452-1 J. Rubin, O. Shamir, and N. Tishby, “Trading value and information in MDPs,” in Decision Making with Imperfect Decision Makers, T. V. Guy, M. Kárný, and D. H. Wolpert, Eds. New York City, NY, USA: Springer, 2012, pp. 57–74. Available: http://dx.doi.org/10.1007/978-3-642-24647-0 I. J. Sledge and J. C. Príncipe, “Balancing exploration and exploitation in reinforcement learning using a value of information criterion,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), New Orleans, LA, USA, March 5-9 2017, pp. 1–5. Available: http://dx.doi.org/10.1109/ICASSP.2017.7952670 S. P. Singh, T. Jaakkola, M. L. Littman, and C. Szepesvári, “Convergence results for single-step on-policy reinforcement-learning algorithms,” Machine Learning, vol. 38, no. 3, pp. 287–308, 2000. Available: http://dx.doi.org/10.1023/A:1007678930559 M. S. Emigh, E. G. Kriminger, A. J. Brockmeier, J. C. Príncipe, and P. M. Pardalos, “Reinforcement learning in video games using nearest neighbor interpolation and metric learning,” IEEE Transactions on Computational Intelligence and AI in Games, vol. 8, no. 1, pp. 56–66, 2014. Available: http://dx.doi.org/10.1109/TCIAIG.2014.2369345 J. N. Tsitsiklis, “Asynchronous stochastic approximation and Q-learning,” Machine Learning, vol. 16, no. 3, pp. 185–202, 1994. Available: http://dx.doi.org/10.1023/A:1022689125041 IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) 20 Results Supplement (a) (a) Agent-Ghost Distance, Low-Complexity Episode Avg. Distance 0 to 1000 1001 to 2000 2001 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 7.72 ± 2.39 cells 7.91 ± 2.54 cells 8.23 ± 2.77 cells 9.75 ± 2.91 cells 10.13 ± 3.09 cells 10.28 ± 3.18 cells (b) Agent-Ghost Distance, Moderate-Complexity Episode Avg. Distance 0 to 1000 1001 to 2000 2001 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 6.55 ± 2.23 cells 7.96 ± 2.56 cells 8.49 ± 3.08 cells 9.15 ± 3.57 cells 10.43 ± 3.85 cells 11.18 ± 4.20 cells Agent-Ghost Distance, (c) High-Complexity Episode Avg. Distance 0 to 1000 1001 to 2000 2001 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 5.96 ± 2.62 cells 6.28 ± 2.84 cells 8.83 ± 2.92 cells 10.50 ± 3.23 cells 11.32 ± 4.38 cells 12.04 ± 4.81 cells Table A.1: Episode-averaged agent-ghost distance. Fruit-Chasing Distance, (a) Low-Complexity Episode Avg. Distance 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 0.00 ± 0.00 0.00 ± 0.00 0.54 ± 0.27 0.87 ± 0.45 (b) cells cells cells cells Fruit-Chasing Distance, Moderate-Complexity Episode Avg. Distance 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 0.68 ± 0.17 2.75 ± 1.92 5.46 ± 2.23 8.09 ± 2.84 (c) cells cells cells cells Fruit-Chasing Distance, High-Complexity Episode Avg. Distance 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 0.43 ± 0.09 cells 1.54 ± 0.97 cells 6.08 ± 2.01 cells 10.61 ± 3.78 cells Table A.2: Episode-averaged distance that the agent will travel to seek out fruits. Vulnerable Ghost-Chasing Distance, Low-Complexity Episode Avg. Distance 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 0.00 ± 0.00 0.00 ± 0.00 0.15 ± 0.04 0.24 ± 0.09 cells cells cells cells Vulnerable Ghost-Chasing (b) Distance, ModerateComplexity Episode Avg. Distance 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 0.35 ± 0.08 2.26 ± 1.55 6.81 ± 2.13 9.44 ± 2.86 (c) cells cells cells cells Vulnerable Ghost-Chasing Distance, High-Complexity Episode Avg. Distance 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 0.27 ± 0.11 cells 1.92 ± 0.74 cells 6.19 ± 2.15 cells 11.27 ± 3.87 cells Table A.3: Episode-averaged distance that the agent will travel to seek out the first vulnerable ghost after consuming a power pellet. (a) Max Number of Pellet Islands, Low-Complexity Episode Max Avg. Islands 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 6.54 ± 2.65 5.63 ± 2.17 5.14 ± 2.06 4.42 ± 1.92 Max Number of Pel(b) let Islands, ModerateComplexity Episode Max Avg. Islands 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 7.24 ± 3.10 6.13 ± 2.85 5.91 ± 2.41 4.05 ± 1.73 (c) Max Number of Pellet Islands, High-Complexity Episode Max Avg. Islands 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 7.81 ± 3.58 7.29 ± 2.96 5.34 ± 2.25 3.79 ± 1.16 Table A.4: Episode-averaged maximum number of pellet islands that the agent will leave in an episode after losing a life. A pellet island is defined as an isolated group of pellets. Each level initially starts with a single island of pellets. (a) Max Ghost-Avoidance Time, Low-Complexity Episode Max Avg. Time 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 7.88 ± 2.92 6.41 ± 2.70 6.12 ± 2.49 5.93 ± 2.27 steps steps steps steps Max Ghost-Avoidance (b) Time, ModerateComplexity Episode Max Avg.Time 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 8.60 ± 2.76 7.27 ± 2.53 6.51 ± 2.08 5.18 ± 1.81 (c) steps steps steps steps Max Ghost-Avoidance Time, High-Complexity Episode Max Avg. Time 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 8.91 ± 2.97 8.25 ± 2.74 7.32 ± 2.22 5.44 ± 1.69 steps cells steps steps Table A.5: Episode-averaged maximum number of actions needed for the agent to move to a tunnel that is not occupied by a ghost. (a) Ghosts Eaten Per Power Pellet, Low-Complexity Episode Avg. Num. Ghosts 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 0.00 ± 0.00 0.00 ± 0.00 0.00 ± 0.00 0.09 ± 0.02 (b) Ghosts Eaten Per Power Pellet, Moderate-Complexity Episode Avg. Num. Ghosts 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 0.49 ± 0.10 0.87 ± 0.16 1.27 ± 0.24 1.42 ± 0.39 (c) Ghosts Eaten Per Power Pellet, High-Complexity Episode Avg. Num. Ghosts 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 0.38 ± 0.11 1.09 ± 0.20 1.36 ± 0.35 1.64 ± 0.48 Table A.6: Episode-averaged number of ghosts eaten per power pellet. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED) (a) Number of Cleared Levels, Low-Complexity Episode Avg. Num. Levels 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 2.17 ± 0.51 3.46 ± 0.91 4.85 ± 1.24 5.64 ± 1.18 (b) Number of Cleared Levels, Moderate-Complexity Episode Avg. Num. Levels 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 1.74 ± 0.62 4.58 ± 1.11 5.36 ± 1.44 6.41 ± 1.75 (c) Number of Cleared Levels, High-Complexity Episode Avg. Num. Levels 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 1.32 ± 0.33 3.04 ± 1.20 4.72 ± 1.76 6.87 ± 1.94 Table A.7: Episode-averaged number of levels cleared before all lives run out. Epsilon-Greedy Ex(a) ploration Performance, 0 = 1.0 to 12000 = 0.5 Episode Avg. Score 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 2134.10 ± 950.24 3391.53 ± 1234.09 4832.15 ± 1599.87 6061.58 ± 1821.46 Epsilon-Greedy Ex(b) ploration Performance, 0 = 1.0 to 12000 = 0.7 Episode Avg. Score 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 2078.06 ± 823.81 2400.48 ± 1162.98 3527.51 ± 1426.52 5417.72 ± 1313.65 Epsilon-Greedy Ex(c) ploration Performance, 0 = 1.0 to 12000 = 0.3 Episode Avg. Score 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 2274.92 ± 861.44 4689.47 ± 1595.15 6845.03 ± 2023.76 8327.89 ± 2818.82 Table A.8: Episode-averaged score for epsilon-greedy exploration Soft-Max Exploration (a) Performance, τ0−1 = 1.0 to −1 τ12000 = 0.5 Episode Avg. Score 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 2299.65 ± 835.89 4310.20 ± 1108.55 6548.37 ± 1583.00 8743.26 ± 1932.13 Soft-Max Exploration (b) Performance, τ0−1 = 1.0 to −1 τ12000 = 0.7 Episode Avg. Score 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 2346.87 ± 985.18 4340.65 ± 1344.04 5952.14 ± 1731.70 6238.92 ± 1986.54 Soft-Max Exploration (c) Performance, τ0−1 = 1.0 to −1 τ12000 = 0.3 Episode Avg. Score 0 to 3000 3001 to 6000 6001 to 9000 9001 to 12000 2573.43 ± 821.67 4985.13 ± 1023.71 7232.78 ± 1585.32 10292.59 ± 2237.99 Table A.9: Episode-averaged score for soft-max exploration 21
7cs.IT
Greedy Variance Estimation for the LASSO arXiv:1803.10878v1 [math.ST] 28 Mar 2018 Christopher Kennedy∗ and Rachel Ward† Department of Mathematics, University of Texas at Austin March 30, 2018 Abstract Recent results have proven the minimax optimality of LASSO and related algorithms for noisy linear regression. However, these results tend to rely on variance estimators that are inefficient or optimizations that are slower than LASSO itself. We propose an efficient estimator for the noise variance in high dimensional linear regression that is significantly faster than LASSO, only requiring p matrix-vector multiplications. We prove this estimator is consistent with a good rate of convergence, under the condition that the design matrix satisfies the Restricted Isometry Property (RIP). In practice, our estimator vastly outperforms state of the art methods in terms of speed while incurring only a modest bias. 1 Introduction The LASSO [22] is a classical algorithm for doing noisy linear regression in the case when the number of regression coefficients is larger than the number of response variables p > n. The analysis of LASSO has recently surged with much work on establishing oracle inequalities for ℓ2 estimation over sparse vectors, and corresponding minimax rates. Typically, such results rely on knowledge of the variance of the noise, which is unknown in practice. The full extent of the literature on LASSO is immense and beyond the scope of this paper, but we point to a few important references on the oracle inequalities and corresponding minimax error rates (see [3], [15], [30], [23], [17], [31], [27], [13], [29], [26], [4]). A good review of variance estimators for LASSO is given in [19], where variance estimation using cross-validated LASSO is highlighted as particularly strong in many sparsity regimes. This method typically uses 5 or 10-fold cross-validation to train the hyperparameters in LASSO and analysis relies on the restricted eigenvalue condition on the design matrix. The above work was later complemented by a theoretical analysis of a slightly modified variant of cross-validated LASSO in [6] (see also [8] [9], e.g.). The main drawback of existing methods such as cross-validation for variance estimation is that they take multiple LASSO estimators to compute. This is costly when the dimensionality of the data is large. The method of moments (see [7]) is a fast alternative to cross-validated LASSO. It relies on the assumption that the design matrix is Gaussian and exploits statistical properties to formulate an estimator. It is consistent with a good rate of convergence [7], but the design matrix has to be Gaussian which is restrictive. We should also mention a variant of the LASSO - the square-root LASSO (see [2]) - whose penalty level doesn’t depend on the variance of the noise. However, the resulting estimator is formulated as a conic programming problem which can be inefficient in practice and is beyond the scope of this work. 1.1 Our Contribution The main contributions of our a paper are the following: • We provide an efficient variance estimator. In fact, our variance estimator only requires p matrixvector multiplications. This is a significant improvement over more standard estimators that iterate the LASSO multiple times with various penalty levels. Our method is faster than a single iteration of LASSO. ∗ Email: † Email: [email protected]. [email protected]. 1 • Our estimator is consistent in the sense that it converges in probability to the true variance. We have a quantitative bound on the rate of convergence. • We only require a deterministic assumption on the design matrix (the Restricted Isometry Property) which holds with high probability over many standard matrix ensembles over appropriate parameter regimes. In particular, the condition holds for any orthonormal design matrix. Remark 1. Precisely, the term consistent means that for some ρ, c ≥ 0, sup kb σ 2 − σ 2 k = 0. lim n/p→ρ 0≤σ 2 ≤c n,p→∞ Moreover, our estimator admits a surprisingly simple theoretical argument for convergence using standard compressed sensing-type results and concentration of measure. We note that we assume the design matrix satisfies the restricted isometry property, which is stronger than the restricted eigenvalue condition typically considered in the literature (see [24] e.g.) but still admits a wide range of random matrix ensembles. In practice, although our estimator exhibits a higher bias than more standard estimators like crossvalidated LASSO, it does well in the high-dimensional regime where the cross-validated LASSO and even the method of moments estimator become prohibitive to compute. 1.2 Notation For a matrix X ∈ Rn×p , and a subset Ω ⊂ {1, .., p}, XΩ ∈ Rn×|Ω| will denote the restriction of X to its columns indexed by Ω. For a vector v ∈ Rp , Ωv is defined to be the support of v. For each j = 1, ..., p/L, we use Ωj := {(j − 1)L + 1, ..., jL} to denote the jth “window” of the signal. 2 Problem Statement Suppose β ∈ Rp is s-sparse, and that we are given a noisy, transformed version of this signal: y = Xβ + η, where η ∈ Rn has i.i.d. Gaussian entries ηj ∼ N (0, σ 2 ) and X ∈ Rn×p is a known design matrix. For the purpose of analysis, we define a notion of a well-behaved design matrix X. We will assume that the matrix X satisfies the Restricted Isometry Property (RIP), which was introduced in [5] and is a common property used in Compressed Sensing. It guarantees that a matrix is a near-isometry on sparse vectors. Specifically, we say X satisfies the RIP of order s and level δ > 0 if for all z such that kzk0 ≤ s, (1 − δ)kzk22 ≤ kXzk22 ≤ (1 + δ)kzk22 . With high probability, RIP is obtained with s = s(m, N ) := O(n/ log(p/n)) (1) on an n × p matrix X whose entries Xi,j are independent realizations of a subgaussian random variable, such as a Gaussian or Bernoulli random variable [1]. The Restricted Isometry Property is obtained with high probability on many classes of structured random matrices, such as random partial Fourier matrices [18, 20], but with a slightly smaller (by factors of log(p)) constant s. It is in general nontrivial to recover the true signal β. We consider here the standard LASSO algorithm [22] to return a denoised version of β: βb = arg min kXβ − yk22 + 2λkβk1 . β (2) The magnitude of the parameter λ in the objective (2) controls the balance between the ℓ1 term which b and a mean squared error term kXβ − yk22 which promotes promotes sparsity in the recovered signal β, consistency with the observed measurements. It is important to balance the two terms appropriately so that one doesn’t overfit to the transformed signal y but also doesn’t over-enforce sparsity. The standard analysis of the LASSO is conditioned on the event {λ : λ/4 ≥ kX T ηk∞ /n} (see [3]). In particular, for the case that η is Gaussian with variance σ 2 and X is orthogonal, with high probability we have 2 kX T k∞ /n = Θ(σ 2 log(n)/n). Thus, with the choice λ = 4σ 2 log(n)/n, the LASSO will provably produce a good estimate β. However, in applications, the variance σ, and hence a proper choice of λ, is not known a priori. We consider the case where σ is not known in advance, and needs to be estimated from the signal y. It should be clear from the above observations that precision in estimating the parameter σ improves recovery of the true signal. 3 Greedy Variance Estimation – The Orthonormal Case For the moment we focus on the case where X ∈ Rp×p is an orthonormal matrix (p = n) and the problem reduces to recovering the noisy signal y = β +η (by rotational invariance of the Gaussian). In this regime, the LASSO has the closed form solution βbi = sign(yi )(|yi | − λ)+ , where βbi = βbi (λ) implicitly depends on λ. A standard approach is to minimize the cross-validation error: b min ky − β(λ)k 2, λ which has nice practical and theoretical properties (see [11] e.g.). Moreover, given the optimal λ one can infer a good estimate of the variance as kβb − yk2 /p. However, this approach still requires one to compute the LASSO minimizer over a range of λ values, whereas one would like to perform a single computation to estimate the variance (and thus optimal λ). We formulate a method to estimate the variance which only needs a single pass over the input y. Algorithm 1 Greedy Variance Estimator – Orthonormal Design Matrix 1 P 2 j ∈ {1, 2, . . . , p/L}. 1: Compute the window estimators Sj = L i∈Ωj |yi | , P p/(2L) 1 2L c 2 2: Let σ = (1 + log(p) ) p S(j) , where {S(j) }j is a non-decreasing arrangement of {Sj }j . j=1 The basic idea behind the above algorithm is that we want to capture a noise estimator that avoids the entries of y affected by signal (hence in the second step we take the average of the smaller 50% of the 1 window estimates). We multiply the resulting estimator by 1 + log(p) to correct the downward bias that results from averaging only over the smallest windows. Remark 2. (Total variation denoising) Suppose we receive image-type data and instead of taking the LASSO minimizer we want to instead want to regularize by the total variation seminorm: βb = arg min kβ − yk22 + 2λTV(β), β (3) P where TV(β) := n kβn − βn−1 k. The typical assumption in this model is that the discrete derivative of true signal is sparse, which is promoted by the above objective. In this case, we can apply our estimator to the discrete derivative (which as observed is essentially a sparse signal plus noise) to get a reasonable estimate of the variance of the noise in this setting. This approach originally appeared in [21] and statistical guarantees on the resulting estimator βb have been developed in [14], [16], [28], culminating most recently in [10]. These papers give a framework that allows one to generalize the estimator (3) to when the signal is 2-D image data. We note that our estimators can also be easily adapted to 2-D image data by replacing window estimates with box estimates. c2 . We have the following result which guarantees accuracy of the estimator σ Theorem 3. Suppose y = Xβ + η where X ∈ Rp×p is orthonormal, ηj ∼ N (0, σ 2 ) are independent, and p β is s-sparse. Consider window size L ≥ log3 (p), and suppose that s ≤ 2L . Then the Greedy Variance Estimator produced by Algorithm 3 satisfies with probability 1 − p2 . c2 − σ 2 | ≤ |σ 3 6 σ2, log p 4 Greedy Variance Estimation – RIP Design Matrix We now turn to the more general case where the design matrix X ∈ Rn×p is possibly underdetermined n ≤ p, but satisfies the Restricted Isometry Property with the appropriate constants (indeed this is a more general case, as an orthonormal matrix satisfies the RIP with constant δ = 0). We define the regularized design matrix as Z := [ZΩ1 , ..., ZΩp/L ] where each ZΩi ∈ Rn×L , ZΩi := Ui In×L Vi such that (4) XΩi = Ui Σi Vi is the SVD of XΩi . Then, we run a conditioning step based on the (block orthonormal) matrix Z and then run the algorithm similar to the orthonormal case: In practice, we use the matrix X instead of Z, however using Z allows Algorithm 2 Greedy Variance Estimator 1: Compute ỹ = Z T y. 1 P 2 j ∈ {1, 2, . . . , n/L}. 2: Compute the window estimators Sj = L i∈Ωj |ỹi | , P p/(2L) c2 = (1 + 1 ) 2L 3: Let σ S(j) , where {S(j) }j is a non-increasing arrangement of the window j=1 log(p) p estimators {Sj }j . us to do a more streamlined theoretical analysis. To see why this should work intuitively, assume that we precondition just on X that satisfies RIP for a large enough sparsity level s0 . Note that X T y = X T Xβ + X T η, so the obstruction to estimating the noise is the X T X term. Then, kXβk2 = kXΩβ βk2 ≈ kβk2 , and if we assume our window set Ωj is disjoint from Ωβ , RIP implies the restricted matrices XΩTj , XΩβ satisfy kXΩTj XΩβ k ≤ δ for δ > 0 small. Thus, for a “good” window estimator, we only see the noise X T η. Theorem 4. Suppose y = Xβ + η where X ∈ Rn×p has the RIP of order s and level δ, ηj ∼ N (0, σ 2 ) n are i.i.d., and β is s-sparse. Assume that L ≥ log3 (p), n ≥ L, s ≤ 2L , and that X satisfies (RIP) with order s = 2 max{L, s} and level δ > 0. Then, the variance estimator from the above algorithm satisfies     √ p 6σ 2 1 kβk2 1 + + max 4σ 2 log(p), 8 δσkβk2 log(p) 2δ σ b2 − σ 2 ≤ 1 + log(p) L log(p) L with probability 1 − p4 . Remark 5. The constants in Theorem 4 are chosen for neatness of presentation and are in no way optimized. Remark 6. Although the right hand side of Theorem 4 contains factors involving kβk2 (as opposed to kβk1 which one finds in typical LASSO results), we do not expect this to be a problem in practice. In particular, one can assume cσ ≤ |βj | ≤ Cσ for all j and some absolute constants C, c > 0. If the |βj | are below this threshold, they are essentially noise and difficult to detect in general (this is called the beta-min assumption). On the other hand, one can naturally expect the√entries of β to have a uniform upper bound even as the problem size goes to infinity. Since kβk2 ≤ s Cσ, we just need that δ < 1s which will hold for our sparsity regime and standard matrix models (i.i.d. normalized Gaussian entries, for example) with high probability. 5 Experiments Our experimental methodology is based off of the results in [19]. In particular, we generate a design matrix X ∈ Rn×p with i.i.d. entries Xij ∼ N (0, n−1/2 ) so that X satisfies RIP with sufficiently small constants with high probability. The sparsity level s = ⌈nα ⌉, with α < 1, and the non-zero entries of β (chosen uniformly at random) are distributed according to a Laplace(1) distribution. The resulting β is scaled to have the specified norm. The experiments are over the following grid of parameter values, where n = 100 in all experiments. • p = 100, 200, 500, 1000, • kβk2 = 0.1, 1, 2, 5, 10, • α = 0.1, 0.3, 0.5, 0.7, 0.9. We use the following estimators in our analysis: 4 √ • oracle: the oracle estimator β̂ = kηk2 / n. • window: the standard window estimator with the transformation ỹ = X T y. • window-svd: the theoretical window estimator with the transformation ỹ = Z T y where Z is given by (4). • cv-lasso: 10-fold cross-validated LASSO. • moment: method of moments estimator (see [7]). We include the cross-validated LASSO because it was shown to be the most robust to changes in sparsity/dimension by [19] and the method of moments estimator because it is a fast alternative. The window size is chosen based on an inflection point in the values of the estimator for a specific set of parameters as the window size varies. As we can see in Figure 1, the window and window-svd estimators have reasonable performance compared to the cv-LASSO with slightly larger biases. In particular, we do quite well for α = 0.1, β = 1, performing similarly to cv-Lasso, and with a much smaller variance than the method of moments. Remark 7. We only include results for α = 0.1 because the algorithm performs similarly for α ≤ 0.5. Moreover our theory only covers up to roughly α = 0.5 for reasonable choices of window size. The performance for dense signal α = 0.9 is covered in its own section below. It is important to note that our estimators are significantly faster to compute than cv-LASSO. The method of moments estimator is generally accurate but has unreasonably high variance for large p. We now report computation times for each estimator averaged over 100 trials with n = 100, α = 0.9, β = 1, p = 100, 1000, 10000, 100000. These experiments were run on an Intel i5 3.80 GHz, 4 core CPU with 16 GB of ram. As expected, the window and window-svd estimators scale incredibly well, whereas the p window window-svd moment cv-lasso 100 0.0049 0.1559 0.0387 556.5134 1000 0.0048 1.3158 3.2771 186.1420 10000 0.0433 11.8787 1.1632e+03 N/A 100000 0.4227 135.1963 N/A N/A Table 1: Computation times for each estimator averaged over 100 trials. method of moments estimator is fast for small scale problems but does not scale beyond p = 10000 and the cv-lasso does not scale beyond p = 1000. 5.1 Optimal Window Size It is notable to see how well our method can perform when the window size is optimized. Here, we give some representative plots (Figure 2) to show what happens to performance when replacing the window size with the optimal window size using prior knowledge of the variance. In all experiments, n=100 and p=1000. For the low SNR regimes, we see a similar downward bias to the oblivious choice of window size, although with a smaller bias. Similarly, for high SNR, the upward bias is also smaller than when choosing an oblivious window size. In table 2 we report the optimal window size for various values of α and kβk2 . The optimal window size was found by a grid search over all possible window sizes using knowledge of the true variance. 5.2 High Dimension In this section we highlight the regime in which our estimator is most useful - when p ≫ n is large. In particular, we chose n = 100, p = 100000 in all experiments. In this setting all other estimators cannot be computed efficiently. In this regime, it is inefficient to even compute an optimal box size based on an inflection point in the value of the estimator, so instead the choice L = 25 was fixed for all experiments. The results are shown in Figure 3. Although the bias remains, the estimator performs well, especially in low SNR regimes. This is likely due to the strength of the compressed sensing properties for the design matrix as the dimension grows. 5 1.6 1.6 1.4 1.4 1.2 1.2 1 1 0.8 0.8 0.6 0.6 0.4 0.4 oracle window window-svd moment cv-lasso oracle window window-svd moment cv-lasso oracle window window-svd moment cv-lasso 2.5 1.6 2 1.4 1.5 1.2 1 1 0.8 0.5 0.6 0 0.4 -0.5 oracle window window-svd moment cv-lasso Figure 1: Window size chosen based on inflection point, p = 1000. Signal-less (kβk = 0), low SNR (α = 0.1, kβk = 1), medium SNR (α = 0.1, kβk = 5), high SNR (α = 0.1, kβk = 10) respectively, left to right, top to bottom. 6 1.5 1.4 2 1.3 1.2 1.5 1.1 1 1 0.9 0.8 0.5 0.7 0.6 0 0.5 oracle window window-svd moment cv-lasso 1.6 1.6 1.4 1.4 1.2 1.2 1 1 0.8 0.8 0.6 0.6 0.4 0.4 oracle window window-svd moment cv-lasso oracle window window-svd moment cv-lasso oracle window window-svd moment cv-lasso Figure 2: Optimal window size, p = 1000. Left to right, top to bottom: Signal-less (kβk = 0), low SNR (α = 0.1, kβk = 1), medium SNR (α = 0.1, kβk = 5), high SNR (α = 0.1, kβk = 10) respectively. 7 1.6 1.6 1.4 1.4 1.2 1.2 1 1 0.8 0.8 0.6 0.6 0.4 0.4 oracle window window-svd oracle window window-svd oracle window window-svd 2 1.6 1.8 1.6 1.4 1.4 1.2 1.2 1 1 0.8 0.8 0.6 0.6 0.4 0.2 0.4 0 oracle window window-svd Figure 3: High-dimensional regime, p = 100000 L = 25. Left to right, top to bottom: Signal-less (kβk = 0), low SNR (α = 0.1, kβk = 1), medium SNR (α = 0.1, kβk = 5), high SNR (α = 0.1, kβk = 10) respectively. 8 α 0.1 0.3 0.5 0.7 0.9 0.1 100 100 100 100 100 1 100 100 100 100 100 kβk2 2 100 100 100 100 100 5 20 22 18 18 14 10 4 4 4 4 3 Table 2: Optimal window sizes as a function of α and kβk2 for p = 200. We note that the optimal window size is generally decreasing as a function of both the signal to noise ratio and the sparsity. Moreover, choosing the maximal window size is optimal in modest regimes. 5.3 Orthogonal Design Matrix We find our estimator performs quite well in the case where the design matrix is orthogonal, as shown in Figure 4. In all experiments, p = n = 200 and the window size is chosen via inflection point in the value of the estimator. The method of moments still performs reasonably well, but suffers a strong upwards bias for large SNR. We note that in all regimes, our estimator performs better than cross-validated LASSO. Moreover, it is more robust to changes in SNR than when the design matrix is RIP (but not necessarily orthogonal). 5.4 Dense Signal Our theory does not cover high sparsity levels (α ≥ 0.9), but nonetheless our estimator performs well. Although more prone to high levels of SNR, we are still competitive with cv-LASSO in low SNR regimes as seen in Figure 5. 6 Future Work Our estimator has been shown to be a useful tool to use in high dimensional variance estimation, and comes with nice theoretical properties that leverage results from the compressed sensing literature. Moreover, it is extremely fast and is competitive with cv-LASSO in most parameter regimes. Based on our experimental/theoretical results there are some obvious directions to go in the future: • Develop an efficient estimator that has theoretical guarantees for a more general design matrix, in particular that satisfies the restricted eigenvalue condition. • Find a choice of box size that is more robust to sparsity and SNR, which is still efficient to compute. • Find an efficient estimator that has similar robustness to cross-validated LASSO but also scales past p > 10000. Although this estimator is by no means a replacement for existing estimators in typical regimes, it scales extremely well into high dimensions and performs as well if not better when p ≫ n. This regime seems the most interesting for developing more robust estimators. Acknowledgments We thank Abhinav Nellore for discussions on parameter selection in high dimensional problems which motivated this work. R. Ward and C. Kennedy were partially supported during this work by NSF CAREER grant #1255631. References [1] Richard Baraniuk, Mark Davenport, Ronald DeVore, and Michael Wakin. A simple proof of the restricted isometry property for random matrices. Constructive Approximation, 28(3):253–263, 2008. [2] Alexandre Belloni, Victor Chernozhukov, and Lie Wang. Square-root lasso: pivotal recovery of sparse signals via conic programming. Biometrika, 98(4):791–806, 2011. 9 1.5 1.5 1 1 0.5 0.5 0 0 oracle window window-svd moment cv-lasso 1.5 1.5 1 1 0.5 0.5 0 oracle window window-svd moment cv-lasso oracle window window-svd moment cv-lasso 0 oracle window window-svd moment cv-lasso Figure 4: Orthogonal design matrix, p = 200. Left to right, top to bottom: Signal-less (kβk = 0), low SNR (α = 0.1, kβk = 1), medium SNR (α = 0.1, kβk = 5), high SNR (α = 0.1, kβk = 10) respectively. respectively. 10 1.6 1.4 1.2 1 0.8 0.6 0.4 oracle window window-svd moment cv-lasso 2.5 1.6 2 1.4 1.5 1.2 1 1 0.8 0.5 0.6 0 0.4 -0.5 oracle window window-svd moment cv-lasso oracle window window-svd moment cv-lasso Figure 5: Dense signal, p = 200. Left to right, top to bottom: Low SNR (α = 0.9, kβk = 1), medium SNR (α = 0.9, kβk = 5), high SNR (α = 0.9, kβk = 10), respectively. 11 [3] Peter J Bickel, Ya’acov Ritov, and Alexandre B Tsybakov. Simultaneous analysis of lasso and dantzig selector. The Annals of Statistics, pages 1705–1732, 2009. [4] Emmanuel J Candes and Mark A Davenport. How well can we estimate a sparse vector? Applied and Computational Harmonic Analysis, 34(2):317–323, 2013. [5] Emmanuel J Candes and Terence Tao. Decoding by linear programming. IEEE transactions on information theory, 51(12):4203–4215, 2005. [6] Sourav Chatterjee and Jafar Jafarov. Prediction error of cross-validated lasso. arXiv preprint arXiv:1502.06291, 2015. [7] Lee H Dicker. Variance estimation in high-dimensional linear models. Biometrika, 101(2):269–284, 2014. [8] Jianqing Fan, Shaojun Guo, and Ning Hao. Variance estimation using refitted cross-validation in ultrahigh dimensional regression. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 74(1):37–65, 2012. [9] Darren Homrighausen and Daniel McDonald. The lasso, persistence, and cross-validation. In International Conference on Machine Learning, pages 1031–1039, 2013. [10] Jan-Christian Hütter and Philippe Rigollet. Optimal rates for total variation denoising. In Conference on Learning Theory, pages 1115–1146, 2016. [11] Ron Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection. In Ijcai, volume 14, pages 1137–1145, 1995. [12] Beatrice Laurent and Pascal Massart. Adaptive estimation of a quadratic functional by model selection. Annals of Statistics, pages 1302–1338, 2000. [13] Karim Lounici, Massimiliano Pontil, Sara Van De Geer, Alexandre B Tsybakov, et al. Oracle inequalities and optimal inference under group sparsity. The Annals of Statistics, 39(4):2164–2204, 2011. [14] Enno Mammen, Sara van de Geer, et al. Locally adaptive regression splines. The Annals of Statistics, 25(1):387–413, 1997. [15] Nicolai Meinshausen and Bin Yu. Lasso-type recovery of sparse representations for high-dimensional data. The Annals of Statistics, pages 246–270, 2009. [16] Deanna Needell and Rachel Ward. Near-optimal compressed sensing guarantees for total variation minimization. IEEE transactions on image processing, 22(10):3941–3949, 2013. [17] Garvesh Raskutti, Martin J Wainwright, and Bin Yu. Minimax rates of estimation for highdimensional linear regression over ℓq -balls. IEEE transactions on information theory, 57(10):6976– 6994, 2011. [18] Holger Rauhut. Compressive sensing and structured random matrices. Theoretical foundations and numerical methods for sparse recovery, 9:1–92, 2010. [19] Stephen Reid, Robert Tibshirani, and Jerome Friedman. A study of error variance estimation in lasso regression. Statistica Sinica, pages 35–67, 2016. [20] Mark Rudelson and Roman Vershynin. On sparse reconstruction from fourier and gaussian measurements. Communications on Pure and Applied Mathematics, 61(8):1025–1045, 2008. [21] Leonid I Rudin, Stanley Osher, and Emad Fatemi. Nonlinear total variation based noise removal algorithms. Physica D: nonlinear phenomena, 60(1-4):259–268, 1992. [22] Robert Tibshirani. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. Series B (Methodological), pages 267–288, 1996. [23] Sara A Van de Geer. High-dimensional generalized linear models and the lasso. The Annals of Statistics, pages 614–645, 2008. [24] Sara A Van De Geer, Peter Bühlmann, et al. On the conditions used to prove oracle results for the lasso. Electronic Journal of Statistics, 3:1360–1392, 2009. [25] Roman Vershynin. Introduction to the non-asymptotic analysis of random matrices. arXiv preprint arXiv:1011.3027, 2010. [26] Nicolas Verzelen et al. Minimax risks for sparse regressions: Ultra-high dimensional phenomenons. Electronic Journal of Statistics, 6:38–90, 2012. 12 [27] Martin J Wainwright. Information-theoretic limits on sparsity recovery in the high-dimensional and noisy setting. IEEE Transactions on Information Theory, 55(12):5728–5741, 2009. [28] Yu-Xiang Wang, James Sharpnack, Alex Smola, and Ryan Tibshirani. Trend filtering on graphs. In Artificial Intelligence and Statistics, pages 1042–1050, 2015. [29] Fei Ye and Cun-Hui Zhang. Rate minimaxity of the lasso and dantzig selector for the lq loss in lr balls. Journal of Machine Learning Research, 11(Dec):3519–3540, 2010. [30] Cun-Hui Zhang and Jian Huang. The sparsity and bias of the lasso selection in high-dimensional linear regression. The Annals of Statistics, pages 1567–1594, 2008. [31] Tong Zhang et al. Some sharp performance bounds for least squares regression with l1 regularization. The Annals of Statistics, 37(5A):2109–2144, 2009. A Proof Ingredients Proposition 8. (Lemma 1 in [12]) Suppose Z has a chi-squared distribution with d degrees of freedom. Then, √ √ P[d − 2 dt ≤ Z ≤ d + 2 dt + 2t] ≥ 1 − 2e−t ∀t ≥ 0. (5) Proposition 9. (Proposition 2.5 in [18]) Suppose Ωu ∩ Ωv = ∅, and that X ∈ Rn×p satisfies RIP of order s0 and level δ > 0 with s0 = |Ωu | + |Ωv |. Then, √ (6) kXΩTu XΩv k2→2 ≤ δ Proposition 10. (Equation (5.5) in [25]) Let X be a Gaussian random variable with mean 0, variance σ. Then, 2 2 P[|X| > t] ≤ 2e−t /2σ , t ≥ 1. B B.1 Proofs Proof of Theorem 3 Consider the window estimators Sj = 1 X |yi |2 L i∈Ω j 1 X |βi + ηi |2 = L i∈Ω j 1 X 1 X 1 X = |βi |2 + |ηi |2 + 2 βi ηi . L i∈Ω L i∈Ω L i∈Ω j j j P Set Ej := L1 i∈Ωj |ηi |2 . Ej is a sum of L independent squares of N (0, σ 2 ) random variables. Then Ej concentrates strongly around its expected value, E(Ej ) = σ 2 . Note that Ej has a chi-squared distribution with L degrees of freedom, so by (5) with the choice t = log(p)2 and after a union bound over all p/L windows, we get that with probability at least 1 − p2 ,  1− 5 log(p)  σ 2 ≤ Ej ≤  1+ 5 log(p)  σ2, holds uniformly for all j ∈ {1, 2, . . . , p/L}, assuming that L ≥ log 3 (p). p by assumption, the pigeon hole principle implies that at least Since L ≤ 2s Ωβ . On any such “good” window k we have kβk:k+L−1 k22 = 0 and hence |Sk − σ 2 | ≤ 13 5σ 2 . log(p) p 2L windows do not overlap (7) 2 5σ Thus, if S is the average over a subset of the good windows, then also |S − σ 2 | ≤ log(p) . Now, to bound the estimator above on any window, we need some control on the cross term P i∈Ωj βi ηi . Note that this quantity is just a sum of i.i.d. Gaussians with mean zero and with vari- ance kβΩj ∩Ωβ k22 σ 2 ; thus, by concentration, we have that with probability at least 1 − 2/p, the following holds uniformly over all windows: p X 2σkβΩj ∩Ωβ k2 log(p) βi ηi ≤ . (8) L i∈Ω j Hence, for any any window, 2 X 1 kβΩj ∩Ωβ k22 + Ej − βi ηi L L i∈Ω ∩Ω j β √   kβΩj ∩Ωβ k2 2σ log p 1 5 √ √ ≥ kβΩj ∩Ωβ k22 + 1 − σ2 − L log(p) L L   5 σ 2 log(p) 2 ≥ 1− The minimal value of a quadratic x2 + b − ax is b − a2 /4 σ − log(p) L   6 σ2, ≥ 1− log(p) Sj ≥ where the final inequality holds because log2 (p)) ≤ L. c2 = 2L Pp/(2L) S . By construction, σ c2 ≤ S, where S is Now, consider the surrogate estimator σ (j) S S j=1 p the average over any p/(2L) “good” windows. From the above analysis, we have that with probability exceeding 1 − p4 , c2 = (1 + Thus, for our final estimator, σ S c2 − σ 2 | ≤ |σ S 1 c2 , )σ log(p) c2 − σ 2 | ≤ |σ B.2  6 σ2. log(p) we have 6 7 + log(p) (log(p))2  σ2 Proof of Theorem 4 Recall that ỹ := Z T y ∈ Rp . Consider the window estimate 1 X Sj = |ỹi |2 L i∈Ω j 1 X T 2 2 X T 1 X |(Z T Xβ)i |2 + |Zi η| + (Z Xβ)i (Z T η)i = L i∈Ω L i∈Ω L i∈Ω j j j 1 T 2 X T 1 T XΩβ βk22 + kZΩ ηk22 + (Z Xβ)i (Z T η)i = kZΩ j j L L L i∈Ω (9) j The first term is small if Ωj and Ωβ have disjoint support, since X has the RIP, the center term gets close to its expectation σ 2 due to standard concentration inequalities, and the third term is also small due to standard concentration inequalities. More concretely, if we assume that Sj is a “good” window, meaning that Ωj and Ωβ have disjoint support, by equation (6) 1 δkβk22 kXΩTj XΩβ βk22 ≤ . L L √ √ All of the diagonal entries of Σj are in the range [ 1 − δ, 1 + δ], hence by (10) 1 T 1+δ kZΩj XΩβ βk22 ≤ kXΩTj XΩβ βk22 L L δ(1 + δ)kβk22 ≤ L 2δkβk22 ≤ L 14 (10) (11) For the center term, note that kZΩj ηk22 = kPL ηk22 where PL is projection onto the first L coordinates. Next, we know that kPL ηk22 has a chi-squared distribution with L degrees of freedom, so by (5) with t = log(p2 ), h p i 2 P |kPL ηk22 − Lσ 2 | ≤ 2σ 2 L log(p) + log(p) ≥ 1 − 2 . p Hence by a union bound, with probability at least 1 − p2 , the following holds uniformly over all windows: T |kZΩ ηk22 /L − σ 2 | = |kPL ηk22 /L − σ 2 | j r log(p) log(p) 2 ≤ 2σ + 2σ 2 L L 5σ 2 ≤ (12) log(p) P For the final term in 9, note that L2 i∈Ωj (Z T Xβ)i (Z T η)i is a Gaussian random variable with variance 2σkZΩj Xβ βk2 /L. Thus, by Proposition 10 and (11), the following holds uniformly over all windows with probability at least 1 − p1 : p 4σkZΩj Xβ βk2 log(p) 2 X T (Z Xβ)i (Z T η)i ≤ L i∈Ω L j p √ 8 δσkβk2 log(p) ≤ , L (13) (14) Thus, averaging over any set of p/2L “good” windows, using (11) (12) and (14) we have √ √ 5σ 2 8 δσkβk2 log p 2L X 2δkβk22 2 + + Sj − σ ≤ p j L log p L c2 = with probability at least 1 − p4 . Thus, by construction, the estimator σ S √ √ 5σ 2 8 δσkβk2 log p 2δkβk22 2 c 2 + + σS ≤ σ + L log p L 2L p P (15) j S(j) also satisfies c2 cannot be too small. The inequalities (13) and (12) It remains to show that the window estimator σ S hold uniformly over all windows, not just good windows; hence, for any window Sj , 1 1 T 2 T T kZΩ XΩβ βk22 + kZΩ ηk22 − kZΩ XΩβ βk2 kXΩTj ηk2 j j j L L L √ 8σkXΩTj XΩβ βk2 log p 1 5σ 2 ≥ kXΩTj XΩβ βk22 + σ 2 − − L log(p) L Sj ≥ ≥ σ2 − 4σ 2 log(p) 5σ 2 − log(p) L The minimal value of a quadratic x2 + b − ax is b − a2 /4 Combining the bounds, − √ √ 4σ 2 log(p) 2L X 2δkβk22 5σ 2 8 δσkβk2 log p 5σ 2 − ≤ S(j) − σ 2 ≤ + + log(p) L p j L log p L c2 = (1 + For our final estimator σ c2 − σ 2 | ≤ |σ  1+ 1 log(p) 1 c2 , )σ S log(p) we have    p √ kβk2 6σ 2 1 2δ + + max 4σ 2 log(p), 8 δσkβk2 log(p) L log(p) L 15
10math.ST
1 Memory-Based Data-Driven MRAC Architecture Ensuring Parameter Convergence arXiv:1602.00482v1 [cs.SY] 1 Feb 2016 Sayan Basu Roy, Shubhendu Bhasin, Indra Narayan Kar Abstract—Convergence of controller parameters in standard model reference adaptive control (MRAC) requires the system states to be persistently exciting (PE), a restrictive condition to be verified online. A recent data-driven approach, concurrent learning, uses information-rich past data concurrently with the standard parameter update laws to guarantee parameter convergence without the need of the PE condition. This method guarantees exponential convergence of both the tracking and the controller parameter estimation errors to zero, whereas, the classical MRAC merely ensures asymptotic convergence of tracking error to zero. However, the method requires knowledge of the state derivative, at least at the time instances when the state values are stored in memory. The method further assumes knowledge of the control allocation matrix. This paper addresses these limitations by using a memory-based finite-time system identifier in conjunction with a data-driven approach, leading to convergence of both the tracking and the controller parameter estimation errors without the PE condition and knowledge of the system matrices and the state derivative. A Lyapunov based stability proof is included to justify the validity of the proposed data-driven approach. Simulation results demonstrate the efficacy of the suggested method. Index Terms—MRAC, CL, Data-Driven, Parameter Convergence, PE. I. I NTRODUCTION HE design objective of Model Reference Adaptive Control (MRAC) is to make the system imitate the response of a chosen reference model. Classical and many recent MRAC techniques that use merely instantaneous data for adaptation (see [1]–[5] and references there in) require that the system states be persistently exciting (PE) to ensure the convergence of the parameter estimates to their true values [3]. In [6], Boyd and Sastry proved that the PE condition on the regressor translates to the reference input having as many spectral lines as the number of unknown parameters, however, the condition is rather restrictive. Enforcing the PE condition through exogenous excitation of the input is not always realizable and it is often impractical to monitor online whether a signal will remain PE as the condition depends on the future values of the signal. Since parameter convergence under the PE condition is difficult to apply, various algorithms like emodification, σ-modification etc. are proposed in literature to guarantee boundedness of the parameters [2], [7]. Similar to MRAC, other model-based control methods such as model-based reinforcement learning (MBRL) [8]–[12], and model-based predictive control (MPC) [13]–[16], require the T Sayan Basu Roy, Shubhendu Bhasin and Indra Narayan Kar are with the Department of Electrical Engineering, Indian Institute of Technology Delhi, New Delhi, India e-mail:([email protected], [email protected], [email protected]). controller to be developed based on the estimates of the unknown parameters. Therefore, the stability of the closedloop system and the performance of the control law in all these cases crucially rely on parameter convergence, which requires restrictive PE condition. Recent works [17]- [18] on learning and data-driven control methods have shown promise in improving tracking performance as they use input-output data along the system trajectory which carries sufficient information about the unknown system and the controller parameters. Girish et al. [18]–[21] proposed a novel approach, coined as concurrent learning (CL), where information-rich past data is stored and concurrently used along with gradient based parameter update laws. Although the parameter estimation error is not directly measurable, the intelligent introduction of the concurrent learning term computed from the past stored data is proportional to parameter estimation error. A sufficient condition associated with the rank of a matrix formed out of stored data is required for parameter convergence. Unlike the PE condition, the rank condition is more realistic and guarantees exponential convergence of tracking and parameter estimation errors to zero. Moreover, CL-based techniques are employed in the context of adaptive optimal control in [11], [22], [23] and experimental success have been found in [24], [25]. Although concurrent learning is a powerful online adaptive control method, it requires the state derivative information at the time points at which the state values are stored [19]. In many practical situations, the state derivative is not measurable. In [19], an optimal fixed point smoothing technique is used to estimate derivative at past values using a forward and backward Kalman filter [26]. However, the estimation method requires storing several forward and backward data points in time leading to a high memory requirement. Further, the state derivative estimation error degrades the exponential convergence result to a weaker one of uniformly ultimately bounded (UUB) stability. Moreover, both the classical MRAC and the concurrent learning laws require knowledge of the B matrix (in the standard state space realization). In [27]–[30] the uncertainty in the control allocation matrix (B in LTI framework) is dealt with in different ways, however, few results in literature tackle the general case of controlling dynamical systems when the knowledge of input matrix is absent. Some recent results [31], [32] have attempted to address the limitations in the concurrent learning framework. In [31], the authors designed a control law without requiring B, however, the knowledge of the A matrix and the state derivative is required. The requirement of the state derivative is avoided in [32] by the introduction of a dynamic state 2 derivative estimator, which leads to a UUB result, while requiring knowledge of the B matrix. The contribution of this paper is to achieve the MRAC goal with parameter convergence, using only state and input data. In this work, the system matrices A and B are considered to be unknown and the state derivative information is also not available. Two memory stacks to store effective past data points are utilized to solve the data-driven MRAC problem, relaxing the assumption of knowledge of the state derivative and the input B matrix. Using sufficient rank conditions on the matrices formed out of the stored data of memory stacks, finite-time identification of the system parameters and subsequent exponential convergence of tracking and controller parameter estimation errors is obtained. The identification method proposed in this work is inspired from [33], [34]. The finite time identification of system parameters eliminates the need of the computationally burdensome purging algorithm [31]. By introducing an additional gain parameter in the parameter update law, this work further avoids the singular value maximisation algorithm [35], used to continuously update the history stack for accelerated convergence. Moreover, it is proved that the aforementioned rank condition on the respective matrices merely demands the corresponding signals to be exciting for a finite time interval, which is less restrictive than the PE condition. Unlike PE, the rank condition is required for the matrices formed out of past stored signals and therefore can be verified online. Consider a continuous-time LTI system given by (1) where x(t) ∈ Rn denotes the state and u(t) ∈ Rd denotes the control input to the system and A ∈ Rn×n , B ∈ Rn×d are the system matrices. It is assumed that the pair (A, B) is controllable and that B has full column rank. 1 A reference model is chosen as follows to characterise the desired closed loop response of the system (1). ẋm (t) = Am xm (t) + Bm r(t) (2) where Am ∈ Rn×n is Hurwitz, xm (t) ∈ Rn is the model state and r(t) ∈ Rd denotes a bounded, piecewise continuous reference input signal. An adaptive control law, comprising a linear feedback term and a linear feedforward term, is defined as [2] u(t) = KxT (t)x(t) + KrT (t)r(t) (3) where Kx (t) ∈ Rn×d and Kr (t) ∈ Rd×d . Substituting (3) in (1) yields ẋ = (A + BKxT )x(t) + BKrT r(t) A + BKx∗T = Am BKr∗T = Bm (4) To facilitate the design objective of making system (4) respond as the chosen reference model of (2), the following matching condition is introduced [2], [3]. 1 Typically in physical systems d ≤ n and the above mentioned condition is satisfied. (5) (6) Using (5) and (6), the closed-loop system in (4) can be written as ẋ = Am x + Bm r + B K̃xT x + B K̃rT r (7) where K̃x , Kx − Kx∗ and K̃r , Kr − Kr∗ . The tracking error is defined as e(t) , x(t) − xm (t) (8) Using (2), (7) and (8), the error dynamics is obtained as ė = Am e + B K̃xT x + B K̃rT r (9) The standard adaptive update laws for Kx (t) and Kr (t) are given as [2] K̇x = −Γx xeT P B T K̇r = −Γr re P B (10) (11) where Γx > 0 and Γr > 0 denote positive definite learning rate matrices of appropriate dimension and P ∈ Rn×n is a positive definite matrix satisfying the Lyapunov equation ATm P + P Am + Q = 0 II. C LASSICAL MRAC ẋ(t) = Ax(t) + Bu(t) Assumption 1. There exists Kx∗ ∈ Rn×d and Kr∗ ∈ Rd×d such that (12) for any given positive definite Q ∈ Rn×n . The equations (3) and (10)-(11) are the classical MRAC laws, which guarantee the tracking error e(t) → 0 as t → ∞. However, convergence of the controller parameters Kx (t) and Kr (t) to their true values (Kx∗ and Kr∗ respectively) is only guaranteed if a restrictive PE condition is satisfied [2], [4], [36]. The persistence of excitation of a vector signal x(t) is defined below [3]. Definition 1. A bounded vector signal x(t) is exciting over an interval [t, t + T ] , T > 0 and t ≥ t0 if ∃ α > 0 such that the following condition holds: Z t+T x(τ )xT (τ )dτ ≥ αI t where I denotes an identity matrix. Definition 2. A bounded vector signal x(t) is persistently exciting (PE) if ∀t ≥ t0 , ∃ T > 0 and α > 0 such that: Z t+T x(τ )xT (τ )dτ ≥ αI t According to [6], for the system states of (1) to be PE, the reference signal r(t) must be sufficiently rich i.e. it must contain n distinct frequencies if there are 2n unknown parameters. The PE condition is restrictive and difficult to verify online as it relies on the future behaviour of the dynamical systems. 3 III. M EMORY-BASED DATA -D RIVEN MRAC This section proposes a memory-based data-driven architecture for model reference adaptive control and identification of unknown LTI systems with controller parameter convergence. This architecture builds on the concurrent learning technique [18], [19], [37], [38], [39] which utilizes past recorded data concurrently with the current data for adaptation. The concurrent learning method fruitfully utilises a memory stack for storing the state x(t) and the reference signal r(t) at different time points. A full rank condition on the matrices formed out of the memory stack guarantees exponential convergence of both the tracking and the controller parameter estimation errors. However, both classical MRAC and the concurrent learning frameworks assume knowledge of the input B matrix. Concurrent learning, additionally, requires the state derivative information at least at the time instances when the state information is stacked in memory. Although there have been efforts to overcome these pitfalls, the solutions given by [31], [32] are partial. Motivated by the aforementioned limitations, this work achieves the MRAC goal only from input and state data. The system matrices (A and B) as well as the state derivative information is considered to be unknown in this framework. The intelligent exploitation of multiple memory stacks results in finite-time identification of system parameters and subsequent exponential convergence of tracking and controller parameter estimation errors to zero. A. Finite Time Identification of System Parameters The plant dynamics in (1) can be linearly parametrized as ẋ = Y (x, u)θ (13) where Y (x, u) ∈ Rn×n(n+d) is the regressor matrix and θ ∈ Rn(n+d) is a column vector of all the elements of A and B defined as   vec(AT ) θ, vec(B T ) where vec(Z) ∈ Rab denotes the vectorization of a matrix Z ∈ Ra×b , obtained by stacking the columns of the matrix Z. The set of equations required for system parameter identification are described as [33] ˙ (14) x̂˙ = Y θ̂ + km x̃ + mθ̂ ˙ θ̂ = kθ mT (x̃ − γ) (15) ṁ = Y − km m, m(t0 ) = 0 (16) where m(t) ∈ Rn×n(n+d) and km , kθ are positive scalar gains and x̃(t) and γ(t) ∈ Rn are defined as x̃ , x − x̂ (17) γ , x̃ − mθ̃ (18) with γ(t0 ) = x̃(t0 ). Although γ(t) in (18) is unmeasurable, the use of the initial condition m(t0 ) = 0 in (16) ensures that γ(t) is available online by solving (20) with known initial condition. An auxiliary variable g(t) ∈ Rn is defined as g , mθ̂ + x̃ − γ (21) Substituting γ from (18) in (21) leads to g(t) = m(t)θ, ∀t ≥ t0 (22) The strategic introduction of variables m(t) and γ(t) transforms the system in (13) to a standard linear regression form of (22), where both m(t) and g(t) are known signals, obviating the need of ẋ(t) information. Consider a memory stack W = {(mj , gj )}pj=1 updated online with the signals m(t) and g(t) respectively, where each mi and gi are collected and stored in W at t = twi with t0 ≥ tw1 > tw2 > ....twp = tc .2 Here, p is the memory stack length, which satisfies the condition p ≥ n + d, where n is the dimension of the state x(t) and d is the dimension of the input u(t). Assumption 2. The matrix M , [mT1 , mT2 , ...mTp ]T Rnp×n(n+d) is full rank i.e. rank(M ) = n(n + d). ∈ This rank condition is analogous to those of CL-based frameworks [19], [18] of adaptive control. The difference here is that it is stated in terms of a newly introduced variable m(t) required for system identification purpose. Unlike the dependency on future behaviour of signals in PE condition, this rank condition relies on past data. Therefore, this condition can be easily verified online making it more practical as compared to the PE condition. The following Lemma establishes only exciting condition (not PE) of relevant signals as a necessary condition for the Assumption 2 to hold. Lemma 1. The necessary condition for the matrix M to be full rank is the state x(t) and the input u(t) be exciting over the interval t ∈ [t0 , tc ] as per Definition 1.3 Theorem 1. The system parameter identification error kθ̃(t)k is non-increasing during the interval [t0 , tc ] using the update laws (14)-(16). Provided Assumption 2 holds, the stored data in W can be used to achieve the finite time identification of system parameters (θ) at t = tc . Proof: Consider a Lyapunov candidate as 1 T θ̃ θ̃ 2 Differentiating (23) along (15) and using (18) yields Vθ = V̇θ = −kθ θ̃T mT mθ̃ ≤ 0 (23) (24) (19) which implies kθ̃(t)k ≤ kθ̃(t0 )k, ∀t ≥ t0 . For finite time identification of system parameters, define a matrix G , [g1T , g2T , ...gpT ]T ∈ Rnp×1 . Differentiating (18) and using (14)-(17), the following expression is obtained γ̇ = −km γ (20) 2 The data storing mechanism in this work is analogous to that of [32], [35] and [38], hence, the details of this mechanism are omitted here. 3 For proof see Appendix where θ̃(t) is given by θ̃ , θ − θ̂ 4 Since (22) is valid for ∀t ≥ t0 , the following equation is satisfied. Mθ = G (25) Lemma 3. The necessary condition for the matrix Z to be full rank is the state x(t) and the reference input r(t) be exciting over the interval t ∈ [t0 , ts ] as per Definition 1. The Assumption 2 implies M T M is an invertible matrix and hence the system parameter θ can be found from the following least-square like expression. The controller parameter φ(t) is updated as  T T  for t0 ≤ t ≤ tc  proj(−Γφ z B̂ P e) T T −Γ z B̂ P e for tc < t <tm φ̇ = φ  Pq  T T −Γφ z B̂ P e + kφ j=1 zjT ǫKj for t ≥ tm θ̂F T (t) = (M T M )−1 M T G = θ, t ≥ tc (26) Using (26),at t = tc , finite time convergence of θ is obtained. The identification equations (14)-(16) and (21) are merely required for t ∈ [t0 , tc ]. At t = tc , using (26) finite time identification of system parameters is achieved using the memory stack W . The finite-time (FT) identifier is given by ( θ̂(t) if t < tc θ̂F T (t) = (27) θ if t ≥ tc The FT identifier method requires instantaneous inversion of M T M ∈ Rn(n+d)×n(n+d) at t = tc , which may be impractical for large dimensional systems. However, the following Lemma shows that the matrix M T M is significantly sparse and sparsity increases with the state dimension n implying that sophisticated techniques can be applied for fast computation of the inverse. T Lemma 2. The fraction of non-zero elements in M M is where n is the state dimension. 1 n, B. Tracking Error and Controller Parameter Convergence The control law in (3) can be linearly parametrized as u = z(x, r)φ(t) (28) d×d(n+d) d(n+d) where z(x, r) ∈ R and φ ∈ R is a column vector consisting of all the elements of Kx (t) and Kr (t) defined as   vec(Kx ) φ, vec(Kr ) Using (28), the error dynamics in (9) can be written as ė = Am e + Bz φ̃ (29) where φ̃ = φ − φ∗ and φ , ∗  vec(Kx∗ ) vec(Kr∗ )  For the convergence of tracking and controller parameter estimation errors, another memory stack H = {xj , rj }qj=1 is populated online by state and input signals, respectively where each xj and rj is stored at t = thj with t0 ≥ th1 > th2 > .. > tzq = ts . Each pair (xj , rj ) is referred to as a data point and q is the length of the stack satisfying q ≥ n ≥ d. (30) where Γφ ∈ Rd(n+d)×d(n+d) is a positive definite learning rate matrix, proj denotes projection operator [40] which ensures parameter boundedness within a convex region in the parameter space and tm = max(tc , ts ). Further, kφ is a scalar gain introduced to alter the rate of convergence and B̂(t) is extracted from θ̂F T (t) of (27). The error variable ǫKj (t) in (30) is defined as ǫKj (t) = ǫKxj (t) + ǫKrj (t) (31) with the following two expressions. ˆj − Am xj − Bm rj − B̂ǫKr (t)) ǫKxj (t) , (B̂ T B̂)−1 B̂ T (ẋ j (32) ǫKrj (t) , KrT (t)rj − (B̂ T B̂)−1 B̂ T Bm rj (33) ˆj = Yj θ̂F T . where ẋ Theorem 2. For the system (1), the control law in (28) and the update laws in (30) along with the finite-time system identifier θ̂F T (t) (27) ensure boundedness of the tracking and the controller parameter estimation errors for t ∈ [t0 , tm ) and the global exponential convergence of those errors to zero is guaranteed for t ≥ tm , provided the Assumption 3 is satisfied. Proof: Consider the following Lyapunov candidate Vξ = 1 T ξ Λξ 2 (34) where ξ(t) , [eT (t), φT (t)]T and   P 0n×d(n+d) Λ, 0d(n+d)×n Γ−1 φ Taking time derivative of (34) along the trajectories of (29) and (30) the following expression is obtained during t ∈ [t0 , tc ] 1 V̇ξ ≤ − eT Qe + eT P BZ φ̃ − φ̃T z T B̂ T P e 2 (35) Assumption 3. The matrix Z = [z1T , z2T , ..., zqT ]T is full rank i.e. rank(Z) = d(n + d), where zj = z(xj , rj ) for j = 1(1)q. The inequality occurs due to the use of projection operator (For details see [41]). The above inequality can be further modified as 1 (36) V̇ξ ≤ − eT Qe + eT P B̃Z φ̃ 2 This assumption is analogous to Assumption 2. Here it is stated in terms of z(t), which is relevant to controller parameter convergence. The following Lemma provides a necessary condition for the Assumption 3 to hold. where B̃ , B − B̂. Using the fact Z φ̃ = K̃x x + K̃r r, yields 1 V̇ξ ≤ − β1 kek2 + β2 kek (37) 2 T T 5 where β1 = λmin (Q) − 2kP kkB̃kkK̃x k (38) β2 = kP kkB̃k(kK̃x kkxm k + kK̃r kkrk) (39) λmin (.), in (38), denotes the minimum eigen value of the corresponding argument matrix. In (39), kK̃x (t)k and kK̃r (t)k are bounded by the use of projection operator [40] in (30) and kB̃(t)k ∈ L∞ from Theorem 1. As r(t) ∈ L∞ and Am is Hurwitz by definition, xm (t) ∈ L∞ , implying β1 (t) ∈ L∞ and β2 (t) ∈ L∞ with β2 > 0. However, the sign of β1 is uncertain during t ∈ [t0 , tc ]. It can be inferred that once β1 (t) becomes greater than zero, it will remain greater than zero as kθ̃(t)k is non-increasing in the interval [t0 , tc ] as per Theorem 1. Moreover, β1 = λmin (Q) > 0 at t = tc as kθ̃(t)k = 0 at t = tc . Three cases are possible depending on the θ̃(t) dynamics. case 1: β1 (t) ≤ 0, ∀t ∈ [t0 , tc ) case 2: β1 (t) > 0, ∀t ∈ [t0 , tc ] case 3: β1 (t) ≤ 0, ∀t ∈ [t0 , tf ] and β1 (t) > 0, ∀t ∈ (tf , tc ] The three cases are analysed separately as follows. case 1: As β1 (t) ≤ 0, it is hard to comment on the exact bound of the tracking error. However, finite tracking error can be claimed from (4), which can be expressed as ẋ = Ā(t)x(t) + ḡ(t), where Ā(t) = A + BKxT (t) and ḡ(t) = BKrT (t))r(t). As equation (4) is a linear equation in x(t) with kĀ(t)k and kḡ(t)k are bounded i.e. Ā(t) ∈ L∞ and ḡ(t) ∈ L∞ in the finite time interval [t0 , tc ], using Global Existence and Uniqueness theorem [42] it can be argued that x(t) cannot have a finite escape time. Therefore x(t) ∈ L∞ in finite time (t ≤ tc ) if x(t0 ) is finite, leading to the tracking error e(t) ∈ L∞ as xm (t) ∈ L∞ , implying ξ(t) ∈ L∞ . case 2: As β1 (t) > 0, (37) can be further modified to 2 β2,max 1 V̇ξ ≤ − β11 kek2 + 2 4β12 (40) where β11 + β12 = β1,min > 0 with β11 > 0, β12 > 0 and β2,max can be found by upper bounding every time-varying term in (39). Due to the use of proj in (30) during t ∈ [t0 , tc ], Vξ in (34) can be upper bounded as Vξ ≤ 1 λmax (P )kek2 + D 2 β11 β11 D 2,max where η1 = λmax (P ) and η2 = 4β12 + λmax (P ) . Using comparison Lemma [42], the above differential inequality results in the following UUB condition.   η2 η2 exp (−η1 (t − t0 )) + , ∀t ∈ [t0 , tc ] Vξ (t) ≤ Vξ (t0 ) − η1 η1 (43) The inequality in (43) implies ξ(t) ∈ L∞ during the same interval via Theorem 4.18 of [42]. The analysis done in case 1 holds independent of the sign of β1 (t). However, in case of β1 (t) > 0, it is possible to get an 4 kφk2 max is defined by the convex region in the projection operator. 1 V̇ξ = − eT Qe ≤ 0 2 (45) Thus Vξ (t) is non-increasing in this interval, implying Vξ (tm ) ≤ Vξ (tc ). Again, using Theorem 4.18 of [42] it can be inferred that ξ(t) ∈ L∞ during t ∈ (tc , tm ) as Vξ (t) ∈ L∞ . For t ≥ tm , using θ̂F T = θ from Theorem 1, the time derivative of (34) along (29) and (30) can be expressed as 1 V̇ξ = − eT Qe + eT P Bz φ̃ 2   q X zjT zj  φ̃ − φ̃T z T B T P e − φ̃T kφ (46) j=1 Using (6) and (33), ǫTKr (t) can be expressed as j ǫKrj (t) = K̃rT (t)rj (47) and using (7), (32) and (49) it can be shown that ǫKxj (t) = K̃xT (t)xj (48) Further (31), (47) and (48) lead to ǫKj (t) = zj φ̃(t) (49) The expression (49) is used to derive (46), which can be further upper bounded as 1 V̇ξ ≤ − λmin (Q)kek2 − kφ λmin (Ωz )kφ̃k2 2 (41) where D = 12 λmin (Γφ )kφk2max .4 Further upper bounding (40) using (41) yields V̇ξ ≤ −η1 Vξ + η2 (42) β2 exact expression of bound for the Lyapunov function Vξ (t) as shown in (43). case 3: During t ∈ [t0 , tf + ǫ), following the arguments similar to case 1, it can be established that ξ(t) ∈ L∞ , where ǫ > 0 is infinitesimally small. Further, during t ∈ [tf + ǫ, tc ], following the analysis similar to case 2, the following bound can be derived.   η2 η2 exp (−η1 (t − tβ )) + , ∀t ∈ [tβ , tc ] Vξ (t) ≤ Vξ (tβ ) − η1 η1 (44) with tβ = tf + ǫ, implying ξ(t) ∈ L∞ in the same interval. In the interval t ∈ (tc , tm ) using B̃ = 0 from Theorem 1 in the time derivative of (34) along (29) and (30) where Ωz = q X zjT zj = Z T Z (50) (51) j=1 Hence, based on Assumption 3, Ωz > 0 which implies V̇ξ ≤ 0. Further from (50) the following bound can be obtained V̇ξ ≤ −βVξ (52) where β is given by β= min(λmin (Q), 2kφ λmin (Ωz )) max(λmax (P ), λmax (Γ−1 φ )) The differential inequality in (52) leads to the subsequent exponentially convergent bound Vξ (t) ≤ Vξ (tm )e−β(t−tm ) , ∀t ∈ [tm , ∞) (53) 6 Remark 2. To improve the rate of convergence, the memory stack is continuously updated in [35] using an algorithm to maximize the minimum singular value of a matrix analogous to Z. To avoid computational burden associated with the continuous stack update, the proposed algorithm updates the stack until the sufficient rank condition is satisfied. The speed of convergence is controlled by appropriately choosing Q, kφ and Γφ . Moreover, since θ is obtained in finite time using (14)(22) and the memory stack W , the need for computationally involved purging algorithm [31] is obviated. Remark 3. The proposed memory-based data-driven technique for parameter convergence is similar to classical integral control in the following sense. It is well-known that integral control, which captures the effect of entire past of the relevant signal, reduces steady state error. The proposed approach also stores information-rich past data (although not the entire past) in the memory stack using a non-linear sampling technique and utilizes the stacked data in the parameter update law, leading to exponential convergence of parameter estimation error to zero. Future research can be carried out to investigate the relation between the proposed method and the classical integral control. IV. S IMULATION R ESULTS To demonstrate the effectiveness of the proposed data driven technique, a second order linear plant is considered.     0 1 0 A= B= 5 2 2 The reference model matrices are considered as     0 1 0 Am = Bm = −8 −10 1 Note that Am is a Hurwitz matrix but A is not. Using the matching conditions (5) and (6) Kx∗ is equal to [−6.5, −6]T and Kr∗ is 0.5. The reference signal r(t) is chosen as r(t) = 20e−t/2 which is a non-PE signal. The matrix Q of Lyapunov equation (12) is selected as   5 0 Q= 0 5 The adaptation gains Γx and Γr are chosen as Γx = I2 and Γr = I1 . The gain parameters are chosen as kθ = 80, km = 10 and kφ = 40. The plot of the error dynamics of system parameters is shown in Fig 1. The tracking error plot is shown in Fig 2, error error error error error error System parameter estimation error 3 2 in in in in in in A(1,1) A(1,2) A(2,1) A(2,2) B(1) B(2) 1 0 −1 −2 0 0.01 0.02 0.03 time (sec.) 0.04 0.05 System parameter estimation error θ̃(t) Fig. 1. 0.6 e1 e2 0.4 0.2 tracking error e(t) Remark 1. As described by (30), the update law of φ(t) follows time-dependent switching with at most 2 (finite) switching instances (tc and tm ). Therefore, the boundedness of ξ(t) during t ∈ [t0 , tm ) and exponential convergence for t ≥ tm suffices the analysis. 4 0 −0.2 −0.4 −0.6 −0.8 0 1 2 3 4 5 time (sec.) Fig. 2. tracking error e(t) 7 error in Kx1 6 controller parameter estimation error implying ξ(t) → 0 exponentially fast as t → ∞. Further, the Lyapunov function in (34) is radially unbounded and no restriction is imposed on Vξ (tm ), implying global exponential stability (GES). error in Kx2 error in Kr 5 4 3 2 1 0 −1 −2 −3 0 0.2 0.4 0.6 0.8 1 time (sec.) Fig. 3. Controller parameter estimation error φ̃(t) depicting the convergence of errors to zero within approximately 4.1 seconds. Fig 3. shows the evolution of estimation error in controller parameters. At t = tm the transition of parameter update law from one rule to another leads to nondifferentiability at that time point. After t = tm , the error dynamics converge to zero exponentially. V. C ONCLUSION A memory-based data-driven approach is proposed to solve the MRAC problem for unknown LTI systems, using only input and state data. Past data along the system trajectory is stored and used strategically to guarantee finite-time identification of system parameters (θ), convergence of controller 7 parameters (φ) and tracking error. Unlike the restrictive PE condition in classical adaptive control, only a rank condition on the recorded matrices is required to ensure parameter convergence. Further, the work relaxes two vital assumptions of CL-based frameworks of adaptive control-knowledge of the state derivative and the input B matrix, without altering the exponential convergence result. A PPENDIX Lemma 4. A memory stack X is populated with the values of a continuous signal x(t) ∈ Rn×m at different time points as described below X = [x1 , x2 , ....xp ], where mp ≥ n and xi = x(ti ) ∈ Rn×m , i = 1(1)p with t1 > t2 > ...tp = te . If the matrix X is full rank, i.e. rank(X) = n, the signal x(t) is exciting over the interval [t0 , te ] as per Definition 1. Rt Proof: Define C , 0 e x(τ )xT (τ )dτ . Taking limit as ǫ → 0+ and using the corollary of fundamental theorem of R a+ǫ 1 calculus limǫ→0+ 2ǫ a−ǫ f (y)dy = f (a) for any continuous function f , the following expression can be obtained Z 1 1 t1 −ǫ lim C = lim x(τ )xT (τ )dτ ǫ→0+ 2ǫ ǫ→0+ 2ǫ 0 p−1 X 1 Z tj+1 −ǫ x(τ )xT (τ )dτ + XX T (54) + 2ǫ tj +ǫ j=1 where Z 1 t1 −ǫ x(τ )xT (τ )dτ ǫ→0 2ǫ 0 Z p−1 X 1 tj+1 −ǫ + x(τ )xT (τ )dτ ≥ 0 2ǫ t +ǫ j j=1 lim+ (55) and XX T ≥ σmin (X)I where σmin (X) > 0 as X is full 1 C > 0, implying rank. Thus, it can be inferred that limǫ→0+ 2ǫ C > 0 as ǫ > 0. Therefore Z te x(τ )xT (τ )dτ ≥ αI (56) 0 with α = λmin (C) > 0. R EFERENCES [1] K. S. Narendra and A. M. Annaswamy, “A new adaptive law for robust adaptation without persistent excitation,” Automatic Control, IEEE Transactions on, vol. 32, no. 2, pp. 134–145, 1987. [2] K. S. Narendra and A. M. Annaswamy, Stable adaptive systems. Courier Corporation, 2012. [3] G. Tao, Adaptive control design and analysis, vol. 37. John Wiley & Sons, 2003. [4] K. J. Åström and B. Wittenmark, Adaptive control. Courier Corporation, 2013. [5] C. Cao and N. Hovakimyan, “Design and analysis of a novel adaptive control architecture with guaranteed transient performance,” Automatic Control, IEEE Transactions on, vol. 53, no. 2, pp. 586–591, 2008. [6] S. Boyd and S. S. Sastry, “Necessary and sufficient conditions for parameter convergence in adaptive control,” Automatica, vol. 22, no. 6, pp. 629–639, 1986. [7] P. A. Ioannou and P. V. Kokotovic, “Instability analysis and improvement of robustness of adaptive control,” Automatica, vol. 20, no. 5, pp. 583– 594, 1984. [8] P. Abbeel, M. Quigley, and A. Y. Ng, “Using inaccurate models in reinforcement learning,” in International Conference on Machine Learning, pp. 1–8, ACM, 2006. [9] D. Mitrovic, S. Klanke, and S. Vijayakumar, “Adaptive optimal feedback control with learned internal dynamics models,” in From Motor Learning to Interaction Learning in Robots, pp. 65–84, Springer, 2010. [10] M. Deisenroth and C. E. Rasmussen, “Pilco: A model-based and dataefficient approach to policy search,” in International Conference on Machine Learning, pp. 465–472, 2011. [11] R. Kamalapurkar, P. Walters, and W. Dixon, “Concurrent learningbased approximate optimal regulation,” in Conference on Decision and Control, pp. 6256–6261, IEEE, 2013. [12] S. Bhasin, R. Kamalapurkar, M. Johnson, K. G. Vamvoudakis, F. L. Lewis, and W. E. Dixon, “A novel actor–critic–identifier architecture for approximate optimal control of uncertain nonlinear systems,” Automatica, vol. 49, no. 1, pp. 82–92, 2013. [13] H. Fukushima, T.-H. Kim, and T. Sugie, “Adaptive model predictive control for a class of constrained linear systems based on the comparison model,” Automatica, vol. 43, no. 2, pp. 301–308, 2007. [14] V. Adetola, D. DeHaan, and M. Guay, “Adaptive model predictive control for constrained nonlinear systems,” Systems & Control Letters, vol. 58, no. 5, pp. 320–326, 2009. [15] G. Chowdhary, M. Mühlegg, J. P. How, and F. Holzapfel, “Concurrent learning adaptive model predictive control,” in Advances in Aerospace Guidance, Navigation and Control, pp. 29–47, Springer, 2013. [16] A. Aswani, H. Gonzalez, S. S. Sastry, and C. Tomlin, “Provably safe and robust learning-based model predictive control,” Automatica, vol. 49, no. 5, pp. 1216–1226, 2013. [17] F. L. Lewis and D. Vrabie, “Reinforcement learning and adaptive dynamic programming for feedback control,” Circuits and Systems Magazine, IEEE, vol. 9, no. 3, pp. 32–50, 2009. [18] G. Chowdhary and E. Johnson, “Concurrent learning for convergence in adaptive control without persistency of excitation,” in Conference on Decision and Control, pp. 3674–3679, IEEE, 2010. [19] G. Chowdhary, T. Yucelen, M. Mühlegg, and E. N. Johnson, “Concurrent learning adaptive control of linear systems with exponentially convergent bounds,” International Journal of Adaptive Control and Signal Processing, vol. 27, no. 4, pp. 280–301, 2013. [20] G. Chowdhary, M. Mühlegg, and E. Johnson, “Exponential parameter and tracking error convergence guarantees for adaptive controllers without persistency of excitation,” International Journal of Control, vol. 87, no. 8, pp. 1583–1603, 2014. [21] H. A. Kingravi, G. Chowdhary, P. A. Vela, and E. N. Johnson, “Reproducing kernel hilbert space approach for the online update of radial bases in neuro-adaptive control,” Neural Networks and Learning Systems, IEEE Transactions on, vol. 23, no. 7, pp. 1130–1141, 2012. [22] R. Kamalapurkar, P. Walters, and W. E. Dixon, “Model-based reinforcement learning for approximate optimal regulation,” Automatica, vol. 64, pp. 94–104, 2016. [23] K. G. Vamvoudakis, M. F. Miranda, and J. P. Hespanha, “Asymptotically stable adaptive-optimal control algorithm with saturating actuators and relaxed persistence of excitation,” Neural Networks and Learning Systems, IEEE Transactions on, doi: 10.1109/TNNLS.2015.2487972, 2015. [24] G. Chowdhary, T. Wu, M. Cutler, N. K. Ure, and J. How, “Experimental results of concurrent learning adaptive controllers,” in AIAA Guidance, Navigation, and Control Conference,(Minneapolis, MN), AIAA, 2012. [25] W. E. Dixon, “Experiments using approximate optimal path following with concurrent learning,” in American Control Conference, pp. 5083– 5083, IEEE, 2015. [26] A. Gelb, Applied optimal estimation. MIT press, 1974. [27] E. Lavretsky, “Combined/composite model reference adaptive control,” Automatic Control, IEEE Transactions on, vol. 54, no. 11, p. 2692, 2009. [28] G. Tao, S. M. Joshi, and X. Ma, “Adaptive state feedback and tracking control of systems with actuator failures,” Automatic Control, IEEE Transactions on, vol. 46, no. 1, pp. 78–95, 2001. [29] Z. Han and K. S. Narendra, “New concepts in adaptive control using multiple models,” Automatic Control, IEEE Transactions on, vol. 57, no. 1, pp. 78–89, 2012. [30] A. Somanath, Adaptive control of hypersonic vehicles in presence of actuation uncertainties. PhD thesis, Massachusetts Institute of Technology, 2010. [31] B. Reish and G. Chowdhary, “Concurrent learning adaptive control for systems with unknown sign of control effectiveness,” in Conference on Decision and Control, pp. 4131–4136, IEEE, 2014. [32] A. Kumar and S. Bhasin, “Data driven mrac with parameter convergence,” in Multi-Conference on Systems and Control, pp. 1662–1667, IEEE, 2015. 8 [33] V. Adetola and M. Guay, “Finite-time parameter estimation in adaptive control of nonlinear systems,” Automatic Control, IEEE Transactions on, vol. 53, no. 3, pp. 807–811, 2008. [34] V. Adetola and M. Guay, “Performance improvement in adaptive control of linearly parameterized nonlinear systems,” Automatic Control, IEEE Transactions on, vol. 55, no. 9, pp. 2182–2186, 2010. [35] G. Chowdhary and E. Johnson, “A singular value maximizing data recording algorithm for concurrent learning,” in American Control Conference, pp. 3547–3552, IEEE, 2011. [36] P. A. Ioannou and J. Sun, Robust adaptive control. Courier Corporation, 2012. [37] G. V. Chowdhary and E. N. Johnson, “Theory and flight-test validation of a concurrent-learning adaptive controller,” Journal of Guidance, Control, and Dynamics, vol. 34, no. 2, pp. 592–607, 2011. [38] G. Chowdhary, Concurrent learning for convergence in adaptive control without persistency of excitation. PhD thesis, Georgia Institute of Technology, 2010. [39] S. Kersting and M. Buss, “Concurrent learning adaptive identification of piecewise affine systems,” in Conference on Decision and Control, pp. 3930–3935, IEEE, 2014. [40] M. Krstic, P. V. Kokotovic, and I. Kanellakopoulos, Nonlinear and adaptive control design. John Wiley & Sons, Inc., 1995. [41] E. Lavretsky, T. E. Gibson, and A. M. Annaswamy, “Projection operator in adaptive systems,” arXiv preprint arXiv:1112.4232, 2011. [42] H. K. Khalil, “Nonlinear systems, 3rd,” New Jewsey, Prentice Hall, vol. 9, 2002.
3cs.SY
arXiv:1407.4917v1 [cs.SE] 18 Jul 2014 Sliced Slices: Separating Data and Control Influences Shrawan Kumar Amitabha Sanyal Uday P. Khedker Tata Research Design and Development Centre Tata Consultancy Services Ltd, Pune, India Email: [email protected] Department of Computer Science and Engineering Indian Institute of Technology Bombay, India Email: [email protected] Department of Computer Science and Engineering Indian Institute of Technology Bombay, India Email: [email protected] Abstract—Backward slicing has been used extensively in program understanding, debugging and scaling up of program analysis. For large programs, the size of the conventional backward slice is about 25% of the program size. This may be too large to be useful. Our investigations reveal that in general, the size of a slice is influenced more by computations governing the control flow reaching the slicing criterion than by the computations governing the values relevant to the slicing criterion. We distinguish between the two by defining data slices and control slices both of which are smaller than the conventional slices which can be obtained by combining the two. This is useful because for many applications, the individual data or control slices are sufficient. Our experiments show that for more than 50% of cases, the data slice is smaller than 10% of the program in size. Besides, the time to compute data or control slice is comparable to that for computing the conventional slice. I. I NTRODUCTION Program slicing, introduced in 1984 by Mark Weiser [?], strips down a large program to a smaller version based on the requirements of program observation. Many variants of slices such as forward, backward, dynamic, and abstract slice etc. have been devised [?]. They have been used for different purposes like program understanding, debugging, testing, maintenance, software quality assurance and reverse engineering among others. A brief description of various applications of program slices is given by Binkley et. al. [?]. Among static slicing techniques, backward slicing which answers the question “which program statements can influence the given variables at the given statement?” seems more natural and is most common. It identifies the portion of program that one would be interested in while understanding a computation or debugging for an erroneous output. In safety property checking, rather than verifying the property on whole program, one can verify the property on the static backward slice with respect to slicing criterion derived from the specific property of interest. As a result, backward slice helps scaling up of property checking techniques also. While static slicing is efficient and scalable, the size of the computed slice may remain a matter of concern. Empirical studies [?] have shown that size of a static slice on an average is about 30% of the program size. For large programs, this size could be too large. Our investigations of the factors influencing the size of a slices reveal that most statements are included in a slice due to some conditions governing the reachability of the statement involved in the slicing criteria rather than due to the values of variables in the slicing criteria. These statements are irrelevant for understanding the computations leading to the values of the variables. As a motivating example, assume that the program in Figure 1(a) computes an erroneous value of u at line 17. It is obvious that for slicing criterion h17, ui, no static slicing can reduce the program anymore. Therefore using the conventional backward slice is of no help in getting a reduced program for debugging this program. A careful examination reveals that the value of u does not depend on the values of variables i or t. These variables are used in the conditions which decide the reachability of line 17 in the execution. Since we know that a wrong value is getting computed at line 17, reachability of line 17 is obvious and need not be established. Thus, computations of i and t are irrelevant to our purpose. Figure 1(b) shows a portion of the program which is sufficient to understand the computation of u and to debug the reason for its wrong value. Any erroneous statement responsible for an erroneous value has to be contained in this program fragment. The statements that have been removed only alter the reachability of line 17 and not the value computed for u. Note that functions fn1 and fn2 have been sliced out as they are not required any longer. Observe that retaining the program structure requires that a conditionally executed statement in the original program must also be included as a conditionally executed statement in the program slice. However, since the values of variables appearing in the condition are irrelevant, we replace conditions by ‘*’ which stands for a random value chosen from {true, f alse} when it is executed. It is easy to see that the resulting slice is much smaller in comparison to conventional backward slice (incidentally the whole program in this case) and still sufficient to debug (or understand) the computation of u at the slicing criterion. We call such a slice as data slice. Consider a contrasting requirement of debugging the program when line 17 is not getting executed a desired number of times. For this purpose we only need to see how the reachability of line 17 is getting influenced. How the value of u is computed is irrelevant. Therefore we need to know how values of i and t are getting computed as they appear in the conditions that govern whether or not line 17 will be reached. We show the portion of code in Figure 1(c). It is sufficient to understand when line 17 in original program (mapped to 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 int main() { int i=0,j=0, k=0, st; int l, t=0, u, v; l=get_input(); while (fn1(l)) t+=2; while (i<1000) { i= i+ fn2(); st = fn3(); if (st ==1) { j++; k++; } else { j+=2; k+=1; } u = j-k; if (t>100) v = u ; } return 0; } int fn1(); // a complex function int fn2(); // a complex function int fn3(); // some function 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 int main() { int j=0, k=0, st; int u, v; while (*) { st = fn3(); if (st ==1) { j++; k++; } else { j+=2; k+=1; } u = j-k; if (*) v = u ; } return 0; } int fn3(); // some function 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 int main() { int i=0; int l, t=0, u, v; l=get_input(); while (fn1(l)) t+=2; while (i<1000) { i= i+ fn2(); if (t>100) v = u ; } return 0; } int fn1(); // a complex function int fn2(); // a complex function (b) Data slice (c) Control slice (a) Backward slice Fig. 1: Usual backward slice, data slice and control slice line 12 in slice) is reachable. Functions fn1 and fn2 have to be part of this program portion while function fn3 is not required. We call such a slice as control slice. In addition to debugging and program understanding, this separation of concerns is helpful in property checking during program verification because it reduces the size of the program to be examined. First we derive a slicing criterion SC from the property to be checked, compute the corresponding data slice and check the property on the slice. If the property holds then we are done as the property will hold in original program also. If the property does not hold, we compute a control slice with respect to program point related to property in question and check the reachability of this point in the control slice. If it is not reachable then property holds in original program.1 The contributions of this paper are: We define the concepts of data and control slices, relate them to the conventional slices, provide an algorithm to compute data and control slices and show its soundness. We also provide empirical measurements on real life programs that show that the data slices are indeed much smaller than complete slices and are computable in comparable time. II. BACKGROUND A. Variants of Program Slices The classical backward slicing tries to find the program fragment that influences a slicing criterion. Forward slicing [?] discovers the statements that are influenced by a given slicing criterion. Chopping [?] discovers statements influenced by a source criterion on paths to a target criterion. A dynamic slice [?] computes a subset of program statements which affect a slicing criterion in a particular run of the program. Assertion slicing [?], [?], [?] is a technique which computes set of statements which are sufficient to ensure a post condition or 1 However, if it is found reachable then the answer is not straight forward. the statements which will be executed starting from a given pre condition. All these variants use control and data influences in an integrated manner. To the best of our knowledge there is no work which distinguishes between data and control influences. B. Control flow graph and data dependence Program model. We present our ideas in context of imperative programs modeled in terms of assignment statements, conditional statements, while loops, and procedure calls. We also allow break and continue statements in loops. Without any loss of generality, we restrict ourselves to goto-less programs with single-entry loops and two-way branching conditional statements at the source level. Control Flow Graph (CFG). We use the standard notion of control flow graph (CFG) G = hN, Ei where N is the set of nodes, E is a set of directed edges in N ×N [?]. ENTRY and EXIT are distinguished nodes representing the entry and exit l of program. We use s  t and s  t to denote unconditional and conditional edges respectively, where l ∈ {true, f alse} indicates the branch outcome. We assume that two special edges ENTRY  EXIT and EXIT  EXIT are added in CFG. There is a one-to-one correspondence between nodes of CFG and statements of the program, hence we will use the terms statement and node interchangeably. Data dependence. A definition d of a variable v in node p is said to be reaching definition [?] for a node point q, if there is a control flow path from p to q devoid of any other definition of v. A variable x at location l is said to be data dependent on a definition d of x, if d is reaching definition for l. The set of definitions of variables in X reaching l is denoted by DU (l, X) = {d | ∃v ∈ X.v at l is data dependent on d}. We will use REF (t) to denote set of variables whose value is referred in a statement t. C. Program states and traces Let V be set of all variables in program P and < be the set of all values which the variables can take in P . Definition 1: (Program state). A program state is a valuation of all variables in the program at a given instant during program execution. It is represented by a map θ : V → < such that θ(v) denotes the value of v ∈ V in the program state θ. Definition 2: (Restricted program state). Given X ⊆ V , a X-restriction of program state θ, denoted as bθcX , is a map X → < such that ∀x ∈ X.bθcX (x) = θ(x). Definition 3: (Execution state). An execution state is a pair hn, θi where θ is a program state and n is a CFG node. Execution of a program can be seen as a sequence of execution states starting with execution state hENTRY, σ0 i where σ0 0 is0 initial program state. The subsequent execution state hn , σ i for a given execution state hn, σi is decided by semantics of statement corresponding to node n and program state σ. Let function T RAN (hn, σi) provide the subsequent execution state of hn, σi. Definition 4: (Trace). A (possibly infinite) sequence of execution states [hni , σi i], i ≥ 0 is said to be a trace, provided n0 = ENTRY and σ0 is given initial program state, and ∀i ≥ 0 : hni+1 , σi+1 i = T RAN (hni , σi i). When the trace sequence is finite and ends with an execution state hEXIT, θi then the trace is called a terminating trace. Unless stated otherwise, a trace means a terminating trace in the rest of this paper. D. Post-dominance and control dependence Backward slicing algorithms are implemented efficiently using post-dominance and control dependence [?], [?]. Definition 5: (Post-dominance). A node n2 post-dominates a node n1 if every path from n1 to EXIT contains n2 . If, in addition n1 6= n2 then n2 is said to strictly post-dominate n1 . Definition 6: (Control dependence). A node n3 is control l dependent on an edge n1  n2 if n3 post-dominates n2 , and n3 does not strictly post-dominate n1 . Later Podgurski and Clarke [?] introduced concept of strong post-dominance and weak control dependence, to consider execution of a statement being dependent on loop termination. The previous definition of post-dominance and control dependence were termed as weak post-dominance and strong control dependence respectively. Definition 7: (Strong post-dominance). A node n2 strongly post-dominates a node n1 if every infinite path starting at n1 contains n2 . If in addition, n1 6= n2 then n2 strictly strongly post-dominates n1 . Definition 8: (Weak control dependence). A node n3 is l weakly control dependent on an edge n1  n2 if n3 strongly post-dominates n2 , and n3 does not strictly strongly postdominate n1 . Only EXIT node strongly post-dominates a loop exit edge. Therefore, all the nodes that weakly post-dominate a loop condition are weakly control dependent on loop exit edge. Bilardi and Pingali [?] give efficient algorithms for computing strong post-dominance and weak control dependence relationship. For our purpose, we will need to know whether a statement is controlled by a condition through a chain of weak/strong control dependence. For this, we define a transitive closure of weak/strong control dependence. Definition 9: (Transitive control dependence). For given statement s and condition c, if there is a path π in PDG from c to s consisting of only (weakly/strongly) control dependent edges then we say that s is transitive control dependent on c, written as c s. If π consists of only strong control dependent edges then we say s is strongly transitive control dependent on c, written as c −→ s. If π starts with a control dependent edge labeled as e then we qualify the transitive control dependence with edge e as e e e e c s or c −→ s. Obviously, c −→ s =⇒ c s. Following properties are obvious, for the programs under our discourse. SP1 SP2 e e 1 2 (c −→ s ∧ c −→ s) =⇒ e1 = e2 e c −→ s =⇒ no path to s from an edge ē 6= e of c can bypass e. E. Subprogram and backward slice An important requirement of a slice is that the behaviour of the slice must be a specified subset of the original program’s behaviour. A subset of original program’s behaviour is specified through a pair Υ = hl, V i, known as slicing criterion, where l is a statement location and V is set of variables. It is interpreted as values of variables V just before executing statement at l. We will use Υ and hl, V i interchangeably to denote a slicing criterion. Where context is clear, we will use l and V to denote the location and variables set components, respectively. We will use LV (t) to denote the slicing criterion ht, REF (t)i. A subprogram of a program P is a program carved out of P by deleting some statements such that program structure remains intact in that for each statement n that appears in subprogram, if n is enclosed by a condition in P , then n must be enclosed by a condition in subprogram too. An augmented program (P A ) is the result of transforming a given program P for a slicing criterion Υ = hl, V i by inserting a SKIP statement at location l. Obviously, an augmented program is equivalent to the original program. To compute a slice of program P with respect to Υ, we compute the slice S of the augmented program with respect to Υ with the restriction that the inserted SKIP statement is retained in S. Now with l standing for SKIP statement, Υ can be seen as specification for the desired subset of original program’s behaviour for P , P A and S. Henceforth, we assume that SKIP statement, inserted at location l, is part of every slice with respect to Υ. Henceforth, we will assume that each statement in P is labeled uniquely and the nodes in CFG are labeled with corresponding statement label. Statements in subprogram will get their label from the ones given in P . As a result, in CFG, Gs = hN s , E s i constructed for a sub program S of program P , having CFG, G : hN, Ei, N s ⊆ N . To be more explicit, given a node ns ∈ N s and n ∈ N , ns = n would mean that they represent statement with same label. This also holds for special nodes ENTRY and EXIT. Definition 10: (SC execution state). Given a program P and slicing criterion hl, V i, execution states of P having statement location as l are called SC execution states. Given a program P and slicing criterion Υ = hl, V i, let τ : [(ni , σi )], 0 ≤ i ≤ k. be the trace for input I with m SCexecution states. Let τ s : [(nsi , σis )], 0 ≤ i ≤ k s , be trace for a slice S of P , on same input I with ms SC-execution states. Let [hnlj , σlj i], 1 ≤ j ≤ m and [hnslj , σlsj i], 1 ≤ j ≤ ms be the sequence of SC-execution states in in τ and τ s respectively. We say, hnlj , σlj i and hnslj , σlsj i for 0 < j < min(m, ms ) are corresponding SC-execution states. Now the window of observation for Υ = hl, V i is the sequence of V-restricted program states [bσlj cV ], 1 ≤ j ≤ m. We will call such a sequence as the trace window of observation T W (P, I, Υ). Definition 11: (SC-equivalent trace). A trace τ of P on an input I is called SC-equivalent to trace τ s on slice S for same input I, if T W (P, I, Υ) = T W (S, I, Υ). We express the definition of a backward slice PΥB for a program P and a slicing criterion Υ as follows. 1) 2) PΥB is subprogram of P A . For every input I on which original program terminates, T W (P, I, Υ) = T W (PΥB , I, Υ). Of all methods that use some form of data flow to compute the backward slice, the methods of Ferrante et al. [?] and Horwitz et al. [?] using program dependence graphs (PDG) produce the minimal slice. III. Q2 We now formalize the notions of control and data slice. A. Control slice A control slice of a program P wrt. to the slicing criterion Υ = hl, V i, denoted PΥC , is the backward slice of P with respect to the slicing criterion hl, ∅i. Thus, the sliced program P C contains those statements of the original program which merely caused the program control reach the program point l. We now show that the control slice is contained in the backward slice. Lemma 1: PΥC ⊆ PΥB Proof: From the definition of control slice, we have B PΥC = Phl,∅i . Further, backward slices have the property [?] B B B B V1 ⊂ V2 implies Phl,V ⊂ Phl,V and thus Phl,∅i ⊆ Phl,V i. 1i 2i B C Consequently PΥ ⊆ PΥ Since computing backward slice is a well studied problem, we can compute the control slice by computing the backward slice with respect to the slicing criterion hl, ∅i following any of the existing approaches. DATA AND CONTROL SLICES A backward slice is the answer to the question “Given a slicing criterion Υ = hl, V i, which program statements can affect the values of the variables V ?” This question can be meaningfully split into two parts: Q1 To obtain the data slice for P1 for the same slicing criterion, we reason as follows. The value of y at line 13 is given by assignment at 11 and the condition at line 12 has no impact on this value. Therefore line 11 is included in the data slice but line 12 is not. The value of x assigned to y at line 11 is computed by lines 10 and 4. Of these, the value that reaches line 11 during execution is decided by condition at line 9. Therefore lines 4, 9 and 10 are also included in the data slice. Further, line 6 is also included, as it computes the value to be used in the condition at line 9. No other statement affects the value of y at line 13. The resulting program P3 is the data slice. Which statements decide whether program control will reach l? Assuming that control reaches l, which program statements decide the values of the variables V . As mentioned in the motivating example of Figure1, often we are interested in the separate answers to questions Q1 or Q2, even if we want to use them together. We call the subprogram resulting from the answer to Q1 as a control slice and that to Q2 as a data slice. In Figure 2, P1 is the original program in which the codes for the functions fn1 and fn2 are not shown. P2 is the control slice for the slicing criterion h13, {y}i. The conditions c1 and x < 10 at lines 7 and 12 decide whether program control reaches line 13, and therefore they are part of the control slice. Further, the value of the condition x < 10 may be decided by the assignment at line 10, which, in turn, is controlled by the condition at line 9. Therefore both line 12 and line 10 are in the control slice. For similar reasons, lines 4, 5, and 6 also have to be included. B. Data slice While P3 is an answer to the question Q2 posed for the criterion h13, {y}i and can therefore be regarded as a data slice, it is not suitable for applications like program understanding and debugging. For example, the information that the statement at line 13 may not be executed at all is missing from P3. Thus apart from the statements that decide on the values of variables at a slicing criterion, we also need to include statements that explicate the paths along which the computation of such values takes place. Therefore, we also include conditions that impact the reachability of l. This is shown in P4, and the included conditions are shown as ‘*’ indicating a non-deterministic branch. We make such conditions non-deterministic because their values are inconsequential for our purpose. Further, if these conditions were made concrete, then we would also have to include additional statements affecting their values, increasing the size of the slice. We call such a non-deterministic conditional as abstract conditional. During execution, such a conditional can randomly evaluate to true or f alse. The form of the slice as shown in P4 is good for program understanding and debugging. However it falls short if used for property verification. The reason is that while the abstract conditional helps in keeping the size of the sliced program 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 proc (int z) { int w,x,y; x = z; c1 = fn1(); c2 = fn2(); if (c1) { if (c2) x = z+5; y = x; if (x < 10) w = y; } } 1 2 3 4 5 6 7 8 9 10 proc (int z) { int w,x,y; x = z; c1 = fn1(); c2 = fn2(); if (c1) { if (c2) x = z+5; 11 2 3 4 proc (int z) { int w,x,y; x = z; 1 2 3 4 5 13 } 14 c2 = fn2(); 6 7 7 8 8 if (c2) x = z+5; 9 10 (a) P1 13 15 (b) P2 9 10 11 y = x; w = y; 12 12 13 14 } 15 1 2 3 4 5 c2 = fn2(); if (*) { if (c2) x = z+5; y = x; if (*) w = y; } 6 14 } proc (int z) { int w,x,y; x = z; 5 11 if (x < 10) w = y; 12 15 1 } (c) P3 6 7 8 9 10 11 12 13 14 15 (d) P4 proc (int z) { int w,x,y; x = z; c1 = *; c2 = fn2(); if (c1) { if (c2) x = z+5; y = x; if (x < 10) w = y; } } (e) P5 Fig. 2: Various forms of data slices small, it elides path conditions that are important for verification. As an example, suppose we want to check the property y < 20 at line 13. This property holds in original program but does not hold in P4. However, if we retain the included conditionals in concrete form and abstract out instead those assignment statements that assign to the variables involved in the conditional, we get P5. The property y < 20 holds for this program. Note that the assignments to x cannot be eliminated since they also determine the value of the variables of the slicing criterion. An abstract assignment of the form x = * assigns to x a random value from some domain. If x is an integer, for example, then x is assigned an integer value between −231 to 231 − 1.2 Due to inclusion of abstract conditions and assignments, there will be multiple execution paths on a given input. In general, the slice produced by abstract assignments will have less number of possible executions paths for same input in comparison to the one produced by abstract conditionals. For example, P4 may have 4 different execution paths on a given input while P5 will have only two such paths on same input. As a result, the slice produced through abstract assignments is more useful in property checking. The flip side is that slice produced by abstract assignments may be larger than the one produced by abstract conditionals. Given a program P , we shall call a subprogram of P in which some of the assignments and conditionals have been replaced by their abstract versions as an abstract subprogram. Now we will formally define a data slice and identify the statements which should be part of the data slice. C. Data slice: Formalization Given a slicing criterion hl, V i, a data slice is required to retain the program’s behavior in computing the value set of the variables in V , but is not required to visit l as many times as the original program. However, whatever value sets are computed by the slice should match those computed by the original program in a sense that we shall make precise now. 2 Assuming a 4 byte 2s complement representation. Consider program P7 of Figure 3. Assume that the number of times the outer loop iterates depends on the input and the inner loop iterates a fixed number of times, say 3. If the outer loop executes twice for an input I, the values of x at line 8 will be 3,6,9,3,6,9. However, if both the while conditions are replaced by ‘*’ in a slice, then for the same input, 3,3 is one of the sequence of values generated for x. This sequence does not match the sequence generated by the concrete program. On the other hand, if only the outer loop condition is replaced by ‘*’, then the output produced will be zero or more occurrences of sequence 3,6,9. These sequences are considered to match the sequence produced by the original program. Based on these considerations, we identify the necessary properties of a data slice P D for a given program P and slicing criterion hl, V i. 1) 2) 3) P D is an abstract subprogram of P For every input I, on which augmented program terminates with trace τ , there exists a trace τ d of P D on same input I, such that τ and τ d are SC-equivalent. Let τ d and τ be traces of P D and P A respectively on an input I. Let k be the minimum of the numbers of SC-execution states in τ and τ d . Then for all i ≤ k, the V-restricted program states of ith SC-execution states of τ and τ d are the same. Clearly, a backward slice P B also satisfies the properties of data slice mentioned above. Therefore, P D ⊆ P B Given a slicing criterion hl, V i, we now identify statements which are necessarily in the data slice. We call such statements value-impacting and define the term shortly. Informally speaking, a chain of assignments that determine the value set of V is value-impacting. Further, a condition that determines which of the several values generated by value-impacting statements reaches l during execution is also value-impacting. In subsequent discussions, we shall often use “value-impacting statements” to mean both value-impacting assignments and conditionals. Definition 12: (Value-impacting statement) A statement s value-impacts Υ, if any of the following conditions hold: 1) 2) s is the augmented SKIP statement. s is an assignment, and s ∈ DU (Υ). 3) 4) s is an assignment, and there exists a statement t such that t value-impacts Υ and s ∈ DU (LV (t)). s is a condition c, and the following holds: From c there exist paths π1 , π2 to l starting from edges e1 and e2 respectively. Further, there exists a statement t such that t value-impacts Υ and a) t is the first value-impacting statement along π1 b) t is not the first value-impacting statement along π2 . The triplet hπ1 , π2 , ti due to which a condition c satisfies rule (4) will be called a witness for a value-impacting condition. Obviously, there can be more than one witnesses for a condition to be value-impacting. The set of all such witnesses will be referred as W V I(c, Υ). In Figure 3 we show some examples of value-impacting statements. The CFGs of these programs are shown in Figure 4. In P6, lines 1 and 8 are value-impacting for h11, {x}i because the values of x generated at these statements reach 11. In addition, condition c2 is also value-impacting for the reason that of the two paths from c2 to 11, only one has x = z + 5 as the first value-impacting statement. As a consequence c2 determines whether the value generated at line 1 or at line 8 reaches 11. However, notice that while line 8 is valueimpacting for h9, {x}i, condition c2 is not, because there is no path to line 9 from the false edge of c2. Similarly, condition c1 value-impacts h13, {x}i. In P7 of Figure 3, the definition of x at lines 4 and 7 are value-impacting for h7, {x}i. Since line 7 is not reachable along the false edge of c2 without passing through line 4, c2 also becomes value-impacting for h7, {x}i. In P8, we can see that, c2 is value-impacting for h7, {x}i. Obviously, if a statement s value-impacts a slicing criterion Υ = hl, V i, then s can be the cause of an erroneous value of some v ∈ V at l and should be examined while debugging. Therefore, s must be part of P D . Let V I(Υ) be the set of value-impacting statements of Υ. Let AC(Υ) be conditional statements that are not by themselves value-impacting, but on which other value impacting statements are strongly (and transitively) control dependent. Formally: [ AC(Υ) = ( {c | c −→ t}) \ V I(Υ) t∈V I(Υ) states in τ and τ 0 such that n0 = n00 = EN T RY and for i > 0 and j > 0 ni , n0j ∈ V I(Υ). Let K be minimum of the number of elements in τs and τs0 . Since l occurs at least once in τ and in τ 0 , K > 0. We will prove by induction on i that for all i ≤ K, ni = n0i and bσi cZ = bσi0 cZ , where Z = REF (ni ). Base step : i=0. It holds trivially as n0 = n00 = EN T RY ∧ σ0 = σ00 = I. Induction step: Let the hypothesis be true for i ≤ K and assume that i + 1 ≤ K (else the proof holds vacuously). Since bσi cZ = bσi0 cZ , the edge followed from ni and n0i in τ and τ 0 have to be same. Assume that ni+1 6= n0i+1 . Let c be a common condition, with edges e1 and e2 , occurring between ni and ni+1 in τ and between n0i and n0i+1 in τ 0 . Clearly there is such a c, otherwise ni+1 would have been the same as n0i+1 . Since both traces have occurrence of l and ni+1 and n0i+1 are the first value-impacting statements on paths from e1 and e2 , the condition c ∈ V I(Υ) according to the definition. This is contrary to our assumption that ni+1 and n0i+1 are the first value-impacting statements in τ and τ 0 after ni and n0i respectively. Therefore, ni+1 = n0i+1 . Now suppose that for some variable x ∈ Z, σi+1 (x) 6= 0 σi+1 (x). Let d be statement which provides value of x at ni+1 . But then d ∈ V I(Υ). If d occurs before or at ni then it must 0 be there in τ 0 also and therefore, σi+1 (x) = σi+1 (x). If d occurs after ni then hni+1 , σi+1 i can not be the first element of τs after hni , σi i. This is contrary to our assumption and 0 therefore σi+1 (x) = σi+1 (x). Now we prove our claim that P S is a data slice. We shall show this by constructing a trace τ 0 for P S from a given trace τ of P A on an input I. This will establish that P S satisfies property (2) of data slice. Using lemma 2, we shall show that P S satisfies property (3) as well. Theorem 1: The abstract subprogram P S satisfies the property for data slice. Proof: Let τ be a trace for program P A on input I that has K ≥ 0 execution states. Let τ 0 = [hni , σi i], 0 ≤ i ≤ K, be the sub-sequence of τ such that ni , i ≥ 0 are nodes in CFG of P S . We show by induction on i that for each i ≤ K, [hni , σi i] is also the prefix of a trace for P S . Base step: i = 0. The lemma holds trivially as n0 = EN T RY . We construct an abstract subprogram P S = V I(Υ) ∪ AC(Υ) in which the conditionals in AC(Υ) appear in an abstract form. Obviously, P S retains the structure of P A with respect to all statements included in P S . We claim that P S is a data slice. To show this, we shall first prove that the value sets of Υ produced by execution of P S match those produced by P A . Induction step: Assume that the hypothesis holds for some i ≤ K. Let ni be a condition. If ni ∈ AC(Υ) then it is abstract and can take either branch. If ni ∈ V I(Υ) then by lemma 2 it will have the same value as in trace τ . So for any edge taken out of ni in τ , there is a trace of P S which takes the same edge. Lemma 2: Let τ and τ 0 be traces of programs P A and P S for an input I. Also assume that both the traces go through l at least once. Then the corresponding SC-execution states of τ and τ 0 will be the same when restricted to the variables in V. Now assume that for none of the traces of P S is the (i + 1)th node same as ni+1 . This must be because of some condition c before ni+1 , but after ni , in τ . But then c −→ ni+1 and therefore c ∈ P S . So hni+1 , σi+1 i can not be the first execution state after hni , σi i in τ 0 , a contradiction. Proof: Let τs = [hni , σi i], i ≥ 0 and τs0 = [hn0j , σj0 i], j ≥ 0 be the sequence of execution Thus, property (3) is satisfied. By lemma 2, it is obvious that property (2) is also satisfied. 1 2 3 4 5 6 7 8 9 10 11 12 13 x = z; c1 = fn1(z); c2 = fn2(z); if (c1) { if (c2) { x = z+5; t = x; } y = x; } w = x; 1 2 3 4 5 6 7 8 9 10 11 c1=fn1(x); while (c1) { x = 0; while (c2) { x = x+3; y = x; } c1=fn1(); } 1 2 3 4 5 6 7 8 9 10 11 x = 0; c1 = fn1(x); while (c1) { c2 = fn2(x); if (c2) y = x; else x = x+3; c1 = fn1(x); } (b) P7 (c) P8 (a) P6 Fig. 3: Programs to explain value-impact Fig. 5: Program dependence graphs As seen from the examples, to capture value-impact we need to consider both strong and weak control dependence. For this we make use of transitive control dependence. Fig. 4: Control flow graphs D. Computing data slice using data and control flow We now relate V I(Υ) to control and data dependence. In Figure 5, we show PDG for programs of Fig. 3. Solid, normal and dotted arrows show data dependence, strong control dependence and weak control dependence respectively. In P6 of Fig. 3, c2 is value-impacting for h11, {x}i. In terms of control-dependence, line 11 is not control dependent on c2 while the value-impacting assignment at line 8 is. For exactly similar reasons, condition c1 is value-impacting for h13, {x}i. We generalize the identified condition for a slicing criterion Υ = hl, V i as cond1 : l is not control dependent on condition c and a value-impacting statement for Υ is transitively control dependent on c. In P7, c2 is value-impacting for h7, {x}i, a slicing criterion whose program point (line 7) is strongly true-control dependent on c2. The value-impacting assignment for this criterion at line 4 is weakly false-transitively control dependent on c2. Similarly, in the case of P8, condition c2 is value-impacting for h7, {x}i and 7 is strongly true-control dependent on c2. Moreover, the value-impacting assignment at line 9 is strongly false-control dependent on c2. From these observations, we identify a second condition cond2 : l is control dependent on c and l is reachable from one edge and a value-impacting statement is reachable from other edge. We show that the disjunction of cond1 and cond2 is a necessary condition for value-impact. Thus we can use the disjunction to compute an over-approximation of value impacting conditions. We now make the following connections between transitive control dependence and weak post dominance. Claim 1: Given a condition c and a statement s, assume e that c −→ s. If there is a statement t distinct from c such that there is a path from c to s starting from the edge ē 6= e and ē going through t, then c t. Claim 2: Let c be a condition and u be a statement distinct from c such that u is the immediate post-dominator of c. If there is a statement t distinct from c and u such that there is a path from c to u starting with edge e and passing through t, e then c −→ t. We shall now establish that if a condition c is valueimpacting, then there must be another value-impacting statement which is transitively-control dependent on c. Lemma 3: Assume that for a slicing criterion Υ = hl, V i, c ∈ V I(Υ). Then one of the following holds: ∃hπ1 , π2 , ti ∈ W V I(c, Υ) : (¬(c −→ l) ∧ c −→ t), or e e2 e2 ∃hπ1 , π2 , ti ∈ W V I(c, Υ) : (c −→ l ∧ ¬(c −→ t) ∧ c 1 t). where e1 and e2 are starting edges of paths π1 and π2 respectively. Proof: Let c ∈ V I(Υ). The proof is by case analysis: Case 1: Assume ¬(c −→ l). Then there must exist u 6= c such that u is immediate post dominator of c. Since c ∈ V I(Υ), by definition 12 there are paths π1 and π2 starting from e1 and e2 and a value-impacting statement t such that at least one of the π1 and π2 should have t before u. Without loss of generality, assume that t is on π1 . Then by claim 2, c −→ t. Thus we have proved that for the witness hπ1 , π2 , ti ∈ W V I(c, Υ), ¬(c −→ l) and c −→ t. Case 2: Assume c−→l, and call the starting edge in the e2 l. chain of control dependence from c to l as e2 , i.e. c −→ From the definition of value-impacting condition, there is a path from c to l that has a statement, say t, as the first valueimpacting statement and another that does not have t as the first value-impacting statement. Now there are two cases: 1. Let the path that has t as the first value-impacting statement leave c through the edge e1 . For the kind of programs under consideration, no path from c to l can bypass e2 . Therefore t on π1 must be between e1 and e2 . Thus we have e e2 t), and by claim 1, c 1 t. The witness in this case ¬(c −→ being hπ1 , π2 , ti. Proof: Once again the proof is by induction on M LP (s, l). Base case: i = 0. s must be the augmented SKIP statement and and therefore s ∈ P B Induction step : Let the hypothesis be true for all s such that M LP (s, l) ≤ i and consider a s for which M LP (s, l) = i + 1 and s ∈ CVI (Υ ). By definition of CVI (Υ ), we have the following cases: 1) 2) 2. Now let the path that has t as the first value-impacting statement leave c through the edge e2 . Once again the path that goes from c to l through e1 must go through e2 and there must be a first value-impacting statement w between e1 and e2 w), e2 . Now we have a witness hπ1 , π2 , wi for which ¬(c −→ e1 w. and by claim 1, c 3) Based on lemma 3, we shall give criteria for computing a set of statements CVI (Υ ), (computed value-impacting statements). CVI uses data and control dependence and computes an overapproximation of VI . s is an assignment and s ∈ DU (Υ). Clearly s ∈ P B . s is assignment and ∃t ∈ CVI (Υ ) : s ∈ DU (LV (t)). Clearly M LP (t, l) ≤ i and therefore t ∈ P B . By construction of backward slice, s ∈ P B . s is a condition c, say with two edges e1 and e2 . By definition of CVI (Υ ), ∃t : t ∈ CVI (Υ ), satisfying one of the following: Case a: c −→ t ∧ ¬(c −→ l). Obviously, M LP (t, l) ≤ i and c −→ t. By the induction hypothesis, t ∈ P B . Therefore c ∈ P B . e e1 e1 Case b: c −→ l ∧ ¬(c −→ t) ∧ c 2 t. In this case c −→ l and therefore, by construction of backward slice, c ∈ P B . A statement s is in CVI (Υ ) if: 1) 2) 3) 4) s is the augmented SKIP statement at l. s is an assignment such that s ∈ DU (Υ). s is an assignment, and there is a statement t such that t ∈ CVI (Υ ) and s ∈ DU (LV (t)). s is a condition c, with two outgoing edges, labeled as e1 and e2 , and ∃t ∈ CVI (Υ ) satisfying one of the following: a) c −→ t ∧ ¬(c −→ l) e e1 e1 b) c −→ l ∧ ¬(c −→ t) ∧ c 2 t Condition 4) of CVI is motivated by lemma 3. We shall now show that CVI (Υ ) computes an over approximation of value-impacting statements V I(Υ). In subsequent proofs, we use M LP (s1 , s2 ) to denote maximum length of a loop free path in a CFG from s1 to s2 . In particular, M LP (s, s) = 0. Lemma 4: V I(Υ) ⊆ CVI (Υ ) Proof: Let s ∈ V I(Υ). We will prove the result by induction on M LP (s, l). Base step: M LP (s, l) = 0. s must be the augmented SKIP statement and therefore in CVI (Υ ). Induction step: Let the hypothesis be true for all s such that M LP (s, l) ≤ i and consider a s for which M LP (s, l) = i + 1 and s ∈ V I(Υ). If s is an assignment, then s ∈ CVI (Υ ) from definition. Let s be a condition c. Let hπ1 , π2 , ti ∈ W V I(c, Υ) satisfy the criteria of lemma 3. Obviously M LP (t, l) ≤ i. and t ∈ CVI (Υ ) by the induction hypothesis. By definition, c ∈ CVI (Υ ). We will now show that though CVI is an overapproximation of VI , it is contained within the backward slice P B. Lemma 5: CVI (Υ ) ⊂ PΥB . IV. DATA SLICE COMPUTATION As stated earlier, CVI (Υ ) provides the core set of statements of the data slice. To make the slice executable, conditions are added using one of the methods of creating abstract sub programs described before. We present an algorithm to compute CVI only; adding the abstract conditions and assignments is straightforward. As an example, the conditions c to be abstracted are given by {c | c −→ l}\CVI (Υ ). Algorithm 1 Identifying CVI conditions 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: procedure getCVIConds(t, lconds) begin R=∅ tconds = tcntrls(t) for all conditions c appearing in tconds do lsttab[T ] = (hc, T, truei ∈ lconds) lsttab[F ] = (hc, F, truei ∈ lconds) tsttab[T ] = (hc, T, truei ∈ tconds) tsttab[F ] = (hc, F, truei ∈ tconds) tswtab[T ] = (hc, T, f alsei ∈ tconds) tswtab[F ] = (hc, F, f alsei ∈ tconds) if (¬lsttab[T ] ∧ ¬lsttab[F ] ∧ (tsttab[T ] ∨ tsttab[F ])) then add c to R else if ((lsttab[T ] ∧ ¬tsttab[T ] ∧ tswtab[F ])) ∨ (lsttab[F ] ∧ ¬tsttab[F ] ∧ tswtab[T ]) then add c to R end if end if end for return R end A. Computing CVI (Υ ) In computing CVI (Υ ), the critical part is to identify conditional expressions which satisfy criteria for being in CVI . We assume that the P DG already exists with weak and strong control dependences and data dependences. Such a P DG can be computed efficiently by algorithm of Bilardi and Pingali [?]. From the PDG, for a given statement s, we can find e the set conds(s) of pairs hc, e, bi, such that c s when e b = f alse and c −→ s when b = true. Using conds(s), we can compute the set of conditions on which s is transitively control depdendent. We call this set as tcntrls(s). We do so by traversing the PDG and taking a transitive closure of conds(s). By the definition of CVI (Υ ), we need to examine only the conditions c which appear in tcntrls(t) for a given statement t. Algorithm 1 computes the set of conditions which satisfy the criteria for CVI (Υ ) for a given statement t which is already in CVI (Υ ). Lines 6 to 11 identify the kinds of transitive control dependence that t has on the outgoing edges of c. e While tsttab[e] = true means c −→ t, tswtab[e] = true means e c t. Algorithm 2 computes the complete set CVI (Υ ) using a worklist based approach. A node comes on the worklist only once. The final result is denoted by a boolean array inslice having value true for every statement included in CVI (Υ ). Algorithm 2 Computation of CVI (Υ ) 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: procedure computeCVISet(l, V) begin initialize inslice, inwl with f alse inslice[l] = true ; lconds = tcntrls(l) wl = {} duset = DU (l, V ) for all s ∈ duset do add s to wl ; inwl[s] = true end for while wl is not empty do remove next element w from wl inslice[w] = true duset = DU (LV (w)) cset = getCV ICond(w, lconds) for all s ∈ (duset ∪ cset) do if inwl[s] = f alse then add s to wl ; inwl[s] = true end if end for end while end B. Algorithm complexity Assume there are N nodes, E d data dependent edges and E c control dependent edges, giving a total of E = E d + E c edges in the PDG. In getCV IConds, computing tcntrls for the given node, will take O(E c ) time. The checks in lines 6 to 11 can be done in O(1) time with a space complexity of O(N ). Since the checks have to be made for all conditions occurring in tcntrls, the worst case complexity of getCV IConds would be O(N +E c ). In algorithm, computeCV ISet, a node goes in the worklist only once, therefore there would be maximum N invocations of getCV IConds. The worst case complexity of entire algorithm is O(E c ×N +N 2 +E d ). However in practice, the loop at line 5 in getCV IConds will be executed much fewer times than N and nodes going in worklist will also be of the size of the data slice. As a result, the algorithm’s average complexity will be O(N +E c +E d ). In contrast, the backward slice is computed in O(E) time, in worst case. Note that in both cases the time complexity is arrived at by assuming that P DG have already been built. In practice, our results have also shown that there is only a marginal increase in time in computing data slice from that taken in backward slice when compared to time taken in building the PDG itself. V. I MPLEMENTATION AND MEASUREMENTS We implemented the algorithm to compute data slices using our in-house data flow analysis framework called PRISM which is based on the JAVA platform. It can construct PDGs and can compute the conventional backward slices. It has been used for developing static analysis tools [?], [?]. We have used a context and flow sensitive points-to analysis. The backward slicing algorithm is also context sensitive and field sensitive. Thus it represents the state of the art in backward slicing. We computed data slice using condition abstraction approach which is suitable for debugging and program understanding. Although we have described our algorithm at an intraprocedural level, our implementation performs interprocedural analysis by summarising procedure calls by a sequence of assignments simulating the use-def summary of called procedure. We trigger additional slicing criteria at call points based upon the values needed at procedure entry point in a context sensitive manner. We computed data slice for these additional slicing criteria and at the end took a union of all of them. This may introduce some imprecision but is sound. Our experiments have been carried out on 3.0 GHz Intel Core2Duo processor with 2 GB RAM and 32 bit OS. Measurements were peformed on 42 modules of varying sizes of a proprietary code base of a large navigational system of an automobile. Due to space constraints, we have presented summary data of only 20 modules in Figure 6. Column (1) gives anonymized program names. Column (2) lists the number of CFG nodes. Column (3) gives number of slices computed for the program. For this purpose we randomly selected the return statements of functions returning some value as the slicing criterion. For each program, we picked up maximum ten such slicing criteria. In all, we created slices for total 391 such slicing criteria spread over 42 programs. Columns (4), (5) and (6) provide the average sizes of slices in terms of the number of nodes for backward slice (BS), data slice (DS) and control slice (CS) respectively. Columns (7), (8) and (9) provide the average sizes of slices as a percentage of the program size (as given in column (3)) for BS, DS and CS respectively. The average time taken (in seconds) in computing these slices is shown in columns (10), (11) and (12) in same order. This time includes the time taken for constructing PDGs. Figure 7 shows the distribution of sizes of slices in terms of percentage of program sizes through a graph. The X axis shows the size of the slice and Y axis shows the percentage of slicing criteria exhibiting that size. In the figure, BS, DS and CS stand for backward slice, data slice and control slice respectively. It is clear that in more than 60% of the cases, the size of a data slice is smaller than 10% of the code size. Besides, the time Program (1) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Overall Size (nodes) (2) 1063 1183 2944 881 1607 2246 2493 2635 2992 1625 3413 3105 4452 5236 2616 3883 802 8116 6746 11104 number of slices (3) 10 10 10 10 10 10 5 10 9 10 10 5 1 1 10 10 10 10 10 10 Avg. Size (in BS DS (4) (5) 229 60 266 123 360 257 148 62 226 137 447 348 167 81 842 257 437 149 190 94 733 341 571 412 369 70 982 25 948 761 1202 180 92 56 3489 1637 1928 1558 4096 1214 nodes) CS (6) 227 240 236 148 203 444 163 842 429 178 728 563 317 982 945 1202 90 3143 1923 4053 Avg Size as % of program BS DS CS (7) (8) (9) 21.63 5.65 21.37 22.49 10.43 20.36 12.26 8.75 8.03 16.89 7.12 16.81 14.08 8.55 12.65 19.93 15.49 19.79 6.70 3.26 6.54 31.98 9.79 31.97 14.63 5.01 14.34 11.70 5.84 10.98 21.50 10.01 21.35 18.41 13.29 18.13 8.29 1.57 7.12 18.75 0.48 18.75 36.27 29.12 36.15 30.97 4.64 30.96 11.48 7.01 11.28 42.99 20.18 38.73 28.58 23.10 28.51 36.89 10.94 36.50 24.89 10.66 24.04 time in seconds BS DS CS (10) (11) (12) 26.33 26.34 26.32 32.05 32.07 32.04 38.15 38.21 38.13 60.43 60.47 60.42 39.46 39.51 39.45 56.47 57.24 56.45 51.45 51.48 51.42 44.20 44.31 44.19 52.67 52.76 52.65 63.80 63.83 63.79 92.74 92.97 92.70 71.41 89.70 71.35 102.29 102.27 102.26 116.92 116.47 116.53 208.23 230.40 208.24 215.99 216.14 215.97 53.85 53.86 53.84 447.69 512.58 447.30 272.10 293.40 271.74 301.26 322.31 301.13 Fig. 6: Average slice sizes and computation time the slicing criterion rather than the value computed. It is not surprising then that the size of a control slice is comparable to that of the corresponding backward slice in majority of the cases. The average size of control slice turns out to be of 24.4% of program size which is comparable to the size of backward slice (24.89%). VI. C ONCLUSION Different applications of program understanding require different combinations of influences governing data computations and control flow. For example, in the case of debugging for wrong output values, the influences governing the reachability of the statement of interest are irrelevant. Fig. 7: Slice size distribution. X-axis shows slice size as percentage of program size and Y-axis shows percentage of slicing criteria for which this size was observed. required to compute a data slice is comparable to the time taken for computing a backward slice. Note that the average size of backward slices is 25% of the code size which matches the observation by Binkley et al. [?]. suggesting our slices are comparable in precision. Average size of data slice is found to be 10% of the code size. Given such a reduction, data slices may be very helpful in debugging, property checking and program understanding. This data corroborates our intuition that most statement are included in a backward slice because they influence the reachability of It follows that separating the influences of data and control in a backward slice by constructing separate data and control slices is an effective way of producing smaller programs for debugging, program understanding and property checking. In the case of debugging for wrong output values, a data slice provides a much smaller piece of code to investigate than that provided by a backward slice for the same slicing criterion. We have provided formal definitions of data and control slices, defined algorithms to compute them, have shown the soundness of the algorithms, and have presented the results of our empirical experiments. Our measurements show that a data slice is indeed much smaller than the corresponding backward slice and is computable in comparable time. In future, we would like to investigate the minimality of data slices and efficient algorithms to compute them. We would also like to explore the effectiveness of data slices for much larger programs.
6cs.PL
OPTIMIZING SYNCHRONIZATION ALGORITHM FOR AUTO-PARALLELIZING COMPILER arXiv:1211.4101v3 [cs.DC] 1 Mar 2013 Gang Liao, Si-hui Qin, Long-fei Ma, Qi Sun Department of Computer Science and Engineering, Sichuan University Jinjiang College, China, Pengshan, 620860. [email protected], [email protected], [email protected], [email protected] ABSTRACT In this paper, we focus on the need for two approaches to optimize producer and consumer synchronization for autoparallelizing compiler. Emphasis is placed on the construction of a criterion model by which the compiler reduce the number of synchronization operations needed to synchronize the dependence in a loop and perform optimization reduces the overhead of enforcing all dependence. In accordance with our study, we transform to modify and eliminate dependence on iteration space diagram (ISD), and carry out the problems of acyclic and cyclic dependence in detail. we eliminate partial dependence and optimize the synchronize instructions. Some didactic examples are included to illustrate the optimize procedure. KEY WORDS auto-parallelizing, compiler, synchronization, dependence analysis 1 Introduction During the past decade, the field of compiling for parallel architecture has exploded with widespread commercial availability of multicore processors [1][2]. Research has focused on several goals, the major concern being support for auto-parallelizing. The goal of auto-parallelizing is compiling an invariant and unannotated sequential program into a parallel program [3]. Although in recent years most attention has been given to support for languages with parallel annotations (i.e. OpenMP [4] allow programmer to manually hint compiler about parallel regions.), the parallelization of legacy code still has a profound historical significance. The Parafrase system [5] is the first automatic parallelize compiler based on dependence analysis, which was developed at the University of Illinois. The most ambitious for parafrase was to find out how to develop architecture to exploit the latent parallelism in off-the-shelf dusty deck programs [6]. By using producer/consumer synchronization (e.g. the Alliant F/X8 [8] [9] implemented synchronization instructions), this ordering can be forced on the program execution, allowing parallelism to be extracted from loops with dependence. In this paper, We focus on the parallelization of legacy code and optimizing producer/consumer synchronization via two approaches in auto-parallelizing compiler. We pro- Source Code Parser and lexical analysis Dependence and other analysis Dependence breaking transformations Intermediate representation (symbol table, control flow, call graph, representation of statements) Parallel Program Low level optimization and code generation Other high level optimizations Parallelization activities Figure 1. High-level structure of a parallel compiler ceed as follows. First, in section 2, we present the compiler fundamentals and the target architecture. In order to understand the latter section, we introduce some concepts of auto-parallelizing compiler so as to be acquainted with jargons. In additional, for clarity and brevity are served by directing the discussion towards a single architecture. In section 3, in order to understand how parallelism can be extracted from cyclic loops using producer/consumer synchronization, we must discuss how to extract parallelism when the dependence graph may be cyclic and loop freezing cannot be used to break the cycles. In section 4, we show how to reduce and optimize the number of synchronization instructions used to synchronize a loop. 2 The Compiler Fundamentals and Target Computer In order to relieve programmers from the tedious and errorprone manual parallelize process, the compiler need automatic convert sequential code into multi-threaded or vectorization code to utilize multiple processors simultaneously in a shared-memory multiprocessors machine. 2.1 Automatic Parallelize Compiler Fundamentals The high level flow of a compiler is shown in Figure.1. The actual phases of the compiler are shown as the centre, as well as inputs and intermediate files are shown as rounded boxes. In fact, the source program may be a binary file, used in binary instruments and binary compilers [11]. In general, a Java or Python source-to-byte code compiler would convert the binary file to the bytecode file which contains analysis information for the compilation unit included, to the further dependence analysis on a compilation unit. A compilation unit is lexically analyzed and parsed by the compiler. The lexical analysis and parsing are not studied in this paper. A discussion of detailed techniques for compiler can be found in [12] (e.g. regular expression, deterministic finite automata, non-deterministic finite automata). The result of the parser is an intermediate representation (IR), which is regarded as an abstract syntax tree and a graphical representation of the parsed program. We will modify this slightly and represent programs as a control f low graph (CFG). In a control flow graph, each node bi ∈ B is basic block. There are, in most presentations, two specially designated blocks: the entry block, through which control enters into the flow graph, and the exit block, through which all control flow leaves. Where an edge bi → bj means that bi may execute directly before bj . In additional, A CFG are sometimes converted to static single assignment (SSA) form [13]. Dependence analysis determines whether or not it is safe to reorder or parallel statements. In general, control dependence (S1 δ c S2 ) is a situation in which a program’s instruction executes if the previous instruction evaluates in a way that allows its execution. A data dependence (S1 δ f S2 , S1 δ a S2 , S1 δ o S2 , S1 δ i S2 ) arises from two statements which access or modify the same resource [7]. Loop dependence analysis is mostly done to find ways to do auto-parallelizing, which is the task of determining whether statements within a loop body form a dependence, with respect to array access and modification, induction, reduction and private variables, simplification of loop-independent code and management of conditional branches inside the loop body. 2.2 Shared Memory Multiprocessors Machine In order to clarity and brevity, the target computer assumed throughout this paper is a shared memory multiprocessor. In these systems, the processing elements can access any of the global memory modules through an interconnection network and code executes serially on each processor, and parallelism is realized by the simultaneous execution of different iterations of a loop on different processors. In the shared memory version of the program, each thread executes a subset of the iteration space of a parallel loop. The Cartesian space define slightly the boundary of the loop for the loop’s iteration space. In Figure.2 an example of scheduling and execution of a shared memory program is shown. However, all large machines for high-performance numerical computing have a physically distributed memory architecture. The distributed memory machines consist of nodes connected to one another by using Ethernet or a variety proprietary interfaces. Here, We presented a short, informal discussion of compiler fundamentals and shared memory multiprocessor machine. The interested reader will find a more complete discussion in [12][14]. In the latter section, the details Work Queue Loop, a, n, 1, 25, ThreadID Parallelism execute with four threads Loop, a, n, 26, 50, ThreadID Loop, a, n, 51, 75, ThreadID Loop, a, n, 76, 100, ThreadID Queue empty execute with one thread Figure 2. Scheduling and execution of a shared memory program of producer/consumer synchronize optimizations would be discussed in this paper. 3 Acyclic and Cyclic Dependence Analysis Most of the transformations in this paper are based on the concept of dependence between statements. In a sequential program, the statement instance Sbj is f low dependence on the statement instance Sai (Sai δ f Sbj ) if Sai assigns a value to a variable that may later be read by Sbj . Sbj is antidependence on Sai (Sai δ a Sbj ) if Sai fetches from a variable that may be later written by Sbj . Sbj is output dependence on Sai (Sai δ o Sbj ) if Sai modifies a variable that may be later modified by Sbj . Sbj is control dependence on Sai (Sai δ c Sbj ) if Sai is control construct, and whether Sbj executes or not depends on the outcome of Sai . The more detailed discussion can be found in [15] [16]. In order to parallel loops with acyclic and cyclic dependence graphs, Samuel P. Midkiff summarized the following steps will be performed [17]. A dependence graph would be constructed for the loop nest; Find strongly connected components (SCC) formed by cycles of dependence in the graph, contract the nodes in the SCC into a single large node; (Note: a directed graph is called components of strongly connected if there is a path from each vertex in the graph to every other vertex.) Mark all nodes in the graph containing a single statement as parallel; All inter-node dependence are lexically forward via topologically sort; Group independent, unordered, nodes reading the same data and marked as parallel into new nodes to optimize data reuse; Carry out loop fission to constitute a new loop for each node; Mark as parallel all loops resulting from nodes whose statements are marked as parallel in the sorted graph; These steps will be explained in detail by means of an example in the remainder of this section. 3.1 Parallelizing Loops with Acyclic A program with the dependence graph for a loop, as shown in Alg.1. The acyclic dependence graph for the program is illustrated in Fig.3 (a). The ∆ defines the dependence distance (e.g. given a dependence Sai δSbj between instances, ∆ = j−i). The node at the tail of a dependence arc is the dependence source(Sa ), and at the head of the arc is the dependence sink (Sb ). In order to topologically sorting the dependence graph, all dependence must be lexically f orward (∆ >= 0. i.e. in branchless code the sink of the dependence is lexically forward of the source of the dependence). The canonical application of topological sorting is in scheduling a sequence of jobs or tasks based on their dependencies. A topological ordering is possible if and only if the graph has no directed cycles, that is, if it is a directed acyclic graph (DAG). Any DAG has at least one topological ordering, and the algorithm are known for constructing a topological ordering of any DAG in linear time. The more detailed algorithm can be found in [18]. Algorithm 1 A program with dependence. for i = 1; i < n; i + + do S1 : a[i] ← b[i − 1] + ...; S2 : b[i] ← c[i − 1] + ...; S3 : ... ← a[i − 1] + b[i] ∗ d[i − 2]; S4 : d[i] ← b[i − 2] − ...; end for Simultaneously, since code executes serially on a given processor, and therefore within an iteration of a loop, only dependence with a distance greater than zero (∆ >= 0) need to be synchronized explicitly. After the topological sorted, the dependence graph Fig.3 (a) is transformed to the Fig.3 (b). There are several possible ordering of the nodes resulting from a topological sort, that’s one valid order. After that, the loop can be fully parallelized by breaking up the loop with dependence into multiple loops, none of which contain the source and sink of a loop carried (cross-iteration) dependence. The loop is transformed by reordering the statements to match the topological sort order, just like Alg.2. The program Alg.2 is a more efficient parallelization that can be performed by a different partitioning of statements among loops that is still consistent with the ordering implied by the topological sort. In additional, the more efficient partitioning keeps statements that are not related by a loop-carried dependence together in the same loop. It called loop f ission (also called loop distribution in the literature [19]). Acyclic portions of the dependence graph may be sorted so that dependence are lexically forward, with a legal fission then being possible. In the program Alg.2, S1 and S4 can remain in the same loop which is no loop-carried dependence. That is, the program with a statement ordering yielding slightly better locality, just like Alg.3. S1 S2 S2 S1 S3 S4 S4 S3 (a) (b) Figure 3. (a) The dependence graph for the program. (b) The dependence graph after it has been topologically sorted. Algorithm 2 The program is transformed to reflect the order of the topologically sorted dependence graph for parallel i = 1; i < n; i + + do S2 : b[i] ← c[i − 1] + ...; end for for parallel i = 1; i < n; i + + do S1 : a[i] ← b[i − 1] + ...; end for for parallel i = 1; i < n; i + + do S4 : d[i] ← b[i − 2] − ...; end for for parallel i = 1; i < n; i + + do S3 : ... ← a[i − 1] + b[i] ∗ d[i − 2]; end for Algorithm 3 The program is transformed to reflect the order of the topologically sorted dependence graph and loop fission (invariant)... for parallel i = 1; i < n; i + + do S1 : a[i] ← b[i − 1] + ...; S4 : d[i] ← b[i − 2] − ...; end for (invariant)... i = 1 S1 2 S1 3 S1 4 S1 S2 S3 S2 S3 (a) (b) S2 Figure 4. (a) A dependence graph with SCC contracted into nodes. (b) A pipelined execution of the SCC across three threads. S3 S2 S3 3.2 Parallelizing Loops with cyclic Cyclic dependence graphs with at least one loop-carried dependence, and the statement will form a SCC in the dependence graph. The most straightforward way to deal with the statement in each SCC is to place in a loop that is executed sequentially. Another way of extracting parallelism from these loops is to execute the SCC in a pipelined fashion. An example of this is shown in Fig.4. This is called decoupled sof tware pipelining, and is described in detail in [20]. In latter section 4, we show how parallelism can sometimes be extracted from these loops using producer − consumer synchronization, and optimizing producer − consumer synchronization. 4 Optimizing Synchronization Algorithm There is no guarantee the order that parallel program execute on the different threads will enforce the dependence. However, by using producer/consumer synchronization, this ordering can be forced on the program execution, allowing parallelism to be extracted from loops with dependence. In the 1980s and early 1990s, several forms of producer/consumer synchronization were implemented (e.g. full/empty synchronization, implemented in the Denelcor HEP [21]). The Alliant F/X 8 [8] [9] implemented the advance(r, i) and await(r, i) synchronization instructions. In 1987, Samuel P. Midkiff discussed the compiler algorithms for synchronization [22]. He explained with, quit, test, testset, wait, and set instructions in detail. In this section, compiler exploitation of both of these synchronization instruction, and general producer/consumer synchronization, can be discussed in terms of send and wait synchronization. The wait(regs, i, vars) waits until the value of regs is i. The Figure 5. the iteration space of the loop of Alg.4. send(regs, i, vars) writes the value i to regs, where i is the loop index variable, regs is the synchronization register used for dependence δ, and vars contains the variables involved whose dependence is being synchronized. The send and wait instructions also have a functionality equivalent to a f ence instruction, which would ensure that result of all memory accesses before the send and wait are visible before the send or wait competes, and the hardware doesn’t move instructions past the synchronization operation at run time. 4.1 Insert Synchronize Instruction Set Due to the dependence graph, a compiler can synchronize a program directly. In order to a deep understanding, there is an example of using producer/comsumer synchronization, and the program is simplified as Alg.4. If you observe keenly, it’s easy to find out the dependence graph for the program (i.e. δ f , ∆a = 1; δ f , ∆b = 2; δ f , ∆c = 1). Algorithm 4 A loop with cross-iteration dependence. for i = 1; i < n; i + + do S1 : a[i] ← b[i − 1] + ...; S2 : b[i] ← c[i − 1] + ...; S3 : c[i] ← b[i − 2] + a[i − 1]; end for When we know the dependence distance from the dependence graph, the iteration space of the loop of the program can be illustrated in Figure.5. The iteration space can make ensure the location of the synchronize instructions. As you see, the green dotted line denotes the δ f , ∆a = 1, the brown dotted line denotes the δ f , ∆b = 2, and the solid line denotes δ f , ∆c = 1. After the source of dependence δ, it inserts the instruction send(regsδ , i, vars). Before each dependence sink, the compiler inserts the instruction wait(regsδ , i − dj , vars), where di is the distance of the dependence on the i loop. The loop of the program synchronized with send/wait synchronization has be shown in Alg.5. Algorithm 5 A loop of the program synchronized with send/wait synchronization. for i = 1; i < n; i + + do S1 : a[i] ← b[i − 1] + ...; send(0, i, a); wait(2, i-1, c); S2 : b[i] ← c[i − 1] + ...; send(1, i, b); wait(1, i-2, b); wait(0, i-1, a); S3 : c[i] ← b[i − 2] + a[i − 1]; send(2, i, c); end for The reasons that producer/consumer synchronization instructions aren’t supported in hardware anymore shows that impact that technology and economics dependent on what is a desirable architectural [23]. Specialized synchronizing instructions fell out of favor because of the increased latencies required when synchronizing across the system bus between general purpose processors, and because the RISC principles of instruction set design [24] favored simpler instructions from which send and wait instructions could be built, albeit at a higher run time cost. Except for questions of profitability, the compiler strategy for inserting and optimizing synchronization is indifferent to whether it is implement in software or hardware. These optimizes will be explained in detail in the remainder of this section. 4.2 Two Approaches to Optimize Synchronization Sometimes a compiler may reduce the number of synchronization operations needed to synchronize the dependence in a loop. However, all dependence must be enforced, So this optimization reduces the overhead of enforcing them by allowing a single send/wait pair to synchronize more than one dependence, or a combination of send/wait instructions to synchronize additional dependence. There is a loop with dependence to be synchronized in Alg.6 Algorithm 6 A loop with dependence to be synchronized. for i = 1; i < n; i + + do S1 : a[i] ← ...; S2 : b[i] ← c[i − 1] + ...; S3 : c[i] ← a[i − 2]; end for The loop with two dependence, include δ f , ∆a = 2 i = 1 S1 2 S1 3 S1 4 S1 S1 S2 S2 S2 S2 S2 S3 S3 S3 S3 S3 5 Figure 6. the ISD for the loop of Alg.6. and δ f , ∆c = 1. The iterationspacediagram(ISD) of Figure.6 shows the dependence to be enforced as the blue solid lines or the green dashed lines, and execution orders implied by the sequential execution of the program by the brown dashed lines. The section outlined with dotted box is representative of a section of the ISD that is examined by the algorithm of [10] that eliminates dependence using transitive reduction. Let Sj (k) represent the instance of statement Sj in iteration i = k. Consider the dependence with distance two from statement S1 in iteration i = 2 to statement S3 in iteration i = 4. There is a path S1 (2) → S2 (2) → S3 (2) → S2 (3) → S3 (3) → S2 (4) → S3 (4) from S1 in iteration 2 to S3 in iteration 4, just like the black lines in the dotted box. If the dependence from S3 to S2 has been synchronized, then the existence of this path of enforced orders implies that the dependence from S1 (2) to S3 (4) is also enforced. Due to the distances are constant, the iteration space can be covered by shifting the region in the dashed lines, So every instance of the dependence within the iteration space is synchronized. Samuel P. Midkiff had already shown that perform a transitive reduction on the ISD [10]. It’s possible for multiple dependence to work together to eliminate another dependence. The transitive reduction is performed on the ISD, which needs to only contain a subset of the total iteration space (i.e. the case as shown by the dotted box in Figure.6). For each loop in the loop nest over which the synchronization elimination is taking place, the number of iterations needed in the ISD for the loop is equal to the least product of the unique prime factors of the dependence distance, plus one. Another synchronization elimination approach [25] is based on pattern matching and works even if the dependence distance are not constant. The matched patterns identify dependence whose lexical relationship and distance are such that synchronizing one dependence will synchronize the order by forming a path as shown in Figure 6 (i.e. the black lines in the dotted box). In the program of Alg.6, let the forward dependence with a distance of two that is to be eliminated be δe , and the backward dependence of distance one be δ1 that is used to be eliminated the other dependence be δr . There is one pattern as follows: [4] L Dagum, R Menon. OpenMP: an industry standard API for shared-memory programming. Computational Science & Engineering, IEEE. Jan-Mar 1998. i A path from the source of δe to the source of some δr . ii The sink of δr reaches the sink of δe . iii δr is lexically backward (i.e. the sink precedes the source in the program flow). iv The absolute value of the distance of δr is one. v The signs of the distances of δe and δr are the same, then δe can be eliminated. The conditions of i and ii establish the proper flow of δe and δr , the iii recognizes that δr can be repeatedly executed to reach all iterations that are multiple of the distance away from the source. The iv and v show that because the absolute value of the distance is one and the signs of the two distances are equal the traversal enabled by the iii will reach the source of δe . 5 Conclusion We have studied the way of the send and wait instructions to synchronize loops. We have given general strategies for treating branches within a loop being synchronized, and present two approaches to reduce and optimize the number of producer/consumer synchronization instructions in the shared-memory multiprocessors machine. In general, when synchronized the version of parallel program, there are four steps need to be enforced. First, a dependence graph is illustrated with respect to the program. Second, depending on the structure of the dependence graph and the relative costs of the different synchronization methods on a target machine, Picking a synchronization method to synchronize the loop. Third, synchronize instructions are inserted, and it makes sure that the cross-iteration dependence can be enforced. Finally, eliminating partial dependence and optimizing the synchronize instructions. Auto-parallelizing compiler can perform all of these steps automatically, which relieve programmers from the tedious and error-prone manual parallel process. References [1] J. M. Tendler, J. S. Dodson, J. S. Fields, Jr., H. Le, and B. Sinharoy. POWER4 system microarchitecture. IBM Journal of Research and Development 46 (1): 526. 2002. [5] D. J. Kuck, R. H. Kuhn, D. A. Padua, B. Leasure, and M.Wolfe. Dependence graphs and compiler optimizations. In ACM Conference on the Principles of Programming Languages, pages 207-218, 1981. [6] David J. Kuck. A Survey of Parallel Machine Organization and Programming. ACM Computing Surveys CSUR, vol. 9, no. 1, pp. 29-59, 1977 [7] Randy Allen, Ken Kennedy. Optimizing Compilers for Modern Architectures: A Dependence-based Approach. Morgan Kaufmann. ISBN 1-55860-286-0. 2001. [8] J. Test, M. Myszewski, and R. Swift. The alliant fx/series: A language driven architecture for parallel processing of dusty deck fortran. In J. de Bakker,A.Nijman, and P.Treleaven, editors, PARLE Parallel Architectures and Languages Europe, volume 258 of Lecture Notes in Computer Science, pages 345C-356. Springer Berlin / Heidelberg, 1987. [9] W. A. Abu-Sufah and A. D. Malony. Vector processing on the Alliant FX/8 multiprocessor. In Proceedings of the International Conference on Parallel Processing, pages 559-566, 1986. [10] S.P.Midkiff and D.A.Padua. Compiler generated synchronization for do loops. In Proceedings of the International Conference on Parallel Programming (ICPP), pages 544-551, 1986. [11] M. Bach, M. Charney, R. Cohn, T. Devor, E. Demikovsky, K. Hazelwood, A. Jaleel, C.-K. Luk, G. Lyons, H. Patil, and A.Tal. Analyzing parallel programs with pin. IEEE Computer, 43(3):34-41, March 2010. [12] Alfred V.Aho, Monica S.Lam, Ravi Sethi, and Jeffrey D.Ullman. Compilers Pricinples, Techniques, & Tools 2nd ed, ISBN 978-7-111-32674-8, 2006. [13] R. Cytron, J. Ferrante, B.K. Rosen, M.N.Wegman, and F. K.Zadeck. An efficient method of computing static single assignment form. In ACM Conference on the Principals of Programming Languages, pages 2535, 1989. [2] Swinburne, Richard. Intel Core i7 - Nehalem Architecture Dive. 5 - Architecture Enhancements. 2008. [14] John L. Hennessy, David A. Patterson. Computer Architecture: A Quantitative Approach 5th ed, ISBN 9787-111-36458-0, 2012. [3] D. F. Bacon, S. L. Graham, and O. J. Sharp. Compiler transformations for high-performance computing. ACM Comput. Surv., 26:345-420, December 1994. [15] D. A. Padua, D. J. Wolfe. Advanced compiler optimizations for supercomputers, Commum. ACM, vol. 29, pp. 1184-1201, Dec. 1986. [16] M.J.Wolfe. Optimizing supercompilers for supercomputers, Ph.D. dissertation, Univ. Illinois, UrbanaChampaign, DCS Rep. UIUCDCS-R-82-1105, Oct. 1982. [17] Samuel P. Midkiff. Automatic Parallelization: An Overview of Fundamental Compiler Techniques, Morgan & Claypool, Feb, 2012 [18] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein. Introduction to Algorithms 3ed, The MIT Press, pp. 612-615, ISBN 978-0-262-533058, 2009 [19] M. Wolfe. High performance compilers for parallel computing. Addison-Wesley Publishing Company, 1996. [20] E. Raman, G. Ottoni, A. Raman, M. J. Bridges, and D. I. August. Parallel-stage decoupled software pipelining. In Proceedings of the 6th annual IEEE/ACM International Symposium on Code generation and optimization, CGO 08, pages 114-123, New York, NY, USA, 2008. [21] J. S. Kowalik. Parallel MIMD computation. The HEP supercomputer and its applications. MIT Press, 1985. [22] Samuel P. Midkiff: Compiler Algorithms for Synchronization. IEEE Transctions On Computers, Vol. C36, No.12, 1987 [23] E. B. III and K. Warren. The 1991 MPCI yearly report: The attack of the killer micros. Technical report,Lawrence LivermoreNational Laboratory, 1991. [24] D. A. Patterson, C. H. Sequin. RISC I: a reduced instruction set VLSI computer. In 25 years of the International Symposia on Computer Architecture, ACM., pp. 216C230, New York, NY, USA, 1998. [25] Z. Li and W. A. Abu-Sufah. A technique for reducing synchronization overhead in large scale multiprocessors. In Proceedings of the International Symposia on Computer Architecture, pages 284C291, 1985.
6cs.PL
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 PERFORMANCE ANALYSIS OF NEURAL NETWORK MODELS FOR OXAZOLINES AND OXAZOLES DERIVATIVES DESCRIPTOR DATASET Doreswamy and Chanabasayya .M. Vastrad Department of Computer Science Mangalore University , Mangalagangotri-574 199, Karnataka, India ABSTRACT Neural networks have been used successfully to a broad range of areas such as business, data mining, drug discovery and biology. In medicine, neural networks have been applied widely in medical diagnosis, detection and evaluation of new drugs and treatment cost estimation. In addition, neural networks have begin practice in data mining strategies for the aim of prediction, knowledge discovery. This paper will present the application of neural networks for the prediction and analysis of antitubercular activity of Oxazolines and Oxazoles derivatives. This study presents techniques based on the development of Single hidden layer neural network (SHLFFNN), Gradient Descent Back propagation neural network (GDBPNN), Gradient Descent Back propagation with momentum neural network (GDBPMNN), Back propagation with Weight decay neural network (BPWDNN) and Quantile regression neural network (QRNN) of artificial neural network (ANN) models Here, we comparatively evaluate the performance of five neural network techniques. The evaluation of the efficiency of each model by ways of benchmark experiments is an accepted application. Cross-validation and resampling techniques are commonly used to derive point estimates of the performances which are compared to identify methods with good properties. Predictive accuracy was evaluated using the root mean squared error (RMSE), Coefficient determination(  ), mean absolute error(MAE), mean percentage error(MPE) and relative square error(RSE). We found that all five neural network models were able to produce feasible models. QRNN model is outperforms with all statistical tests amongst other four models. KEYWORDS Artificial neural network, Quantitative structure activity relationship, Feed forward neural network, back propagation neural network 1. INTRODUCTION The use of artificial neural networks (ANNs) in the area of drug discovery and optimization of the dosage forms has become a topic of analysis in the pharmaceutical literature [1-5]. Compared with linear modelling techniques, such as Multi linear regression (MLR) and Partial least squares (PLS) , ANNs show better as a modelling technique for molecular descriptor data sets showing non-linear conjunction, and thus for both data fitting and prediction strengths [6]. Artificial neural network (ANN) is a vastly simplified model of the form of a biological network[7] .The fundamental processing element of ANN is an artificial neuron (or commonly a neuron). A DOI : 10.5121/ijist.2013.3601 1 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 biological neuron accepts inputs from other sources, integrate them, carry out generally a nonlinear process on the result, and then outputs the last result [8]. The fundamental benefit of ANN is that it does not use any mathematical model because ANN learns from data sets and identifies patterns in a sequence of input and output data without any previous assumptions about their type and interrelations [7]. ANN eliminates the drawbacks of the classical ways by extracting the wanted information using the input data. Executing ANN to a system uses enough input and output data in place of a mathematical equation[9]. ANN is a good alternative to common empirical modelling based on linear regressions [10]. ANNs are known to be a powerful methodology to simulate various non-linear systems and have been applied to numerous applications of large complexity in many field including pharmaceutical research, engineering and medicinal chemistry. The promising uses of ANN approaches in the pharmaceutical sciences are widespread. ANNs were also widely used in drug discovery, especially in QSAR studies. QSAR is a mathematical connection between the chemical’s quantitative molecular descriptors and its inhibitory activities [11-12] Five Different types of neural network models have been developed for the development of efficient antitubercular activity predicting models. Those models are Single hidden layer feed forward neural network (SHLFNN)[13],Gradient Descent Back propagation neural network (GDBPNN)[14,24], Gradient Descent Back propagation with momentum neural network (GDBPMNN)[15-16],Back propagation with Weight decay neural network (BPWDNN)[17],Quantile regression neural network (QRNN) [18]. The purpose of this research work and research publication is to assign five distinct neural network models to the prediction of antitubercular activities of Oxazolines and Oxazoles derivatives descriptor dataset. Method and along with estimate and asses their performances with regard to their predicting ability. One of the goals of this scientific research project is to show how distinct neural network models can be used in predicting antitubercular activities of Oxazolines and Oxazoles derivatives descriptor dataset. It again involves inducing the best model in terms of the least errors produced in the graphical study describing the actual and predicted antitubercular activities. 2. MATERIALS AND ALGORITHAMS 2.1 The Data Set The molecular descriptors of 100 Oxazolines and Oxazoles derivatives [19-20] based H37Rv inhibitors analyzed. These molecular descriptors are produced using Padel-Descriptor tool [21]. The dataset includes a different set of molecular descriptors with a broad range of inhibitory activities versus H37Rv. This molecular descriptor data set includes 100 observations with 234 descriptors. Before modelling, the dataset is ranged. 2.2 Single hidden layer feed forward neural network (SHLFNN) The clearest form of neural network is one among a single input layer and an output layer of nodes. The network in Figure 1 represents this type of neural network. Strictly, this is mentioned to as a one-layer feed forward network among two outputs on account of the output layer is the alone layer with an activation computation. 2 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 Figure 1. A Single Hidden Layer Feed Forward Neural Network In this single hidden layer feed forward neural network, the network's inputs are directly connected to the output layer nodes, Z and Z . The output nodes use activation functions g and g  to yield the outputs Y1 and Y2 . Because  =   ,  =    =   and  =    =     +     , ,   +    =   ,  +   +   1 2 When the activation functions g and g  are similar activation functions, the single hidden layer feed forward neural network is similar to a linear regression model. Likewise , if g and g  are logistic activation functions, then the single hidden layer feed forward neural network is similar to logistic regression. Because of this comparison between single hidden layer feed forward neural networks and linear and logistic regression, single hidden layer feed forward neural networks are not often used in place of linear and logistic regression. 2.3 Gradient Descent Back Propagation Neural Network(GDBPNN) Gradient Descent Back propagation neural network is one of the most engaged ANN algorithms in pharmaceutical research. GDBPNN are the nearly general type of feed-forward networks. Figure 2 displays an back propagation neural network which has three types of layers: an input layer, an output layer and a hidden layers. 3 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 Figure 2. A Back propagation (BP) neural network Nodes(neurons) in input layer only act as buffers for delivering the input data x i = 1,2 … . n) to nodes in the hidden layer. Each processing node $ (Figure 3) in the hidden layer sums up its input data  after weighting them with the strengths of the particular connections %& from the input layer and calculates its output '& as a function ( of the sum. '& = ()∑+ %&  , 3 Activation function ( that is generally selected to be the sigmoid function. Figure 3. Specification of the perceptron process The output of nodes in the output layer is calculated similarly. The backpropagation gradient descent algorithm, is the most generally approved Multi Layer Perciptron training algorithm. It provides to alter ∆w0 the weight of a connection between nodes i and j as accordingly: ∆w0 = 12&  4 Where 1 is a parameter termed the learning rate and δ0 is a factor depending on whether node $ as an input node or a hidden node. For output nodes , 2& = )5(⁄5 78& , 9'& − '& < : 5 4 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 and for hidden nodes 2& = )5(⁄5 78& , > ? %&? 2? @ 6 In Eq. (5) , 78& is the aggregate weighted sum of input data to nodes $ and '& is the target output for node $. As there are no target outputs for hidden nodes ,in Eq. (6) , the variation between the target and measured output of a hidden nodes $ is put back by the weighted aggregate of the 2? terms at present obtained for nodes B linked to the output of node $ The method starts with the output layer , the 2 term is calculated for nodes in entire layers and weight updates detected for all links, repetitively. The weight updating method can happen after the presentation of each training observation (observation-based training) or after the presentation of the whole set of training observations. Training epoch is achieved when all training patterns have been introduced once to the Multilayer Perceptron. : 2.4 Gradient Descent Back Propagation with Momentum Neural Network (GDBPMNN) Gradient descent back propagation with momentum neural network (GDBPMNN) algorithm is widely used in neural network training, and its convergence is discussed. A momentum term is often added to the GDBPNN algorithm in order to accelerate and stabilize the learning procedure in which the present weight updating increment is a mixture of the current gradient of the error function and the prior weight revising increment. Gradient decent back propagation with momentum allows a neural network to respond not only to the local gradient, but also to recent tendency in the error surface. Momentum allows the neural network to ignore small features in the error surface. Without momentum a neural network may get stranded in a shallow local minimum. With momentum a network can move through such a least. Momentum can be combined to GDBPNN method learning by building weight alters balance to the sum of a portion of the final weight modification and the new modification advised by the GDBP rule. The importance of the response that the last weight modification is admitted to have is negotiated by a momentum constant,  , which can be any number between 0 and 1. When the momentum constant is 0 a weight modification is based only on the gradient. When the momentum constant is 1 the new weight modification is set to balance the last weight modification and the gradient is plainly neglected. ∆% & C + 1 = 12&  + ∆% & C 7 where ∆% & C + 1 and ∆% & C are weight alters in epochs C + 1and C, suitable way[24]. 2.5 Back propagation with Weight Decay Neural Network (BPWDNN) Back propagation of error gradients for back propagation neural networks has proven to be useful in layered feed forward neural network training. Still, a wide number of repetitions is commonly required for changing the weights. The problem becomes more critical especially when a high level of accuracy is required. The complexity of a back propagation neural network can be regulated by a hyper-parameter called “weight decay” to penalize the weights of hidden nodes. 5 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 The employ of weight decay can both assist the optimization deals with and prevent the over fitting. This type of method to encourage the learning algorithm to find solutions which use as few weights as possible. The simplest modified error function can be formed by summing to the initial error function a term relative to the sum of squares of weights: E =E +F & % & 8 where E is the initial error function (sum of the squared differences between actual and predicted output values), λ is a minute positive constant which is employed to govern the addition of the second term , and w0 is the weight of the link between node j and of a layer and node i of the at once higher indexed layer. The above error function penalizes the use of more % & ‘s than essential. In order to demonstrate that, lets see how the weight updating rule is changed. Assuming that we apply the gradient descent algorithm to minimize the error, the changed weight update method is shown by: ∆% & I = −η M ∂E ∂E O C = −1 M O I − 2λη% & I ∂% & ∂% & 9 where C denotes the C-th iteration and 1 denotes the learning rate . The above expression can be composed as % & I + 1 = −η M ∂E O I + 1 − 2λη% & I ∂% & 10 It can be demonstrates that the importance of the weights decreases exponentially towards zero by calculating the weight values after C weight adaptations: % & I = 1 R  1 − 2ληRS − M ∂E O + 1 − 2ληR % & 0 ∂% & 11 (assuming |1 − 2λη| < 1) . The above method has the disadvantage that all the weights of the neural network decrease at the same rate. Still , it is more attractive to allow large weights to carry on while small weights tend toward zero. This can be carried out by modifying the error function in a way that small weights are altered more considerably than large weights. The following modified function: E = E + λ  0 w0 1 + w0 12 The weight updating rule then becomes: 6 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 % & I + 1 = −F M ∂E 2λη IY O I + W1 − %& ∂% &  I< 91 + w0 V X 13 It can be demonstrates that in this case small weights decrease more swiftly than large ones. 2.6 Quantile Regression Neural Network (QRNN) Artificial neural networks allow the estimation of in some way nonlinear models without the need to define a accurate functional form. The most widely-used neural network for predicting is the single hidden layer feed forward neural network [25]. It exists a set of n input nodes , which are connected to each of m nodes in a single hidden layer, which, in turn, are connected to an output node. The final model can be made as (: , [, % =  \ ] &^ [&   + ^ %&  : _ 14 where g · and g  · are activation functions, which are commonly chosen as sigmoidal and linear accordingly , w0 and v0 are the weights to be approximated. Theoretical assist for the use of quantile regression within an artificial neural network for the evaluation of probably nonlinear quantile models [26]. The only other work that we are knowledgeable of, that considers quantile regression neural networks , is that of Burgess [27] who briefly explains the proposal of the method. Alternative way of linear quantile function using the equation in (14) , a quantile regression neural network model, (: , [, %,of the b8ℎ quantile can be estimated using the following minimisation. min > d,e :|fg hijg ,d,ek b|': − (: , [, %| + + F [ O  15 1 − b|': − (: , [, %| + F :|fg hijg ,d,ek &, %& where λ and λ are regularisation parameters which penalise the complicatedness of the neural network and thus prevent over fitting [28]. 2.7 Fitting and comparing models The solutions for the SHLFFNN , GDBPNN, GDBPMNN, BPWDNN and QRNN models were computed using open source CRAN R packages nnet ,neuralnet, RSSNS and qrnn. These five neural network models are trained on a Oxazolines and Oxazoles derivatives descriptor dataset , it constructs a predictive model that returns a minimization in error when the neural network's prediction (its output) is compared with a known or expected outcome. The comparison between the five models were assessed using root mean square error (RMSE) and coefficient of 7 determination R . RMSE presents information on the short term efficiency which is a benchmark of the difference of predicated values about the observed values. The lower the RMSE, the more accurate is the evaluation and coefficient of determination (also called R square) measures the variance that is interpreted by the model, which is the reduction of variance when using the model.   orders from 0 to 1 while the model has healthy predictive ability when it is near to 1 and is not analyzing whatever when it is near to 0. These performance metrics are a good measures of the overall predictive accuracy. International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 MAE(mean absolute error) is an indication of the average deviation of the predicted values from the corresponding observed values and can present information on long term performance of the models; the lower MAE the better is the long term model prediction. Relative squared error (RSE) is the aggregate squared error produce relative to what the error would have been if the prediction had been the average of the absolute value. Lower RSE is the better model prediction. The Mean Percent Error (MPE) is a well known measure that corrects the 'cancelling out' results and also keeps into basis the different scales at which this measure can be calculated and thus can be used to analyze different predictions. The expressions of all measures are given below. 1 mnE =  1 mpE =  rE = +  + |'o − ' |  ' − 'o ∗ 100 ' ∑+'o − '  ∑+s7' − '  where ' and 'o are observed and predicted values. 16 17 18 2.9 Benchmark Experiments Move in benchmark experiments for comparison of neural network models. The experimental performance distributions of a set of neural network models are estimated, compared, and ordered. The resampling process used in these experiments must be investigate in further detail to determine which method produces the most accurate analysis of model influence. Resampling methods to be compared include cross-validation [29-31]. We can use resampling results to make orderly and in orderly comparisons between models [29-30] Each model performs 25 independent runs on each sub sample and report minimum, median, maximum, mean of each performance measure over the 25 runs. 3. RESULTS AND DISCUSSION This part presents the numerical analysis conducted using numerous neural network methods. RMSE and   values were used to analyze model prediction accuracies for the SHLFFNN,GDBPNN, GDBPMNN, BPWDNN and QRNN neural network models. Comparing the resampling performance the effect of prediction of antituberculer activity using Oxazolines and Oxazoles derivatives are demonstrated in Figure 4. 8 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 Figure 4. Box-and-whisker diagrams for the cross validation estimates of model precision performance RMSE, or  . The QRNN and GDBPMNN models gives the smallest prediction error and smallest RMSE and  error spread compared to BPWDNN, GDBPNN and SHLFFNN models have largest RMSE and  error spread The RMSE and   values for the five different neural network models for prediction of antitubercular activity are comparable as shown in Figure 4. QRNN and GDBPMNN models appear to have slightly smaller RMSE and   spreads than BPWDNN model. SHLFFNN and GDBPNN models appear to have larger RMSE and   error spreads than BPWDNN model. Pair-wise comparisons of model RMSE and   values using Student’s 8-test reveal that there is statistical difference in the prediction accuracies of the five neural network models. These results are shown in Table 1, which gives both the tvalues and the absolute differences in RMSE and   for the model comparisons. None of the t-values are smaller than the specified significance level α = 0.05. The null hypothesis is not rejected; in the context of this data set, there is no statistically significant difference in performance among these five neural network methods. 9 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 Table 1. Pair-wise comparisons of RMSE and  differences and t-values RMSE differences (upper diagonal) and u-values (lower diagonal) GDBPNN GDBPNN SHLFFNN GDBPMNN BPWDNN 1.00000 0.49971 1.00000 0.08053 SHLFFNN GDBPMNN BPWDNN QRNN -0.02361 0.14891 0.17252 0.08679 0.11040 -0.06212 0.01617 0.29577 0.01048 1.00000 1.00000 QRNN 0.19054 w v differences (upper diagonal) and u-values (lower diagonal) GDBPNN SHLFFNN GDBPMNN BPWDNN GDBPNN -0.10573 -0.23230 -0.15382 SHLFFNN 1.0000 -0.12657 -0.04809 GDBPMNN 0.5848 0.6052 0.07848 BPWDNN 1.0000 1.0000 1.0000 Ridge 0.3109 0.2511 1.0000 0.4586 0.20649 0.23011 0.05759 0.11971 QRNN -0.26385 -0.15812 -0.03155 -0.11003 It should be observed that the t-value for this pair-wise comparison is 0.08053 and 0.3109 (Table 1) for RMSE and  , which is not valid at α = 0.05, but it is still a much smaller t-value than those obtained for the other four pair-wise comparisons. To test for pair-wise differences, we use Tukey differences. Figure 5. Asymptotic simultaneous confidence sets for Tukey all-pair neural network models comparisons of the RMSE errors after alignment. 10 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 As a major advantage compared to the non-parametric methods, can calculate simultaneous confidence intervals. Figure 5 shows the corresponding 99% model wise confidence intervals where the bars of a given comparison are outside the 0 difference in RMSE line there is a statistically meaningful difference at the 99% level present. The blue dot indicates the estimated magnitude of this difference. The differences between (GDBPNN,SHLFFNN) and (GDBPMNN,BPWDNN) are not significant, the corresponding confidence intervals intersect zero and overlap each other. Table 2. Accuracy of predictions of the five neural network models In our study, neural network methods to predict antitubercular activity of Oxazolines and Oxazoles derivatives. In this case descriptor dataset is splits into training set and test set. Training set comprises seventy six observations and test set comprises twenty four observations. Figure 6. Comparison of prediction performance of trained and tested models obtained by five neural network methods for Oxazolines and Oxazoles derivatives descriptor dataset. 11 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 Predictive accuracy of all five neural network model evaluated as the coefficient determination i.e.   , root mean squared error (RMSE), mean absolute error(MAE), mean percentage error (MPE) and relative squared error(RSE). RMSE and   provides baseline measures of predictive accuracy. All results reported are for the training set and test set. The predictive estimation results are summarized in Table 2. The obtained both RMSE and   values of trained QRNN model are 3.710198e-06 and 1 are highly significant as well as RMSE and   values of tested QRNN models are 0.2080948 and 0.9287288 are outstanding. The RMSE and   values of trained GDBPNN model is 0.07103242 and 0.9918216 comparatively better than GDBPMNN model i.e. 0.113598 and 0.9878081. The RMSE and   values of tested models are SHLFNN and BPWDNN are comparatively better than GDBPNN and GDBPMNN models. Figure 6 shows the performance comparison of the five methods for antitubercular activity prediction. In order to test and validate the five neural network models, the rest of five statistical tests are (MAE, MPE and RSE). These statistical tests signifies the QRNN model shows more significant than other four neural network models. These statistical tests are summarized in Table 2. Figure 7 shows the deviation from actual data of the five neural network models for trained and test datasets. Zero deviation shows that actual data and predicted QRNN model is overlapped is shown in Figure 7a. It means that predicted data has zero errors. 4. CONCLUSIONS At first, important properties of neural network modelling methods and basic concepts of this were introduced. This technique is historically based on the attempt to model the way a biological brain processes the data. This study evaluated the ability of a five neural network models to predict antitubercular activity of Oxazolines and Oxazoles derivatives. we presented exploratory and inferential analyses of benchmark experiments. Benchmark experiments show that this method is the primary choice to evaluate neural network models. . It should be observed that the 12 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 scheme can be utilized to compare a set of neural network techniques but does not offer a neural network model selection. The results for the non linear neural network models suggest that we may detect performance differences with fairly high power. We have compared the predictive accuracies with all five neural network models among QRNN model is outperformed overall predictive performance. ACKNOLDGEMENTS We thankful to the Department of Computer Science Mangalore University, Mangalore India for technical support of this research. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] Kesavan, J.G., Peck, G.E., 1996.,”Pharmaceutical granulation and tablet formulation using neural networks.”,Pharm. Dev. Technol. 1, 391–404. Takahara, J., Takayama, K., Nagai, T., 1997. ,“Multi-objective simultaneous optimization technique based on an artificial neural network in sustained release formulations.”, J. Control. Release 49, 11– 20. Takayama, K., Fujikawa, M., Nagai, T., 1999. ,“Artificial neural networks as a novel method to optimize pharmaceutical formulations. “, Pharm. Res. 16, 1–6. Chen, Y., McCall, T.W., Baichwal, A.R., Meyer, M.C., 1999. ,”The application of an artificial neural network and pharmacokinetic simulations in the design of controlled-release dosage forms. J. Control. Release 59, 33–41. Wu, T., Pan,W., Chen, J., Zhang, R., 2000. ,“Formulation optimization technique based on artificial neural network in salbutamol sulfate osmotic pump tablets.”, Drug Dev. Ind. Pharm. 26, 211–215. Bourquin, J., Schmidli, H., Hoogevest, P.V., Leuenberger, H., 1997b. ,“Basic concepts of artificial neural networks (ANN) modeling in the application to pharmaceutical development. “,Pharm. Dev. Tech. 2, 95–109. Achanta, A.S., Kowalski, J.G., Rhodes, C.T., 1995. ,"Artificial neural networks: implications for pharmaceutical sciences.", Drug Dev. Ind. Pharm. 21, 119–155 Cheng F, Vijaykumar S (2012) ,“Applications of Artificial Neural Network Modelling in Drug Discovery. “, Clin Exp Pharmacol 2:e113. doi: 10.4172/2161-1459.1000e113 ALI AKCAYOL, M. and CINAR, Can.(20050 ,“Artificial neural network based modelling of heated catalytic converter performance.”, Applied Thermal Engineering , vol. 25, no. 14-15, p. 2341-2350. KOSE, Erdogan.(2008), “Modelling of colour perception of different age groups using artificial neural networks.”, Expert Systems with Applications, vol. 34, no.3, p. 2129-2139. C. ZOU and L. ZHOU,“QSAR study of oxazolidinone antibacterial agents using artificial neural networks”, Molecular Simulation, Vol. 33, No. 6, –530 LiHong Hu , GuanHua Chen , Raymond Ming-Wah Chau (2006),“A neural networks-based drug discovery approach and its application for designing aldose reductase inhibitors”, Journal of Molecular Graphics and Modelling 24 244–253 Huang GB, Chen YQ, Babri HA (2000),”Classification ability of single hidden layer feedforward neural networks”, IEEE Trans Neural Netw. ;11(3):799-801. doi: 10.1109/72.846750. Udo Seiffert and Bernd Michaelis (2000),“On the Gradient Descent in BackPropagation and its substitution by a genetic algorithm”, Proceedings of the IASTED International Conference Applied Informatics Ning Qian (1999) ,“On the momentum term in gradient descent learning algorithms”, Neural Networks 12 145-151 M. Z. Rehman, N. M. Nawi (2011),“ Improving the Accuracy of Gradient Descent Back Propagation Algorithm (GDAM) on Classification Problems”, International Journal on New Computer Architectures and Their Applications ISSN: 2220-9085)1(4): 838-847 13 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 [17] Amit Gupta, Siuwa M. Lam (1998) ,“Weight decay backpropagation for noisy data”, Neural Networks Pages 1127–1138 [18] Taylor, J.W., (2000).,” A quantile regression neural network approach to estimating the conditional density of multiperiod returns.”, Journal of Forecasting, 19(4): 299-311. [19] Andrew J. Phillips, Yoshikazu Uto, Peter Wipf, Michael J. Reno, and David R. Williams, (2000) “Synthesis of Functionalized Oxazolines and Oxazoles with DAST and Deoxo-Fluor” Organic Letters Vol 2 ,No.8 1165-1168 [20] Moraski GC, Chang M, Villegas-Estrada A, Franzblau SG, Möllmann U, Miller MJ(2010).,”Structure-activity relationship of new anti-tuberculosis agents derived from oxazoline and oxazole benzyl esters” ,Eur J Med Chem. 45(5):1703-16. doi: 10.1016/j.ejmech.2009.12.074. Epub 2010 Jan 14. [21] Yap CW* (2011). PaDEL-Descriptor: An open source software to calculate molecular descriptors and fingerprints. Journal of Computational Chemistry. 32 (7): 1466-1474. [23] Smits, J. R. M., Melssen, W. J., Buydens, L. M. C., & Kateman, G. (1994). ,”Using artificial neural networks for solving chemical problems. Part I. Multi-layer feed-forward networks. “,Chemom. Intell. Lab., 22, 165-189. [24] D.E. Rumelhart, G.E. Hinton, and R.J. Williams (1986), “Learning representations by backpropagating Errors”, Nature, 323 , 533-536. [25] Zhang, G., Patuwo, B.E. and Hu, M.Y.(1998), "Forecasting with Artificial Neural Networks: The State of the Art", International Journal of Forecasting, 14 , 35-62. [26] White, H.A.R. Gallant et al.(1992),"Nonparametric Estimation of Conditional Quantiles Using Neural Networks", Artificial Neural Networks: Approximation and Learning Theory, Cambridge and Oxford, Blackwell , 191-205. [27] Burgess, A.N.(1995), ‘Robust Financial Modelling by Combining Neural Network Estimators of Mean and Median’, Proceedings of Applied Decision Technologies, UNICOM Seminars, Brunel University, London, UK. [28] Bishop, C.M.(1997), “Neural Networks for Pattern Recognition”, Oxford, Oxford University Press. [29] Hothorn et al(2005)., “The design and analysis of benchmark experiments.”, Journal of Computational and Graphical Statistics vol. 14 (3) pp. 675-699 [30] Olaf Mersmann, Heike Trautmann1, Boris Naujoks and Claus Weihs (2010), “Benchmarking Evolutionary Multiobjective Optimization Algorithms”, http://www.statistik.tudortmund.de/fileadmin/user_uploaddortmund.de/fileadmin/user_upload/SFB_823/ discussion_papers/2010/DP_0310_SFB823_Mersmann_Trautmann_etal.pdf [31] Eugster M. J. A. et al., (2008), “Exploratory and Inferential Analysis of Benchmark Experiments.”, Technical Report Number 030, Dept. of Statistics, University of Munich. 14 International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013 Authors Doreswamy received B.Sc degree in Computer Science and M.Sc Degree in Computer Science from University of Mysore in 1993 and 1995 respectively. Ph.D degree in Computer Science from Mangalore University in the year 2007. After completion of his Post-Graduation Degree, he subsequently joined and served as Lecturer in Computer Science at St. Joseph’s College, Bangalore from 1996-1999.Then he has elevated to the position Reader in Computer Science at Mangalore University in year 2003. He was the Chairman of the Department of Post-Graduate Studies and research in computer science from 2003-2005 and from 2009-2008 and served at varies capacities in Mangalore University at present he is the Chairman of Board of Studies and Professor in Computer Science of Mangalore University. His areas of Research interests include Data Mining and Knowledge Discovery, Artificial Intelligence and Expert Systems , Bioinformatics ,Molecular modelling and simulation ,Computational Intelligence ,Nanotechnology, Image Processing and Pattern recognition. He has been granted a Major Research project entitled “Scientific Knowledge Discovery Systems (SKDS) for Advanced Engineering Materials Design Applications” from the funding agency University Grant Commission, New Delhi , India. He has been published about 30 contributed peer reviewed Papers at national/International Journal and Conferences. He received SHIKSHA RATTAN PURASKAR for his outstanding achievements in the year 2009 and RASTRIYA VIDYA SARASWATHI AWARD for outstanding achievement in chosen field of activity in the year 2010. Chanabasayya .M. Vastrad received B.E. degree and M.Tech. degree in the year 2001 and 2006 respectively. Currently working towards his Ph.D Degree in Computer Science and Technology under the guidance of Dr. Doreswamy in the Department of Post-Graduate Studies and Research in Computer Science , Mangalore University 15
5cs.CE
1 Time-Division Transmission is Optimal for Covert Communication over Broadcast Channels arXiv:1710.09754v1 [cs.IT] 26 Oct 2017 Vincent Y. F. Tan† and Si-Hyeon Lee‡ Abstract—We consider a covert communication scenario where a legitimate transmitter wishes to communicate simultaneously to two legitimate receivers while ensuring that the communication is not detected by an adversary, also called the warden. The legitimate receivers and the adversary observe the transmission from the legitimate transmitter via a three-user discrete or Gaussian memoryless broadcast channel. We focus on the case where the “no-input” symbol is not redundant, i.e., the output distribution at the warden induced by the no-input symbol is not a mixture of the output distributions induced by other input symbols, so that the covert communication is governed by the √ square root law, i.e., at most Θ( n) bits can be transmitted over n channel uses. We show that for such a setting of covert communication over broadcast channels, a simple time-division strategy achieves the optimal throughputs. Our result implies that a code that uses two separate optimal point-to-point codes each designed for the constituent channels and each used for a fraction of the time is√ optimal in the sense that it achieves the best constants of the n-scaling for the throughputs. Our proof strategy combines several elements in the network information theory literature, including concave envelope representations of the capacity regions of broadcast channels and El Gamal’s outer bound for more capable broadcast channels. Index Terms—Covert communication, Low probability of detection, Broadcast channels, Time-division, Concave envelopes I. I NTRODUCTION There has been a recent surge of research interest in reliable communications in the presence of an adversary, or a warden, who must be kept incognizant of the presence of communication between the legitimate transmitters and receivers. The lack of communication is modelled in discrete channels by sending a specially-designed “no-input” symbol 0 ∈ X (where X , a finite set, is the input alphabet of the discrete channel); in Gaussian channels, it is also modelled as sending 0 ∈ R. This line of research, known synonymously as covert communications, low probability or detection (LPD) [1]– [3], deniability [4], [5], or undetectable communication [6], seeks to establish fundamental limits on the throughputs to communicate to the legitimate receiver(s) while ensuring that the signals observed by the warden are statistically close to the signals if communication were not present. It was shown by Bash et al. [1] that in the point-to-point setting, if the legitimate user’s channel and the adversary’s channel are perfectly known, the number of bits that can be reliably † Vincent Y. F. Tan is with the Department of Electrical and Computer Engineering and the Department of Mathematics, National University of Singapore, Singapore 117583 (Email: [email protected]). ‡ Si-Hyeon Lee (Corresponding author) is with the Department of Electrical Engineering, Pohang University of Science and Technology (POSTECH), Pohang, South Korea 37673 (Email: [email protected]). and√covertly transmitted over n channel uses scales at most as Θ( n) for additive white Gaussian noise (AWGN) channels. This is colloquially known as the “square root law”. For discrete memoryless channels, the covert communication is also governed by the square root law if the no-input symbol is not redundant, i.e., the output distribution at the warden induced by the no-input symbol is not a mixture of the output distributions induced by other√input symbols. Recently, the optimal pre-constant in the Θ( n) term has also been established in a couple of elegant papers by Bloch [7] and Wang, Wornell and Zheng [8]. In this paper, we are interested in extending the above model and results to a multi-user (or network) scenario [9] in which there is one legitimate transmitter, two legitimate receivers and, as usual, one warden. See Fig. 1. We are interested in communicating reliably and simultaneously to the two receivers over the same medium while ensuring that the warden remains incognizant of the presence of any communication. We call our model a two-user discrete memoryless broadcast channel (BC) with a warden. This communication model mimics the scenario of a military general delivering commands to her/his multiple subordinates while, at the same time, ensuring that the probability of the communication being detected by a furtive enemy, the warden, is vanishingly small. Note that the enemy is not interested in the precise commands per se but on whether or not communication between the general and her/his subordinates is actually happening in order to pre-empt a possible attack. We establish the fundamental performance limits for communicating in this scenario when the no-input symbol is not redundant. Somewhat surprisingly, we show that the most basic multi-user communication scheme of time-division [9, Sec. 5.2] is optimal. This implies that a code designed for the BC that uses two separate point-to-point codes, each designed for the constituent channels and each used for a fraction of the time (blocklength) is √ optimal in the sense that it achieves the best constants of the n-scaling of the throughput. A. Related Work As mentioned, there has been a flurry of recent work on covert communications. In particular, refined asymptotics on the fundamental limits of covert communications over memoryless channels from the second-order [10] and error exponent [11] perspectives have been studied. In addition, the fundamental limits of covert communications for channels with random state known at the transmitter [12] and classicalquantum channels [13] have also been established. In contrast, 2 work on multi-user extensions of covert communications is relatively sparse. Of note are the works by Arumugam and Bloch [14], [15]. In [14], the authors derived the fundamental limits of covert communications over a multiple-access channel (MAC). The authors showed that if the MAC to the legitimate receiver is “better”, in a precise sense, than the one to the adversary, then the legitimate users can reliably √ communicate on the order of Θ( n) bits per n channel uses with arbitrarily LPD without using a secret key. The authors also quantified the pre-constant terms exactly. In [15], the authors considered a BC communication model. However, note that the model in [15] is significantly different from that in the present work. In [15], the authors were interested in transmitting two messages, one common and another covert, over a BC where there are two receivers, one legitimate and the other the warden. The common message is to be communicated to both parties, while the covert message has LPD from the perspective of the warden. This models the scenario of embedding covert messages in an innocuous codebook and generalizes existing works on covert communications in which innocent behavior corresponds to lack of communication between the legitimate receivers. In our work, there are three receivers, two legitimate and the other denotes the warden. Both messages that are communicated can be considered as covert message from the perspective of the warden. See Fig. 1 for our model. B. Main Contribution Our main contribution is to establish the covert capacity region (the set of all achievable pre-constants of the through√ puts which scale as Θ( n)) of the two-user (discrete and Gaussian) memoryless BC with a warden when the no-input symbol is not redundant. While the (usual) capacity region of the two-user discrete memoryless BC is a long-standing open problem in network information theory, we show that under the covert communications constraint, the covert capacity region admits a particularly simple expression. This region implies that time-division transmission is optimal for all two-user BCs. We emphasize that no restriction on the BC is required. In particular, the BC does not have to be degraded, less noisy or more capable [9, Chapter 5]. Our main result is somewhat analogous to that of Lapidoth, Telatar and Urbanke [16] who showed that time-division is optimal for wide-band broadcast communication over Gaussian, Poisson, “very noisy” channels, and average-power limited fading channels. However, the analysis in [16] is restricted to stochastically degraded BCs. The first analytical tool that is used to prove our main theorem is a converse bound derived by El Gamal [17] initially designed for more capable BCs. However, it turns out to be useful a starting point for our setting. We manipulate this bound into a form that is reminiscent of an outer bound for degraded BCs. Subsequently, we express the λ-sum throughput of this outer bound, for appropriately chosen λ ≥ 1, in terms of upper concave envelopes [18]. This circumvents the need to identify the optimal auxiliary random variable for specific BCs. The identification of optimal auxiliaries is typically possible only if the BC possesses some special structure. For example for the binary symmetric BC, Mrs. Gerber’s lemma [19] is a key ingredient in simplifying the converse bound. Similarly for the Gaussian BC, a highly non-trivial result known as the entropy power inequality [20], [21] is needed to obtain an explicit expression for the capacity region. Note that both these channels are degraded. Our main results applies to all two-user discrete memoryless BCs. We employ concave envelopes and take into consideration that under the covertness constraint, the weight of the input (codeword) is necessarily vanishingly small [7], [8]. Augmenting some basic analytical arguments (e.g., [7, Lemma 1]) to these existing techniques allows us to simplify the outer bound to conclude that the time-division inner bound [9, Sec. 5.2] is optimal. C. Intuition Behind The Main Result We now provide intuition as to why time-division transmission is optimal for BCs with covertness constraints. We use the binary symmetric BC [9, Example 5.3], degraded in favor of Y1 (say), as an example to illustrate this fact. It is well known that in the absence of the covertness constraint, superposition coding [9, Sec. 5.3] [22] is optimal. The coding scheme is illustrated in Fig. 2 where un1 (w1 ), un2 (w2 ) ∈ Fn2 are generated independently, un2 (w2 ) denotes the cloud center and xn (w1 , w2 ) = un1 (w1 ) ⊕ un2 (w2 ) denotes the satellite codeword. Because in covert communications, xn (w1 , w2 ) is required to have low (Hamming) weight [7], [8], either both un1 (w1 ) and un2 (w2 ) have low weight or both have high weight. Let us assume it is the former without loss of generality. Then, the set of locations of the 1’s in the satellite codeword is likely to be a disjoint union of the sets of 1’s in un1 (w1 ) and un2 (w2 ). Thus the relative weight of xn (w1 , w2 ), denoted as αn , can be decomposed into the relative weights of un1 (w1 ) and un2 (m2 ), denoted as ραn and (1−ρ)αn respectively for some ρ ∈ [0, 1]. Thus, the superposition coding inner bound for the degraded BC [9, Theorem 5.2] [22] with X = U1 ⊕ U2 reads R1 ≤ I(X; Y1 |U2 ) = I(U1 ; Y1 ) ≈ ραn L∗1 , R2 ≤ I(U2 ; Y2 ) ≈ (1 − ρ)αn L∗2 , (1) (2) where L∗1 and L∗2 are the “covert capacities” [7], [8] of the constituent point-to-point binary symmetric channels; see Theorem 1. Thus, (1) and (2) suggest that time-division is optimal, at least for degraded BCs but we show the same is true for all BCs. D. Paper Outline This paper is structured as follows. In Section II, we formulate the problem and define relevant quantities of interest precisely. In Section III, we state our main result for the general BC. We also provide some qualitative interpretations. The main result, corollaries, and bounds on the required length of the secret key are proved in Sections IV, V, and VI respectively. We conclude our discussion in Section VII where we also suggest avenues for future research. E. Notation We adopt standard information-theoretic notation, following the text by El Gamal and Kim [9] and on occasion, 3 (W1 , W2 ) ✲ f Xn ✲ P ×n Y1 Y2 Z|X Y1n ✲ ϕ1 Y2n ✲ ϕ2 Ŵ1 ✲ Ŵ2 ✲ ✲ H0 : Q×n Zn 0 ✲ Warden ✲ H1 : Q̂Z n Fig. 1. Illustration of two-user BC with a warden. The key which is accessible to f, ϕ1 , and ϕ2 is not shown here. un1 (w1 ) ⊕ ⊕ || || un2 (w2 ) xn (w1 , w2 ) Fig. 2. Illustration of intuition of optimality of time-division. Shaded (resp. unshaded) boxes indicate that that coordinate equals 1 (resp. 0). Because un 1 (w1 ) n n n and un 2 (w2 ) are very sparse, the set of locations of the 1’s in x (w1 , w2 ) is highly likely to be a disjoint union of those in u1 (w1 ) and u2 (w2 ). the book by Csiszár and Körner [23]. We use hb (q) := −q log q − (1 − q) log(1 − q) to denote the binary entropy P P (z) function and D(P kQ) := z P (z) log Q(z) is the relative entropy. Throughout log is taken to an arbitrary base. We also use h(·) to denote the differential entropy. The notation a ∗ b := a(1 − b) + b(1 − a) denotes the binary convolution operator. For two discrete distributions, P and Q defined on the same alphabet X , we say that P is absolutely continuous with respect to Q, denoted as P ≪ Q if for all x ∈ X , Q(x) = 0 implies that P (x) = 0. Other notation will be introduced as needed in the sequel. II. P ROBLEM F ORMULATION A discrete memoryless1 two-user BC with a warden (X , Y1 , Y2 , Z, PY1 ,Y2 ,Z|X ) consists of a channel input alphabet X , three channel output alphabets Y1 , Y2 , and Z, and a transition matrix PY1 ,Y2 ,Z|X . The output alphabets Y1 and Y2 correspond to the two legitimate receivers and Z corresponds to that of the warden. Without loss of generality, we let X = {0, 1, . . . , K}. We let 0 ∈ X be the “no input” symbol that is sent when no communication takes place and define Qx = PZ|X (·|x) for each x ∈ X . The BC is used n times in a memoryless manner. If no communication takes place, the warden at receiver Z observes Z n , which is distributed according to Q×n 0 , the n-fold product distribution of Q0 . If communication occurs, the warden observes Q̂Z n , the output distribution induced by the code. For convenience, in the sequel, we often denote the two marginal channels corresponding to the two legitimate receivers as W = PY1 |X and V = PY2 |X respectively. 1 We omit the qualifier “discrete memoryless” for brevity in the sequel. We will mostly discuss discrete memoryless BCs in this paper. However, in Corollary 2, we present results for the BC with a warden when the constituent channels are Gaussian. The transmitter and the receiver are assumed to share a secret key S uniformly distributed over a set K. We will, for the most part, assume that the key is sufficiently long, i.e., the set K is sufficiently large. However, we will bound the length of the key in Section III-D. The transmitter and the receiver aim to construct a code that is both reliable and covert. Let the messages to be sent be W1 and W2 . These messages are assumed to be independent and also independent of S. Also let their reconstructions at the receiver Yj be Ŵj for j = 1, 2. As usual, a code is said to be ε-reliable if the probability of error Pr(∪2j=1 {Ŵj 6= Wj }) is asymptotically upper bounded by ε ∈ [0, 1) as n → ∞. The code is covert if it is difficult for the warden to determine whether the transmitter is sending a message (hypothesis H1 ) or not (hypothesis H0 ). Let π1|0 and π0|1 denote the probabilities of false alarm (accepting H1 when the transmitter is not sending a message) and missed detection (accepting H0 when the transmitter is sending a message), respectively. Note that a blind test (one with no side information) satisfies π1|0 + π0|1 = 1. The warden’s optimal hypothesis test satisfies q π1|0 + π0|1 ≥ 1 − D(Q̂Z n kQ×n (3) 0 ). See [7], [24] for details of this claim. Hence, covertness is guaranteed if the relative entropy between the observed distribution Q̂Z n and the product of no communication distribution Q×n vanishes as the blocklength grows. 0 Note that if supp(PZ|X (·|x)) * supp(Q0 ) for some x ∈ X , such x should not be transmitted, otherwise it is not possible for D(Q̂Z n kQ×n 0 ) to vanish [8]. Hence, by dropping all such input symbols as well as all output symbols not included in supp(Q0 ), we assume throughout that supp(Q0 ) = Z. In addition, we assume that the no-input symbol 0 is not redundant i.e., PZ|X (·|0) ∈ / conv{PZ|X (·|x′ ) : x′ ∈ X , x′ 6= 0} where 4 conv{·} denotes the convex hull. If the symbol 0 is redundant, there exists a sequence of codes for which D(Q̂Z n kQ×n 0 )= 0 for all n [8] so π1|0 +π0|1 = 1 (i.e., the warden’s test is always blind) and transmitting at positive rates is possible; this is a regime we do not consider in this paper. A code for the BC with a covertness constraint and the covert capacity region are defined formally as follows. Definition 1. An (n, M1n , M2n , Kn , ε, δ)-code for the BC with a warden (X , Y1 , Y2 , Z, PY1 ,Y2 ,Z|X ) and with a covertness constraint consists of • Two message sets Mj := {1, . . . , Mjn } for j = 1, 2; • Two independent messages uniformly distributed over their respective message sets, i.e., Wj ∼ Unif(Mj ) for j = 1, 2; • One secret key set K := {1, . . . , Kn }; n • One encoder f : M1n × M2n × K → X ; n • Two decoders ϕj : Yj × K → Mj for j = 1, 2; such that the following constraints hold:  Pr ∪2j=1 {Ŵj 6= Wj } ≤ ε, (4) D(Q̂Z n kQ×n 0 ) ≤ δ. (5) For most of our discussion, we ignore the secret key set (i.e., we assume that the secret key is sufficiently long) for the sake of simplicity and refer to the family of codes above with secret key sets of arbitrary sizes as (n, M1n , M2n , ε, δ)-codes. We will revisit the effect of the key size in Section III-D. Definition 2. We say that the pair (L1 , L2 ) ∈ R2+ is (ε, δ)achievable for the BC with a warden and with a covertness constraint if there exists a sequence of (n, M1n , M2n , εn , δ)codes such that 1 lim inf √ log Mjn ≥ Lj , n→∞ nδ lim sup εn ≤ ε. j ∈ {1, 2}, (6) (7) n→∞ Define the (ε, δ)-covert capacity region Lε,δ ⊂ R2+ to be the closure of all (ε, δ)-achievable pairs of (L1 , L2 ). We are interested in the δ-covert capacity region \ Lε,δ = lim Lε,δ . (8) Lδ := ε∈(0,1) ε→0 Note that L1 and L2 are measured in bits (or information units) per square root channel use. We will also need the notion of covert capacities for pointto-point discrete memoryless channels (DMCs) with a warden (X , Y, Z, PY,Z|X ) [7], [8]. This scenario corresponds to the above definitions with Y1 = Y and Y2 = ∅. Recall that the chi-squared distance between two distributions Q0 and Q1 supported on the same alphabet Z is defined as X (Q1 (z) − Q0 (z))2 . χ2 (Q1 kQ0 ) := Q0 (z) (9) z∈Z Theorem 1 (Bloch [7] and Wang, Wornell, Zheng [8]). Let (X , Y, Z, PY,Z|X ) be a DMC with a warden in which W := PY |X and Qk := PZ|X (·|k) for k ∈ X . We assume that it satisfies W (·|k) ≪ W (·|0) for all k ∈ X \{0}, supp(Q0 ) = Z and 0 ∈ X is not redundant. Then its covert capacity is v u PK 2 u2 k=1 pk D(W (·|k)kW (·|0)) ∗ L (PY,Z|X ) := max t  PK p χ2 k=1 pk Qk Q0 (10) where the maximization extends over all length-K probability vectors p (i.e., p = [p1 , . . . , pK ]T where pk ≥ 0 and P K k=1 pk = 1). If X = {0, 1}, i.e., PY,Z|X has a binary input, then the maximization over p in (10) is unnecessary and s 2D(W (·|1)kW (·|0))2 . (11) L∗ (PY,Z|X ) := χ2 (Q1 kQ0 ) As previously mentioned, we assume P that Q1 ≪ Q0 in ∗ the binary input case (or more generally, K k=1 pk Qk ≪ Q0 ∗ ∗ ∗ T where p = [p1 , . . . , pK ] is any maximizer of (10)). Otherwise, covert communication is impossible [7, Appendix G]. With this assumption and the fact that 0 ∈ X is not redundant, L∗ (PY,Z|X ) as defined in (10) and (11) is finite. III. M AIN R ESULTS In this section, we present our main results. In Section III-A, we state our main result for the case where the BC is general and the key is of sufficiently long length. We interpret our result in Section III-B by placing it in context via several remarks. In Section III-C, we specialize our result to two degraded BCs and show that standard techniques apply for such models. In Section III-D, we extend our main result to the case where the key size is also a parameter of interest. A. General Memoryless BCs Our main result is a complete characterization of the δcovert capacity region for all BCs satisfying certain absolute continuity conditions. Theorem 2. Assume that a BC with a warden PY1 ,Y2 ,Z|X is such that the constituent DMCs W := PY1 |X and V := PY2 |X satisfy W (·|k) ≪ W (·|0) and V (·|k) ≪ V (·|0) for all k ∈ X \ {0}. Also assume that the length of the secret key is sufficiently large. Denote the individual covert capacities of the constituent DMCs with a warden PY1 ,Z|X and PY2 ,Z|X as L∗1 := L∗ (PY1 ,Z|X ) and L∗2 := L∗ (PY2 ,Z|X ) respectively. Then, for all δ > 0, the δ-covert capacity region is   L2 L1 2 (12) Lδ = (L1 , L2 ) ∈ R+ : ∗ + ∗ ≤ 1 . L1 L2 Theorem 2 is proved in Section IV. B. Remarks on the Main Theorem A few remarks are in order. 1) First, note that (12) implies that under the covert communication constraints, time-division transmission is optimal for all BCs. The achievability part simply involves two optimal covert communication codes, one for each DMC with a warden. The first code, designed for PY1 ,Z|X , is employed over ⌊ρn⌋ channel uses where 5 ρ ∈ [0, 1]. The second code, designed for PY2 ,Z|X , is employed over the remaining n − ⌊ρn⌋ channel uses. This achieves the point (ρL∗1 , (1 − ρ)L∗2 ) which is on the boundary of Lδ . By varying ρ ∈ [0, 1], we achieve the whole boundary and hence the entire region in (12). 2) The converse of Theorem 2 thus constitutes the main contribution of this paper. To obtain an explicit outer bound for the capacity region for BCs that satisfy some ordering—such as degraded, less noisy or more capable BCs [9, Chapter 5]—one often has to resort to the identification of the optimal auxiliary random variablechannel input pair (U, X) in the characterization of the capacity region of these classes of BCs. However, this is only possible for specific BCs; see Corollaries 1 and 2 to follow. For general (or even arbitrary degraded) BCs, this is, in general, not possible. Our workaround involves first starting with an outer bound of the capacity region for general memoryless BCs by El Gamal [17]. We combine the inequalities in the outer bounds and use this to upper bound a linear combination of the throughputs of the point-to-point channels in terms of the concave envelope of a linear combination of mutual information terms [18]. This allows us to circumvent the need to explicitly characterize (U, X) since U is no longer present in this concave envelope characterization. We exploit the fact that in covert communications, the input to the channel is required to have low weight. Leveraging this constraint and applying some approximations then allows us to obtain the outer bound to (12) for all BCs. The appeal of this approach is not only that we do not need to find the optimal (U, X) as this is implicit in the concave envelope representation. 3) Let us say that the absolute continuity condition holds for a channel W if W (·|k) ≪ W (·|0) for all k ∈ X \{0}. Then it was shown by Bloch [7, Appendix G] that if W √does not satisfy the absolute continuity condition, Θ( n log n) bits per n channel uses can be covertly transmitted. In our setting, the same is true for the constituent channels; if W satisfies √ the absolute continuity condition but V does not Θ( n) bits √ per n channel uses can be transmitted to Y1 , while Θ( n log n) bits per n channel uses can be transmitted to Y2 and vice versa. An alternative (converse) proof of this result follows from Mrs. Gerber’s lemma [19] and is presented in Section V-A. This result generalizes [8, Example 3]. We now consider the scenario in which the BC PY1 ,Y2 ,Z|X consists of three additive white Gaussian noise (AWGN) channels [9, Sec. 5.5], i.e., Yj = X + Ψj , Z = X + Ψ3 , j ∈ {1, 2} (14) (15) where Ψ1 , Ψ2 , and Ψ3 are independent zero-mean Gaussian noises with variances N1 , N2 , and σ 2 respectively. There is no (peak, average, or long-term) power constraint on the codewords [8, Sec. V]. Let the “no communication” input symbol be 0 ∈ R, so by (15), Q0 is distributed as a zeromean Gaussian with variance σ 2 . Corollary 2. Suppose that W and V be AWGN channels as in (14) with noise variances satisfying 0 ≤ N1 ≤ N2 (without loss of generality). Then Lδ is as in (12) with L∗j = σ 2 log e , Nj j ∈ {1, 2}. (16) An alternative (converse) proof of this result follows from the entropy power inequality [20], [21] and is presented in Section V-B. This result generalizes [7, Theorem 6] and [8, Theorem 5]. This result is also analogous to [16, Prop. 1] in which it was shown that time-division is optimal for Gaussian BCs in the low-power limit. We note that Corollaries 1 (for the binary symmetric BC) and 2 (for the Gaussian BC) apply to an arbitrary but finite number of successively degraded legitimate receivers [9, Sec. 5.7], say N ∈ N. This means that X ⊸− − Y1 ⊸− − Y2 ⊸− − . . . ⊸− − YN . The corresponding δ-covert capacity region is   N X Lj N Lδ = (L1 , . . . , LN ) ∈ R+ : ≤1 , (17) L∗ j=1 j where L∗j is given as in (13) or (16). We omit the proofs as they are straightforward generalizations of the corollaries above. C. Degraded BCs D. On the Length of the Secret Key We now specialize Theorem 2 to two specific classes of (degraded) BCs and show that slight modifications of standard techniques are applicable in establishing the outer bound to Lδ . To state the first corollary, we use the following notation: W = BSC(q) if it is a binary-input, binary-output channel in which Y = X ⊕ Ψ where Ψ ∼ Bern(q). In the preceding derivations, we have assumed that the secret key that the transmitter and legitimate receivers share is arbitrarily long. In other words, the set K is sufficiently large. In this section, we derive fundamental limits on the length of the key so that covert communication remains successful. To formalize this, we will need to augment Definition 2. We say that (L1 , L2 , Lkey ) is δ-achievable or simply achievable if in addition to (6) and (7) (with ε = 0), Corollary 1. Suppose that W = BSC(p1 ) and V = BSC(p2 ) with 0 ≤ p1 ≤ p2 ≤ 1/2 (without loss of generality) [9, Example 5.3]. Then Lδ is as in (12) with s 1 − pj 2 ∗ Lj = (log e)(1−2pj ) log · , j ∈ {1, 2}. pj χ2 (Q1 kQ0 ) (13) 1 lim sup √ log Kn ≤ Lkey . n→∞ nδ (18) Finally, we set L∗Z := L∗ (PZ,Z|X ). The generalization of Theorem 2 is as follows. 6 Theorem 3. The tuple (L1 , L2 , Lkey ) ∈ R3+ is achievable if and only if L1 L2 + ∗ ≤1 ∗ L1 L2 (19) and Lkey ≥  L2 L1 + ∗ ∗ L1 L2  L∗Z − L1 − L2 . (20) Note that if the throughputs of the code (log M1n , log M2n ) are such that we operate on the boundary of the covert capacity region (i.e., that (19) holds with equality), the optimum (minimum) key length L∗key = L∗Z − L1 − L2 . (21) Then, it follows that Also note that if Lkey is sufficiently large, then (20) is satisfied so based on (19), Theorem 3 reverts to Theorem 2. The proof of this enhanced theorem follows largely along the same lines as that for Theorem 2. However, we need to carefully bound the length of the secret key. The additional arguments to complete the proof of Theorem 3 are provided in Section VI. IV. P ROOF OF T HEOREM 2 A. Preliminaries for the Proof of Theorem 2 Before we commence, we recap some basic notions in convex analysis. The (upper) concave envelope of f : D → R, denoted as C[f ](x) := inf{g(x) : g ≥ f over D, g is concave}, is the smallest concave function lying above f . Clearly, if f is concave, then C[f ] = f . Furthermore if D is a subset of Rd , then by Carathéodory’s theorem [18], g = C[f ] ⇐⇒ g(x) = sup d+1 X pi f (xi ), (22) {(xi ,pi )}d+1 i=1 i=1 where xi ∈ D and {pi }d+1 i=1 is a probability distribution such P that d+1 p x = x. Here, we record a basic fact: i i i=1 f1 ≥ f2 on D =⇒ g1 ≥ g2 on D (23) where gj = C[fj ], j = 1, 2. This can be easily proved by means of the representation of the concave envelope in (22). Indeed, g2 (x) ≥ d+1 X i=1 pi f2 (xi ) ≥ d+1 X pi f1 (xi ) (24) i=1 where the first inequality holds for any {(xi , pi )}d+1 i=1 such that Pd+1 p x = x and the second inequality because f2 ≥ f1 on i=1 i i D. Since the inequality holds for all {(xi , pi )}d+1 i=1 such that Pd+1 i=1 pi xi = x, we have g2 (x) ≥ sup d+1 X {(xi ,pi )}d+1 i=1 i=1 which establishes (23). B. Converse Proof of Theorem 2: Binary-Input BCs We first prove the converse to Theorem 2 for the case when X = {0, 1}. This is done for the sake of clarity and simplicity. We subsequently show how to extend the analysis to the multiple symbol case (i.e., |X | > 2) in Section IV-C. Fix a sequence of (n, M1n , M2n , εn , δ)-codes for the BC with a warden PY1 ,Y2 ,Z|X satisfying the 0-reliability constraint in (4) and (7) and the covertness constraint in (5). In the proof, we use the following result by Bloch [7, Lemma 1, Remark 1]: P Lemma 1. Let Qγ (z) := x∈X PZ|X (z|x)Pγ (x) for γ ∈ [0, 1] where Pγ is a Bernoulli distribution with parameter γ, i.e.,  1−γ x=0 Pγ (x) := . (26) γ x=1 pi f1 (xi ) = g1 (x), (25) I(Pγ , PZ|X ) = γD(Q1 kQ0 ) − D(Qγ kQ0 ). (27) Furthermore, for any sequence γn such that γn → 0 as n → ∞, for all n sufficiently large, √ γn2 χ2 (Q1 kQ0 ) (1 − γn ) ≤ D(Qγn kQ0 ) 2 γ2 √ ≤ n χ2 (Q1 kQ0 ) (1 + γn ) . (28) 2 1) Covertness Constraint: We first discuss the covertness constraint in (5). Let Z n (resp. X n ) have distribution Q̂Z n (resp. P̂X n ) and let Q̂Zi (resp. P̂Xi ) be the marginal of Q̂Z n Q̄n be the (resp. P̂X n ) on the i-th element. Additionally, let P n average output distribution on Z, i.e., Q̄n := n1 i=1 Q̂Zi . Similarly wePdefine the average input distribution P̄n on X as P̄n := n1 ni=1 P̂Xi . Then mimicking the steps in the proof of [8, Theorem 1], we have D(Q̂Z n kQ×n 0 ) ≥ nD(Q̄n kQ0 ). (29) Thus, by the covertness constraint in (5) and (29), we have δ (30) D(Q̄n kQ0 ) ≤ . n Since limn→0 D(Q̄n kQ0 ) = 0 and symbol 0 ∈ X is not redundant,2 it follows that P̄n = Pαn for some αn → 0. (31) Because Q̄n (z) = Qαn (z) for all z ∈ Z, by Lemma 1, √ α2n χ2 (Q1 kQ0 ) (1 − αn ) ≤ D(Q̄n kQ0 ) 2 √ α2 ≤ n χ2 (Q1 kQ0 ) (1 + αn ) . (32) 2 From (30) and (32), we conclude that αn has to satisfy the weight constraint √ 2δ =: ᾱ2n . (33) α2n (1 − αn ) ≤ χ2 (Q1 kQ0 )n From this relation, we see that αn ≤ ᾱn (1 + o(1)) = Θ( √1n ). 2 Indeed, if 0 were redundant (e.g., P Z|X (·|0) = PZ|X (·|1) for binary X ), there exists an input distribution P P̃ such that P̃ (0) = 0 and its corresponding output distribution Q̃ = x P̃ (x)PZ|X (·|x) = Q0 [8, Eqn. (5)]. The distribution Q̃ (taking the role of Q̄n ) satisfies D(Q̃kQ0 ) = 0 so (30) is trivially satisfied. However, P̃ (taking the role of P̄n ) clearly does not satisfy (31). 7 2) Upper Bound on Linear Combination of Code Sizes: We now proceed to consider upper bounds on the code sizes subject to the reliability and covertness constraints. Without loss of generality, we assume L∗1 ≥ L∗2 . We start with a lemma that is a direct consequence of the converse proof for more capable BCs by El Gamal [17]. This lemma is stated in a slightly different manner in [9, Theorem 8.5]. Lemma 2. Every (n, M1n , M2n , εn )-code for any BC satisfies (log M1n )(1 − εn ) − 1 ≤ (log M2n )(1 − εn ) − 1 ≤ n X i=1 n X I(U1i ; Y1i ), (34) PX PU |X = max max I(X; Y1 |U ) + λ[I(X; Y2 ) − I(X; Y2 |U )] (42) PX PU |X = max λI(X; Y2 ) + max I(X; Y1 |U ) − λI(X; Y2 |U ) (43) PX I(U2i ; Y2i ), (35) (36) (37) = max PU |X where U1i := and U2i := i−1 n (W2 , Y1,i+1 , Y2 ) satisfies (U1i , U2i ) ⊸− − Xi ⊸− − (Y1i , Y2i ). In addition, if a secret key S is available to the encoders and decoder, then the auxiliary random variables U1i and U2i also include S. For completeness, the proof of Lemma 2, with the effect of the secret key, is provided in Appendix A. Note that no assumption (e.g., degradedness, less noisy or more capable conditions) is made on the BC in Lemma 2. Now fix a constant λ ≥ 1. By adding (λ − 1) copies of (35) to one copy of (36) and writing Ui := U2i for all i ∈ {1, . . . , n}, we obtain (38) i=1 By introducing the usual time-sharing random variable J ∈ Unif{1, . . . , n} which is independent of all the other random variables (W1 , W2 , X n , Y1n , Y2n ) and defining U := (J, UJ ), X := XJ , Y1 := Y1J and Y2 := Y2J , we obtain ≤ nI(X; Y1 |U ) + nλI(U ; Y2 ). max I(X; Y1 |U ) − λI(X; Y2 |U ) X PU (u)[I(X; Y1 |U = u)−λI(X; Y2 |U = u)] = max PU |X n (W1 , Y1i−1 , Y2,i+1 ) (log M1n + λ log M2n )(1 − εn ) − (1 + λ) (44) PU |X i=1 (log M1n + λ log M2n )(1 − εn ) − (1 + λ) n X   I(Xi ; Y1i |Ui ) + λI(Ui ; Y2i ) . ≤ = max λI(X; Y2 ) + CPX [I(X; Y1 ) − λI(X; Y2 )]. − X ⊸− − Y2 Here, (42) follows from the Markov chain U ⊸− and (44) follows from the definition of the concave envelope. Namely, for fixed PX , i=1 (log M1n + log M2n )(1 − εn ) − 2 n X   I(U1i ; Y1i ) + I(Xi ; Y2i |U1i ) , ≤ PU |X PX i=1 (log M1n + log M2n )(1 − εn ) − 2 n X   I(Xi ; Y1i |U2i ) + I(U2i ; Y2i ) , ≤ X PU (u)[I(PX|U (·|u), W )−λI(PX|U (·|u), V )] (46) u = CPX [I(X; Y1 ) − λI(X; Y2 )], (47) − where (46) follows from the Markov chain U ⊸− X ⊸− − (Y , Y ) and (47) follows from the fact that 1 2 P u PU (u)PX|U (·|u) = PX and (22). Note that we employ the subscript PX on C to emphasize that the concave envelope operation is taken with respect to the distribution PX and it is thus a function of PX . 3) Approximating the Maximization over Low-Weight Inputs: Due to the above considerations, it now suffices to simplify (44). To obtain the outer bound to (12), we set λ := L∗1 /L∗2 in the following. Note that since it is assumed that L∗1 ≥ L∗2 , λ ≥ 1 as required to obtain (38). If instead L∗2 > L∗1 , then we set λ := L∗2 /L∗1 and add (λ − 1) copies of (34) to one copy of (37) to obtain the analogue of (38) with Ui := U1i . In the rest of the proof, we also replace the index 1 by 2 and W by V and vice versa. The following argument goes through verbatim with these minor amendments. By expressing the mutual information quantities in (44) as I(PX , W ) and I(PX , V ) [23] (for I(X; Y1 ) and I(X; Y2 ) respectively), we can write (44) as follows: PX (39) (45) u max λI(PX , V ) + CPX [I(PX , W ) − λI(PX , V )]. Note that the above identification of (U, X) satisfies U ⊸− − X ⊸− − (Y1 , Y2 ). Furthermore, since X is equal to Xi for each i ∈ {1, . . . , n} with equal probability 1/n (because of X = XJ ), it follows PX = P̄n = Pαn for some αn satisfying (33). Hence, (39) can be bounded by taking a maximization over all such distributions, i.e.,  1 (log M1n + λ log M2n )(1 − εn ) − (1 + λ) n ≤ max max I(X; Y1 |U ) + λI(U ; Y2 ), (40) PX PU |X where the maximization over PX is over distributions Pαn where αn satisfies (33). Now by using the concave envelope representation for the capacity region of degraded BCs [18], we may write (39) as follows:  1 (log M1n + λ log M2n )(1 − εn ) − (1 + λ) n ≤ max max I(X; Y1 |U ) + λI(U ; Y2 ) (41) (48) Now we parametrize PX = Pαn = P̄n as the vector [1 − αn , αn ]T where 0 ≤ αn ≤ ᾱn (1 + o(1)) [cf. (33)] such that PX is linear in the parameter αn . By applying (27) and (28) to both mutual information terms, we can approximate the terms in the argument of the concave envelope in (48) as I(PX , W ) − λI(PX , V )   = αn D(W (·|1)kW (·|0)) − λD(V (·|1)kV (·|0)) + O(α2n ). O(α2n ) (49) Note that the implied constant in the term depends only on χW := χ2 (W (·|1)kW (·|0)) and χV := χ2 (V (·|1)kV (·|0)) 8 and these are finite under the absolute continuity conditions of the theorem, i.e., W (·|1) ≪ W (·|0) and V (·|1) ≪ V (·|0). Consequently, for every η > 0, there exists an integer N1 (η; χW , χV ) such that for n > N1 (η; χW , χV ), we have I(PX , W ) − λI(PX , V )   ≤ αn D(W (·|1)kW (·|0))−λD(V (·|1)kV (·|0))+η . (50) This is because the quadratic term O(α2n ) can be upper bounded by ηαn for all n sufficiently large (depending only on (χW , χV )). Equipped with the fact in (23) and the upper bound in (50), we obtain that for all n > N1 (η; χW , χV ), CPX [I(PX , W ) − λI(PX , V )] h  ≤ CPX αn D(W (·|1)kW (·|0)) i − λD(V (·|1)kV (·|0)) + η . CPX [I(PX , W ) − λI(PX , V )]   ≤ αn D(W (·|1)kW (·|0))−λD(V (·|1)kV (·|0))+η . (52) In addition, by the same reasoning involving Taylor approximations, there exists an integer N2 (η; χV ) such that for all n > N2 (η; χV ), we can upper bound the first term in (48) as follows: (53) Combining (52) and (53), we see that the terms λαn D(V (·|1)kV (·|0)) cancel and the expression in (48) can be upper bounded as max I(PX , V ) + CPX [I(PX , W ) − λI(PX , V )] PX   ≤ αn D(W (·|1)kW (·|0)) + 2η Since (57) holds for all η > 0 and η is arbitrary, we obtain s 2D(W (·|1)kW (·|0))2 L∗1 L1 + ∗ L2 ≤ . (58) L2 χ2 (Q1 kQ0 ) Finally, by recalling the definition of the covert capacity of PY1 ,Z|X according to (11) in Theorem 1, we notice that the right-hand-side of (58) is exactly L∗1 . Hence we obtain the desired outer bound corresponding to the region Lδ in (12) in Theorem 2. (51) Now, observe that g(αn ) := αn [D(W (·|1)kW (·|0)) − λD(V (·|1)kV (·|0)) + η] is linear in αn and PX is also a linear function in αn so by expressing αn as a function of (any one of the components of) PX , we know that g(·) is a linear function of PX . Since a linear function is concave, we can remove the concave envelope operation in (51) yielding λI(PX , V ) ≤ λαn D(V (·|1)kV (·|0)) + ηαn . pairs according to Definition 2, and the facts that εn → 0 and nδ → ∞, we obtain s   2 L∗1 D(W (·|1)kW (·|0))+2η . (57) L1 + ∗ L2 ≤ L2 χ2 (Q1 kQ0 ) (54) for all n > max{N1 (η; χW , χV ), N2 (η; χV )}. Note that PX in the maximization above is such that PX = Pαn with the constraint 0 ≤ αn ≤ ᾱn (1 + o(1)). Now, combining (54) with the upper bound in (44), we have  1 (log M1n + λ log M2n )(1 − εn ) − (1 + λ) n   ≤ ᾱn (1 + o(1)) D(W (·|1)kW (·|0)) + 2η . (55) 4) Completing the Converse Proof Taking Limits: At this point, we invoke the definition of ᾱn in (33) and normalize (55) to obtain  1  √ (log M1n + λ log M2n )(1 − εn ) − (1 + λ) nδ s   2δn D(W (·|1)kW (·|0))+2η . (56) ≤ (1+o(1)) χ2 (Q1 kQ0 )δn Taking the lim sup in n on both sides, recalling that (i) λ = L∗1 /L∗2 and (ii) the definition of achievable (L1 , L2 ) C. Converse Proof of Theorem 2: General BCs We generalize the converse proof for binary-input in Section IV-B to the multiple symbol case, i.e., |X | > 2. We use the following lemma whose proof is in [7, Section VII-B]. Lemma 3. For γ ∈ [0, 1] and length-K PK probability vector p = T [p , . . . , p ] , i.e., p ≥ 0 and 1 K k k=1 pk = 1, let Qγ,p (z) := P P (z|x)P (x) where γ,p Z|X x∈X  1−γ x=0 Pγ,p (x) := . (59) γpk x = k ∈ X \ {0} Then, it follows that X  K I(Pγ,p , PZ|X ) = γpk D(Qk kQ0 ) −D(Qγ,pkQ0 ). (60) k=1 Furthermore, for any sequence γn such that γn → 0 as n → ∞, for all n sufficiently large, X  K γn2 √ χ2 pk Qk Q0 (1 − γn ) ≤ D(Qγn ,p kQ0 ) 2 k=1 X  K γn2 √ ≤ χ2 pk Qk Q0 (1 + γn ) (61) 2 k=1 1) Covertness Constraint: By a close inspection of the steps in Section IV-B1 and by applying Lemma 3, we conclude that the average input distribution P̄n is given by Pαn ,p for some length-K probability vector p and αn such that α2n (1 − √ αn ) ≤ 2δ χ2  =: ᾱ2p,n . p Q Q 0 n k=1 k k PK (62) 2) Upper Bound on Linear Combination of Code Sizes: Let us assume L∗1 ≥ L∗2 (without loss of generality), then λ = L∗1 /L∗2 ≥ 1. It can be easily checked that the steps in Section IV-B2 go through in the same manner for the multiple symbol case except that PX = Pαn ,p for some length-K probability vector p and αn ∈ [0, 1] satisfying (62). As such, we have that (44) also holds where now the maximization over PX is over those distributions Pαn ,p for some p and αn satisfying (62). 9 3) Approximating the Maximization over Low-Weight Inputs: Now we approximate (48). We fix p throughout. By the same arguments up to (50) and using (60) and (61), we have for PX = Pαn ,p , I(PX , W ) − λI(PX , V ) " K X  ≤ αn pk D(W (·|k)kW (·|0)) where the equality in (69) follows from the Markov chain U ⊸− − X ⊸− − Y2 and (70) follows from the fact that the entropy of Y2 = X ⊕Ψ1 ⊕ Ψ̃2 when E[X] = αn is hb (αn ∗p2 ). As a result, from (70), there exists a τn ∈ [0, αn ] such that H(Y2 |U ) = hb (τn ∗ p2 ). (71) hb (τn ∗ p2 ) = H(Y2 |U ) = H(Y1 ⊕ Ψ̃2 |U )  ≥ hb h−1 b (H(Y1 |U )) ∗ p̃2 (72) τn ∗ p1 ∗ p̃2 ≥ h−1 b (H(Y1 |U )) ∗ p̃2 . (74) Then, we have k=1  # − λD(V (·|k)kV (·|0))] + η . (63) for some fixed η > 0 and n sufficiently large. Since the right-hand side of (63) is linear in PX , due to the same reasoning up to (55), we have  1 (log M1n + λ log M2n )(1 − εn ) − (1 + λ) n " K #  X ≤ ᾱp,n (1+o(1)) pk D(W (·|k)kW (·|0)) +2η (64) where (73) follows from the conditional version of Mrs. Gerber’s lemma [19]. By the monotonicity of hb (·) on [0, 1/2] and the fact that p1 ∗ p̃2 = p2 , we have As a result, we have H(Y1 |U ) ≤ hb (τn ∗ p1 ). (75) I(X; Y1 |U ) = H(Y1 |U ) − H(Y1 |U, X) = H(Y1 |U ) − hb (p1 ) (76) (77) k=1 for n sufficiently large. 4) Completing the Converse Proof Taking Limits: By substituting λ = L∗1 /L∗2 and ᾱp,n defined in (62) into (64), taking limits as in Section IV-B4, and subsequently maximizing over all probability vectors p on X \ {0}, we obtain v u PK 2 ∗ u2 L1 k=1 pk D(W (·|k)kW (·|0)) t L1 + ∗ L2 ≤ max  PK p L2 χ2 k=1 pk Qk Q0 = L∗1 . (65) This completes the proof for the multiple symbol case. V. P ROOFS OF C OROLLARIES IN A. Proof of Corollary 1 As the the capacity region of the stochastically degraded BC is the same as that of the physically degraded BC with the same marginals [9, Sec. 5.4] even under the covertness constraint, we assume that the physically degradedness condition holds, i.e., Y1 = X ⊕Ψ1, Y2 = Y1 ⊕ Ψ̃2 where Ψ̃2 ∼ Bern(p̃2 ) such that p1 ∗ p̃2 = p2 . We follow the exposition in [9, Sec. 5.4.2] closely. By the standard argument to establish the weak converse for degraded BCs [25], we know that every (n, M1n , M2n , εn )-code for a BC must satisfy (66) (67) for some U ⊸− − X ⊸− − (Y1 , Y2 ) in which X satisfies the weight constraint in (33), i.e., PX = Pαn or E[X] = αn . We now evaluate the region in (66)–(67) explicitly in terms of the channel parameters and the upper bound on the weight of X. Now we have hb (p2 ) = H(Y2 |X) = H(Y2 |U, X) ≤ H(Y2 |U ) ≤ H(Y2 ) = hb (αn ∗ p2 ), Now consider ≤ hb (τn ∗ p1 ) − hb (p1 ). (78) For the other rate bound in (67), we have I(U ; Y2 ) = H(Y2 ) − H(Y2 |U ) ≤ hb (αn ∗ p2 ) − hb (τn ∗ p2 ). (79) (80) d hb (q) = (log e) log 1−q Now, note that for all q ∈ (0, 1/2), dq q . By Taylor expanding hb around q, we obtain S ECTION III-C (log M1n )(1 − εn ) − 1 ≤ nI(X; Y1 |U ) (log M2n )(1 − εn ) − 1 ≤ nI(U ; Y2 ), (73) (68) (69) (70) hb (q ∗ ξ) = hb (q + (1 − 2q)ξ) (81) 1−q 2 = hb (q) + (log e) log · (1 − 2q)ξ + O(ξ ) (82) q as ξ → 0. Now we can simplify the bounds√on the righta/ n and τn := hand-sides of (78) and (80). Write αn :=p √ t/ n where t ∈ [0, a] and a := (1 + o(1)) 2δ/χ2 (Q1 kQ0 ); see (33) for the relation between αn and an upper bound on a function of it given by ᾱn . By combining (66), (67), (78), (80), and (82), we obtain the outer bound  1 (log M1n )(1 − εn ) − 1 n   t 1 1 − p1 √ · +O ≤ (log e)(1 − 2p1 ) log p1 n n  1 (log M2n )(1 − εn ) − 1 n   1 − p2 a − t 1 ≤ (log e)(1 − 2p2 ) log . · √ +O p2 n n (83) (84) By dividing the first and second bounds by (log e)(1 − 1 2 2p1 ) log 1−p and (log e)(1 − 2p2 ) log 1−p respectively, p1 p2 p adding them, multiplying the resultant expression by n/δ, and taking limits, we immediately recover the outer bound to Lδ with L∗j defined in (13). 10 B. Proof of Corollary 2 The proof follows similarly to that of Corollary 1 but we use the entropy power inequality [20], [21] in place of Mrs. Gerber’s lemma. As in the proof of Corollary 1, we assume physically degradedness, i.e., Y1 = X + Ψ1 , Y2 = Y1 + Ψ̃2 where Ψ̃2 is independent zero-mean Gaussian noise with variance N2 − N1 . Let the second moment of the input distribution be denoted as αn = E[X 2 ]; this plays the role of the weight of X in the discrete case. The bounds (66) and (67) clearly still hold so we only have to single-letterize the two mutual information terms I(X; Y1 |U ) and I(U ; Y2 ). We follow the exposition in [9, Sec. 5.5.2] closely. First, we have I(U ; Y2 ) = h(Y2 ) − h(Y2 |U ) (85) 1 (86) ≤ log(2πe(αn + N2 )) − h(Y2 |U ) 2 where (86) follows from the fact that a Gaussian maximizes differential entropy over all distributions with the same second moment. Now note that 1 log(2πeN2 ) = h(Y2 |X) (87) 2 = h(Y2 |U, X) ≤ h(Y2 |U ) ≤ h(Y2 ) (88) 1 ≤ log(2πe(αn + N2 )). (89) 2 As such there exists a τn ∈ [0, αn ] such that 1 log(2πe(τn + N2 )). (90) 2 Then, by the conditional form of the entropy power inequality [20], [21], h(Y2 |U ) = h(Y2 |U ) = h(Y1 + Ψ̃2 |U ) (91)   1 (92) ≥ log 22h(Y1 |U) + 22h(Ψ̃2 |U) 2   1 = log 22h(Y1 |U) + 2πe(N2 − N1 ) . (93) 2 Thus, 1 h(Y1 |U ) ≤ log(2πe(τn + N1 )). (94) 2 Now, we are ready to upper bound the mutual information terms using the above calculations. We have I(X; Y1 |U ) = h(Y1 |U ) − h(Y1 |U, X) (95) 1 1 ≤ log(2πe(τn + N1 )) − log(2πeN1 ) (96) 2 2   1 τn log e τn = log 1 + ≤ , (97) 2 N1 2N1 where the last inequality follows from the fact that log(1+t) ≤ t log e for t ≥ −1. Similarly, I(U ; Y2 ) = h(Y2 ) − h(Y2 |U )   (αn − τn ) log e αn + N2 1 ≤ ≤ log 2 τn + N2 2(τn + N2 ) (αn − τn ) log e ≤ . 2N2 (98) (99) (100) Using the same calculations as those leading to [8, Eqn. (75)], we conclude that the covert communication constraint in the Gaussian case translates to δ α2n + o(α2n ) ≤ . 4σ 4 n (101) The proof is completed by uniting (97), (100), and (101) in a way that is analogous to the conclusion of the proof for the binary symmetric BC in Section V-A. VI. P ROOF S KETCH OF T HEOREM 3 Proof: The achievability in (20) follows by augmenting the standard time-division argument given in Remark 1 in Section III-B. More specifically, we let ρ1 := L1 /L∗1 and ρ2 := L2 /L∗2 . Then ρ1 + ρ2 ≤ 1. We use an optimal code for the first receiver for ρ1 fraction of time, an optimal code for the second receiver for ρ2 fraction of time, and stay idle for the remaining fraction of time. Then the required secret key rate3 is ρ1 (L∗Z − L∗1 ) + ρ2 (L∗Z − L∗2 ) as a direct consequence of [7, Theorem 3], which is equal to the right-hand side of (20). For the converse, for simplicity, we only consider the binary-input Q1 PK case; the general case follows from replacing PK with k=1 pk Qk everywhere and P̄n (1) with k=1 P̄n (k) everywhere. We show that there is a tradeoff between the √ message rates and the secret key rate (with normalizations nδ); if the message rates are in the interior of (12), a strictly smaller secret key rate is required. To elucidate this tradeoff, let us consider a rate tuple (L1 , L2 ) such that L1 /L∗1 + L2 /L∗2 = κ for some κ ∈ [0, 1]. Note that κ strictly less than one means that the message rates are in the interior of (12). By applying similar steps as in [7, Eqns. (91)–(94)], we obtain log M1n + log M2n + log Kn = H(W1 , W2 , S) ≥ I(W1 , W2 , S; Z n ) ≥ I(X n ; Z n ) ≥ nI(X; Z) − δ, (102) (103) (104) (105) where (105) follows from similar steps presented in [26, Sec. 5.2.3]. Here X = XJ and Z = ZJ where J is the time-sharing random variable defined in Section IV-B2. Then, 1 √ (log M1n + log M2n + log Kn ) nδ 1 ≥ √ (nI(X; Z) − δ) (106) nδ   δ D(Qαn kQ0 ) nαn , (107) − D(Q1 kQ0 ) − = √ αn nαn nδ where (107) follows from Lemma 1. Note that the lower bound (107) depends on the “weight” αn = P̄n (1). Hence, substituting the smallest “weight” αn = P̄n (1) that attains L1 /L∗1 + L2 /L∗2 = κ into (107) results in a lower bound on the required secret key rate to attain the message rate pair (L1 , L2 ). 3 With a slight abuse of terminology, we will refer to L , L , and L 1 2 key as rates even though they are not communication rates in the usual sense [9]. 11 Now let us denote the smallest αn = P̄n (1) that attains L1 /L∗1 + L2 /L∗2 = κ by ν ᾱn .4 By a close inspection of the proof of Theorem 2, we can check that under the constraint αn = ν ᾱn , the message pairs are bounded by L1 /L∗1 + L2 /L∗2 ≤ ν. Hence, to achieve L1 /L∗1 + L2 /L∗2 = κ, it should follow that ν ≥ κ. Indeed, we can see that L1 /L∗1 +L2 /L∗2 = κ is achievable with weight κᾱn from the direct part above, by communicating κ fraction of the time and staying idle for the remaining 1 − κ fraction. Note that when αn = κᾱn , it follows from (28) that D(Qαn kQ0 ) δ = 0 and lim = 0. n→∞ n→∞ nαn αn Then, by combining (107)–(108), we have lim 1 lim inf √ (log M1n + log M2n + log Kn ) n→∞ nδ s 2D(Q1 kQ0 )2 = κL∗Z . ≥κ χ2 (Q1 kQ0 ) (108) AND A PPENDIX A P ROOF OF L EMMA 2 Proof: We will only prove (34) and (36) as the other two bounds follow by swapping indices 1 with 2 and vice versa. In addition, in this proof, we include the effect of the secret key S. By Fano’s inequality, H(Wj |Yjn , S) ≤ εn log Mjn + 1, j ∈ {1, 2}. (110) Because W1 and W2 are uniform and independent of each other and of S, we have (log M1n )(1 − εn ) − 1 ≤ I(W1 ; Y1n |S) (109) Since κ = L1 /L∗1 + L2 /L∗2 , (109) immediately implies a matching converse to (20). VII. C ONCLUSION BCs with feedback [31] but it does for other classes of BCs. The natural question is whether feedback enlarges the covert capacity region for various classes of BCs. F UTURE W ORK In this paper, we established the covert capacity region for all two-user discrete and Gaussian memoryless BCs. Somewhat surprisingly, the most basic multi-user communication strategy—time-division transmission—turns out to be optimal. Our proof strategy provides further evidence that the concave envelope characterization of bounds on capacity regions in network information theory [18] is convenient and useful. There are at least three promising avenues for future work. 1) Can we establish the strong converse property for BCs under a covert communication requirement? We conjecture that Lε,δ (Definition 2) for all ε ∈ [0, 1) is given by the time-division region given by (12) in Theorem 2. However, existing strong converse techniques for BCs [23], [27]–[30] are not directly applicable. This is because throughputs in covert communications typically √ scale as Θ( n) instead of being √ linear in n, so the remainder terms (which scale as O( n) in state-of-theart results [29], [30]) resulting from the usual strong converse techniques are not negligible. Note though that the remainder terms in existing results are derived without the covert communication requirement so it is likely that they can be strengthened under this scenario. 2) What is the covert capacity region for BCs where there are more than two legitimate receivers? While Corollaries 1 and 2 hold for an arbitrary number of legitimate receivers (see (17)), Theorem 2 does not seem to generalize easily. At the very least, can we do the same for all successively degraded BCs [9, Sec. 5.7]? 3) What is the covert capacity region for two-user BCs with feedback? Unfortunately, the bound in Lemma 2 does not hold for BCs with feedback. We note that feedback does not enlarge the usual capacity region for degraded 4 We omit mulitplying ᾱ by the factor 1 + o(1) as this is inconsequential n in the (asymptotic) arguments that follows. (log M1n + log M2n )(1 − εn ) − 2 (111) ≤ I(W1 ; Y1n |W2 , S) + I(W2 ; Y2n |S). (112) We start by single letterizing (111) as follows: (log M1n )(1 − εn ) − 1 n X I(W1 ; Y1i |Y1i−1 , S) ≤ ≤ = i=1 n X i=1 n X (113) n I(W1 , S, Y1i−1 , Y2,i+1 ; Y1i ) (114) I(U1i ; Y1i ), (115) i=1 where (115) follows from the identification U1i := n (W1 , S, Y1i−1 , Y2,i+1 ). This proves (34). Next we single letterize (112) using the steps at the top of the next page, where (120) follows from the Csiszár-sumn identity [9] and the identification U2i := (W2 , S, Y1,i+1 , Y2i−1 ) and (121) follows from the fact that Xi is a function of (W1 , W2 , S). This proves (36). Acknowledgements The authors thank Dr. Ligong Wang (ETIS—Université Paris Seine, Université de Cergy-Pontoise, ENSEA, CNRS) for helpful discussions in the initial phase of this work and for pointing us to [16]. The first author also thanks Dr. Lei Yu (NUS) for fruitful discussions on the relation of the present work to stealth [26]. R EFERENCES [1] B. A. Bash, D. Goekel, and D. Towsley. Limits of reliable communication with low probability of detection on AWGN channels. IEEE Journal on Selected Areas in Communications, 31(9):1921–1930, Sep 2013. [2] B. A. Bash, A. H. Gheorghe, M. Patel, J. L. Habif, D. Goeckel, D. Towsley, and S. Guha. Quantum-secure covert communication on bosonic channels. Nature Commun., 6:8626, Oct 2015. [3] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Communications Magazine, 53(12):26–31, Dec 2015. [4] P. H. Che, M. Bakshi, and S. Jaggi. Reliable deniable communication: Hiding messages in noise. In Proc. of the Intl. Symp. on Inform. Th., pages 2945–2949, Istanbul, Turkey, Jul 2013. 12 (log M1n + log M2n )(1 − εn ) − 2 n X n , S) + I(W2 ; Y2i |Y2i−1 , S) I(W1 ; Y1i |W2 , Y1,i+1 ≤ ≤ = = i=1 n X i=1 n X i=1 n X i=1 n I(W1 , Y2i−1 ; Y1i |W2 , S, Y1,i+1 ) + I(W2 , S, Y2i−1 ; Y2i ) (117) n n n I(W1 , Y2i−1 ; Y1i |W2 , S, Y1,i+1 ) + I(W2 , S, Y1,i+1 , Y2i−1 ; Y2i ) − I(Y1,i+1 ; Y2i |W2 , S, Y2i−1 ) (118) n n I(W1 ; Y1i |W2 , S, Y1,i+1 , Y2i−1 ) + I(Y2i−1 ; Y1i |W2 , S, Y1,i+1 ) n n + I(W2 , S, Y1,i+1 , Y2i−1 ; Y2i ) − I(Y1,i+1 ; Y2i |W2 , S, Y2i−1 ) n X I(W1 ; Y1i |U2i ) + I(U2i ; Y2i ) = ≤ i=1 n X i=1 (116) I(Xi ; Y1i |U2i ) + I(U2i ; Y2i ), [5] P. H. Che, M. Bakshi, C. Chan, and S. Jaggi. Reliable deniable communication with channel uncertainty. In Proc. of the Inform. Th. Workshop, pages 30–34, Hobart, Australia, Nov 2014. [6] S. Lee, R. J. Baxley, M. A. Weitnauer, and B. Walkenhorst. Achieving undetectable communication. IEEE Journal of Selected Topics in Signal Processing, 9(7):1195–1205, Oct 2015. [7] M. R. Bloch. Covert communication over noisy channels: A resolvability perspective. IEEE Trans. on Inform. Th., 62(5):2334–2354, 2016. [8] L. Wang, G. W. Wornell, and L. Zheng. Fundamental limits of communication with low probability of detection. IEEE Trans. on Inform. Th., 62(6):3493–3503, 2016. [9] A. El Gamal and Y.-H. Kim. Network Information Theory. Cambridge University Press, Cambridge, U.K., 2012. [10] M. Tahmasbi and M. R. Bloch. Second-order asymptotics of covert communications over noisy channels. In Proc. of the Intl. Symp. on Inform. Th., pages 2224–2228, Barcelona, Spain, Jul 2016. [11] M. Tahmasbi, M. R. Bloch, and V. Y. F. Tan. Error exponent for covert communications over discrete memoryless channels. In Proc. of the Inform. Th. Workshop, Kaohsiung, Taiwan, Nov 2017. [12] S.-H. Lee, L. Wang, A. Khisti, and G. W. Wornell. Covert communication with noncausal channel-state information at the transmitter. In Proc. of the Intl. Symp. on Inform. Th., pages 2830–2834, Aachen, Germany, Jun 2017. [13] L. Wang. Optimal throughput for covert communication over a classicalquantum channel. In Proc. of the Inform. Th. Workshop, pages 364–368, Cambridge, UK, Sep 2016. [14] K. S. K. Arumugam and M. R. Bloch. Keyless covert communication over multiple-access channels. In Proc. of the Intl. Symp. on Inform. Th., pages 2229–2233, Barcelona, Spain, Jul 2016. [15] K. S. K. Arumugam and M. R. Bloch. Covert communication over broadcast channels. In Proc. of the Inform. Th. Workshop, Kaohsiung, Taiwan, Nov 2017. [16] A. Lapidoth, E. Telatar, and R. Urbanke. On wide-band broadcast channels. IEEE Trans. on Inform. Th., 49(12):3250–3258, Dec 2003. [17] A. El Gamal. The capacity of a class of broadcast channels. IEEE Trans. on Inform. Th., 25(2):166–169, 1979. [18] C. Nair. Upper concave envelopes and auxiliary random variables. International Journal of Advances in Engineering Sciences and Applied Mathematics, 5(1):12–20, 2013. [19] A. Wyner and J. Ziv. A theorem on the entropy of certain binary sequences and applications–I. IEEE Trans. on Inform. Th., 19(6):769– 772, 1973. [20] C. E. Shannon. A mathematical theory of communication. The Bell Systems Technical Journal, 27:379–423, 1948. [21] A. J. Stam. Some inequalities satisfied by the quantities of information of Fisher and Shannon. Information and Control, 2:101–112, Jun 1959. (119) (120) (121) [22] T. Cover. Broadcast channels. IEEE Trans. on Inform. Th., 18(1):2–14, 1972. [23] I. Csiszár and J. Körner. Information Theory: Coding Theorems for Discrete Memoryless Systems. Cambridge University Press, 2011. [24] E. L. Lehmann and J. P. Romano. Testing Statistical Hypotheses. Springer-Verlag, New York, NY, 2005. [25] R. G. Gallager. Capacity and coding for degraded broadcast channels. Problems of Information Transmission, 10(3):3–14, 1974. [26] J. Hou. Coding for relay networks and effective secrecy for wiretap channels. PhD thesis, Technische Univ. München, Munich, Germany, 2014. [27] M. Raginsky and I. Sason. Concentration of measure inequalities in information theory, communications and coding. Foundations and Trends ® in Communications and Information Theory, 10(1–2):1–247, 2013. [28] Y. Oohama. New strong converse for asymmetric broadcast channels. arXiv, 2016. arXiv:1604.02901. [29] S. L. Fong and V. Y. F. Tan. A proof of the strong converse theorem for Gaussian broadcast channels via the Gaussian Poincaré inequality. IEEE Trans. on Inform. Th., 63(12), Dec 2017. [30] J. Liu, R. van Handel, and S. Verdú. Beyond the blowing-up lemma: Sharp converses via reverse hypercontractivity. In Proc. of the Intl. Symp. on Inform. Th., pages 943–947, Aachen, Germany, Jun 2017. [31] A. El Gamal. The feedback capacity of degraded broadcast channels (corresp.). IEEE Trans. on Inform. Th., 24(3):379–381, 1978.
7cs.IT
This is a post-print of the original paper published in Pattern Recognition Letters DOI:10.1016/j.patrec.2017.10.024. Facial Attributes: Accuracy and Adversarial Robustness Andras Rozsa∗∗, Manuel Günther, Ethan M. Rudd, Terrance E. Boult arXiv:1801.02480v1 [cs.CV] 4 Jan 2018 University of Colorado Colorado Springs, Vision and Security Technology (VAST) Lab, 1420 Austin Bluffs Parkway, Colorado Springs, CO 80918, USA ABSTRACT Facial attributes, emerging soft biometrics, must be automatically and reliably extracted from images in order to be usable in stand-alone systems. While recent methods extract facial attributes using deep neural networks (DNNs) trained on labeled facial attribute data, the robustness of deep attribute representations has not been evaluated. In this paper, we examine the representational stability of several approaches that recently advanced the state of the art on the CelebA benchmark by generating adversarial examples formed by adding small, non-random perturbations to inputs yielding altered classifications. We show that our fast flipping attribute (FFA) technique generates more adversarial examples than traditional algorithms, and that the adversarial robustness of DNNs varies highly between facial attributes. We also test the correlation of facial attributes and find that only for related attributes do the formed adversarial perturbations change the classification of others. Finally, we introduce the concept of natural adversarial samples, i.e., misclassified images where predictions can be corrected via small perturbations. We demonstrate that natural adversarial samples commonly occur and show that many of these images remain misclassified even with additional training epochs, even though their correct classification may require only a small adjustment to network parameters. c 2018 Elsevier Ltd. All rights reserved. 1. Introduction Recent approaches to facial attribute classification have yielded impressive performance gains by leveraging powerful deep learning models. These approaches generally fall into two categories. While researchers like Liu et al. (2015) attempt to extract a generic face representation across large amounts of face data and then train shallower classifiers for attribute prediction, Rudd et al. (2016) optimize over attribute data directly. Rudd et al. (2016) demonstrated that the latter approach achieves superior performance, despite using smaller quantities of data. Thus, we examine the latter approach in this paper as it is more readily applicable to real-world tasks. While optimizing an end-to-end network for attribute classification yields exceptional performance, recent research (Szegedy et al., 2014; Goodfellow et al., 2015) raises the question: Does using pure end-to-end deep networks – i.e., not simply as feature extractors but as attribute classifiers themselves – induce a risk of non-robust attribute representations for realworld applications? Specifically, Szegedy et al. (2014) discovered that deep neural networks are susceptible to carefully chosen perturbations of even a few pixels. By adding such perturbations – that can be imperceptible to humans – to the original images, the resulting adversarial images become misclassified, Facial attributes have several interesting properties from a recognition perspective. First, they are semantically meaningful to humans which offers a level of interpretation beyond that achieved by most conventional recognition algorithms. This allows for novel applications, including descriptive searches, e.g., “Caucasian female with blond hair” (Kumar et al., 2008, 2011; Scheirer et al., 2012), verification systems (Kumar et al., 2009), facial ordering (Parikh and Grauman, 2011), and social sentiment analysis (Zhang et al., 2015). Second, they provide information that is more or less independent of that distilled by conventional recognition algorithms, potentially allowing for the creation of more accurate and robust systems, narrowing down the search space, and increasing efficiency at match time. Finally, facial attributes are interesting due to their ability to convey meaningful identity information about a previously unseen face, e.g., not enrolled in a gallery or used to train a classifier. ∗∗ Corresponding author e-mail: [email protected] (Andras Rozsa) 1 2 + = = (a) Natural Adversarial: female → male via line-search FFA (0.999) + = = (c) Natural Adversarial: female → male via iterative FFA (0.999) + = (b) Adversarial: wearing lipstick → no lipstick via line-search FFA (0.997) + = (d) Adversarial: wearing lipstick → no lipstick via iterative FFA (0.998) Fig. 1: A DVERSARIAL E XAMPLES BY ATTRIBUTE F LIPPING. This paper demonstrates the problem of natural adversarial samples and how to generate adversarial examples for binary attributes by the novel fast flipping attribute (FFA) technique. Adversarial examples are formed by adding small, non-random perturbations to original inputs; while the modifications can remain imperceptible to human observers, vulnerable machine learning models classify the original and adversarial examples differently. In (a), we display a natural adversarial man (misclassified as a woman) that is “corrected” by an imperceptible perturbation formed via line-search on our separate attribute network. In (b), we show a correctly classified young person flipped to “old” using FFA with line-search on the mixed objective optimization network (MOON) (Rudd et al., 2016). With the computationally more expensive iterative FFA, in general, we can further improve the quality of the formed adversarial examples as shown in (c) and (d), where the higher perceptual adversarial similarity scores (PASS) (Rozsa et al., 2016b) displayed in sub-captions indicate increased structural similarities between the original and perturbed image pairs. Due to attribute correlations learned by MOON, the perturbations formed by the two versions of FFA that alter the classification of “wearing lipstick” also change the classifications of “attractive” and “heavy makeup” attributes to be absent. Perturbations in the middle are magnified by a factor of 10 to enhance visibility, where gray pixels indicate no change. even with high confidence. Research on adversarial images has been conducted since, and these images can be easily generated independently from the dataset, network topology, training regime, hyperparameter choice, and activation type. In our experiments, we attempt to generate adversarial images over a random subset of the CelebA dataset (Liu et al., 2015) using the fast gradient sign (FGS) method (Goodfellow et al., 2015) and our novel fast flipping attribute (FFA) algorithm that efficiently leverages the backpropagation of a Euclidean loss defined on classification scorevectors of input images without requiring ground-truth labels. We find that classifications for some attributes are difficult to change with both FGS and FFA, and that the number of adversarial images does not decrease during training. To date, adversarial images have been presented as inputs with the presence of slight artificial perturbations where the original input is correctly classified and the adversarial input is misclassified. In this paper, we pose the reverse question: Do there exist misclassified inputs on which we can induce small artificial perturbations to correct the classification? or Do adversarial images naturally occur? We find that the answer is yes, there are images in the training set which, even after they were used for training, are misclassified by a given facial attribute network but can be flipped to the proper classification via an imperceptible perturbation. Further, we find that even with additional training, many of these natural adversarial samples are not learned by the networks. One might think correctly learning these natural adversarial samples requires only a minor adjustment to the network parameters, but it seems that proximity in image space does not mean proximity in feature space. In Fig. 1, we show adversarial images that occurred in our experiments conducted on the separate attribute networks and the mixed objective optimization network (MOON) (Rudd et al., 2016). As shown in Figs. 1(a) and (c), a natural adversarial image of a man (left) is misclassified as a woman on our separate attribute network, and a small perturbation (center) applied to the image (right) would correct the classification. Figs. 1(b) and (d) contain a woman correctly classified as wearing lipstick (left) that is turned into a person with no lipstick (right) on MOON by adding a small perturbation (center). Interestingly, the same perturbations also change the classification of the person to non-attractive and to not wearing heavy makeup, indicating that those attributes might be learned by MOON as correlated. Note that the real perturbations are much smaller than shown in Fig. 1, and we magnified the pixel changes by a factor of 10 for better visualization. Since perturbations can be positive and negative, gray pixels correspond to no change. The contributions of this paper are as follows: • We show that end-to-end DNNs provide excellent performance in facial attribute classification. 3 • We generate adversarial images on our separate facial attribute networks at two training epochs and after they converged. We find that these networks attain no additional robustness to adversarial images with longer training. • We introduce the notion of natural adversarial images and analyze their prevalence using our data and networks. We find that the frequency of naturally occurring adversarial images is quite large, accounting for nearly 73 % of the training set images that are incorrectly classified by our separate facial attribute networks. • We present two variants of the fast flipping attribute (FFA) algorithm for adversarial image generation and demonstrate their capabilities of flipping attribute classifications. • We analyze a multi-objective attribute representation and examine the correlations between facial attributes by generating adversarial examples. 2. Attribute Classification The automatic classification of facial attributes was pioneered by Kumar et al. (2009). Their classifiers depended heavily on face alignment, and each attribute used combinations of features from hand-picked facial regions, e.g., cheeks, mouth, etc. The feature spaces consisted of various normalizations and aggregations of color spaces and image gradients. Different features were selected for each attribute, and one RBF-SVM per attribute was independently trained for classification. More recent approaches leverage deep neural networks (DNNs) to extract features. Many use a generic deep feature space representation obtained by training for other face processing tasks. For example, Liu et al. (2015) utilized three DNNs – a combination of two localization networks (LNets) and an attribute recognition network (ANet) – to first localize faces and then extract facial attributes. The ANet is initially trained on external data to identify people and then fine-tuned using all attributes to extract features that are fed into independent linear SVMs for the final attribute classification. Similarly, Wang et al. (2016) used an external dataset that they collected inside different areas of New York City. Using weather and estimated ethnicity information to automatically predict attributes, such as skin color or the presence of sunglasses or scarfs, they pretrained a DNN to extract features. Again, attribute classification was performed using one linear SVM per attribute. Both Rozsa et al. (2016a) and Rudd et al. (2016) found that optimizing directly over facial attribute data yields superior performance, even when using a much smaller training set. Recently, Kalayeh et al. (2017) showed that semantic segmentation further improves attribute classification accuracy. Their 8.20 % overall classification error presents the current state of the art on the CelebA dataset. In this paper, we analyze two approaches that leverage attribute data directly: one in which we train a separate deep network for each attribute (Rozsa et al., 2016a), and another in which we optimize across all attribute labels in a multi-objective loss function (Rudd et al., 2016). 2.1. Network Classification For our separate attribute classifiers (Rozsa et al., 2016a), we adopted the 16-layer VGG network topology of Parkhi et al. (2015), with two modifications. First, we altered the dimension of the RGB image input layer from 224 × 224 pixels to 178 × 218 pixels which is the resolution of the aligned CelebA images. Second, we replaced the final softmax loss with Euclidean loss on the label. We chose Euclidean loss – opposed to softmax, sigmoid, or hinge loss – because attributes lie along a continuous range while sigmoids tend to enforce saturation and hinge-loss enforces a large margin, neither of which is consistent with our intuition. To disambiguate between tensors/matrices, vectors, and scalars, let v denote a tensor or matrix, ~v denote a vector and v denote a scalar for an arbitrary variable v. For an image x with label y ∈ {−1, +1} indicating the absence or presence of an attribute, respectively, let f (x) be the DNN classification decision. Then the Euclidean loss J is: 2 J(θθ , x, y) = f (x) − y , (1) where θ represents the parameters of the DNN model. To maintain comparability with other research reporting on the same dataset, and since the dataset only contains binary attribute labels, we decided to apply a classification function to the network output that was trained with Euclidean loss. For an input x, the classification result c(x) and its corresponding error e(x, y) are obtained by thresholding f (x) at 0:       +1 if f (x) > 0 0 if y · c(x) > 0 c(x) =  e(x, y) = (2)    −1 otherwise, 1 otherwise. The classification error over the whole dataset X of N images with attribute labels Y is then given by: E(X, Y) = N 1 X e(Xn , Yn ) . N n=1 (3) A more pragmatic approach in terms of storage and processing costs can be obtained by optimizing over all labels simultaneously, under one mixed objective optimization network (MOON) (Rudd et al., 2016). Given an image x, with a vector of M attribute labels, ~y, the per-sample loss is given by: J(θθ , x, ~y) = M X 2 fi (x) − ~yi . (4) i=1 By close analogy to (3), the classification error across the dataset with matrix Y of multi-attribute labels is given by: E(X, Y) = N M 1 XX e(Xn , Yni ) . N n=1 i=1 (5) 2.2. Dataset For our experiments, we use the publicly available CelebA dataset (Liu et al., 2015). CelebA consists of more than 200k images showing faces in a variety of different facial expressions, occlusions and illuminations, and poses from frontal to full profile. Approximately 160k images are used for training, and the remaining 40k images are equally split up into validation and test sets. Each image is annotated with binary labels of 40 facial attributes. We conducted our evaluation using the set of pre-cropped face images included in the dataset which are aligned using hand-annotated facial landmarks. 60 Trivial Face Tracer LNets+ANet MOON Separate 50 40 30 20 10 Average 0 Big Lips Oval Face Pointy Nose Wavy Hair Attractive Straight Hair Arched Eyebrows Big Nose Bags Under Eyes Wearing Necklace High Cheekbones Narrow Eyes Young Brown Hair Black Hair Wearing Earrings Heavy Makeup Bushy Eyebrows Smiling Wearing Lipstick Receding Hairline 5 o Clock Shadow Mouth Slightly Open Rosy Cheeks Chubby No Beard Bangs Blond Hair Blurry Double Chin Mustache Wearing Necktie Pale Skin Goatee Male Sideburns Gray Hair Bald Wearing Hat Eyeglasses Classification Error on CelebA in % 4 Fig. 2: ATTRIBUTE C LASSIFICATION E RROR ON C ELEBA. This figure shows the classification errors on the test set of the CelebA dataset for our separate networks and MOON compared to three other algorithms, sorted based on the result of the separate networks. The Trivial approach assigns each attribute to the majority class of the training set. The results of FaceTracer and LNets+ANet are taken from Liu et al. (2015) and results of MOON from Rudd et al. (2016). 2.3. Experiments We conducted a comparison of our separate per-attribute neural networks with other attribute algorithms on the previously described CelebA dataset. Due to memory limitations, we set the training batch size to 64 images per iteration. Thus, the training requires approximately 2,500 iterations to run a full epoch on the training set. In opposition to Parkhi et al. (2015), we did not incorporate any dataset augmentation or mirroring; we trained networks purely on the aligned images. We selected a learning rate of 10−5 . During training, we updated DNN weights using an RMSProp update rule with an inverse learning rate decay policy. Using the GPU implementation of Caffe (Jia et al., 2014), we trained all 40 networks until convergence on the validation set which occurred between two and ten epochs depending on the attribute. A comparison of our results on the CelebA test set with the original FaceTracer approach by Kumar et al. (2009) as well as the LNets+ANet approach of Liu et al. (2015) is shown in Fig. 2. Although Kalayeh et al. (2017) presented the current state of the art in attribute classification on CelebA, they did not provide detailed information about single attributes and are, hence, left out of Fig. 2. Due to the highly biased distributions of attribute labels in the CelebA dataset, we also included a Trivial algorithm that simply predicts the class with the higher occurrence in the training set. For some attributes, such as Attractive or Male (which are approximately balanced in the test set), the Trivial classifier obtains high errors, while for attributes like Narrow Eyes or Double Chin, the Trivial classifier even outperforms the generic feature space approaches, i.e., FaceTracer and LNets+ANet. Only our separate networks and MOON outperform the Trivial approach for all attributes. Our approach using separate DNNs yields a mean classification error of 9.20 %, a relative improvement of 27 % over LNets+ANet (12.70 % classification error) and 51 % improvement over FaceTracer (18.88 % classification error). While our result does not reach the 8.20 % error of Kalayeh et al. (2017), it is statistically not significantly worse than the 9.06 % of MOON (Rudd et al., 2016). Interestingly, we are “only” 54 % better in terms of relative improvement than the Trivial system achieving 19.96 % mean classification error. For certain attributes, especially those not related to face identity, e.g., Wearing Necklace, Wearing Earrings, or Blurry our approach yields dramatic gains over the generic feature space approaches. LNets+ANet outperforms our separate networks on a few attributes but never by more than a percentage point in classification error. 3. Adversarial Images for Attributes An adversarial image is an image that looks very close to (and is generally indistinguishable from) the original image from the perspective of a human observer, but differs dramatically in classification by a machine-learned classifier. Multiple techniques have been proposed to create adversarial examples. The first reliable technique of Szegedy et al. (2014) used a boxconstrained optimization (L-BFGS) algorithm. Starting with a randomly chosen modification, it aims to find the smallest perturbation in the input space that causes the perturbed image to be classified as a predefined target label. Baluja et al. (2015) proposed generating affine perturbations, applying them to input samples, and then observing how models respond to these perturbed images. While, from an adversarial perspective, this approach has the advantage of not requiring knowledge of internal network representations, it relies on “guess and check”, i.e., it creates random perturbations and determines if the results are misclassified which can be prohibitively expensive. Goodfellow et al. (2015) introduced a more efficient algorithm to form adversarial perturbations. Their fast gradient sign (FGS) method creates perturbations by using the sign of the gradient of loss with respect to the input. FGS is computationally 5 efficient as it requires only one gradient being effectively calculated via backpropagation, while L-BFGS needs multiple. Experiments demonstrate that FGS reliably causes a wide variety of learning models to misclassify their perturbed inputs, including shallow models, but deep networks are especially susceptible (Goodfellow et al., 2015). Note that FGS is based directly upon network information, namely the gradient of loss. Although the definition of adversarial example varies (Szegedy et al., 2014; Goodfellow et al., 2015; Baluja et al., 2015), at their core, adversarial examples are modified inputs formed by imperceptible non-random perturbations that are misclassified by machine learning models. Hence, humans should not perceive differences between adversarial and original inputs. To formalize the definition, let x be an input image correctly classified as y. An adversarial perturbation η is given if the perturbed image x̃ = x + η is not classified as y: f (x) = y and f (x̃) , y. (6) This is a necessary but not sufficient condition as the modification needs to be imperceptible. Various measures such as L1 , L2 , or L∞ distances have been used to show how close the perturbed images are to their originals. However, these measures are not well matched to human perception (Sabour et al., 2016) as they are very sensitive to even small geometric distortions that may still result in plausible images. Instead, we seek a measure of similarity in a psychophysical sense. The perceptual adversarial similarity score (PASS) (Rozsa et al., 2016b) measures similarity S (x̃, x) based on structural photometricinvariant differences, by first performing a homography alignment to maximize the enhanced correlation coefficient (ECC) (Evangelidis and Psarakis, 2008) between the perturbed image and the original, then computing the structural similarity index (SSIM) (Flynn et al., 2013) between the aligned images. The homography transform removes differences due to plausible translations and rotations, while SSIM measures structural differences not stemming from perturbations that appear as plausible photometric differences. We believe that the resultant PASS is a suitable measure of the degree to which an image is adversarial. Consistent with Flynn et al. (2013), we adopt the PASS threshold τ = 0.95 as a cutoff for adversarial. 3.1. Adversarial Image Generation We explore two approaches for generating the necessary perturbations η . Goodfellow et al. (2015) introduced FGS to find adversarial perturbations. Given a DNN with parameters θ and an image x, FGS searches for perturbations that cause mislabeling using the sign of the gradient of loss:  η fgs =  sign ∇x J(θθ , x, y) . (7) FGS takes steps in the direction that is defined by the gradient of loss in order to cause mislabeling. This requires knowledge of the label y of the image x. We introduce a novel approach – the fast flipping attribute (FFA) algorithm – that directly relies on the classification scores. By defining a target score-vector ~ti (x) that zeros out the attribute in question and leaving others unchanged (if any), a Euclidean loss can be employed to move f (x) towards this target and, eventually, alter the classification of the particular facial attribute. In general, ~ti (x) can be formalized as:    0 if j = i ~ti (x) =  (8)    f j (x) otherwise. In order to form adversarial perturbations, we use a Euclidean loss between ~ti (x) and the network prediction and apply its gradient with respect to the input image x. Formally: ! 2 1 ~ti (x) − f (x) (9) η ffa =  ∇x 2 can be obtained by using the gradient of the Euclidean loss calculated via backpropagation. For separate attribute networks trained with Euclidean loss, f (x) consists of a single value and, thus, the formed ~ti (x) has one element (which is zero). For MOON, the formed score-vector ~ti (x) contains one zero element for the particular attribute that we aim to alter. By using FGS or FFA, we can obtain directions that define varying perturbations η with respect to a given input image x. To effectively search for the smallest perturbations that cause classification errors along those directions, we apply a linesearch technique with increasing step sizes to reach the weight  in (7) and (9) that causes mislabeling. By doubling the step size after each step, those directions can be quickly discovered. When the line-search oversteps and the classification of the perturbed example changes, we apply a binary search within the latest section of the line-search to find the smallest possible adversarial perturbation. Due to these enhancements, adversarial generation with FFA and FGS approaches achieve comparable computational efficiency. Alternatively, to form higher quality adversarial examples both FGS (Kurakin et al., 2017) and FFA can be used iteratively – with an increased computational cost. Instead of calculating gradients once, iterative approaches take a small step with L∞ = 1 to form a temporary image, recalculate the applicable loss and its gradient with respect to that image, and update it until the classification of the desired attribute is flipped. While the generated adversarial images have rounded discrete pixel values in range [0, 255], iterative FFA temporarily utilizes non-discrete pixel values in order to obtain better adversarial quality. Due to the nature of using the sign in (7), iterative FGS only operates on discrete pixel values. 3.2. Natural Adversarial Images As of today, adversarial images have been artificially generated via a computational process, but no one – to our knowledge – has yet addressed whether adversarial examples occur among natural images: Are there misclassified images for which imperceptible perturbations to inputs yield correct classifications? We seek to explore how often adversarial images naturally occur. Thus, we formalize the novel concept of natural adversarial images. Let x0 be an incorrectly classified image with ground-truth label y. Then x0 is a natural adversarial image if there exists a perturbation η0 such that perturbed image x̃0 = x0 + η0 is correctly classified as y: f (x0 ) , y and f (x̃0 ) = y, (10) Line-Search Flippability in % 6 100 80 60 40 20 0 FGS+ FFA+ MFFA+ FGS− FFA− MFFA− FGS+ FFA+ MFFA+ FGS− FFA− MFFA− 80 60 40 20 Pointy Nose Big Nose Attractive Bags Under Eyes Straight Hair Arched Eyebrows Young Oval Face High Cheekbones Heavy Makeup Smiling Big Lips No Beard 5 o Clock Shadow Mouth Slightly Open Rosy Cheeks Bangs Narrow Eyes Sideburns Goatee Blurry Chubby Bushy Eyebrows Blond Hair Mustache Receding Hairline Wearing Lipstick Male Double Chin Brown Hair Gray Hair Black Hair Bald Eyeglasses Pale Skin Wearing Necktie Wavy Hair Wearing Earrings Wearing Hat Wearing Necklace 0 Average Iterative Flippability in % 100 Fig. 3: A DVERSARIAL S UCCESS. This figure shows the success rates of adversarial example generation techniques for adversarial examples (correctly classified images, + ) and natural adversarial samples (incorrectly classified images, − ) generated on the converged networks trained with Euclidean loss using FGS and FFA, and on MOON using FFA (denoted as MFFA), using PASS threshold τ = 0.95. Results of these techniques utilizing line-search (top) and the iterative approach (bottom) are sorted by the success rate of FGS+ examples formed via line-search, and are based on 1,000 images randomly selected from the CelebA training set. under the premise that S(x̃0 , x0 ) ≥ τ. Hence, a natural adversarial sample is a misclassified image whose prediction can be corrected by an imperceptible modification. Interestingly, the same processes used to generate adversarial images can be used to analyze if a misclassified input is a natural adversarial. 3.3. Experiments To test and compare adversarial example generation with FGS and FFA, we randomly selected 1,000 images of the CelebA training set and performed experiments trying to flip facial attribute classifications. For the separate attribute networks, we used FGS and FFA both via line-search and iteratively. As FGS simply increases the loss until misclassification occurs, it cannot be used to flip an arbitrarily selected attribute on MOON. Therefore, we only utilized FFA on MOON. For each attribute and for both the correctly and incorrectly classified images, we counted the number of times in which an adversarial image could be created, i.e., where an η exists for which S(x, x + η ) ≥ τ with τ = 0.95, for an η generated by either of the two algorithms. The per-attribute results can be obtained in Fig. 3. Interestingly, for some attributes, such as Big Nose or Young, most input images can be turned adversarial, while for others like Wavy Hair or Wearing Necklace, adversarial samples cannot be formed at all on the separate attribute networks. Even more astonishingly, incorrectly classified images can be corrected by small perturbations more frequently than altering the predictions for correctly classified images via adversarial perturbations. Also, the number of adversarial examples generated using FFA is generally higher than for FGS, while almost all images that spawned FGS adversarial examples also spawned FFA adversarial examples. Interestingly, on MOON we could generate adversarial images for almost all attributes, cf. MFFA in Fig. 3. Particularly, the number of natural adversarial examples that we could form on MOON – for both versions of FFA (line-search and iterative) – is generally high with an average rate of more than 90 %. This indicates that for most of the misclassified training images, adding an imperceptible perturbation will correct their classification. On the other hand, the number of adversarial examples generated on the correctly classified images is lower. To better compare the robustness of the separate attribute networks and MOON to FGS or FFA techniques, we also collected the proportion of images we were able to generate on these networks that alter attribute classifications – adversarial examples with S (x, x + η ) ≥ 0.95 as well as non-adversarial samples with S (x, x + η ) < 0.95. The results with various adversarial qualities indicated by the different PASS thresholds τ are shown in the top of Tab. 1. Considering only the separate attribute net- 7 Table 1: FACIAL ATTRIBUTE F LIPPABILITY BY PASS. This table contains the proportions of perturbed images yielding altered classifications generated via FGS or FFA on the converged separate attribute models – trained with either Euclidean or softmax loss – and on the mixed objective optimization network (MOON) via FFA (denoted as MFFA). The relative number of adversarial images formed with either the line-search or the iterative approach, which could be flipped with different PASS thresholds τ, are presented. The last column contains the total number of correctly classified (algorithms appended with + ) and incorrectly classified (algorithms appended with − ) attributes by the respective DNNs. Adversarial examples were created for 1,000 original images randomly sampled from the CelebA training set and are identical across all experiments. Loss Euclidean Softmax Adv. Type τ=0 Line-Search τ = 0.9 τ = 0.95 FGS+ FFA+ MFFA+ FGS− FFA− MFFA− FGS+ FFA+ FGS− FFA− 41.8% 47.2% 55.3% 73.8% 75.0% 95.6% 58.5% 67.0% 91.1% 90.6% 26.5% 38.1% 46.2% 62.5% 73.3% 95.3% 40.6% 59.9% 87.3% 89.4% 23.0% 36.6% 44.0% 59.2% 72.6% 95.0% 32.5% 57.2% 84.1% 89.0% works, we can see that FFA outperforms FGS in terms of the sheer number of altered attribute classifications, and with increasing adversarial quality thresholds the difference between the two techniques widens. For example, while overall 41.8 % and 47.2 % of the correctly classified attributes can be flipped using FGS and FFA via line-search, the proportions of adversarial examples (PASS threshold τ = 0.95) among those are 23.0 % and 36.6 %, respectively. Comparing the separate attribute networks with MOON, we can observe that more adversarial examples can be created on the slightly more accurate MOON, which highlights that accuracy and adversarial robustness are not necessarily correlated. For example, with iterative FFA 59.7 % of the correctly classified facial attributes can be altered, while on MOON this increases to 73.8 %. These results also demonstrate that, in general, the computationally more expensive iterative approach is capable of flipping facial attribute classifications more frequently and with higher adversarial quality than the more traditional line-search technique. On MOON, FFA via line-search yields 44.0 % of flipped classifications on the correctly classified facial attributes at τ = 0.95. While using the iterative approach, we managed to form adversarial perturbations for 73.8 % of the same attributes. To test how the number of adversarial images changes during training, for the separate attribute networks we generated adversarial images for the same 1,000 examples on DNNs trained for two epochs. Intuition would suggest that DNNs are able to learn adversarial samples that exist at two epochs, and thus the total number of adversarial images would decrease with additional training iterations. Especially for natural adversarial images, i.e., images that were misclassified by DNNs at two epochs for which imperceptible modifications to those images would correct their predictions, one would assume that further training would make the networks learn such examples. The results of these experiments, which are listed in detail in the top half of Tab. 2, are counter-intuitive. For FGS, the total number of adversarial images over all attributes that we were able to create slightly increased from 8,827 to 10,587, while τ = 0.99 τ=0 Iterative τ = 0.9 τ = 0.95 11.1% 30.0% 33.5% 45.5% 68.5% 92.0% 12.7% 43.9% 62.2% 84.9% 56.6% 65.7% 84.3% 78.3% 75.4% 94.9% 88.5% 80.5% 96.7% 91.1% 45.8% 63.6% 81.9% 74.2% 75.4% 94.9% 78.5% 80.4% 95.8% 91.0% 40.5% 59.7% 73.8% 70.1% 75.3% 94.6% 67.5% 78.4% 94.8% 90.7% τ = 0.99 Total 18.3% 47.0% 49.9% 53.0% 73.5% 92.7% 21.9% 64.8% 73.1% 89.9% 36210 36210 37288 3790 3790 2712 37108 37108 2892 2892 more than half of the images (5,884) were in both sets (which includes images that were misclassified before and now classified correctly and vice versa). For FFA, the numbers for DNNs at two epochs and after convergence are similar, and for most vulnerable input images we could create adversarial samples on both the converged and unconverged networks. In general, the total number of incorrectly classified images for which adversarial samples could be created was consistent between two epochs and convergence, although at least half of the original input images differed. This also means that half of the images for which an imperceptible modification would have been sufficient to classify them correctly were not corrected with additional training. We found that of the 1,279 images that were natural FFA adversarial samples at two epochs but are not natural adversarial on the converged networks, the majority (1,048) were classified correctly by the converged networks. The numbers we obtained for FGS adversarial examples are similar. 4. Adversarial Portability and Correlation In this section, we evaluate the portability of adversarial examples generated on the separate attribute networks, and analyze the correlation of facial attributes on MOON. 4.1. Adversarial Portability It is natural to ask: To what extent do adversarial images generated on one facial attribute network affect classifications of other networks? To answer this question, we took the previously generated adversarial examples formed on one of the separate attribute networks and tested whether these perturbed images influence the prediction of other attribute networks. The results are shown in Fig. 4. For these experiments, we report the average percentage of cross-model portability. On the left, we present the portability of adversarial samples between the converged networks. Interestingly, most of the 8 Table 2: P ROGRESS OF A DVERSARIAL ROBUSTNESS. This table shows the total numbers of FGS and FFA adversarial images generated with line-search on the separate attribute classification networks at two epochs and after convergence, trained with either Euclidean or softmax loss. We show numbers of adversarial examples (correctly classified images, + ) and natural adversarial samples (incorrectly classified images, − ) over all attributes with τ = 0.95. The overlap represents the number of images that are sources of adversarial instances both at two epochs and after convergence. Adversarial examples were created for 1,000 original images randomly sampled from the CelebA training set and are identical across all experiments. Loss Adv. Type 2 Epochs Converged Overlap 6393 13621 2434 2918 6833 16371 2385 2844 8345 13268 2242 2753 12047 21218 2431 2573 4616 9881 1268 1639 5896 15259 1315 1721 + Euclidean Softmax FGS FFA+ FGS− FFA− FGS+ FFA+ FGS− FFA− perturbations for one attribute do not influence other attributes. However, for some attributes we can observe higher correlations. For example, 26 % of the adversarial samples for Goatee also flip No Beard, and adversarial samples created for several attributes like Chubby, Double Chin, Pale Skin, and Young influence the Attractive attribute. For certain attributes, like Wearing Earrings and Wearing Hat, we were not able to create adversarial samples and, hence, these columns are empty. On the right of Fig. 4, we report the results of a similar experiment. We checked if the adversarial examples formed on the two-epoch networks were still adversarial on the converged networks. On the diagonal, we can see how many adversarial inputs created on the two epoch networks remained adversarial on the converged DNNs. Note that the Narrow Eyes network had already converged after two epochs. On average, more than 30 % of the adversarial images were not learned by the networks, i.e., the same small perturbations still changed the classifications. Notably, the cross-network portability of adversarial samples increased, e.g., around 50 % of the adversarial images created on the Pale Skin network at two epochs flipped the classification of the converged Heavy Makeup network. 4.2. Adversarial Correlation A similar experiment can be conducted on the mixed objective optimization network (MOON). Since MOON is a single network estimating all attributes simultaneously, this experiment does not test adversarial portability (across networks) but adversarial correlation. We took adversarial images generated via FFA for a certain attribute – assuming the PASS threshold τ = 0.95 as before – and checked which other attributes were classified differently. In Fig. 5, we plot the adversarial correlation for MOON using adversarial images generated with FFA both via line-search and iteratively. Although τ = 0.95 indicates small perturbations, we can observe that flipping one attribute changes the classifications of other attributes more often than we observed among separate attribute networks. Astonishingly, adversarial images generated with iterative FFA, which forms adversarial examples with much higher quality, flip related attributes more frequently. For example, the No Beard attribute is flipped with more than 70 % for adversarial images generated for Goatee, Mustache, and Sideburns, while this is not true for the opposite direction. Also, when adversarial images are generated for Blurry, Chubby, Double Chin, Receding Hairline, and Young, in more than 50 % of the cases, the Attractive attribute changes as well. Since noses continue to grow as we age or gain weight, the Big Nose attribute often flips when we generate adversarial examples for Bald, Chubby, Double Chin, Gray Hair, or Receding Hairline. On the other hand, attributes that do not relate to other attributes, such as Bald, Blurry, Pale Skin, Wearing Hat, or Wearing Necktie were not affected by adversarial images generated on any other attribute. Apparently, due to the simultaneous training of all attributes by MOON, the correlations between attributes have been learned much better than on separate attribute networks. 5. Euclidean versus Softmax Loss In Sec. 2, we chose an uncommon loss function – Euclidean loss – to train our separate facial attribute classification DNNs. A key rationale for choosing this loss function is from Rudd et al. (2016), i.e., that we expect that attributes extracted from DNNs trained with Euclidean loss are better suited for face recognition. Readers might ask which loss function leads to better classification performance: Euclidean or softmax? To answer this question, we trained separate attribute classification networks using softmax loss. Compared to Euclidean loss networks, DNNs trained with softmax loss yielded a slightly higher classification error of 9.30 %, which is not statistically significant (p ≈ 0.09 in a two-sided paired T-test). To form adversarial examples on the separate attribute networks trained with softmax loss, we apply FGS using (7) and FFA using (9) via line-search. For FFA, we form the adjusted score-vector ~ti (x) for (8) on the output of the penultimate layer, also known as logits, where two scores are calculated for each input image indicating the presence or absence of the given facial attribute. As the larger value indicates the classification among the two, we form a score-vector ~ti (x) where we change the higher score to zero and leave the other unchanged in order to flip the classification of the input. When forming adversarial examples, we found that DNNs trained with softmax loss are more vulnerable. As detailed in the lower part of Tab. 2, using the same 1,000 examples from the CelebA training set (cf. Sec. 3) we can generate 16,021 adversarial samples (adversarial and natural adversarial examples over all 40 attributes) using FFA on the converged DNNs trained with Euclidean loss, and 23,791 using FFA on softmax loss DNNs. With FGS, these numbers are 10,587 and 14,478, respectively. Similarly, as shown in the lower part of Tab. 1, we can see that more adversarial images could be generated for all PASS thresholds τ and for all adversarial generation techniques. This is consistent with other research which demonstrates that 100% 5 o Clock Shadow Adversarial sample created on attribute 100% Arched Eyebrows Attractive Bags Under Eyes 90% Bald Bangs Big Lips Big Nose 80% Black Hair Blond Hair Blurry Hair 70%BushyBrown Eyebrows Chubby Double Chin Eyeglasses 60% Goatee Gray Hair Heavy Makeup High Cheekbones 50% Male Mouth Slightly Open Mustache Narrow Eyes 40% No Beard Oval Face Pale Skin Pointy Nose 30% Receding Hairline Rosy Cheeks Sideburns Smiling 20% Straight Hair Wavy Hair Wearing Earrings Wearing Hat 10%Wearing Lipstick Wearing Necklace Wearing Necktie Young 0% 90% 80% 70% 60% 50% 40% 30% 20% 10% 5 o Clock Shadow Arched Eyebrows Attractive Bags Under Eyes Bald Bangs Big Lips Big Nose Black Hair Blond Hair Blurry Brown Hair Bushy Eyebrows Chubby Double Chin Eyeglasses Goatee Gray Hair Heavy Makeup High Cheekbones Male Mouth Slightly Open Mustache Narrow Eyes No Beard Oval Face Pale Skin Pointy Nose Receding Hairline Rosy Cheeks Sideburns Smiling Straight Hair Wavy Hair Wearing Earrings Wearing Hat Wearing Lipstick Wearing Necklace Wearing Necktie Young Adversarial to attribute 5 o Clock Shadow Arched Eyebrows Attractive Bags Under Eyes Bald Bangs Big Lips Big Nose Black Hair Blond Hair Blurry Brown Hair Bushy Eyebrows Chubby Double Chin Eyeglasses Goatee Gray Hair Heavy Makeup High Cheekbones Male Mouth Slightly Open Mustache Narrow Eyes No Beard Oval Face Pale Skin Pointy Nose Receding Hairline Rosy Cheeks Sideburns Smiling Straight Hair Wavy Hair Wearing Earrings Wearing Hat Wearing Lipstick Wearing Necklace Wearing Necktie Young 5 o Clock Shadow Arched Eyebrows Attractive Bags Under Eyes Bald Bangs Big Lips Big Nose Black Hair Blond Hair Blurry Brown Hair Bushy Eyebrows Chubby Double Chin Eyeglasses Goatee Gray Hair Heavy Makeup High Cheekbones Male Mouth Slightly Open Mustache Narrow Eyes No Beard Oval Face Pale Skin Pointy Nose Receding Hairline Rosy Cheeks Sideburns Smiling Straight Hair Wavy Hair Wearing Earrings Wearing Hat Wearing Lipstick Wearing Necklace Wearing Necktie Young Adversarial to attribute 9 0% Adversarial sample created on attribute Fig. 4: A DVERSARIAL P ORTABILITY ACROSS S EPARATE N ETWORKS. This figure shows the portability of adversarial examples across separate attribute networks. Adversarial examples were created for 1,000 original images randomly sampled from the CelebA training set, which are identical across all experiments. On the left, FFA adversarial images created on the converged networks of a given attribute are tested on all converged networks. On the right, FFA adversarial images created on networks after two epochs are tested on the fully converged networks. All networks were trained using Euclidean loss and adversarial images were generated via FFA using line-search. DNNs trained with softmax loss are generally vulnerable to adversarial examples. 6. Conclusion In this paper, we employed a simple and effective method to train deep neural networks (DNNs) to perform binary facial attribute classification. Experiments on the CelebA dataset demonstrate a critical advantage in optimizing directly over attribute data. Even with our simple approach using separate attribute networks, we are able to obtain a 9.20 % average classification error, and outperform the generic facial features approach LNets+ANet (12.70 %). This performance gain is statistically significant, resulting in p < 10−28 in a paired T-test. Added optimizations in terms of more tenable model size and a statistically non-significant (p ≈ 0.05) performance gain can be achieved by the multi-objective optimization of MOON (Rudd et al., 2016), which obtains 9.06 % classification error on the CelebA benchmark. We conducted a robustness analysis and introduced the fast flipping attribute (FFA) algorithm, a fast and effective method to generate adversarial images by flipping the binary decision of the DNN. We demonstrated that FFA can create more adversarial examples than the related fast gradient sign (FGS) method. In comparison to Rozsa et al. (2016a), we extended the FFA algorithm to be usable for multi-objective networks such as MOON, and we implemented an iterative extension of FFA. We showed empirically that iterative FFA generates better quality adversarial examples and is able to flip attribute predictions more frequently. Nevertheless, there are some attributes that cannot be flipped on the separately trained DNNs. We demonstrated that further training epochs do not make separate attribute DNNs more robust to adversarial images. Furthermore, most of the natural adversarial images, which only require small modifications to be correctly classified, are not corrected with the higher number of training iterations. Particularly for the convolutional layers, this exhibits that highly localized perturbations cannot easily be balanced by small modifications to convolutional kernels as this would influence the convolution result globally. Finally, at two epochs DNNs obtained an average classification error of 9.78 % that is statistically significantly (p < 10−10 in a paired T-test) higher than the 9.20 % that we obtained with the converged DNNs. In order to further improve the overall performance of our networks, future work can also consider fine-tuning trained DNN models with adversarial samples or hard positives (Rozsa et al., 2016b), corrected natural adversarial samples, or even augmented natural adversarial samples containing perturbations with lower magnitudes than otherwise needed for correcting misclassifications. Acknowledgment This research is based upon work funded in part by NSF IIS1320956 and in part by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA), via IARPA R&D Contract No. 201414071600012. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the ODNI, IARPA, or the U.S. Government. The U.S. Government is authorized to reproduce and 100% 5 o Clock Shadow Adversarial sample created on attribute 100% Arched Eyebrows Attractive Bags Under Eyes 90% Bald Bangs Big Lips Big Nose 80% Black Hair Blond Hair Blurry Hair 70%BushyBrown Eyebrows Chubby Double Chin Eyeglasses 60% Goatee Gray Hair Heavy Makeup High Cheekbones 50% Male Mouth Slightly Open Mustache Narrow Eyes 40% No Beard Oval Face Pale Skin Pointy Nose 30% Receding Hairline Rosy Cheeks Sideburns Smiling 20% Straight Hair Wavy Hair Wearing Earrings Wearing Hat 10%Wearing Lipstick Wearing Necklace Wearing Necktie Young 0% 90% 80% 70% 60% 50% 40% 30% 20% 10% 5 o Clock Shadow Arched Eyebrows Attractive Bags Under Eyes Bald Bangs Big Lips Big Nose Black Hair Blond Hair Blurry Brown Hair Bushy Eyebrows Chubby Double Chin Eyeglasses Goatee Gray Hair Heavy Makeup High Cheekbones Male Mouth Slightly Open Mustache Narrow Eyes No Beard Oval Face Pale Skin Pointy Nose Receding Hairline Rosy Cheeks Sideburns Smiling Straight Hair Wavy Hair Wearing Earrings Wearing Hat Wearing Lipstick Wearing Necklace Wearing Necktie Young Adversarial to attribute 5 o Clock Shadow Arched Eyebrows Attractive Bags Under Eyes Bald Bangs Big Lips Big Nose Black Hair Blond Hair Blurry Brown Hair Bushy Eyebrows Chubby Double Chin Eyeglasses Goatee Gray Hair Heavy Makeup High Cheekbones Male Mouth Slightly Open Mustache Narrow Eyes No Beard Oval Face Pale Skin Pointy Nose Receding Hairline Rosy Cheeks Sideburns Smiling Straight Hair Wavy Hair Wearing Earrings Wearing Hat Wearing Lipstick Wearing Necklace Wearing Necktie Young 5 o Clock Shadow Arched Eyebrows Attractive Bags Under Eyes Bald Bangs Big Lips Big Nose Black Hair Blond Hair Blurry Brown Hair Bushy Eyebrows Chubby Double Chin Eyeglasses Goatee Gray Hair Heavy Makeup High Cheekbones Male Mouth Slightly Open Mustache Narrow Eyes No Beard Oval Face Pale Skin Pointy Nose Receding Hairline Rosy Cheeks Sideburns Smiling Straight Hair Wavy Hair Wearing Earrings Wearing Hat Wearing Lipstick Wearing Necklace Wearing Necktie Young Adversarial to attribute 10 0% Adversarial sample created on attribute Fig. 5: ATTRIBUTE C ORRELATION ON MOON. This figure shows the correlation of facial attributes on MOON based on adversarial images generated for single attributes. Adversarial examples were created for 1,000 original images randomly sampled from the CelebA training set, which are identical across all experiments. On the left, FFA adversarial images were created via line-search. On the right, iterative FFA was used for adversarial example generation. distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon. References Baluja, S., Covell, M., Sukthankar, R., 2015. The Virtues of Peer Pressure: A Simple Method for Discovering High-Value Mistakes, in: Computer Analysis of Images and Patterns, Springer. pp. 96–108. Evangelidis, G.D., Psarakis, E.Z., 2008. Parametric Image Alignment Using Enhanced Correlation Coefficient Maximization. IEEE Transactions on Pattern Analysis and Machine Intelligence 30, 1858–1865. Flynn, J.R., Ward, S., Abich IV, J., Poole, D., 2013. Image Quality Assessment Using the SSIM and the Just Noticeable Difference Paradigm, in: Engineering Psychology and Cognitive Ergonomics. Understanding Human Cognition. Springer, pp. 23–30. Goodfellow, I.J., Shlens, J., Szegedy, C., 2015. Explaining and Harnessing Adversarial Examples, in: International Conference on Learning Representation (ICLR). Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T., 2014. Caffe: Convolutional Architecture for Fast Feature Embedding, in: Proceedings of the ACM International Conference on Multimedia, ACM. pp. 675–678. Kalayeh, M.M., Gong, B., Shah, M., 2017. Improving facial attribute prediction using semantic segmentation, in: IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Kumar, N., Belhumeur, P., Nayar, S., 2008. FaceTracer: A Search Engine for Large Collections of Images with Faces, in: European Conference on Computer Vision (ECCV). Springer, pp. 340–353. Kumar, N., Berg, A.C., Belhumeur, P.N., Nayar, S.K., 2009. Attribute and Simile Classifiers for Face Verification, in: International Conference on Computer Vision (ICCV), IEEE. pp. 365–372. Kumar, N., Berg, A.C., Belhumeur, P.N., Nayar, S.K., 2011. Describable Visual Attributes for Face Verification and Image Search. IEEE Transactions on Pattern Analysis and Machine Intelligence 33, 1962–1977. Kurakin, A., Goodfellow, I., Bengio, S., 2017. Adversarial machine learning at scale, in: International Conference on Learning Representation (ICLR). Liu, Z., Luo, P., Wang, X., Tang, X., 2015. Deep Learning Face Attributes in the Wild, in: International Conference on Computer Vision (ICCV), IEEE. pp. 3730–3738. Parikh, D., Grauman, K., 2011. Interactively Building a Discriminative Vocabulary of Nameable Attributes, in: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), IEEE. pp. 1681–1688. Parkhi, O.M., Vedaldi, A., Zisserman, A., 2015. Deep Face Recognition. British Machine Vision Conference (BMVC) 1, 6. Rozsa, A., Günther, M., Rudd, E.M., Boult, T.E., 2016a. Are Facial Attributes Adversarially Robust?, in: International Conference on Pattern Recognition (ICPR). Rozsa, A., Rudd, E.M., Boult, T.E., 2016b. Adversarial Diversity and Hard Positive Generation, in: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. Rudd, E.M., Günther, M., Boult, T.E., 2016. MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes, in: European Conference on Computer Vision (ECCV). Sabour, S., Cao, Y., Faghri, F., Fleet, D.J., 2016. Adversarial Manipulation of Deep Representations, in: International Conference on Learning Representation (ICLR). Scheirer, W.J., Kumar, N., Belhumeur, P.N., Boult, T.E., 2012. Multi-Attribute Spaces: Calibration for Attribute Fusion and Similarity Search, in: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2933–2940. Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R., 2014. Intriguing Properties of Neural Networks, in: International Conference on Learning Representation (ICLR). Wang, J., Cheng, Y., Feris, R.S., 2016. Walk and learn: Facial attribute representation learning from egocentric video and contextual data, in: IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Zhang, Z., Luo, P., Loy, C.C., Tang, X., 2015. Learning Social Relation Traits from Face Images, in: International Conference on Computer Vision (ICCV), IEEE. pp. 3631–3639.
1cs.CV
Logical Methods in Computer Science Vol. 2 (3:3) 2006, pp. 1–22 www.lmcs-online.org Submitted Published Dec. 16, 2005 Jul. 27, 2006 RELATIONAL PARAMETRICITY AND CONTROL MASAHITO HASEGAWA Research Institute for Mathematical Sciences, Kyoto University, Kyoto 606-8502 Japan, and PRESTO, Japan Science and Technology Agency e-mail address: [email protected] Abstract. We study the equational theory of Parigot’s second-order λµ-calculus in connection with a call-by-name continuation-passing style (CPS) translation into a fragment of the second-order λ-calculus. It is observed that the relational parametricity on the target calculus induces a natural notion of equivalence on the λµ-terms. On the other hand, the unconstrained relational parametricity on the λµ-calculus turns out to be inconsistent. Following these facts, we propose to formulate the relational parametricity on the λµ-calculus in a constrained way, which might be called “focal parametricity”. Dedicated to Prof. Gordon Plotkin on the occasion of his sixtieth birthday 1. Introduction The λµ-calculus, introduced by Parigot [26], has been one of the representative term calculi for classical natural deduction, and widely studied from various aspects. Although it still is an active research subject, it can be said that we have some reasonable understanding of the first-order propositional λµ-calculus: we have good reduction theories, well-established CPS semantics and the corresponding operational semantics, and also some canonical equational theories enjoying semantic completeness [16, 24, 25, 36, 39]. The last point cannot be overlooked, as such complete axiomatizations provide deep understanding of equivalences between proofs and also of the semantic structure behind the syntactic presentation. The second-order λµ-calculus (λµ2), again due to Parigot [27], has been studied in depth as a calculus for second-order classical natural deduction. In particular, strong normalization results of λµ2 [27, 23] and its extensions, e.g. with inductive types [21], have been a central research topic, because of the proof-theoretical importance of strong normalization. However, for λµ2, it seems that there are few attempts of giving an equational theory supported by some fine semantic structure. This situation is rather frustrating, since without such equational and semantic accounts, we cannot discuss e.g. the correctness of the impredicative encoding of the datatypes in λµ2. For the second-order λ-calculus λ2 (system 2000 ACM Subject Classification: F.3.2. Key words and phrases: polymorphism, parametricity, continuations. l LOGICAL METHODS IN COMPUTER SCIENCE c DOI:10.2168/LMCS-2 (3:3) 2006 CC Masahito Hasegawa Creative Commons 2 MASAHITO HASEGAWA F) [9, 33], a subsystem of λµ2, there are several beautiful results on the relational parametricity [34] and the universal properties of impredicative constructions [1, 15, 31, 40, 44], e.g. that µX.σ = ∀X.(σ → X) → X (where σ covariant in X) gives an initial algebra of the functor ΛX.σ in a suitable sense. We certainly wish to have such a story for λµ2 too. This work is an attempt to identify such an equational theory which is backed up by certain semantic structures. Specifically, we propose a relational parametricity principle which is sound and sufficiently powerful for deriving such equivalences on the λµ-terms. 1.1. Parametric CPS semantics. We first consider the semantics of λµ2 given by a CPS-translation into a fragment of λ2 — that of the second-order existential types ∃X.τ , conjunction types τ1 ∧ τ2 , and arrow types τ → R into a distinguished type R (this choice of the target calculus is due to a recent work of Fujita [7]). The translation (−)◦ sends a type variable X to X, arrow type σ1 → σ2 to (σ1◦ → R) ∧ σ2◦ , and the universal type ∀X.σ to ∃X.σ ◦ — while a term M : σ is sent to [[M ]] : σ ◦ → R. It can be considered as a natural extension of Streicher’s call-by-name CPS translation [36, 39, 43]. It follows that this translation already gives a reasonable equational theory on λµ2, in that it validates the standard βη-equalities1 . In fact, this is a consequence of a fibred version of the ”category of continuations” construction [16, 36, 39]. However, this is just a starting point; we observe that, if some of the impredicative constructions in the target calculus satisfy certain universal properties (e.g. ∃X.X is a terminal object) which follow from the relational parametricity, then so do the impredicative constructions in the source λµ2-calculus — but not quite in the way that we first might expect. For instance, the type ⊥ = ∀X.X does not give an initial object (cf. [37]) — instead it plays the role of the falsity type (or the “answer type”); in fact, we have a double-negation elimination from (σ → ⊥) → ⊥ to σ for any σ which actually is an algebra of the doublenegation monad ((−) → ⊥) → ⊥. As another major example, ∀X.(σ → X) → X does not give an initial algebra of ΛX.σ; it gives an initial algebra of ΛX.(σ → ⊥) → ⊥ — not with respect to all terms but to a certain class of terms (the “focal terms”, to be mentioned below). In particular, if X is not free in σ, ∀X.(σ → X) → X is isomorphic not to σ but to (σ → ⊥) → ⊥. In short, impredicative encodings in λµ2 get extra double negations, and the relational parametricity of λ2 is not consistent with the equational theory of λµ2 induced by the CPS semantics. As a consequence, we cannot encode cartesian products in λµ2, though they can be added easily. Also we cannot express the classical disjunctions [36], though they can be added without changing the target of the CPS translation. 1.2. Focal parametricity. These results suggest that the CPS translation into parametric target calculus gives a reasonable semantic foundation and equational theory for λµ2, which is sufficient for obtaining various interesting results. However, here the parametricity is used rather indirectly, via the CPS translation; we also wish to have a decent notion of parametricity directly within λµ2. To figure out what sort of parametricity principle can be expected for λµ2, recall the following fact on λ2 with parametricity: given a polymorphic term M : ∀X.F [X] → G[X] (with X covariant in F and G) and types σ1 , σ2 , the instances 1We can say more – we can show that this CPS-semantics is sound and complete with respect to the βη-theory of λµ2. This result, together with further syntactic analysis of this CPS translation, will appear in a forthcoming paper with Ken-etsu Fujita. RELATIONAL PARAMETRICITY AND CONTROL 3 M σ1 : F [σ1 ] → G[σ1 ] and M σ2 : F [σ2 ] → G[σ2 ] obey the naturality, in that the following diagram F [f ] - F [σ2 ] F [σ1 ] M σ1 M σ2 ? G[σ1 ] ? - G[σ2 ] G[f ] commutes for any f : σ1 → σ2 . This is no longer true for λµ2. For example, let F [σ] = (σ → ⊥) → ⊥, G[σ] = σ and M be the double-negation elimination (which does not exist in λ2); then the naturality for arbitrary maps implies inconsistency — we get σ ≃ (σ → ⊥) → ⊥ for every σ by letting f be the obvious map from σ to (σ → ⊥) → ⊥, which is enough to kill the theory [20]. Similar result can be observed for other “classical” proofs, e.g. of the Peirce law. To this end, we look at the focus [36] (centre [32, 42], C-maps [16]) of λµ2; a focal map is no other than an algebra morphism between the the double-negation monad mentioned above, i.e., a map making the naturality diagram for the double-negation elimination commute. It follows that a notion of relational parametricity on λµ2 in which the construction of the graph relations is allowed only for focal maps is consistent, as there are nontrivial models. Together with the definability (fullness) of the CPS translation, we see that it is at least as powerful as the parametricity on the CPS target calculus which we have mentioned above, thus gives a powerful principle for deriving the equivalences of terms in λµ2. (We actually conjecture that these two notions of parametricity do agree, but it is open as of writing this article.) This principle, which we shall call focal parametricity, should be a natural notion of parametricity for λµ2. We will sketch some use of focal parametricity for deriving “free theorems” for λµ2 syntactically. 1.3. Towards parametricity for computational effects. At the conceptual and abstract level, this story closely resembles to the study of linear parametricity and recursion [4, 30]. In the case of linear parametricity, the graph relations are allowed to be constructed only from the linear maps, and a linear map is an algebra map w.r.t. the lifting monad. We claim that, just like the linear parametricity gives a solution of accommodating nontermination and recursion in the polymorphic setting (as advocated by Plotkin [30]), the focal parametricity provides a way of accommodating control features in the polymorphic setting. In short: focal parametricity linear parametricity = non-termination first-class control As future work, it would be an interesting challenge to find a unifying framework of linear parametricity and focal parametricity; it should be useful to have parametric polymorphism, recursion, and control at once, as in the realistic programming languages (cf. [14, 18, 19]). More ambitiously, we are keen to see an adequate notion of parametricity for fairly general “effectful” settings. Possible starting points for this direction might include the “parametricity graphs” approach [5] which allows us to deal with parametricity at a general level (including the linear parametricity as an instance), and the “category of 4 MASAHITO HASEGAWA linear continuations construction” [12] which induces both the CPS translation and Girard translation as special cases. See Section 7 for further discussions related to this issue. 1.4. Construction of this paper. The rest of this paper is organised as follows. In section 2 and 3 we introduce the calculi and CPS-translation which are the subject of this study. In section 4 we consider the implications of the relational parametricity on the CPS-target calculus. The focal parametricity is introduced in section 5, followed by examples in section 6, including focally initial algebras and the type of Church numerals. Section 7 gives an alternative characterisation of focus, which suggests a generalisation of this work to a theory of parametricity for general effects. We then give some concluding remarks in Section 8. 2. The calculi 2.1. The second-order λµcalculus. The second-order λµ-calculus, λµ2, is given as follows. We essentially follow Parigot’s formulation [27] (with some flavour from Selinger’s [36]). The types are the same as those of the second-order λ-calculus λ2: σ ::= X | σ → σ | ∀X.σ In a typing judgement Γ ⊢ M : σ | ∆, Γ stands for the typing context of variables, while ∆ for the context of names (continuation variables). Γ, x : σ, Γ′ ⊢ x : σ | ∆ Γ, x : σ1 ⊢ M : σ2 | ∆ Γ ⊢ λxσ1 .M : σ1 → σ2 | ∆ Γ ⊢ M : σ1 → σ2 | ∆ Γ ⊢ N : σ1 | ∆ Γ ⊢ M N : σ2 | ∆ Γ ⊢ M : σ | ∆ (X 6∈ F T V (Γ, ∆)) Γ ⊢ ΛX.M : ∀X.σ | ∆ Γ ⊢ M : ∀X.σ1 | ∆ Γ ⊢ M σ2 : σ1 [σ2 /X] | ∆ Γ ⊢ M : σ2 | α : σ1 , ∆ (β : σ2 ∈ α : σ1 , ∆) Γ ⊢ µασ1 .[β]M : σ1 | ∆ RELATIONAL PARAMETRICITY AND CONTROL 5 The axioms for the equational theory are again the standard ones — note that we consider the extensional theory, i.e. with the η-axioms. (λxσ .M ) N λxσ .M x (ΛX.M ) σ ΛX.M X = = = = M [N/x] M (x 6∈ F V (M )) M [σ/X] M (X 6∈ F T V (M )) µα.[β](µγ.M ) µασ .[α]M σ →σ 1 2 .M ) N (µα ∀X.σ 1 .M ) σ (µα 2 = = = = µα.M [β/γ] M (α 6∈ F N (M )) µβ σ2 .M [[β](− N )/[α](−)] µβ σ1 [σ2 /X] .M [[β](− σ2 )/[α](−)] In the last two axioms, we make uses of so-called ”mixed substitution”; for instance, M [[β](− N )/[α](−)] means replacing occurances of the form [α]L in M by [β](L N ) recursively. In the sequel, we frequently use the following syntactic sugar. First, we let ⊥ be the type ∀X.X — the type of falsity. We may also write ¬σ for σ → ⊥. Using ⊥, we define the “named term” [β]M ≡ µα⊥ .[β]M : ⊥ (where M : σ, β : σ, with α fresh) and the µ-abstraction µασ .M : σ ≡ µασ .[α](M σ) for M : ⊥. It follows that µασ .[β]M = µασ .[β]M holds. With this ⊥, we can express the double-negation elimination in λµ2 by making use of both the polymorphic and classical features: Cσ = λm¬¬σ .µασ .m (λxσ .[α]x) : ¬¬σ → σ As expected, we have Cσ (λk¬σ .k M ) = M . The properties of ⊥ and Cσ will be further studied later under parametricity assumptions. 2.2. Target: the {∃, ∧, ¬}calculus. In tthe literature, the second-order λ-calculus (λ2) is often taken as the target of the CPS translation for λµ2. Fujita observed that it actually suffices to consider a fragment of λ2 with negations, conjunctions and existential types as a target [7]. In this paper we follow this insight. τ ::= X | R | ¬τ | τ ∧ τ | ∃X.τ ¬τ can be considered as a shorthand of τ → R. The type R can be replaced by ∃X.¬X ∧ X, but for simplicity we keep R as a type constant. The syntax of terms is a fairly standard one, though for conjunctions we employ a slightly less familiar elimination rule (with let-binding) so that it parallels that of the existential types. Γ, x : τ, Γ′ ⊢ x : τ Γ, x : τ ⊢ M : R Γ ⊢ λxτ .M : ¬τ Γ ⊢ M : ¬τ Γ ⊢ N : τ Γ⊢MN :R 6 MASAHITO HASEGAWA Γ ⊢ M : τ1 Γ ⊢ N : τ2 Γ ⊢ hM, N i : τ1 ∧ τ2 Γ ⊢ M : τ1 ∧ τ2 Γ, x : τ1 , y : τ2 ⊢ N : τ3 Γ ⊢ let hxτ1 , y τ2 i be M in N : τ3 Γ ⊢ M : τ1 [τ2 /X] Γ ⊢ hτ2 , M i : ∃X.τ1 Γ ⊢ M : ∃X.τ1 Γ, x : τ1 ⊢ N : τ2 X 6∈ F T V (Γ, τ2 ) Γ ⊢ let hX, xτ1 i be M in N : τ2 Again, we employ the standard βη-axioms. (λxσ .M ) N λxσ .M x let hx, yi be hL, M i in N let hx, yi be M in N [hx, yi/z] let hX, xi be hτ, M i in N let hX, xi be M in N [hX, xi/z] = = = = = = M [N/x] M (x 6∈ F V (M )) N [L/x, M/y] N [M/z] N [τ /X, M/x] N [M/z] 3. CPS translation 3.1. The CPS translation. We present a call-by-name CPS translation which can be considered as an extension of that introduced by Streicher [16, 39, 36] (rather than the translations by Plotkin [29], Parigot [27] or Fujita [7] which introduce extra negations and do not respect extensionality). X◦ = X (σ1 → σ2 )◦ = ¬σ1◦ ∧ σ2◦ (∀X.σ)◦ = ∃X.σ ◦ [[xσ ]] [[λxσ1 .M σ2 ]] [[M σ1 →σ2 N σ1 ]] [[ΛX.M σ ]] [[M ∀X.σ1 σ2 ]] σ [[µα 1 .[β σ2 ]M σ2 ]] where λhxσ , y τ i.M λhX, y τ i.M = = = = = = ◦ x¬σ ◦ ◦ λhx¬σ1 , kσ2 i.[[M ]] k ◦ λkσ2 .[[M ]] h[[N ]], ki ◦ λhX, kσ i.[[M ]] k ◦ λkσ1 [σ2 /X] .[[M ]] hσ2◦ , ki ◦ λασ1 .[[M ]] β ≡ λz σ∧τ .let hxσ , y τ i be z in M ≡ λz ∃X.τ .let hX, y τ i be z in M RELATIONAL PARAMETRICITY AND CONTROL 7 3.2. Soundness. The type soundness follows from a straightforward induction. Proposition 3.1 (type soundness). Γ ⊢ M : σ | ∆ =⇒ ¬Γ◦ , ∆◦ ⊢ [[M ]] : ¬σ ◦ ◦ when Γ is x : σ , . . . , x ◦ where ¬Γ◦ is x1 : ¬σ1◦ , . . . , xm : ¬σm 1 1 m : σm , and ∆ = α1 : ◦ ◦ σ1 , . . . , αn : σn for ∆ = α1 : σ1 , . . . , αn : σn . Note that (σ[τ /X])◦ ≡ σ ◦ [τ ◦ /X], [[M [N/x]]] ≡ [[M ]][[[N ]]/x], and also [[M [σ/X]]] ≡ [[M ]][σ ◦ /X] hold. Then we have the equational soundness: Proposition 3.2 (equational soundness). Γ ⊢ M = N : σ |∆ =⇒ ¬Γ◦ , ∆◦ ⊢ [[M ]] = [[N ]] : ¬σ ◦ In addition, we have the definability result: Proposition 3.3 (fullness). ¬Γ◦ , ∆◦ ⊢ N : ¬σ ◦ =⇒ N = [[M ]] for some Γ ⊢ M : σ | ∆ This can be proved by providing an inverse translation of the CPS translation, so that ¬Γ◦ , ∆◦ ⊢ P : ¬σ ◦ =⇒ Γ ⊢ P −1 : σ | ∆ ¬Γ◦ , ∆◦ ⊢ C : σ ◦ =⇒ Γ ⊢ C −1 [−σ ] : ⊥ | ∆ ¬Γ◦ , ∆◦ ⊢ A : R =⇒ Γ ⊢ A−1 : ⊥ | ∆ hold, where Program : ¬σ ◦ P ::= x | λk.A ◦ Continuation : σ C ::= k | hP, Ci | hσ ◦ , Ci | let hx, ki be C in C | let hX, ki be C in C Answer : R A ::= P C | let hx, ki be C in A | let hX, ki be C in A as follows. x−1 = x = µkσ .A−1 ◦ (λkσ .A)−1 k−1 hP, Ci−1 hσ ◦ , Ci−1 (let hx, ki be C1 in C2 )−1 (let hX, ki be C1 in C2 )−1 = = = = = [k][−] C −1 [− P −1 ] C −1 [− σ] C1−1 [λx.µk.C2−1 [−]] C1−1 [ΛX.µk.C2−1 [−]] (P C)−1 = C −1 [P −1 ] (let hx, ki be C in A)−1 = C −1 [λx.µk.A−1 ] (let hX, ki be C in A)−1 = C −1 [ΛX.µk.A−1 ] This can be considered as a “continuation-grabbing style transformation” in the sense of Sabry [35]. It follows that for any ¬Γ◦ , ∆◦ ⊢ M : ¬σ ◦ there exists ¬Γ◦ , ∆◦ ⊢ P : ¬σ ◦ generated by this grammar such that P = M — it suffices to take the β-normal form [7]. Moreover we can routinely show that [[P −1 ]] = P . Thus the CPS translation enjoys fullness: all terms are definable modulo the provable equality. This definability is important for relating the parametricity principles for the source and target calculi. 8 MASAHITO HASEGAWA 3.3. A semantic explanation. Here is a short explanation of why this CPS translation works, intended for readers with category theoretic background — on the “categories of continuations” construction [16, 39, 36], and on fibrations for polymorphic type theories [17]. As a response category C with a response object R induces a control category RC with RC (X, Y ) = C(RX , RY ), a fibred response category with finite products and simple coproducts (for existential quantifiers) induces a fibred control category with finite products and simple products (for universal quantifiers). Let us write CΓ for the response category over the type-context Γ. We assume that the weakening functor π ∗ : CΓ → CΓ×A has a left adjoint ∃A : CΓ×A → CΓ subject to the Beck-Chevalley condition. Thus CΓ×A (X, π ∗ (Y )) ≃ CΓ (∃A (X), Y ) We then have RCΓ×A (π ∗ (X), Y ) = ≃ ≃ ≃ ≃ = ∗ CΓ×A (Rπ (X) , RY ) π ∗ (X) ) CΓ×A (Y, RR X ∗ R CΓ×A (Y, π (R )) X CΓ (∃A (Y ), RR ) CΓ (RX , R∃A (Y ) ) RCΓ (X, ∃A (Y )) Hence π ∗ , regarded as the weakening functor from RCΓ to RCΓ×A , has a right adjoint given by ∃A , which can be used for interpreting the universal quantifier. Our CPS transformation is essentially a syntactic interpretation of this semantic construction. 4. CPS semantics with the parametric target calculus 4.1. Parametricity for the target calculus. As the target calculus can be seen as a subset of λ2 (via the standard encoding of the conjunctions and existential types), we can define the relational parametricity for the target calculus in the same way as for λ2, e.g. logic for parametricity [31, 40], system R [1], or system P [5]. One may directly define the parametricity principle (often called the simulation principle) for the existential type, see for example [31]. In this paper we only consider the relations constructed from the graphs of termsin-context, identity, and σ ∗ ’s obtained by the following construction, which we shall call “admissible relations”. Among admissible relations, the most fundamental are the graph relations. Given a term f (x) : τ2 with a free variable x : τ1 we define its graph relation hx ⊢ f (x)i : τ1 ↔ τ2 (hf i for short) by u hf i v iff f (u) = v. Given a type τ whose free type variables are included in X1 , . . . , Xn and admissible relations s1 : τ1 ↔ τ1′ , . . . , sn : τn ↔ τn′ , we define an admissible relation τ ∗ as follows. • Xi∗ = si : τi ↔ τi′ • R∗ is the identity relation on the terms of type R • (¬τ )∗ : ¬τ [τ1 /X1 , . . . ] ↔ ¬τ [τ1′ /X1 , . . . ] is the relation so that f (¬τ )∗ g iff x τ ∗ y implies f x R∗ g y (hence f x = g y) • (τ ∧τ ′ )∗ : (τ ∧τ ′ )[τ1 /X1 , . . . ] ↔ (τ ∧τ ′ )[τ1′ /X1 , . . . ] is the relation so that u (τ ∧τ ′ )∗ v iff u = hx, x′ i, v = hy, y ′ i and x τ ∗ y, x′ τ ′∗ y ′ • (∃X.τ )∗ : ∃X.τ [τ1 /X1 , . . . ] ↔ ∃X.τ [τ1′ /X1 , . . . ] is the relation so that u (∃X.τ )∗ v iff u = hτ ′ , xi, v = hτ ′′ , yi and x τ [r/X]∗ y for some admissible r : τ ′ ↔ τ ′′ RELATIONAL PARAMETRICITY AND CONTROL 9 In the last case, the relation τ [r/X]∗ : τ [τ ′ /X] ↔ τ [τ ′′ /X] is defined as τ ∗ with X ∗ = r. One may further define admissible relations ¬r, r ∧ s and ∃X.r for admissible r, s, so that (¬τ )∗ = ¬τ ∗ , (τ ∧ τ ′ )∗ = τ ∗ ∧ τ ′∗ and (∃X.τ )∗ = ∃X.τ ∗ hold. Let idτ : τ ↔ τ be the identity relation on the terms of type τ . The relational parametricity asserts that, for any τ whose free type variables are included in X1 , . . . , Xn and τ1 , . . . , τn , M : τ [τ1 /X1 , . . . , τn /Xn ] implies M τ ∗ M with si = idτi . Its consistency follows immediately from that of the parametricity for λ2. Proposition 4.1. As consequences of the parametricity, we can derive: (1) ∃X.X gives a terminal object ⊤ with a unique inhabitant ∗, so that for any M : ⊤ we have M = ∗. (2) ∃X.¬(τ ∧ X) ∧ X (which could be rewritten as ∃X.(X → ¬τ ) ∧ X) gives a final coalgebra νX.¬τ of ΛX.¬τ where X only occurs negatively in τ . (3) (as an instance of the last case) the isomorphism ∃X.¬(τ ∧ X) ∧ X ≃ ¬τ holds if X does not occur freely in τ . Their proofs are standard, cf. papers cited above [31, 1, 40, 5]. Below we will see the implications of these parametricity results on the target calculus. We refer to the λµ2-theory induced by the CPS translation into this parametric target calculus as λµ2P . 4.2. The falsity type. As a first example, let us consider the falsity type ⊥ = ∀X.X in λµ2. We have ⊥◦ = (∀X.X)◦ = ∃X.X ≃ ⊤ and (σ → ⊥)◦ = ¬(σ ◦ ∧ ⊥◦ ) ≃ ¬(σ ◦ ∧ ⊤) ≃ ¬σ ◦ Since ∃X.X is terminal (with a unique inhabitant ∗) in the parametric target calculus, ◦ we obtain [[µασ .M ]] = λασ .[[M ]]∗ and [[[β]M ]] = λu∃X.X .[[M ]]β, which coincide with Streicher’s translation. As a consequence, the following equations on the named terms and µ-abstractions are all validated in λµ2P . (µασ1 →σ2 .M ) N (µα∀X.σ1 .M ) σ2 [α′ ](µασ .M ) [α⊥ ]M = = = = µβ σ2 .M [[β](− N )/[α](−)] µβ σ1 [σ2 /X] .M [[β](− σ2 )/[α](−)] M [α′ /α] M Thus the type ⊥ serves as the falsity type as found in some formulation of the λµ-calculus. In addition, we can show that (σ, Cσ : ((σ → ⊥) → ⊥) → σ) is an algebra of the doublenegation monad ((−) → ⊥) → ⊥ on the term model. 4.3. Initial algebra? A more substantial example is the “initial algebra” µX.F [X] = ∀X.(F [X] → X) → X, with X positive in F [X] (here we see an unfortunate clash of µ’s for the name-binding and for the fixed-point on types, but this should not cause any serious 10 MASAHITO HASEGAWA problem). We calculate: (µX.F [X])◦ = = ≃ ≃ ≃ = ≃ (∀X.(F [X] → X) → X)◦ ∃X.¬(¬F [X]◦ ∧ X) ∧ X νX.¬¬F [X]◦ ¬¬F [X]◦ [νX.¬¬F [X]◦ /X] ¬¬F [X]◦ [(µX.F [X])◦ /X] ¬¬(F [µX.F [X]])◦ ((F [µX.F [X]] → ⊥) → ⊥)◦ This suggests that µX.F [X] is isomorphic not to F [µX.F [X]] but to its double negation (F [µX.F [X]] → ⊥) → ⊥. One might think that this contradicts the standard experience on λ2 with parametricity, where we have an isomorphism in : F [µX.F [X]] → µX.F [X]. Since λµ2 subsumes λ2, we have this in in λµ2 too; however, it should not be an isomorphism, regarding the CPS interpretation above (otherwise it causes a degeneracy). The truth is that, in λµ2P , the term in♯ = λm.µα.m (λx.[α](in x)) : ((F [µX.F [X]] → ⊥) → ⊥) → µX.F [X] is an isomorphism. It still is not an initial algebra of (F [−] → ⊥) → ⊥; we shall further consider this issue later. For now, we shall emphasize that the parametricity principle for λ2 should not be used for λµ2, at least without certain constraint — otherwise in would be an isomorphism, hence a degeneracy follows (because we have (σ → ⊥) → ⊥ ≃ σ for every σ). 4.4. Other impredicative encodings. Recall other impredicative encodings of logical connectives: ⊤ = ∀X.X → X σ1 ∧ σ2 = ∀X.(σ1 → σ2 → X) → X σ1 ∨ σ2 = ∀X.(σ1 → X) → (σ2 → X) → X ∃X.σ = ∀Y.(∀X.(σ → Y )) → Y Their CPS translations into the parametric target calculus satisfy: ⊤◦ (σ1 ∧ σ2 )◦ (σ1 ∨ σ2 )◦ (∃X.σ)◦ ≃ ≃ ≃ ≃ R ¬(¬σ1 ◦ ∧ ¬σ2◦ ) ¬¬σ1◦ ∧ ¬¬σ2◦ ¬∃X.¬σ ◦ As easily seen, these defined logical connectives in the source calculus do not obey the standard universal properties as in the parametric models of λ2. In short, they are all “double-negated”, hence amount to some classical encodings: • σ1 ∧ σ2 is not a cartesian product of σ1 and σ2 , but isomorphic to (σ1 → σ2 → ⊥) → ⊥. It is possible to add cartesian product types σ1 ×σ2 to λµ2, but then we also need to add coproduct types τ1 + τ2 to the target calculus, so that (σ1 × σ2 )◦ = σ1◦ + σ2◦ and σ1 ∧ σ2 ≃ ¬¬(σ1 × σ2 ). • ⊤ is not a terminal object, but isomorphic to ⊥ → ⊥. We can add a terminal object 1 to λµ2 and an initial object 0 to the target, so that 1◦ = 0 and ⊤ ≃ ¬¬1. • σ1 ∨ σ2 is not a coproduct of σ1 and σ2 , but isomorphic to (σ1 → ⊥) → (σ2 → ⊥) → ⊥. If there is a coproduct σ1 + σ2 , then it should follow that σ ∨ τ ≃ ¬¬(σ + τ ). On the other hand, it is not possible to enrich λµ2 with an initial object without a degeneracy, cf. Selinger’s note on control categories [37]. Alternatively we might RELATIONAL PARAMETRICITY AND CONTROL 11 add the “classical disjunction types” σ1 ℘σ2 [36] with (σ1 ℘σ2 )◦ = σ1◦ ∧ σ2◦ — hence σ1 → σ2 ≃ ¬σ1 ℘σ2 and σ1 ∨ σ2 ≃ ¬¬σ1 ℘¬¬σ2 . We note that ⊥ = ∀X.X serves as the unit of this classical disjunction. • ∃X.σ does not work as the existential type; it is isomorphic to ¬∀X.¬σ. 4.5. Answer-type polymorphism. Note that the answer type R has been considered just as a constant with no specific property. In fact we could have used any type for R — Everything is defined polymorphically regarding R. Thus we can apply the “answer-type polymorphism” principle (cf. [43]): in particular, a closed term of type σ in λµ2 can be considered to be sent to a λ2-term of type ∀R.¬σ ◦ . This way of reasoning goes behind the parametricity principle for our target calculus, but it is justified by the parametricity of λ2. For instance, consider the type ⊤ = ∀X.X → X of λµ2. We have ∀R.¬⊤◦ ≃ ∀R.¬R ≃ ∀R.R → R ≃ 1 in λ2 with parametricity. This means that, although ⊤ is not a terminal object in λµ2, it has a unique closed inhabitant. Similarly, we have ∀R.¬⊥◦ ≃ ∀R.R ≃ 0, thus we see that there is no closed inhabitant of ⊥ in λµ2. However, such reasonings based on the answer-type polymorphism become much harder for more complicated types. The force of answer-type polymorphism in this setting seems still not very obvious. 5. Focal parametricity We have seen that the CPS semantics with respect to the target calculus with relational parametricity induces a reasonable equational theory λµ2P . However, here the parametricity is used rather indirectly, via the CPS translation. We now consider a notion of parametricity which is directly available within λµ2. 5.1. CPS translating relations. The key of formulating the relational parametricity is the use of graph relations of terms (considered as representing a functional relation): without graph relations, relational parametricity reduces to just the basic lemma of the (secondorder) logical relations. On the other hand, it does not have to allow all terms to be used for constructing relations. In fact, in linear parametricity [30] only linear (or strict) maps are allowed to be used for constructing graph relations, and this choice allows a weaker notion of parametricity which can accommodate recursion. Naturally, we are led to look for a characterisation of λµ-terms which can be used for graph relations without breaking the soundness with respect to the CPS semantics into the parametric target calculus. Now suppose that we are allowed to use the graph relation hf i : σ1 ↔ σ2 of a term x : σ1 ⊢ f (x) : σ2 . To ensure the soundness of the use of this graph relation, we shall consider the CPS translation of such relations. For instance, we hope that hf i will be sent to a relation between types σ2◦ and σ1◦ in the target calculus. However, since x : ¬σ1◦ ⊢ [[f (x)]] : ¬σ2◦ , we have some relation σ2◦ ↔ σ1◦ only when [[f (x)]] = λk.x (g (k)) for some k : σ2◦ ⊢ g(k) : σ1◦ in the target calculus. If there is such g, we can complete the translation of the relations and reduce the parametricity principle on λµ2 to the parametricity on the target calculus. 12 MASAHITO HASEGAWA Fortunately, there is a way to characterise such “translatable” f ’s in the λµ-calculus without performing the CPS-translation (modulo a technical assumption on the CPS-target, known as “equalising requirement” [22]). It is the notion of “focus”, which we now recall below. 5.2. Focus. Definition 5.1. A λµ2-term M : σ1 → σ2 is called focal if it is an algebra morphism from (σ1 , Cσ1 ) to (σ2 , Cσ2 ), i.e. the following diagram commutes. (σ1 → ⊥) → ⊥ Cσ1 (M →⊥)→⊥ - Cσ2 ? σ1 (σ2 → ⊥) → ⊥ ? M - σ2 That is: M (µασ1 .k (λxσ1 .[α]x)) = µβ σ2 .k (λxσ1 .[β](M x)) : σ2 holds for any k : (σ1 → ⊥) → ⊥.2 In any λµ2-theory, focal terms compose, and the identity λxσ .x is obviously focal. So, the (equivalence classes of) focal maps form a category. Hereafter we shall call it the focus of the λµ2-theory. While this characterisation of focal maps is concise and closely follows the semantic considerations in [36, 19], there is a subtle problem; the βη-axioms of λµ2 are too weak to establish the focality of some important terms. This is because we have used the polymorphic feature of λµ2 for expressing Cσ — it involves the falsity type ⊥ = ∀X.X, but the axioms of λµ2 do not guarantee that ⊥ does work properly. If there were not sufficiently many focal maps, the parametricity principle restricted on focal maps would be useless. To see this issue more clearly, we shall look at another “classical” combinator (the Peirce law) Pσ1 ,σ2 = λm.µασ1 .[α](m (λxσ1 .µβ σ2 .[α]x)) : ((σ1 → σ2 ) → σ1 ) → σ1 which does not make use of polymorphism, and the “abort” map (Ex Falso Quodlibet) Aσ = λx⊥ .x σ : ⊥ → σ which is defined without the classical feature. It is well known that the double-negation elimination is as expressible as the Peirce law together with Ex Falso Quodlibet, see e.g. [2]. This is also the case at the level of (uniformity of) proofs. Let us say that M : σ1 → σ2 is repeatable if (M →σ3 )→M - (σ2 → σ3 ) → σ2 (σ1 → σ3 ) → σ1 Pσ1 ,σ3 Pσ2 ,σ3 ? σ1 ? M - σ2 2In [16], a focal map from σ to ⊥ is called a “C-term of type σ ”. C-terms of type σ with a free name 1 1 1 of σ2 correspond to focal maps from σ1 to σ2 , thus these notions (and the associated constructions of the CPS target categories via C-terms (C-maps) [16] and via focus [36]) are essentially the same. RELATIONAL PARAMETRICITY AND CONTROL 13 commutes for each σ3 ; and discardable if Aσ 1 σ1 ⊥ M Aσ @ 2 R @ - σ2 commutes. Proposition 5.2. In a λµ2-theory, M : σ1 → σ2 is focal if and only if it is both repeatable and discardable. We note that the corresponding result in the call-by-value setting has been observed by Führmann [8] as the characterisation of algebraic values as repeatable discardable expressions. Here we follow his terminology. This reformulation allows us to see that only the second diagram of A’s involves the polymorphically defined ⊥ and needs to be justified by additional conditions.3 On the other hand, the first diagram of P ’s is not problematic, as it does not make use of polymorphism at all. 5.3. Additional axioms. To this end, we add more axioms to λµ2 before thinking about parametricity. They are (1) λxσ1 →σ2 .x N : (σ1 → σ2 ) → σ2 is discardable for any N : σ1 (2) λx∀X.σ .x σ1 : ∀X.σ → σ[σ1 /X] is discardable for any σ and σ1 (3) λxσ .[α]x : σ → ⊥ is discardable for any α : σ which are equivalent to asking (1) M (σ1 → σ2 ) N = M σ2 for any M : ⊥ and N : σ1 (2) M (∀X.σ) σ1 = M (σ[σ1 /X]) for M : ⊥ (3) [α](M σ) = M for M : ⊥ and α : σ (α 6∈ F N (M )) and also equivalent to (1) (µασ1 →σ2 .M ) N = µβ σ2 .M [[β](− N )/[α](−)] (2) (µα∀X.σ1 .M ) σ2 = µβ σ1 [σ2 /X] .M [[β](− σ2 )/[α](−)] (3) [α′ ](µασ .M ) = M [α′ /α] Note that λµ2P discussed in Section 4 satisfies these conditions. Also we shall note that λxσ1 →σ2 .x N , λx∀X.σ .x σ1 , λx⊥ .[α](x σ) are all repeatable in λµ2. Together with these additional axioms, they become focal. (Alternatively, we could have ⊥ as a type constant and assume the standard axiomatization of λµ-calculus with the falsity type [16, 36] — in that case C is defined without polymorphism, and this problem disappears.) Below we develop the focal parametricity principle on top of λµ2 with these additional axioms. 3This problem was overlooked in the preliminary version of this paper [13] where it was wrongly assumed that repeatability alone would imply focality. 14 MASAHITO HASEGAWA 5.4. A parametricity principle for λµ2. Given a focal f : σ1 → σ2 we define its graph relation hf i : σ1 ↔ σ2 by u hf i v iff f u = v. Also, let idσ : σ ↔ σ be the identity relation on the terms of type σ. In this paper we only consider the relations given by the graphs of focal maps, identity, and σ ∗ ’s obtained by the following construction, which we shall call “focal relations”. Given a type σ whose free type variables are included in X1 , . . . , Xn and focal relations s1 : σ1 ↔ σ1′ , . . . , sn : σn ↔ σn′ , we define a focal relation σ ∗ as follows. • Xi∗ = si : σi ↔ σi′ • (σ → σ ′ )∗ : (σ → σ ′ )[σ1 /X1 , . . . ] ↔ (σ → σ ′ )[σ1′ /X1 , . . . ] is the relation so that f (σ → σ ′ )∗ g iff x σ ∗ y implies (f x) σ ′∗ (g y) • (∀X.σ)∗ : ∀X.σ[σ1 /X1 , . . . ] ↔ ∀X.σ[σ1′ /X1 , . . . ] is the relation so that u (∀X.σ)∗ v iff (u σ ′ ) σ[r/X]∗ (v σ ′′ ) holds for any focal relation r : σ ′ ↔ σ ′′ The focal relational parametricity asserts that, for any σ whose free type variables are included in X1 , . . . , Xn , M : σ[σ1 /X1 , . . . , σn /Xn ] implies M σ ∗ M with si = idσi . Thus the only departure from the standard parametricity principle is the condition that the graph relation construction is allowed only on focal maps. Note that this restriction is necessary; if we apply parametricity to polymorphic terms ΛX.CX or ΛX.PX,σ , we will get the naturality diagrams above for any term which is allowed to be used for the graph relation construction. 5.5. On consistency and soundness. The consistency of focal parametricity (in the sense that the equational theory of λµ2 with focal parametricity is not trivial) follows from the fact that there are non-trivial parametric models of λ2 in which there is an object R so τ that the continuation monad T τ = RR satisfies the “equalising requirement” [22], i.e. each component ητ : τ → T τ of its unit is an equaliser of ηT τ and T ητ . (Here we employ the syntax of the CPS target calculus as an internal language for such models, where the CPS translation is considered to give a semantic interpretation.) In such models, for any focal term f : σ1 → σ2 , there exists a unique y : σ2◦ ⊢ g(y) : σ1◦ such that [[f x]] = λy.x (g(y)) (cf. [36]). Using this fact, given a focal relation r : σ1 ↔ σ2 , we construct an admissible relation r ◦ : σ2◦ ↔ σ1◦ as follows. For a graph relation hf i : σ1 ↔ σ2 , we let hf i◦ = hgi : σ2◦ ↔ σ1◦ where g is the unique map as given above. For σ ∗ , σ ∗◦ is defined by straightforward induction: (σ → σ ′ )∗◦ = ¬σ ∗◦ ∧ σ ′∗◦ , (∀X.σ)∗◦ = ∃X.σ ∗◦ (where the parameter relations si are replaced by s◦i ). Theorem 5.3. In such a model, given a focal relation r : σ1 ↔ σ2 , M r N implies [[N ]] ¬r ◦ [[M ]]. Theorem 5.4 (consistency). Focal parametricity is consistent. We do not know if the term model of the parametric target calculus satisfies the equalising requirement — if so, by the definability result, the parametricity on the target and the focal parametricity on λµ2 should agree. Alternatively we should consider a refined target calculus with a construct ensuring the equalising requirement, as detailed in Taylor’s work on sober space (“a lambda calculus for sobriety” [41]). For now, we only know that one direction is true (thanks to the definability). Theorem 5.5. An equality derivable in λµ2P is also derivable in λµ2 with focal parametricity. RELATIONAL PARAMETRICITY AND CONTROL 15 6. Examples We show that certain impredicative encodings in λµ2 satisfy universal properties with respect to the focus using the focal parametricity principle. 6.1. Focal decomposition. We start with a remark on the following “focal decomposition” [36] (analogous to the linear decomposition σ1 → σ2 =!σ1 ⊸ σ2 [10]): there is a bijective correspondence between terms of σ1 → σ2 and focal terms of ¬¬σ1 → σ2 natural in σ1 and focal σ2 . f : ¬¬σ1 → σ2 focal f ♭ = f ◦ ησ1 = λxσ1 .f (λk.k x) : σ1 → σ2 g♯ = Cσ2 ◦ ¬¬g = g : σ1 → σ2 σ λm.µβ 2 .m (λxσ1 .[β](g x)) : ¬¬σ1 → σ2 focal ♯ ♭ Proposition 6.1. g♯ = g for any g : σ1 → σ2 , while f ♭ = f holds for f : ¬¬σ1 → σ2 if and only if f is focal. 6.2. Falsity as a focally initial object. Now we shall proceed to reason about impredicative encodings in λµ2. The first example is the falsity ⊥ = ∀X.X. First, we note that Aσ = λx⊥ .x σ : ⊥ → σ is focal. The parametricity on ⊥ says x ⊥∗ x for any x : ⊥. Since hAσ i : ⊥ ↔ σ, we have x ⊥ hAσ i x σ, i.e. Aσ (x ⊥) = x ⊥ σ = x σ. By extensionality we get x = x ⊥ for x : ⊥. Now suppose that g : ⊥ → σ is focal. Again by the parametricity on ⊥ we know x ⊥∗ x for any x : ⊥, hence x ⊥ hgi x σ. Thus g (x ⊥) = x σ; but x = x ⊥, so we have g x = x σ, hence g = λx⊥ .x σ = Aσ . So we conclude that Aσ is the unique focal map from ⊥ to σ. This means that ⊥ is initial in the focus. 6.3. Focally initial algebra. As in λ2, there is a fairly standard encoding µX.F [X] = ∀X.(F [X] → X) → X foldσ = λaF [σ]→σ .λxµX.F [X] .x σ a : (F [σ] → σ) → µX.F [X] → σ in = λy.ΛX.λkF [X]→X .k (F [foldX k] y) : F [µX.F [X]] → µX.F [X] for which the following diagram commutes (just by β-axioms). F [µX.F [X]] in - F [fold a] µX.F [X] fold a ? F [σ] a ? - σ Therefore in is a weak initial F -algebra. However, as we noted before, in is not an initial F -algebra — in fact it is not even an isomorphism. By applying the focal decomposition 16 MASAHITO HASEGAWA above, we obtain the commutative diagram ¬¬F [µX.F [X]] ¬¬F [fold a♭ ] in♯- µX.F [X] fold a♭ ? ¬¬F [σ] ? - σ a for any focal a : ¬¬F [σ] → σ. We show that fold a♭ is the unique focal map making this diagram commute, thus in♯ is an initial ¬¬F [−]-algebra in the focus. We sketch a proof which is fairly analogous to that for the corresponding result in parametric λ2 as given in [1]. First, from the parametricity on µX.F [X] we obtain that F [σ1 ] a- F [h] h ? F [σ2 ] b µX.F [X] σ1 ? - σ2 implies folda || σ1 h ? µX.F [X] ? - σ2 fold b whenever h is focal. We also have M (µX.F [X]) in = M for any M : µX.F [X] as a corollary (thanks to extensionality). By combining these observations, now we have the desired result. That is, if h : µX.F [X] → σ is focal and satisfies h ◦ in♯ = a ◦ ¬¬F [h], then foldσ a♭ x = h (foldµX.F [X] in x) = h (x (µX.F [X]) in) = hx so by extensionality we conclude foldσ a♭ = h. This also implies that in♯ is an isomorphism, with the inverse given by fold¬¬µX.F [X] (¬¬F [in]). As a special case, by letting F be a constant functor, we obtain isomorphisms between (σ → ⊥) → ⊥ and ∀X.(σ → X) → X where X is not free in σ. With some further calculation we see that in♯ = λm.ΛX.λkσ→X .µαX .m (λxσ .[α](k x)) is the inverse of λn.n ⊥ : (∀X.(σ → X) → X) → (σ → ⊥) → ⊥. We will see more about this isomorphism in Section 7. 6.4. The type of Church numerals. We conclude this section by a remark on the type of Church numerals N = ∀X.X → (X → X) → X. Recall that, in λ2 with parametricity, N is an initial algebra of ∀X.X → (− → X) → X ≃ 1 + (−), i.e. a natural numbers object, whose closed inhabitants are equal to the Church numerals Sn O which can be given by, as usual, O = ΛX.λxX f X→X .x : N S = λnN .ΛX.λxX f X→X .f (n X x f ) : N → N It is no longer true in λµ2, as observed by Parigot, as there are closed inhabitants which are not equal to Church numerals, e.g. µαN .[α](S (µβ N .[α]O)) = ΛX.λxX f X→X .µαX .[α](f (µβ X .[α]x)) : N In contrast, N in λµ2 with focal parametricity is a focally initial algebra of ∀X.X → (− → X) → X ≃ ⊥ → (− → ⊥) → ⊥; this can be shown in the same way as the case of focally RELATIONAL PARAMETRICITY AND CONTROL 17 initial algebras. Spelling this out, we have a focal map in : (⊥ → (N → ⊥) → ⊥) → N, and for any focal g : (⊥ → (σ → ⊥) → ⊥) → σ there exists a unique focal foldσ g : N → σ making the following diagram commute. ⊥ → (N → ⊥) → ⊥ in - N ⊥→(foldσ g→⊥)→⊥ foldσ g ? ⊥ → (σ → ⊥) → ⊥ g ? - σ To see this, it is useful to observe the following bijective correspondence (a variant of the focal decomposition): given focal g : (⊥ → (σ → ⊥) → ⊥) → σ we have go = g (λx⊥ kσ→⊥ .x) : σ gs = λy σ .g (λx⊥ kσ→⊥ .k y) : σ → σ and conversely, for a : σ and f : σ → σ we have a focal map ϕa,f = λm⊥→(σ→⊥)→⊥ .µασ .m ([α]a) (λy σ .[α](f y)) : (⊥ → (σ → ⊥) → ⊥) → σ It follows that (ϕa,f )o = a and (ϕa,f )s = f hold for any a and f , while ϕgo ,gs = g for any focal g. Now we define foldA g = λnN .n A go gs : N → A in = ϕO,S : (⊥ → (N → ⊥) → ⊥) → N It then follows that the diagram above commutes — and the focal parametricity implies that foldA g is the unique such focal map. 7. A general characterisation So far, we concentrated on the relational parametricity for λµ2. One may feel that this story is very specific to the case of λµ2, or of the first-class continuations, and is not immediately applicable to other computational effects. In this section we describe an alternative characterisation of the focus, which makes sense in any extension of λ2. Namely, we show that, any λ2-theory is equipped with a monad L, such that each type is equipped with an algebra structure — and then see that, in the case of λµ2 with focal parametricity, this monad L is isomorphic to the double-negation (continuation) monad, and focal maps are precisely the algebra maps of the monad L. This suggests a natural generalisation of this work to a theory of parametricity for general computational effects. 7.1. A monad on λ2. Let Lσ = ∀X.(σ → X) → X (with no free X in σ), and define ησ = λxσ .ΛX.λkσ→X .k x : σ → Lσ 2 µσ = λz L σ .ΛX.λkσ→X .z X (λy Lσ .y X k) : L2 σ → Lσ L(f ) = λy Lσ1 .ΛX.λhσ2 →X .y X (h ◦ f ) : Lσ1 → Lσ2 (f : σ1 → σ2 ) Proposition 7.1. On the term model of any λ2-theory, (L, η, µ) forms a monad. 18 MASAHITO HASEGAWA One might think that this is trivial as Lσ is isomorphic to σ when we assume the standard parametricity. This is not always the case however, as we have already seen, Lσ ≃ (σ → ⊥) → ⊥ in the focally parametric λµ2. Proposition 7.2. ασ = λy Lσ .y σ (λxσ .x) : Lσ → σ is an algebra of the monad (L, η, µ). Thus each σ is canonically equipped with an algebra structure ασ . Again one may think that this is trivial, as under the standard parametricity ασ is just an isomorphism with ησ being an inverse. However, again it is not the case in a non-trivial λµ2-theory. Now we define the notion of linear maps in terms of the monad L and the canonical algebras ασ — this is close to what we do in (axiomatic) domain theory for characterising the strict maps, and also in control categories for characterising the focal maps. Definition 7.3. f : σ1 → σ2 is linear when it is an algebra morphism from ασ1 to ασ2 , i.e. f ◦ ασ1 = ασ2 ◦ L(f ) holds. Lσ1 L(f ) - Lσ2 ασ1 ασ2 ? σ1 That is, f is linear when f ? - σ2 f (M σ1 (λxσ1 .x)) = M σ2 f holds for any M : Lσ1 . We may write f : σ1 ⊸ σ2 for a linear f : σ1 → σ2 . Under the standard parametricity every f : σ1 → σ2 is linear, while for focal parametricity on λµ2 we have that linear maps are precisely the focal maps (see below). In passing, we note the following interesting observation. Proposition 7.4. In a λ2-theory, the following conditions are equivalent. (1) algebras on σ1 → σ2 and ∀X.σ are determined in the pointwise manner, i.e. ασ1 →σ2 = λf L(σ1 →σ2 ) .λxσ1 .ασ2 (L(λgσ1 →σ2 .g x) f ) α∀X.σ = λxL(∀X.σ) .ΛX.ασ (L(λy ∀X.σ .y X) x) (2) λxσ1 →σ2 .x N is linear for any N : σ1 , and λx∀X.σ .x σ1 is linear for any σ and σ1 . Note that they are very close to the “additional axioms” for λµ2 discussed in Section 5. Also note that, if a λ2-theory satisfies one of these conditions, µσ and αLσ agree for every σ. and we have a “linear decomposition” correspondence between the maps of σ1 → σ2 and the linear maps of Lσ1 → σ2 . 7.2. Focal maps as algebra maps. Now we shall consider the double-negation monad ¬¬σ = (σ → ⊥) → ⊥ on λµ2 with focal parametricity. Proposition 7.5. In a focally parametric λµ2-theory, Cσ : ¬¬σ → σ is an algebra of the double-negation monad. Corollary 7.6. f : σ1 → σ2 is focal if and only if it is an algebra map from Cσ1 to Cσ2 . Proposition 7.7. The monad (L, η, µ) is isomorphic to the double negation monad in the ≃ focally parametric λµ2, with λxLσ .x ⊥ : Lσ → ¬¬σ. RELATIONAL PARAMETRICITY AND CONTROL 19 Proposition 7.8. The following diagram commutes in a focally parametric λµ2-theory: λxLσ .x ⊥- Lσ @ @ R @ ασ ¬¬σ Cσ σ Corollary 7.9. f : σ1 → σ2 is linear if and only if it is focal. Thus a focal map in a focally parametric λµ2-theory can be characterised just in terms of the monad L which is defined for arbitrary λ2-theory. We believe that the monad L deserves much attention. It has been considered trivial, but now we know that it does characterise an essential notion (focus) in the case of relational parametricity under the presence of control feature. In fact, the story does not end here; under the presence of non-termination or recursion, L behaves like a lifting monad — indeed it is a lifting in the theory of linear parametricity, because Lσ = ∀X.(σ → X) → X = ∀X.!(!σ ⊸ X) ⊸ X ≃ !σ where the last isomorphism follows from the fact that ∀X.!(F [X] ⊸ X) ⊸ X gives an initial algebra of F , cf. [4]. These observations suggest that there exists a general framework similar to (axiomatic or synthetic) domain theory where the lifting monad can be replaced by any strong monad — a continuation monad for example — on which a theory of parametricity for general computational effects can be built. Recently, Alex Simpson has made a progress in this direction, by developing a two-level polymorphic type theory (for interpreting types and algebras of a monad) in a constructive universe [38]. His work fits very well with the case of linear parametricity for recursion; it is plausible that it also explains the case of focal parametricity for first-class control. 8. Conclusion and future work We have studied the relational parametricity for λµ2, first by considering the CPS translation into a parametric fragment of λ2, and then by directly giving a constrained parametricity for λµ2. The later, which we call “focal parametricity”, seems to be a natural parametricity principle under the presence of first-class controls — in the same sense that linear parametricity works under the presence of recursion and non-termination. There remain many things to be addressed in future. In the previous section, we already discussed a research direction towards a relational parametricity for general effects. Below we shall briefly mention some future work more closely related to the main development of this paper. Firstly, we are yet to complete the precise comparison between focal parametricity on λµ2 and the parametricity on the CPS target calculus. This involves some subtle interaction between parametricity and a technical condition (equalising requirement). Secondly, we should study focal parametricity for extensions of λµ2. As we observed, λµ2 with focal parametricity does not have many popular datatypes, e.g. cartesian products, and classical disjunction types which however can be added with no problem. Adding general initial algebras is problematic (having an initial object already means inconsistency), but it might be safe to add certain carefully chosen instances. On the other hand, final coalgebras seem less problematic, though a generic account for them in λµ2 is still missing. 20 MASAHITO HASEGAWA Perhaps we also need to consider the CPS translation of such datatypes (cf. [3]) in a systematic way. An interesting topic we have not discussed in this paper is the Filinski-Selinger duality [6, 36] between call-by-name and call-by-value calculi with control primitives. In fact it is straightforward to consider its second-order extension: in short, universal quantifiers in callby-name (as studied in this paper) amount to existential quantifiers in call-by-value. We are not sure if the call-by-value calculus with existential quantifiers itself is of some interest. However, it can be a good starting point to understand the call-by-value parametric polymorphism (possibly with computational effects), from both syntactic and semantic aspects. In particular, it should provide new insights on the famous difficulty of accommodating first-class continuations in ML type system [11]. Finally, we also should consider if there is a better (ideally semantic) formulation of focal relations. In this paper we only consider those coming from focal maps, but it seems natural to regard a subalgebra (of the double-negation monad) of Cσ1 ×σ2 as a focal relation between σ1 and σ2 , where we assume the presence of cartesian product σ1 × σ2 . This looks very closely related to Pitts’ ⊤⊤-closed relations for λ2 with recursion [28]. Acknowledgement I thank Ken-etsu Fujita for discussions and cooperations related to this work. I am also grateful to Ryu Hasegawa, Paul-André Melliès and Alex Simpson for comments, discussions and encouragements. References [1] M. Abadi, L. Cardelli, and P.-L. Curien. Formal parametric polymorphism. Theoret. Comput. Sci. 121:9–58, 1993. [2] Z.M. Ariola and H. Herbelin. Minimal classical logic and control operators. In Proc. Automata, Languages and Programming, Springer Lecture Notes in Comput. Sci. 2719, pp.871–885, 2003. [3] G. Barthe and T. Uustalu. CPS translating inductive and coinductive types. In Proc. Partial Evaluation and Semantics-Based Program Manipulation, pp.131–142, 2002. [4] G.M. Bierman, A.M. Pitts, and C.V. Russo. Operational properties of Lily, a polymorphic linear lambda calculus with recursion. In Proc. Higher Order Operational Techniques in Semantics, Electronic Notes in Theoretical Computer Science 41, 2000. [5] B.P. Dunphy. Parametricity as a Notion of Uniformity in Reflexive Graphs. PhD thesis, University of Illinois, 2002. [6] A. Filinski. Declarative continuations: an investigation of duality in programming language semantics. In Proc. Category Theory and Computer Science, Springer Lecture Notes in Comput. Sci. 389, pp.224– 249, 1989. [7] K. Fujita. Galois embedding from polymorphic types into existential types. In Proc. Typed Lambda Calculi and Applications, Springer Lecture Notes in Comput. Sci. 3461, pp.194–208, 2005. [8] C. Führmann. Varieties of effects. In Proc. Foundations of Software Science and Computation Structures, Springer Lecture Notes in Comput. Sci. 2303, pp.144–159, 2002. [9] J.-Y. Girard. Interprétation fonctionnelle et élimination des coupures de l’arithmétique d’ordre supérieur. Thèse d’Etat, Université Paris VII, 1972. [10] J.-Y. Girard. Linear logic. Theoret. Comp. Sci. 50:1–102, 1987. [11] B. Harper, B.F. Duba and D. MacQueen. Typing first-class continuations in ML. J. Funct. Programming 3(4):465–484. [12] M. Hasegawa. Semantics of linear continuation-passing in call-by-name. In Proc. Functional and Logic Programming, Springer Lecture Notes in Comput. Sci. 2998, pp.229–243, 2004. RELATIONAL PARAMETRICITY AND CONTROL 21 [13] M. Hasegawa, Relational parametricity and control (extended abstract). In Proc. Logic in Computer Science, pp.72–81, 2005. [14] M. Hasegawa and Y. Kakutani. Axioms for recursion in call-by-value. Higher-Order and Symbolic Comput. 15(2/3):235–264, 2002. [15] R. Hasegawa. Categorical data types in parametric polymorphism. Math. Struct. Comp. Sci. 4(1):71– 109, 1994. [16] M. Hofmann and T. Streicher. Completeness of continuation models for λµ-calculus. Inf. Comput. 179(2):332–355, 2002. [17] B. Jacobs. Categorical Logic and Type Theory. Elsevier, 1999. [18] Y. Kakutani. Duality between call-by-name recursion and call-by-value iteration. In Proc. Computer Science Logic, Springer Lecture Notes in Comput. Sci. 2471, pp.506–521, 2002. [19] Y. Kakutani and M. Hasegawa. Parameterizations and fixed-point operators on control categories. Fundam. Inform. 65(1/2):153–172, 2005. [20] J. Lambek and P. Scott (1986) Introduction to Higher-order Categorical Logic. Cambridge University Press. [21] R. Matthes. Parigot’s second order λµ-calculus and inductive types. In Proc. Typed Lambda Calculi and Applications, Springer Lecture Notes in Comput. Sci. 2044, pp.329–343, 2001. [22] E. Moggi. Notions of computation and monads. Inf. Comput. 93(1):55–92, 1991. [23] K. Nakazawa and M. Tatsuta. Strong normalization proof with CPS-translation for second order classical natural deduction. J. Symb. Log. 68(3):851–859, 2003. Corrigendum: J. Symb. Log. 68(4):1415–1416, 2003. [24] C.-H.L. Ong. A semantic view of classical proofs: type-theoretic, categorical, and denotational characterizations (preliminary extended abstract). In Proc. Logic in Computer Science, pp.230–241, 1996. [25] C.-H.L. Ong and C.A. Stewart. A Curry-Howard foundation for functional computation with control. In Proc. Principles of Programming Languages, pp.215–227, 1997. [26] M. Parigot. λµ-calculus: an algorithmic interpretation of classical natural deduction. In Proc. Logic Programming and Automated Reasoning, Springer Lecture Notes in Comput. Sci. 624, pp.190–201, 1992. [27] M. Parigot. Proofs of strong normalisation for second order classical natural deduction. J. Symb. Log. 62(4):1461–1479, 1997. [28] A. Pitts, Parametric polymorphism and operational equivalence. Math. Struct. Comp. Sci. 10:321–359, 2000. [29] G.D. Plotkin. Call-by-name, call-by-value, and the λ-calculus. Theoret. Comput. Sci. 1(1):125–159, 1975. [30] G.D. Plotkin. Type theory and recursion (extended abstract). In Proc. Logic in Computer Science, pp.374, 1993. [31] G.D. Plotkin and M. Abadi. A logic for parametric polymorphism. In Proc. Typed Lambda Calculi and Applications, Springer Lecture Notes in Comput. Sci. 664, pp.361–375, 1993. [32] A.J. Power and E. Robinson. Premonoidal categories and notions of computation. Math. Struct. Comp. Sci. 7(5):453–468, 1997. [33] J.C. Reynolds. Towards a theory of type structure. In Proc. Colloque sur la Programmation, Springer Lecture Notes in Comput. Sci. 19, pp.408–425, 1974. [34] J.C. Reynolds. Types, abstraction and parametric polymorphism. In Proc. IFIP 9th World Computer Congress, Information Processing 83, pp.513–523, 1983. [35] A. Sabry. Note on axiomatizing the semantics of control operators. Tech. Rep. CIS-TR-96-03, University of Oregon, 1996. [36] P. Selinger. Control categories and duality: on the categorical semantics of the lambda-mu calculus. Math. Struct. Comp. Sci. 11(2):207–260, 2001. [37] P. Selinger. Some remarks on control categories. Manuscript, 2003. [38] A. Simpson. Relational parametricity for computational effects. Manuscript, 2006. [39] T. Streicher and B. Reus. Classical logic, continuation semantics and abstract machines. J. Funct. Program. 8(6):543–572, 1998. [40] I. Takeuti. An axiomatic system of parametricity. Fundam. Inform. 33(4):397–432, 1998. [41] P. Taylor. Sober spaces and continuations. Theory and Applications of Categories 10(12):248–300, 2002. 22 MASAHITO HASEGAWA [42] H. Thielecke. Categorical Structure of Continuation Passing Style. PhD thesis, University of Edinburgh, 1997. [43] H. Thielecke. Answer type polymorphism in call-by-name continuation passing. In Proc. European Symposium on Programming, Springer Lecture Notes in Comput. Sci. 2986, pp.279–293, 2004. [44] P. Wadler. Theorems for free! In Proc. Functional Programming Languages and Computer Architecture, pp.347–359, 1989. This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
2cs.AI
AFIF4 : Deep Gender Classification based on AdaBoost-based Fusion of Isolated Facial Features and Foggy Faces arXiv:1706.04277v5 [cs.CV] 18 Nov 2017 Mahmoud Afifia,b , Abdelrahman Abdelhameda,b,∗∗ a Department of Electrical Engineering and Computer Science, Lassonde School of Engineering, York University, Canada b Faculty of Computers and Information, Assiut University, Egypt Abstract Gender classification aims at recognizing a person’s gender. Despite the high accuracy achieved by state-of-the-art methods for this task, there is still room for improvement in generalized and unrestricted datasets. In this paper, we advocate a new strategy inspired by the behavior of humans in gender recognition. Instead of dealing with the face image as a sole feature, we rely on the combination of isolated facial features and a holistic feature which we call the foggy face. Then, we use these features to train deep convolutional neural networks followed by an AdaBoost-based score fusion to infer the final gender class. We evaluate our method on four challenging datasets to demonstrate its efficacy in achieving better or on-par accuracy with state-of-the-art methods. In addition, we present a new face dataset that intensifies the challenges of occluded faces and illumination changes, which we believe to be a much-needed resource for gender classification research. Keywords: gender classification, deep convolutional neural networks, face image dataset ∗ Corresponding author author Email addresses: [email protected] (Mahmoud Afifi), [email protected] (Abdelrahman Abdelhamed) ∗∗ Corresponding Preprint submitted to Elsevier November 21, 2017 1. Introduction Gender classification is undoubtedly a simple task for humans, however, it is still an active research problem that draws the attention of many researchers in various fields, including computer vision and machine learning, with many applications [1, 2], such as visual surveillance, intelligent human-computer interaction, social media, demographic studies, and augmented reality. Although human faces are a powerful visual biometric feature, some facial features have semantic structures that may mislead the classification process relying on facial images as we show later in Section 3. In this paper, we advocate a different strategy to address the gender classification problem by mimicking the human behavior in gender recognition. We started by conducting some user studies to obtain a good grasp on how facial features can sometimes be unreliable in gender recognition. Then, we show how the human behavior in gender recognition can help us decide which facial features are more reliable. To this end, instead of dealing with the raw face images, we extract a few reliable facial features, then we input each of these features to a deep convolutional neural network (CNN) that initially classifies each visual feature to be belonging to either male or female. Finally, we use an AdaBoost-based score fusion to get the final classification decision based on the prediction score of each separate facial feature (Section 3). To evaluate the efficacy of our method, we apply it to four widely-used gender classification datasets, what reveals that our method achieves better, or at least on-par, results than many state-of-the-art methods (Section 4). With the state-of-the-art gender classification methods achieving compelling accuracy on the existing benchmark datasets, we believe that there is a need for more datasets focusing on more challenging scenarios for gender classification. So, in addition to the proposed method, we also propose a new challenging face dataset where we focus mainly on challenging cases such as occluded and badly illuminated faces. We also evaluate our method on this proposed dataset, revealing how it can be more challenging than other existing datasets. The rest 2 of the paper is as follows: in Section 2, we provide a quick review on key gender classification methods and discuss some of the common shortcomings. In Section 3, we discuss in depth our proposed method. Then, we present our proposed face image dataset and experimental evaluation of our method in Section 4, followed by a brief conclusion in Section 5. 2. Related Work Vision-based gender classification methods are usually based on extracting features from the given face image then use these features to train a classifier that outputs the predicted gender. Such methods, can be divided into two main categories: 1) geometric-based, and 2) appearance-based methods. The geometric-based techniques extract and utilize geometric features from the given face image to predict the gender. Burton et al. [3] presented a gender classification technique that relies on 73 facial points and uses discriminant analysis of point-to-point distances to infer the gender. Hands were used as biometric traits by Amayeh et al. [4] where the extracted geometric features of different parts of the hand were used for gender discrimination. The main issue with such methods is that they require highly precise extraction of the geometric features to obtain good classification accuracy. On the other hand, appearance-based methods rely on extracting features from either or both of: i) the whole face image (holistic features) and ii) regions of the face image (local features). Li et al. [5] introduced a method based on five individual facial features in addition to the hair and clothing of the person then used multiple support vector machine (SVM) classifiers to classify the gender based on the individual features. By combining this elaborated visual information using different five fusion approaches, they improved the classification accuracy even more. Nevertheless, the clothing and hair information may mislead the classifier, since the lack of context-based representation can be tricky even for humans. Combining both geometric-based and appearance-based features, Mozaf- 3 fari et al. [6] presented a technique that extracts both geometric-based and appearance-based features using three alternative methods: discrete cosine transform, local binary pattern (LBP), and geometrical distance. Tapia et al. [7] proposed a technique that uses fusion of local visual features where the feature selection is based on the information theory. They used the mutual information to measure the similarity of pixel intensities in order to reduce redundant features. They applied this measure on three different features: pixel intensities, shape, and local image texture that was described using LBPs. Rai et al. [8] presented a gender classification system that uses local visual information extracted from the Region of Interest (ROI) which is determined manually using three selected points. The ROI is divided into grid sub-images that were used to generate Gabor space by applying 2D Gabor filter with six orientations on each sub-image in order to reduce the sensitivity to light variations. The reduced feature vector is used as an input to SVM classifier that distinguishes between male and female local features. Hadid et al. [9] showed the efficiency of using LBPs in the gender and texture classification. Recently, Castrillón-Santana et al. [10] presented a comparative study among ten local feature (holistic and local) descriptors and three fusion strategies for gender classification using two datasets, namely EGA [11] and Groups [12]. They reported that local salient patterns (LSP) [13] and histogram of oriented gradients (HOG) [14] achieve the best accuracy using holistic visual features, while local phase quantization (LPQ) [15] with SVM attains the best accuracy using local visual features. Moeini and Mozaffari [16] proposed to learn separate dictionaries of male and female features, extracting 64 feature vectors of the face image using LBP. Then, a sparse representation-based classifier is used in the classification process, reporting state-of-the-art accuracy. On the other end, deep neural networks are becoming increasingly ubiquitous in many classification problems, according to the achieved remarkable improvements on accuracy. Levi and Hassner [17] classified both gender and age via a simple Convolutional Neural Network (CNN) that was applied to the Adience benchmark [18] for age and gender classification in a holistic manner. 4 A local CNN was used by Mansanet et al. [19] where they utilized Sobel filter in order to extract the local patches while taking into account the location of each patch. In order that the trained CNN obtains high accuracy with face images under occlusions, Juefei-Xu et al. [20] utilized multiple levels of blurring to train a deep CNN in a progressive way. From the above quick review, we can see that most of the prior work in gender classification was depending on extracting large number of local features per image, hand-crafted features, or unreliable holistic features. On the contrary, in our approach, we avoid such issues by using only four highly-discriminative local features and one holistic feature, and we combine these features with the classification power of deep CNNs to achieve state-of-the-art, or at least on-par, gender classification accuracy. As we discussed in the introduction, our choice of facial features is mainly based on the findings from the user studies we carried out trying to understand how humans behave in the gender recognition process. A detailed description of these user studies and our full approach follows in Section 3. 3. Our Methodology In this section, we will discuss in detail our approach to addressing the gender classification problem. First, we discuss the user studies carried out to help us decide which facial features (local and holistic) are more discriminative for gender classification. Then, we show how we prepare the face patches using a deformable part-based model as proposed by Yu et al. [21]. After that, we discuss the training of CNNs to classify the facial patches and get initial classification decisions. Finally, we present an adapted AdaBoost-based fusion mechanism of initial classification labels leading to the final classification decision. 3.1. A quick study of human behavior in gender recognition To study how the gender discrimination is performed by humans, we carried out two experiments. For these experiments, we used 200 images from the 5 Labeled Faces in the Wild (LFW) dataset [22], containing both male and female faces. The ground truth classes (male or female) was based on the attribute classifiers presented by Kumar et al. [23]. In the first experiment, we wanted to see how a human decides on the gender of a face image, especially when the facial features are not very discriminative. To do that, we showed 100 images to 5 different volunteers (20 images per volunteer) in two stages. In the first stage, each volunteer was asked to watch 10 different images and classify each one as male or female. Before doing the second stage, the volunteers were asked to be ready to explain what they would do once they are uncertain about the gender of the face. At the end of the experiment, almost all of the volunteers reported that the first thing they did was to look at the face region and facial features (eyes, nose, ears, etc.), if they cannot precisely determine the gender, they look at the whole image and think about all of the visual information (clothing, hair, accessories, etc.) surrounding the face in order to make their final decision. It is worth noting that the classification accuracy in this experiment was 96%. From the first experiment, we notice that visual information surrounding the face in an image are of high importance in classifying the gender of the face, especially when the facial features are quite ambiguous. That led us to conduct the second experiment, where we wanted to see which is more discriminative in deciding the gender from a human perspective: the facial features or the visual information surrounding the face? To achieve this, we used two types of images: 1) cropped face images that contain only the facial features, and 2) foggy face images that contain the whole visual information surrounding the face while the face region being heavily blurred out, so that a volunteer will depend only on the surrounding visual information to decide on the gender. Figure 1 shows some examples of the two types of images. Then, we prepared an on-line subjective test that asks volunteers to guess the image of a male among a set of female images and vice versa, i.e., to guess the image of a female among a set of male images. Each question contained either 5 or 10 images from either the cropped or the foggy face images. There were 70 volunteers who 6 (a) There is a single image of a FEMALE in these cropped-face images, guess which one is it? (b) There is a single image of a MALE in these cropped-face images, guess which one is it? (c) There is a single image of a FEMALE in these foggyface images, guess which one is it? (d) There is a single image for a MALE in these foggyface images, guess which one is it? Figure 1: Sample questions from our user studies. (a) and (b) are asking the users to guess a male/female image among a set of female/male images using cropped-face images. (c) and (d) are the same questions using foggy-face images. All images are taken from the Labeled Faces in the Wild (LFW) dataset [22]. accomplished this experiment using 100 images. Additionally, the volunteer is asked to comment on which type of face images was easier to recognize its gender. As a result, we got classification accuracy of 69.40% for the cropped face images and a higher accuracy of 88.09% for the foggy face images. Also, most of the volunteers reported that the foggy face images were easier to classify than the cropped face images. From the above experiments, we notice that, beside the high importance of isolated facial features, the visual information from the general look of persons also possesses an important role in the classification process regardless of the visibility of facial features. That was also noticed in prior work by Lian and Lu [24]. As a result, we decided to build our approach to gender classification by combining both isolated facial features and general appearance of the subject in the classification process, as we will discuss in Section 3.2. 7 3.2. Facial features preparation Before extracting the facial features and to improve the face detection process involved in our approach, we preprocess the images by applying lightinginvariant enhancement techniques. This was inspired from the work by Han et al. [25]. We apply the single scale retinex (SSR) presented by Jobson et al. [26], in which the lighting-invariant enhanced image ISSR (the retinex image) is generated by subtracting the estimated global illumination from the given face image I in the log space, as in the following equation: ISSR (x, y) = log(I(x, y)) − log(F (x, y) ∗ I(x, y)), (1) where (x, y) represents the spatial location of a pixel in the image, F is the Gaussian low-pass filter given by F (x, y) = K e−(x in which K is determined such that RR 2 +y 2 )/G2 , (2) F (x, y) dx dy = 1 and G is the Gaussian surround contrast. In the next step, we scan the input image I to fit the cascaded deformable shape model (CDSM) proposed by Yu et al. [21] in order to detect and extract the face regions. Fitting a CDSM requires the maximization of a scoring function that is based on both local appearance and shape optimization. This score function represents how well the estimated facial landmark positions are aligned with the CDSM. In order to detect multiple faces in a single image (as in the case of the Groups dataset), we repeat the following 2-step procedure: 1) we apply the CDSM to detect a face; 2) we mask out the detected face region by a single-color rectangle and repeat step 1 again on the same image until no more faces are detected. In the case that applying the CDSM on the original image I fails, we use the SSR image ISSR instead. Finally, we use the estimated landmarks of eyes, nose, and mouth, to extract a separate patch for each visual feature. Figure 2 shows an example of the process of extracting facial patches. To generate the foggy face images, first, the face region is detected using the above mentioned procedure, then the surrounding facial landmarks are used to 8 Left eye (a) Input face image 𝐼𝐼 Nose (b) Illumination invariant image 𝐼𝐼𝑆𝑆𝑆𝑆𝑆𝑆 Right eye Mouth Foggy face (c) Selected facial landmarks (d) Extracted patches of eyes, nose, mouth, and foggy face Figure 2: The process of extracting facial features including the foggy face. (a) is the input image. (b) is the illumination-invariant image generated by the single scale retinex (SSR) method [26]. (c) is the selected facial landmarks from the face detection process by fitting the cascaded deformable shape model (CDSM) [21]. (d) is the extracted features: eyes, nose, mouth, and foggy face which is generated by applying the Poisson image editing (PIE) technique [27]. define an unknown region Ω which we feed into a Poisson image editing (PIE) equation [27]: ZZ |∇f |2 arg min f with f |∂Ω = f ∗ |∂Ω , (3) Ω where ∇f is the first derivative of the unknown scalar function over Ω in the given image I. By omitting the suggested guidance used by [27], the foggy face image is generated by solving Equation 3. Figure 2d shows an example of a generated foggy face image. 3.3. Facial feature classification using CNNs Once we have all the facial features ready, we feed each patch as an independent input to a pre-trained CNN that is dedicated to classifying this biometric trait. In other words, we train four separate CNNs for the four separate facial features: foggy face, eyes, nose, and mouth. We adapted the Caffe reference model, proposed by Jia et al. [28], to solve the binary classification problem of each visual patch. Our adapted CNN architecture consists of five convolutional layers and three fully-connected layers. The first convolutional layer contains 96 (11×11) convolutional filters and uses stride size equal to 4 to reduce the computational complexity. The second layer uses one stride with 256 (5×5) convolutional filters. The last three convolutional layers use one stride with 9 (3×3) filters. The final softmax layer responds with two possible output classes, 9 representing either male or female. The CNN is trained using stochastic gradient descent and back-propagation [29] over 1000 iterations. 3.4. Classification score fusion Up to now, we have four separate CNNs that give us four independent gender classification scores based on four separate facial features. To fuse the four independent classification scores, we apply an AdaBoost-based score fusion mechanism as follows. Let NL be one of the five pre-trained CNNs that gives a decision c, such that c ∈ {MALE = 1, FEMALE = −1}, and sL is the corresponding prediction score given by the softmax function of NL , where L ∈ {face, eyes, nose, mouth} and SL = c(sL ). We use the foggy face score Sf ace that represents the prediction score of the foggy face multiplied by the estimated class as a holistic score that is combined with all other possible feature scores. Since we have four more scores (for left eye, right eye, nose, and mouth), we get 15 different combinations of scores, which is the summation given by X |L| , j ∈ {1, . . . , |L|}, j j (4) where |L| is the cardinality of the set of features. Then, we train AdaBoost classifiers [30] using the combination vectors to get the estimated class yˆi of each combined ith vector, where i ∈ {1, . . . , 15}. For each vector v~i =< Sface , · · · >, the predicted class yˆi is given by T X yˆi = sign( αt Ct (~ vi )), (5) t=1 where Ct (~ vi ) is the estimated class of the given score vector vi using the tth weak classifier, αt is the output weight of the classifier, and T is the number of weak classifiers. Eventually, the suggested labels are combined into a single vector ~ Ŷ =< yˆ1 , yˆ2 , . . . , yˆn > to train a linear discriminant classifier that determines the final class of the face image. An overview of our whole approach is illustrated in Figure 3. In this section, we have discussed our approach to the gender classification problem, from deciding on the features we used to the final classification 10 Initial classification scores and labels Intermediate classification scores (e) Final classification decision (a) Input image (d) 𝑁 = 15 AdaBoost classifiers (b) Facial features (c) Pre-trained CNNs Figure 3: An overview of our whole approach for gender classification. (a) the input image. (b) the extracted facial features (foggy face, eyes, nose, and mouth patches). (c) initial classification scores from 4 pre-trained convolutional neural networks (CNNs). (d) intermediate classification decisions based on 15 weak classifiers, one classifier for each combination from the initial scores. (e) the final classification decision from a linear discriminant classifier. decision. In section 4, we present some experimental results to evaluate our approach and compare it against other state-of-the-art methods, showing its high performance and efficacy. 4. Experimental Results In this section, we demonstrate the efficacy of our approach through extensive evaluation against four widely-used benchmark datasets. Additionally, we evaluate our approach against our new challenging dataset, the Specs of Faces dataset. 4.1. Evaluation Setup In our evaluation procedure, we use five-fold cross validation on all datasets and report the mean of the accuracy values. As the suggested folds of some datasets contain unbalanced number of male and female images, random images are picked from the excessive group in order to have the same number of images 11 for both genders. We train the deep CNNs using feature patches of size 227×227 pixels, extracted from 75% of the training set. The AdaBoost classifiers are trained thereafter by 60% of the rest of the training set using the prediction scores of the pre-trained CNNs. At the final stage of training, the fusion classifier is trained using the estimated classes reported by the AdaBoost classifiers over the rest of the training set. Eventually, we test the entire algorithm using the testing fold. As the CNNs are usually susceptible to the overfitting problem using a limited number of images, we enlarged the number of training images 10 times by generating more images through applying a set of operations depicted in Figure 4. For each training image, we apply translation by 5 pixels along the four border sides, then horizontally flip each of the four translated images and the original image. The empty pixels that have been produced by the previous operations are filled by the mean of the original training image to maintain the equilibrium of original means over the training set. 4.2. Datasets We have evaluated our method against four challenging datasets: the Labeled Faces in the Wild (LFW) [22], the Images of Groups dataset [12], the Adience benchmark for age and gender classification [18], and the Face Recognition Technology dataset (FERET) [31]. Furthermore, we present a new dataset of challenging face images and use it to evaluate our method. The proposed dataset is denoted as the Specs on Faces (SoF) dataset. Labeled Faces in the Wild (LFW). The LFW dataset [22] consists of 13,233 unconstrained face (250×250 pixels) images for different 5,749 persons (4,272 males and 1,477 females). In order to label the images based on gender, we used the attribute values presented by Kumar et al. [23]. Each descriptive visual attribute Z is represented as a real value az : az ∈ R, where the magnitude of az represents the degree of Z and the sign of az represents the category. In the gender attribute, a positive sign refers to a male image and a negative sign represents a female image. It is worth noting that there is a reported error rate 12 Figure 4: An example on how we enlarge the number of training images by applying small translation on the original image along the four sides, then horizontally flip the four translated images and the original image. The shown image is an eye patch from the proposed Specs on Faces dataset. (approximately 8.62%) in this classification. A straightforward way was used to assign each face image to its gender label by applying a threshold based on the sign of the gender attribute. However, there are some images whose gender attributes lie on the boundaries (e.g. ±0.3); that leads to incorrect labels. To handle that, we added another layer of separation for images whose magnitude values are less than a threshold (e.g. 0.5). Then, we used the genderize.io1 API to estimate the gender based on the first name of each face image in the LFW. Eventually, we manually reviewed each category of male and female images three times to completely eliminate any incorrect labels. We made this accurate labeling of the LFW dataset available online2 . In our experiments, we used 2,948 images from the LFW dataset (590 images on average for each fold). 1 https://genderize.io/ 2 http://bit.ly/lfw-gender 13 Images of Groups dataset. The Groups dataset [12] contains 28,231 face images that were extracted from the original 5,080 group images collected from Flickr images. The Groups dataset is considered, in the literature, the most challenging and complex dataset for the gender classification problem [32, 33, 34]. The experiments were carried out using 12,682 face images (2,536 images on average for each fold). Adience benchmark for age and gender classification. The Adience benchmark [18] comprises 26,580 unconstrained face images gathered from Flickr albums for 2,284 persons. The images include people with different head poses and ages under various illumination conditions. The folds which have been used in the experiments were picked randomly, where each fold contains 970 images on average. Face Recognition Technology (FERET). The FERET dataset [31] is widely used to evaluate and develop facial recognition techniques. The dataset consists of 14,126 images for 1199 different persons captured between 1993 and 1996. There is a variety in face poses, facial expressions, and lighting conditions. In 2003, the high resolution (512× 768 pixels) color FERET was released which has been used in the presented experiments. The total number of frontal and near-frontal face images, whose pose angle lies between −45◦ and +45◦ , is 5,786 images (3,816 male images and 1,970 female images). We evaluated our approach using 5 folds of the FERET dataset (700 images were randomly picked for each fold). The Specs on Faces (SoF) dataset. Since one of the main problems in gender classification is the face occlusions and illumination changes [5, 8], we present a new dataset, the Specs on Faces (SoF)3 , that is devoted to these two problems. We made the proposed dataset more challenging for face detection, recognition, and classification, through capturing the faces under harsh illumination environments and face occlusions. The SoF comprises 2,662 original images of size 640 × 480 pixels for 112 persons (66 males and 46 females) from 3 http://bit.ly/sof_dataset 14 Figure 5: Samples of an image for the same person from the Specs on Faces (SoF) data set captured under different lighting directions. different ages. The glasses are the common natural occlusion in all images of the dataset. However, we added two more synthetic occlusions, for nose and mouth, to each image. The original images in the proposed SoF dataset are divided into two parts. The first part contains 757 unconstrained face images in the wild for 106 different persons whose head orientations approximately fall in the range of ±35◦ in yaw, pitch, and roll. The images were captured in an unstructured manner over a long period in several locations under indoor and outdoor illumination environments. The second part contains 1905 images which are dedicated to challenging harsh illumination changes. In order to get arbitrary indoor lighting conditions, 12 subjects were captured using a wheel-whirled lamp as the only light source in the laboratory. The lamp is located above and spun around each subject to emit light rays in random directions, see Figure 5 for an example. This idea is inspired by the primitive version of the Light Stage system presented by Debevec et al. [35]. The SoF dataset involves a handcrafted metadata that contains subject ID, view (frontal/near-frontal) label, 17 facial feature points, face and glasses rectangle, gender and age labels, illumination quality, and facial emotion for each subject, see Figure 6 for an example of the metadata. Moreover, to generate more challenging synthetic images, we applied three image filters (Gaussian noise, Gaussian smoothing, and image posterization using Fuzzy logic) to the original images. All the generated images are categorized into three levels of difficulty (easy, medium, and hard). That enlarges the number of images to be 42,592 images (26,112 male images and 16,480 female images). Furthermore, the dataset comes with a metadata that describes each subject from different aspects. Figure 7 shows a sample image from the two 15 Figure 6: Samples of the Specs on Faces (SoF) dataset. The lower part shows a metadata example for the shown image. The green circles represent the 17 facial landmarks, the white rectangle is the glasses rectangle, and the yellow one is the face rectangle. parts of the dataset, original images and synthetic images. We carried out two groups of experiments using the SoF dataset. In the first group, we randomly picked 5 folds, each contained 330 original images, i.e., without any filters or synthetic occlusions. In the second group, we randomly picked the folds from the whole images of the dataset, original and synthetic images, where each fold contained 750 images. In the following, we will briefly discuss the results of our facial feature detection mechanism followed by a more thorough discussion of gender classification results achieved by our method. 4.3. Facial feature detection In spite of the non-frontal view of many images in the datasets, the facial components are extracted in a desirable way. As our target is to extract the facial patch instead of extracting the exact facial points, some error in the alignment of the CDSM is tolerable. In addition, SSR helps improve the feature detection by catching undetected faces, this is shown in Table 1. As the Face 16 Difficulty Medium Easy Hard Gaussian blur Gaussian noise SoF original image Posterization Nose occlusion Mouth occlusion SoF generated images Figure 7: The Specs on Faces (SoF) dataset contains two groups of images. The first part includes the original images. The second part contains the original images besides the generated images. The last three columns show the three levels of difficulty (easy, medium, and hard). The rows from the first to the fifth represent the generated images by applying Gaussian smoothing, Gaussian noise, posterization filter, nose occlusion, and mouth occlusion, respectively. Detection Data Set and Benchmark (FDDB) [36] is devoted to face detection research, it was used to calculate the recall, precision, and F-Measure of the CDSM with and without SSR. The FDDB contains 2845 images that captured 5171 faces. As shown in Table 1, the F-Measure is improved by about +2% for the FDDB dataset after using SSR as an optional preprocessing step. Also, the SSR improves the F-Measure using SoF (original) and SoF (full) datasets by about +3% and +12%, respectively. 4.4. Gender classification accuracy We have applied our proposed method (AFIF4 ) to unconstrained types of face images, i.e., frontal images, near-frontal images, non-frontal images, and 17 Table 1: The recall (%), precision (%), and F-Measure (%) of the face detection process using cascaded deformable shape model (CDSM) with and without single scale retinex (SSR). CDSM w/o SSR CDSM w SSR Dataset FRecall Precision FRecall Precision Measure Measure FDDB 73.40 99.15 84.35 77.99 97.07 86.49 SoF (original) 84.08 95.30 89.34 92.40 93.00 92.70 SoF (full) 58.86 95.24 72.76 79.66 90.21 84.61 images with large poses and occlusions. In literature, many gender classification methods are applied only to frontal or near-frontal face images [37, 38, 7, 39, 40]. For the sake of fair comparison, we report only results of methods using unconstrained types of images [16, 9, 41, 42, 43, 8, 18, 12] and we omit results of methods using only frontal or near-frontal face images. From the work by Moeini and Mozaffari [16], we report the results of two methods: dictionary learning and separate dictionary learning for gender classification, denoted as DL-GC and SDL-GC, respectively. Only for the case of the FERET dataset, because we used frontal and near-frontal images with pose angles between −45◦ and +45◦ , we report results of methods using frontal/near-frontal images. Table 2 shows that the accuracy of our method outperforms the state-of-the-art results reported for unconstrained types of face images from the LFW, Groups, and Adience datasets. Also, our method achieves comparable accuracy with the state-of-the-art over the FERET dataset for frontal/near-frontal face images. Cross-dataset Evaluation. To further assess the performance of our method, we carried out cross-dataset evaluation as shown in Table 3. The attained accuracy using the same dataset for both training and testing usually drops in an obvious way when using different datasets for training and testing. From Table 3, we can see that the lowest cross-dataset classification accuracy is obtained using the full SoF dataset (in 3 cases), the Adience dataset (in 2 cases), and the Groups dataset (in 1 case). This points towards that our full SoF dataset is the most challenging. The low accuracy obtained using the full SoF dataset, 18 Table 2: Comparison of our method (AFIF4 ) with state-of-the-art achieved accuracy over the LFW, Groups, Adience, and FERET datasets. Note that the reported accuracy here are for methods applied to unconstrained types of images (frontal, near-frontal, and images with large poses and occlusions), results for only frontal and/or near-frontal images are omitted for the sake of fair comparison. The cells marked with a ‘–’ represent unavailable results or results from methods using only frontal/near-frontal images. Only for the case of FERET dataset, we report results of methods using only frontal/near-frontal images because we followed the same procedure. Accuracy (%) Method LFW Groups Adience FERET DL-GC [16] 93.60 84.40 – 99.50 SDL-GC [16] 94.90 83.30 – 99.90 Hadid et al. [9] – 89.85 – – Eidinger et al. [18] – 86.80 76.10 – Han et al. [43] 94.40 – – – Rai and Khanna [8] 89.10 – – 98.40 Gallagher and Chen [12] – 74.10 – – Levi and Hassner [41] – – 86.80 – Wolfshaar et al. [42] – – 87.20 – Tapia and Pérez [7] – – – 99.10 95.98 90.73 90.59 99.49 AFIF4 (Ours) compared to the other datasets, is due to the challenging filters and synthetic occlusions that have been added to the original images. Also, it is worth noting that the highest cross-dataset accuracy is obtained by the FERET dataset, due to the good quality of the images compared with the poor resolutions of many images of other datasets. To assess the performance for cross-dataset evaluation against the state-ofthe-art performance, we compare our results with the latest results reported by Moeini and Mozaffari [16] for the LFW, Groups, and FERET datasets in Table 4. It is clear that our method gives higher accuracy for all cases except for the FERET dataset. It is worth noting that cross-dataset evaluation usually 19 Table 3: Results of cross-dataset evaluation of our proposed method (AFIF4 ). The diagonal represents the average accuracy obtained using the same dataset for both training and testing. Rows represent datasets used for training while columns represent datasets used for testing. The values in bold represents the dataset that yields the lowest accuracy when using a specific dataset for training, for example, in first row, when using LFW for training, the full SoF dataset yields the lowest accuracy, that means it is the most challenging in this case. Testing Accuracy (%) Training LFW SoF SoF (full) (original) Adience Groups FERET LFW 95.98 79.19 65.76 78.36 76.67 92.71 Adience 84.55 90.59 74.15 79.97 85.07 86.86 SoF (full) 79.22 74.16 92.10 97.21 72.30 84.77 SoF (original) 83.31 71.09 84.05 98.48 73.60 89.12 Groups 91.74 83.06 69.80 82.20 90.73 92.20 FERET 85.78 69.19 75.15 83.27 85.67 99.49 yields lower accuracy than the case of using the same dataset for both training and testing. This is mainly due to different conditions of collecting images in different datasets, such as occlusions, illumination changes, backgrounds, etc. 5. Conclusion In this paper, we addressed the gender classification problem by using a combination between local and holistic features extracted from face images. We used four deep convolutional neural networks (CNNs) to separately classify the individual features, then we applied an AdaBoost-based score fusion mechanism to aggregate the prediction scores obtained from the CNNs. Through extensive experiments, we showed that our method achieves better results than the state-of-the-art methods in most cases on widely-used datasets. Also, and more importantly, we showed that our method performs better than the state-of-theart when generalized to cross-dataset evaluation, which is much more challenging than in-dataset evaluation. Furthermore, we proposed a more challenging 20 Table 4: Comparison of cross-dataset evaluation of our proposed method (AFIF4 ) against the state-of-the-art results reported by Moeini and Mozaffari [16]. The values represent the classification accuracy (%). Training LFW Groups FERET DL-GC SDL-GC AFIF4 [16] [16] (Ours) LFW 93.60 94.90 95.98 Groups 69.70 72.40 76.67 FERET 88.80 89.70 92.71 LFW 80.60 83.10 91.74 Groups 83.30 84.40 90.73 FERET 85.20 87.10 92.20 LFW 71.70 73.50 85.78 Groups 59.50 61.90 85.67 FERET 99.50 99.90 99.49 Testing dataset of 42,592 face images that mainly addresses the challenges of face occlusions and illumination variation. We accompanied our proposed dataset with handcrafted annotations and gender labels for all images to facilitate further research addressing the gender classification problem. References [1] C.-B. Ng, Y.-H. Tay, B.-M. Goi, A review of facial gender recognition, Pattern Analysis and Applications 18 (4) (2015) 739–755. [2] A. K. Jain, S. Z. Li, Handbook of face recognition, Springer, 2011. [3] A. M. Burton, V. Bruce, N. Dench, What’s the difference between men and women? evidence from facial measurement, Perception 22 (2) (1993) 153–176. [4] G. Amayeh, G. Bebis, M. Nicolescu, Gender classification from hand shape, in: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, IEEE, 2008, pp. 1–7. 21 [5] B. Li, X.-C. Lian, B.-L. Lu, Gender classification by combining clothing, hair and facial component classifiers, Neurocomputing 76 (1) (2012) 18–27. [6] S. Mozaffari, H. Behravan, R. Akbari, Gender classification using single frontal image per person: combination of appearance and geometric based features, in: International Conference on Pattern Recognition (ICPR), IEEE, 2010, pp. 1192–1195. [7] J. E. Tapia, C. A. Pérez, Gender classification based on fusion of different spatial scale features selected by mutual information from histogram of lbp, intensity, and shape, IEEE transactions on information forensics and security 8 (3) (2013) 488–499. [8] P. Rai, P. Khanna, A gender classification system robust to occlusion using gabor features based (2d) 2 pca, Journal of Visual Communication and Image Representation 25 (5) (2014) 1118–1129. [9] A. Hadid, J. Ylioinas, M. Bengherabi, M. Ghahramani, A. Taleb-Ahmed, Gender and texture classification: A comparative analysis using 13 variants of local binary patterns, Pattern Recognition Letters 68 (2015) 231–238. [10] M. Castrillón-Santana, M. De Marsico, M. Nappi, D. Riccio, Meg: Texture operators for multi-expert gender classification, Computer Vision and Image Understanding. [11] D. Riccio, G. Tortora, M. De Marsico, H. Wechsler, Egaethnicity, gender and age, a pre-annotated face database, in: IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), IEEE, 2012, pp. 1–8. [12] A. C. Gallagher, T. Chen, Understanding images of groups of people, in: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2009, pp. 256–263. 22 [13] Z. Chai, Z. Sun, T. Tan, H. Mendez-Vazquez, Local salient patternsa novel local descriptor for face recognition, in: International Conference on Biometrics (ICB), IEEE, 2013, pp. 1–6. [14] N. Dalal, B. Triggs, Histograms of oriented gradients for human detection, in: IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), Vol. 1, IEEE, 2005, pp. 886–893. [15] V. Ojansivu, J. Heikkilä, Blur insensitive texture classification using local phase quantization, in: International conference on image and signal processing, Springer, 2008, pp. 236–243. [16] H. Moeini, S. Mozaffari, Gender dictionary learning for gender classification, Journal of Visual Communication and Image Representation 42 (2017) 1 – 13. doi:http://dx.doi.org/10.1016/j.jvcir.2016.11.002. [17] G. Levi, T. Hassner, Age and gender classification using convolutional neural networks, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015, pp. 34–42. [18] E. Eidinger, R. Enbar, T. Hassner, Age and gender estimation of unfiltered faces, IEEE Transactions on Information Forensics and Security 9 (12) (2014) 2170–2179. [19] J. Mansanet, A. Albiol, R. Paredes, Local deep neural networks for gender recognition, Pattern Recognition Letters 70 (2016) 80–86. [20] F. Juefei-Xu, E. Verma, P. Goel, A. Cherodian, M. Savvides, Deepgender: Occlusion and low resolution robust facial gender classification via progressively trained convolutional neural networks with attention, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016, pp. 68–77. [21] X. Yu, J. Huang, S. Zhang, W. Yan, D. N. Metaxas, Pose-free facial landmark fitting via optimized part mixtures and cascaded deformable shape 23 model, in: Proceedings of the IEEE International Conference on Computer Vision, 2013, pp. 1944–1951. [22] G. B. Huang, M. Ramesh, T. Berg, E. Learned-Miller, Labeled faces in the wild: A database for studying face recognition in unconstrained environments, Tech. rep., Technical Report 07-49, University of Massachusetts, Amherst (2007). [23] N. Kumar, A. Berg, P. N. Belhumeur, S. Nayar, Describable visual attributes for face verification and image search, IEEE Transactions on Pattern Analysis and Machine Intelligence 33 (10) (2011) 1962–1977. [24] X.-C. Lian, B.-L. Lu, Gender classification by combining facial and hair information, in: International Conference on Neural Information Processing, Springer, 2008, pp. 647–654. [25] H. Han, S. Shan, X. Chen, W. Gao, A comparative study on illumination preprocessing in face recognition, Pattern Recognition 46 (6) (2013) 1691– 1699. [26] D. J. Jobson, Z.-u. Rahman, G. A. Woodell, Properties and performance of a center/surround retinex, IEEE transactions on image processing 6 (3) (1997) 451–462. [27] P. Pérez, M. Gangnet, A. Blake, Poisson image editing, in: ACM Transactions on Graphics (TOG), Vol. 22, ACM, 2003, pp. 313–318. [28] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, T. Darrell, Caffe: Convolutional architecture for fast feature embedding, in: Proceedings of the 22nd ACM international conference on Multimedia, ACM, 2014, pp. 675–678. [29] D. E. Rumelhart, G. E. Hinton, R. J. Williams, Learning representations by back-propagating errors, Cognitive modeling 5 (3) (1988) 1. 24 [30] Y. Freund, R. E. Schapire, et al., Experiments with a new boosting algorithm, in: Icml, Vol. 96, 1996, pp. 148–156. [31] P. J. Phillips, H. Wechsler, J. Huang, P. J. Rauss, The feret database and evaluation procedure for face-recognition algorithms, Image and vision computing 16 (5) (1998) 295–306. [32] M. S. Nixon, P. L. Correia, K. Nasrollahi, T. B. Moeslund, A. Hadid, M. Tistarelli, On soft biometrics, Pattern Recognition Letters 68 (2015) 218–230. [33] M. Ngan, P. Grother, Face recognition vendor test (frvt) performance of automated gender classification algorithms, in: Technical Report NIST IR 8052, National Institute of Standards and Technology, 2015. [34] M. Castrillón-Santana, J. Lorenzo-Navarro, E. Ramón-Balmaseda, Multiscale score level fusion of local descriptors for gender classification in the wild, Multimedia Tools and Applications (2016) 1–17. [35] P. Debevec, T. Hawkins, C. Tchou, H.-P. Duiker, W. Sarokin, M. Sagar, Acquiring the reflectance field of a human face, in: Proceedings of the 27th annual conference on Computer graphics and interactive techniques, ACM Press/Addison-Wesley Publishing Co., 2000, pp. 145–156. [36] V. Jain, E. Learned-Miller, Fddb: A benchmark for face detection in unconstrained settings, Tech. Rep. UM-CS-2010-009, University of Massachusetts, Amherst (2010). [37] A. Moeini, K. Faez, H. Moeini, Real-world gender classification via local gabor binary pattern and three-dimensional face reconstruction by generic elastic model, IET Image Processing 9 (8) (2015) 690–698. [38] D. Mery, K. Bowyer, Automatic facial attribute analysis via adaptive sparse representation of random patches, Pattern Recognition Letters 68 (2015) 260–269. 25 [39] C. Shan, Learning local binary patterns for gender classification on realworld face images, Pattern Recognition Letters 33 (4) (2012) 431–437. [40] S. Baluja, H. A. Rowley, Boosting sex identification performance, International Journal of computer vision 71 (1) (2007) 111–119. [41] G. Levi, T. Hassner, Age and gender classification using convolutional neural networks, in: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, 2015. [42] J. van de Wolfshaar, M. F. Karaaba, M. A. Wiering, Deep convolutional neural networks and support vector machines for gender recognition, in: IEEE Symposium Series on Computational Intelligence, IEEE, 2015, pp. 188–195. [43] H. Han, C. Otto, X. Liu, A. K. Jain, Demographic estimation from face images: Human vs. machine performance, IEEE Transactions on Pattern Analysis and Machine Intelligence 37 (6) (2015) 1148–1161. 26
1cs.CV
arXiv:1607.06641v3 [cs.NE] 12 Jun 2017 Optimal resampling for the noisy OneMax problem Jialin Liu Michael Fairbank Diego Pérez-Liébana Simon M. Lucas University of Essex Colchester CO4 3SQ United Kingdom [email protected] University of Essex Colchester CO4 3SQ United Kingdom [email protected] University of Essex Colchester CO4 3SQ United Kingdom [email protected] University of Essex Colchester CO4 3SQ United Kingdom [email protected] Abstract—The OneMax problem is a standard benchmark optimisation problem for a binary search space. Recent work on applying a Bandit-Based Random Mutation Hill-Climbing algorithm to the noisy OneMax problem showed that it is important to choose a good value for the resampling number to make a careful trade off between taking more samples in order to reduce noise, and taking fewer samples to reduce the total computational cost. This paper extends that observation by deriving an analytical expression for the running time of the Random Mutation Hill-Climbing algorithm with resampling applied to the noisy OneMax problem, and showing both theoretically and empirically that the optimal resampling number increases with the number of dimensions in the search space. Index Terms—Noisy OneMax, resampling, Random Mutation Hill-Climber (RMHC) I. I NTRODUCTION Evolutionary Algorithms (EA) have been widely used in both continuous and discrete domains [1], [2], [3]. Resampling1 has proved to be a powerful tool in improving the local performance of EAs in noisy optimisation [3], [4], [5], and different resampling rules have been applied to a variety of EAs in continuous noisy optimisation, as studied in [6], [7]. Akimoto et al. [8] concluded that the running time for an adapted algorithm using resampling to solve a problem with additive Gaussian noise is similar to the runtime in the noise-free case when multiplying by a factor log n, where n is the problem dimension. Previous work on solving the OneMax problem [9] has concentrated on using a (1+1)-Evolution Algorithm (EA) [10], [11]. The OneMax problem with One-bit noise (exactly one uniformly selected bit changes with probability p ∈ (0, 1) due to the noise) has been studied previously by Droste [10]. Qian et al. [11] claimed that resampling wasn’t beneficial in optimising OneMax with additive Gaussian noise using (1+1)EA. Recently, Liu et al. [12], [13] applied a bandit-based RMHC to the noisy OneMax problem, and showed that it was important to choose an optimal resampling number, so as to compromise the reduction in sampling noise against the cost of doing so. The main contribution of this work is the analysis of the optimal resampling number in the OneMax problem, in the presence of additive Gaussian noise. We show that the optimal resampling number increases with the problem dimension. 1 In this paper, “resampling” refers to the multiple re-evalutions of a solution. The paper is structured as follows. Section II provides a brief review of the related work and describes our noisy OneMax problem. Section III explains the modified Random Mutation Hill-Climbing algorithm used in the noisy context. Section IV analyses the optimal resampling number in the defined noisy OneMax problem. Experimental results are presented and discussed in Section V. Finally, Section VI concludes the work. II. BACKGROUND This section is organised as follows. Section II-A presents the original Random Mutation Hill-Climbing algorithm and its relation to (1+1)-EA. Section II-B recalls the OneMax problem, then a noisy variant of OneMax problem is defined in Section II-C. More related literatures in solving different noisy variants of OneMax problems are discussed in Section II-D A. Random Mutation Hill-Climbing The Random Mutation Hill-Climbing (RMHC), also called Stochastic Hill Climbing, is a derivative-free optimisation method mostly used in discrete domains [14], [15]. RMHC can also be seen as an evolutionary algorithm in which there is a population of just one individual, and at each generation a child genome is formed from the current (best-sofar) individual by mutating exactly one gene, chosen uniformly at random. After mutation, the mutated child genome replaces its parent if its fitness value is improved or equivalent. In other words, RMHC randomly selects a neighbour candidate in the search space (where neighbour means it differs in exactly one gene) and updates its current candidate using a fitnesscomparison-based method. Borisovsky and Eremeev [16] proved that under some conditions, RMHC outperforms other EAs in terms of the probability of finding an anytime solution on several problems including OneMax. (1+1)-EA is a variant of RMHC, the only difference being that every gene of the current individual’s genome mutates with a certain probability at each generation.2 (1+1)-EA has been widely used in both discrete and continuous optimisation problems [16]. A variant of (1+1)-EA is the closely related 2 However note that some communities refer to RMHC as “(1+1)Evolutionary Algorithm (EA)”, but we will avoid that description. “(1+1)-Evolutionary Strategy (ES)” [17], which uses a selfadaptive mutation step-size and is applicable to real-valued search spaces. Despite its simplicity, RMHC often competes surprisingly well with more complex algorithms [18], especially when deployed with random restarts. For instance, Lucas and Reynolds evolved Deterministic Finite Automata (DFA) [14], [15] using a multi-start RMHC algorithm with very competitive results, outperforming more complex evolutionary algorithms, and for some classes of problems also outperforming the state of the art Evidence-Driven State Merging (EDSM) [19] algorithms. B. OneMax problem The OneMax problem [9] is a standard benchmark optimisation problem for a binary search space and has been deeply studied in the previous literatures [2], [20], [21]. The objective is to maximise the number of 1s occurring in a binary string, i.e., for a given n-bit string x, the fitness function to maximise for that string is given by f (x) = n X xi , (1) i=1 where xi denotes the ith bit in the string x, and is either 1 or 0. C. Noisy OneMax In this work, we study a noisy variant of the OneMax problem, where the fitness function is corrupted by some additive unbiased normally distributed noise with constant variance, formalised in (2). f 0 (x) = f (x) + N (0, σ 2 ), (2) with N (0, σ 2 ) denoting a Gaussian noise, with mean 0 and variance σ 2 . From now on, we will use f 0(i) (x) to denote the ith call to noisy fitness function on x. At each call, the noise is independently sampled from N (0, σ 2 ) and takes effect after the true fitness is evaluated. There is a variety of noise models for the OneMax problem, as described in the next section. To avoid confusion, the term “noisy OneMax” refers to (2), the noisy variant used in this paper. Also, the “noisy” refers to the noise in the fitness function’s ability to read the true fitness of the genome; not the mutations which are deliberately applied to the genome, which could be interpreted as a second kind of “noise”. D. Related work Different noise models for the OneMax problem have been studied before. a) Proportionate selection is noise invariant: Our noise model is the same as the one used in [22]. Miller and Goldberg [22] used a GA with µ parents and λ offsprings, and proved that increasing noise level did not affect selection pressure for Genetic Algorithms (GA) using fitness-proportionate selection, in which each individual survives with a probability proportional to its fitness divided by the average fitness in the population [22], [23]. b) Resampling does not add benefit in low dimension: Qian et al. [11] applied (1+1)-EA using mutation probability 1 and at most 100 resamplings to a 10-bit noisy OneMax p = 10 problem corrupted by additive Gaussian noise with variance 100 ((2) with σ 2 = 100), and concluded that resampling wasn’t beneficial for the (1+1)-EA in optimising the noisy OneMax problem. In their model, resampling had the effect of lowering the variance of the noise to 1, which is exactly as big as the lower bound of the differences between distinct noisefree fitness values. With that level of resampling and problem dimension, the problem is still difficult to solve. We present, later in this paper, our application of RMHC using larger resampling numbers in noisy OneMax, with noise variance σ 2 = 1 and do observe that resampling adds a significant benefit when the dimension is above 10 (Section V). c) Solving high dimension noisy OneMax: Sastry et al. [24] designed a fully parallelised, highly-efficient compact Genetic Algorithm (cGA) to solve very high dimension problems, and compared it to RMHC on a noisy OneMax problem using noise variance depending linearly on the length of string, to allow for more difficult problems, for the reason that a randomly initiated n-bit string has fitness variance n 4 . RMHC without resampling performed poorly when the problem dimension is higher than 10, 000. d) Noise takes effect before the evaluation: Droste [10] defined a One-bit noise model for the OneMax problem, in which during every fitness evaluation of the bit-string x, there was exactly one uniformly-chosen random bit mis-read with probability p0 . Hence the measured noisy fitness values are equivalent to replacing the Gaussian noise term in (2) by an appropriate discrete random variable taking values from {−1, 0, 1}. Under this scheme, Droste showed that (1+1)EA with mutation probability p = n1 could optimise a nbit OneMax problem corrupted by One-bit noise, with high probability, in polynomial time if p0 is O( log(n) n ). III. R ANDOM M UTATION H ILL -C LIMBING IN NOISY CONTEXT When RMHC is applied to the noisy OneMax fitness function (2), a mutation of the k th gene refers to flipping the k th bit of the string. The standard deviation of the second term in (2) (the explicit noise term) is of the same order of magnitude as the noise in the first term of (2) (the OneMax fitness term) introduced by mutations from the RMHC algorithm. This extremely poor signal-to-noise ratio would cause major problems for hill-climbing strategies such as RMHC. Hence, we use RMHC with resampling, applied to the noisy OneMax problem, so as to try to reduce the unwanted variance, and to allow the hill climber to work. A. Noise-free case Algorithm 1 recalls the generic RMHC, without any resampling. This is suitable for noise-free problems. Here we have assumed the fitness value of the best-so-far genome could be stored after each cycle. If, alternatively, no space was allocated to store that fitness value, or if fitness Algorithm 1 Random Mutation Hill-Climbing algorithm (RMHC). No resampling is performed . Require: n ∈ N∗ : genome length (problem dimension) Require: X : search space Require: f : X 7→ R: fitness function 1: Randomly initialise a genome x ∈ X 2: bestF itSoF ar ← f (x) 3: N ← 1 . Total evaluation count so far 4: while time not elapsed do 5: Uniformly randomly select k ∈ {1, . . . , n} 6: y ← new genome by mutating the k th gene of x 7: F ity ← f (y) 8: N ←N +1 . Update evaluation count 9: if F ity ≥ bestF itSoF ar then 10: x←y . Update the best-so-far genome 11: bestF itSoF ar ← F ity 12: end if 13: end while 14: return x evaluations can only be made by directly comparing two individuals, then the best-so-far genome’s fitness would need to be re-evaluated at each generation, thus raising the algorithm’s “evaluation count”, N , by a factor of approximately 2. B. Noisy case The previous RMHC algorithm (Algorithm 1) was applicable to deterministic fitness functions. Algorithm 2 extends this RMHC algorithm to be applicable to noisy fitness functions. It achieves this extension by using resampling, so that each genome is evaluated multiple times, so as to reduce the effect of noise which might interfere with hill climbing. Additionally, if the statistics of the best-so-far genome can be stored, instead of comparing directly the fitness values of the offspring to the fitness of the parent (the best-so-far genome), the average fitness value of the best-so-far genome in the history is compared at each generation (line 11 of Algorithm 2). IV. A NALYSIS OF OPTIMAL RESAMPLING NUMBER IN NOISY O NE M AX PROBLEM This section analyses the application of the modified RMHC algorithm (Algorithm 2) to the noisy OneMax problem, with fixed noise level, by describing it as a Markov process. Several variants of Algorithm 2 are considered in Section IV-B, including analysis of varying the resampling number, and of the effect of storing a statistic of the best-so-far genome versus not storing it. The benefit of storing the statistics of the best-so-far genome is illustrated in Section IV-B. Section IV-C derives an expression for the length of Markov chain that represents the learning algorithm, and the optimal level of resampling is calculated and displayed, in Section IV-D. We restrict the analysis in this section to a fixed noise level σ 2 = 1. This noise level is a significant challenge for RMHC, as the difference between the parent’s fitness and the one of the Algorithm 2 RMHC modified to include resampling, suitable for the noisy case. f 0(i) (x) denotes the ith call to the noisy fitness function on search point x. Require: n ∈ N∗ : genome length (problem dimension) Require: X : search space Require: f : X 7→ R: fitness function Require: r ∈ N∗ : Resampling number 1: Randomly initialise a genome x ∈ X 2: bestF itSoF ar ← 0 3: M ← 0 . Evaluation count for the latest best-so-far genome 4: N ← 0 . Total evaluation count so far 5: while time not elapsed do 6: Uniformly randomly select k ∈ {1, . . . , n} 7: y ← new genome by mutating the k th gene of x Pr 1 0(i) 8: F itx ← r Pi=1 f (x) r 9: F ity ← 1r i=1 f 0(i) (y) 10: N ← N + 2r . Update evaluation count ar×M +F itx ×r 11: averageF itnessx ← bestF itSoFM +r 12: if F ity ≥ averageF itnessx then 13: x←y . Update the best-so-far genome 14: bestF itSoF ar ← F ity 15: M ←r 16: else 17: bestF itSoF ar ← averageF itnessx 18: M ←M +r 19: end if 20: end while 21: return x offspring is always 1 in our model. This motivates resampling, since resampling a candidate solution r times can reduce the variance of the noise by a factor of 1r . The extension of this analysis to the general σ would be straightforward. A. Markov chain description for noisy OneMax We consider a n-bit OneMax problem with constant variance Gaussian noise, σ 2 = 1. Throughout this section, we summarise the n-bit OneMax state vector by a single scalar number, i, equal to the number of ones in the n-bit string. As the RMHC algorithm makes mutations to the full bit string, the compressed state-representation, i, will change by ±1. The transition probabilities for the change in i are dependent only on the scalar i. Hence the evolution of the variable i is modeled by a Markov process. After each mutation is initially made by the RMHC algorithm, the fitness of that mutated bit string is evaluated using (2), and the RMHC algorithm will either accept or reject that mutation. Let pT A , pF A , pT R and pF R denote the probability of true acceptance, false acceptance, true rejection and false rejection, respectively, for the RMHC algorithm to accept or reject any given mutation. These four probabilities depend on the resampling strategy employed by the RMHC algorithm, and are derived in Section IV-B. However, since complementary probability pairs must sum to one, we do generally have that, pF A = 1 − pT A , (3) pF R = 1 − pT R . (4) Assuming these acceptance and rejection probabilities are known, we can then derive the Markov state transition probabilities as follows: For any state scalar i ∈ {0, 1, . . . , n − 1}, the corresponding OneMax bit string has i ones and (n − i) zeros. Therefore the probability of uniformly randomly choosing a zero bit is n−i n . Hence, for RMHC to make an improvement to the genome, it must randomly choose one of these zero bits and that mutation must be accepted. Therefore the transition probability from state i to state i + 1 in one generation is: n−i pT A . (5) n Similarly, for RMHC to make the genome worse, it must choose a one bit (with probability ni ) and flip it to a zero, and that mutation must be accepted, with probability pF A . Hence we obtain P[St+1 = i + 1|St = i] = i pF A . (6) n For an RMHC mutation to make no progress in the genome, the mutation must be rejected. This could mean a one bit is chosen (with probability ni ) and rejected (with probability pT R ), or it could be that a zero bit is chosen (with probability n−i n ) and rejected (with probability pF R ). Hence we obtain P[St+1 = i − 1|St = i] = i n−i pT R + pF R . (7) n n The probabilities given by (5)-(7) appear on the three arrows emanating from the central node “i” in the Markov chain shown in Fig.1. The Markov chain’s absorption state is state n, since the OneMax problem is solved and terminates as soon as i = n is reached. P[St+1 = i|St = i] = B. Rejection and acceptance probabilities for noisy OneMax problem with RMHC The Markov Process described in the previous subsection relied upon knowledge of the acceptance and rejection probabilities pT R and pT A , which are dependent on the RMHC resampling method chosen. We discuss three RMHC resampling cases here, and calculate the corresponding acceptance/rejection probabilities. We consider three separate cases: 1) No resampling, no statistic of the best-so-far genome is stored: If no statistic of the best-so-far genome is stored, the best-so-far one needs to be re-evaluated once at each generation in the case without resampling. First we assume that the newly generated genome y is better than the current genome x, i.e. f (y) > f (x), where this fitness function is the noise-free version given by (1). Since f (x) is the true fitness of string x, we have f (x) = i, the number of ones in string x. Since the two genomes x and y are evaluated using the noisy fitness function (2), and since we are comparing x and y without resampling or storing the statistics of the best-so-far genome, the probability of true acceptance is pT A = P(f 0 (y) > f 0 (x)|f (y) = i + 1, f (x) = i) = P(ωy + 1 > ωx ) = P(ωy − ωx > −1). where ωy and ωx are independent samples from N (0, 1), thus ωy − ωx ∼ N (0, 2). Then, pT A = P(ωy − ωx > −1) = P(ωy − ωx ≤ 1) 1 1 1 = CDFGaussian(0,2) (1) = + erf ( ). 2 2 2 (8) Respectively, if the newly generated genome y is worse than the current genome x, i.e. f (y) < f (x), when comparing two genomes without resampling or storing the statistics of the best-so-far genome, the probability of true rejection is pT R = P(f 0 (y) < f 0 (x)|f (y) = i − 1, f (x) = i) = P(ωy − 1 < ωx ) = P(ωy − ωx < 1) = pT A . (9) Therefore, for this situation of RMHC with no resampling and no storage of the best-so-far fitness, we can for example find the probability of transferring from state i to state i + 1, as follows: n−i pT A (by (5)) n   n−i 1 1 1 = + erf ( ) (by (8)). n 2 2 2 P[St+1 = i + 1|St = i] = 2) When comparing two genomes using r resamplings without storing the statistics of the best-so-far genome: If each genome can be re-evaluated r > 1 times, i.e., r resamplings are used, but still no statistic of the best-so-far genome is stored, F itx and F ity are compared at each generation (lines 8 and 9 of Algorithm 2). Therefore, the variance of F itx and F ity , given x and y, are 1r . Then, pT A = P(F ity > F itx |f (y) = i + 1, f (x) = i) = P(ωy0 + 1 > ωx0 ) = P(ωy0 − ωx0 > −1). where ωy0 and ωx0 are independent samples from N (0, 1r ), thus ωy − ωx ∼ N (0, 2r ). Then, pT A = = P(ωy0 − ωx0 > −1) = P(ωy0 − ωx0 ≤ 1) √ 1 1 r CDFGaussian(0, r2 ) (1) = + erf ( ). (10) 2 2 2 Similarly, pT R = pT A holds in this case. The probability of transferring from √state i to state i + 1 r 1 1 in one generation is n−i n ( 2 + 2 erf ( 2 )), larger than the probability in the previous case without resampling (Section IV-B1). Therefore, the probability of true acceptance is improved by resampling genomes. i n pT R pF R + n−i+1 pT A n ... 0 n−i n pF R n−i n pT A i-1 i+1 i i n pF A ... n i+1 n pF A Fig. 1: Markov states and transitions in a noisy OneMax problem. Markov state “i” refers to a OneMax bit-string with i ones and n − i zeros in the string. 3) When comparing two genomes using r > 1 resamplings and the statistics of the best-so-far genome: Additionally, if one has access to averageF itness, the average fitness value of the best-so-far genome, and M , the number of times that the best-so-far genome has been evaluated, by line 11 of Algorithm 2 bestF itSoF ar × M + F itx × r , M +r (11) with r > 1. Therefore, the variance of averageF itnessx , given x, is M1+r . The variance of F ity , given y, is 1r . The probability of true acceptance is averageF itnessx ← pT A = P(F ity > averageF itnessx |f (y) = i + 1, f (x) = i) = P(ωy0 + 1 > ωx00 ) = P(ωy0 − ωx00 > −1). where ωy0 and ωx00 are independent samples from N (0, 1r ) and M +2r N (0, M1+r ), respectively. Thus, ωy0 − ωx00 ∼ N (0, r(M +r) ). Then, pT A = P(ωy0 − ωx00 > −1) = P(ωy0 − ωx00 ≤ 1) = CDFGaussian(0, M +2r ) (1) r(M +r) s 1 1 r(M + r) + erf ( ) 2 2 2(M + 2r) = we consider the second case discussed previously in Section IV-B2. The Markov chain length can be found by defining the notation T(l→m) to mean the expectation of the number of generations required to get from a Markov state with value i = l to a Markov state with value i = m. By considering the three arrows that emanate from the central i node in Fig.1, we can form an algebraic expression for T(i→i+1) , as follows: n−i pT A n   i n−i + pT R + pF R 1 + T(i→i+1) n n  i (13) + pF A 1 + T(i−1→i+1) . n The three terms in (13) correspond to the three arrows from node i in Fig.1, pointing to nodes i+1, i and i−1, respectively. Since it is always necessary to go from state i − 1 to i + 1 via their middle state i, we can form the relationship T(i→i+1) = T(i−1→i+1) ≡ T(i−1→i) + T(i→i+1) . (12) Similarly, pT R = pT A holds in this case. The probability of transferring q from state i to state i + 1 in r(M +r) n−i 1 1 one generation is n ( 2 + 2 erf ( 2(M +2r) )) with M ≥ r > 1, larger than the probabilities in the previous cases (Sections IV-B1 and IV-B2). Therefore, the probability of true acceptance is improved by resampling genomes and storing the statistics of the best-so-far genome. However, the trade-off between the total evaluations and the accuracy needs to be considered. C. Markov chain analysis Now that we have described the Markov chain in Section IV-A, and derived the acceptance and rejection probabilities for the noisy OneMax problem in Section IV-B, we next derive an analytical expectation for the full trajectory length for solving the noisy OneMax problem, using RMHC with resamplings, starting from a bit string full of zeros. To simplify analysis, no stored statistic is considered (M = 0), thus Furthermore, reusing (3) and (4), i.e. pF A = (1−pT A ), pF R = (1 − pT R ), together with pT R = pT A from Section IV-B, we get: n−i T(i→i+1) = pT A n    n−i i pT A + (1 − pT A ) 1 + T(i→i+1) + n n  i + (1 − pT A ) 1 + T(i−1→i) + T(i→i+1) . (14) n Solving 14 for T(i→i+1) , which appears three times in that equation, we get: T(i→i+1) = n i(1 − pT A ) T(i−1→i) + . (n − i)pT A (n − i)pT A (15) This is a recursive equation that defines the ith term in terms of the (i − 1)th term. To terminate this recursion, an explicit expression for T(0→1) can be found by considering the number of generations required to get from i = 0 (i.e. a string with all zeros in it) to i = 1 (i.e. a string with exactly one 1 in it). This is given by 1 T(0→1) = . (16) pT A (15) and (16) form a recursion that easily can be unrolled computationally, and it gives us the exact theoretical number of transitions to traverse from one Markov state i to the adjacent Markov state i + 1. Therefore to calculate the total number of generations required to solve the noisy OneMax problem from an initial Markov state i = 0, we need to calculate T(0→n) . This can be expanded by adding all of the intermediate state transitions to get T(0→n) = T(0→1) + · · · + T(n−1→n) (17) (17) completes the theoretical analysis of the number of steps required by RMHC to solve the noisy OneMax problem, from an initial bit string of zeros. Note that each term of this sum needs a solution to the recursive equations given by (15) and (16), but with careful caching, the whole sum can be evaluated in O(n) steps. It’s notable that even though the above Markov chain analysis was aimed at Case 2 (Section IV-B2, i.e. with resampling and no statistic stored), it also holds when there is no resampling, i.e., r = 1 (the first case detailed in Section IV-B1). In both cases, pT A is deterministic given the resampling number r. However, Case 3 (Section IV-B3) is not as straightforward to analyse, because in that case that the average fitness value (averageF itnessx ) depends on the evaluation number (M ), q r(M +r) 1 1 and M is stochastic. Hence, pT A = 2 + 2 erf ( 2(M +2r) ) (12) changes at each generation of RMHC. Case 3 has not been analysed in this paper, but it would be interesting to do so in the future. Fig. 2: Exact expectation of the number of fitness evaluations required by RMHC to solve the noisy OneMax problem, using different resampling numbers. The initial OneMax strings were all zeros, and the RMHC algorithm did not store the fitness of the best-so-far genome (case 2 described in Section IV-B2). These curves were computed using (15)-(18), and pT A defined by (10). The grey circle on each curve indicates the optimal resampling number, which increases with the problem dimension. D. Analytical results of RMHC in noisy OneMax problem At each generation of the actual RMHC algorithm, 2r fitness-function evaluations are required, so that the total number of fitness evaluations required to solve the noisy OneMax problem is 2rT(0→n) . (18) This result is shown graphically in Fig.2, with various number of resamplings (r) and problem dimension (n), under the assumption that no statistic is stored for the fitness of the best-so-far genome (case 2 described in Section IV-B2). As can be seen from the location of the minima in Fig.2, indicated by the small grey circles, the optimal resampling number increases with the problem dimension. The exact optimal number of resamplings to make in different dimensions is displayed in Fig.3. V. E XPERIMENTAL RESULTS To supplement the theoretical results of the previous and to prove the benefit of storing statistics of the best-so-far genome at each generation, we apply first RMHC on the OneMax problem in a noise-free case (Fig.4), then evaluate the performance of RMHC on the OneMax problem with the presence of constant variance Gaussian noise (Fig.5). Each experiment was repeated 100 times, initialised by an all zeros string. The following may be observed from the figures: Fig. 3: Exact theoretical optimal resampling number required by RMHC, to solve the noisy OneMax problem, without storing a statistic of the fitness of the best-so-far genome (case 2 described in Section IV-B2). • • • due to the noise, far more fitness evaluations are required to find the optimum in the noisy case than in the noisefree context; the higher dimension problem required more fitness evaluations to reach the optimum; in dimensions ≤ 10, no resampling leads to a reduction in the number of required fitness evaluations; Fig. 4: Empirical number of evaluations consumed by RMHC in the noise-free OneMax problem. No resampling is required in the noise-free case. Each experiment is repeated 100 times initialised by an all zeros string. The standard error is too tiny to be seen. (a) Empirical number of evaluations consumed by RMHC in the noisy OneMax problem, across different resampling numbers, without storing a statistic of the best-so-far genome. This empirically-obtained data is equivalent to the theoretical results shown in Fig.2. TABLE I: The expectation of fitness evaluation number required to reach the optimum ((15) and (16)) in the noisy OneMax problem on dimension 10 and the empirical average fitness evaluations consumed in 10, 000 trials. r 1 2 3 4 5 10 • • Expected #evaluations 205.8283 238.5264 276.3340 317.9576 362.4065 612.2250 Empirical #evaluations 205.1998 239.7504 274.9920 317.8848 363.2520 611.0060 in higher dimensions (n > 10), the optimal amount of resampling required increases with the problem dimension; in higher dimensions (n  10), the evaluation number is significantly reduced by using the stored statistic. Additionally, Fig.5 clearly shows the benefit of storing the average fitness value and the current evaluation number of the best-so-far genome at the end of each generation (case 3 described in Section IV-B3). A. Validation of Theoretical results To validate the theoretical results and equations of Section IV, Table I demonstrates a very close match between the theoretically obtained number of evaluations (derived from (15)-(18)) and the equivalent empirically calculated numbers (i.e. those found by actually running the RMHC algorithm repeatedly and averaging). This table hopefully validates the accuracy of our theoretical derivations and our numerical implementation. A further confirmation is shown by the equivalence of the curves shown in Fig.5a to those shown in Fig.2. (b) Empirical number of evaluations consumed by RMHC in the noisy OneMax problem, across different resampling numbers, using the stored statistic method. Fewer fitness evaluations are consumed compared to the case without stored statistic (shown in the above figure). Here the n = 1000 curve is truncated on the left, showing missing data points, because in those cases an optimum was not reached within 107 fitness evaluations, when using low resampling numbers (r = 1, 2, 3, 4, 5). Fig. 5: Performance of RMHC in the noisy OneMax problem with different numbers of resamplings. The maximal budget is 107 fitness evaluations. Note that the y-axis is the logarithm of the evaluation number. Each experiment was repeated 100 times, initialised by an all-zeros string. The standard error is too tiny to be seen. In the noisy case, the optimal resampling number increases with the problem dimension. VI. C ONCLUSION This paper presents a noisy OneMax problem with additive constant variance Gaussian noise and analyses the optimal resampling number required by the Random Mutation Hill Climber (RMHC) to handle the noise. The number of fitness evaluations required by RMHC to find the optimal solution in the noisy OneMax problem varies with the resampling number. In a very low-dimensional noisy OneMax problem (dimension 10, hence the string only has 1024 possible values), the optimal value may be found by a random walk, and resampling can be counterproductive in these cases (it leads to the remarkable growth of the number of evaluations required to find the optimum as shown in Fig.5). However, in higher dimensions, resampling to reduce the noise is of critical importance, and makes the difference between success and failure. The optimal level of resampling increases with the dimension in the search space (as shown empirically in Fig.2, and analytically in Fig.3). This is an interesting result, which for this particular benchmark problem, is in conflict with the observation by Qian et al. in [11] that resampling was not beneficial. RMHC is simple but efficient. The success of (µ-λ)-GA, of which (1+1)-EA can be seen as a variant, depends on one or more parameters, such as the size of the population, λ, the number of parents, µ, and the crossover and mutation operators. RMHC does not have such details to adjust and is therefore simpler to apply. Due to its efficiency and simplicity RMHC should be considered as a useful tool for expensive optimisation tasks. R EFERENCES [1] H. Muhlenbein, “How genetic algorithms really work: I. mutation and hill climbing. parallel problem solving from nature 2. b. manderick,” 1992. [2] S. Droste, T. Jansen, and I. Wegener, “On the analysis of the (1+1) evolutionary algorithm,” Theoretical Computer Science, vol. 276, no. 1, pp. 51–81, 2002. [3] D. V. Arnold and H.-G. Beyer, “A general noise model and its effects on evolution strategy performance,” Evolutionary Computation, IEEE Transactions on, vol. 10, no. 4, pp. 380–391, 2006. [4] H.-G. Beyer, The Theory of Evolution Strategies. Springer Science & Business Media, 2013. [5] S. Astete-Morales, M.-L. Cauwet, J. Liu, and O. Teytaud, “Simple and cumulative regret for continuous noisy optimization,” Theoretical Computer Science, vol. 617, pp. 12–27, 2016. [6] S. Astete-Morales, J. Liu, and O. Teytaud, “Log-log convergence for noisy optimization,” in International Conference on Artificial Evolution (Evolution Artificielle). Springer, 2013, pp. 16–28. [7] J. Liu, “Portfolio methods in uncertain contexts,” Ph.D. dissertation, INRIA, 12 2015. [8] Y. Akimoto, S. Astete-Morales, and O. Teytaud, “Analysis of runtime of optimization algorithms for noisy functions over discrete codomains,” Theoretical Computer Science, vol. 605, pp. 42–50, 2015. [9] J. D. Schaffer and L. J. Eshelman, “On crossover as an evolutionarily viable strategy,” in ICGA, vol. 91, 1991, pp. 61–68. [10] S. Droste, “Analysis of the (1+1) EA for a noisy OneMax,” in Genetic and Evolutionary Computation–GECCO 2004. Springer, 2004, pp. 1088–1099. [11] C. Qian, Y. Yu, Y. Jin, and Z.-H. Zhou, “On the Effectiveness of Sampling for Evolutionary Optimization in Noisy Environments,” in Parallel Problem Solving from Nature–PPSN XIII. Springer, 2014, pp. 302–311. [12] J. Liu, D. Peŕez-Liebana, and S. M. Lucas, “Bandit-based random mutation hill-climbing,” arXiv preprint arXiv:1606.06041, 2016. [Online]. Available: http://arxiv.org/abs/1606.06041 [13] ——, “Bandit-based random mutation hill-climbing,” 2017 IEEE Congress on Evolutionary Computation (IEEE CEC), 2017. [14] S. M. Lucas and T. J. Reynolds, “Learning DFA: Evolution versus Evidence Driven State Merging,” in Evolutionary Computation, 2003. CEC’03. The 2003 Congress on, vol. 1. IEEE, 2003, pp. 351–358. [15] ——, “Learning deterministic finite automata with a smart state labeling evolutionary algorithm,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 27, no. 7, pp. 1063–1074, 2005. [16] P. A. Borisovsky and A. V. Eremeev, “Comparing evolutionary algorithms to the (1+1)-EA,” Theoretical Computer Science, vol. 403, no. 1, pp. 33–41, 2008. [17] H.-G. Beyer, “Toward a theory of evolution strategies: On the benefits of sex—the (µ/µ, λ) theory,” Evol. Comput., vol. 3, no. 1, pp. 81–111, Mar. 1995. [Online]. Available: http://dx.doi.org/10.1162/evco.1995.3.1.81 [18] M. Mitchell and J. H. Holland, When will a Genetic Algorithm Outperform Hill-Climbing? Morgan Kaufmann, 1993. [19] O. Cicchello and S. C. Kremer, “Beyond EDSM,” in International Colloquium on Grammatical Inference. Springer, 2002, pp. 37–48. [20] B. Doerr and C. Winzen, “Memory-restricted black-box complexity of OneMax,” Information Processing Letters, vol. 112, no. 1, pp. 32–34, 2012. [21] C. Doerr and J. Lengler, “OneMax in black-box models with several restrictions,” Algorithmica, pp. 1–31, 2016. [Online]. Available: http://dx.doi.org/10.1007/s00453-016-0168-1 [22] B. L. Miller and D. E. Goldberg, “Genetic algorithms, selection schemes, and the varying effects of noise,” Evolutionary Computation, vol. 4, no. 2, pp. 113–131, 1996. [23] M. Mitchell, An introduction to genetic algorithms. MIT press, 1998. [24] K. Sastry, D. E. Goldberg, and X. Llora, “Towards billion-bit optimization via a parallel estimation of distribution algorithm,” in Proceedings of the 9th annual conference on Genetic and evolutionary computation. ACM, 2007, pp. 577–584.
2cs.AI
A SHARP THRESHOLD FOR COLLAPSE OF THE RANDOM TRIANGULAR GROUP arXiv:1403.3516v2 [math.GR] 18 Nov 2016 SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK Abstract. The random triangular group Γ(n, p) is the group given by a random group presentation with n generators in which every relator of length three is present independently with probability p. We show that in the evolution of Γ(n, p) the property of collapsing to the trivial group admits a very sharp threshold. 1. Introduction Let P = hS | Ri denote a group presentation, where S is the set of generators and R is the set of relators. A group generated by a presentation P is called a triangular group if R consists of cyclically reduced words of length three over the alphabet S ∪ S −1 , that is if R consists of words of the form abc such that a 6= b−1 , b 6= c−1 and c 6= a−1 . Here we consider the random triangular group Γ(n, p) defined as a group given by a random triangular group presentation with n generators and such that each cyclically reduced word of length three over the alphabet S∪S −1 is present in R independently with probability p = p(n). We study the asymptotic properties of the random triangular group when the number of generators n goes to infinity. Thus, for a group property P and a function p(n), we say that Γ(n, p(n)) has P asymptotically almost surely (a.a.s.), if the probability that Γ(n, p(n)) has this property tends to 1 as n → ∞. The notion of the random triangular group was introduced by Żuk [11]. In particular, he showed that for every constant ǫ > 0, if p ≤ n−3/2−ǫ , then a.a.s. Γ(n, p) is an infinite, hyperbolic group, while for p ≥ n−3/2+ǫ , a.a.s. Γ(n, p) collapses to the trivial group (his result is stated for a somewhat different, yet equivalent, model of random triangular group). Antoniuk, Luczak and Świa̧tkowski [2] improved this result from one side and showed that there exists a constant C > 0 Date: March 13, 2014. 2010 Mathematics Subject Classification. Primary: 20P05; secondary: 05C80, 20F05. Key words and phrases. random group, collapse, sharp threshold, torsion-free. Sylwia Antoniuk is partially supported by NCN grant 2013/09/N/ST1/04251, Ehud Friedgut is supported in part by I.S.F. grant 0398246, and BSF grant 2010247, and Tomasz Luczak is partially supported by NCN grant 2012/06/A/ST1/00261. 1 2 SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK such that for p ≥ Cn−3/2 a.a.s. Γ(n, p) collapses to the trivial group. They also asked if there exists a constant c > 0 such that for p < cn−3/2 a.a.s. Γ(n, p) is infinite. Note that the property that a group is trivial is monotone, i.e. if hS | Ri is trivial then for any R′ ⊇ R the group hS | R′ i is trivial as well. Hence, by a well known argument of Bollobás and Thomason [3], there exists a ‘coarse’ threshold function for collapsibility i.e. there exists a function θ(n) such that if p(n)/θ(n) → 0, then a.a.s. Γ(n, p) is non-trivial, whereas for p(n)/θ(n) → ∞ a.a.s. Γ(n, p) collapses to the trivial group. However, the result of Antoniuk, Luczak and Świa̧tkowski [2] and their conjecture we have just mentioned suggest that Γ(n, p) collapses more rapidly, i.e. that the collapsibility has a ‘sharp’ threshold. Our main result states that this is indeed the case. Theorem 1. Let h(n, p) denote the probability that Γ(n, p) is trivial. There exists a function c̃(n) such that for any ǫ > 0, lim h(n, (1 − ǫ)c̃(n)n−3/2 ) = 0 and lim h(n, (1 + ǫ)c̃(n)n−3/2 ) = 1. n→∞ n→∞ Unfortunately, the argument we use does not give any information on the asymptotic behaviour of c̃(n). Nonetheless we strengthen the conjecture from [2] and predict that c̃(n) tends to a limit. Conjecture. There exists a constant c > 0 such that for every constant ǫ > 0 the following holds. (i) If p ≤ (c − ǫ)n−3/2 , then a.a.s. Γ(n, p) is infinite and hyperbolic. (ii) If p ≥ (c + ǫ)n−3/2 , then a.a.s. Γ(n, p) is trivial. As we have already remarked it was shown in [2] that lim sup c̃(n) < ∞ . Although we cannot verify the conjecture and prove that lim inf c̃(n) > 0, we show however that c̃(n) cannot tend to 0 too quickly. Theorem 2. Let ω and p be functions of n such that ω(n) → ∞ as n → ∞, and 1/3 p(n) = n−3/2−ω/ log n . Then a.a.s. Γ(n, p) is infinite, torsion-free, and hyperbolic. The structure of the paper is the following. In the next section we prove Theorem 1. The argument is based on a result of the second author [6] which, up to our knowledge, has never been used to show that properties of random groups have sharp thresholds. It states, roughly, that if a property does not admit a sharp threshold then it is ‘local’, i.e. its probability can be significantly changed by a local modification of the random structure (see Lemma 3 below). We show that it is not the case with the collapsibility. In particular, we show that adding COLLAPSE OF RANDOM TRIANGULAR GROUP 3 to R a few more specially selected relators affects the probability of collapsing less than a tiny increase of the probability p, which in turn corresponds to adding to R a small number of random relators. Hence, a local modification of the random structure cannot have large impact on the probability of the property in question. Then we prove Theorem 2. We follow closely the argument of Ollivier who in [8] showed that the assertion holds for some function p(n) = n−3/2+o(1) . This result was initially stated by Gromov [5] however it seems that Ollivier was the first one who gave a complete proof of this statement. We basically rewrite Ollivier’s argument (who, following Żuk, used a slightly different model of the random triangular group) to replace o(1) in the power by some explicit function. 2. Proof of Theorem 1 As mentioned in the introduction, the tool we use in order to prove the sharpness of the threshold, as expressed in Theorem 1, is a result from Friedgut [6]. In [6] the author gives a general necessary condition for a property to have a coarse threshold, namely that it can be well approximated by a local property. Although the main theorem in that paper refers to graphs, the proof extends to hypergraph-like settings where the number of isomorphism types of bounded size is bounded. This includes random hypergraphs, random SAT Boolean formulae, and also the model of random groups that we are addressing in the current paper. A different, but very similar tool that can be used here is Bourgain’s theorem that appears in the appendix of [6], which has a weaker conclusion, but does not assume the symmetry of the property in question, such as we have in our current problem. To make things simpler we will use the ”working-mathematicians-version” of these theorems, as described in Friedgut [7]. We present below the lemma we will use, stated in terms of the problem at hand, but first let us introduce some notation. For each value of n we denote by S the set Sn of generators, and assume that Sn ⊂ Sn+1 , so that any fixed relator is meaningful for all sufficiently large values of n. Next, let Γ(n, p) be given by a presentation P = hS | Ri, where R is random, and let R∗ be a set of relators. We use the notation h(n, p|R∗ ) := Pr[hS | R ∪ R∗ i is trivial]. We will use this notation both for R∗ = Rfixed = {r1 , . . . , rk }, a fixed set of cyclically reduced relators of length three, and for R∗ = Rǫp , a random set of relators chosen from Sn with probability ǫp (in which case the probability is over both the choice of R and of R∗ ). The following is an adaptation of theorems 2.2, 2.3, and 2.4 from [7] to the current setting. Lemma 3. Assume that there exists a function p = p(n), and constants 0 < α, ǫ < 1, such that there exist infinitely many values of n for which 4 SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK it holds that α < h(n, p) < h(n, (1 + ǫ)p) < 1 − α. Then there exists a fixed (finite, independent of n but possibly dependent on α and ǫ) set Rfixed = {r1 , . . . , rk } of cyclically reduced relators of length three, and a constant δ > 0 such that for all such n (i) h(n, p|Rfixed ) > h(n, p) + 2δ (ii) h(n, p|Rǫp ) < h(n, p) + δ We will now see how this lemma, together with the fact that Γ(n, p) collapses when p = n−3/2+o(1) (see either Olliver [8], or Antoniuk, Luczak and Świa̧tkowski [2] and Theorem 2) implies Theorem 1. Proof of Theorem 1. Assume, by way of contradiction, that Theorem 1 does not hold. Then the assumptions of Lemma 3 are met. Indeed, let pc = pc (n) be defined so that h(n, pc ) = 1/2. Then specifically Theorem 1 does not hold with the choice of c̃(n)n−3/2 = pc . Hence there exists an ǫ0 > 0 and a positive constant α < 1/2 such that for infinitely many values of n either one has h(n, (1 + ǫ0 )pc ) < 1 − α, or h(n, (1 − ǫ0 )pc ) > α. In the first case p = pc , α, ǫ = ǫ0 meet the assumptions of Lemma 3, in the latter one can take p = (1 − ǫ0 )pc , α, and ǫ = ǫ0 /(1 − ǫ0 ). Now, let Rfixed be the set of relators guaranteed by Lemma 3, and let Z := {z1 , z2 , . . . , zℓ } be the set of all generators involved in Rfixed and all of their inverses. Let Rstrong be the following relation: z1 = z2 = . . . = zℓ = e, where e is the identity. Clearly h(n, p|Rstrong ) ≥ h(n, p|Rfixed ). Next, consider the graph G = (V, E), where V = (S ∪ S −1 ) \ Z, and E consists of all pairs xy such that there is a relator in R which involves x, y and an element of Z (implying x = y −1 , since all elements in Z are set by Rstrong to be equal to the identity). The probability that a given pair xy forms an edge is less than 6ℓp, and these events are independent, so G can be coupled with the Erdős-Rényi random graph G(2n−ℓ, q) with q = O(n−3/2+o(1) ). Elementary first moment estimates imply that a.a.s. G has fewer than n0.6 non-trivial components each of them consisting of at most two edges. Indeed, the expected number of connected subgraphs with exactly 3 edges is bounded by (2n)3 q 3 + 16(2n)4 q 3 = O(n−0.5), hence by Markov’s inequality a.a.s. there are no such subgraphs and isolated edges and paths of length two are the only non-trivial components. Moreover, the expected number of edges in G can be bounded by (2n)2 q = O(n0.5 ), and again by Markov’s inequality a.a.s. there are at most n0.6 of them. Let R′ be the set of relators in R that are disjoint from Z. Slightly COLLAPSE OF RANDOM TRIANGULAR GROUP 5 abusing the notation we will also use E to denote the set of relators {xy : {x, y} ∈ E}. We have (1) h(n, p|Rstrong ) = Pr[hS \ Z | R′ ∪ Ei is trivial] + o(n−0.4 ), where the o(n−0.4 ) accounts for the case where there exists in R a relator involving two elements of Z. Note that both E and R′ are random. Now let us consider the effect of Rǫp . First let us choose arbitrarily a set M, |M| = m = ⌊n1.9 ⌋, of pairs of generators {a, b}, a, b ∈ S ∪ S −1 . Define a graph G′ = (V ′ , E ′ ) with V ′ = (S ∪ S −1 ) \ Z and E ′ consisting of all pairs xy such that Rǫp includes two relators of the form abx and aby −1 , where {a, b} ∈ M. Note that the existence of such two relators clearly implies that x = y −1 . Let X denote the number of paths of length two in G′ = (V ′ , E ′ ). It is easy to see that for the expectation of X we have EX ≥ 0.5(2n)3 m2 (ǫp)4 = 4n3 n3.8 n4(−3/2+o(1)) = 4n0.8−o(1) ≥ 4n0.75 . It is also easy to check that the standard deviation of X is also of order O(n3 m2 p4 ), so from Chebyshev’s inequality we infer that a.a.s. the number of such paths is larger than 3n0.75 . On the other hand, let Y be the number of pairs of paths which share at least one vertex. The expectation of Y is dominated by the number of pairs which share one edge and is bounded from above by EY ≤ (2n)4 m3 (ǫp)6 = 16n4 n5.7 n6(−3/2+o(1)) = 16n0.7+o(1) . Thus, from Markov’s inequality, a.a.s. the number of such pairs is of order smaller than n0.75 . Consequently, a.a.s. G′ = (V ′ , E ′ ) contains at least n0.75 ≫ n0.6 disjoint paths of length two. Now (2) h(n, p|Rǫp ) = Pr[hS \ Z | R′ ∪ E ′ i is trivial] − o(n−0.4 ) , where the term o(n−0.4 ) accounts for the fact that even if the group generated by S \ Z collapses there are the generators in Z to account for. However, if all generators in S \ Z are set to be equal to the identity it suffices that for each element z ∈ Z there will be in R a relator involving z and two elements of S \ Z. The probability of this event is at least as large as 1 − o(n−0.4 ) as n tends to infinity. We have shown that G′ contains at least n0.1 edge-disjoint subgraphs isomorphic to the graph spanned by the edges of G, i.e. there is a coupling which shows that E ′ ⊇ E. Thus, the equations (1) and (2) contradict the items 1 and 2 in the conclusion of Lemma 3. Consequently, the hypothesis of the lemma cannot hold, and the property in question must have a sharp threshold.  3. Proof of Theorem 2 In order to show Theorem 2 we need to introduce a number of somewhat technical definitions. Let P = hS | Ri be a group presentation. 6 SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK A van Kampen diagram with respect to the presentation P is a finite planar 2-cell complex D given with an embedding D ⊆ R2 and satisfying the following conditions. • D is connected and simply connected, • For each edge e and one of its orientations we assign a generator s ∈ S. If we change the orientation of e to the opposite one, we replace the generator s by s−1 . • Each 2-cell c is assigned a relator r ∈ R, the number of edges on the boundary of c is equal to the length of the relator r, • For each 2-cell c there is a vertex v such that the word read from v in some direction of the boundary of the cell is the relator r ∈ R assigned to c. For a van Kampen diagram D the size of the diagram, denoted by |D|, is the number of faces (2-cells) of D. The boundary of D, denoted by ∂D, is the boundary of the complement of D in R2 and |∂D| denotes its size, that is the number of edges in ∂D. The boundary word is any word read from some vertex in ∂D in one of the directions around the boundary. In particular, the length of this word is precisely |∂D|. A van Kampen diagram is said to be reduced if there is no pair of cells c and c′ sharing at least one edge e, which are assigned the same relator r, and are such that if we read the word r on the boundaries of c and c′ the edge e has the same orientation and corresponds to the same letter in the relator with respect to the starting point. A van Kampen diagram is said to be minimal if it is reduced and no other reduced van Kampen diagram with smaller number of faces has the same boundary word. Let Γ be the group given by a presentation P = hS | Ri. In order to verify whether Γ is hyperbolic it is enough to consider minimal reduced van Kampen diagrams with respect to the presentation P and to show that they fulfill a certain geometric condition. In particular, it is known that a group generated by a presentation P = hS | Ri is hyperbolic if and only if there exists a coefficient δ > 0 such that every minimal reduced van Kampen diagram D with respect to the presentation P satisfies the linear isoperimetric inequality |D| ≤ δ|∂D| (cf. [1]). However, verifying that every reduced van Kampen diagram satisfies a certain isoperimetric inequality may turn out fairly hard since it requires showing that this inequality holds for all of them. At this point, the so called local to global principle for hyperbolic geometry (or Cartan-Hadamard-Gromov-Papasoglu theorem) (cf.[9]) comes to an aid. This principle states that it is enough to verify the isoperimetric inequality for a finite family of van Kampen diagrams. Theorem 4 (Cartan-Hadamard-Gromov-Papasoglu). Let P = hS | Ri be a triangular group presentation. Assume that for some integer K > 0 every minimal reduced van Kampen diagram D w.r.t. P and of size COLLAPSE OF RANDOM TRIANGULAR GROUP 7 K 2 /2 ≤ |D| ≤ 240K 2 satisfies the inequality K |∂D|. 200 Then for every minimal reduced van Kampen diagram w.r.t. P the following isoperimetric inequality is true |D| ≤ |D| ≤ K 2 |∂D|. Following Ollivier [8], in order to simplify the verification of the isoperimetric condition for van Kampen diagrams, we introduce a klabeled decorated abstract van Kampen diagram (davKd). For simplicity, we do it only for groups with triangular presentations. A k-labeled b given with an embedding davKd is a finite planar 2-cell complex D b ⊆ R2 and satisfying the following conditions: D b is connected and simply connected, • D • each 2-cell c is a triangle with a label i from {1, . . . , k}, with a marked vertex on its boundary and an orientation at this vertex, • for all i ∈ {1, . . . , k} and for any 2-cell c labeled by i, starting from the marked vertex and going around according to prescribed orientation at this vertex, the edges of c get abstract labels i1 , i2 , i3 . Now, let P = hS | Ri be a triangular presentation and consider a b one-to-one map φ : {1, . . . , k} → R which assigns relators to faces of D. Let φ1 (i), φ2 (i), φ3 (i) be the generators appearing on the first, second and third position of the relator φ(i) respectively. Then φ induces a map φe : {ir }1≤i≤k,1≤r≤3 → S which assigns to each abstract label e r ) = φr (i). The map φ is called ir a generator from S, namely φ(i a fulfillment map, if additionally whenever there is an edge with two e r ) = φ(j e s ). We say that a given davKd abstract labels ir , js , then φ(i b is fulfillable with respect to the presentation P = hS | Ri if there D b exists a fulfillment map φ : {1, . . . , k} → R for D. A davKd is said to be reduced if there is no pair of faces sharing at least one edge, which are assigned the same label i and have opposite orientations, and such that the common edge gets the same abstract label ir from both faces. A davKd is said to be minimal if there is no other davKd with smaller number of faces and having the same boundary word (with respect to the abstract labels of edges). Our aim is to show that for a function f = f (n) = ω/ log1/3 n, where ω = ω(n) → ∞ and p = n−3/2−f , a.a.s. all minimal reduced van Kampen diagrams D with respect to the random presentation in Γ(n, p) satisfy the isoperimetric inequality with a coefficient δ = δ(n) = (200/f )2 . But to do it, it is enough to verify this inequality for all minimal reduced k-labeled davKd’s, so we show that the following statement holds. 8 SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK Lemma 5. Let ω = ω(n) → ∞, ω < log log n, f = f (n) = ω/ log1/3 n, and p = p(n) = n−3/2−f . Then a.a.s. for each minimal reduced kb fulfillable w.r.t. Γ(n, p), we have labeled davKd D,  b ≤ 200/f 2 |∂ D|. b |D| In particular, a.a.s. each minimal reduced van Kampen diagram D w.r.t. Γ(n, p) satisfies the linear isoperimetric inequality 2 |D| ≤ 200/f |∂D|. Proof. Let f = f (n) = ω/ log1/3 n. From Theorem 4 it is enough to b of size at most |D| b ≤ 240(200/f )2 show that a.a.s. each given davKd D satisfies the linear isoperimetric inequality with the coefficient 1/f . We b with size do it in two steps. First, we show that for any davKd D 2 b bounded by |D| ≤ 240(200/f ) one of the following two possibilities holds: b satisfies the isoperimetric inequality with the coefficient 1/f ; (i) D b is fulfillable by Γ(n, p) is bounded from (ii) the probability that D −f /2 above by n . Using this dichotomy, we then show that the probability that there is b not satisfying the isoperimetric ina bounded size fulfillable davKd D equality in question goes to 0 with n → ∞. Hence, a.a.s. all sufficiently small fulfillable davKd’s satisfy this inequality. b be a davKd with m = |D| b faces having k distinct labels and Let D b boundary edges. If each face with l1 internal edges and l2 = |∂ D| b corresponds to a difis assigned a different label, i.e. each cell of D b is fulfillable is bounded above ferent relator, the probability that D l1 +l2 m by n p . This is in fact a rather easy case and showing that for all diagrams with different labels and fulfillable in Γ(n, p) a.a.s. an isoperimetric inequality holds with a coefficient 1/f is rather straightb the isoperimetric inequalforward. Indeed, assume that for a given D b > |∂ D| b = l2 . Notice also that ity does not hold, that is f m = f |D| 3m = 2l1 + l2 ≥ 2l1 + 1 as there is at least one edge in the boundb Then the probability that D b is fulfillable is bounded by ary of D. l1 +l2 m l1 +l2 (−3/2−f )m −1/2 n p =n n ≤n . Moreover, as we will show later, b b ≤ 240(200/f )2 is of order the number of different davKd’s D with |D| much smaller than n1/2 , hence a.a.s. there are no such diagrams which are fulfillable and at the same time do not satisfy the isoperimetric inequality. The main challenge is to deal with diagrams where some of the labels may appear more than once. On one hand, this reduces the number of distinct relators used to fulfill the diagram. On the other hand, this also imposes some restrictions on the generators used in this assignment. To control the influence of these two factors we follow an approach of COLLAPSE OF RANDOM TRIANGULAR GROUP 9 Ollivier from [8]. To this end let mi denote the number of faces labeled with i. Without loss of generality we may assume that m1 ≥ m2 ≥ b is fulfillable with . . . ≥ mk . We want to count the probability that D respect to the random presentation given by Γ(n, p). We introduce an b which captures all the constraints resulting auxiliary graph G = G(D) from the structure of the davKd. The vertices of the graph G are the abstract labels {ir }1≤i≤k,1≤r≤3 and two vertices ir , js are adjacent if b carrying labels ir and js . We also define a family there is an edge in D of induced subgraphs G1 ⊂ G2 ⊂ . . . ⊂ Gk of G, where Gl is a subgraph of G induced by vertices {ir }1≤i≤l,1≤r≤3. Let us remark that the main reason why this approach to davKd is so convenient is the fact that G contains no loops if and only if davKd is reduced. Now, the number of connected components in the graph G is the total number of distinct generators which can appear in relators used b In some sense, this gives us the number in the fulfillment map φ for D. of degrees of freedom we have while choosing relators for the fulfillment map. Indeed, if two vertices are adjacent in G, then the corresponding b are mapped by φe to the same generator. Therefore, abstract labels in D if we denote the number of connected components in the graph G by C, then we obtain the estimate b is fulfillable) ≤ nC pk . Pr(D A similar argument works for the graphs Gl , which correspond to a partial assignment, namely we assign relators to faces bearing labels 1, . . . , l. Let Cl denote the number of connected components in Gl . Then b is fulfillable) ≤ nCl pl = nCl −l(3/2+f ) , Pr(D therefore putting dl = Cl − l(3/2 + f ) we get the estimate b is fulfillable) ≤ nmin dl . Pr(D Thus, if for some l we have dl < −f /2, then b is fulfillable) ≤ n−f /2 . Pr(D On the other hand, we claim that in the case of min dl ≥ −f /2, the b satisfies the isoperimetric inequality with the coefficient diagram D 1/f . Indeed, as was observed by Ollivier [8] (see p.613) one gets that b ≥ 3|D|(1 b − 2d) + 2 |∂ D| k X l=1 dl (ml − ml+1 ), 10 SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK where the parameter d is the density of the random triangular group, which in our notation is equal to 1/2 − f /3. Thus b ≥ 2f |D| b +2 |∂ D| k X dl (ml − ml+1 ). l=1 Next, observe that ml − ml+1 ≥ 0 for every l and if min dl ≥ −f /2, then b ≥ 2f |D| b −f |∂ D| k X l=1 P b Hence, ml = |D|. b (ml − ml+1 ) ≥ f |D|, and we arrive at the desired isoperimetric inequality b ≤ 1 |∂ D|. b (3) |D| f To complete our argument we use the local to global principle. In our case the coefficient K from Theorem 4 is equal to 200/f . We need to show that the probability that there exists a diagram of size at most 240(200/f )2 violating the isoperimetric inequality (3) tends to 0. If this is the case, then the random presentation in the Γ(n, p) model a.a.s. meets the assumptions of the local to global principle, hence a.a.s. each diagram satisfies the isoperimetric inequality with the coefficient (200/f )2. First, we need to count the number of all possible davKd’s with precisely m faces. To do this we take the number of all possible triangulations of a polygon which consist of exactly m triangles, and then for each triangle we choose the orientation in 2 ways, the starting point in 3 ways and the label of this face in m ways. A triangulation of a polygon with m triangles has at most m + 2 vertices. Thus, the number of such triangulations is bounded from above by the number of distinct triangulations t(N) of a 2-dimensional sphere with N vertices, where N ≤ m+3, which in turn we bound from above by αm for some absolute constant α > 0 (see Tutte [10]). Hence, the total number of davKd’s with exactly m faces can be bounded by αm · 6m · mm /m! ≤ β m , where β > 0 is an appropriate constant. Therefore, the probability that a fulfillable davKd of size at most 240(200/f )2 violates the isoperimetric inequality (3) is at most X γ β m n−f /2 ≤ β f 2 n−f /2 , m≤240(200/f )2 for some constant γ > 0. It is easy to verify that the right hand side of this inequality tends to 0 as n → ∞ provided f = f (n) = ω/ log1/3 n. b with |D| b ≤ 240(200/f )2 fulfillable in Hence, a.a.s. for every davKd D Γ(n, p) the isoperimetric inequality holds with a coefficient 1/f and so the assertion follows from Theorem 4.  COLLAPSE OF RANDOM TRIANGULAR GROUP 11 Proof of Theorem 2. As the group properties in question are monotone 1/3 decreasing, it is enough to consider p(n) = n−3/2−ω/ log n with ω < log log n. Observe first that a.a.s. Γ(n, p) is aspherical, i.e. there exists no reduced spherical van Kampen diagram with respect to the random presentation Γ(n, p). Indeed, such a spherical reduced van Kampen diagram has zero boundary, which violates the isoperimetric inequality proved in Lemma 5. Since Γ(n, p) is aspherical, it is torsion-free (see, for instance, Brown [4], p. 187). Consequently, a.a.s. Γ(n, p) is an infinite, hyperbolic group.  Let us conclude with a remark that in order to show the conjecture we have to prove Theorem 2 with τ (n) = O(1/ log n) instead of τ (n) = ω/(log n)1/3 . Such an improvement seems to require a new approach and, perhaps, a stronger version of Theorem 4. References [1] J. Alonso, T. Brady, D. Cooper, V. Ferlini, M. Lustig, M. Mihalik, M. Shapiro, and H. Short et al., Notes on word hyperbolic groups, Group Theory from a Geometrical Viewpoint, (E. Ghys, A. Haefliger, and A. Verjovsky, eds.) World Scientific, Singapore, 1991, 3–63. [2] S. Antoniuk, T. Luczak, and J. Świa̧tkowski, Collapse of random triangular groups: a closer look , Bull. Lond. Math. Soc. 46,4 (2014), 761–764. [3] B. Bollobás and A. Thomason, Threshold functions, Combinatorica 7 (1987), 35–38. [4] K. Brown, ”Cohomology of groups”, Graduate Texts in Mathematics 87, Springer, 1982. [5] M. Gromov, Asymptotic invariants of infinite groups. Geometric Group Theory, London Math. Soc. Lecture Note Ser. 182 (1993), 1–295. [6] E. Friedgut, Sharp thresholds of graph properties, and the k-sat problem. With an appendix by Jean Bourgain. Journal of the American Math. Soc. 12,4 (1999), 1017–1054. [7] E. Friedgut, Hunting for sharp thresholds, Random Struct. Algorithms 26 (2005), 37–51. [8] Y. Ollivier, Sharp phase transition theorems for hyperbolicity of random groups, Geom. Funct. Anal. 14 (2004), 595–679. [9] P. Papasoglu, An algorithm detecting hyperbolicity, (Minneapolis, MN and New Brunswick, NJ, 1994) DIMACS Ser. Discrete Math. Theoret. Comput. Sci., vol. 25, Amer. Math. Soc., Providence, RI (1996), 193–200. [10] W. T. Tutte, A census of planar triangulations, Canad. J. Math. 14 (1962), 21–38. [11] A. Żuk, Property (T) and Kazhdan constants for discrete groups, Geom. Funct. Anal. 13 (2003), 643–670. 12 SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK Adam Mickiewicz University, Faculty of Mathematics and Computer Science ul. Umultowska 87, 61-614 Poznań, Poland E-mail address: [email protected] Weizmann Institute of Science, Faculty of Mathematics and Computer Science 234 Herzl St. Rehovot 7610001, Israel E-mail address: [email protected] Adam Mickiewicz University, Faculty of Mathematics and Computer Science ul. Umultowska 87, 61-614 Poznań, Poland E-mail address: [email protected]
4math.GR
Improved Successive Cancellation Flip Decoding of Polar Codes Based on Error Distribution Carlo Condo, Furkan Ercan, Warren J. Gross arXiv:1711.11096v2 [cs.IT] 23 Jan 2018 Department of Electrical and Computer Engineering, McGill University, Montréal, Québec, Canada Email: [email protected], [email protected], [email protected] Abstract—Polar codes are a class of linear block codes that provably achieves channel capacity, and have been selected as a coding scheme for 5th generation wireless communication standards. Successive-cancellation (SC) decoding of polar codes has mediocre error-correction performance on short to moderate codeword lengths: the SC-Flip decoding algorithm is one of the solutions that have been proposed to overcome this issue. On the other hand, SC-Flip has a higher implementation complexity compared to SC due to the required log-likelihood ratio (LLR) selection and sorting process. Moreover, it requires a high number of iterations to reach good error-correction performance. In this work, we propose two techniques to improve the SC-Flip decoding algorithm for low-rate codes, based on the observation of channel-induced error distributions. The first one is a fixed index selection (FIS) scheme to avoid the substantial implementation cost of LLR selection and sorting with no cost on error-correction performance. The second is an enhanced index selection (EIS) criterion to improve the error-correction performance of SCFlip decoding. A reduction of 24.6% in the implementation cost of logic elements is estimated with the FIS approach, while simulation results show that EIS leads to an improvement on error-correction performance improvement up to 0.34 dB at a target FER of 10−4 . I. I NTRODUCTION Polar codes [1] are error-correcting codes proven to achieve channel capacity with infinite code length. They have been selected as a coding scheme in the 5th generation wireless systems standards (5G), within the enhanced mobile broadband communication scenario (eMBB), and are being considered for both ultra-reliable low-latency communications (URLLC) and massive machine-type communications (mMTC) [2]. The variety of system parameters foreseen in 5G demand improved decoding algorithms with a focus on reliable communications and low power consumption. In [1], the successive-cancellation (SC) decoding of polar codes was proposed. It is able to achieve channel capacity when the code length tends to infinite, but its error-correction performance degrades at shorter lengths. To overcome this limitation, the SC-List decoding algorithm was introduced in [3]. The improved error-correction performance comes at the cost of longer latency and higher complexity: various contributions have improved speed and reduced implementation cost [4]–[6]. Successive-cancellation flip (SC-Flip) decoding [7] takes a different approach to the improvement of SC, relying on an implementation complexity lower than that of SC-List, mainly sacrificing average decoding latency, and providing error-correction performance comparable to that of SC-List with a list size of 2. SC-Flip relies on multiple subsequent applications of SC, and on the identification of the most likely points in which the SC algorithm made a wrong decision. This operation is based on the magnitude of logarithmic likelihood ratios (LLRs) associated to the estimated codeword bits, and it is costly to implement. Modifications proposed in [8], [9] have shown that the error identification and correction process of SC-Flip can be greatly improved. A decoding approach similar to [5] has been recently proposed for SC-Flip in [10], reducing latency at no cost in error-correction performance, but substantially increasing the implementation complexity of the decoder. In this work, we propose two techniques to improve SCFlip decoding, based on the distribution of the first wrong estimation incurred by SC. The first method simplifies the wrong estimation identification process without degrading the error-correction performance, leading to substantial complexity reduction, while the second method uses the error distribution to restrict the search space to the bit indices most likely to incur errors. Simulation results show the effectiveness of the proposed techniques for low-rate polar codes, over a wide range frame error rate (FER) intervals. The remainder of this work is organized as follows: in Section II polar codes and their decoding algorithms are introduced. In Section III the proposed techniques are detailed, and simulation results, together with comparison with the state of the art, are presented in Section IV. Conclusions are drawn in Section V. II. P RELIMINARIES A. Polar Codes A polar code P C(N, K) of code length N and rate R = K/N is a linear block code that divides N = 2n , n ∈ Z+ bit-channels in K reliable ones and N − K unreliable ones. Information bits are transmitted through the reliable channels, whereas unreliable channels are fixed to a value known by both transmitter and receiver, and are thus called frozen bits. Polar codes are encoded through the following matrix multiplication: −1 −1 ⊗n xN = uN G , (1) 0 0 −1 where xN = {x0 , x1 , . . . , xN −1 } represents the encoded 0 N −1 vector, u0 = {u0 , u1 , . . . , uN −1 } is the input vector, and the generator matrix G⊗n is obtained as the n-th Kronecker product of the polarization matrix G = [ 11 01 ]. Due to the recursive nature of the encoding process, an N -length polar S=3 α β S=2 αr l α l β S=1 βr S=0 û0 û1 û2 û3 û4 û5 û6 û7 Fig. 1. Successive-cancellation decoding tree for a P C(8, 5) code. code can be interpreted as the concatenation of two polar codes of length N/2. The scheduling of operations required by the SC decoding algorithm allows to see its process as a binary tree search, where the tree is explored depth-first, with priority given to the left branch. Fig. 1 portrays an example of SC decoding tree, for P C(8, 5). Each node receives from its parent a vector of LLRs α = {α0 , α1 , . . . , α2S −1 }. Each node at stage S computes the left αl = {αl0 , αl1 , . . . , αl2S−1 −1 } and right αr = {αr0 , αr1 , . . . , αr2S−1 −1 } LLR vectors sent to child nodes as αli = sgn(αi ) sgn(αi+2S−1 ) min(|αi |, |αi+2S−1 |), (2) αri = αi+2S−1 + (1 − 2βil )αi . (3) The LLRs at the root node are initialized as the channel LLR −1 yN . Nodes receive the partial sums β from their left β l = 0 l {β0 , β1l , . . . , β2l S−1 −1 } and right β r = {β0r , β1r , . . . , β2rS−1 −1 } child node:  l βi ⊕ βir , if i ≤ 2S−1 βi = (4) otherwise. βir , where ⊕ is the bitwise XOR operation, and 0 ≤ i < 2S . At −1 leaf nodes, the β value and the estimated bit vector ûN are 0 computed as  0, when αi ≥ 0 or i ∈ Φ; βi = (5) 1, otherwise. The SC-List decoding algorithm [3] improves the errorcorrection performance of SC by relying on L parallel SC decoding paths. Each path is associated to a metric, that helps deciding which of the L paths is more likely to be correct. B. Successive-Cancellation Flip Decoding To improve the error-correction performance of SC, in [7] the SC-Flip decoding algorithm was proposed. It is based on the observation that a failed SC decoding process is due to either an incorrect bit estimation caused by noise introduced by the channel or, due to the sequential nature of SC, to a previous incorrect bit estimation. Thus, the first wrong estimation is always caused by the channel noise. To evaluate the impact of wrong estimations, a genie-like decoder called SC-Oracle was created: using foreknowledge of the transmitted codeword, it identifies the channel-induced errors and ensures that SC estimates the bit correctly. SC-Oracle shows that avoiding all wrong decisions caused by the channel noise results in significantly improved SC error-correction performance. Moreover, simulations with SC-Oracle have shown that a failed SC decoding is mostly due to a single wrong decision caused by channel noise, an event that denote as E1 . The SC-Flip algorithm attempts the identification and correction of E1 events. A cyclic redundancy check (CRC) code with a C-bit remainder is used to encode the information bits. If the CRC check passes at the end of SC decoding, the estimated codeword is assumed correct. In case the CRC check detects an error, the Tmax LLRs with the smallest magnitude, representing the bit estimations with lowest reliability, are stored and sorted. The bit associated to the smallest LLR is flipped, and SC is is applied to the part of the decoding tree that follows it. This process is repeated for all the Tmax indices, or until the CRC passes. In general, increasing Tmax improves the error-correction performance of SC-Flip, bringing it ever closer to that of SCOracle. In fact, the performance gap between SC-Flip and SC-Oracle is due to two possible cases: either the estimated codeword with a correct CRC check still contains errors, or the decoding stopped after reaching the maximum number of iterations Tmax without being successful. Further improvements for SC-Flip decoding algorithm have been recently proposed in [8] and [9], where a generalized SC-Flip algorithm uses nested flips to correct more than one erroneous decision with a single CRC, with a simulationbased scaling metric also introduced to help the baseline SCFlip decoder detect the erroneous bit indices more accurately. Simulation results show an improvement of 0.4 dB when Tmax = 10 with respect to SC-Flip. The implementation of this method requires parallel decoders similar to SC-List. III. I MPROVED S UCCESSIVE -C ANCELLATION F LIP D ECODING We propose two new techniques to improve the errorcorrection performance of SC-flip decoding, and to reduce the implementation complexity of SC-Flip decoders. A. Fixed Index Selection In [7], it was shown that the average number of iterations for SC-Flip decoding converges to that of a single SC decoder at moderate to high Eb /N0 . However, a single iteration of SCFlip requires additional operations with respect to SC. The standard SC-Flip decoding algorithm decides which bits to flip by identifying the Tmax least reliable bit estimations among the non-frozen indices. Since the estimation reliability is directly associated to the magnitude of its LLR value (5), they correspond to the Tmax LLRs with the smallest magnitude. The associated bits are flipped in ascending order starting from the one with she smallest |α|: thus, the construction of the list requires the Tmax LLRs to be not only selected, but also sorted. This operation results in substantial implementation cost, that is the main contributor to the additional hardware complexity of SC-Flip decoders with respect to SC decoders. Eb /N0 = 2.5 dB Normalized E1 Occurrence 1 Eb /N0 = 3.0 dB 0.8 0.6 0.4 0.2 0 0 10 20 30 40 50 60 70 80 90 100 110 120 130 140 150 160 170 180 190 Non-frozen indices In Fig. 2 it is shown the normalized distribution of E1 occurrence over the non-frozen bit indices for P C(1024, 170), with C = 32, obtained simulating 5 × 105 frames, for two Eb /N0 points. It can be noticed that bits have different probability of E1 , with a select few having a higher probability of E1 than the remaining ones, and the majority of them not incurring any error. The height and position of the error distribution spikes can be used to determine, off-line, which bits to flip and in which order. In the provided example for Eb /N0 = 3.0 dB, considering the non-frozen bits indexed from 0 to K +C −1, the first flipped bit would be that at index 29, corresponding to the highest E1 occurrence, followed by those at index 2, 35, 7, and so on, in descending probability of E1 occurrence order, until Tmax attempts have been reached or the CRC check passes. Determining which bits to flip off-line allows to avoid the LLR selection and sorting logic. Thus, the resulting SC-Flip decoder has an implementation cost negligibly different from that of an SC decoder. B. Enhanced Index Selection It is possible to use the error distribution information to increase the effectiveness of the standard LLR-based bit flipping selection scheme of SC-Flip. In its original formulation [7], SC-Flip chooses which Tmax bits to flip among all the K + C non-frozen bits in the code. However, from Fig. 2 we can see that the majority of information bits have very low error probability, that can be considered negligible depending on the target FER. Consequently, it is possible to restrict the LLR selection to the set of bit indices corresponding to high enough probability of E1 . This can improve the error-correction performance by increasing the chance of the wrong estimation to be included within a limited number of Tmax indices, automatically excluding LLRs that have an averagely low magnitude, but correspond to indices with low error probability. Let us in fact observe Fig. 3, that shows the average LLR magnitude for each information bit index for P C(1024, 170), C = 32, Normalized average LLR magnitude Fig. 2. Normalized distribution of E1 occurrence for P C(1024, 170), C = 32, 5 × 105 simulated frames. 1 0.8 0.6 0.4 0.2 0 0 20 40 60 80 100 120 140 160 180 Non-frozen indices Fig. 3. Normalized average LLR magnitude at each non-frozen bit index for P C(1024, 170) at Eb /N0 = 2.5 dB and C = 32. Indices highlighted in red correspond to the non-zero occurrence of E1 shown in Fig. 2. at Eb /N0 = 2.5 dB . It can be seen that the average LLR magnitude |α| can vary quite a lot depending on the bit. Highlighted in red are the LLRs whose indices correspond to the non-zero occurrences of E1 shown in Fig. 2: many LLRs of comparable or even smaller average magnitude are instead associated to indices with very low probability of E1 . These LLRs can feature among the Tmax with the smallest absolute value and be selected by the standard SC-Flip algorithm, but correspond to the erroneous bit in a negligible number of cases. On the other hand, their being taken in account can force the actual wrong estimation out of the Tmax flipped indices. The error distribution as shown in Fig. 2 depends on the number of simulated frames we are considering. With enough frames, every information bit index is associated with a nonzero E1 occurrence: the zero error probability in Fig. 2 means that no errors were encountered over the 5 × 105 simulated 2 b /N0 100 100 10−1 10−1 10−2 FER FER 10−2 10−3 10−3 10−4 10−4 10−5 10−5 10−6 1 1.5 2 2.5 3 3.5 Eb /N0 [dB] 2.5 SC SC-Flip - FIS SC-List (L = 2) SC-Oracle 3 SC-Flip SC-Flip - EIS SC-List (L = 4) 3.5 Fig. 4. FER curves for for P C(1024, 170), C = 32, Tmax = 10 with different decoding approaches. [dB] frames. Given a target FER, it is possible to exclude from the considered indices all those associated to error probabilities lower than a certain threshold, in order to maximize the chances of identifying the wrong estimation within Tmax attempts. Moreover, to take in account the relative probability of E1 occurrence, before sorting LLRs are scaled with respect to the the associated E1 occurrence (see Fig. 2). IV. S IMULATION R ESULTS The error-correction performance of the proposed methods has been evaluated and compared against the state of the art. Fig. 4 and Fig. 5 show the FER for P C(1024, 170) and P C(1024, 256) respectively, with C = 32. Both codes have been constructed targeting a signal-to-noise ratio of 2.5 dB, and simulations have been run on AWGN channel and BPSK modulation. Along with standard SC, curves are plot for SC-Flip [7], SC-List [3], SC-Oracle, and SC-Flip with the proposed fixed index selection (FIS) and enhanced index selection (EIS). The maximum number of iterations has been set to Tmax = 10 for all flip-based algorithms. The FER of SC is the highest among all considered algorithms, since all incarnations of SC-Flip substantially improve on its error correction performance. On the other hand, the SC-Oracle curve represents the case in which all E1 occurrences are successfully corrected, and thus can be interpreted as the lower bound of flip-based FER. The SC-Flip decoding algorithm significantly improves the error-correction performance of SC, but in both Fig. 4 and Fig. 5 a substantial gap from the SC-Oracle bound can be observed, consisting of 0.38 dB for P C(1024, 170) and of 0.47 dB for P C(1024, 256) at FER=10−4 . SC-Flip with FIS is shown to perform slightly better than standard SC-Flip for P C(1024, 170) in Fig. 4, with a gain of 1 1.5 2 2.5 3 3.5 Eb /N0 [dB] SC SC-Flip - FIS SC-List (L = 2) SC-Oracle SC-Flip SC-Flip - EIS SC-List (L = 4) Fig. 5. FER curves P C(1024, 256), C = 32, Tmax = 10 with different decoding approaches. 0.08 dB at FER=10−4 . In case of P C(1024, 256), the FER curves match. The Tmax = 10 indices considered by the method are those corresponding to the highest probabilities of E1 . This technique allows to substantially reduce the implementation complexity of an SC-Flip decoder. The second column of Table I reports the number and type of operations required by a standard SC-Flip decoder, assuming a semiparallel structure similar to [11], and omitting the memory requirements. The complexity is divided among the three main operations that an SC-Flip decoder has to perform: F (2), G (3), C (4), and the sorting and selection of the Tmax indices to flip. Basic modules as comparators, XORs, multiplexers, adders and registers are used to approximate the implementation complexity; the number of parallel processing elements P e, along with the LLR quantization bits Q, also affect the total cost. It can be seen that FIS allows to completely avoid the logic cost of the sorter function. To get a sense of its impact on the total logic complexity, we consider the XOR block having a cost of 1, the multiplexer a cost of 3, the adder and the comparator a cost of 5 and the register a cost of 4. Supposing an architecture with P e = 32, Q = 6 and Tmax = 10, the sorter accounts for 24.6% of the total logic complexity. Compared to SC-Flip, the EIS approach allows for 0.29 dB and 0.34 dB gain for P C(1024, 170) and P C(1024, 256) respectively. In Fig. 4, a total of 26 indices are considered, while 45 are taken in account for the higher rate case portrayed in Fig. 5. Compared to SC-List, for P C(1024, 170), the FER of SC-Flip with EIS sits close to the curve obtained with list size L = 4, outperforming the L = 2 curve of approximately 0.31 dB. For P C(1024, 256), the error-correction performance of the EIS approach matches that of SC-List with L = 2. It was shown in [12] that while an outer CRC code improves the SC-Flip Pe × Q × Comparator 2 × Pe × XOR Pe × Q × MUX Pe × Q × Sum Pe × MUX Pe × MUX Tmax × Q × D-FF Tmax × Q × Comparator 2 × Tmax × Q × MUX F G C Sorter SC-Flip - FIS Pe × Q × Comparator 2 × Pe × XOR Pe × Q × MUX Pe × Q × Sum Pe × MUX Pe × MUX N/A 3 Average number of iterations TABLE I I MPLEMENTATION LOGIC COST BREAKDOWN FOR SC-F LIP AND SC-F LIP - FIS. 2.5 2 1.5 1 1 100 1.5 2 2.5 3 3.5 Eb /N0 [dB] SC SC-Flip - FIS SC-Flip - EIS 20 indices 10−1 FER 10−2 SC-Flip SC-Flip - EIS 26 indices SC-Flip - EIS 17 indices Fig. 7. Average number of iterations for P C(1024, 256), C = 32, Tmax = 10 with different decoding approaches. 10−3 10−4 10−5 10−6 1 1.5 2 2.5 3 3.5 Eb /N0 [dB] SC-Flip SC-Flip - EIS 26 indices SC-Flip - EIS 17 indices 2 2.5 3 SC-Flip - EIS 36 indices SC-Flip - EIS 20 indices SC-Oracle 3.5 Fig. 6. FER curves for P C(1024, 170), C = 32, Tmax = 10 with different decoding approaches and number of indices considered by SC-Flip - EIS. Eb /N0 [dB] error-correction performance of SC-List decoding significantly at medium to high code rates, at low code rates the CRC is detrimental. Thus, for a fair comparison, we did not consider any CRC in the SC-List curves. The indices used by EIS have been found simulating a total of 1 × 106 frames, and selecting those with the higher probability of E1 . The impact of different number of considered indices in EIS is shown in Fig. 6 for P C(1024, 170): it can be seen that decreasing it tends to degrade the error-correction performance, while increasing it does not bring substantial advantage. This remains true as long as the number of indices considered by EIS is substantially lower than K + C, at which point the FER will degrade to the same obtained by standard SC-Flip. As the code rate increases, the error correction performance of both FIS and EIS starts degrading if Tmax is not increased. This is due to the fact that as the number of information bits in the code rises, the distribution of E1 occurrence spreads over more bit indices. This results in a higher number of indices that need to be considered by the proposed method: a higher Tmax is thus needed to maintain the error-correction performance. Fig. 7 depicts the average number of iterations for different decoding approaches, where an iteration is defined as an application of the SC algorithm over the N codeword bits. It can be observed that at low Eb /N0 points, SC-Flip with the FIS technique has up to 50% higher average iterations with respect to standard SC-Flip [7], while the use of EIS entails an increment of up to 25%. Both EIS and FIS reduce the number of cases in which SC-Flip reaches the Tmax attempts, lowering the average number of iterations. For example, the SC-Flip decoding algorithm with P C(1024, 170) at Eb /N0 = 1 dB is not able to find the correct codeword 40% of the time, with Tmax = 10 and C = 32. With the FIS criterion, this failure rate drops by 15%, while with EIS, it drops by 25%. However, this positive contribution is offset by the position of the indices with high probability of E1 occurrence, as shown in Fig. 23. The majority of these indices are in fact found towards the beginning of the codeword: thus, each additional decoding attempt requires almost a full iteration. On the contrary, in standard SC-Flip there are no constraints on which indices to consider, and at low Eb /N0 , the channel noise causes most LLRs to have very low magnitude. Consequently, the Tmax indices can be spread out over the whole codeword, leading to standard SC-Flip having a lower average number of iterations. At higher Eb /N0 , where the FER is of interest, the average number of iterations quickly converges to 1 for all methods. V. C ONCLUSION In this work, we have proposed two techniques to reduce the implementation complexity and reduce the FER of the SC-Flip decoding algorithm. They are based on the identification of the bit indices where a channel-induced error is most likely to occur. The proposed techniques have shown significant improvement over SC-Flip when applied to low- rate polar codes. The fixed index selection method has shown an estimated 24.6% implementation complexity reduction at no cost in error-correction performance, while the enhanced index selection has been observed to bring up to 0.34 dB gain in FER. R EFERENCES [1] E. Arıkan, “Channel polarization: A method for constructing capacityachieving codes for symmetric binary-input memoryless channels,” IEEE Transactions on Information Theory, vol. 55, no. 7, pp. 3051–3073, July 2009. [2] “Final report of 3GPP TSG RAN WG1 #87 v1.0.0,” http://www.3gpp.org/ftp/tsg ran/WG1 RL1/TSGR1 87/Report/Final \Minutes report RAN1%2387 v100.zip, Reno, USA, November 2016. [3] I. Tal and A. Vardy, “List decoding of polar codes,” IEEE Transactions on Information Theory, vol. 61, no. 5, pp. 2213–2226, May 2015. [4] A. Balatsoukas-Stimming, M. B. Parizi, and A. Burg, “LLR-based successive cancellation list decoding of polar codes,” IEEE Transactions on Signal Processing, vol. 63, no. 19, pp. 5165–5179, Oct 2015. [5] S. A. Hashemi, C. Condo, and W. J. Gross, “Fast and flexible successivecancellation list decoders for polar codes,” CoRR, vol. abs/1703.08208, 2017. [Online]. Available: http://arxiv.org/abs/1703.08208 [6] S. A. Hashemi, C. Condo, F. Ercan, and W. J. Gross, “Memory-efficient polar decoders,” IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. PP, no. 99, pp. 1–1, 2017. [7] O. Afisiadis, A. Balatsoukas-Stimming, and A. Burg, “A low-complexity improved successive cancellation decoder for polar codes,” in Asilomar Conference on Signals, Systems and Computers, Nov 2014, pp. 2116– 2120. [8] L. Chandesris, V. Savin, and D. Declercq, “An improved SCFlip decoder for polar codes,” in IEEE Global Communications Conference (GLOBECOM), Dec 2016, pp. 1–6. [9] L. Chandesris, V. Savin, and D. Declercq, “Dynamic-SCFlip decoding of polar codes,” CoRR, vol. abs/1703.04414, 2017. [Online]. Available: http://arxiv.org/abs/1703.04414 [10] P. Giard and A. Burg, “Fast-SSC-Flip Decoding of Polar Codes,” IEEE Wireless Communications and Networking Conference, 2018, to appear. [Online]. Available: http://arxiv.org/abs/1712.00256 [11] A. J. Raymond and W. J. Gross, “A scalable successive-cancellation decoder for polar codes,” IEEE Transactions on Signal Processing, vol. 62, no. 20, pp. 5339–5347, Oct 2014. [12] S. A. Hashemi, C. Condo, F. Ercan, and W. Gross, “On the performance of polar codes for 5G eMBB control channel,” in Asilomar Conference on Signals, Systems and Computers, 2017, to appear.
7cs.IT
arXiv:1306.3617v6 [physics.gen-ph] 26 Dec 2015 TOPOLOGY OF THE STANDARD MODEL I: FERMIONS Steve Gersten Abstract. The Harari-Shupe model for fermions is extended to a topological model which contains an explanation for the observed fact that there are only three generations of fermions. Topological explanations are given for β-decay and for proton decay predicted in supersymmetry and string theories. An explanation is given for the observed fact that the three generations of fermions have such similar properties. The concept of “color” is incorporated into the model in a topologically meaningful way. Conservation laws are defined and discussed in the context of the algebraic topology of the model, and preon number is proved to be linearly determined by charge, weak isospin, and color. Preface to help non-grouptheorists get a start in reading this paper1 Since some readers may not be familiar with the term van Kampen diagrams, I can refer them to an excellent article in Wikipedia2 ; I’ll give a brief explanation shortly. The model I propose for particles of SM (standard model of particle physics) makes essential use of them, but the idea can be understood at a nontechnical level as follows. The model for particles is like Buckminster Fuller’s geodesic dome. The particles are the skin spanning the skeletal frame and the preons [Li] are the segments of that frame. So particles are 2-dimensional and preons are 1-dimensional. It makes no sense to say a particle (like a quark or electron) is composed of preons, in the way a sack of gum drops is composed of pieces of candy. A particle is the 1991 Mathematics Subject Classification. 81P05, 20F06. Key words and phrases. fermion, standard model, Harari-Shupe model, generation problem, van Kampen diagram, universal covering. Supported by Social Security and Medicare c S. Gersten 2012 I wish to thank Domingo Toledo for discussions. I am very grateful to Yong-Shi Wu for explaining the physics underlying “color”. Wikipedia articles on the standard model and related topics were useful and my thanks go to their anonymous authors . 1 There is something new for grouptheorists here as well. In the word problem all that matters is the minimum number of 2-cells in a van Kampen diagram filling a relation R of a presentation, called the area of R. The diagram itself is irrelevant for the word problem. What is new in these articles is that the van Kampen diagrams are given an independent physical meaning. Thus both the proton and the positron are fillings of the word aaa in the presentation P to be defined shortly. But they have very different topological and physical properties. 2 http://en.wikipedia.org/wiki/Van Kampen diagram 1 2 STEVE GERSTEN surface spanned by the 3 segments of Fuller’s frame that bound it. These segments have names, a or b, and orientations, that is, arrows.3 It will turn out that, for all particles in our theory, the arrows on one spanning triangle all point in the same direction; this is a deep fact and the explanation will be delayed to the sequel paper on bosons, but it is connected with the intrinsic spin of a particle. Particles may be detected, albeit indirectly, as in the case of quarks, which are not directly observable (each quark has a color and only “colorless” combinations of them (§4 below) are observable), but the segments of the skeleton may never be seen, but only inferred by the characteristics of surfaces spanning them.4 I want to state from the beginning that I have only changed slightly the interpretation of the basic idea of [Ha] and [Sh], but not the idea itself. By interpreting their preons5 as the framework (or skeleton) rather than the content of particles, I can solve the problems that these papers pose concerning the standard model. It’s the paper I would have expected either of these authors to write had they been aware of the (admittedly arcane) field of combinatorial group theory. Thus my goals in this article are only to go as far as these authors could have gone in 1979 with the reinterpretation of “preons”. In the sequel article, I shall take the idea a step further by incorporating spin. Now for a quick definition of van Kampen diagrams. It is the primary tool of combinatorial group theory (also known as geometric group theory). This branch of group theory is the study by geometry and topology of group presentations. A group presentation consists of generators and defining relations. A van Kampen diagram is a geometric way of representing relations. For more detail and for some superb drawings of van Kampen diagrams, consult the Wikipedia article. An example of a presentation is that whose generators are all the edges of Fuller’s geodesic dome and whose defining relations are those determined by the set of triangles of the dome. We could call the group presented Buckminster Fuller’s group; it has not been studied to my knowledge. One van Kampen diagram is the dome itself.6 The only presentation we are concerned with in these articles is P =< a, b; aaa, bbb, aab, abb >. The group presented by P is the cyclic group of order 3. Two van Kampen diagrams in P may be seen in Figures 1 and 2 of this article. The second represents a proton and the three curvilinear triangles are, reading from left to right, the up, down, and up quarks. These two diagrams are of particular interest because they may be considered “spherical diagrams” by appending a face at infinity. So, with the exterior of the diagram compactified by adding a point at infinity, it becomes a sphere divided into four curvilinear triangles. These two 3 Figure 2 of this article is an example of a van Kampen diagram that represents a particle, the proton in this case, with the labels a, b on the edges. 4 The usual interpretation of the Harari-Shupe model is like the skeleton of a fish, whereas mine is like that of a lobster . Theirs has the skeleton on the inside, whereas I’ve moved it to the outside. 5 The terminology “preon” is used in [Li] but does not occur in [Ha] nor in [Sh], which use the terms “rishon” and “quip” respectively. 6 http://carlacapeto.files.wordpress.com/2010/11/buckminster-fuller-dome.jpg TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 3 spherical diagrams play a central role in characterizing SM in §5 below.7 I cannot emphasize strongly enough that what is not being attempted is to calculate masses of particles nor to compute the fundamental constants of nature. The topological approach cannot and does not attempt to do this. All that topology can do is to establish limits of what is possible, but it cannot fill in the details. For example my theory tells us that there is no fourth generation of fermions, but it cannot fill in the details about the masses of the three generations of fermions that exist. Only a metric theory can attempt to do this, and the mere beginnings of a metric theory are sketched at the end of the second paper on bosons. Do not expect me to calculate the value of “g” anytime soon. Professor Wu suggested that I should emphasize also that the complex K and its universal cover K̃, in which all my constructions take place, do not lie in 3-space (or even 4-space), but should be considered in a larger dimensional space, possibly in the fibre of a fibre bundle over Minkowski space. He also pointed out that the discreteness of the complex K (as opposed to a continuous geometry) was a good feature that might sweeten the pill of higher dimensions. Those physicists who accept higher dimensional spaces as the venue of physics will appreciate this while those who reject them will reject this article whatever I do to try to reach them. Contents Preface to help non-grouptheorists get a start in what is going on §0. Introduction §1. Review of Harari-Shupe model §2. Conjugacy classes in a free group §3. 2-cycles in the 2-complex K §4. Color §5. Standard Model §6. Neutrino Oscillations §7. Questions and comments Appendix 1. Historical remark Appendix 2. Color group M and A2 Appendix 3. Conservation laws in SM and quantum numbers Appendix 4. β-decay revisited Appendix 5. ∆++ baryon Appendix 6. Quantum numbers and the first Chern class Appendix 7. Colorings as conservation laws Appendix 8. Preons are determined by charge, color, and weak isospin Appendix 9. Dark Matter Appendix 10. Nucleogenesis Appendix 11. The dual picture and ∆++ test Appendix 12. Entanglement Disclaimer. 7 I have adopted Domingo Toledo’s suggestions to revise an earlier attempt at this preface in order to make it less technical. 4 STEVE GERSTEN §0. Introduction In this article we propose a topological model for SM, the standard model of particle physics. A particle will turn out to be represented by a class of colored van Kampen diagrams in the universal cover K̃ of a complex K we construct in §3 (diagrams related by diamond moves represent the same particle; the concept of color is introduced in §4 below). The boundary label of a diagram is a conjugacy class c of a single element in F = F (a, b), the free group with free basis {a, b}, and is thus determined by the particle. Its antiparticle is represented by that diagram with the opposite orientation, and hence its boundary label is c̄, the conjugacy class of inverses of elements of c. If a particle is its own antiparticle (as is the case for the photon, gluons, and the Z-boson), then c = c̄, which implies that c consists only of the neutral element 1 of F . Not all diagrams represent observable particles; the observability criterion is given in §4 below. At the end of §3 we illustrate the notions with van Kampen diagrams representing the proton, neutron, and their antiparticles without indicating the colors that must be attached to the faces. The notions are unified in §5 to give a topological formulation for SM, including predictions for all particles, observable or not, which can exist. The emphasis in this paper is on fermions, which are the easiest to characterize, but the model applies to bosons as well. The deduction of the various species of bosons will be left to a future paper, but we have included a diagram for a Higgs boson, since people I have spoken to about this article have requested to see it and it is in the news because of its discovery by the LHC at CERN last year. Finally, in §6, a purely topological explanation is given based on our model for the neutrino deficit, the fact that the neutrino flux from the sun observed in the laboratory is one third of the rate predicted by theory. The correspondence between particles and van Kampen diagrams is the basic idea of this article, which is an expansion of ideas in papers of Harari [Ha] and Shupe [Sh] and which have been recently revived in an expository artice [Li]. Viewing particles in this way leads to the complete model in §5, including answers to several of the questions raised in these papers. Among these are why there are only three generations of fermion, why the generations have such similar properties, and where the prediction of new fundamental particles stops. A general reference for the algebraic topology used is [AH] and a reference for notions of combinatorial group theory is [BRS]. Other references to web articles will be provided as needed in footnotes. There are a number of appendices which examine finer point of the theory. Appendix 12 offers a geometrical explanation for the paradoxes of quantum entanglement. In fact geometry is the overall theme of the paper, that fundamental physical facts can be explained by geometry even when the numbers themselves have to be determined by experiment. Appendix 11 shows how to replace the notion of van Kampen diagram, which offended at least one reader (see the letter quoted in the Disclaimer), by a planar graph with additional labels. This is an equivalent formulation, but the van Kampen formulation is still needed because covering space theory applies directly to it, whereas the graph formulation is more intuitive for TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 5 physicists. §1. Review of Harari-Shupe model Harari [Ha] and Shupe [Sh] have proposed a model wherein quarks and electrons are composite particles, composed each of three fundamental particles called “preons” by Lincoln in a recent article [Li]. In my notation the fundamental particles are a and b and their antiparticles are ā and b̄, respectively.8 The first generation of fermions consists of the electron e, up quark u, down quark d, and electron neutrino νe ; these are āāā, aab, āb̄b̄ and bbb, and their antiparticles are aaa, āāb̄, abb, and b̄b̄b̄, respectively. Then the proton p is consists of two up and one down quark, or p = aab + aab + āb̄b̄, whereas the neutron n is two down and one up quark, or n = āb̄b̄ + āb̄b̄ + aab. When one assigns an electric charge of + 31 to a and 0 to b and negatives of these numbers to the antiparticles, then the charges add up to the correct numbers 1 for the proton and 0 for the neutron. There are two distinguished decay processes identified by Harari, d → u + e + ν̄e and u + u → d¯ + e+ , where e+ is the positron, antiparticle to the electron, and ν̄e is the electron antineutrino. In my notation these are āb̄b̄ → aab + āāā + b̄b̄b̄ and aab + aab → abb + aaa. The first of these processes underlies β-decay or n → p + e + ν̄e and the second underlies the decay of a proton which is predicted by supersymmetry and string theories. A hypothesis made is that the net number of a’s and of b’s (that is, the number of a’s minus the number of ā’s and similarly for the b’s) on one side of the reaction must equal the net number individually on the other side. So there is conservation of the net preon number of a’s and of b’s. It should be emphasized that [Ha] and [Sh] were published in 1979 and there has been no confirmation of the prediction that these fermions are composite particles to date. In addition, there are two further generations of fermions identified in the laboratory, where the second generation is the muon, charm and strange quarks, and muon neutrino, and the third generation is the tau particle, top and bottom quarks, and tau neutrino. These appear to have similar properties to the first generation except for significantly higher masses. One of the most important open problems in particle physics to date has been to explain why there appear to be only three generations of fermions and why the three generations so closely resemble each other. The reason this thirty year old puzzle is of interest today, and the reason [Li] was written, is that the large hadron collider LHC has come into operation and has discovered the existence of what appears to be a Higgs boson, the particle predicted over 40 years ago which is necessary to complete the “standard model” SM of particle physics. When the LHC is upgraded next year, it is hoped that other puzzles will be similarly unraveled, among which is the composite nature of fermions. 8 Both Shupe and Lincoln call a, ā, b, b̄ by +, −, 0, 0̄ respectively, whereas Harari calls them T, T̄ , V, V̄ . 6 STEVE GERSTEN §2. Conjugacy classes in a free group There is a product among conjugacy classes c, d in a group whose result cd is the set of products of elements of the two sets. The product is associative and commutative. For each conjugacy class c there is the conjugacy class c̄ which consists of inverses of elements of c. We shall consider conjugacy classes of single elements in a free group F with free basis {x1 , x2 , . . . , xn }. Each such conjugacy class has a representative which is a cyclically reduced word in the free basis. Denote the conjugacy class of w ∈ F by [w]. Given a set of conjugacy classes of words [w1 ], [w2 ], . . . , [wm ], we can form the CW complex K whose 1-skeleton is a bouquet of circles corresponding to the generators xi of F and whose 2-cells e[wj ] have attaching maps the words wj in the 1-skeleton. We make the convention that we attach only one 2-cell for the pair of conjugacy classes [w], [w̄] and that the 2-chain they determine satisfies thus e[w] = −e[w̄] .9 Note that 2-cycles Z2 (K) (with integer coefficients) are integer linear combinations of the e[wj ] such that the net algebraic sum of each of the xi in the attaching maps is zero (occurrences of xi count as +1 and occurrences of x̄i = xi −1 count as -1). Since each conjugacy class [c] determines a homology class in H1 (K), this condition is equivalent to the assertion that the sum of the homology classes determined by the [wi ] is zero. §3. 2-cycles in the 2-complex K A klepton is defined as a conjugacy class of one of the four words aaa, aab, abb, bbb and their inverses in the free group F = F (a, b) with free basis {a, b}. From now on let K be the 2-complex constructed in the preceding paragraph with 2-cells eκ corresponding to the four conjugacy classes κ = [aaa], [aab], [abb], [bbb] in F . Note that eκ̄ = −eκ in the chain group C2 (K) for each klepton κ. P We require P a reaction among kleptons κ1 , κ2 , . . . , κm and λ1 , . . . , λm , denoted by κi P → λj ,P to conserve algebraic sum of the number of a’s and of b’s. It follows that i eκi + j eλ̄j is a 2-cycle in K. From now on we identify the 2-cell eκ with the fermion corresponding to κ. A key observation is the fact, proved by an easy computation, that K has fundamental group Z/3Z, the cyclic group of order 3. It follows that each of the 2-cells eκ of K has 3 lifts to the universal cover K̃ of K.10 This gives the 12 fermions of the standard model. The antiparticles arise from the observation that each 2-cell eκ is a map of the disc into K. So the mapping with the opposite orientation, corresponding to the chain eκ̄ = −eκ corresponds to the antiparticle eκ̄ of the fermion eκ . 9 This convention will play an important role in the sequel paper on bosons in the algorithm for determining spin of composite particles. 10 Note that K̃ (1) is the regular covering space of K (1) associated to the kernel of the homomorphism F → Z/3Z given by a → 1, b → 1 (mod 3). TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 7 Scholium. There are exactly 3 generations of fermions in the model K̃ for the standard model, corresponding to the lifts of the 2-cells of K. These are the 24 basic fermions of the standard model.  Proposition. Every 2-cycle of K is spherical. This means that the Hurewicz map π2 (K) → H2 (K) = Z2 (K) is surjective. Proof. Let us assume that αe[abb] + βe[aab] + γe[aaa] + δe[bbb] is a 2-cycle, where α, β, γ, δ are integers. It follows that we have linear equations α+2β+3γ = 0, 2α+β+3δ = 0. From Gaussian elimination it follows that α = γ − 2δ, β = −2γ + δ, so the general solution is a linear combination γv1 +δv2 with integer coefficients γ, δ of the integral vectors v1 = [1, −2, 1, 0] and v2 = [−2, 1, 0, 1]. A second integral basis for the solutions is v1 + v2 = [−1, −1, 1, 1] and −v1 = [−1, 2, −1, 0]. It follows that to prove the theorem it suffices to show that the 2-cycles −e[abb] − e[aab] + e[aaa] + e[bbb] and −e[abb] + 2e[aab] − e[aaa] are spherical (observe that these 2-cycles correspond to the reactions of β-decay āb̄b̄ → aab + āāā + b̄b̄b̄ and aab + aab → abb + aaa identified in [Ha]). This is accomplished by explicit construction with the following spherical diagrams. b a a b a b Figure 1 8 STEVE GERSTEN a b b a a a Figure 2 In each of these figures there are four 2-cells, where the fourth 2-cell is at infinity. One reads the boundary labels for the finite cells counterclockwise and the boundary label for the cells at infinity in the clockwise manner. Since each 2-cycle is represented by a map of 2-sphere into K, it follows that the generators of Z2 (K) are spherical and hence all 2-cycles of K are spherical. This completes the proof.11 Remark 1. We shall calculate the kernel of the homomorphism π2 (K̃) → H2 (K) in §6. It turns out to have important physical significance. The significance of the proposition is the following. A particle, like a proton or neutron, is represented by a van Kampen diagram D (that is, a combinatorial map of an oriented singular disc D into K) [BRS]. Given a spherical diagram, one can cut it along one edge to obtain a van Kampen diagram with freely trivial boundary label. This can then be combined with D along an edge with the same boundary label in the same orientation to obtain a new disc diagram D′ . Then one can do “diamond moves” ([BRS] page 115) on D′ and repeat the process any number of times. The result of such a sequence of moves is a reaction among fermions, and we can read off the result at the chain level C2 (K) to get the reaction in terms of the Harari-Shupe model. The proposition says that all reactions among fermions, that is, beginning with one collection of fermions and ending with another, after projecting from K̃ to K, are obtained in this way. Remark 2. The fact that processes affecting fermions are represented by spherical diagrams means they lift to the universal cover K̃ of K. Thus the same processes that affect the fermions of the first generation affect those of the second and third 11 This result is a special case of the the result that every integral 2-cycle on a 2-complex with finite cyclic fundamental group is spherical . The proof makes use of the edge-term exact sequence of the Serre spectral sequence along with the fact that H2 (G, Z) = 0 for a finite cyclic group G. Since we need the explicit form of the generators shown in Figures 1 and 2, we have given our direct geometric argument. TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 9 generations. This explains why these particles resemble so closely their first generation counterparts. To finish this section, we observe that Fig. 2 can be interpreted as a disc diagram by ignoring the face at infinity. As such it is a van Kampen diagram for the proton. A van Kampen diagram for the antineutron is obtained from it by interchanging a and b. Those for the antiparticles are obtained by reversing all arrows.12 §4. Color In this section we take the first steps toward incorporating color, the source of the strong nuclear force, into our model. To begin, let [0], [1], [2] denote the residue classes of 0, 1, 2 (mod 3). Let N = [0] + [1] + [2] in ZG, where G = Z/3Z and let M = ZG/N ZG, where M is defined to be the color group. In the literature, [0], [1], [2] correspond to the colors red (r), green (g), and blue (b). Their negatives −r, −g, −b in M are called cyan, yellow, and magenta, respectively; they play no role in the discussion below, but enter in the discussion of antiparticles and gluons, which we shall not undertake here.13 The designation of colors is arbitrary and has nothing to do with perceived vision. It is important to make the distiction between the color red [0] and the neutral element 0 in M . In the literature, 0 is called both “white” and “colorless”. The discussion below is given in detail for the proton Fig. 2, but it can be extended to all the fermions (see the last paragraph of §3). The gluons will be discussed in a future paper along with the other bosons of the theory. We lift the diagram Fig. 2 for the proton to K̃.14 This requires a choice of base point, which we take to be a lift P0 of the bottom vertex. This determines the other vertices P1 , P2 and the lifts of the edges ai , bi , i = 0, 1, 2, where an edge is labelled by its initial vertex. The situation is shown below in Fig. 3.15 12 The other van Kampen diagram for the proton is obtained by doing a diamond move on the two edges labelled “a” with origin the bottom vertex. 13 In Appendix 2 below I relate my color group M to the root system A . When I wrote this 2 section I was ignorant of the existing SU(3) theory and formulated the notions out of thin air. After Professor Wu kindly explained the physicists’ theory, I saw that we were saying the same thing, and the appendix gives the relation. 14 The lift here is a technical device to facilitate the definition of color. Technically this means that color, for example on the quarks constituting a proton, is defined by the local coefficient system M, or, what amounts to the same thing, a π1 (K)-module M [AH]. This is the same thing as ordinary constant coefficients on the universal cover K̃. To define color on the other generations of quarks, one pulls back the coefficient system to K̃ via the covering map K̃ → K. 15 We calculate the chain in C (K̃) associated to the lift of the disc diagram shown in Fig. 3 as 2 follows. In the free group on edges of K̃ we have, reading around the diagram once counterclockwise from the base point P0 , (a0 a1 b2 )(b̄2 b̄1 ā0 )(a0 b1 a2 ). The first term may be identified with a lift ũ of the up quark and we shall identify the second with a lift d˜ of the down quark. For the third term, a0 b1 a2 = ā2 (a2 a0 b1 )a2 , so as conjugacy classes in the free group we have [a0 b1 a2 ] = g 2 [a0 a1 b2 ], where g is the generator of G = Z/3Z given by a → [1], b → [1]. Thus the 2-cell corresponding to [a0 b1 a2 ] maps onto the up quark, but this is different from the conjugacy class [a0 a1 b2 ]; so the 10 STEVE GERSTEN P2 a1 b1 a2 P1 b2 P1 a0 a0 P0 Figure 3 The rules for coloring a diagram are the following, where a coloring is an assignment of elements of M to the faces, so that the face with the opposite orientation is assigned the negative of the color of that face. 1. A lepton is always white, so has 0 for color. 2. The color of a quark is always one of r, g, b and the color of an antiquark is the negative of the color of the corresponding quark. 3. For a particle to be observable, the sum of the colorings of the faces must be 0. Thus one possible coloring of the diagram Fig. 3 is to assign the faces from left to right the colors r, g, and b, whose sum is 0 (they lift to different faces in K̃), and assign colors arbitrarily to the other 2-cells of K̃, subject to rule 1. Call such a coloring f . Note that this van Kampen diagram in K̃ can be viewed as a spherical diagram where the fourth face is at infinity and corresponds to the lift of an electron. As such the coloring extends to one of the spherical diagram where again the sum of the colors assigned to the faces is 0. So we can reformulate the definition of a coloring of the diagram D for a fermion in K̃ as the pull-back to D of a 2-cochain f ∈ C2 (K̃, M ) with values in M , where all leptons are assigned 0, where all lifts of quarks in the diagram are assigned colors from r, g, b, and where the sum of the values assigned to the faces of D is 0. The rules for a spherical diagram are the same. So the cochain f in the previous paragraph can be considered by pull-back as either defined on the disc or as a cochain fˆ on the sphere containing the disc obtained, in this example, by extension by 0. The main point here is how to change colorings, that is, to change cochains in 2-cells are different. In C2 (K̃) we have the 2-chain determined by the lift of the diagram of Fig. 3 is ũ + d˜ + g 2 ũ. It would appear that there is a mixing of generations of the up quark in the lift. If we take into account the face at infinity of Fig. 3, then we obtain the 2-cycle on K̃ given by ũ + d˜ + g 2 ũ + ẽ, where ẽ is a lift of the electron. TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 11 such a way as to preserve rules 1–3 and in a topologically meaningful way. This is done by means of coboundaries of 1-cochains. For example, in the coloring f indicated above, we can interchange the colors of the first two faces by δh, where h is the 1-cochain which is zero on all edges except on b1 , and where h(b1 ) = −r + g. To interchange the colors of the second and third faces, we use δk, where k is zero on all edges except on b2 , where k(b2 ) = g − b. That rule 3 is preserved is checked directly or, more fundamentally, follows from the fact that < δc, z >= 0 for all 1-cochains c and all 2-cycles z (applied to the spherical diagram). In this way all colorings consistent with the rules are obtained. These 1-cochains correspond physically to gluons and are the source of the strong nuclear force. We shall offer another interpretation of gluons in a subsequent article on bosons, more in keeping with the ideas of §3 of processes applied to a fermion. §5. Standard Model In this section we propose our version of the standard model SM. There are alternative versions of SM, some of which were proposed in order to cope with the possibility that the Higgs boson might not exist. Now that the data confirm its existence with better than 99% probability, we shall eschew treating these alternative theories from our point of view. We define a fundamental domain to be one of the two spherical diagrams shown in Figures 1 and 2 or one obtained from it by replacements a, b → b, a, a, b → ā, b̄, or a, b → b̄, ā. Here replacing a, b by ā, b̄, etc., in a diagram means to reverse the arrows. We also admit as fundamental domains completely reducible16 two-faced and fourfaced spherical diagrams consisting of cells eκ and their oppositely oriented cells −eκ = eκ̄ (these degenerate17 examples have corresponding 2-chains 0 in C2 (K)). So in a four-faced completely reducible fundamental domain one can order the four 2-cells α, β, γ, δ so that α and β form a reducible pair across a common edge , and γ and δ form a reducible pair across a common edge.18 It should be remarked that not all 2-faced spherical diagrams are considered fundamental domains. For example, one can take the electron neutrino eκ with κ = [bbb], rotate it a third of a revolution, and glue the two together. This is a perfectly acceptable spherical diagram, and indeed it plays a key role in §6 below. However it is not considered a fundamental domain because it is not reducible. The rotation prevents any edge from acting as a mirror. 16 A diagram is called reducible if it contains a pair of faces with an edge in common so that the faces are mapped mirror-wise across that edge. The faces themselves are called a reducible pair. In a reducible diagram one can remove the reducible pair and the edge between them and sew up to boundary of the hole created to obtain a new diagram with two fewer faces. A diagram is called completely reducible if its faces can be paired off into reducible pairs. 17 These degenerate diagrams play an important role in the sequel article on bosons. 18 It is also possible for both α and β to be a reducible pair and for γ and δ to be reducible, all at the same time, as happens in the case of the hypothetical graviton, to be considered in the sequel article on bosons. In Appendix 5 below I consider completely reducible 6-faced diagrams in order to treat the ∆++ baryon, as a result of a challenge from Professor Wu. Presumably this could continue with completely reducible 2n-faced diagrams in order to handle higher resonances. 12 STEVE GERSTEN A fundamental process for particle physics is the lift f˜ : S → K̃ of a spherical diagram f : S → K, where S is a fundamental domain. A fundamental particle is a triple (D, f˜, h), where f˜ : S → K̃ is a fundamental process lifting f : S → K, where D ⊂ S is a van Kampen diagram, and where h ∈ C 2 (K̃, M ) is a coloring in the color group M satisfying 1. the pull back f˜∗ (h) ∈ C 2 (S, M ) vanishes on leptons, and 2. the values of f˜∗ (h) on quarks are in {r, g, b} and the values on antiquarks are in {−r, −g, −b}. The fundamental particle is observable if in addition 3. the sum of the values of f˜∗ (h)) on the faces of S is 0; the invariant formulation19 of this is that < [S], f˜∗(h)) >= 0, where [S] here denotes the fundamental 2-cycle of the sphere20 Furthermore, we demand that any diagram D′ obtained from D in the triple (D, f˜, h) by diamond moves be observable if the original triple is observable (the 2-cells of D′ are mapped in the same way as those of D, so condition 3 is preserved). Another way of formulating the last condition is to give a van Kampen diagram f˜ : D′ → K̃ and 2-cochain h ∈ C 2 (K̃, M ) such that after a sequence of diamond moves on D′ one obtains either a fundamental particle D or a spherical diagram S → K̃ satisfing 1–3. In the latter case, if D = S, then the boundary label of D′ must have been freely trivial, so that S was obtained by sewing up the boundary completely. In all cases, D′ has at most four 2-cells, where the case of four 2-cells is the case of the freely trivial boundary label (this is also the case where the particle is its own antiparticle). Note that the invariant formulation of condition 3 above is automatically satisfied for a coboundary h = δc, with c ∈ C 1 (K̃, M ); that is, < f˜∗ [S], δc >= 0, because [S] is a cycle and < [S], f˜∗(h) >=< f˜∗ [S], δc >=< ∂ f˜∗ [S], c >=< f˜∗ (∂[S]), c >= 0 by adjointness. The main result of this section is a converse. Theorem. If we let k = f˜∗ (h), with f˜ : S → K̃ and h ∈ C 2 (K̃, M ) as above, and if 1–3 are satisfied, then k = δ f˜∗ (c) for some cochain c ∈ C 1 (K̃, M ). Sketch of proof. We sketch the argument for the proton, namely, Figure 3. The cases of the neutron and the antiparticles follow by applying the symmetries of interchanging a and b and of reversing all arrows, as in §3. Since we have to consider spherical diagrams, we consider Figure 3 together with the face at infinity, which is a lepton. We pick a coloring of the finite faces, say x, y, z where these are colors chosen without repetition from [0], [1] and [2], read from left to right. The color of the face at infinity is white, namely 0. Then the conditions on c restricted to f˜(S), the image of S under f˜, are four linear equations in five unknowns c(a0 ), c(a1 ), c(a2 ), c(b1 ), c(b2 ) on the left side (referring to the notation of Figure 3), with variables x, y, z on the right side. For example, the first 19 The notation < x, y > means to result of evaluating a cochain y on the chain x. ∈ C2 (S, Z) is the sum of the oriented 2-cells in cell decomposition of the 2-sphere S. It is readily checked that [S] is a 2-cycle. 20 [S] TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 13 of these equations, corresponding to the face at infinity, is c(a0 ) + c(a1 ) + c(a2 ) = 0. When we row reduce the system, the last row of the row reduction corresponds to the equation equation 0 = x + y + z. But this compatibility condition is satisfied because x + y + z = [0] + [1] + [2] = 0, by the definition of M . So the equations are solvable. This determines c on f˜(S)(1) . Then we extend c in any way to all of K̃ (1) , thereby completing the argument. Remark. Electric charge of a composite particle is given by the coboundary of a 1-cochain h on K. Namely define h to be 13 on an edge labeled a, − 13 on the oppositely oriented edge, and h of an edge labeled b with any orientation is defined to be 0. Then δh ∈ C 2 (K, R) calculates the net electric charge of any van Kampen diagram. In observable particles the electric charge must be an integer. Note that to calculate color, we must use cochains on K̃ (the two faces in Figure 2 that represent up quarks have different colors in the proton because they lift to different 2-cells in K̃), whereas electric charge can be defined from the projection into K. Remark. The weak isospin T3 of particle in SM21 governs how it interacts in the weak interaction. It is analogous to electric charge and is given by the coboundary of the 1-cochain w determined by w(a) = 16 , w(ā) = − 61 , w(b) = 61 , w(b̄) = − 16 . In the higher generations, one projects first from K̃ to K and then applies w to determine the weak isospin. Consequently, three of the fundamental forces of nature, the strong and weak nuclear forces and the electric charge, are determined by coboundaries of 1-cochains with different value groups. This is a remarkable unifying property and serves to strengthen our case that SM is the algebraic topology of the covering map K̃ → K.22 There is no evidence at present that gravity fits into this scheme, and indeed it would be most remarkable (and stretch the imagination nearly to breaking point) if it too were determined by the coboundary of a 1-cochain. As a last tidbit for this section in response to requests we draw an avatar of Higgs boson below in Fig. 4. The argument that this is correct is deferred to the sequel article on bosons. 21 http://en.wikipedia.org/wiki/Weak 22 See interaction the Appendix below for a historical perspective on this assertion. 14 STEVE GERSTEN Figure 4 §6. Neutrino oscillations This section gives a physical interpretation for the processes in Z2 (K̃) = π2 (K) which are not lifts of processes from Z2 (K). For many years it was a mystery that the observed neutrinos coming from the sun were a third of the predicted value. The explanation finally provided was that a neutrino in free space oscillates between the three types, electron neutrino νe , muon neutrino νµ , and tau neutrino ντ . Since only νe was observed in the experiment, what we observe is only a third of the actual production from nuclear reactions (due to β-decay) in the sun. We begin by noting that, by an Euler characteristic computation, the rank of Z2 (K̃) is 8. We can account for 6 free generators by lifts of the classes in π2 (K) represented by the spherical diagrams in Figures 1 and 2. We shall now account for the other two free generators. Let ν̃ denote a lift of the 2-cell eκ in K, where κ = [bbb]. Let g be a generator for the covering group G ∼ = Z/3Z of K̃. Then an easy calculation shows that gν̃ − ν̃ ∈ Z2 (K̃) = H2 (K̃). This class is in the kernel of the projection H2 (K̃) → H2 (K), so it is undetectable in K. We also have the class g(gν̃ − ν̃) = g 2 ν̃ − gν̃ in the kernel. A calculation shows that these two chains are linearly independent in C2 (K̃) and hence in Z2 (K̃). It follows that we have accounted for the extra two free generators of Z2 (K̃) that do not arise from lifts of cycles in K.23 Now recall our premise from §3 that processes involving fermions arise from 2cycles. Thus gν̃ − ν̃, g 2 ν̃ − gν̃, and ν̃ − g 2 ν̃ are processes; these processes exchange the three neutrinos νe , νµ and ντ in cyclic fashion, accounting for the oscillation of neutrinos. Of course we cannot deduce from the topology alone the rates of 23 Z (K̃) maps onto Z (K), as follows from the Proposition of §3, and Z (K) is free abelian, 2 2 2 so the kernel is a direct summand; it follows that it is of rank 2. TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 15 the processes, so this is all the information we can hope to gain from this type of argument about neutrino oscillation. Now we can replace b by a in the argument above and deduce that there exist processes which exchange cyclically the electron, muon, and tau particle. Such oscillations have not yet been detected in the laboratory. There is fortunately a check for the correctness of these ideas, as follows. The process by which the muon decays is24 µ− → νµ + e− + ν̄e . Now µ− = gẽ, where ẽ is the lift of the electron to K̃ and g is as above a generator for the covering group. Also νµ = gν̃e , where ν̃e is the lift of νe , the electron neutrino. Bringing all terms to the left side, the decay process above is compatible with our theory if gẽ−gν̃e − ẽ+ ν̃e is a 2-cycle in Z2 (K̃). But this last expression is (g −1)ẽ−(g −1)ν̃e , which is indeed a 2-cycle. §7. Questions and comments 1. Shupe’s ”no mixing rule” ([Sh] p. 88), which states, on our terminology, that aab̄,ab̄b̄, and their inverses do not occur in the construction of the complex K, is at the heart of this paper. In the sequel paper on bosons, we offer a justification for this rule. 2. There is an uncanny symmetry in this model. Namely the Klein four-group, which appears as the subgroup of Aut(F ) consisting of the identity, {a, b} → {b, a}, {a, b} → {ā, b̄}, and {a, b} → {b̄, ā}, acts on the theory. This symmetry demands further explanation. 3. The definition of the 2-complex K looks arbitrary although it arose naturally from a reinterpretation of the work of [Ha] and [Sh]. I can prove the following result which may serve to motivate it for mathematicians. Theorem. There exists an infinite dimensional CW-complex L with finite nskeleton for all n ≥ 0 with the following properties. (1) L is contractible; in particular it is simply connected. (2) L is acted on freely and cellularly by the group G = Z/3Z; hence the projection L → L/G is the universal covering. (3) L(2) = K̃. (4) L(2n+1) is homotopy equivalent to S 2n+1 for all n ≥ 1. The argument makes use of the periodic resolution for Z over Z[G], which is modified in low dimensions (≤ 3) to account for the unusual presentation P for G. It follows from the theorem that L is homotopy equivalent to BG, the classifying space of principal G = Z/3Z fibrations, which is a space of type K(G, 1). Question. Can K̃ be equivariantly imbedded in S 5 for the G = Z/3Z-actions? Here G acts on S 5 by the diagonal action of third roots of unity on the unit vectors of C3 . In the sequel paper we show that K̃ imbeds equivariantly in S 2n+1 for n sufficiently large (n ≥ 6). 24 See http://en.wikipedia.org/wiki/Muon 16 STEVE GERSTEN Appendix 1. Historical remark C-N Yang [Ya] relates a conversation he had with Andre Weil in which the latter suggested that the particles that were being discovered might be explained by “geometry and topology”. Yang writes that he did not understand this, and no one at the meeting thought to ask him what he meant. As far as Weil’s suggestion about geometry, that has proved to be correct in the development of Yang-Mills theory. But there is no precedent in the literature that what he had in mind may also have included pure topology. Appendix 2. Color group M and A2 This Appendix will relate the color group M to A2 , which is the root system for SU(3); this lie group is known to physicists as the theory that describes the strong nuclear force. The notation follows §4 for the definition of M . As usual G denotes the cyclic group of order 3 and g is a generator. We make the complex numbers C into a G-module by letting g act by multiplication by ζ = e2πi/3 , a primitive third root of unity. Geometrically this represents a rotation through 120 degrees. Theorem. The map g → ζ extends to an homomorphism of G-modules φ : Z[G] → C with the properties that (1) (2) (3) (4) the image of φ is Z[ζ], the subring of C generated by ζ and the unit element, the kernel of φ is N Z[G] = (1 + g + g 2 )Z[G], so φ induces an isomorphism M → Z[ζ], and the images of the colors ±[j], where j = 0, 1, 2, form the root system A2 ; thus φ(±[j]) = ±ζ j comprise the set of sixth roots of unity in C. For example let us prove that the kernel of φ is the ideal generated by N = 1 + g + g 2 in Z[G] and that φ induces an isomorphism M → Z[ζ]. The element N is in the kernel since ζ is a primitive third root of unity, so satisfies the polynomial 3 −1 . The rank of Z[ζ] is 2, since it is the set of algebraic integers in 1 + z + z 2 = zz−1 an algebraic number field Q[ζ] of degree 2 over the rationals Q. So a rank count shows that the induced map M → Z[ζ] is an isomorphism. Appendix 3. Conservation laws in SM and quantum numbers In §1 it was pointed out that the fundamental conservation law involving preons is that the net numbers of a′ s and b′ s are individually conserved in a reaction predicted by SM. From this followed the result that there are only three generations of fundamental fermions of SM, etc. In this appendix we shall define conservation laws and quantum numbers for elementary particles and show that, if we consider lifts to the universal cover K̃, then the preon number for a lift ai or bi of a preon is a quantum number. It follows that there is no theoretical reason that one cannot detect the preon number directly. TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 17 Definition. A conservation law in A, where A is a ring with unit, is a 2-cochain c ∈ C 2 (K̃, A) = Hom(C2 (K̃, Z), A) such that < z, c >= 0 for all z ∈ Z2 (K̃, Z). Here < z, c > is the result of evaluating c on the chain z to yield an element of A. A quantum number for the conservation law c is the result of evaluating c on a particle (that is, on a van Kampen diagram in K̃). The reason this is called a conservation law is that a reaction is given by κ1 + κ2 + · · · + κp → λ1 + · · · + λq , so it follows that c(κ1 ) + c(κ2 ) + · · · + c(κp ) = c(λ1 ) + · · · + c(λq ).25 By adjointness, it follows that, if c = δh with h ∈ C 1 (K̃, A), then c is a conservation law.26 Thus it follows from the remarks of §5 that electric charge and weak isospin T3 are quantum numbers with values in R. The next result says the converse is true. Proposition. If c ∈ C 2 (K̃, A) is a conservation law, then c = δh for some h ∈ C 1 (K̃, A). Thus the set of conservation laws in A is B 2 (K̃, A). Proof. We are given c ∈ C 2 (K̃, A) = Hom(C2 (K̃, Z), A) such that c vanishes on Z2 (K̃, Z) ⊂ C2 (K̃, Z). By the universal coefficient theorem27 , H 2 (K̃, A) = Hom(Z2 (K̃, Z), A), where we have used the facts that H1 vanishes (since K̃ is simply connected) and H2 (K̃, Z) = Z2 (K̃, Z) since there are no 3-cells. Also Z 2 (K̃, A) = C 2 (K̃, A) since every 2-cochain is a 2-cocycle. Thus H 2 (K̃, A) = C 2 (K̃, A)/B 2(K̃, A) = Hom(Z2 (K̃, Z), A). This may be expressed as the short exact sequence 0 → B 2 (K̃, A) → C 2 (K̃, A) → Hom(Z2 (K̃, Z), A) → 0. Also we have the surjective map C 1 (K̃, A) ։ B 2 (K̃, A), which may be spliced with the first map in the short exact sequence to yield the exact sequence δ C 1 (K̃, A) − → C 2 (K̃, A) → Hom(Z2 (K̃, Z), A) → 0. Now c ∈ C 2 (K̃, A) = Hom(C2 (K̃, Z), A) and the map on the right in the last exact sequence is obtained by restricting a homomorphism to Z2 (K̃, Z) and then considering the image to lie in A via the map Z → A. It follows that the image of c in Hom(Z2 (K̃, Z), A) is zero, and, by exactness, c = δh for some h ∈ C 1 (K̃, A).  Let us specialize now to the case A = R. Then C 2 (K̃, R) is of dimension 12 while the rank of Z2 (K̃, Z) was calculated in §6 to be 8. It follows that the dimension of B 2 (K̃, R) is 4, and hence there are 4 linearly independent conservation laws in SM.28 Let us focus attention on one that has not been mentioned before. Let f ∈ 1 C (K̃, R) be given by f (ai ) = 13 , f (bi ) = − 31 , f (āi ) = − 31 , f (b̄i ) = 13 , for i 25 κ 1 + κ2 26 If z is a + · · · + κp − λ1 − · · · − λq is a 2-cycle on K̃, whence c vanishes on it. 2-cycle on K̃, then < z, c >=< z, δh >=< ∂z, h >= 0. 27 http://en.wikipedia.org/wiki/Universal coefficient theorem 28 The same result holds for every field. 18 STEVE GERSTEN (mod 3). If h and w are 1-cochains on K̃ determining charge and weak isospin T3 respectively (in the notation of §5), then f = 2(h − w). This identifies δf with the weak hypercharge YW .29 We can calculate the vector space B 2 (K̃, R) of conservation laws over R as follows. We have B 2 = C 1 /Z 1 where Z 1 = B 1 . From these relations we see that Z 1 (K̃, R) is the set of functions f on the 1-cells ai , bi of K̃ so that f (ai ) = f (bi ), f (a0 ) + f (a1 ) + f (a2 ) = 0, for i (mod 3). This is a 2-dimensional subspace of the 6-dimensional space C 1 , so the 4-dimensional quotient B 2 can be effectively determined. Here is the result of this calculation. If we let x be one of ai , bi , i (mod 3), we define ∆x ∈ C 1 (K̃, R) by ∆x (x) = 1, ∆x (x̄) = −1, and ∆x (y) = 0 for all other y. Then for each lift κ̃ of an elementary fermion κ30 we have δ∆x (κ̃) = +1 if the boundary label of κ̃ contains x, ∆x (κ̃) = −1 if the boundary label contains x̄, and ∆x (κ̃) = 0 otherwise. Proposition. for each lift κ̃ collection of 4 independent. For each x ∈ {ai , bi }, i (mod 3), δ∆x is a conservation law, and of an elementary fermion δ∆x (κ̃) is a quantum number. For any of the 6 lifts ai , bi the corresponding conservation laws are linearly  Remark. The proposition provides a test for the structure of the proton p proposed in Figure 2. For any lift p̃ of p to K̃, we see that δ∆ai (p̃) = 1 for all i (mod 3). This structure also has the consequence that the two lifts of u in p̃ must be of different generations, as was pointed out in the footnote of §4. If we tried the structure z = [a0 a1 b2 ] + [b̄2 b̄1 ā0 ] + [a0 a1 b2 ] instead (which projects to 2u + d but is not the continuous lift given by covering space theory), we would find δ∆a0 (z) = 1, δ∆a1 (z) = 2, δ∆a2 (z) = 0. So these new quantum numbers may be useful tools in determining the structure of composite particles as van Kampen diagrams. Appendix 4. β-decay revisited When I explained to a physicist how van Kampen diagrams gave a consistent interpretation to the ideas of [Ha] and [Sh], which solved many of the open problems these papers posed, he expressed interest in seeing in detail how β-decay works from the topological point of view (the point of view of Feynman diagrams is wellknown31 d → u + e− + ν̄e but that leaves unexplained what is actually happening at the vertices of the Feynman diagram). Examine Figure 5 below. 29 http://en.wikipedia.org/wiki/Hypercharge. In the form Q = I + 1 Y the relation is attrib3 2 uted to Gell-Mann and Nishijima. 30 So κ is either an electron, neutrino, quark or an antiparticle of one of these. 31 http://en.wikipedia.org/wiki/Beta decay TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 19 Figure 5 The left half of the diagram is the down quark d whereas the right half is the Higgs boson. The latter is obtained from the spherical diagram Figure 1 by making two cuts along edges labeled a and b and splaying the result out as a van Kampen diagram in the plane; so this yields is a 2-cycle and acts on the van Kampen diagram for d in the manner described in §3 following Remark 1.32 The faces labeled d and d¯ are mapped mirror-wise across their common edge, so we may do a reduction, removing the pair and that edge, and sew up the hole to create the diagram Figure 6 below. Figure 6 32 This description is purely topological and ignores entirely the question of magnitude of energies involved. So the Higgs in question is of the nature of a virtual particle, arising from the vacuum state only ephemerally and disappearing immediately after interacting with the down quark. 20 STEVE GERSTEN The two shaded faces are e and ν̄e which are now shed to leave the up quark u. So the net result is the reaction d → u + e− + ν̄e . As a parenthetical remark, we observe that the union of those two shaded faces constitute the W − boson, so the reaction can be rewritten as the composite of two reactions, d → W − + u and W − → e− + ν̄e . Appendix 5. ∆++ baryon Professor Wu challenged me to describe the ∆++ baryon33 in my terms. The result is shown below in Figure 7. Figure 7 33 en.wikipedia.org/wiki/Delta baryon TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 21 It shows three u quarks with a single vertex in common (like the radiation hazard sign). The spin of the resulting particle is 23 , while the remarks of §5 show how to calculate that the electric charge is 2 and the weak isospin T3 is 23 . The second diagram on the right shows how to imbed ∆++ in a diagram with 6 faces and freely trivial boundary label, so the enlarged diagram folds up to a spherical diagram and represents a 2-cycle. That 2-cycle is 0, for the diagram is completely reducible. All other spherical diagrams previously considered here have 2 or 4 faces, so this is the first where 6 faces are needed. That fact by itself makes Professor Wu’s question interesting and motivated me to include it here. Appendix 6. Quantum numbers and the first Chern class In §5 electric charge was interpreted as the coboundary of a 1-cochain on K̃ which is evaluated on particles (that is, on van Kampen diagrams). This is satisfactory from the point of view of algebraic topology but it is desirable to have a direct geometric interpretation. The answer given below is that charge, up to a factor of 1 , is the first Chern class of an explicitly constructed line bundle. This involves an 3 interpretation of the preons a and b as sections of a complex line bundle, which is then pursued to deal with other quantum numbers. Let D be the van Kampen diagram for a fundamental fermion of SM, so D represents a positron, an up quark, an anti-down quark, or an electron neutrino,. We view D as a map to K; as pointed out in §5, charge is defined on K and pulls back to K̃ via the covering map K̃ → K. Thus the boundary label of D is either aaa, aab, abb, or bbb. The cases of their antiparticles involve only a change of sign in the construction. Thus the boundary of D is subdivided into 3 segments, each of which is mapped onto an edge a or b of K, and the end points of the segments are mapped to the unique vertex of K. Consider the trivial U (1)-bundle D × S 1 over D. Here U (1) = S 1 is considered as the unit interval I = [0, 1] in R with end points identified, S 1 = I/0 ∼ 1. Define a section σ of the bundle over the boundary ∂D of D by the identity map of S 1 beginning at the base point 0 over each segment labeled a and by the constant map 0 over the segment labeled b. Note that if we consider this section as a map fσ : S 1 → S 1 , the degree of the map is 3, 2, 1 or 0 in the respective cases aaa, aab, abb, or bbb. Theorem 1. The electric charge of the fermion is 13 of the first Chern class in H 2 (S 2 , Z) ∼ = Z of the complex line bundle over S 2 with clutching function fσ .34 Remark. Equivalently, the electric charge is the obstruction to extending σ to a never-vanishing section of the trivial line bundle D × C over D, up to a factor of 13 ; here S 1 is considered as the image of the exponential map t 7→ e2πit in C, 0 ≤ t ≤ 1. 34 For the notion of clutching function, see en.wikipedia.org/wiki/Clutching construction or Hatcher’s book on vector bundles http://www.math.cornell.edu/∼hatcher/VBKT/VBpage.html, p. 22. 22 STEVE GERSTEN Proof of Theorem. The first Chern class of the line bundle is the degree of the clutching function fσ : S 1 → S 1 . Next we generalize the construction just made to other quantum numbers. We do the construction in K̃ rather than in K, as we did in the case of electric charge, which is invariant under deck transformations of the covering map K̃ → K, since we want to allow the possibility of quantum numbers that are not invariant under deck transformations. If αi and βi are integers, i mod 3, let F be the section of the trivial U (1) bundle over K̃ (1) defined by maps of S 1 to itself of degree αi over edges ai and βi over edges bi . The obstruction to extending F over all of K̃ (which depends only on the integers αi , βi and not on representative maps) can be calculated as follows. Let eκi be one of the 2-cells of K̃. Then the section F is defined over the boundary ∂eκi of eκi , which is a covering κi of one of the fundamental fermions κ (so κ is one of [aaa], [aab], [abb] or [bbb] or their inverses). Let Sκi be the 2-sphere which consists of two identical copies of eκi glued along their common boundary by the identity map, and let Lκi be the complex line bundle over Sκi given by the clutching function F . Then the obstruction to extending F over eκi is the first Chern class c1 (Lκi ) ∈ H 2 (Sκi , Z) ∼ = Z. Thus the obstruction to extending F over all of K̃ is the collection of first Chern classes c1 (Lκi ) ∈ Z. This amounts to 24 integers, counting lifts of antiparticles of the fundamental fermions. Call this 24-tuple of integers qF . Theorem 2. For every conservation law c ∈ B 2 (K̃, Q) there is a section F of the trivial U (1) bundle over K̃ (1) and a positive integer N so that N1 qF is the collection of quantum numbers associated to c. The collection qF is given by the first Chern classes of complex line bundles Lκi constructed above. For the proof one takes h ∈ C 1 (K̃, Q) so that δh = c, where N is a number that clears all denominators. Then one applies the construction of the preceding paragraph to N h. Example. If h(ai ) = 1, h(bi ) = 0 for all i (mod 3) and N = 3, then we obtain the electric charge lifted to K̃. Another way of stating the result is as follows. Let X denote the double of K̃ along K̃ (1) . So X consists of two disjoint copies of the 2-complex K̃ identified along their common subcomplex K̃ (1) . Take two copies of the trivial complex line bundle over K̃ and identify them over K̃ (1) by the isomorphism given by F . This produces a line bundle L over X. Then c1 (L) ∈ H 2 (X, Z) contains all the information in the collection qF . Namely, if we take the double of the 2-cell eκi lying inside X, this is an imbedded copy of the 2-sphere Sκi . So we can restrict the bundle L to Sκi and take its first Chern class, thereby recovering the quantum number up to the factor of N .35 35 The construction of the bundle L from the data F mimics the clutching function construction for bundles over spheres. It works because X \K̃ (1) is a disjoint union of cells each of whose closures TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 23 There is a formal way to incorporate the multiplicative factor N into the answer. One considers the group Pic(X) ⊗ Q where Pic(X) is the Picard group of isomorphism classes of complex line bundles under the operation of tensor product and Q is the rational numbers. The element L ⊗ N1 is then an invariant of the conservation law c over Q and incorporates all the quantum numbers by the operation of taking the first Chern class. Example. Consider a lift ẽ of the electron to K̃, so ẽ is a 2-cell with boundary label [ā2 ā1 ā0 ]. The 2-sphere Sẽ is the double of the closed cell ẽ over its boundary. If we take the electric charge as the conservation law, then the map of the boundary ∂ẽ to U (1) has degree −3 and N = 3. The element L ⊗ 13 of Pic(X) restricted to Sẽ is the complex line bundle over Sẽ with clutching function a map of degree −1 of the circle to U (1). This is the tautological line bundle over CP 1 whose associated principal bundle with fibre U (1) = S 1 is the Hopf fibration over Sẽ . In terms of algebraic geometry, this is the bundle O(−1) over CP 1 . If instead of the electron we take a lift of the positron, the result is the hyperplane bundle O(1) over CP 1 . In more colorful language, the charge of the electron is the Hopf bundle and the charge of the positron is the hyperplane bundle over CP 1 . Remark. The 2-complex X, constructed in this section as a formal device for relating conservation laws to complex line bundles, plays a fundamental role in the sequel paper on bosons. It will be shown there that the Higgs mechanism for generating masses of particles in SM can be understood in terms of the geometry of X and that the involution interchanging the two copies of K̃ and fixing K̃ (1) can be understood as changing handedness of particles (left for right and right for left). As pointed out in the lead paragraph of this section, we have given a direct geometric interpretation for the preons a, b as maps of one circle to another (from a closed 1-cell of K to U (1)), of degree 1 for a and degree 0 for b. Such an interpretation is lacking in [Ha] and [Sh], where the preons are merely labels. An open problem is to explain why nature chose this strange mechanism K, K̃, X for particle physics and why the number 3 as in 3-fold covering space. Appendix 7. Colorings as conservation laws In this appendix we give examples of conservation laws where the coefficient ring A is the color group M . We shall use the isomorphic ring Z[ζ] (see Appendix 3) where ζ = e2πi/3 . Recall that in this model the color set A2 is the subset ±ζ j where j ranges over the integers modulo 3. Definition. A coloring of K̃ is an element c ∈ B 2 (K̃, Z[ζ]) such that (1) c vanishes on every lepton, and (2) c assumes all the elements of {1, ζ, ζ 2 } as values on the set of lifts of the up quark aab and also on all the lifts of the down quark āb̄b̄. in X is an imbedded disc. So the argument for characterizing bundles over spheres by clutching functions works for characterizing bundles over X. 24 STEVE GERSTEN Condition (1) is means physically that leptons do not feel the strong force. It follows from (2) that c cannot assume the same value on two different 2-cells of K̃ which lift the same quark of K. Since c is a coboundary, c vanishes on all 2-cycles. Since c is a cochain, c(κ) = −c(κ̄), where κ̄ is the oppositely oriented 2-cell to κ. It is not immediately clear that there are any colorings (the catch is to show that a candidate cochain vanishes on all 2-cycles in Z2 (K̃, Z)). That is the content of the next result. Theorem. There are six colorings of K̃, which are hence conservation laws with values in Z[ζ]. Proof of theorem. The crux of the argument consists of constructing a family of elements of B 2 (K̃, Z[ζ]). This will be done by explicit construction of 2-cochains which vanish on π2 (K̃) = Z2 (K̃, Z). We recall from §6 that Z2 (K̃) =: Z2 (K̃, Z) is a free abelian group of rank 8. Two of the free generators are leptonic in the sense that they are of the form gκ − κ, where κ is a lift of a lepton and g ∈ G ∼ = Z/3Z, so any observable cochain will vanish on them. Thus there are six remaining linear conditions of vanishing that must be satisfied. The six vanishing conditions arise from the lifts of the spherical diagrams represented by Figures 1 and 2. It is easier to visualize these in terms of van Kampen diagrams, so we make cuts along edges to obtain disc diagrams; for convenience we have shown one lift each of the two disc diagrams below in Figure 8 (one can check that these are obtained by cutting spherical diagrams along edges since the boundary labels are freely trivial). Figure 8 The left figure is a lift of the diagram for the Higgs boson that participates in β-decay (see Figure 5 in Appendix 4). We make the convention that the bottom triangle labeled d˜ represents the down quark. It follows that the top triangle labeled TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 25 ˜ is the anti-particle to the up quark (since β-decay does not mix the generations ū of quarks). The two remaining triangles are leptons. So the vanishing condition on ˜ = c(ũ). Similar conditions must the cochain c we are attempting to construct is c(d) hold in the other generations, since the process of β-decay lifts to these generations (see §3). Thus we obtain additional conditions c(g d̃) = c(g ũ) for all g ∈ G. This gives three of the six linear conditions that c must satisfy to be an observable cochain. ˜ ∈ {1, ζ, ζ 2 }, g ∈ G, may be chosen in any manner so as The three colors c(g d) to satisfy that they exhaust this set of colors. That means there are six choices of potential cochains if we consider their values restricted to the lifts of the down quark. But the conditions c(g d̃) = c(g ũ) of the previous paragraph determine completely the cochain c, since the value of c on leptons is 0. It remains to establish that each of these six cochains vanishes on cycles Z2 (K̃). We pass to the diagram on the right in Figure 8. The bottom triangle is seen ˜ and a calculation shows that the left and right triangles are g 2 ũ and to be d, g ũ respectively.36 The top triangle is a lepton, so is assigned 0 by the cochain c under construction. Thus the values of c on the quark 2-cells in the diagram are ˜ c(g ũ)} = {c(g 2 d), ˜ c(d̃), c(g d̃)} = {1, ζ, ζ 2 } The same result holds for {c(g 2 ũ), c(d), all translates of the diagram by g ∈ G. But 1 + ζ + ζ 2 = 0 in Z[ζ], so it follows that the three remaining linear conditions are satisfied and that all six cochains c vanish on Z2 (K̃). Hence, by the first proposition of Appendix 3, c ∈ B 2 (K̃, Z[ζ]).  Example. If we consider the coloring c given by d → 1, gd → ζ, g 2 d → ζ 2 , u → 1, gu → ζ, g 2 u → ζ 2 , then one can check that c = δL, for L ∈ C 1 (K̃, Z[ζ]), where L is given by L(bi ) = 0, i (mod 3), L(a0 ) = 1 + ζ 2 , L(a1 ) = 1 + ζ, L(a2 ) = ζ + ζ 2 . Other choices of H ′ with δH ′ = c differ from H by a 1-coboundary. If we apply a permutation σ of the set {1, ζ, ζ 2 } to obtain the 1-cochain Hσ , then their coboundaries δHσ give all six of the colorings as σ ranges over the set of permutations of the set S. Question. What additional physically meaningful conservation laws are there in other rings A? A banal example in Z/2Z is the number of particles modulo 2; this is an invariant since, physically, creation and destruction of particles occurs in pairs, or, mathematically, since all spherical diagrams in K̃ have an even number of faces. Appendix 8. Preons are determined by charge, color, and weak isospin Here we tie together all notions of this paper and prove that the preon number (net number of ai ’s and bi ’s) in the composition of elementary fermions of SM are determined linearly by four of the conservation laws of SM, namely, electric charge, weak isospin, and a color conservation law of Appendix 7 and its complex conjugate. 36 Recall g is the generator of the covering group G ∼ Z/3Z where g is given by a → 1, b → 1 = (mod 3). The action of g on the lifts ai , bi is to raise the indices by 1 (mod 3). 26 STEVE GERSTEN Recall from §5 that electric charge is determined as δh where h ∈ C 1 (K, Q) is given by h(a) = 13 , h(b) = 0. We lift h to K̃ and multiply by 3 to get H ∈ C 2 (K̃, Z) given by H(ai ) = 1, H(bi ) = 0 for i (mod 3). The conservation law δH ∈ B 2 (K̃, Z) ⊂ B 2 (K̃, C) will serve for our purposes the role of electric charge. Recall also from §5 the weak isospin is determined by δw, where w ∈ C 1 (K, Q) is given by w(a) = w(b) = 16 , We lift w to K̃ and multiply by 6 to get W ∈ C 2 (K̃, Z) given by W (ai ) = W (bi ) = 1 for all i (mod 3). The conservation law δW ∈ B 2 (K̃, Z[ζ] ⊂ B 2 (K̃, C) will serve for our purposes the role of weak isospin. Let L ∈ C 1 (K̃, Z[ζ]) be the element of C 1 (K̃, Z[ζ]) determined in the Example of Appendix 7, so L(bi ) = 0, L(a0 ) = 1 + ζ 2 , L(a1 ) = 1 + ζ, L(a2 ) = ζ + ζ 2 . We determined L there so that δL ∈ B 2 (K̃, Z[ζ]) ⊂ B 2 (K̃, C) is a color conservation law. If L̄ is the complex conjugate function, then, noting that ζ̄ = ζ 2 and ζ̄ 2 = ζ, we have L̄(a0 ) = 1 + ζ, L̄(a1 ) = 1 + ζ 2 , L̄(a2 ) = ζ + ζ 2 , and L̄(bi ) = 0. Note that L̄ is itself one of the color conservation laws; in fact L̄ = Lσ , where σ is the permutation of the set {1, ζ, ζ 2 } that interchanges ζ and ζ 2 and leaves 1 fixed. Note that L+L̄ = Re(L), where Re denotes the real part, so (L+L̄)(a0 ) = (L+L̄)(a1 ) = 1 and (L + L̄)(a2 ) = −2. Remark. If σ is an even permutation of the set {1, ζ, ζ 2 }, then Lσ is of the form ζ j L for some integer j, whereas L̄ is of the form Lσ for σ a transposition.37 We can now state the main result. Theorem. The four conservation laws δH, δW, δL and δ(L + L̄) are linearly independent elements of B 2 (K̃, C). Remark. We calculated in Appendix 3 the dimension of the vector space B 2 (K̃, R) to be 4 and pointed out in the footnote that the same result holds over every field; so it follows from the theorem that B 2 (K̃, C) has basis over C given by δH, δW, δL and δ(L + L̄). The next result follows immediately from the theorem; recall the definition of ∆x for x ∈ {ai , bi } from Appendix 3. Corollary. For each x ∈ {ai , bi }, i (mod 3), the conservation law δ∆x is a linear combination over C of the four conservation laws δH, δW, δL and δ(L + L̄). Remark. The significance of the corollary is that the preon composition of all of the elementary fermions considered in K̃ is completely determined by conservation laws of charge, weak isospin, and color. Consequently the preon composition of all composite particles (that is, the preons occurring in the boundary labels of their van Kampen diagrams in K̃) is completely determined by these four conservation laws. So one is able to check a hypothetical structure of a composite particle by calculating the appropriate linear combination of conservation laws on the constituents. 37 The fact that the six color conservation laws are related in this way is a reflection of the fact that S3 , the Weyl group of the root system A2 , is generated by a 3-cycle (multiplication by ζ) and a 2-cycle (complex conjugation). TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 27 Proof of theorem. Assume that a linear combination κδH +λδW +µδL+νδ(L+L̄) = 0, where κ, λ, µ, ν ∈ C. Evaluate this relation on a lift of the positron [a0 a1 a2 ], noting that δL and δ L̄ vanish on [a0 a1 a2 ], to get 3κ + 3λ = 0. Next evaluate the relation on a lift of the electron neutrino [b0 b1 b2 ] to get 3λ = 0. It follows that κ = λ = 0, so the linear combination simplifies to µδL + νδ(L + L̄) = 0. ˜¯ = [b b a ] and g d̄ ˜ = [b b a ]. Evaluate the relation µδL+νδ(L+L̄) = Note that d 0 1 2 1 2 0 ˜ ˜ ¯ ¯ 0 on d and on g d to get the equations µL(ai ) + νReL(ai ) = 0 for i = 2, 0; that is, µ(ζ + ζ 2 ) − 2ν = 0 and µ(1 + ζ 2 ) + ν = 0. These equations have the unique solution µ = ν = 0, so the only linear relation among δH, δW, δL and δ(L + L̄) is the trivial relation. It follows that they are linearly independent, and the theorem is established. The theorem of color conservation suggests that restrictions on particles (van Kampen diagrams in K̃) can be directly related to K̃. With this in mind, we make two definitions. Definition. An admissible particle is a van Kampen diagram f : D → K̃ satisfying (1) for each pair α, α′ of distinct 2-cells in D similarly oriented representing quarks with f (α) = f (α′ ) there is a coloring c ∈ B 2 (K̃, Z[ζ]) so that c(f (α)) 6= c(f (α′ )), and (2) at most two leptons appear in D, and their images under f are not conjugate under the covering group G; that is, if α and α′ distinct similarly oriented 2cells of D which represent leptons, then there is no g ∈ G so that g(f (α)) = f (α′ ). Condition (1) is independent of which conservation law c is chosen to apply in the definition. This follows from the fact that all the 6 possible candidates for c are related to each other by translation by ζ j or by complex conjugation, as we remarked earlier. The lepton condition (2) is more speculative; the justification is that it is difficult to see how, for example, an electron neutrino νe and a muon neutrino νµ can bind together inside a particle. However νe and ν̄µ together give one of the free generators of π2 (K̃) which was used in §6 to give a topological explanation for neutrino oscillations. On the other hand, the electron e− and electron anti-neutrino ν̄e are similarly oriented in the van Kampen diagram for the Higgs particle; but they have different preon representations which are not conjugate under the covering group G. Definition. An admissible particle f : D → K̃ is observable if the sum of the values of any cochain c ∈ B 2 (K̃, Z[ζ]) on the faces f (α) is 0, where α ranges over the 2-cells of D. By what was remarked, if the condition is satisfied for one color conservation law, it is satisfied for all of them. 28 STEVE GERSTEN Remark. The admissibility condition incorporates the Pauli exclusion principle, that two bound fermions cannot have the same quantum numbers. The observability condition strengthens the color conservation laws; it says no color can leak out of an observable particle. It is a way to formulate the experimental observation that no isolated quark has ever been observed.38 Ansatz 39 . All particles of SM are admissible; thus even virtual particles that participate in reactions but are not observed are admissible. All particles that can be detected in an experiment satisfy the observability condition. Open problem. Give a consistent geometric model that explains the algebraic conditions in the definitions of admissibility and observability of particles. That is, the appearance of the Eisenstein integers Z[ζ] suggests that there is a discrete geometry underlying these conditions, but I do not yet know what this geometry is. Appendix 9. Dark Matter An open problem (contrary to one of the criticisms recalled in the Disclaimer in the final section, that there are no open problems) is to determine the nature of dark matter. Observations beginning with Zwicky in the 30’s have shown that there is more matter in galaxies than can be accounted for by observed light sources. I shall make a proposal here based on my model for what this dark matter is. First I list properties that dark matter must possess. (1) It must be stable over the life of a galaxy. Otherwise one could reconstruct it from its decay products. (2) It must not interact with photons, the carriers of electromagnetic force. (3) The only long-range force it can interact with is that of gravity, to account for those observations mentioned above. Observe that there is no condition on colourings, since dark matter is by assumption not observable except for its gravitational effect. In our model a van Kampen diagram in K̃ whose boundary label involves no a’s satisfies 2 and 3 above. All the interior a’s cancel so are not visible to outside light sources. Since such a diagram represents matter, it is subject to gravity. What is not clear is that such matter can be stable.40 38 Color can however have an indirect second order effect on distinct particles by exchange of virtual particles, similar to the way van der Waal forces affect molecules even though the individual atoms are electrically neutral. 39 An Ansatz is an educated guess that is verified later by its results. Source: http://en.wikipedia.org/wiki/Ansatz 40 The van Kampen diagram (or spherical diagram) has the same relation to a particle as the program for a Jacquard loom has to the fabric design it creates. That is, the van Kampen diagram is not the particle itself but is a program for creating the particle. So for example one of the criticisms in the disclaimer was that the photon has no structure as far as anyone has observed, yet the spherical diagram for it involves the diagrams for both the electron and positron. The program has compound structure but the design it creates does not, as far as anyone has determined. In analogy with DNA and the cell, by now DNA is well understood, but TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 29 It is unlikely that the neutrino is a candidate for dark matter. It has mass but it is very small (and is as yet undetermined) and propagates at nearly the speed of light. So it seems unlikely to be gravitationally bound to a galaxy. The neutron is also unlikely to be a candidate, since free neutrons are unstable via beta decay. It seems unlikely that such a weak force as gravity could stabilize otherwise free neutrons in a galaxy. However there is an algorithmic process for creating from the neutron an infinite collection of particles satisfying 2 and 3. I do not know how to make calculations of mass or half-lives, so I do not know whether any of these particles are stable over the life of a galaxy. This was one of the basic criticisms of the Disclaimer for which I lack the tools to answer, namely, to calculate masses. Construction. Given a van Kampen diagram D and an interior vertex v, we may form for each n ≥ 2 the branched cyclic cover. Recall this means we remove v and form the cyclic covering of degree n of the punctured domain, then sew in a subdivided disc to obtain a new van Kampen diagram D′ . Alternatively, one can take the one-point compactification of the covering, and note it is a van Kampen diagram. If D has edge label only involving b’s, then the same is true for D′ . Hence if D satisfies 2 and 3 above, then so does D′ Example. Let D be a van Kampen diagram for the neutron; for example, in Figure 2 interchange the letters a and b, to get D. There is a single interior vertex, so for each n ≥ 2 there is a unique branched cyclic cover Dn of D, and this satisfies 2 and 3. I pose the open question whether any of these represent stable particles, which is the same as asking whether all possible decay modes have higher energy. Appendix 10. Nucleogenesis I suggest here only the germ of a topological theory of origin of chemical elements. The models resemble those of organic chemistry. Consider the deuteron shown below in Figure 9. the machinery by which this creates a new organism, or even that of cell division, is not presently understood. Similarly in the Appendix 10 I create programs for chemical elements. This is not in conflict with the liquid ball model consisting of floating protons and neutrons but rather indicates a hidden structure, in effect a rigid crystal model that underlines this model. 30 STEVE GERSTEN Fig. 9 The top part of the diagram is the proton while the bottom is the neutron; the up and down quarks are labeled u and d respectively. In fact two diamond moves along the red lines produce a proton and a neutron, so this diagram can be achieved by interactions with photons and Z-bosons. As evidence for the correctness of this model, observe what happens when one takes branch covers about the central vertex. The 2, 3, 5, 6, 7, 8, 10, 12, 14, 16, 18, and 20-fold cyclic branched covers are respectively models for stable isotopes of 4 6 10 12 14 16 20 24 28 32 36 40 2 He, 3 Li, 5 B, 6 C, 7 N, 8 O, 10 Ne, 12 Mg, 14 Si, 16 S, 18 Ar, and 20 Ca; the last is TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 31 “the heaviest stable isotope made of the same number of protons and neutrons”.41 The upshot of this section is that stable isotopes of some of the chemical elements can be created by diagrammatic methods for van Kampen diagrams. I am unable to verify their stability myself for the lack of numerical methods for associating energy to diagrams.42 There is one more point to be discussed here and that is the process of Cloaking. Consider the diagram D for the deuteron in Figure 9, whose boundary edges labelled “a”, occur together as a group of three. Take two adjacent such edges and connect the end points of the interval of length 2 by an edge labelled “b” pointing the opposite direction. This has the effect of attaching (the projection from K̃ to K of) an up quark to the diagram. Then take the remaining edge labelled “a” on the boundary and attach to its endpoints two edges labelled “b”, that is, attach a down quark (always referring to the projection in K) to the diagram. The resulting diagram D′ , after attaching first the up then the down quark, is a new van Kampen diagram containing the original deuteron as a subdiagram, but all of whose boundary edges are labelled “b”. Thus all the charges have been “cloaked” in the interior and D′ is invisible to electromagnetic (EM) radiation. Also observe that D′ has a single interior vertex. So we may form branched cyclic coverings of D′ , each of which represents a particle. So all of the stable elements constructed earlier by branched covers can be cloaked so as to be invisible to EM radiation. As I admitted earlier I do not have the techniques to determine whether any of these particles are stable and hence candidates for dark matter. In fact the cloaking process can be carried out on any diagram, so any such can be cloaked so as to be invisible to EM radiation. This suggests, although does not prove, that dark matter should be as abundant as ordinary matter. Appendix 11. The dual picture and ∆++ test I have worked out the consequences of the Hattori-Shupe idea in terms of van Kampen diagrams, for which I have received considerable criticism (see the Disclaimer), and for which I was encouraged to write an introduction showing that this is a reasonable object to consider. In this section I want to point out a dual way of considering these objects which has the advantage of being more intuitive for physicists, and suggesting what computations must be done to test the theory. However in its simplest form it works only for van Kampen diagrams which are topological discs, and thus fails for singular van Kampen diagrams, such as that for the ∆++ baryon shown in Figure 7. After presenting the basic idea, I’ll take up the 41 Source: http://en.wikipedia.org/wiki/Magic number (physics) note that the energy should consist of two, possibly three, parts. Namely, there is the contribution from the 2 cells, which is the energy (or mass) associated to the 9 fermions, which is known from experiment. Second, there is the contribution from the edges, which should correspond to the contribution from the strong nuclear force, which holds the fermions together along these edges. And third, there is the contribution from the vertices, which must be taken into consideration in van Kampen diagrams for the Z and W bosons and for the ∆++ resonance which are singular disc diagrams, not topological discs. 42 But 32 STEVE GERSTEN modifications needed to handle singular diagrams. The advantage of van Kampen diagrams, in addition to not being restricted to topological discs, is that they occur in the category of CW 2-complexes, and thus are amenable to all the techniques of algebraic topology. The dual pictures I shall now discuss however are a hybrid object, belonging to graph theory with transversely oriented and labelled edges. Thus convenience for mathematicians is sacrificed for intuition for physicists. Now for the definition of the dual picture for a van Kampen diagram D. Begin by taking the first barycentric subdivision D′ of D and throw away all of D′ except only those edges D′ which join the barycenter of a face to the barycenter of an edge which is common to two faces. The closure of their point set union is the dual picture Γ. It is given the structure of a planar graph whose vertices are the barycenters of faces and whose edges are the union of the closures of two edges with a vertex (which must be the barycenter of an edge of D) in common. There is additional structure on Γ in that each of its edges has a transverse orientation and label given by the edge of D it intersects. The fundamental fermions are represented in Γ by its vertices and the edges connecting them represent the forces acting on them. As an example, the dual picture for a proton (or neutron) is a planar circle subdivided into two arcs with an edge connecting one of these vertices to a vertex in the exterior. Specifically, take the unit circle in the plane centered at the origin with vertices (±1, 0) together with the segment joining (1, 0) to (2, 0). The vertices of the circle represent up and down quarks, and the vertex (2, 0) is an up quark in the case of a proton and a down quark in the case of a neutron. The arcs and edge represent the strong nuclear force.43 One can recover the original van Kampen diagram D from Γ if D is a topological disc, but this is not the case if D is singular, as is the case for the ∆++ baryon represented in Fig. 5. In addition one has lost the boundary label of D. To remedy these defects one introduces the enhanced picture Γ0 . As a graph Γ0 is the 1-skeleton of the first barycentric subdivision D′ of the van Kampen diagram D, where one discards the original edges of D. The vertices of Γ0 are of three types, F, E and V , where F type are barycenters of faces of D, E type are barycenters of edges and V type are just the vertices of D. The vertices of F type correspond to fundamental fermions (leptons or quarks). Those of E type are equipped with a transverse orientated label coming from the label of the edge of D. In particular those vertices of E type which lie on the boundary of D enable one to construct the boundary label of D; they are distinguished by being boundary edges of exactly one edge of Γ0 . In fact the entire van Kampen diagram D can be reconstructed from Γ0 as a planar graph with its transverse labels. 43 If one knows the strength of the interaction and the distance over which it takes place, one can estimate the energy associated with an edge. The mass of the quarks are determined from the laboratory. One must recall from an earlier footnote that, in the case of the proton (resp. neutron), the two up quarks (resp. down quarks) are of different generations. Here, to first order, one should ignore the EM force since it is smaller than the strong nuclear force by a factor of 10−3 . TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 33 Example.44 ∆++ resonance (see Fig. 5). Here is a description of the enhanced picture Γ0 for ∆++ . Let X1 be the disjoint union of 6 planar edges where one vertex is distinguished on each edge and called of type F. Identify the distinguished vertices to get a planar graph X and call the end vertices alternately in one cycle of type V or E, where one V type vertex is distinguished. Take 3 copies of X and identify the distinuished V type vertices to get the planar graph Y . The images of the central F vertices of X1 in Y represent the three up quarks, and the images of the E vertices of X in Y have transverse oriented labels a, a, b. The other ∆-baryons have the same structure as in Fig. 5, but for the ∆+ , 0 ∆ , and ∆− baryons the individual quarks are changed appropriately. They all have the same rest mass within the error of 0.1%, which is what one would expect since the dominant force holding them together is the strong nuclear force and the electromagnetic force is smaller by a factor of a thousand.45 So my model is consistent with the data for these particles. The point here is that if one knows the strengths of the strong interactions and the distances between adjacent quarks (adjacent either through vertex or through edge of the enhanced picture Γ0 ) then one knows the energy associated to the interaction. If one knows the rest energy of the quarks in addition, then one can calculate the energy of the particle. There is a caution here that each edge path of length 2 in Γ0 between two F vertices represents an interaction between the corresponding fundamental fermions. I do not yet know how to weight these interactions if there are more than two such paths of length 2 joining the two F vertices. However in the case of the ∆++ baryon there is precisely one such path of length 2 joining each pair of vertices of F type. By symmetry, all the interactions they represent have the same strength and the distances associated between the quarks are the same. So if my correspondent who wrote “there are no open problems” (see Disclaimer below) is correct, there is enough information available to calculate the rest energy of the ∆++ baryon. This amounts to a test of of the theory I have presented.46 Appendix 12. Engtanglement This section is independent of all that precedes and proposes a geometrical explanation for the phenomenon of entanglement. whereby a measurement of a particle can affect another particle spatially separated from it (that is, the invariant metric 44 I am grateful to Yong-Shi Wu for having suggested I should consider the ∆++ baryon. It turned out to be crucial in formulating my ideas. 45 Source: https://en.wikipedia.org/wiki/Delta baryon 46 Caveat. Again I caution that, in attempting to do the calculation for a proton, one must be careful to recall that the two up quarks are of different generations, as I showed in an earlier footnote. In effect all calculations are done in K̃ and not in K itself. In the picture model Γ for the proton, the two vertices on the circle are joined by two arcs on the circle, and one should experiment with different ways of weighing the strengths of the corresponding interactions, assuming that the theory has already survived the ∆++ test. An “open problem” for physicists ′ (1) of the first barycentric subdivision of K̃ into a metric graph, so is to make the 1-skelton (K̃) that length of edges reflect strength of interactions. Then all enhanced pictures associated to van Kampen diagrams will acquire pull-back lengths. 34 STEVE GERSTEN −dt2 + dx2 + dy 2 + dz 2 (setting c = 1) is positive for the two points). I shall work in Minkowski space R1,3 although there is an obvious generalization to the general pseudo-Riemannian case. In the simplest example of the phenomenon a particle of spin 0 located at point P spontaneously decays into two particles X1 , X2 of spin 1 2 which fly off in opposite directions. I shall assume in the discussion that both particles have non-zero rest mass, so their paths are in the interior of the light cone at P . Conservation of angular momentum requires that the spin measured along any axis for X1 be the opposite of that measured along the same axis for X2 , so if the first is 12 along the z-axis, say, then the second must be − 12 . This is true whatever the separation of X1 is from X2 , as long as the state of the pair remains coherent, even if no information can pass between the particles in the usual understanding of Minkowski space. This prediction of quantum mechanics has been confirmed by experiment, so is not in dispute. In this example the spin of X1 is not determined before the measurement and can be an arbitrary linear combination of “up” and “down” along any axis. The measurement picks out one of up or down, and the effect is immediate on X2 : if X1 is measured to be up along a given axis then X2 immediately becomes down along the same axis. The experiments performed on Bell’s inequality show that it is not the case that X1 was secretly, say, up all the time (as might be the case if there were some hidden variables), in which case it would follow that X2 was down; that was Einstein’s explanation for the phenomenon, but Bell’s inequality (or rather its failure in quantum mechanics) shows that Einstein was, in this case, wrong.47 What has been lacking so far has been a convincing explanation in the common language for this paradoxical behavior, outside of the formalism of quantum mechanics. I shall offer one here, which requires only a small modification of one’s notion of space and time, and propose an experimental test for my explanation. Parametrize the paths of X1 and X2 by proper time τ , say, xi (τ ), i = 1, 2 and identify the points x1 (τ ) and x2 (τ ) in R1,3 for all τ for which the wave function of the pair remains coherent. The result is a singular space S. No further identifications are made if decoherence results (if, for example, a measurement is made on one particle). One can visualize S best when there is one spatial dimension x and one time dimension t, in which case the invariant form is −dt2 + dx2 and the Minkowski space is R1,1 . In this case S is topologically a plane with a nappe of a cone resting tangent on it. The nappe of the cone is the image of P in the S and the cone opens up in the positive t-direction.48 Let us continue the discussion in R1,1 . Let Q1 and Q2 be two points in the interior of the light cone at P on opposite sides of the paths x1 and x2 so that Q2 is on the light cone from Q1 . In R1,1 there is a single path for light from Q1 to reach Q2 . But in the identification space S there is a time-like path with shorter 47 Source: en.wikipedia.org/wiki/Quantum entanglement but not analytically, this is the en.wikipedia.org/wiki/Catastrophe theory#Swallowtail catastrophe 48 Topologically, swallowtail catastrophe, TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 35 proper time. Hence information can be conveyed in S between the image points by a shorter route than that taken by light. A more extreme example is the following. Let Q1 and Q2 be chosen on opposite sides of the cone determined by x1 and x2 so that the line from Q1 to Q2 intersects xi at Q′i , i = 1, 2. Assume that the interval from Q′1 to Q′2 is space-like but that the intervals from Qi to Q′i are time-like, with the interval from Q′1 to Q′2 ≫ the sum of the aboslute values of the intervals fro Qi to Q′i . Then no information can pass from Q1 to Q2 in Minkowski space. However in S the images of Q′i are connected along a common time-like line, so in S information can pass from Q1 to Q2 . Remark. It should be possible to choose Q1 and Q2 so that slight movement of a laser placed at Q1 produces interference fringes at Q2 . In summary, the introduction of singularities of well-known type can provide a geometric explanation for the paradoxical behavior of entanglement. Disclaimer I received the following in a letter from M. Gromov: “ . . . in order to publish the article and not to be scorned at by the physicists community, Bogomolov, who as much as myself finds your article interesting and provocative, asks, if you agree, to do the following. (1) To have author’s (yours) disclaimer on the relation of the article to “real physics” and an emphasis on the mathematical contents in it. (2) A one page appendix by a professional physicist commenting on the original physical input of your article. The more critical it could be the better it would fare in the face of the physicists community.” To comply with their request, I wrote the following disclaimer: “I have been requested to include a disclaimer on the relation of this article to “real physics”. I am a mathematician, not a physicist, in my seventh year of retirement; prior to that I worked for 25 years in the field of combinatorial group theory, and earlier than that I published articles in fields involving algebra and topology, but not physics. Last November 2012 I read the Scientific American article [Li] and understood quickly that the Harari-Shupe theory suitably interpreted implied the solution to the generation problem, stated as an open problem in [Li]. I read all I could find in Wikipedia, having had no prior background in the physics involved, and asked questions of physicists, most of which were ignored and one of which was rebuffed with the arrogant and sarcastic (and unhelpful) statement that “there are no open problems; good luck with the math.” The accompanying letter from D. Singleton shows that I was encouraged to do real physics, to calculate masses of elementary particles and magnetic moments. One exception was Professor Wu, who listened to me in a meeting arranged by my colleague Domingo Toledo and made pertinent suggestions. He said I had solved the generation problem, but also told me that my paper would never be accepted by a physics journal. As a further irony, I submitted the article to arXiv in the category Group Theory. The editorial board vetted the article and resubmitted it as General Physics. ” 36 STEVE GERSTEN As for the point about criticism by a professional physicist, I received the following letter on 1 March 2013 from Douglas Singleton (unedited except for punctuation and TeX formatting): “ From: Douglas Singleton [email protected] To: Steve Gersten [email protected] Hi Professor Gersten, Sorry for the delayed reply. I’m currently on sabbatical which in principle means I should have more time, but also in expectation of this I have taken on extra projects. Anyway your general question and suggestion (that electrons, photons, gluons, etc.) should have some sub-structure is interesting and in fact I tried to think of such a model some time ago, but there are a lot of problems such models face. First a non-important comment – you had said that you have had a hard time getting physicists to look at your work. I think this is a combination of the fact that composite models face many challenges (I’ll detail some below) but as well the formalism/notation you use is not in the standard tool kit of physicists so you would either need to “translate” your work for physicists or start a campaign to educate physicists to the formalism you use. For example there is a book on differential forms by H. Flanders from Purdue from the 1960s and in the foreword he specifically says his intent (he is a mathematician) was to educate physicists and engineers to the beauty of differential forms, wedge products, etc. In the 90s when I was in grad school differentials forms were still not part of the standard curriculum. I learned them (somewhat) on my own using Flanders book. In any case if you use unfamiliar formalism/notation this will ex plain why most physicist will not take a look at your work. For example in the opening of your fermion paper you talk about “Kampen diagrams ”. I looked at your pictures and these look similar to Dynkin diagrams/root diagrams/weight diagrams from group theory (have a look at Howard Georgi’s book on Lie Groups for physicists and your Kampen diagrams look similar to some of these other diagrams I mention, but then again not exactly th e same). In turn I scanned both articles and did not find any obvious mention of SU(2), SU(3), U(1) or even string theory groups like E(8) x E(8) or any of the other exceptional Lie groups. It may be that these are discussed in a manner /formalism I do not know, but in any case this would explain why physicists have ignored your work. Also I checked the arXiv (both hep-th and math-ph) and there was no mention of “Kampen diagrams” – I did a “full text” search for “Kampen” and found only a guy named van Kampen and then three papers which referenced van Kampen’s work – but no reference to Kampen diagrams. A google search turned up Kampen diagrams but in looking through the first 2–3 pages I did not see any physicists working with them. Again in some sense this is not really important since one can attribute this to the “bad” math education of physicists, but as a practical matter it will mean your work will have an uphill battle getting attention from the physics community. OK but let me move on to substantive comments. The first questions you should TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 37 be able to calculate an answer for if your model is correct is (i) What is the mass of the electron, muon, tau in terms of the more fundamental masses of your “preons” a, b? (By the way I very much liked Harari’s work and this inspired me to try my hand at this type of model building but my attempt foundered on exactly this and the following questions). Or at least you need to calculate the mass ratio e/mu and mu/tau. (ii) What are the values of the CKM (Cabibbo-Kobayashi-Maskawa) mixing elements between the three generations? If your model is correct and useful then you should be able to calculate the above quantities in terms of the input parameters of your model (I guess the parameter should be the masses and mixings of the a and b “preons”). If you could do this then people would pay attention even if they did not at first understand your notation/formalism. Next I have some general comments which seem problematic . (a) Electrons, muons, quarks, etc. seem to be made of three “preons” and these a, b “preons” I assume are spin 1/2 so that the results electron, quarks etc. will come out to be spin 1/2. However if electrons are composite in this way (rather than being fundamental Dirac spinors) then their g-factor is no longer guaranteed to be g ∼ 2 (up to QED corrections) but should be calculated from the underlying theory. In other words you need to take your composite electron, calculate its gfactor and show that it is about 2. For example the proton and neutron are both known to be spin 1/2 but they are composite spin 1/2 particles being made up of (at least at the first le vel) quarks. Now if one assumes that the quarks are fundamental Dirac particles with g ∼ 2 one can to a pretty good job at getting the g-factors for the proton and neutron (∼ 5.59 and ∼ -3.83 respectively) in terms of the more fundamental g-factors of the quarks taken at their Dirac value. Note that the g-factors of the proton and neutron are *very* different from 2. Also the calculation of these values from QCD models is only at the 5% level as compared to the 0.000000001% level of QED calculations of the electron g-factor. This is said to be due to the very large non-perturbative quantum corrections coming from the strong interaction. If you could get your model to give the correct g-factor of the electron, muon, tau, etc. to the 5% level this would good enough since that is what is done in the case of protons and neutrons. (b) Your photon seems to be composed of āa i.e. the photon is also a bound state. But the photon is experimentally known to be massless to a very high degree and theoretically this is said to come from gauge invariance (which can be broken via the Higgs mechanism but the Higgs in our Universe does not do this for the photon so gauge invariance means the photon is exactly massless and this agrees very well with experiment).Now if your photon is a bound state of more fundamental spin 1/2 particles it is highly unlikely that it would be massless to such a high degree. This would require an extremely unlikely cancellation of the binding energy of the system against the masses of the a and ā. In any case you need to show that your model gives the mass of the bound state āa (i.e. photon ) as zero to some fantastic accuracy. To do this you will need to specify the energy scale of the interaction 38 STEVE GERSTEN which binds your “preons” together. I also did not see mention of this and it is important – what is the energy scale/interaction strength of the interaction which binds your preons together? For example in the strong interaction the dimensionless coupling constant at low energies is ∼ 1 – 5 (the range is large since QCD is poorly understood in the low energy limit). For the E& M interaction the coupling strength at low energies is ∼ 1/137 (which also explains why perturbation theory works at low energy for QED but fails from QCD). (c) Also if your photon is composed of a fermion-anti-fermion both of which are charged then it will have in general some magnetic moment, electric dipole moment, etc. It is well known experimentally that the photon does not have these thus in your model you should explain why your composite photon has no moments to such a high degree. The same comment applies to the W and Z bosons which in your composite model would have – barring some cancellation – magnetic, electric dipole moments in general. In fact the W from the SM has a spin and magnetic dipole momentum that lead to a g-factor of 2 (same as for a fundamental Dirac particle). Because of this some scattering processes involving the W boson have “gauge amplitude zeros” in the differential scattering cross section which been confirmed to the 5% level. The original article on this is K.O. Mikaelian, M.A. Samuel, and D. S ahdev,Phys. Rev. Lett. 43, 746-749(1979) . Thus your model would also need to how a composite W would get a g-factor so close to 2. Anyway the first task - if you haven’t done it or if I missed it in the two articles - would be to calculate the electron, muon, tau masses (or at least their ratios) in terms of the parameters of your model. Then next would be to calculate the values of CKM elements. Another good place to test your model would be in predicting the mass structure of the neutrinos. The oscillation data for neutrinos give two possible mass structures – regular and inverted. If your model could predict which is the correct mass structure for neutrinos this would be a good *prediction* of the model (the other things I ask above are post-dictions). Sorry for the delay and then long email. I was also going to explain a bit about my idea for composite leptons and quarks but as I said for my model I got stuck on exactly the above questions. Best, Doug ” A final word from the author, your truly. Part of Singleton’s letter refers to part II of the article, which is under revision. The preface to the present article is an attempt to, at the very least, introduce the concept of van Kampen diagram, to give a readable reference in Wikipedia, and to give a down-to-earth analogy with Buckminster Fuller’s geodetic dome, so that the concept will not appear so strange. References [AH] [Ha] [Li] Alan Hatcher, Algebraic topology, Cambridge Univ. Press 2001, ISBN-13: 978-0521795401, .pdf file available on the web at http://www.math.cornell.edu/ hatcher/AT/AT.pdf. H. Harari, A schematic model of quarks, Physics Letters B, vol. 86, 1979, pages 83–86. D. Lincoln, The inner life of quarks, Scientific American, pages 36–43, November 2012. TOPOLOGY OF THE STANDARD MODEL I: FERMIONS 39 [Sh] M. Shupe, A composite model of leptons and quarks, Physics Letters B, vol. 86, 1979, pages 87–92. [BRS] N. Brady, T. Riley, and H. Short, The geometry of the word problem for finitely generated groups, Birkhäuser, 2007, ISBN 978-3-7643-7949-0. [Ya] C-N Yang, Quantum numbers, Chern classes, and a bodhisattva, Physics Today, vol. 65, Jan. 2012, page 33. Mathematics Department, University of Utah, 155 S. 1400 E., Salt Lake City, UT 84112-0090, http://www.math.utah.edu/∼ sg E-mail address: sg at math dot utah dot edu
4math.GR
Scalable Secure Computation of Statistical Functions with Applications to k-Nearest Neighbors Hayim Shaul, Dan Feldman, Daniela Rus arXiv:1801.07301v1 [cs.DS] 22 Jan 2018 January 24, 2018 Abstract Given a set S of n d-dimensional points, the k-nearest neighbors (KNN) is the problem of quickly finding k points in S that are nearest to a query point q. The k-nearest neighbors problem has applications in machine learning for classifications and regression and and also in searching. The secure version of KNN where either q or S are encrypted, has applications such as providing services over sensitive (such as medical or localization) data. In this work we present the first scalable and efficient algorithm for solving KNN with Fully Homomorphic Encryption (FHE) that is realized by a polynomial whose degree is independent of n, the number of points. We implemented our algorithm in an open source library based on HELib implementation for the Brakerski-Gentry-Vaikuntanthans FHE scheme, and ran experiments on MIT’s OpenStack cloud. Our experiments show that given a query point q, we can find the set of 20 nearest points out of more than a thousand points in less than an hour. Our result introduces a statistical coreset, which is a data summarization technique that allows statistical functions, such as moments, to be efficiently and scalably computed. As a central tool, we design a new coin toss technique which we use to build the coreset. This coin toss technique and computation of statistical functions may be of independent interest. 1 Introduction The use of cloud services is increasing dramatically. Indeed, using a service located in the cloud has its advantages over downloading and installing the service locally. Consider, for example, (i) a map that can be queried for a site (such as a restaurant or a hotel) near a certain location; (ii) a diagnostics tool for skin cancer, where a user uploads an image of her skin; or (iii) a recommender system based on previous activities of similar profiles. Even if the databases are small enough to be installed on the user’s device, a cloud service can constantly updates its databases and algorithms to have more accurate and more relevant results, something that is hard for a user to do. The latter two examples, being examples of machine learning indeed require updates to the databases as more data is collected from willing users, and also updates to the algorithms as they are improved. In the first example as well, updates are required to the database as sites are added or removed. One big disadvantage of a cloud service is the loss of privacy for the user. The user is expected to reveal its data to be able to use the service. In some cases this data may be something the user does not wish to reveal. For example, the output of a recommender system can also be used to perform differential pricing on the expense of the user. In other cases, it is the interest of the service not to know user’s information as it may impose extra regulation on the service. For example, having access to user medical data may require it to comply with HIPAA regulations. Multi-party computation (MPC) is used to let two or more parties compute a certain output from their inputs without disclosing any information (except maybe for the output) to the other party. Fully Homomorphic Encryption (FHE) is a secret-key-public-key encryption scheme that also supports + and × operations on the ciphertext. To encrypt a message m, the public key is used m0 = 1 Encrypt(m, pub), and decryption is possible only with the secret key m = Decrypt(m0 , sec). In addition we have, Decrypt(Encrypt(x, pub) + Encrypt(y, pub), sec) = x + y and Decrypt(Encrypt(x, pub) × Encrypt(y, pub), sec) = x × y. This suggests that any polynomial P (and in fact any algorithm) can be computed on encrypted messages (x1 , x2 , . . .) by applying + and × operations on encrypted values to get P(x1 , x2 , . . .). In the context of multi-party computation (MPC), FHE can be used to construct a singleround protocol where one party (the cloud) applies a polynomial on user’s data, such that the cloud does not learn anything on the user’s data. The result of applying a polynomial P on encrypted input Encrypt(x) is an encrypted value Encrypt(P(x)) that can only be decrypted by the user with her secret key. Except for P(x), the user does not learn anything about P. The implementation of FHE schemes usually involves encoding the data m using some transformation over a finite ring while adding some noise. Removing the noise and reversing the transformation is possible only with the secret key. As operations are performed on ciphertexts the noise grows. The user needs to make sure the generated secret key will be able to remove the maximal amount of noise accumulated during the computation of P(x). There are two techniques to reduce noise: modulo switching and bootstrapping. The latter is not CPU efficient, as it involves the processes of decrypting a ciphertext under FHE. Modulo switching, on the other hand, is very efficient to use, however, the number of times it can be used is set at the time the key pair is generated. With FHE schemes known to date, as key-pair are generated to support more modulo-switching, they grow in size, take more time to generate and render operations performed on ciphertext to have more overhead. The main challenge when designing an algorithm for FHE is to make it compatible with keys generated with the least amount of modulo switching. Since the noise accumulated in a × operation is significantly larger than the noise accumulated in a + operation, the latter is usually ignored and the challenge becomes to design an algorithm whose equivalent polynomial has a low degree. Although theoretically any algorithm can be expressed as a polynomial of its inputs, in practice, the naive polynomials are rarely practical. Hereinafter, computations are assumed to be compatible to the FHE model (arithmetic circuit model), where we are restricted to use + and × over some finite ring. Definition 1.1 (Polynomial’s size and depth) A function f : Zsp → Ztp is a polynomial over a finite ring Zp if it is a multivariate polynomial that maps a vector x of s ring elements in Zp , to a vector y = f (x) of t ring elements in Zp , which is the result of the polynomial f on the input x. The complexity of the computation is measured by the degree of the polynomial f , denoted by deg(f ), and the number of multiplications needed to evaluate it, that is denoted by size, denoted by size(f ). √ For a general polynomial, P, with deg(P) = n, we have size(P) = n. See [31] for details. However, for some polynomials, sparse, smaller bounds exist. For example, over Zp , where p is prime,  i necessarilyp−1 P p−1not the polynomial x = (x + 1) , whose value is 0 for x = p − 1 and 1 otherwise, has size O(log p). i Motivated by FHE problems, we measure the depth and size of the polynomials in our solution. We focus on reducing their degree and their size. Comparing encrypted numbers. Unlike comparison model, implementing a comparison in FHE is not trivial. Simply put, FHE does not provide a comparison operator. Having the ability to compare two encrypted numbers and getting an unencrypted result would essentially break the security of the encryption as it leaks information on the ciphertext. However, for two encrypted numbers JxK and JyK it is possible to construct a polynomial P (x, y) whose value is encrypted and equals 1 if x < y and 0 otherwise. k-nearest neighbors (KNN) is a problem where given a finite set S ⊂ Rd , with |S| = n and a point q ∈ Rd we are looking for a subset S 0 ⊂ S, of the k nearest points to q, i.e. |S 0 | = k and maxx∈S 0 kx − qk ≤ minx∈S\S 0 kx − qk. In machine learning the KNN algorithm is used as a classifier, when each point x ∈ S is assigned a class and the class of q is taken to be the majority of the classes in S 0 . Specifically, KNN can address the examples mentioned above. Setting S ⊂ R2 to be a set of “sites” and q ∈ R2 to be users location, KNN is the subset of k nearest sites to q. Setting S ⊂ Rd to be a training set for skin cancer, labeled as 2 “benign” or “malignant”, and q ∈ Rd be a sample to be classified, KNN is a subset of k nearest training sample to q from which q can be classified as “benign” or “malignant”. Lastly, setting S ⊂ Rd to be profiles, each paired with a recommendation, and q ∈ Rd to be a user’s profile, KNN is a subset of k most similar profiles to q which suggests k recommendations to the user. Despite its simplicity, k-nearest neighbors is a hard problem to solve in FHE. Informally, a polynomial whose value is the index of one of the k nearest neighbors should somehow consider all data points in S. Naively, projecting from a comparison-model algorithm, one would expect this to be a polynomial of degree O(n). Making it harder, is the fact that in the FHE model an equivalent of the < operator needs to be implemented from + and × operators which naively results in a polynomial with degree O(n · deg(<)), where deg(<) is the degree of the polynomial evaluating the < operation. Statistical functions such as the cumulative distribution function (CDF) can be used to solve the KNN problem. Specifically, for a random variable d = kq − si k, where i is drawn uniformly from {1, . . . , n}, and CDFd being its CDF then by definition we have, | {si ∈ S | kq − si k < T } | = k, where T = CDFd−1 (k/n). A closely related set P ofe functions are moments. Given a data set D = {d1 , . . . dn }, the e-th moment is di . The first order moment, with e = 1, is the average of D. The variance of D can defined as µe (D) = n1 be computed from its first two moments V (D) = µ2 (D) − (µ1 (D))2 . For some distributions the CDF can be computed from the first few moments. Computing moments in FHE is a hard problem. In fact, even computing the first moment, i.e. the average, is hard. The main problem is the lack of a division operation in a ring. Even if a multiplicativeinverse exists, multiplying by the inverse does not act as division. For example, computing the average of −1 2 and 3, Avg(2, 3) = 2+3 we would have (2 + 3) · 2−1 = 6 2 = 2.5, over the ring Z7 . By multiplying by 2 mod 7, where in fact we would like to have (since we are rounding things to integers) Avg(2, 3) =P 2. The issue of computing an average has been addressed before. In [30] it is suggested to return the pair ( xi , n) as the output of an average function. This solves the division problem by deferring it to a later step. This has two obvious disadvantages: (i) it requires an expensive step to perform the division either by an iteration with aPTuring machine or by embedding a division polynomial and (ii) in most interesting applications we P have di  max di > Avg(d1 , . . . , dn ) which requires operations on numbers as large as di which is inefficient when n is large. Finding k smallest values in a general unordered array D = {d1 , . . . , dn }, with di ∈ [L], for 1 ≤ i ≤ n, is the problem of returning mink D, where mink D ⊂ D is a subset such that mink D = k and max mink D ≤ min(D \ mink D). It is believed this is a hard problem to solve practically in FHE. Informally, we expect the polynomial degree of such a solution to be at least O(n log L) as it at least needs to perform n − 1 comparisons each of O(log L) bits. Setting D1 = D and iteratively computing mi = min1 Di and setting Di+1 = Di \ {mi }, for i = 1, . . . n can be used to sort D, a problem that has received a lot of attention in homomorphic encryption [11, 12, 13, 14] and no efficient solution is yet known (see more in Section 2.3) . 1.1 Our Contribution In this work we show, counter to common belief, that averages and higher moments can be computed efficiently in FHE and be used efficiently to solve the k-nearest neighbors problem in near real time. More specifically our contributions are as follows. First FHE algorithm to compute statistical functions in a practical way by a polynomial whose degree is O(deg(<)), the degree of a polynomial comparing encrypted numbers, and independent of n. Our algorithm is also “embarrassingly parallel”, which makes it easily scalable. The output of our algorithm is Pn 1 e an approximation of m d . For the applications in this paper we consider the cases where m = n and i=1 i e ∈ {1, 2}, but it can be extended to any 0 ≤ e ∈ R and m > 0. The output of our algorithm is a single P ciphertext. This has twoPadvantages over previous techniques, whose output was the pair ( dei , m): (i) we avoid explicitly keeping dei which is expensive when n is large and (ii) the output ciphertext can be passed 3 to a second step of an algorithm. This is in contrast to prior solutions (e.g. [30]. We expect this technique will prove efficient in more algorithms. A novel technique for coin tossing in FHE. Our solution is non-deterministic and relies on “coin tosses” with probability that depends on an (encrypted) input. To the best of our knowledge, this is the first efficient implementation of a coin toss. Since coin tossing is a basic primitive for many random algorithms, we expect our implementation of coin tossing to have a large impact on future research in FHE. First practical solution to compute k-nearest neighbors in FHE. Our techniques lead to an algorithm and a single-round protocol where the user sends one message whose size is proportional to the representation of one point q, and receives one message whose size is proportional to the representation of k points that are nearest to q. The k-nearest neighbors algorithm has application in searching as well as in machine learning for classification and regression. A practical solution to this problem opens the way to many practical systems that employ it. System and experiments results for search. We implemented our algorithms into a system and ran it on MIT OpenStack cloud. Our experiments, coinciding with our analysis, show that with a single core the average of 60,000 7-bit ciphertexts can be computed in about two hours. Also, finding 10 nearest neighbors in a set of 580 hotels in Boston area rounded to a 2D grid of 100 × 100, took about 20 minutes on a single server. Open Source Library for Secure-Search with FHE based on HELib [25] is provided for the community [34], to reproduce our experiments, to extend our results for real-world applications, and for practitioners at industry or academy that wish to use these results for their future papers or products. 1.2 Novel Techniques Coin tossing in FHE. The notion of coin tossing is somewhat not trivial in arithmetic circuit model, that can only realize polynomials. Since a polynomial is restricted to + and × operations it is not clear how or why it is allowed to simulate a coin toss, let alone, when the probability of the toss depends on an encrypted input value. Unlike traditional RAM model algorithms, polynomials cannot “call” a sub-polynomial and cannot “choose” a sub-polynomial to embed. Instead, the process of creating such a polynomial should be such that, independently of the input, a polynomial is constructed. During the construction of the polynomial randomness is used to decide on the sub-polynomials that are embedded. We describe our algorithms as pseudo-code that get a random generator R generating random r parameters for coin tossing. This is of course just for clarity of presentation. Formally speaking, the random numbers are used during the construction of the polynomial to determine how it is built. We show an equivalent of a coin toss. Lemma 1.2 (Coin Toss) Let n be a integer parameter and D a distribution over N with a cumulative distribution function CDF : N 7→ [0, 1]. There exists a set of polynomials F = {P1 , . . . , Pn }, such that if P ← F is drawn randomly and x < n then P(x) = 1 with probability CDF (x), and Pi has degree O(log n) and size O(log n), for every i = 0, . . . , n. Using coresets to compute statistical functions. Given n positive integers, x1 , . . . , xn and m, e > 0 Pn 1 e x in an efficient way that avoids the need of division and we show how to compute the mean s∗ = m i=1 i does not generate unnecessary large numbers. Some interesting cases for our technique are: Pn • take m = n, e = 1 to compute the average n1 i=1 xi . Pn • take m = n, e = 2 to compute n1 i=1 x2i . 4 We make use of our new coin tossing technique and compute the polynomial s = ( xe 1 with probability mi ai = 0 otherwise. P ai , where ∗ It is easy to see that E(s) = s∗ . We give a bound on the probability of error P r(|sP− s∗ | > εs∗ ) < 2exp(− εs3 ). 1 xei , enjoys the best of both Unlike previous technique, e.g. [30], ourPproposed solution for computing m 1 e worlds: keeping the ring size small p = m x(i) + O(1), while still having a polynomial with small degree. 1.3 Definitions Notation. For a given integer p ≥ 1 we define [p] = {1, · · · , p}. We denote by JxK the encrypted value of x, which can be a result of encrypting x by calling encrypt(x), or a result of secure computation, for example by the cloud, in which case x is not known. We also denote by Jx(bits) K the encryption of x given in binary representation, where each bit is encoded in a different ciphertext. As common in cryptography, the arithmetic operations in this paper are applied over a finite set of integers in {0, · · · , p − 1}, where the modulo operator is used to keep the outcome of each operation in this set. Such a set is formally called the Zp ring. Definition 1.3 (Ring) The ring Zp is the set {0, ·· · , p − 1} equipped with multiplication (·) and addition  (+) operations modulo p, i.e., a · b = (a · b) mod p and a + b = (a + b) mod p for every a, b ∈ Zp . We use the operator a ← [n] for a random variable a and an integer n, to indicate that a is being drawn $ randomly from [n]. If a is drawn with equal probabilities we use the notation a ← − [n]. 2 Related Work It has been shown [23, 24, 38] that two parties (Alice and Bob) can compute any function over their secret inputs over an interactive protocol that reveals no information beyond the function’s output. The major disadvantage of an interactive protocol is the communication complexity that grows polynomially in the time to compute the function. Using an FHE scheme such as [6, 22], a single-round protocol can be devised, where Alice sends Bob her input encrypted with her public key, Bob computes the function using FHE, and returns the result to Alice. Since Alice’s secret key is needed to decipher the input and output, Bob cannot learn anything on the input or the output. On the other side, Alice does not learn anything on Bob’s input except for the output of the function. 2.1 Searching Prior work on low degree polynomial solving Private Information Retrieval [7, 10, 17, 20, 21, 33] can be used to solve the k-nearest neighbors by iteratively applying them to to search for potential neighbors in increasing order. However, these works assume there is at most one matching record. A recent work [2] removed this assumption and supports any number of matches. In this case, only the first match is returned. This work also supports a filter that can be given by Alice as part of the (encrypted) input such as t1 < kq − si k < t2 (i.e., points whose distance from q is at least t1 and at most t2 ). Using this filter can reduce the number of iterations. A slightly modified filter (setting a lower limit on the index of the matched record) can be used to iteratively get all matches and not only the first one. Nevertheless, this still requires at least k iterations to report the k nearest neighbors to q. Another recent work [1] assumes an upper bound s ≥ 0 on the number of matches to an (encrypted) filter and returns all matches in an output whose size is O(s). This work draws a link between FHE and sketches and uses a sketch matrix to efficiently compact the vector of matches to a vector of dimensionality O(s). Although, it is possible to return all k records matching a filter kq − si k < t2 in a single round, Alice is still left with the problem of finding the correct value t2 . 5 2.2 Classification The problem of classification is to preprocess a set of training classified samples so that given a new sample, its address can be predicted. The problem is split into two steps. The first is the training of a model (either supervised or not). The second is to determine the classification of a new sample given a trained model. The k-nearest neighbors problem has been used for classifications in a non-secure settings. For example, in [3, 19] kNN was used to classify tissues and cancer. For some models the training step has been implemented in the secure settings. For example, decision trees [29], Naive Bayes [35] and linear discriminant classifiers [18]. Given a trained model, it was shown in [4] how to use FHE to compute medical prediction functions from patient’s encrypted data. In another work [5] secure protocols were shown to compute classification for hyperplane decision, Nave Bayes, and decision trees. However, their work uses interactive protocols (i.e. more than one round). 2.3 Sorting If we consider the vector of distances D = (d1 , . . . , dn ), where di is the distance from a query point q to a point si , then k-nearest neighbors is closely related to sorting. Specifically, after sorting the elements of D, the k smallest values correspond to the k nearest neighbors. On the other hand, an array (or positive values) can be sorted if we iteratively find the smallest number by setting k = 1 in a 1-dimensional KN N and remove it from the array. The problem of sorting an array has been greatly studied. for example in [13, 14]. In [11, 12], Cetin et al. surveyed several sorting algorithms implemented in FHE, and compared them to their arithmetic circuit that sorts n L-bit numbers, given in their binary representation. The multiplicative depth of their circuit s O(log n + log L), i.e. the underlying polynomial is of degree O(nL). Although their algorithm was faster than previous result, it still took almost one minute to sort 64 8-bit numbers. 3 Overview Generic Polynomials We note that for any function f : [p] → [p] there exists a polynomial Pf,p : Zp → Pp−1 i Zp such that Pf,p (x) = f (x), for any x ∈ [p]. Moreover, the polynomial Pf,p (x) = i=0 ai x can be constructively built by interpolating over all pairs (x, f (x)). We can use Fermat’s little theorem to keep the degree low, deg(Pf,p ) ≤ p, since xp = x. When the ring size p is clear from the context we omit it and simply √ write Pf (x). A general p-degree polynomial has size O( p). See [31]. The generalization of this, a k-variate polynomial Pf,p (x1 , . . . , xk ) has degree (p − 1)k, and size O(pk/2 ). √ Throughout the paper we use some special polynomials: Psqrt,p (x) = b xc, and Pbiti ,p (x) the i-th bit in the binary representation of x, i.e. ( 1 The i-th bit in the binary representation of x is set Pbiti (x) = 0 otherwise. Coreset is a data summarization C of a set P of items such that f (C, q) approximates f (P, q) for a desired function f and a query q from a (usually infinite) set of queries. Coreset is a paradigm in the sense that its exact definition, structure and properties change from paper to paper. Many coresets were recently suggested to solve main problems in computational geometry (e.g.[9, 15, 32]), machine learning (e.g. [8, 27]), numerical algebra [37] and graph theory (e.g. [16]). Recently, coresets were used to solve searching problems in FHE [1, 2]. We make two extensions to coresets. The first extension is we allow the algorithm applied on C be different than A. I.e. we require that |A0 (C) − A(S)| < εA(S), for some A0 . The second extension, which is more related to FHE is we are not interested only in cases where |C| < |S|, but also where A0 (C) is easier to compute in FHE. 6 Definition 3.1 (FHE coreset) Given a vector S = (x1 , . . . , xn ) and an algorithm A, a (δ, ε, A0 , p) coreset is a vector C = (c1 , . . . , cm ), where |A0 (C) − A(S)| < εA(S) and cj = Pj (C), where Pj is a polynomial of degree δ, with probability p. Sketch Matrix We use a sketch matrix M that enables the client to quickly extract χ from the small coreset (sketch) vector M · χ that is computed on the server. The coreset is based on what is known as a sketch or disjunct matrix compressing sparse vectors; see [1, 28] and references therein. k×n Definition 3.2 (Sketch matrix [1]) Let s, k, n ≥ 1 be integers. A matrix M ∈ {0, 1} is called an (s, n)-sketch matrix, if the following holds. There is an algorithm DECODE that, for every vector χ0 ∈ Rk , n returns a binary vector χ = DECODE(χ0 ) ∈ {0, 1} if and only if χ0 = M · χ. The vector χ0 ∈ Rk is called the s-coreset of the vector χ. Such a sketch matrix M can be efficiently constructed (offline, independently of the input) using the result of Indyk, Ngo and Rudra [28]. They suggest a probabilistic and deterministic construction that can also be decoded in time that is only poly-logarithmic in the length n of the input vector. For simplicity, we use the following less efficient but deterministic version. Theorem 3.3 (Corollary C.3 in [28]) Let s, n ≥ 1 be integers. An (s, n)-sketch report matrix M ∈ k×n {0, 1} (see Definition3.2) can be computed deterministically in nO(s log s/ log n) time, and k O(1) space, where k = O(s2 log n). The corresponding decoding algorithm computes DECODE(y) in k O(1) time. 4 Problem Statement k Nearest Neighbors Given a set of points S = {s1 , . . . , sn } ⊂ Rd , a query point q ∈ Rd and a parameter 0 < k < n, the search problem is to find a subset S ∗ ⊂ S such that |S ∗ | = k and maxσ∗ ∈S ∗ kσ ∗ − qk ≤ minσ∈S\S ∗ kσ − qk. In the secure version, we assume two parties Alice and Bob, where Bob holds the set S of size n (for example, the set of all restaurants in the world), and Alice wants to get from Bob a short list (of size k  n) of restaurants nearest to her location, without having to download the more than O(k) bits from Bob, or revealing to Bob where she is. In our model, we assume Bob is semi-honest (i.e. he follows the protocol) and our goal is to prevent Bob from learning anything on the location of Alice. Furthermore, we are interested in a non-interactive protocol, meaning that Alice sends a single message of size O(1) to Bob and gets a single reply from Bob of size O(k). 5 k-nearest neighbors Algorithm In this section we show how to solve the secure k-nearest neighbors problem in an efficient scalable way. We build upon an algorithm, which is interesting in its own and described in Section 6, to securely compute statistical functions. We also give three applications that use k-nearest neighbors. 5.1 k Nearest Neighbors (KNN) with Applications We first start by showing 3 applications of KNN, then we show how the KNN problem can be solved by finding the k smallest values in an array. Then we provide some applications. Find k sites near a location Given n sites S = {s(1), . . . , s(n)} ⊂ [L]2 with their associated information aux(1), . . . , aux(n) ∈ {0, . . . , 2α }, and an encrypted query JqK ∈ [L]2 a call to KNearestNeighborsp,n,k,ε,R,s,aux (JqK, Jq (bits) K) returns a sketch of the information of the k-nearest sites in S to q. 7 Algorithm 1: KNearestNeighborsp,n,k,ε,R,d,s,α,aux (JqK, Jq (bits) K) Parameters: Parameters: Parameters: Parameters: Parameters: Input: Input: Output: 1 2 3 4 A prime p, and integers n  k > 0, and d, α ≥ 1. A real number ε > 0. A family of uniform random generator functions R = {Rr : N → [r]}. √ p An n-tuple s, where each tuple is a d-dimensional point, where 0 ≤ sδ (i) ≤ d . An n-tuple aux of auxiliary data associated with s, where each tuple is an α-bit number. √ A d-dimensional vector JqK = (Jq1 K, . . . , Jqd K), where 0 ≤ qδ ≤ p/d, (bits) (bits) (bits) The bit representation Jq (bits) K = (Jq1 K, . . . , Jqd K), where Jqδ K are the bits of qδ . A sketch of size O((1 + ε)k) from which the auxiliary data of at least O((1 − ε)k), nearest neighbors cab /* Denote s(i) = (s1 (i), . . . , sd (i)) */ √ /* Also denote sδ = (sδ (1), . . . , sδ (n)) an n-dimensional vector, where 0 ≤ sδ (i) ≤ p/d. */ /* Compute an n-dimensional vector of L1 -distances from q to s(i) */ JdistancesK := J(0, . . . , 0)K for each i ∈ 1, . . . , n do P (bits) (bits) /* Define: kJaK − bkL1 = δ (Jaδ K − bδ + 2(bδ − Jaδ K)isSmallerp (Jbδ K, Jaδ K)) */ Jdistances(i)K := kJqK − s(i)kL1 Jdistances(bits) (i)K := Convert Jdistances(i)K to bit representations using the polynomials Pbiti ,p /* KSmallestValues computes an indicator vector for the O(k) least distances. Algorithm 2. 5 6 7 8 9 10 11 12 See /* Create a sparse return vector using the sparse indicator vector JχK := KSmallestValuesp,n,k,R (Jdistances(bits) K) for each i ∈ 1, . . . , n do for each δ ∈ 1, . . . , α do (bits) (bits) JKNNδ (i)K := auxδ (i)χ(i) /* Use a sketch to return the sparse result vector. See Section 3 and [1] for details JResult(bits) K := J((0, . . . , 0), . . . , (0, . . . , 0))K // a (1 + ε)k-dimensional vector of d-tuples for each δ ∈ 1, . . . , α do (bits) JResultδ K := M(1+ε)×n · JKNNδ K Return JResultK 8 */ */ */ Classification System Given n samples S = {s(1), . . . , s(n)} ⊂ [L]d with their associated classes aux(1), . . . , aux(n) ∈ {0, 1}, and an encrypted query JqK ∈ [L]d a call to KNearestNeighborsp,n,k,ε,R,s,aux (JqK, Jq (bits) K) returns a sketch of the classification of the k-nearest samples in S to q. The classification of q is then taken to be the majority of classifications. Recommender system Given n profiles S = {s(1), . . . , s(n)} ⊂ [L]d with recommendations associated to them aux(1), . . . , aux(n) ∈ {0, . . . , 2α }, and an encrypted query profile JqK ∈ [L]d , a call to KNearestNeighborsp,n,k,ε,R,s,aux (JqK, Jq (bits) K) returns a sketch of the recommendations of the k-nearest profiles in S to q. The set of recommendations to q is then taken to be the set of recommendations to profiles similar to q. Algorithm Overview Algorithm 1 has (as parameters) integers n  k > 0, a prime, p and an n-tuple, s, where each tuple is a d-tuple (s1 (i), . . . , sd (i)) denoting the position of the i-th site in d-space, where √ 0 ≤ sx (i), sy (i) ≤ p/d are integers. The algorithm gets as input an encrypted query q = (q1 , . . . , qd ), where √ 0 ≤ qi ≤ p/d denotes the query location given in binary representation as well as a single ciphertext, and  it outputs a sketch of size O(k) from which the user can infer s(i∗ ) | |q − s(i∗ )|L1 ∈ mink {|q − s(i)|} , that is, the set of sites that are nearest to q, where kp1 − p2 kL1 is the distance in L1 norm. In Line 3 Algorithm 1 computes the distance Jdistances(i)K = kJqK − s(i))kL1 , for each 1 ≤ i ≤ n. The L1 P P norm is computed using Algorithm 5, ka − bkL1 = δ |aδ − bδ | = δ (a−b+2(b−a)isSmaller(b(bits) , a(bits) )). In Line 4 the distance distances(i) is converted to bit representation. This is done by computing dlog pe polynomials Pbit1 ,p (distances(i)), Pbit2 ,p (distances(i)), . . .), where Pbiti ,p (x) = 1 if the i-th bit is set in the binary representation of x. See Section 3. In Line 5 Algorithm 1 calls Algorithm 2 to get an encrypted 0 indicator vector JχK, where χ(i) = 1 if s(i) ∈ mink s and χ(i) = 0 otherwise, for some k 0 = O(k). In Line 8 the algorithm creates a set of sparse vectors by multiplying the elements of aux by χ. This guarantees that only the auxiliary data of the k nearest neighbors appear in KN N . To be generic, we have aux(i), the auxiliary associated with the i-th site, be α bits, where α is a parameter. We keep the result of multiplying the bits of aux by χ in α n-dimensional binary vectors. By the way Algorithm KSmallestValues constructs χ, we get that it (and also KN N ) is (1 + ε)k-sparse. In Line 11 we multiply KN N by a precomputed constant sketch matrix M to get a (1 + ε)k dimensional sketch of KNN. √ p Theorem 5.1 Given n points s(1), . . . , s(n) ∈ [ d ]d , an n-tuple of auxiliary data aux, such that aux(i) is √ p an α-tuple of bits associated with s(i) and a query point q ∈ [ d ]d . Denote by D = {d(1), . . . , d(n)} the set of L distances, d(i) = ks(i) − qkL1 . For any 0 ≤ k ≤ n, Algorithm 1 outputs a compact representation of n 1 o aux(i) | d(i) ∈ minO(k) D of size O(k) of the auxiliary data associated with the O(k) nearest neighbors of √ q. The polynomials that compute the sketches have degree O(log p) and size O( p log p + nd log p + αn). The proof is given in Section 7.5. 5.2 Finding k smallest values in a set As mentioned in the introduction, the problem of finding the k smallest values in a set D is a hard problem in FHE. We relax this problem by assuming the set D has a known distribution and specifically we show here a solution for sets with Gaussian distribution. Another relaxation we make, given D and k, is to compute minκ D where κ ≈ k (see a more formal relation below). Algorithm 2 Overview Algorithm 2, has as parameters two integers n  k > 0 and a prime p, where n is the size of the input and k is the size of the output (i.e. number of smallest values to report). The algorithm gets as input an encrypted n-dimensional vector d ∈ [p]n . The algorithm assumes the values of d have Gaussian distribution, (d(1), . . . , d(n)) ∼ N (µ, σ 2 ) (where µ and σ are unknown). For many applications this is a valid assumption. For example, our experiments (see Section 8.1.3) show that the 9 Algorithm 2: KSmallestValuesp,n,k,R (Jd(bits) K) 1 2 3 4 5 6 7 8 9 Parameters: Two integers, n  k > 0, and a prime p. Parameters: A random generator functions R = {R : N → [n]}. √ Input: Encrypted n-dimensional vector Jdbits K, where d ∈ [ p]n . Output: An n-dimensional indicator vector JχK, where χ(i) = 1 if d(i) ∈ minκ {d(i)} and χ(i) = 0 otherwise, where κ ≈ k with high probability (see details below). P di . See Section 6 for details. */ /* Compute an estimation of n1 JXK := ProbabilisticAveragep,n,n,1,√p,R (JdK) P 2 /* Compute an estimation of n1 di */ JX 2 K := ProbabilisticAveragep,n,n,2,√p,R (Jd(bits) K) /* Compute estimation of the deviation */ Jσ ∗ K := Psqrt (JXK2 − JX 2 K) /* Compute a threshold for the report */ JT ∗ K := JXK + Φ( nk )Jσ ∗ K J(T ∗ )(bits) K := Compute bit representation of JT ∗ K using Pbiti /* Compute an indicator vector for the report */ χ := (0, . . . , 0) // an n dimensional vector for i ∈ 1, . . . , n do Jχ(i)K := SmallerT hanp (J(T ∗ )(bits) K, Jd(i)K) return JχK vector of distances indeed has Gaussian distribution. The algorithm returns an (encrypted) indicator vector  n χ ∈ {0, 1} , such that χ(i) = 1 iff d(i) ∈ minκ {d(1), . . . , d(n)}, where P r |κ − k| < εcn σµ + Φ−1 nk <    <τ }| |{i| d(i)−µ µ4 σ 2 2exp −εO σ + σ2 +µ2 + µ , where Φ(τ ) = is the cumulative distribution function. We n distinct parameters whose values are known to the algorithm from input that are encrypted. Given the values of µ and σ it easy to compute T . Unfortunately, as discussed in Section 1 these values are hard to compute in arithmetic circuit model. P d(i) by calling ProbabilisticAverage, In Line 1 the algorithm computes (an approximation to) the average x = n1 √ with e = 1, m = n, l = p (see Section 6 for more details). In Line 2 the algorithm computes the average of P √ d(i)2 by calling ProbabilisticAverage, with e = 2, m = n, l = p (see Section 6 for more squares x2 = n1 q √ details). In line 3 we approximate the standard deviation by computing JσK = JxK2 − Jx2 K, where · is n computed by applying Psqrt (·). In Lines 7-8 the algorithm computes an indicator vector JχK ∈ {0, 1} , where −1 k χ(i) = 1 iff Jd(i)K < JxK + Φ ( n )JσK. p Theorem 5.2 Given an array D = (d(1), . . . , d(n)), of n elements, where 0 < d(i) < (p), with Gaussian distribution, D ∼ N (µ, σ 2 ) and a parameter k  n, then KSmallestValues evaluates an indicator vector χ = (χ(1), . . . , χ(n)), such that χ(i) = 1 if d(i) < maxκ D, where        µ k µ4 εn + Φ−1 < 2exp −εO σ 2 + 2 P r |κ − k| < √ + µ , n σ + µ2 2π σ x −µ |{i| iσ <τ }| is the cumulative distribution function of standard Gaussian distribution.Also, χ where Φ(τ ) = n can be computed by a polynomial of degree O(log p) and size O(n log p). The proof is given in Section 7.4. In the next section we describe how x and x2 are computed efficiently in arithmetic circuit model. 10 6 Algorithms for Computing Moments and Statistical Functions P P 2 xi and n1 xi and other moments can be In this section we show how statistical functions such as n1 computed efficiently under FHE. We believe computing these functions is of independent interest and it has a broad set of applications expanding beyond k-nearest neighbors. Algorithm 3: ProbabilisticAveragep,n,m,e,L,R (Jx(bits) K) Parameters: Parameters: Input: Output: Integers, L, p, n, m > 0, such that L < p. e A uniform random number generator R : N → [d Lm em]. A vector JxK ∈ [L]n , where values are given in binary form using dlog Le bits. P 2 Le An encrypted number Jx∗ K such that P r(|1/m x(i)e − x∗ | > ) < 2e−2d m en e 1 2 3 4 5 6 c := d Lm e Set JaK := (J0K, . . . , J0K) to be an cn dimensional encrypted vector for i ∈ 1, . . . , cn do be . See Section 6.1 /* P r(CoinT ossL,R(i)1/e (b) = 1) = cm (bits) Ja(i)K = CoinTossL,R(i)1/e (Jx (di/ce)K) Pcn Jx∗ K := i=1 Ja(i)K return Jx∗ K */ xi Algorithm 3 Overview In Line 1 Algorithm 3 computes a resampling constant to ensure cm < 1 for any i. See details below. In Line 4 the algorithm uses cn values r1 , . . . , rn drawn uniformly from [cm], which are used to set ( 1 if (ri )1/e < xbi/cc ai = 0 otherwise. P P e 1 The algorithm then returns ai as an estimation to m xi . n Theorem 6.1 Let (x(1), P. . .e, x(n)) ∈ [L] be an n dimensional vector. Also let 0 < e ∈∗ R and m be an 1 integer. Denote µ = m xi , then Algorithm 3 describes a polynomial whose value is X , that has degree e O(log L) and size O(d Lm en log L) such that P r (|X ∗ − µ| > εµ) < 2exp(− µε2 ). 3 The proof is given in Section 7.3. Connection to coresets Our algorithm functions P e for computing statistical P is in fact an FHE-coreset xi , for S = (x1 , . . . , xn ), A0 (C) = ci , for C = (c1 , . . . , cn ), and (see Definition 3.1) with A(S) = n1 cj = CoinT ossL (xj ), which is a polynomial of degree L, and |A0 (C) − A(S)| < εA(S), with high probability. 6.1 Coin Toss CoinToss Overview The formal way to look at CoinTossn,r is as an infinite set of algorithms, with one algorithm for every pair of (n, r) for any n, r ∈ Z. Setting n and r, the algorithm is uniquely determined and it gets an encrypted input Jx(bits) K, where 0 < x < n, given by its binary representation, i.e. as a vector of bits, where Jx(i)K is the i-th bit of x. Since n and r are “embedded” into the algorithm their values are known (not encrypted) and therefore can be used in a comparison operation. In Line 2 the algorithm tests whether r > n ≥ x, and returns J0K if it is. Although a polynomial does not have a comparison operator, 11 Algorithm 4: CoinTossn,r (Jx(bits) K) 1 2 3 4 D Parameters: Two integers r ≥ 0 and n > 0, where r ←− [n] is drawn from [n] with distribution D. Input: An encrypted number JxK, such that 0 ≤ x < n is given in its binary form and x(i) denotes its i-th bit. Output: Returns a bit JbK, such that P r(b = 1) = CDFD (x). if r > n then return J0K (bits) Jy K := encrypt the binary representation of r return isSmallern (Jx(bits) K, Jy (bits) K) this comparison is in fact not encoded in the polynomial. The right way to read this line would be: for a polynomial identified by parameters r > n the polynomial is degenerated and outputs J0K. In Line 3 the algorithm extract the bits of r and puts them in binary vector y. Again, this is possible since r is given as a parameter and should be thought of as: for a polynomial with parameter r, we set constants y(1) . . . y(log n) whose values equal to the bits of the binary representation of r. The algorithm then calls isSmallern (Jx(bits) K, Jy (bits) K). x , take D to be the uniform distribution over 0, . . . , m. For example, to get a coin toss with probability m D Lemma 6.2 The algorithm CoinTossm,r (Jx(bits) K), where 0 ≤ x < m and r ←− [m] is drawn from [m] with distribution D, returns a bit b, such that P r(b = 1) = CDFD (x), where CDFD (x) = P r(r < x) is the cumulative distribution function of D, and the polynomial has degree O(log m) and size O(log m). The proof for this lemma is given in Section 7.2. 6.2 Comparing Encrypted Values In this subsection we show, for completeness, how to compare two encrypted values, given by their binary representation. Algorithm 5: isSmallern (Jx(bits) K, Jy (bits) K) Parameters: An integer n > 0. Input: Two encrypted numbers JxK, JyK, such that 0 ≤ x, y < n are given in their binary form and x(i) and y(i) Output: Return J1K iff y < x, and J0K otherwise. 1 2 3 4 5 /* Denote x(i) and y(i) the i-th bit of x and y, respectively sameP ref ix := (J1K, J0K, . . . , J0K) for each i = 1, . . . , dlog ne do JsameBit(i)K := 1 − (Jx(i)K − Jy(i)K)2 Qi JsameP ref ix(i + 1)K := j=1 sameBit(j) Pdlog ne return i=1 (1 − y(i))x(i)JsameP ref ix(i)K */ isSmaller Overview The isSmaller algorithm gets a parameter n, and two encrypted input values JxK an JyK, given by their binary representation, i.e. as a vector of bits, where Jx(i)K and Jy(i)K are the i-th bit of x and y, respectively. In line 3 the algorithm computes a binary n-dimensional vector sameBit such that sameBit(i) = 1 iff x(i) = y(i). In line 4 the algorithm computes a binary n-dimensional vector sameP ref ix such that sameP ref ix(i) = 1 iff at least i − 1 most significant bits of x and y are equal by multiplying sameBit(j) for j = 1, . . . , i − 1. The first element sameP ref ix(1) is set to J1K. At line 5 the algorithm Pdlog ne returns i=1 (1 − y(i))x(i)JsameP ref ix(i)K. 12 Lemma 6.3 The polynomial realized by Algorithm isSmallern (JxK, JyK) equals 1 if x < y and 0 otherwise, where x and y are given as dlog ne-bit binary number, and it is of degree O(log n), and size O(log n). The proof is given in Section 7.1. 7 Analysis In this section we prove the correctness and efficiency of our algorithms. Unlike the algorithms that were presented top-down, reducing one problem to another simpler problem, we give the proofs bottom up as analyzing the efficiency of one algorithm builds upon the efficiency of the simpler algorithm. 7.1 Analysis of isSmaller Lemma 6.3 The polynomial realized by Algorithm isSmallern (JxK, JyK) equals 1 if x < y and 0 otherwise, where x and y are given as dlog ne-bit binary number, and it is of degree O(log n), and size O(log n). Proof. Notice that 1 − (x(i) − y(i))2 = 1 if x(i) = y(i) and 0 otherwise. Therefore, sameP ref ix(i) = 1 if x(j) = y(j), for all j < i, effectively meaning x and y have a prefix of at least i bits. Similarly, since x(i), y(i) ∈ {0, 1}, we have that (1 − y(i))x(i) = 1 only when 0 = y(i) < x(i) = 1. Let y < x and let i∗ be the index of the first bit that is not equal in x and y, i.e. 0 = y(i∗ ) < x(i∗ ) = 1. For all i < i∗ we have (1 − y(i))x(i) = 0, since either x(i) = y(i) = 0 or x(i) = y(i) = 1. For all i > i∗ we have sameP ref ix(i) = 0. Finally, we have (1 − y(i∗ ))x(i∗ )sameP ref ix(i∗) = 1. Therefore isSmallern (x, y) evaluates to 1. On the other way, if isSmallern (x, y) 6= 0, then for some i∗ we have (1 − y(i∗ ))x(i∗ ) 6= 0. Since x(i), y(i) ∈ {0, 1} this means x(i∗ ) = 1 and y(i∗ ) = 0 which implies that sameP ref ix(i) = 0, for i > i∗ . Also, we have sameP ref ix(i∗ ) 6= 0, which means that x(i) = y(i) for i < i∗ . Combining the two, we get that y < x. The degree of the sameP ref ixn (x, y) polynomial is dominated by the degree of sameP ref ix, which is O(log n), Similarly, the size is O(log n). t u 7.2 Analysis of Coin Toss We argue that an equivalent of a coin toss that depends on an encrypted input can be achieved. D Lemma 6.2 The algorithm CoinTossm,r (Jx(bits) K), where 0 ≤ x < m and r ←− [m] is drawn from [m] with distribution D, returns a bit b, such that P r(b = 1) = CDFD (x), where CDFD (x) = P r(r < x) is the cumulative distribution function of D, and the polynomial has degree O(log m) and size O(log m). Proof. Let F = {P0 , . . . , Pm−1 }, where Pr (x) = isSmallerm (r, x), where isSmallerm (r, x) = 1 if r < x and 0 D otherwise. Since r ←− [m] is drawn from [m] withP distribution D, independent to the choice of x, it follows that P r(CoinTossm,r (JxK) = 1) = P r(r < x) = i<x P r(r = i) = CDFD (x). Following Lemma 6.3, we have deg(CoinTossm,r ) = O(log m) and size(CoinTossm,r ) = O(log m). t u The proof of the following lemma follows immediately. Lemma 1.2 (Coin Toss) Let n be a integer parameter and D a distribution over N with a cumulative distribution function CDF : N 7→ [0, 1]. There exists a set of polynomials F = {P1 , . . . , Pn }, such that if P ← F is drawn randomly and x < n then P(x) = 1 with probability CDF (x), and Pi has degree O(log n) and size O(log n), for every i = 0, . . . , n. 13 7.3 Analysis of ProbabilisticAverage To prove the correctness of Algorithm 3 we first prove this lemma. n Lemma Pn 7.1 Let x ∈ [L] be an n dimensional vector. Also m > max x(i) be a parameter. Denote µ = 1 1 x(i) and set independent Bernoulli random variables: m ( 1 with probability x(i) m ai = 0 otherwise. Then,  µε2 ai > (1 + ε)µ < exp(− ), 3 X  µε2 Pr ai < (1 − ε)µ < exp(− ) 2 Pr X Pr X and  µε2 ) ai − µ > εµ < 2exp(− 3 Proof. Let x ∈ [L]n be an n dimensional vector. Since ai are independent Bernoulli random variables, P P P 2 1 x(i) = µ and by Chernof we have: P r ( ai > (1 + ε)µ) < exp(− µε3 ) we have that E( ai ) = m P P 2 and P r ( ai < (1 − ε)µ) < exp(− µε2 ), from which it immediately follows that P r (| ai − µ| > εµ) < 2 2exp(− µε3 ). t u n Theorem 6.1 Let (x(1), P. . .e, x(n)) ∈ [L] be an n dimensional vector. Also let 0 < e ∈∗ R and m be an 1 integer. Denote µ = m xi , then Algorithm 3 describes a polynomial whose value is X , that has degree e O(log L) and size O(d Lm en log L) such that P r (|X ∗ − µ| > εµ) < 2exp(− µε2 ). 3 Proof. Let x ∈ [L]n , m and e be as defined in the theorem. Assume first that max x(i)e < m. If this e 0 assumption does not hold, set c = d Lm e, define n0 = cn, m0 = cm, x0 ∈ [Le ]n such that x0i = x(bi/cc) and continue with x0 , m0 and n0 . Pn e Pn x(i)e 1 ∗ Denote µ = m 1 xi . Set X = 1 ai , where ai is a Bernoulli variable with P r(ai = 1) = m . By 2 Lemma 7.1 we have that P r (|X ∗ − µ| > εµ) < 2exp(− µε3 ), as required. We now bound the size and depth of a polynomial that evaluates one Bernoulli random variable with e $ e e probability P r(ai = 1) = x(i) − [m] would require m . The naive approach CoinTossL ,ri (JxK ), with ri ← e computing x in binary representation, a thing that increases the degree √ and size of the polynomial. To make Algorithm 3 more efficient, we notice that P r(xe < r) = P r(x < e r) and consider the distribution √ √ √ |{u≤m | d e ue=r0 }| De,m with P r(r = r0 ) = , that draws r (non-uniformly) from e m by setting r = e u, where m √ $ u← − [m] is drawn uniformly from {0, . . . , m − 1}. Thus setting ai = CoinTossL,ri (Jx(i)K), with ri = e ui , e $ where ui ← − [m] is drawn uniformly. We get from lemma 1.2 that P r(CoinTossL,ri (Jx(i)K) = 1) = x(i) m . Since Le ∗ X is constructed by adding d m e outputs of CoinTossL,ri the degree of ProbabilisticAverage is O(log L) e and its size is O(d Lm e log L). t u 7.4 Analysis of KSmallestValues p Theorem 5.2 Given an array D = (d(1), . . . , d(n)), of n elements, where 0 < d(i) < (p), with Gaussian distribution, D ∼ N (µ, σ 2 ) and a parameter k  n, then KSmallestValues evaluates an indicator vector 14 χ = (χ(1), . . . , χ(n)), such that χ(i) = 1 if d(i) < maxκ D, where        µ εn k µ4 −1 2 +µ , P r |κ − k| < √ +Φ < 2exp −εO σ + 2 n σ + µ2 2π σ x −µ |{i| iσ <τ }| where Φ(τ ) = is the cumulative distribution function of standard Gaussian distribution.Also, χ n can be computed by a polynomial of degree O(log p) and size O(n log p). Proof. P P 2 di and µ2 = n1 di be the first two moments and σ 2 = µ2 − µ2 be the variance of D. Also, Let µ = n1 k let T = Q( n ), where Q is the quantile function, i.e. | {di | di < T } | = k. For the Gaussian distribution we have Q( nk ) = µ + Φ−1 ( nk )σ, where Φ is the CDF function of the standard Gaussian distribution, and Φ−1 is its inverse. Algorithm 2 computes X and X 2 , using Algorithm 3, as estimations to µ and µ2 , respectively. q Denote σ ∗ = 2 X2 − X . 02 2 Set ε0 = 2ε + (4ε2 − 6ε) µµ2 , then P r(X 2 > (1 + ε0 )µ2 ) < exp(− µ23ε ). Since, (1 + ε0 )µ2 − (1 − ε)2 µ2 = (1 + 2ε)µ2 − (1 + 2ε)µ2 , we have:       µ4 µ2 ε02 + 6µε2 2 ∗ 2 2 = exp −εO σ + P r (σ ) > (1 + 2ε)σ < exp − +µ . 3 µ2 002 2 Similarly, set ε00 = ε − (ε2 + 3ε) µµ2 , then P r(X 2 < (1 − ε00 )µ2 ) < exp(− µ22ε ). Since, (1 − ε00 )µ2 − (1 + ε)2 µ2 = (1 − ε)µ2 − (1 − ε)µ2 , we have:       2µ2 ε002 + 3µε2 µ4 ∗ 2 2 2 P r (σ ) < (1 − ε)σ < exp − = exp −εO σ + +µ . 6 µ2 Since √ 1 + 2ε < 1 + ε and 002 √ 1 − ε < 1 − ε we get that P r(|σ ∗ − σ| < (1 + ε)σ) < exp(− µ2 ε 02 2 +6µε2 ) 3 + exp(− 2µ2 ε 6+3µε ), with ε0 , ε00 as defined above. We therefore have κ−k = CDF (T ∗ ) − CDF (T ). For n ∗ −µ Gaussian distribution we have CDF (T ∗ ) − CDF (T) = Φ(T σ−µ ) − Φ( T −µ ) < Φ( (1+ε)T ) − Φ( T −µ σ  σ σ ). The inequality being with probability at least 1 − exp −εO σ 2 + Φ(a + b) < Φ(a) + √b 2π µ4 σ 2 +µ2 +µ . Since Φ0 (x) < √1 2π we have and therefore  Φ (1 + ε)T − µ σ   −Φ T −µ σ  ε <√ 2π   µ −1 k +Φ ( ) . σ n T −µ k−κ ∗ n = CDF (T ) − CDF (T ), and for Gaussian distribution weget that  Φ( σ 4 ) − (1−ε)T −µ Φ( T −µ ). The inequality being with probability at least 1−exp −εO σ 2 + σ2µ+µ2 + σ )−Φ( σ < √12π we have Similarly, we have that Φ( T ∗ −µ σ ) 0 > Since Φ (x)  Φ T −µ σ   −Φ (1 − ε)T − µ σ  ε <√ 2π   µ −1 k +Φ ( ) . σ n Putting it all together, we get that if we set T ∗ = µ∗ + σ ∗ Φ−1 ( nk ), then for κ = |{d(i) | d(i) < T ∗ }| = we have: ∗ Φ( T σ−µ )n  εn P r |κ − k| < √ 2π  µ + Φ−1 σ      k µ4 2 < 2exp −εO σ + 2 +µ . n σ + µ2 t u 15  µ . 7.4.1 Extension to other distributions Algorithm 2 and Theorem 5.2 assume the distribution of X is Gaussian, however, this can be extended to a large set of distributions. To see what is needed from a distribution let us review where the assumption of the distribution of X was used. CDF with bounded derivative. To bound the number of elements in the output of Algorithm 2, we need some bound on the derivative of the quantile function, |Q0 (x)| < c, for some c ∈ R. More specifically, we are interested in such a bound in the segment nk − δ < x < nk + δ, where δ depends on ε and the parameters of the distribution. Informally, this bound means that the error in computing the first two moments of X does not change by much the number of elements in {di | di < T ∗ } While such a bound exists for all distributions, the algorithm is impractical for large values of c. For example, for a Bernoulli distribution with P r(x = 1) = P r(x = 0) = 1/2, we have CDF (0) = 1/2 and CDF (1) = 1, which means the algorithm can either return about half of X or all of X. Algorithm 1 assumes k  n. For Gaussian distribution we have Φ0 (x) < √12π , and for nk  21 we even have Φ0 ( nk + δ)  √12π for sufficiently small values of δ. Distribution parameters easily computed from moments. The second time the algorithm assumes the distribution is Gaussian N(µ, σ 2 ) is when computing a threshold T using the quantile function T = Q(k/n). For general Gaussian distribution we have Q(x) = µ + Φ−1 (x)σ where Φ−1 (x) is the inverse of the standard CDF for Gaussian distribution. To extend to another distribution one needs to show how to compute the quantile function for that distribution. 7.5 Analysis of KNearestNeighbors √ p Theorem 5.1 Given n points s(1), . . . , s(n) ∈ [ d ]d , an n-tuple of auxiliary data aux, such that aux(i) is √ p an α-tuple of bits associated with s(i) and a query point q ∈ [ d ]d . Denote by D = {d(1), . . . , d(n)} the set of L distances, d(i) = ks(i) − qkL1 . For any 0 ≤ k ≤ n, Algorithm 1 outputs a compact representation of o n 1 aux(i) | d(i) ∈ minO(k) D of size O(k) of the auxiliary data associated with the O(k) nearest neighbors of √ q. The polynomials that compute the sketches have degree O(log p) and size O( p log p + nd log p + αn). Proof. The correctness of Algorithm 1 follows by combining Theorem 5.2 with the compacting method described in [1]. More specifically, after computing a set of distances D = {d(1), . . . , d(n)}, Theorem 5.2 states that an indicator vector χ of the smallest κ distances can be computed, where κ ≈ k with high probability (see Theorem 5.2 for exact details). Using the result of [1], a compact vector χ0 ∈ [p]O(κ) can be created, such that χ can be reconstructed from χ0 , since it is κ-sparse. Since Theorem 5.2 states that P r(|κ − k| < εc1 n) < 2exp(−εc2 ), where c1 and c2 are constants that depend on the distribution parameters of D, we get that χ can be reconstructed from χ0 with that probability. Since computing an L1 -distance function involves d calls to isSmaller and d multiplications, computing all the distances can be done by a polynomial of degree O(log p) and size O(nd log p). As argued in [1], since the sketch matrix, M , is a global constant, the multiplication M χ can be done without ciphertext multiplications at all. Putting it all together, we get that Algorithm 1 can be realized by a polynomial of degree O(log p) size √ O( p log p + nd log p + αn). t u Boosting probability To boost the success probability, KNearestNeighbors can be computed b times independently, thus boosting the success probability. KNearestNeighbors can fail in two ways and the user can easily detect both failures. Denote c1 to be the constant as defined above. One type of failure is when KNearestNeighbors returns κ < (1 − εc1 n)k sites, in which case the sketching algorithm decodes the κ sites correctly. Another type of failure is when KNearestNeighbors returns κ > (1 + εc1 n)k sites, in which case the sketching algorithm, designed to decode at most (1 + ε)k sites, fails to decode the sites 16 correctly. Of b independent computations of KNearestNeighbors, the probability that all of them failed is P r(b failures of KNearestNeighbors) = (P r(KNearestNeighbors failed))b . 8 8.1 The System k-Nearest Sites On A Map We implemented the algorithms in this paper into a system that finds the nearest hotels to a query location in Boston. The system was run on MIT’s OpenStack infrastructure. It maintained a database of 580 hotels in Boston area (given in clear-text). Prior to sending a query to the system a client needs to generate a pair (P k, Sk) of public key and secret key. To query the system, the client sends an encrypted location JqK and the public key used for encrypting it. For multiple queries, the client can use the same (P k, Sk) pair and the public key can be uploaded only once to the system. The encryption of q is done by the client, and the encrypted location can be sent from a browser running on a smart phone or from a quadcopter. The system then runs our secure search algorithm on the cloud using the client’s public key to encrypt constants as needed by the algorithm, and returns an indicator vector of the k = 13 nearest hotels to q. I.e., we set the auxiliary data to be a single set bit for all hotels. Changing the system to return the name or location 13 taken as the error parameter. The list of the hosts is easy by changing the auxiliary data. We set ε = 580 (and the query location) can be decrypted only with the private key available only to the user. The server can update the database of hotels at any time since it is kept in clear-text, for example, by scraping the Internet or negotiating with the hotels themselves. 8.1.1 Hardware Our system is generic but in this section we evaluate it on MIT’s OpenStack cloud infrastructure. We used one of the standard suggested servers, with 12 2.2 GHz Intel Xeon E5-2630 core and 28 GigaByte of RAM. These cores are common in standard laptops and servers. 8.1.2 Open Software and Security The algorithms were implemented in C++. HELib library [34] was used for the FHE scheme implementation, including its usage of SIMD (Single Instruction Multiple Data) technique. The source of our system is open under the GNU v3 license and can be found in [34]. Our system and all the experiments below use a security key of 80 bits. This settings can be easily changed by the client. 8.1.3 Experimental Results In this section we describe the experiments we ran and their results. We ran experiments on a system implementing Algorithm 1. Data We tested our system on a list of 580 hotels in the Boston area, given by their GPS coordinates. As expected the distribution of hotels around Boston is not even. There are many more hotels around down-town Boston, for example. We drew a grid on the map around Boston and rounded each hotel to the nearest grid point. We repeated our tests with grid of various sizes: 100 × 100, 80 × 80 and 60 × 60. The Experiment We ran Algorithm 1, on 580 hotel locations in Boston area, rounding hotel locations to be on a grid of L × L and taking p = 2L. We drew a random query point, q on the grid and ran KNearestNeighborsp,n,k,ε,R,d,s,α,aux (q). For the experiments that had more than 580 points we duplicated the Boston area hotels as many times as needed. Recall that since the server operates on encrypted data, the running time is oblivious to the actual coordinates of the query point q or the hotels’ coordinates si , since the server performs the same operations regardless to the input. 17 Results Our experimental results are summarized in Figure 1. The experiments measured the total time to: (i) compute the distances from the query point q to each hotel, di = |q − si |; (ii) compute statistical functions (µ and σ) on di , and (iii) create an indicator vector χ by comparing each di to a threshold computed from the statistical functions. Each of these steps is “embarrassingly parallel” [36] which means the running time on each core decreases linearly with the number of cores. What dominates the slopes of the graphs? Our analysis in Section 7.5 suggests that the time to compute the k-nearest neighbors is   L log L + n log L T = O MUL · CORES · SIM D where • L × L is the grid size to which we rounded the locations of the hotels • CORES is the number of computation machines (practically, number of core processors that work in parallel) • SIM D (Single Instruction Multiple Data) is the amount of integers that are packed into a single ciphertext. This SIM D factor is a function of the ring size p and the degree of the evaluated polynomial O(log L); in HELib, this parameter can be read by calling EncryptedArray::size(), see [26]. • M U L is the times for computing a single multiplication operation. We had CORES = 10 in all experiments, and the other parameters did not change once the grid size was set. Our formula, therefore, predicts that the graphs should be linear, as they indeed are. The parameters L and M U L did not change significantly for different grid sizes and the parameter whose value dominated the slope of the (linear) graph was SIM D = 1288, 1520 and 980, for grid sizes 60 × 60, 80 × 80 and 100 × 100, respectively. We plotted in dotted lines the linear graph as was predicted by our formula with the various SIM D values. Figure 1: Server’s running time (y-axis) on a single machine on MIT’s OpenStack cloud infrastructure, for different database sizes (x-axis) of KNearestNeighbors (Algorithm 1) on encrypted query. Each colored curve represents a different grid size. The dotted lines are the graphs that were expected by our formula. 8.2 Computing Statistical Functions Since we believe our Algorithm 3 for computing provide experimental results dedicated to this. 1 m P 18 xei is a useful tool in other applications as well, we 8.2.1 System Overview For this simple system, we again assumed the user has a pair (P k, Sk) of public and secret key, such that a message encrypted with P k can be decrypted only with Sk. The input for this system were a list of values x1 , . . . , xn encrypted with P k by the user. We also assumed Pn P k is known to the server. The output of the system was the encrypted value of fe (x1 , . . . , xn ) = n1 i xei which can be decrypted only with the secret key Sk. Although this alone is not an interesting functionality for a system, we believe that many systems include a similar computation as a sub system within them. We ran this system as well on MIT’s OpenStack infrastructure. P P 2 xi and n1 xi , i.e. e = 1 (the average) and e = 2 (the The Experiment We computed the sums n1 average of the squares), the first two moments. We tested with various values of 1, 000 ≤ n ≤ 100, 000, and ran experiments with xi ∈ [60], xi ∈ [80] and xi ∈ [100]. The server is oblivious to the values of xi since they are encrypted, and the time of computation is not influenced by the values of xi . Results Our experimental results are summarized in Figure 2. In Fig. 2Pwe show that indeed the formula n e 1 correctly predicts the experimental results. Assume we are computing m 1 xi for some values of n, m and e, where xi < L for some value of L and 1 ≤ i ≤ n, then the overall running time is:   n · log L · M U L T =O , CORES · SIM D where CORES, SIM D and M U L are as explained in section 8.1.3. Figure 2: Server’s running time (y-axis) P on a 1single P 2 core on MIT’s OpenStack cloud infrastructure, for computing the first two moments ( n1 xi and n xi ) (Algorithm 3) of n (x-axis) encrypted values. Solid lines are for the time to compute the first moment; dashed lines are for the time to compute the second moment. The dotted lines are the graphs that were expected by our formula. For each moment, the values were taken from three sets: {0, . . . , 60}, {0, . . . , 80} and {0, . . . , 100}, each represented with a different color. What dominates the slope of the graph? Although all graphs are linear as expected from our theoretic analysis, it is interesting to note how their slopes differ. From the formula we gave above, the slope of each log L·M U L graph should be proportional to CORES·SIM D . In our experiments we had CORES = 1 and negligible differences in log L. Also the differences we measured in the values of M U L were negligible. The values of SIM D were chosen automatically by HELib upon key generation and varied greatly between experiments from 192 to 660. To compare our measured results to theory we plotted with dotted lines the linear functions log L·M U L 1 predicted by our formula: f (x) = xc SIM D , where c = CORES and SIM D is the SIMD factor that was set in each experiment. It can be seen that the experiments match our expected formula. 19 References [1] A. Akavia, D. Feldman, and H. Shaul. Secure database queries on the cloud: Homomorphic encryption meets coresets, 2017. Submitted. [2] A. Akavia, D. Feldman, and H. Shaul. Secure search on the cloud via coresets and sketches. arXiv preprint arXiv:1708.05811, 2017. [3] A. Ben-Dor, L. Bruhn, N. Friedman, I. Nachman, M. Schummer, and Z. Yakhini. Tissue classification with gene expression profiles. Journal of Computational Biology, 7(3-4):559–583, July 2004. [4] J. Bos, K. Lauter, and M. Naehrig. Private predictive analysis on encrypted medical data. 50, 05 2014. [5] R. Bost, R. A. Popa, S. Tu, and S. Goldwasser. Machine learning classification over encrypted data. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015, 2015. [6] Z. Brakerski, C. Gentry, and V. Vaikuntanathan. (leveled) fully homomorphic encryption without bootstrapping. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS ’12, pages 309–325, New York, NY, USA, 2012. ACM. [7] Z. Brakerski and V. Vaikuntanathan. Efficient fully homomorphic encryption from (standard) lwe. SIAM Journal on Computing, 43(2):831–871, 2014. [8] V. Braverman, G. Frahling, H. Lang, C. Sohler, and L. F. Yang. Clustering high dimensional dynamic data streams. arXiv preprint arXiv:1706.03887, 2017. [9] V. Braverman, A. Meyerson, R. Ostrovsky, A. Roytman, M. Shindler, and B. Tagiku. Streaming kmeans on well-clusterable data. In Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete Algorithms, pages 26–40. Society for Industrial and Applied Mathematics, 2011. [10] G. S. Çetin, W. Dai, Y. Doröz, W. J. Martin, and B. Sunar. Blind web search: How far are we from a privacy preserving search engine? IACR Cryptology ePrint Archive, 2016:801, 2016. [11] G. S. Çetin, Y. Doröz, B. Sunar, and E. Savas. Depth optimized efficient homomorphic sorting. In Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings, pages 61–80, 2015. [12] G. S. Çetin, Y. Doröz, B. Sunar, and E. Savas. Low depth circuits for efficient homomorphic sorting. IACR Cryptology ePrint Archive, 2015:274, 2015. [13] A. Chatterjee, M. Kaushal, and I. Sengupta. Accelerating Sorting of Fully Homomorphic Encrypted Data, pages 262–273. Springer International Publishing, Cham, 2013. [14] A. Chatterjee and I. Sengupta. Searching and sorting of fully homomorphic encrypted data on cloud. IACR Cryptology ePrint Archive, 2015:981, 2015. [15] K. L. Clarkson. Coresets, sparse greedy approximation, and the frank-wolfe algorithm. ACM Transactions on Algorithms (TALG), 6(4):63, 2010. [16] A. Czumaj, C. Lammersen, M. Monemizadeh, and C. Sohler. (1+ ε)-approximation for facility location in data streams. In Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, pages 1710–1728. Society for Industrial and Applied Mathematics, 2013. [17] Y. Doröz, B. Sunar, and G. Hammouri. Bandwidth efficient pir from ntru. In Financial Cryptography Workshops, pages 195–207, 2014. 20 [18] W. Du, S. Chen, and Y. S. Han. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In In Proceedings of the 4th SIAM International Conference on Data Mining, pages 222–233, 2004. [19] S. Dudoit, J. Fridlyand, and T. P. Speed. Comparison of discrimination methods for the classification of tumors using gene expression data. JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 97(457):77–87, 2002. [20] Y. Gahi, M. Guennoun, and K. El-Khatib. A secure database system using homomorphic encryption schemes. arXiv preprint arXiv:1512.03498, 2015. [21] C. Gentry. A Fully Homomorphic Encryption Scheme. PhD thesis, Stanford University, Stanford, CA, USA, 2009. AAI3382729. [22] C. Gentry. Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC ’09, pages 169–178, New York, NY, USA, 2009. ACM. [23] O. Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, New York, NY, USA, 2004. [24] O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, STOC ’87, pages 218–229, New York, NY, USA, 1987. ACM. [25] S. Halevi. Helib - an implementation of homomorphic encryption. https://github.com/shaih/HElib/, 2013. [26] S. Halevi and V. Shoup. Algorithms in helib. In 34rd Annual International Cryptology Conference, CRYPTO 2014. Springer Verlag, 2014. [27] J. Huggins, T. Campbell, and T. Broderick. Coresets for scalable bayesian logistic regression. In Advances in Neural Information Processing Systems, pages 4080–4088, 2016. [28] P. Indyk, H. Q. Ngo, and A. Rudra. Efficiently decodable non-adaptive group testing. In Proceedings of the Twenty-first Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’10, pages 1126–1142, Philadelphia, PA, USA, 2010. Society for Industrial and Applied Mathematics. [29] Y. Lindell and B. Pinkas. Privacy preserving data mining. In Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’00, pages 36–54, London, UK, UK, 2000. Springer-Verlag. [30] M. Naehrig, K. Lauter, and V. Vaikuntanathan. Can homomorphic encryption be practical? In Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW ’11, pages 113–124, New York, NY, USA, 2011. ACM. [31] M. S. Paterson and L. J. Stockmeyer. On the number of nonscalar multiplications necessary to evaluate polynomials. SIAM Journal on Computing, 1973. [32] J. M. Phillips. Coresets and sketches. arXiv preprint arXiv:1601.00617, 2016. [33] S. S. Roy, F. Vercauteren, J. Vliegen, and I. Verbauwhede. Hardware assisted fully homomorphic function evaluation and encrypted search. IEEE Transactions on Computers, 2017. [34] H. Shaul. LiPHE: Library for practical homomorphic encryption., 2017. [35] J. Vaidya, M. Kantarcöğlu, and C. Clifton. Privacy-preserving naı̈ve bayes classification. The VLDB Journal, 17(4):879–898, July 2008. 21 [36] B. Wilkinson and M. Allen. Parallel programming: techniques and applications using networked workstations and parallel computers. Prentice-Hall, 1999. [37] D. P. Woodruff et al. Sketching as a tool for numerical linear algebra. Foundations and Trends R in Theoretical Computer Science, 10(1–2):1–157, 2014. [38] A. C.-C. Yao. How to generate and exchange secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science, SFCS ’86, pages 162–167, Washington, DC, USA, 1986. IEEE Computer Society. 22
8cs.DS
arXiv:1711.01085v1 [cs.DS] 3 Nov 2017 k-server via multiscale entropic regularization Sebastien Bubeck Michael B. Cohen James R. Lee Microsoft Research MIT University of Washington Yin Tat Lee Aleksander Madry ˛ University of Washington MIT Abstract We present an O((log k)2 )-competitive randomized algorithm for the k-server problem on hierarchically separated trees (HSTs). This is the first o(k)-competitive randomized algorithm for which the competitive ratio is independent of the size of the underlying HST. Our algorithm is designed in the framework of online mirror descent where the mirror map is a multiscale entropy. When combined with Bartal’s static HST embedding reduction, this leads to an O((log k)2 log n)-competitive algorithm on any n-point metric space. We give a new dynamic HST embedding that yields an O((log k)3 log ∆)-competitive algorithm on any metric space where the ratio of the largest to smallest non-zero distance is at most ∆. Contents 1 Introduction 1.1 Mirror descent and entropic regularization . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3 3 2 Traversing a convex body online 2.1 Evolution of the Bregman divergence . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Application: Fractional weighted paging . . . . . . . . . . . . . . . . . . . . . . . . . 4 5 6 3 k-server on trees 3.1 k + ε fractional servers . . . . 3.2 The assignment polytope . . . 3.3 Dynamics . . . . . . . . . . . 3.4 The weighted depth potential . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 . 9 . 10 . 11 . 14 4 Dynamic HST embeddings 4.1 Hierarchical partitions and canonical HSTs . . . . . . . . . . . . . . . . . . . . . . . . 4.2 The HST reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3 A dynamic embedding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 20 21 21 5 Mirror descent 5.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 Existence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3 Uniqueness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 24 25 26 1 1 Introduction Perhaps the most widely-studied problem in the field of online algorithms and competitive analysis is the k-server problem, introduced in [MMS90] to generalize and abstract a number of related problems arising in the study of paging and caching. The problem has been the object of intensive study since its inception, motivated largely by two long-standing conjectures about the competitive ratios that can be achieved by deterministic and randomized algorithms, respectively. We recall the problem briefly; see Section 1.2 for a formal definition of the model. Fix a metric space (X, d) and k > 1, as well as an initial placement ρ 0 ∈ X k of k servers in X. An online k-server algorithm operates as follows. At each time step, a request rt ∈ X comes online, and the algorithm must respond to this request by moving one of the servers to rt (unless there is already a server there). The cost of the algorithm is the total distance moved by all the servers over the course of the request sequence. An offline algorithm operates in the same manner, but is allowed access to the entire request sequence in advance. An online algorithm has competitive ratio α if, for every request sequence, its movement cost per unit time step is within an α factor of that achieved by the optimal offline algorithm. Randomization. The authors of [MMS90] stated the k-server conjecture: On any metric space with at least k +1 points, the best competitive ratio achieved by deterministic online algorithms is precisely k. They showed that the ratio is always at least k. While the conjecture is still open in general, Koutsoupias and Papadimitriou resolved it within a factor of two: The work function algorithm obtains a competitive ratio of 2k − 1 on any metric space [KP95]. We refer the reader to the book [BE98] for further background on online algorithms and the k-server problem. In the context of the k-paging problem, which is the special case of k-server on a metric space with all distances in the set {0, 1}, it was observed that randomness can help an online algorithm dramatically: It is known that the competitive ratio for k-paging is precisely the kth harmonic number Hk for every k > 1 [FKL+ 91, MS91]. Hierarchically separated trees. There is another class of metric spaces on which one can prove lower bounds on the competitive ratio even for randomized algorithms. Consider a finite, rooted tree T  (V, E) with vertex weights w : V → R+ that are non-increasing along every root-leaf path. Let L ⊆ V denote the set of leaves and define the metric dw (ℓ, ℓ ′) : w lca(ℓ,ℓ′) ∀ℓ, ℓ ′ ∈ L . In this case, dw is an ultrametric (in fact, all finite ultrametrics are of this form). If w v 6 w u /τ whenever v is a child of u, then one says that (T , w) is a τ-hierarchically separated tree (τ-HST) and the metric space (L, dw ) is referred to as a τ-HST metric. By showing lower bounds on every HST and additionally demonstrating that all sufficiently large metric spaces contain subsets that are close to HSTs, the authors of [BBM06] proved a lower bound on the competitive ratio for every metric space. Using the metric Ramsey bounds from [BLMN05], it holds that the competitive ratio   for randomized algorithms is at least Ω log k log log k on every metric space with more than k points. A lack of further lower bounds motivates the folklore “Randomized k-server conjecture” (see, e.g., [BBK99]) that the randomized competitive ratio is (log k)O(1) on every metric space, or even O(log k), matching the lower bound for k-paging. One can also consult the survey [Kou09] (in particular, Conjecture 2 and the surrounding discussion). Since the seminal work of Bartal on probabilistic embeddings of finite metric spaces into HSTs [Bar96, Bar98], it has been understood that obtaining upper bounds on the competitive ratio for HSTs is of central importance. Indeed, the competitive ratio for n-point metric spaces is at most an O(log n) factor larger than the competitive ratio for n-point HST metrics. This bound follows from Bartal’s approach combined with the optimal distortion estimate of [FRT04]. 2 The authors of [CMP08] give an O(log D)-competitive randomized algorithm on binary 2HSTs with combinatorial depth at most D, and in [BBMN15], a major breakthrough was achieved when the authors exhibited an (log n)O(1) -competitive algorithm for general n-vertex HSTs. In the present work, we obtain a competitive ratio independent of the size of the underlying HST, thereby verifying a long-held belief. Theorem 1.1. For every k > 2, there is an O((log k)2 )-competitive randomized algorithm for the k-server problem on any HST. As mentioned previously, this yields an O((log k)2 log n)-competitive randomized algorithm for every n-point metric space, via probabilistic embeddings of finite metric spaces into distributions over HSTs. The embedding underlying this reduction is oblivious to the request sequence. While this is a very convenient feature for the analysis, oblivious embeddings cannot avoid losing an Ω(log n) factor in the competitive ratio. We show that in certain cases, this can be circumvented via the use of dynamic HST embeddings where the embedding is allowed to depend on the request sequence.  Theorem 1.2. For every k > 2 and every finite metric space (X, d), there is an O (log k)3 log(1 + A X ) competitive randomized algorithm for the k-server problem on (X, d), where AX : max x,y∈X d(x, y) min x , y∈X d(x, y) . 1.1 Mirror descent and entropic regularization Our algorithm is most naturally stated in the framework of continuous-time mirror descent. This framework was originally introduced for convex optimization in [NY83] (see also [Bub15]), and recently it has played a key role in online decision making; see, e.g., [Haz16] for the online learning setting, and [ABBS14, BCN14] for applications to metrical task systems. Typically an entropy functional is used as a mirror map, and a key contribution of our work is to propose an appropriate multiscale entropy functional. We establish some properties of a general setup in Section 2 and, as a warmup application, present in Section 2.2 an O(log k)-competitive algorithm for the (fractional) weighted paging problem that is closely related to the algorithm of [BBN12]. This already exhibits a couple key ideas in a simplified setting, including the natural use of the Bregman divergence as a potential function, and the utility of using k + ε servers for some ε < 1. In Section 3, we begin transferring these ideas to the setting of the k-server problem on trees. Notably, the polytope underlying our state representation is the one derived from the fractional allocation problem as employed in [CMP08] and [BBMN15]. In Section 3.4.1, we introduce the crucial idea of an auxilliary potential function that tracks the weighted depth of the underlying fractional server measure, and in Section 3.4.3 we show how using a time-varying weight can be leveraged to obtain an O((log k)2 ) competitive ratio. 1.2 Preliminaries We use the notations R+ : [0, ∞) and Z+  Z ∩ R+ . If X and Y are two metric spaces and F : X → Y is Lipschitz, we use kF klip to denote the Lipschitz constant of F. Consider a bounded, 1 (µ, ν) to complete metric space (X, d) and two Borel probability measures µ and ν on X. We use WX 1 denote the L -transportation distance between µ and ν (sometimes called the Earthmover metric): WX1 (µ, ν) : inf [d(Y, Y ′)] , where the infimum is over all jointly distributed random variables (Y, Y ′) such that Y has marginal µ and Y ′ has marginal ν. The definition is extended in the natural way to any two Borel measures satisfying µ(X)  ν(X). 3 Online algorithms and the competitive ratio. Let (X, d) be a metric space and fix k > 1. We now describe the k-server problem more formally. The input is a sequence hσt ∈ X : t > 1i of requests. At every time t, an online algorithm maintains a state ρ t ∈ X k which can be thought of as the location of k servers in the space X. At time t, the algorithm is required to have a server at the requested site rt ∈ X. In other words, a feasible state ρ t is one that services rt :  ρt dX k (x1 , . . . , x k ), (y1 , . . . , yk ) : k Õ rt ∈  1 , . . . , ρt  k . Formally, an online algorithm is a sequence of mappings ρ  hρ 1 , ρ 2 , . . . , i where, for every t > 1, ρ t : X t → X k maps a request sequence hr1 , . . . , rt i to a k-server state that services rt . In general, ρ 0 ∈ X k will denote some initial state of the algorithm. The cost of the algorithm ρ in servicing r  hrt : t > 1i is defined as the sum of the movements of all the servers: Õ  costρ (r; k) : dX k ρ t (r1 , . . . , rt ), ρ t−1 (r1 , . . . , rt−1 ) , t >1 where  dX (x i , yi ) ∀ x 1 , . . . , x k , y1 , . . . , y k ∈ X , i1 and ρ 0 ∈ X k is some fixed initial configuration. For a given request sequence r  hrt : t > 1i, denote the cost of the offline optimum by cost∗ (r; k) : inf hρ 1 ,ρ 2 ,...i Õ  dX k ρ t , ρ t−1 , t >1 where the infimum is over all sequences hρ 1 , ρ 2 , . . .i such that ρ t services rt for each t > 1. A randomized online algorithm ρ is a random online algorithm that is feasible with probability one. Such an algorithm is said to be α-competitive if for every ρ 0 ∈ X k , there is a constant c > 0 such that for all r:   costρ (r; k) 6 α · cost∗ (r; k) + c . 2 Traversing a convex body online Suppose that K ⊆ Rn is a closed convex set and f : R+ × K → Rn is a time-varying vector field defined on K. It is very natural to consider the projected dynamical system: x ′(t)  ΠK x(t), f (t, x(t)) x(0)  x0 , where ΠK (x, v) : lim ε→0  PK (x + εv) − x , ε and PK (x) : argmin {kx − z k2 : z ∈ K } . One can interpret this as trying to “flow” along the vector field in direction f (t, x(t)) while being confined to remain in the convex body K. But since projection is a discontinuous operation (imagine hitting the boundary of a polytope, for instance), the classical theory of existence and uniqueness of ODEs no longer applies. Fortunately, there is now a well-established theory for projected dynamical systems. 4 Let us denote the normal cone to K at x by  NK (x) : p ∈ Rn : hp, y − xi 6 0 for all y ∈ K . If K is a polyhedron, then the normal cone to K at x is the cone spanned by the normals of the tight constraints at x. Lemma 2.1. Given any matrix A ∈ Rm×n and b ∈ Rm , consider the polyhedron K : {x ∈ Rn : Ax 6 b}. For any x ∈ K, it holds that  NK (x)  AT y : y > 0 and y T (b − Ax)  0 . For our applications, we will want to consider a projected dynamical system with respect to a non-Euclidean geometry on K. Let Φ : K → Rn be a strongly convex function. Then ∇2 Φ is positive definite and can be thought of as a Riemannian metric on K. One can describe the possible dynamics in the geometry induced by Φ by the differential inclusion ∇2 Φ(x(t))x ′(t) ∈ f (t, x(t)) − NK (x(t)) (2.1) x(0)  x0 x(t) ∈ K ∀t > 0 . Note that the right-hand side of (2.1) is a set of vectors, and a solution x(t) is one that satisfies the inclusion. It turns out that, under suitable assumptions, an absolutely continuous solution exists, and under stronger assumptions, the solution is unique. The following theorem is proved in Section 5. Theorem 2.2. Consider a compact convex set K ⊆ Rn , a strongly convex function Φ : K → R, and a continuous function f : [0, ∞) × K → Rn . Suppose furthermore that ∇2 Φ(x)−1 is continuous. Then for any x0 ∈ K, there is an absolutely continuous solution x : [0, ∞) → K satisfying  x ′(t) ∈ ∇2 Φ(x(t))−1 f (t, x(t)) − NK (x(t)) , x(0)  x0 . If we further assume that ∇2 Φ(x) is Lipschitz and f is locally Lipschitz, then the solution is unique. 2.1 Evolution of the Bregman divergence Recall that the Bregman divergence associated to Φ : K → R is given by DΦ (y; x) : Φ(y) − Φ(x) − h∇Φ(x), y − xi . We will use DΦ as a potential function to track the “discrepancy” between our algorithm and the optimal offline algorithm. In fact, it will be slightly easier to work with the function D̂Φ (y; x) : −Φ(x) − h∇Φ(x), y − xi . Suppose now that x(t) is an absolutely continuous solution to the differential inclusion (2.1) and write ∇2 Φ(x(t))∂t x(t)  f (t, x(t)) − λ(t) with λ(t) ∈ NK (x(t)). One concludes immediately that for y ∈ K: ∂t D̂Φ (y; x(t))  h∇2 Φ(x(t))∂t x(t), x(t) − yi  f (t, x(t)) − λ(t), x(t) − y 6 f (t, x(t)) , x(t) − y , where in the last inequality we have used that hλ(t), y − x(t)i 6 0 since λ(t) ∈ NK (x(t)). 5 (2.2) 2.2 Application: Fractional weighted paging Fix k > 1. Consider the fractional weighted paging problem on pages in [n] with a cache of size k and positive weights {w i > 0 : i ∈ [n]}. For z ∈ Rn , define the weighted ℓ 1 norm: kz kℓ1(w) : n Õ w i |z i | , i1 and the dual norm: kz kℓ∞ (1/w)   |z i | : max : i ∈ [n] . wi Note that if z(t) ∈ Rn is an online algorithm for t ∈ [0, T], then the movement cost is precisely ∫ T k∂t z(t)kℓ1 (w) dt . 0 Moreover, up to a factor of two, we can charge our algorithm only for the cost of moving fractional mass into a node, i.e., ∫ T 0 k(∂t z(t))+ k ℓ1 (w) dt , (2.3) where for z ∈ Rn , we denote (z)+ : (max(0, z1 ), . . . , max(0, z n )). 2.2.1 Entropy-regularized dynamics Define the fractional k-antipaging polytope P : ( x ∈ [0, 1]n : n Õ ) xi  n − k . i1 Here, we think of 1 − x i as the fractional amount of page i that sits in the cache (hence x i is the amount of fractional “antipage”). Define also the entropic regularizer Φ(x) : n Õ w i x i log x i . i1 Suppose the current state of the cache is described by a point x ∈ P such that x i (0) > 0 for all i ∈ [n]. When a request r ∈ {1, . . . , n} is received, we need to decrease x r to 0. To this end, we use the (constant) control function: f (t, x(t)) : −e r ∀t > 0 . Now the intended trajectory is given by the differential inclusion: ∇2 Φ(x(t))∂t x(t) ∈ −e r − NP (x(t)) . Let us analyze the dynamics which are described by ∇2 Φ(x(t))∂t x(t)  −e r − λ(t) , (2.4) where λ(t) ∈ NP (x(t)). From Lemma 2.1, it is an exercise to compute that λ(t)  n Õ λ i (t)e i − µ(t)1 i1 6 (2.5) for some {λ i (t) > 0} such that λ i (t) > 0 ⇒ x i (t) < 1. Here, the {λ i } functions are the Lagrangian multipliers for the constraints {x i 6 1} of P, and Í µ is the multiplier for ni1 x i  n − k. The fact that x i (t) > 0 for t > 0 is implicitly enforced by Φ (assuming some boundedness on the control f ). Since k∇Φ(x)k2 → ∞ as x approaches the boundary of the positive orthant, Φ acts as a barrier preventing the evolution from leaving R+ . We do not stress this point formally at the moment since we will soon need to maintain a more restrictive condition. Let x̂ ∈ {0, 1} n ∩ P denote an integral antipaging point with x̂ r  0 (i.e., a state which has satisfied the request). Then (2.2) immediately yields ∂t D̂Φ (x̂; x(t)) 6 he r , x̂ − x(t)i  −x r (t) . (2.6) Moreover, from (2.4) and (2.5), one easily calculates: ∂t x i (t)  where  x i (t) −e r (i) − λ i (t) + µ(t) , wi λ i (t)  Using ∂t Ín i1 x i (t)  0 yields ( (2.7) 0 x i (t) < 1 . µ(t) otherwise. µ(t)  Í x r (t)/w r . i:x i (t)<1 x i (t)/w i (2.8) In particular, if x r (t) < 1 then µ(t) 6 1, hence from (2.7), the instantaneous movement cost (recall (2.3)) is bounded by w r |∂t x r (t)| 6 x r (t) . Thus the potential change (2.6) compensates for the movement cost. Now we have to address convergence, and here we run into a problem: D̂Φ (x̂; x(t)) could be infinite! Therefore (2.6) does not show that x r (t) → 0 as t → ∞. 2.2.2 Moving in the interior Our solution to this problem will be to shift the variables away from the boundary of R+ . For δ > 0, define ( ) Pδ : P ∩ [δ, 1]n  x ∈ [δ, 1]n : n Õ xi  n − k . i1 Clearly we cannot remain in this polytope and still service a request r by moving to a point with x r  0. Instead, we will allow our algorithm to satisfy the weaker constraint x r  δ, and then afterward show that any such algorithm can be transformed—in an online manner—to a valid fractional paging algorithm, as long as δ is chosen small enough. Furthermore, we can easily ensure that our dynamics remain inside Pδ by simplying stopping when x r (T)  δ (if we can ensure that there is a time T at which this occurs). Now note that   1 sup k∇Φ(x)kℓ∞ (1/w) 6 O log . (2.9) δ x∈P δ Thus if we ensure that x(t) ∈ Pδ , then (2.6) implies that x r (T)  δ occurs after some finite time T. We are left to analyze how the potential changes when OPT moves. But from the definition and (2.9), we have ∂t D̂Φ (y(t); x)  h∇Φ(x), −∂t y(t)i 6 O(log 1δ )k∂t y(t)kℓ1 (w) . 7 Thus we obtain an O(log 1δ )-competitive algorithm, where δ is the smallest constant such that we k can round (online) a fractional 1−δ -paging algorithm to a genuine fractional k-paging algorithm. 1 As we will see now, this can be done when δ  2k . Transforming to a valid fractional paging algorithm. Consider a request sequence r®  (r1 , r2 , . . . , rM ), and a differentiable map x : [0, T] → Pδ that services r® in the sense that there are times t1 < t2 < · · · < t M such that x r i (t i )  δ. We may assume that x(t) is elementary in the sense that for almost every t ∈ [0, T]: ∂t x(t)  (e i − e j ) dt for some i , j ∈ [n]. Define 1 − x(t) ∀t ∈ [0, T] . 1−δ Then z r i (t i )  1, so z represents a trajectory on measures that services r®, but problematically we k for t ∈ [0, T]. have kz(t)k1  1−δ δk We fix this as follows: Let ε : 1−δ and define σ : R+ → R+ so that σ|[ℓ,ℓ+ε]  ℓ for every ℓ ∈ Z+ and σ is extended affinely to the rest of R+ . For z ∈ R+n , define σ(z) : (σ(z1 ), . . . , σ(z n )), and consider the trajectory σ(z(t)) for t ∈ [0, T]. Observe first that z(t) : ∫ 0 T k∂t σ(z(t))k ℓ1 (w) dt 6 kσklip ∫ T 0 k∂t z(t)k ℓ1 (w) dt 6 1 1−ε ∫ 0 T k∂t z(t)k ℓ1 (w) dt . 1 Thus for δ  2k , the movement cost has increased under σ by only an O(1) factor. Because σ is superadditive, it also holds that for every t ∈ [0, T], n Õ i1 σ(z i (t)) 6 σ n Õ ! z i (t)  σ (k + ε)  k . i1 Therefore we use at most k fractional server mass at any point in time. We are left to show that, at no additional movement cost, this can be transformed into an algorithm that maintains fractional server mass exactly k. To that end, we may assume that kσ(z(0))k1  k. It will be easiest to think of a weighted star metric on vertices V  {1, 2, . . . , n} ∪ {0}, where 0 is the center of the star and the edge (0, i) has length w i . When ∂t σ(z(t))  −e i dt for some i ∈ [n], the instantaneous movement cost of σ(z(t)) is w i e i dt. Instead of deleting this mass, we can move it to 0 for the same cost. Similarly, when ∂t σ(z(t))  e i dt, the instantaneous movement cost is again w i e i dt and instead of creating mass, we can move dt mass from 0 to i. 3 k-server on trees Consider a rooted tree T  (V, E) with root r ∈ V and leaves L ⊆ V. Let {w v > 0 : v ∈ V } be a collection of nonnegative weights on V with w r  0. We will suppose that every leaf ℓ ∈ L is at the same combinatorial distance from the root. For v ∈ V, let L(v) ⊆ L denote the set of leaves beneath v. For u ∈ V \ {r }, let p(u) ∈ V denote  the parent of u, and write E®  {® e : e ∈ E}  (p(u), u) : u ∈ V \ {r } for the set of edges directed ® define lenw (u, v) : w v . Let distw (x, y) denote the weighted away from the root. For (u, v) ∈ E, path distance between x, y ∈ V, where an edge e ∈ E is given weight lenw (® e ). We say that the pair (T , w) is a τ-adic HST if for every v ∈ V \ {r }, it holds that w v  τ j for some j ∈ Z and, moreover, if (u, v) ∈ E® then w v  w u /τ. 8 For z ∈ RV and w ∈ RV + , denote kz k ℓ1 (w) : Õ w v |z v | . v∈V Leaf measures, internal measures, and supermeasures. A leaf measure is a point z ∈ R+L . The Í mass of a leaf measure is defined as the quantity ℓ∈L z ℓ . An internal supermeasure is a point z ∈ RV + such that Õ zv ∀u ∈ V . (3.1) zu > v:(u,v)∈E® The mass of an internal supermeasure is the quantity zr . We say that z ∈ RV + is an internal measure if (3.1) is satisfied with equality. For a leaf measure z ∈ R+L , we define its lifting to an internal measure by Õ ẑ v : ∀v ∈ V . zℓ ℓ∈L(v) b denote the set of internal measures on V. It is straightforward to see that this is precisely Let M the class of lifted leaf measures. Lemma 3.1. For leaf measures y, z ∈ R+L with k y k1  kz k1 , it holds that Ww1 (y, z)  ŷ − ẑ ℓ1 (w) . A fractional k-server algorithm for (L, distw ) is an online sequence z (t) ∈ R+L : t  0, 1, 2, . . . of (t) leaf measures of mass k such that for every t > 1: z ℓ t > 1 if ℓ t is the requested leaf at time t. We also require that z (0) is integral. The cost of such an algorithm is defined by Õ Ww1 t >0  (t) z ,z (t+1)  . Lemma 3.2 ([BBMN15, §5.2]). The following holds for all τ > 5. If (X, dX ) is a τ-HST metric and there is a fractional online k-server algorithm for (X, dX ), then there is a randomized integral online k-server algorithm whose expected cost is at most O(1) times larger. 3.1 k + ε fractional servers For the remainder of the proof, we will work with continuous time trajectories z : [0, T] → R+L whose movement cost is measured by ∫ T 0 k∂t ẑ t k ℓ1 (w) dt , in light of Lemma 3.1. Obviously such a trajectory can be mapped to a discrete-time algorithm by choosing times T1 > T2 > · · · that correspond to discrete times t  1, 2, . . .. Lemma 3.3. If y : [0, T] → RV + is a trajectory taking values in internal supermeasures of mass k, then there is an (adapted) trajectory z : [0, T] → R+L taking values in leaf measures of mass k such that: 1. For every leaf ℓ ∈ L: z t (ℓ) > yt (ℓ), and 1 (z(0), z(T)) 6 2. Ww ∫T 0 k∂t y(t)kℓ1 (w) dt. 9 Proof. This lemma follows from a more general principle: If (X, d) is a metric space and X ′ ⊆ X, then an online (fractional) k-server algorithm on (X, d) servicing a sequence of requests in X ′ can be converted to an online (fractional) k-server algorithm on (X ′ , d|X′×X′ ) without increasing the movement cost. This is a straightforward consequence of the triangle inequality. Now observe that we can envision every trajectory on internal supermeasures y(t) ∈ RV + with V t ∈ [0, T] as a trajectory on genuine measures ỹ(t) ∈ R+ defined by ỹu (t) : yu (t) − Õ yu (t) ∀u ∈ V . v:(u,v)∈E® And moreover, Ww1 ( ỹ(0), ỹ(T)) 6 ∫ T k∂t y(t)kℓ1 (w) . 0 Since (L, distw ) is a subspace of (V, distw ), this completes the proof by our earlier observation.  Lemma 3.4. For every 0 6 ε < 1, a fractional online (k + ε)-server algorithm on (L, distw ) can be converted 1 to a fractional online k-server algorithm so that the movement cost increases by a factor of at most 1−ε . Proof. The proof is similar to the case for fractional paging. Define σ : R+ → R+ so that σ|[ℓ,ℓ+ε]  ℓ for every ℓ ∈ Z+ and σ is extended affinely to the rest of R+ . For y ∈ RV + , define σ(y) : (σ(y v ))v∈V . Consider a trajectory z : [0, T] → R+L taking values in leaf measures of mass k + ε. Then since σ is superadditive, it holds that σ(ẑ(t)) is an internal supermeasure for every t ∈ [0, T]. Moreover, σ(ẑr (t))  σ(k + ε)  k, so σ(ẑ(t)) is an internal supermeasure of mass k. Finally, note that ∫ 0 T k∂t σ(ẑ(t))k ℓ1 (w) dt 6 kσklip ∫ T 0 k∂t ẑ(t)k ℓ1 (w) 1 dt 6 1−ε ∫ 0 T k∂t ẑ(t)k ℓ1 (w) dt . Now applying Lemma 3.3 to the internal supermeasures σ(ẑ(t)) completes the proof.  In light of the preceding lemma, it suffices to construct a competitive fractional (k + ε)-server algorithm with ε < 1 for any request sequence on (L, distw ). 3.2 The assignment polytope For u ∈ V, write n ® j ∈ [Nu ] χ(u) : (v, j) : (u, v) ∈ E, o where Nu is the number of leaves in the subtree rooted at u. Denote n o Λ : (r , i) : i ∈ [Nr ] ∪ With a slight abuse of notation, we sometimes write assignment polytope on T is defined by  A : x ∈ [0, 1]Λ : Õ i 6 |S| x u,i 6 Õ (v, j)∈S xr ,i  1{i>k} 10 Ø χ(u) . i >1 f (x u,i ) instead of u∈V Í Í ∀u ∈ V, S ⊆ χ(u) , x v, j  ∀i > 1 . i∈[N u ] f (x u,i ). The Fix some δ > 0 and define the shifted multiscale entropy by Φ(x) : Õ wu u∈V Õ (x u,i + δ) log(x u,i + δ) . i >1 For ℓ ∈ L, denote x ℓ : x ℓ,1 . Finally, for u ∈ V and x ∈ A, define the associated server measure z ∈ RV + by 1 Õ (1 − x u,i ) . z u : 1−δ i >1 Suppose we receive a request at ℓ ∈ L. Let x : [0, ∞) → A be an absolutely continuous trajectory satisfying ∂t x(t)  ∇2 Φ(x(t))−1 (−e ℓ,1 − λ(t)) (3.2) with λ(t) ∈ NA (x(t)) for almost every t > 0. Denote T  inf {t > 0 : x ℓ (t) < δ} . By construction, as long as T < ∞ (see Lemma 3.12 below), it holds that {z u (t) : t ∈ [0, T]} is a 1 k k -server trajectory that services the request at ℓ. Now set δ : 2k < k+1 so that 1−δ fractional 1−δ for k > 2. 3.3 Dynamics We now describe in detail the dynamics of x(t) on [0, T]. We allow (momentarily) for the possibility that T  +∞. Lemma 3.5. Suppose that x ℓ,1 (0) > δ. The continuous trajectory x(t) defined in (3.2) exists uniquely for t ∈ [0, T] and satisfies x ℓ,1 (t) > δ for all t ∈ [0, T]. Furthermore, x(t) is absolutely continuous and its derivative is given by  x u,i (t) + δ −1{(u,i)(ℓ,1)} − λ u,i (t) , (3.3) ∂t x u,i (t)  wu for all u ∈ V \ {r } and all i > 1, and λ u,i (t)  Õ λ S (t) − Õ S⊆χ(p(u)): (u,i)∈S S⊆χ(u): i 6 |S| λ S (t) , Í where λ S (t) > 0 are the Lagrangian multipliers for the constraints { i 6 |S| x u,i (t) 6 we have that Õ Õ x v, j (t) . x u,i (t)  λ S (t) > 0 ⇒ (3.4) Í (v, j)∈S x v, j (t)}. Also, (3.5) (v, j)∈S i 6 |S| Remark. We will establish that T < ∞ in Lemma 3.12. Proof. Since the assignment polytope A is compact and convex, Φ is strongly convex and smooth, the existence and the uniqueness of the path x(t) defined in (3.2) follows from Theorem 5.7 with f (t, x)  −e ℓ,1 . In particular, using the formula for Φ, we have that ∂t x(t)  x u,i (t) + δ (−e ℓ,1 − λ(t)) wu (3.6) with λ(t) ∈ NA (x(t)). To calculate NA (x(t)), we note that the constraints {x u,i (t) > 0} are redundant, as they can be Í Í expressed by the constraints { i 6 |S| x u,i (t) 6 (v, j)∈S x v, j (t)} and xr ,1 (t)  0 using the sequence of 11 singleton sets S  (u, i), (p(u), 1), (p(p(u)), 1), · · ·. Hence, we can ignore the constraints {x u,i (t) > 0} from the polytope. Using the definition of the assignment polytope A, Lemma 2.1 asserts that NA (x(t))      Õ   u∈V,S⊆χ(u)  ©Õ λ S (t) ­ «i 6 |S| e u,i − Õ ª e v, j ® + ¬ (v, j)∈S Õ µ i (t)er ,i + i >1 Õ ηu,i (t)e u,i u∈V,i >1 where λ S (t), ηu,i (t) > 0, µ i (t) ∈ R , ηu,i (t) · (1 − x u,i (t))  0,   Õ   ª ©Õ x v, j (t)®  0 . x u,i (t) − and λ S (t) · ­   (v, j)∈S «i 6 |S| ¬  Rearranging the terms in (3.6) and NA (x(t)), and ignoring the terms for the root r , we see that it only remains to show that one can take ηu,i (t) (the Lagrange multiplier for {x u,i (t) 6 1}) to be 0. Let e A be the polytope just as A, except with [0, 1] replaced by [0, 2]. Assume now that x(t) is defined with A replaced by e A. We will show that one has x u,i (t) 6 1. This implies that the Lagrange multipliers for the path defined on e A are valid Lagrange multipliers for the path on A, and in particular one can take ηu,i (t)  0. Toward deriving a contradiction, let us assume that there exists a time t > 0, u ∈ Vh , and i > 1 such that x u,i (t) > 1 and ∂t x u,i (t) > 0. We prove by induction on h that this impossible. For h  0 this follows from the equality constraints at the root. Now consider h > 1 and observe that by (3.3) and (3.4), one must have λ S (t) , 0 for some S ⊆ χ(p(u)), which means that Í Í i 6 |S| x p(u),i (t)  (v, j)∈S x v, j (t). However, the induction hypothesis implies that for any j > 1, x p(u), j (t) 6 1, and thus the constraint corresponding to S \ {(u, i)} is violated for x(t), yielding a a contradiction.  We now prove several lemmas giving a more refined understanding of the dynamics (3.3). The reader is encouraged to skip these arguments upon a first reading. The main technical property b for all times t ∈ [0, T], i.e., the mass per level remains constant. we need to establish is that z(t) ∈ M This is established in Lemma 3.8. For h > 0, let Vh denote the set of vertices with a simple path to the root using h edges. Define C(t) ⊇ {S : λ S (t) , 0} to be the set of active constraints:        C(t) : S ⊆ χ(u) : u ∈ V and Õ x u,i (t)  i 6 |S| Õ        x v, j (t) . (v, j)∈S Lemma 3.6. For any t > 0, u ∈ V, and i > j > 1, it holds that x u,i (t) > x u, j (t). Proof. We will show that x u,i (t) > x u,i+1 (t) implies ∂t x u,i (t) 6 ∂t x u,i+1 (t). Recalling (3.3) and (3.4), it is enough to show that Õ Õ λ S (t) . λ S (t) > S⊆χ(p(u)): (u,i)∈S S⊆χ(p(u)): (u,i+1)∈S Let us show that if (u, i) ∈ S and (u, i + 1) < S then λ S (t)  0, yielding the desired conclusion. Using the constraint for S ∪ {(u, i + 1)} \ {(u, i)} gives Õ (v, j)∈S x v, j (t) > Õ x v, j (t) > (v, j)∈S∪{(u,i+1)}\{(u,i)} 12 Õ i 6 |S| x p(u),i (t) , implying that λ S (t)  0.  Lemma 3.7. Consider u ∈ V and S, S′ ⊆ χ(u) such that S, S′ ∈ C(t). Then S ∪ S′ ∈ C(t) as well. Proof. First we claim that MS : max(v, j)∈S x v, j (t) and MS′ : max(v, j)∈S′ x v, j (t) are equal. Let (v∗ , j∗ ) denote some pair for which x v, j (t) is maximal among (v, j) ∈ S. If MS > MS′ , then for any (v ′ , j ′) ∈ S′, the constraint corresponding to S ∪ {(v ′ , j ′)} \ {(v∗ , j∗ )} is violated because S, S′ ∈ C(t). Let us denote M : MS  MS′ . Suppose that |S| > |S′ |. The same argument shows that for any (v, j) ∈ S\S′, one has x v, j (t)  M. Using the constraint for S \ {(v∗ , j∗ )} and the fact that S ∈ C(t) shows that x u,|S| (t) > M, and thus by Lemma 3.6, one has x u,|S|+m (t) > M for any m > 0. This implies: Õ i 6 |S∪S′ | x u,i (t) > Õ x u,i (t) + M · |S \ S′ |  i 6 |S| Õ x v, j (t) + M · |S \ S′ |  (v, j)∈S Furthermore, since x(t) ∈ A it also holds that that S ∪ S′ ∈ C(t). Í i 6 |S∪S′ | x u,i (t) 6 b Then z(t) ∈ M b for t > 0. Lemma 3.8. Suppose that z(0) ∈ M. Í (v, j)∈S∪S′ Õ x v, j (t) . (v, j)∈S∪S′ x v, j (t), demonstrating  Proof. For u ∈ V, let S u (t) be the maximum (w.r.t. inclusion) active set at time t in χ(u) (cf. Lemma 3.7). Since ∂t x(t) ∈ NA (x(t))⊥ (Lemma 5.8), one has Õ Õ ∂t x u,i (t)  (v, j)∈S u (t) i 6 |S u (t)| which in turns gives, for any h > 1, Õ ∂t x v, j (t) , Õ ∂t x u,i (t)  u∈Vh ,i 6 |S u (t)| ∂t x v, j (t) . (3.7) (v, j)∈∪ u∈Vh S u (t) Thus to compare the derivatives of the mass at two adjacent levels, it remains to establish that Õ Õ ∂t x u,i (t) > u∈Vh ,i>|S u (t)| ∂t x v, j (t) . (v, j)<∪ u∈Vh S u (t):v∈Vh+1 We show that every term in the first sum is nonnegative and every term in the second sum is nonpositive. In particular, since ∂t xr ,i (t)  0 for all i > 1, this will imply by induction that Í Õ v∈Vh+1 , j >1 ∂t x v, j (t) 6 Õ ∂t x u,i (t) 6 0 , u∈Vh ,i >1 b and z(t) ∈ A for all t > 0. yielding u∈Vh ∂t z u (t) > 0. Then the proof is concluded using z(0) ∈ M Thus it remains to show that ∂t x u,i (t) > 0 for all i > |S u | and u < L, and ∂t x v, j (t) 6 0 for all (v, j) < ∪u∈Vh S u (t). For u  r , one has ∂t x u,i (t)  0, and for u , r we have thanks to (3.3) and Lemma 3.5: x u,i (t) + δ λ u,i (t) . ∂t x u,i (t)  − wu Since i > |S u (t)| and S u (t) is the maximum active set in χ(u), it holds that λ S (t)  0 for any S ⊆ χ(u) with |S| > i. Thus from (3.4), we see that λ u,i (t) 6 0, and in turn ∂t x u,i (t) > 0. On the other hand for (v, j) ∈ χ(u) one has x v, j (t) + δ ∂t x v, j (t) 6 − λ v, j (t) . wv Assume (v, j) < S u (t). Then since S u (t) is the maximum active set in χ(u), it holds that λ S (t)  0  for any S with (v, j) ∈ S. Using (3.4), we see that λ v, j (t) > 0, concluding the proof 13 We have established that z(t) is an internal measure for every t > 0, and thus ∂t z(t) is a flow. We now we show that ∂t z(t) is a flow directed toward the request ℓ. Lemma 3.9. It holds that ∂t z u (t) > 0 if u is an ancestor of the request ℓ, and ∂t z u (t) 6 0 otherwise. b (Lemma 3.8), it suffices to show that for any leaf ℓ ′ , ℓ, one has ∂t z ℓ′ (t) 6 0. Proof. Since z(t) ∈ M Í Indeed by preservation of mass at every node (i.e., ∂t z u (t)  v:(u,v)∈E® ∂t z v (t)), this implies that ∂t z u (t) 6 0 for any u which is not an ancestor of ℓ. Furthermore, by preservation of mass per level Í (i.e., u∈Vh ∂t z u (t)  0), and the fact that there is a single ancestor of ℓ per level, this also gives ∂t z u (t) > 0 for any ancestor u of Í ℓ. 1 Notice that ∂t z ℓ′ (t)  − 1−δ i >1 ∂t x ℓ′ ,i (t), and thus it suffices to show that for any i > 1, ′ ∂t x ℓ ,i (t) > 0. The latter inequality is straightforward from (3.3) and (3.4) since χ(ℓ ′ )  ∅.  The next lemma follows immediately from Lemma 3.9 since ∂t x ℓ′ (t) > 0 for all ℓ ′ , ℓ. Lemma 3.10. If x ℓ′ (0) > δ for all ℓ ′ ∈ L, then x ℓ′ (T) > δ for all ℓ ′ ∈ L. Let us extend the definition of k · kℓ1 (w) to x ∈ RΛ by kx kℓ1(w) : Õ wu u∈V Õ |x u,i | . i >1 Observe that sup k∇Φ(x)kℓ∞ (1/w) 6 O(log 1δ ) . x∈A This yields the following. Lemma 3.11. It holds that for every x ∈ A and { y(t)} ⊆ A differentiable: ∂t D̂Φ (y(t); x) 6 k∂t y(t)kℓ1 (w) O(log δ1 ) . The next lemma is an immediate consequence of (2.2). Lemma 3.12. If y ∈ A satisfies yℓ  0, then ∂t D̂Φ (y; x(t)) 6 −x ℓ,1 (t) . In particular, we have that T < ∞ and hence x ℓ,1 (T)  δ. Proof. The first conclusion follows from (2.2) using yℓ  0 and f (t, x(t))  −e ℓ,1 . Since the divergence is nonnegative and it is decreasing with rate at least δ whenever x ℓ,1 (t) > δ, the trajectory ends in finite time.  3.4 The weighted depth potential Let us first define an auxiliary potential function Ψt . We relate it to the dynamics, and then present applications in Section 3.4.1–Section 3.4.3, culminating in the assertion that our algorithm is O((log k)2 )-competitive. Consider a differentiable function Ψ(t) such that ∂t Ψ(t)  Õ w u ∆u (t) + ∆p(u) (t) u∈V\{ r } Õ i >1 14 ∂t x u,i (t) (3.8) for some functions {∆u (t) > 0 : u ∈ V } satisfying ∆u (t) 6 ∆v (t) for all (u, v) ∈ E® as well as ∆r (t) ≡ 0. Note that an important special case is simply when Õ Ψ(t)  w u (∆u + ∆p(u) ) u∈V\{ r } Õ x u,i (t) i >1 ® define where {∆u : u ∈ V } are independent of t. For an edge (u, v) ∈ E, q t (v) : ∆v (t) − ∆u (t) . (3.9) Lemma 3.13. The following holds for almost every t ∈ [0, T]: k∂t x(t)k ℓ1 (q t w) 6 3∆ℓ (t)(x ℓ (t) + δ) + ∂t Ψ(t) . Proof. Note that from Lemma 3.5, for every u ∈ V \ {r }, we have: ∂t x u,i (t)  where  x u,i (t) + δ −1{(u,i)(ℓ,1)} − λ u,i (t) , wu λ u,i (t)  Õ λ S (t) − Õ (3.10) λ S (t) . (3.11) S⊆χ(p(u)): (u,i)∈S S⊆χ(u): i 6 |S| Recalling that ∆r (t)  0 for all t ∈ [0, T], we calculate:  > ∂t Ψ(t) + ∆ℓ (t) + ∆p(ℓ) (t) (x ℓ (t) + δ) Õ  ∂t Ψ(t) + 2∆ℓ (t)(x ℓ (t) + δ)  ∆ℓ (t) + ∆p(ℓ) (t) (x ℓ (t) + δ) +  Õ Õ Õ u∈V\{ r } S⊆χ(u) + λ S (t) Õ Õ Õ u∈V\{ r } S⊆χ(u) + Õ λ S (t) Õ Õ u∈V\{ r } S⊆χ(u) + S⊆χ(r ) ∂t x u,i (t) i >1  ∆v (t) + ∆p(v) (t) (x v, j (t) + δ) − ∆u (t) + ∆p(u) (t) ∆v (t)(x v, j (t) + δ) © Õ  λ S (t) ­ Õ i 6 |S| «(v, j)∈S Õ (∆v (t) − ∆u (t)) + ∆p(v) (t) − ∆p(u) (t) ∆v (t)(x v, j (t) + δ) (v, j)∈S S⊆χ(r )  «(v, j)∈S Õ u∈V\{ r } Õ ª (x u,i (t) + δ)® ¬ (v, j)∈S S⊆χ(r )  © Õ λ S (t) ­ w u ∆u (t) + ∆p(u) (t) © Õ λ S (t) ­ λ S (t) «(v, j)∈S Õ   ª (x v, j (t) + δ)® ¬ ª q t (v) + q t (u) (x v, j (t) + δ)® ¬ ∆v (t)(x v, j (t) + δ) , (v, j)∈S where in the penultimate equality we have used that for S ⊆ χ(u), λ S (t) > 0 ⇒ Õ x u,i (t)  i 6 |S| Õ (v, j)∈S 15 x v, j (t) . (3.12) On the other hand, the q t · w-movement cost is equal to Õ Õ Õ Õ q t (u)w u ∂t x u,i (t)  u∈V\{ r } i >1 u∈V\{ r } i >1 Using (3.10) and (3.11) gives Õ Õ w u q t (u) ∂t x u,i (t) u∈V\{ r } i >1 and − q t (u)w u ∂t x u,i (t) Õ Õ w u q t (u) ∂t x u,i (t) u∈V\{ r } i >1  −  + Õ Õ 6 λ S (t)  Õ +− q t (u)w u ∂t x u,i (t) u∈V\{ r } Õ q t (v)(x v, j (t) + δ) Õ λ S (t)q t (u)  − . (v, j)∈S u∈V S⊆χ(u) Õ 6 q t (ℓ)(x ℓ (t) + δ) + Õ x u,i (t) + δ i 6 |S| u∈V\{ r } S⊆χ(u)  Using q t (ℓ) 6 ∆t (ℓ) and (3.12) again (as well as q t (v)  ∆v (t) for (v, j) ∈ S ⊆ χ(r )), we have Õ Õ Õ q t (u)w u ∂t x u,i (t) 6 ∆t (ℓ)(x ℓ (t) + δ) + u∈V\{ r } i >1 + Õ Õ Õ λ S (t) u∈V\{ r } S⊆χ(u) λ S (t) S⊆χ(r ) Õ  q t (u) + q t (v) (x v, j (t) + δ) (v, j)∈S ∆v (t)(x v, j (t) + δ) , (v, j)∈S yielding the desired result.  Note that k∂t x(t)kℓ1 (q t w)  (1 − δ)k∂t z(t)kℓ1 (q t w) . Thus combining Lemma 3.13 with Lemma 3.12 and using x ℓ (t) > δ for t ∈ [0, T] yields the following. Corollary 3.14. For almost every t ∈ [0, T], if y ∈ A satisfies yℓ  0, then (1 − δ) k∂t z(t)k ℓ1 (q t w) 6 ∂t Ψ(t) + 6∆ℓ (t)∂t D̂Φ (y; x(t)) . For a function f : V → R+ , define b f : V \ L → R+ by n o b f (u) : min f (v) + f (v ′) : v , v ′ , (u, v), (u, v ′) ∈ E® . For concreteness, let us define b f (u) : 0 if u has only one child. Lemma 3.15. For almost every t ∈ [0, T], the following holds. Suppose that (T , w) is a τ-adic HST for τ > 2, and there is some c > 0 such that If y ∈ A satisfies yℓ  0, then b q t (v) > c ∀v ∈ V \ L . c(1 − δ) k∂t z(t)k ℓ1 (w) 6 ∂t Ψ(t) + 6∆ℓ (t)∂t D̂Φ (y; x(t)) . 4 Proof. From Lemma 3.8, it holds that z(t) is an internal measure for all t ∈ [0, T], and moreover ∂t z(t) is a flow towards ℓ (cf. Lemma 3.9). Therefore we can decompose ∂t z(t)  Õ ℓ′ ∈L ′ where y (ℓ ) (t) is a flow on the unique ℓ ′-ℓ path in T . 16 ′ y (ℓ ) (t) , ′ Let us use | y (ℓ ) (t)| to denote the magnitude of the corresponding flow. Since ∂t z(t) is a flow towards ℓ, we have k∂t z(t)k ℓ1 (q t w) > > 1 τ c τ Õ b q t (lca(ℓ, ℓ ′))w lca(ℓ,ℓ′) y (ℓ ) (t) ′ Õ ℓ′ ∈L\{ℓ} ′ w lca(ℓ,ℓ′ ) y (ℓ ) (t) > ℓ′ ∈L\{ℓ} (3.13) c k∂t z(t)k ℓ1 (w) , 4 where the first and last inequality use the fact that w is τ-adic. 3.4.1  Combinatorial depth for general trees Let distT denote the unweighted shortest-path metric on T . Define ∆u (t) : ∆u  distT (r , u), and Ψ(t) : Õ w u ∆u (t) + ∆p(u) (t) u∈V\{ r } Õ x u,i (t) , i >1 Note that q t (cf. (3.9)) satisfies q t ≡ 1 for all t ∈ [0, T]. Therefore applying Corollary 3.14 yields (1 − δ) k∂t z(t)k ℓ1 (w) 6 ∂t Ψ(t) + 6 distT (r , ℓ) · ∂t D̂Φ (y; x(t)) , which in turn gives the following result (recall also Lemma 3.11). Corollary 3.16. For any tree metric with combinatorial depth D, there is an O(D log k)-competitive fractional k-server algorithm. Note that, as opposed to the situation for HSTs, it is not known how to round online a fractional k-server algorithm on a tree to a random integral algorithm while losing only an O(1) factor in the competitive ratio. 3.4.2 Cardinality for an HST Assume now that (T , w) is a τ-adic HST for some τ >  2. Recall that Nu is number of leaves in the subtree rooted at u and define ∆u (t) : ∆u  log Nnu . Define: Ψ(t) : Õ w u ∆u (t) + ∆p(u) (t) u∈V\{ r } Õ x u,i (t) . i >1 Define q  q t as in (3.9). Then for every u ∈ V: q(u)  log Np(u) Nu . In particular, for any two children v, v ′ of u: b q (u) > log Nu Nu + log > log 2 . Nv Nv′ Applying Lemma 3.15 with c : log 2 yields (1 − δ) log 2 k∂t z(t)kℓ1 (w) 6 ∂t Ψ(t) + 6 log(n) · ∂t D̂Φ (y; x(t)) . 4 Combined with Lemma 3.11, this gives the following consequence. Corollary 3.17. If (T , w) is a τ-adic HST for some τ > 2, then there is an O(log(k) log(n))-competitive online fractional k-server algorithm on (L, distw ). The preceding construction motivates our approach to obtaining an O((log k)2 ) competitive ratio: Try to replace Nu by the fractional server mass in the subtree beneath u. 17 3.4.3 Fractional server-weighted depth Finally, let us establish the O((log k)2 ) bound. Suppose now that (T , w) is a τ-adic HST. Define: Ψ(t) : Õ wu u∈V\{ r }     z u (t) + 1 + τ−1 1{u <L} ε log(z u (t) + ε) + z u (t) log(z p(u) (t) + ε) . Consider some node u ∈ V \ {r }, and the terms in ∂t Ψ(t) corresponding to ∂t z u (t): ©  w u ∂t z u (t) ­1 + log (z u (t) + ε) + log z p(u) (t) + ε + «  τ−1 ε 1{u <L} + τ−1 1{u <L} z u (t) + ε   Õ v:(u,v)∈E®  w u ∂t z u (t) 1 + log (z u (t) + ε) + log z p(u) (t) + ε + 1{u <L} τ−1 , z v (t) ª ® z u (t) + ε b where in the last equality we used that z(t) ∈ M. b and (T , w) is a τ-adic HST, it holds that for every j ∈ Z: Since z(t) ∈ M Õ ¬ ∂t z u (t)  0 , u∈V: w u τ j and therefore we conclude that Õ ∂t Ψ(t)   w u ∂t z u (t) log (z u (t) + ε) + log z p(u) (t) + ε u∈V\{ r } − Õ u∈V\{ r } 1  1−δ   k + 2ε k + 2ε w u ∂t z u (t) log + log z u (t) + ε z p(u) (t) + ε Õ wu u∈V\{ r }   Õ k + 2ε k + 2ε log + log ∂t x u,i (t) . z u (t) + ε z p(u) (t) + ε i >1 Therefore (3.8) holds with ∆u (t)  and in this case: q t (u)  k + 2ε 1 log , 1−δ z u (t) + ε z p(u) (t) + ε 1 log . 1−δ z u (t) + ε Now we can prove the main technical theorem of this section. Theorem 3.18. The trajectory σ(z(t)) for t ∈ [0, T] is an internal supermeasure of mass k that services the request at ℓ ∈ L. Moreover, if y ∈ A satisfies yℓ  0, then for almost every t ∈ [0, T]: 1−ε log 34 k∂t σ(z(t))k ℓ1 (w) 6 (1 − δ)∂t Ψ(t) + 6 log(2 + k/ε) · ∂t D̂Φ (y; x(t)) . 4 Proof. First, note that if u ∈ V \ L and z u (t) > ε, then for any children v, v ′ of u: and therefore (1 − δ)b q t (u) > log z u (t) + ε z u (t) + ε 4 + log > log , z v (t) + ε z v′ (t) + ε 3 b q t (u) > log 34 1−δ 18 1{z u (t)> ε} . (3.14) ′ Let y (ℓ ) (t) be as in the proof of Lemma 3.15. Partition L \ {ℓ}  leaves ℓ ′ with v  lca(ℓ, ℓ ′), and define y (v) (t) : Õ Ð v∈V\L L v , where L v is the set of ′ y (ℓ ) (t) . ℓ′ ∈L v Note that by Lemma 3.9, ∂t z(t) is a flow towards ℓ, and thus there are no cancellations in the preceding sum. Now use inequality (3.13) and (3.14) to write k∂t z(t)k ℓ1 (q t w) >  > Õ log 43 (1 − δ)τ ℓ′ ∈L\{ℓ} Õ log 34 (1 − δ)τ ′ w lca(ℓ,ℓ′) 1{ zlca(ℓ,ℓ′) (t)> ε } y (ℓ ) (t) w v 1{z v (t)> ε} y (v) (t) v∈V\L 1−ε log 43 k∂t σ(z(t))k ℓ1 (w) , 1−δ 1 where in the final line we have used the fact that σ is 1−ε -Lipschitz and σ(z v (t))  0 when z v (t) < ε. Combined with Corollary 3.14, this yields the desired result, noting that for any leaf ℓ ∈ L: ∆ℓ (t) 6 k + 2ε 1 log . 1−δ ε  Using Lemma 3.11 and Lemma 3.3, this yields an O((log k)2 )-competitive online fractional kserver algorithm for any HST metric. (It is not difficult to see that every HST metric embeds with O(1) distortion into the metric of a 2-adic HST.) 4 Dynamic HST embeddings Consider a discrete metric space (X, d). Denote the aspect ratio of (X, d) by AX : max x,y∈X d(x, y) min x , y∈X d(x, y) . Theorem 4.1. If there is an α-competitive algorithm for k-server on HSTs, then there is an O(α log(A X ) log k)-competitive algorithm on any metric space (X, d). We use R(X) : X Ž to denote the space of request sequences. For σ ∈ R(X) and s 6 t, denote σ[s,t] : hσs , σs+1 , . . . , σt i. We will consider sequences of random variables that are implicitly functions of σ ∈ R(X). Say that such a sequence Z  hZ t : t > 0i is adapted if Z t is a function of σ[1,t] for every t > 1. This allows one to encode state that depends on the underlying request sequence σ in a timedependent way. For instance, to count the number of requests that fall into a subset X ′ ⊆ X, one would set Z  0. Then given that σt arrives at time t, we would update Z : Z + 1X′ (σt ). The meaning is: Z0  0 and Z t : Z t−1 + 1X′ (σt ) for all t > 1. An online algorithm for k-server on X is an adapted sequence A  hA1 , A2 , . . .i where for every t > 1: A t ∈ X k and σt ∈ {(A t )1 , . . . , (A t )k }. For a function f with domain X, write f ⊗k for the function with domain X k given by f ⊗k (x1 , . . . , x k ) : ( f (x1 ), . . . , f (x k )). For an algorithm A and a request sequence σ, we write costX (A(σ)) for the total movement cost incurred in servicing σ. We denote by optX : R(X) → (X k )Ž an optimal offline algorithm and cost∗X (σ) : costX (optX (σ)) the optimal offline movement cost. 19 4.1 Hierarchical partitions and canonical HSTs Let us suppose that diam(X, d)  1 and AX < ∞. Let τ : 4 be a scale parameter, and let M ∈ Ž denote the smallest number for which τ−M < d(x, y) for all x , y ∈ X. A sequence of subsets ξ  (ξ0 , ξ1 , . . . , ξ ℓ ) of X for 0 6 ℓ 6 M is a chain if ξ0  X and ξ0 ⊇ ξ1 ⊇ · · · ⊇ ξ ℓ . Define the length of such a chain by len(ξ) : ℓ. Denote min(ξ) : ξlen(ξ) . A chain is complete if it has length M and |ξ M |  1. Let CX denote the set of chains in X and let C̄X denote the set of complete chains. Define a rooted tree structure on CX as follows. The root of CX is X. For two chains ξ, ξ ′ ∈ CX : ξ ′ is a child of ξ if and only if ξ is a prefix of ξ ′ and len(ξ ′)  len(ξ) + 1. For ξ, ξ ′ ∈ CX , let lca(ξ, ξ ′) ∈ CX denote their least common ancestor. Define a τ-HST metric on C̄X by ′ dτ (ξ, ξ ′) : τ−len(lca(ξ,ξ )) ξ , ξ′ . Embedding into complete chains. For a partition P of X we write P(x) for the unique set S ∈ P containing x. A τ-stack P of X is a sequence P  (P 0 , P 1 , . . . , P M ) of partitions of X such that: P 0  {X} and for all j  1, 2, . . . , M, it holds that S ∈ P j ⇒ diam(S) 6 τ−j . Note that P M (x)  {x} because diam(S) 6 τ−M implies |S| 6 1. Every τ-stack P induces a canonical mapping FP : X → C̄X into chains on X as First define the  follows.  the set of complete ′ 0 j 0 1 M 0 : : S ∩ S : S ∈ P j , S′ ∈ P j−1 P and P̂ forced refinement P̂  P̂ , P̂ , . . . , P̂ inductively by P̂ for j  1, 2, . . . , M. Next define FP by  FP (x) : P̂ 0 (x), P̂ 1 (x), . . . , P̂ M (x) . The following two lemmas will help to estimate the distortion of the embedding FP . Lemma 4.2. For any τ-stack P, the map FP : X → (C̄X , dτ ) is non-contracting. Proof. Consider x, y ∈ X. If dτ (FP (x), FP (y))  τ−ℓ , then FP (x) and FP (y) share a common prefix of length ℓ, and therefore P ℓ (x)  P ℓ (y). Now property (ii) of a τ-stack guarantees that d(x, y) 6 diam(P ℓ (x)) 6 τ−ℓ .   Lemma 4.3. For any τ-stack P  P 0 , P 1 , . . . , P M , it holds that Õ  dτ FP (x), FP (y) 6 τ τ−j 1P j (x),P j (y) j >1 ∀x, y ∈ X .  Proof. Consider x, y ∈ X and suppose that dτ FP (x), FP (y)  τ−ℓ for some ℓ < M. It is straightforward to check that ℓ + 1  min{ j : P j (x) , P j (y)}.  Next we observe that there is a universal inverse to those embeddings. Define the mapping Fin : C̄X → X by Fin (ξ) : min(ξ). One has for any τ-stack P: Fin ◦ FP  idX . 20 (4.1) 4.2 The HST reduction Let A C denote an α-competitive k-server algorithm for the metric space (C̄X , dτ ) over some probability space ΩC . Suppose that σ  hσ1 , σ2 , . . .i is a request sequence for X, and we have an adapted sequence P  hP1 , P2 , . . .i of τ-stacks of X over an independent probability space ΩX . This yields a mapping FP : R(X) → R(CX ) given by FP (σ) : FP1 (σ1 ), FP2 (σ2 ), . . . . From this one derives a k-server algorithm for X: A X : Fin⊗k ◦ A C ◦ FP , Note that A X is a valid k-server algorithm precisely because of (4.1). Moreover, because of Lemma 4.2, the inverse map Fin is non-expanding, and thus: costX (A X (σ)) 6 ΩC h  costdτ (A C ◦ FP )(σ) i 6 OX,k (1) + α cost∗dτ (FP (σ)) . (4.2) Thus our goal becomes clear: We would like to choose P so that ΩX h  ⊗k ◦ optX )(σ) costdτ (FP i 6 OX,k (1) + β cost∗X (σ) ∀σ ∈ R(X) . (4.3) ⊗k Indeed since FP ◦ optX services the request sequence FP (σ), one has cost∗dτ (FP (σ)) 6   ⊗k ◦ optX )(σ) , and thus (4.3) in conjunction with (4.2) show that A X is an αβ-competitive costdτ (FP algorithm for X. In essence, (4.3) asks that the embedding FP has β-distortion on the subset of X that currently matters. Focusing on such a subset is the reason why one could hope to the usual Ω(log n) lower bound by something depending on k and AX . 4.3 A dynamic embedding The algorithm will produce an adapted sequence P  hP1 , P2 , . . .i of τ-stacks verifying (4.3) with j β 6 O(M log k). In fact it is slightly easier for the algorithm’s description to allow Pt to be a partial partition, i.e., simply a collection of pairwise disjoint subsets of X. In the case it is understood that the embeddings FP use the completion of any such partial partition P, that is all the elements from X \ [P] (we denote [P] : ∪S∈P S) are added as singletons to form a complete partition. The embedding algorithm. For j  1, . . . , M, we will maintain an adapted set N j ⊆ X of level-j centers as well as an adapted mapping R j : N j → R+ of radii. These will be used to construct our adapted τ-stack P  P 0 , P 1 , . . . , P M . For every j ∈ Z, consider the probability distribution µ j with density: dµ j (r) :   kτ j log k exp −rτ j log k 1[0,τ− j ] (r) . k−1 This is simply a truncated exponential distribution, as employed by Bartal [Bar96]. j j Initially, N0  P0  ∅ for j  1, . . . , M. Upon receiving request σt ∈ X, we proceed as follows: For j  1, 2, . . . , M: 1. If |N j | > 2k, then [level- j reset]: For i  j, j + 1, . . . , M, set N j : ∅ and P j : ∅. 21 2. If d(σt , N j ) > τ−j−1 , then [level- j insertion]: (a) N j : N j ∪ {σt } j j (b) R j (σt ) : τ−j−1 + R̂ t , where R̂ t is sampled independently according to the distribution µ j+1 .  (c) P j : P j ∪ B(σt , R j (σt )) \ [P j ] . Analysis. Let us now prove that for the stack P generated in this way, (4.3) holds for β 6 O(M log k). We need a few preliminary results. Lemma 4.4. Pt is a τ-stack for every t > 1. Proof. This follows from the fact that the distribution µ j+1 is supported on the interval [0, τ−j−1 ] j and thus every set in Pt is contained in a ball of radius 2τ−j−1 , which is a set of diameter at most 4τ−j−1 6 τ−j for τ > 4.  We defer the proof of the next lemma to the end of this section. Lemma 4.5. For all x ∈ X and t > 1, it holds that ΩX   dτ (FP t (x), FP t (σt )) 6 O(M log k) d(x, σt ) . Lemma 4.6. For all t > 1 and j  1, 2, . . . , M: If K j,t denotes the number of level-j resets up to time t, then cost∗X (σ[1,t] ) > kτ−j−1 · K j,t . Proof. Suppose that between time t1 +1 and t2 there are requests made at points x1, x2 , . . . , x k+k′ ∈ X that satisfy d(x i , x j ) > D for all i , j. Then clearly: cost∗X (σ[1,t2 ] ) > cost∗X (σ[1,t1 ] ) + k ′ D . Theorem 4.7. For every time t > 1: ΩX h  ⊗k ◦ optX )(σ[1,t] ) costdτ (FP i  6 O(M log k) cost∗X (σ[1,t] ) + OX,k (1) . ⊗k ◦ optX into three parts: First the stack P is possibly Proof. We can split the movement of FP updated by the algorithm, either with a reset or an insertion (each induce movement), and then we mirror the move of optX . Let us first consider the case of a level-j reset at time t. The key observation is that the mapping j−1 j−1 0 FP t remains identical to FP t on the (j −1)-prefix, that is (Pt0 (x), . . . , Pt (x))  (Pt−1 (x), . . . , Pt−1 (x)), ∀x ∈ X. Thus the movement cost induced by a level-j reset is at most kτ1−j . In particular the total cost of resets up to time t is upper bounded by M Õ K j,t · kτ1−j 6 τ2 M · cost∗X (σ[1,t] ) , j1 where the last inequality is Lemma 4.6. For the cost resulting from a level-j insertion at time t, we use the following argument. Assume that j is the smallest index in [M] with a level-j insertion. Note that, by construction of the 22 j radii, one has Pth (σt ) ⊆ Pt (σt ) for h > j. In particular, the movement comes from the set of j servers I t  {i ∈ [k] : (optX t−1 )i ∈ Pt (σt )}, for which the mapping F P t will change the j-suffix j (i.e., (Pt , . . . , PtM )) compared to FP t−1 . However, importantly the (j − 1)-prefix remains identical (this is because there is no insertion at level j − 1 and thus these servers remain part of the same non-singleton cluster at level j − 1). In other words, the total movement is O(τ−j |I t |). Now we argue that we can match this movement with either reset movement or movement coming from optX as follows. First we ignore the set of servers in Jt ⊆ I t such that their (j − 1)-prefix remain the same forever, indeed Í one has t >1 | Jt |  OX,k (1). Now for a server i ∈ I t \ Jt consider the first time s > t such that the X (j − 1)-prefix of FP t−1 ((optX s )i ) is different from F P t ((opt t−1 )i ). The corresponding movement at time s comes either from a reset or from a movement of optX , and moreover its cost is larger than τ−j . Thus we just showed that at the expense of an additive term of OX,k (1) and a multiplicative factor 2 for movement cost induced by resets and the movement of optX , one can ignore the movement cost induced by insertions. Finally, we deal with the cost coming from movement of optX . We may assume that optX is X X X X conservative: If σt ∈ optX t−1 , then optt  optt−1 and otherwise optt−1 \ optt  {x t } for some x t ∈ X, X and opt pays d(σt , x t ). From Lemma 4.5, the expected cost of mirroring this move in dτ is at most O(M log k) d(σt , x t ).  j Thus we are left only to analyze the stretch. Note that since d(σt , Nt ) 6 τ−j−1 by construction, the next lemma yields Lemma 4.5 when combined with Lemma 4.3. j Lemma 4.8. For every y ∈ X satisfying d(y, Nt ) 6 τ−j−1 and every x ∈ X: h i j j  Pt (x) , Pt (y) 6 (2 + 4e)d(x, y)τ j+1 log k . j Proof. Note that |Nt | 6 2k by construction. Let us arrange the centers in the order which they were j j added: Nt  {x1 , x2 , . . . , x N }. Let R̂ 1 , . . . , R̂ N denote the corresponding random radii R̂ i : R̂ t (x i ) and let R i : R̂ i + τ−j−1 . Denote the event  E i : d(x i , {x, y}) 6 R i ∧ max{d(x i , x), d(x i , y)} > R i , and let i ∗ : min{i : d(x i , {x, y}) 6 R i }. Define c : (1 −  h j Pt (x) , j Pt (y) i  6 N Õ i1 N Õ 1 −j−1 . log k )τ Then: [i  i∗ ] · [E i | i  i∗ ] [E i ∧ { R̂ i > c}] + i1 N Õ i1 For any i  1, . . . , N, we have [E i ∧ { R̂ i > c}] 6 sup ∫ R>c 6 (∫   [i  i∗ ] ·  E i ∧ { R̂ i < c} | i  i∗ . R+d(x,y) dµ j+1 (r) R c+d(x,y) dµ j+1 (r) c 23 )   k  j+1 1 − exp −d(x, y)τ j+1 log k e −cτ log k k−1 2e 6 d(x, y)τ j+1 log k , k  where the final line uses 1 − e −u 6 u and k > 2. 4e d(x, y)τ j+1 log k since N 6 2k. Now analyze: This yields ∫ R+d(x,y)       R  dµ j+1 (r)  [E i ∧ { R̂ i < c} | i  i∗ ] 6 sup ∫ − j−1 06 R<c    τ dµ j+1 (r)    R ∫ c+d(x,y) 6 c∫ − j−1 τ c  ÍN i1 [E i ∧ { R̂ i > c}] 6 dµ j+1 (r) dµ j+1 (r) 1 − exp −d(x, y)τ j+1 log k 1 − exp(cτ j+1 log k)/k  6 2d(x, y)τ j+1 log k , where in the last line we have used again 1 − e −u 6 u and the value of c.  5 Mirror descent We now prove Theorem 2.2. 5.1 Preliminaries Consider an Rn -set-valued map F with domain X ⊆ Rn . We will be interested in the following viability problem (i.e., a differential inclusion with a constraint set for the solution): Given a constraint set K ⊆ X and initial point x0 ∈ K, find an absolutely continuous solution x : [0, ∞) → K such that ∂t x(t) ∈ F(x(t)) , x(0)  x0 . The upshot is that, under appropriate continuity condition on F, this problem has a solution provided that F always contain admissible directions, that is F(x) ∩ TK (x) , ∅ where TK (x) is the tangent cone to K at x (see definition below). We now recall the needed definitions with some basic results, and state the general existence theorem from [AC84]. Definition 5.1. The polar N ◦ of a set N ⊆ Rn is N ◦ : {z ∈ Rn : hz, yi 6 0 for all y ∈ N } . The normal cone to K at x is and the tangent cone to K at x is NK (x)  (K − x)◦ , TK (x) : NK (x)◦ . Lemma 5.2 (Moreau’s decomposition [HUL93, Thm III.3.2.5]). Let N be a cone. Then for any x ∈ Rn there is a unique pair (u, v) ∈ N × N ◦ such that hu, vi  0 and x  u + v. Furthermore u (resp., v) is the projection of x onto N (resp., N ◦ ). 24 Definition 5.3. F is upper semicontinuous (u.s.c.) if for any x ∈ X and any open neighborhood N ⊃ F(x) there exists a neighborhood M of x such that F(M) ⊆ N. F is upper hemicontinuous (u.h.c.) if, for any θ ∈ Rn , the support function x 7→ sup y∈F(x) hθ, yi is upper semicontinuous. Lemma 5.4 ([AC84, Prop. 1, pg. 60; Cor. 2, pg. 63]). For any F as above, u.s.c. implies u.h.c., and moreover if F takes compact, convex values then the two notions are equivalent. Lemma 5.5 ([AC84, Thm. 1, pg. 41]). Let F and G be two set valued maps such that F is u.s.c., F takes compact values, and the graph of G is closed. Then the set-valued mapping x 7→ F(x) ∩ G(x) is u.s.c. Theorem 5.6 ([AC84, Thm. 1, pg. 180]). Assume that F is u.h.c. and takes compact, convex values, and that K is compact. Furthermore assume the tangential condition: For any x ∈ X, F(x) ∩ TK (x) , ∅ . Then the viability problem admits an absolutely continuous solution. 5.2 Existence We prove the following theorem which can be viewed as a non-Euclidean extension of [AC84, pg. 217]. Theorem 5.7. Let K ⊆ Rn be a compact convex set, let H : K → {A ∈ Rn×n : A ≻ 0} be continuous, and let f : [0, ∞) × K → Rn be continuous. Then, for any x0 ∈ K, there is an absolutely continuous solution x : [0, ∞) → K K satisfying  ∂t x(t) ∈ H(x) f (t, x(t)) − NK (x(t)) , x(0)  x0 . (5.1) Furthermore, any solution to the viability problem satisfies 2 ∂t x(t)  argmin kv − H(x) f (t, x(t))kx,∗ : v ∈ TK (x(t)) .  (5.2) k∂t x(t)kx,∗ 6 k f (t, x)kx . (5.3) In particular, one has Proof. It suffices to prove the existence on any time interval [T, T + 1]. We denote h·, ·ix for the inner product induced by H(x) (i.e., hα, βix : hα, H(x)βi), k · kx for the corresponding norm, and k · kx,∗ for its dual norm. To apply Theorem 5.6, consider the following differential inclusion, with K  [T, T + 1] × K, e x ′(t) ∈ F(e x (t)) , where F : K → 2R n+1 defined by  F(t, x) : 1, H(x) f (t, x) − NK (x)) ∩ {v ∈ Rn : kv kx,∗ 6 k f (t, x)kx }  . Thanks to the restriction to velocities satisfying kv kx,∗ 6 k f (t, x)kx , it holds that F(t, x) is compact (it is also clearly convex). Moreover, K is compact. Thus, besides the tangential condition, it remains to show that F is u.h.c. Since F is compact and convex valued, by Lemma 5.4 it suffices to show that F is u.s.c. For this we apply Lemma 5.5. Note that {(1, H(x)( f (t, x) − y)) : x ∈ K, y ∈ NK (x)} is closed (using again continuity of H and f ), and thus it suffices to show that the mapping x 7→ {v ∈ Rn : kv kx,∗ 6 k f (t, x)kx } is u.s.c., which is clearly true since its support function in direction θ is x 7→ k f (t, x)kx kθkx which is continuous by continuity of H and f . 25 It remains to check the tangential condition. We note that NK (t, x)  TK (t, x)  ( ( (−∞, 0] × NK (x) t  0 , {0} × NK (x) otherwise. [0, ∞) × TK (x) R × TK (x) t  0, otherwise. Thus it suffices to show that there exists u ∈ NK (x) such that kH(x)( f (t, x) − u)kx,∗ 6 k f (t, x)kx and H(x)( f (t, x) − u) ∈ TK (x). We apply Moreau’s decomposition (Lemma 5.2) in Rn equipped with the inner product h·, ·ix to the cone NK (x) and write f (t, x)  u + v where u ∈ NK (x) and v is in the polar (w.r.t. h·, ·ix ) of NK (x). Since hu, vix  0, we have k f (t, x) − u kx 6 k f (t, x)kx . This gives kH(x)( f (t, x) − u)kx,∗ 6 k f (t, x)kx . Furthermore since v is in the polar, we have for all y ∈ NK (x), h f (t, x) − u, yix 6 0 which means that H(x)( f (t, x) − u) ∈ TK (x). This concludes the existence proof. Since the objective function in (5.2) is strongly convex, the optimality condition of (5.2) shows that any v ∈ TK (x(t)) satisfying H(x)−1 (v − H(x) f (t, x(t))) ∈ −TK (x(t))◦ is the unique solution. Now, we note that ∂t x(t) ∈ TK (x(t)) because x(t) ∈ K and H(x)−1 (∂t x(t) − H(x) f (t, x(t))) ∈ −NK (x(t))  −TK (x(t))◦ , where we used that TK (x(t))◦  NK (x(t))◦◦  NK (x(t)) (since NK (x(t)) is a closed and convex cone). This establishes (5.2). Since we exhibited a solution satisfying (5.3), the almost everywhere uniqueness of ∂t x(t) shows that (5.3) holds for any solution.  5.3 Uniqueness We prove here that the solution to the viability problem is in fact unique under slightly more restrictive assumptions than those in Theorem 5.7. In what follows, we denote, as in the proof of Theorem 5.7, h·, ·ix for the inner product induced by H(x), k · kx for its corresponding norm and k · kx,∗ for its dual norm. Lemma 5.8. Let x(t) be an absolutely continuous path with values in a convex set K ⊆ Rn . Then, ∂t x(t) ∈ NK (x(t))⊥ almost everywhere. Proof. For any t such that ∂t x(t) exists, one has x(t + h)  x(t) + h∂t x(t) + o(h) . In particular for any y ∈ NK (x(t)), since x(t + h) ∈ K, one has y, x(t + h) − x(t) 6 0. Taking h → 0+ , we obtain y, ∂t x(t) 6 0. Taking h → 0− , we obtain y, ∂t x(t) > 0. Therefore, ∂t x(t) ∈ NK (x(t))⊥ .  Lemma 5.9. The solution x(t) in Theorem 5.7 is unique provided that H is Lipschitz, and f is locally Lipschitz. Proof. Let x(t) and x̃(t) be two solutions to the viability problem. We show that for any T > 0 there are some constants C, ε > 0 such that for all t ∈ [T, T + ε], 2 2 , 6 C kx(t) − x̃(t)kx(t),∗ ∂t kx(t) − x̃(t)kx(t),∗ 26 (5.4) which concludes the proof by a simple application of Gronwall’s inequality (notice that since H is continuous and K is compact, there is some constant ε′ such that H −1 (x)  ε′In , ∀ x ∈ K). Recall that we have ∂t x(t)  H(x(t))( f (t, x(t)) − u(t)) for some u(t) ∈ NK (x(t)) (and similarly for x̃ there is some path ũ in the normal cones). In particular we get: 1 2 ∂t kx(t) − x̃(t)kx(t),∗  hx(t) − x̃(t), H(x(t))( f (t, x(t)) − u(t)) − H(x̃(t))( f (t, x̃(t)) − ũ(t))ix(t),∗ 2 (5.5) 1 (5.6) + (x(t) − x̃(t))⊤ (∂t H(x(t))−1 )(x(t) − x̃(t)) . 2 Denote k · kop for the spectral norm, and observe that by continuity of H and compactness of K, there exists M > 0 such that for all t, kH(x(t))kop , kH(x(t))−1 kop 6 M. Thus we can bound the term (5.6) as follows: 2 kH(x(t))1/2 (∂t H(x(t))−1 )H(x(t))1/2 kop (x(t) − x̃(t))⊤ (∂t H(x(t))−1 )(x(t) − x̃(t)) 6 kx(t) − x̃(t)kx(t),∗ 2 6 M kx(t) − x̃(t)kx(t),∗ k(∂t H(x(t))−1 )kop . Now since H is Lipschitz, there exists a constant M ′ such that for all t ∈ [T, T + ε], k(∂t H(x(t))−1 )kop  kH(x(t))−1 (∂t H(x(t)))H(x(t))−1 kop 6 M 2 M ′ k∂t x(t)k2 6 M 3 M ′ k∂t x(t)kx(t),∗ 6 M 3 M ′ k f (t, x(t))kx(t) , where the last inequality follows from (5.3). Since f (t, x) is uniformly bounded on [T, T + ε], we 2 finally get that for some C > 0, the term (5.6) is bounded from above by C kx(t) − x̃(t)kx(t),∗ for all t ∈ [T + ε]. Next we consider the term (5.5) and decompose it into two terms:  (i) (x(t) − x̃(t))⊤ f (t, x(t)) − u(t) − ( f (t, x̃(t)) − ũ(t)) , and (ii) x(t) − x̃(t), (H(x(t)) − H(x̃(t))) f (t, x̃(t)) − ũ(t) We further decompose (i) into  x(t),∗ . (iii) (x(t) − x̃(t))⊤ ( f (t, x(t)) − f (t, x̃(t))), and (iv) (x(t) − x̃(t))⊤ (ũ(t) − u(t)). To bound (iii), we now use that f is locally Lipschitz, which shows that this term is bounded from above by C kx(t) − x̃(t)kx(t),∗ for any t ∈ [T, T + ε]. The term (iv) is nonpositive since u(t) ∈ NK (x(t)) and ũ(t) ∈ NK (x̃(t)). Finally, for (ii) one can combine Lipschitzness of H and (5.3) as above to obtain that it is bounded by C kx(t) − x̃(t)kx(t),∗ for all t ∈ [T, T + ε], thus concluding the proof.  Acknowledgements Part of this work was carried out while M. B. Cohen, Y. T. Lee, and J. R. Lee were at Microsoft Research in Redmond. We thank Microsoft for their hospitality. M. B. Cohen and A. Madry ˛ are supported by NSF grant CCF-1553428 and an Alfred P. Sloan Fellowship. J. R. Lee is supported by NSF grants CCF-1616297 and CCF-1407779 and a Simons Investigator Award. 27 References [ABBS14] Jacob Abernethy, Peter Bartlett, Niv Buchbinder, and Isabelle Stanton. A regularization approach to metrical task systems. In Algorithmic Learning Theory, ALT 2010. Springer, 2014. 3 [AC84] Jean Pierre Aubin and A. Cellina. Differential Inclusions: Set-Valued Maps and Viability Theory. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 1984. 24, 25 [Bar96] Yair Bartal. Probabilistic approximations of metric spaces and its algorithmic applications. In 37th Annual Symposium on Foundations of Computer Science, FOCS ’96, Burlington, Vermont, USA, 14-16 October, 1996, pages 184–193, 1996. 2, 21 [Bar98] Yair Bartal. On approximating arbitrary metrices by tree metrics. In STOC ’98 (Dallas, TX), pages 161–168. ACM, New York, 1998. 2 [BBK99] Avrim Blum, Carl Burch, and Adam Kalai. Finely-competitive paging. In 40th Annual Symposium on Foundations of Computer Science (New York, 1999), pages 450–457. IEEE Computer Soc., Los Alamitos, CA, 1999. 2 [BBM06] Yair Bartal, Béla Bollobás, and Manor Mendel. Ramsey-type theorems for metric spaces with applications to online problems. J. Comput. System Sci., 72(5):890–921, 2006. 2 [BBMN15] Nikhil Bansal, Niv Buchbinder, Aleksander Madry, and Joseph Naor. A polylogarithmic-competitive algorithm for the k-server problem. J. ACM, 62(5):Art. 40, 49, 2015. 3, 9 [BBN12] Nikhil Bansal, Niv Buchbinder, and Joseph Naor. A primal-dual randomized algorithm for weighted paging. J. ACM, 59(4):Art. 19, 24, 2012. 3 [BCN14] Niv Buchbinder, Shahar Chen, and Joseph (Seffi) Naor. Competitive analysis via regularization. In Proceedings of the Twenty-fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’14, pages 436–444, Philadelphia, PA, USA, 2014. Society for Industrial and Applied Mathematics. 3 [BE98] Allan Borodin and Ran El-Yaniv. Online computation and competitive analysis. Cambridge University Press, New York, 1998. 2 [BLMN05] Yair Bartal, Nathan Linial, Manor Mendel, and Assaf Naor. On metric Ramsey-type phenomena. Ann. of Math. (2), 162(2):643–709, 2005. 2 [Bub15] Sébastien Bubeck. Convex optimization: Algorithms and complexity. Foundations and Trends in Machine Learning, 8(3-4):231–357, 2015. 3 [CMP08] Aaron Coté, Adam Meyerson, and Laura Poplawski. Randomized k-server on hierarchical binary trees. In STOC’08, pages 227–233. ACM, New York, 2008. 3 [FKL+ 91] A. Fiat, R. M. Karp, M. Luby, L. A. McGeoch, D. D. Sleator, and Young N. E. Competitive paging algorithms. J. Algorithms, 12(4):685–699, 1991. 2 [FRT04] Jittat Fakcharoenphol, Satish Rao, and Kunal Talwar. A tight bound on approximating arbitrary metrics by tree metrics. J. Comput. Syst. Sci., 69(3):485–497, 2004. 2 [Haz16] Elad Hazan. Introduction to online convex optimization. Foundations and TrendsÂő in Optimization, 2(3-4):157–325, 2016. 3 28 [HUL93] Jean-Baptiste Hiriart-Urruty and Claude Lemaréchal. Convex analysis and minimization algorithms, Volume I: Fundamentals. Springer-Verlag, 1993. 24 [Kou09] Elias Koutsoupias. The k-server problem. Computer Science Review, 3(2):105–118, 2009. 2 [KP95] Elias Koutsoupias and Christos H. Papadimitriou. On the k-server conjecture. J. Assoc. Comput. Mach., 42(5):971–983, 1995. 2 [MMS90] Mark S. Manasse, Lyle A. McGeoch, and Daniel D. Sleator. Competitive algorithms for server problems. J. Algorithms, 11(2):208–230, 1990. 2 [MS91] Lyle A. McGeoch and Daniel D. Sleator. A strongly competitive randomized paging algorithm. Algorithmica, 6(6):816–825, 1991. 2 [NY83] A. Nemirovski and D. Yudin. Problem Complexity and Method Efficiency in Optimization. Wiley Interscience, 1983. 3 29
8cs.DS
arXiv:1401.5439v1 [math.AP] 21 Jan 2014 Formal Solutions of a Class of Pfaffian Systems in Two Variables∗ Moulay Barkatou, Suzy S. Maddah XLIM UMR 7252 ; DMI University of Limoges; CNRS 123, Avenue Albert Thomas 87060 Limoges, France [email protected] [email protected] † Hassan Abbas Laboratory of Mathematics Lebanese University Beirut, Lebanon [email protected] January 22, 2014 Abstract In this article, we present an algorithm which computes a fundamental matrix of formal solutions of completely integrable Pfaffian systems with normal crossings in two variables, based on [Barkatou, 1997]. A first step was set in [Barkatou et al., 2006] where the problem of rank reduction was tackled via the approach in [Levelt, 1991]. We give instead a Moser-based approach following [Barkatou et al., 2014; Barkatou, 1995]. And, as a complementary step, we associate to our problem a system of ordinary linear singular differential equations from which the formal invariants can be efficiently derived via the package ISOLDE [Barkatou et al., 2013], implemented in the computer algebra system Maple. Keywords: Linear systems of partial differential equations, Pfaffian systems, Formal solutions, Moser-based reduction, Hukuhara-Turritin’s normal form ∗ Submitted to the International Symposium on Symbolic and Algebraic Computation, Kobe, Japan, 2014. † Enrolled under a joint PhD program with the Lebanese University 1 1 Introduction Let O = C[[x1 , x2 , . . . xm ]] be the ring of formal power series in x = (x1 , x2 , . . . , xm ) over the field of complex numbers C and K its field of fractions. Let V be a K-vector space of dimension n, A(1) , . . . , A(m) be nonzero matrices with entries in O, and p1 , . . . , pm be nonnegative integers. Set δi = xi ∂x∂ i . Then the operator ∆i = δi − A(i) /xpi i , i = 1, . . . , m, is a δi -differential operator acting on V , that is, an additive map from V to itself satisfying the Leibniz condition: ∀f ∈ O, v ∈ V, ∆i (f v) = δi (f )v + f ∆i (v). Let Y be an unknown n-dimensional column vector. In this article, we are interested in the formal reduction of the so-called completely integrable Pfaffian systems with normal crossings, the class of linear systems of partial differential equations in m variables and dimension n, given by ∆i Y = 0, 1 ≤ i ≤ m. (1) satisfying the integrability conditions (pairwise commutativity of the operators), ∆i ◦ ∆j = ∆j ◦ ∆i , 1 ≤ i, j ≤ m. Pfaffian systems arise in many application [Awane, 2000] including the studies of aerospace and celestial mechanics [Broucke, 1978]. By far, the most important for applications are those with normal crossings [Novikov et al., Pm A(i) 2002]. The associated pfaff (1-form) to system (1) is d = i=1 pi +1 dxi . xi Without loss of generality, the singularity of system(1) is placed at the origin. Otherwise, translations in the independent variables can be performed. The singular locus of the system is the union of hyperplanes of coordinates x1 x2 . . . xm = 0. This is what is referred to as normal crossings. Let T ∈ GL(V ). A change of basis Y = T Z gives rise to ˜ i Z = 0, 1 ≤ i ≤ m ∆ (2) ˜ i = T −1 ∆i T = δi − Ã(i) /xp̃i and where ∆ i (i) Ã(i) −1 A T − δi T ), = T ( xpi i xp̃i i 1 ≤ i ≤ m. (3) We say that system (2) is equivalent to system (1). Without loss of generality, we assume that A(i) (xi = 0) are nonzero matrices; otherwise pi can be readjusted. The m-tuple (p1 , . . . , pm ) of nonnegative integers is called the Poincaré rank of the system. It is said to be minimal, and is called the true Poincaré rank, whenever the pi ’s are simultaneously and individually the smallest among all the possible changes of basis Y = T Z, T ∈ GLn (K). In [Charrière et al., 1981; van den Essen et al., 1982], the language of stable modules over the ring of power series is used to establish the following theorem (Theorem 1 in [Charrière et al., 1981] and Main Theorem in [van den Essen et al., 1982]). 2 Theorem 1 Consider the completely integrable system (1). Under additional ramifications, xi = tαi i where αi is a positive integer, 1 ≤ i ≤ m, there exists T that belongs to GLn (C((t1 , . . . , tm ))) such that the change of basis Y = T Z gives the equivalent system: T −1 ∆i T = ∂ − Ã(i) (ti ) ∂ti where Ã(i) (ti ) = Diag(Ãi1 , Ãi2 , . . . , Ãih ), and for all 1 ≤ k ≤ h we have −1 i • Ãik = wki (t−1 i )Ink + ti Nk ; Pαi pi +1 ξijk t−j • wki (ti ) = j=1 is a polynomial in t−1 with coefficients in C. i i P α p +1 −j i i In particular, w̄ki (ti ) = j=2 ξijk ti , for all 1 ≤ k ≤ h, are called the xi -exponential parts; • Nki is a square matrix of order nk with elements in C, nilpotent in upper triangular form; • n1 + n2 + · · · + nh = n. This theorem guarantees the existence of a change of basis which takes system (1) to Hukuhara-Turritin’s normal form from which the construction of a fundamental matrix of formal solutions (see (6) for m = 2) is straightforward. In particular, if two systems are equivalent then they have the same xi exponential parts for all 1 ≤ i ≤ m. However, the formal reduction, that is to say the algorithmic procedure computing such a change of basis, is a question of another nature. We remark that the integrability conditions and the property of normal crossings play a major role in establishing this theorem. In particular, they give rise to the following aspect of system (1) (Proposition 1, page 8, [van den Essen et al., 1982]). Proposition 1 The eigenvalues of A(i) (xi = 0), 1 ≤ i ≤ m, lie in the field of constants. The univariate case, m = 1, is the well-known case of linear singular system of ordinary differential equations (ODS, in short) which have been studied extensively (see, e.g., [Balser, 2000; Wasow, 2002] and references therein). Moreover, unlike the case of m > 1, algorithms to related problems leading to the construction of the formal solutions and computation of the exponential parts have been developed by various authors (see, e.g., [Barkatou, 1997; Barkatou et al., 2013, 1999, 2009] and references therein). The package ISOLDE [Barkatou et al., 2013] written in the computer algebra system Maple is dedicated to the symbolic resolution of ODS and more generally linear functional matrix equations. 3 The bivariate case, m = 2, is the interest of this article. Our first contribution is an explicit method to compute the xi -exponential parts. Alongside their importance in the asymptotic theory, their computation reduces the ultimate task of formal reduction to constructing a basis of the C-space of regular solutions (see, for m = 1, [Barkatou et al., 1999]). Rank reduction as well can complement our work into full formal reduction. Rank reduction is the explicit computation of a change of basis which takes system (1) to an equivalent system whose rank is the true Poincaré rank. Two well-known approaches in the uniariate case are those of Levelt [Levelt, 1991] and Moser [Moser, 1960]. The former is generalized for systems (1) in two variables (m = 2) in [Barkatou et al., 2006]. The latter, on the other hand, gives a reduction criterion upon which the efficient algorithms of [Barkatou et al., 2013] are based. It is generalized for singularly-perturbed linear differential systems in [Barkatou et al., 2014] and examples over the bivariate field favored its efficiency [Section 4 in [Barkatou et al., 2014]]. Our second contribution is a Moser-based rank reduction algorithm of system (1) in two variables. This establishes its formal reduction upon following the univariate-case descripiton of [Barkatou, 1997]. We remark that the multivariate particular case of pi = 0 for all 1 ≤ i ≤ m (systems with singularity of first kind) is studied in [LeRoux, 2006] and references therein. Our article is organized as follows: In Section 2 we give the preliminaries and restrict our notations to two variables. In Section 3 we review the formal reduction techniques in [Barkatou, 1997] of ODS, including the computation of the exponential parts. Thereafter the discussion is restricted to the bivariate case. In Section 4 we present the building blocks of formal reduction reducing the discussion to two elements. The first of which is the computation of the xi -exponential parts given in Section 5. The second is the Moser-based rank reduction algorithm given in Section 6. We finally discuss the limitations and point out prospects of further investigations in Section 7. Our main results are Theorem 3 and Theorem 4. 2 Preliminaries and Notations For the clarity of presentation in the bivariate case, we set O = C[[x, y]], K its field of fractions, Ox = C[[x]], and Oy = C[[y]]. The variables x and y will be dropped from the notation whenever ambiguity is not likely to arise. We refer to the identity and zero matrices of prescribed dimensions by Iν and Oν,µ . System (1) can be rewritten as ( x ∂Y = A(x, y)Y = x−p (A0 (y) + A1 (y)x + A2 (y)x2 + . . . )Y ∂x (4) y ∂Y = B(x, y)Y = y −q (B0 (x) + B1 (x)y + B2 (x)y 2 + . . . )Y ∂y 4 where (A0 (y), B0 (x)) is called the leading coefficient pair. The Poincaré rank of system (4) is thus (p, q) and we refer to (A00 , B00 ) := (A(0, 0), B(0, 0)) as the leading constant pair. An easy calculation shows that the the integrability condition is given by x ∂A ∂B + BA = y + AB. ∂x ∂y (5) It follows from Theorem 1 that a fundamental matrix of formal solutions has the following form and properties Φ(x1/s1 , y 1/s2 ) xΛ1 y Λ2 exp(Q1 (x−1/s1 )) exp(Q2 (x−1/s2 )) (6) • s = (s1 , s2 ) is two-tuple of positive integers; • Φ is an invertible meromorphic series in (x1/s1 , y 1/s2 ) over C; • Q1 , Q2 are diagonal matrices containing polynomials in x−1/s1 and y −1/s2 over C without contant terms; they are obtained by formally integrating the x, y-exponential parts respectively; • Λ1 and Λ2 are constant matrices commuting with Q1 and Q2 . System (4) (resp. system (1)) is said to be regular singular whenever Q1 and Q2 are null. In this case s = (1, 1), and the formal series φ converges whenever the series of A and B do. Otherwise, system (4) is irregular singular and the entries of Q1 , Q2 determine the main asymptotic behavior of the actual solutions as xi → 0 in appropriately small sectorial regions (Proposition 5.2, page 232, and Section 4 of [Gérard et al., 1979]). It is shown in [Deligne, 1970; van den Essen, 1979], for the multivariate case in geometric and algebraic settings respectively, that the regularity of system (4) is equivalent to the regularity of the individual subsystems each considered as a system of ordinary differential equations. As a consequence, system (4) is regular singular if and only if its true Poincaré rank is (0, 0). And to test its regularity, algorithms given for m = 1 (e.g.[Barkatou et al., 2009; Levelt, 1991]) can be applied separately to the individual subsystems. We end this section by a further characterization of a change of basis T in the bivariate case, which takes system (4) to an equivalent system in a weak-triangular form, rather than that of Theorem 1. However, we’ll see in Theorem 3 that this form suffices to give an insight into the computation of x, y-exponential parts. The following Proposition is given as [Proposition3, page 654, [Charrière et al., 1981]] and the proof is to be omitted here due to the lack of space. Proposition 2 Consider the completely integrable system (4). Under additional ramification, x = ts1 where s1 is a positive integer, there exists T ∈ GLn (C((t, y))), product of transformations of type diag(tk1 , . . . , tkn ) (where 5 k1 , . . . , kn are nonnegative integers) and transformations in GLn (C[[t, y]]), such that the change of basis T = Y Z gives the following equivalent system: ( ∂Z = Ã(t, y)Z ∂t (7) ∂Z = B̃(y)Z ∂y where Ã(t, y) = Diag(Ã1 , Ã2 , . . . , Ãh ) and for all 1 ≤ k ≤ h • Ãk = ak (t−1 )Ink + t−1 Nk (y); Ps1 p+1 ξjk t−j is a polynomial in t−1 with coefficients in C; • ak (t) = j=1 • Nk is a nk -square matrix with elements in Oy ; • y q+1B̃(y) ∈ Oy and B̃(y) = Diag(B̃1 , B̃2 , . . . , B̃h ); • y q+1B̃k |y=0 = ck Ink + Fk where ck ∈ C and Fk is a nilpotent constant matrix. Ps1 p+1 Remark 1 Let āk (t) = j=2 ξjk t−j then they are the x-exponential parts of system (7) (resp. system (4)). 3 Formal Reduction of ODS For m = 1, system (1) reduces to the linear singular differential system of ordinary equations x dY = A(x)Y = x−p (A0 + A1 x + A2 x2 + . . . )Y dx (8) where A0 := A(0) is the leading coefficient matrix and p is a nonnegative integer denoting the Poincaré rank. For a fundamental matrix of solutions, in analogy to (6), we write Φ(x1/s ) xΛ exp(Q(x−1/s )). (9) If T ∈ GLn (C((x))) then the change of basis Y = T Z results in the equivalent system dZ x = Ã(x)Z = x−p̃ (Ã0 + Ã1 x + Ã2 x2 + . . . )Z. (10) dx The second author of this article developed in [Barkatou, 1997] a recursive algorithmic process that constitutes of finding, at every step, a change of basis which results in a system (10) equivalent to system (8) which is either of lower Poincaré rank or can be decoupled into systems of lower dimensions. At each step, the starting point is the nature of eigenvalues of the leading coefficient matrix A0 according to which either a block-diagonalized equivalent system, a Moser-irreducible one, or the Katz invariant are computed. The following operations summarize the recursive process: 6 • Block-diagonalization: Whenever A0 has at least two distinct eigenvalues, system (8) can be decoupled into systems of lower dimensions via the classical Splitting Lemma. For its statement and a constructive proof one may consult [Section 12, pages 52-54, [Wasow, 2002]]. • Eigenvalue shifting: Whenever A0 has a single nonzero eigenvalue γ ∈ C, the so-called Eigenvalue shifting Z Y = exp( γx−p−1 dx)Z, (11) results in a system with a nilpotent leading coefficient matrix (in fact, Ã(x) = A − x−p γIn ). • Moser-based rank reduction: This is the rank reduction based on the reduction criterion defined by Moser in [Moser, 1960]. It results in an equivalent system whose Poincaré rank is the true Poincaré rank and whose leading coefficient matrix has the minimal rank among any possible choice of a change of basis. For an efficient Moser-based rank reduction algorithm, one may consult [Barkatou et al., 2009]. If the leading matrix coefficient of the equivalent Moser-irreducible system is still nilpotent, one proceeds to compute the Katz invariant, a process for which Moser-irreducibility is a prerequisite. • Katz invariant: Definition 1 Given system (8) whose x-exponential parts are denoted by {w̄k }1≤k≤n . For 1 ≤ k ≤ n, let ζk be the minimum exponent in x within the terms of w̄k . The Katz invariant of (8) (resp. A(x)) is then the rational number κ = −1 − min1≤k≤n ζk . Katz invariant can be obtained from the characteristic polynomial of A(x), i.e. det(λI − A(x)), given that A(x) is Moser-irreducible [e.g. Theorem 1 in [Barkatou, 1997]]. Consider a Moser-irreducible system (8) whose leading matrix coefficient is nilpotent and κ = ml with l, m relatively prime positive integers. Then, a ramification, that is to say a re-adjustement of the independent variable t = x1/m , followed by Moser-based rank reduction results in an equivalent Moser-irreducible system whose Poincaré rank is equal to l and its leading matrix coefficient has at least m distinct eigenvalues. Hence, block-diagonalization may be applied again. This recursive process results either in a group of decoupled systems with dimension n = 1 (scalar case) or Poicaré rank p = 0 (system with singularity of first kind). For the latter case one may consult Chapter 1 in [Wasow, 7 2002] or [Barkatou et al., 1999] for a more general context. The changes of basis applied at every stage are used to construct a fundamental matrix of solutions (9). Algorithms of the four described operations are implemented in Maple (see ISOLDE [Barkatou et al., 2013]). 4 Formal Reduction in the bivariate case Consider again the completely integrable system (4) ( = A(x, y)Y = x−p (A0 (y) + A1 (y)x + . . . )Y x ∂Y ∂x y ∂Y = B(x, y)Y = y −q (B0 (x) + B1 (x)y + . . . )Y. ∂y A major difficulty within the symbolic manipulation of system (4) (resp. system (1)) arises from (3) as it is evident that any transformation applied to any of the subsystems alters the others. Hence, the generalization of the univariate-case techniques is not straightforward. In particular, the equivalent system does not necessarily inherit the normal crossings even for very simple examples, as exhibited by Example 1 in [Section 4, [Barkatou et al., 2006]] which we recall here. Example 1 Consider the following completely integrable pfaffian system with normal crossings of Poincaé rank (3, 1) and true Poincaré rank (0, 0).  # " 3 2  x + y y  ∂Y −3  Y  x ∂x = A(x, y)Y = x −1 −y + x3 # " . (12) 2  y y  ∂Y −1  Y.  y ∂y = B(x, y)Y = y −2 −3  x3 −y 2 Z computed by the univariate-case MoserThe change of basis Y = 0 y based rank reduction algorithm, upon regarding the first subsystem as an ODS in x, results in the following equivalent system  " #  −2 0  ∂Z   x ∂x = Ã(x, y)Z = −1 1 Z y" # 2  −y 0  ∂Z −2  Z.  y ∂y = B̃(x, y)Z = y −2x3 −2y 2  We can see that such a transformation achieves the goal of diminishing the rank of the first subsystem, considered as an ODS, to its minimum (p̃ = 0). However, it alters the normal crossings as it introduces the factor y in the denominator of an entry in Ã. Moreover, it elevates the rank of the second subystem. 8 The urge to preserve the normal crossings, whose importance is highlighted in the Introduction, motivates the following definition Definition 2 Let T ∈ GLn (K). We say that the change of basis Y = T Z (resp. T ) is compatible with system (4) if the normal crossings of the system is preserved and the Poincaré rank of the individual subsystems is not elevated. Remark 2 Clearly, if T is a constant matrix or it lies in GLn (O) then it is compatible with system (4). As in the univariate case, the main difficulties in formal reduction arise whenever the leading constant pair consists of nilpotent matrices. Since otherwise a block diagonalization can be attained. A generalization of the univariatecase Splitting Lemma is given with constructive proof in [Section 5.2, page 233, [Gérard et al., 1979]]. We repeat hereby the theorem without proof. Theorem 2 Given system (4) with leading constant pair 1 2 A00 = diag(A100 , A200 ) and B00 = diag(B00 , B00 ). 1 2 If the matrices in one of the couples (A100 , A200 ) or (B00 , B00 ) have no eigenvalues in common, then there exists a unique transformation T ∈ GLn (O) partitioned conformally   I T 12 T (x, y) = T 21 I such that the change of basis Y = T Z results in the following equivalent system partitioned conformally with A00 , B00 , ( x ∂Z = Ã(x, y)Z = diag(Ã1 , Ã2 )Z ∂x = B̃(x, y)Z = diag(B̃ 1 , B̃ 2 )Z y ∂Z ∂y 1 2 1 2 where (Ã100 , Ã200 ) = (A100 , A200 ) and (B̃00 , B̃00 ) = (B00 , B00 ). By an eigenvalue shifting (11) we can then arrive at an equivalent system whose leading constant pair consists of nilpotent matrices. It can be easily verified that such a transformation is compatible with system (4). By Proposition 1, the matrices of the leading coefficient pair are nilpotent as well. The case of n = 1 is straightforward and the case of (p, q) = (0, 0) is already resolved in [Chapter 3, [LeRoux, 2006]]. Henceforth, following Section 3, the problem of formal reduction is reduced now to discussing two operations: computing Katz invariant and a compatible Moser-based rank reduction. The former is the subject of the next section. 9 5 Computing Exponential Parts and Katz Invariant In analogy to Definition 1, the Katz invariant of system (4) is defined as follows. Definition 3 Given system (4) whose x, y-exponential parts are denoted by {āk }1≤k≤n and {b̄k }1≤k≤n respectively. For 1 ≤ k ≤ n, let ζk (resp. ηk ) be the minimum exponent in x (resp. y) within the terms of āk (resp. b̄k ). The Katz invariant of (4) is then the two-tuple of rational numbers (κ1 , κ2 ) where ( κ1 = −1 − min1≤k≤n ζk κ2 = −1 − min1≤k≤n ηk . In this section, we show that the x, y-exponential parts of system (4) are those of the two associated ODS defined below. Hence, the computation of the x, y-exponential parts (consequently of Q1 , Q2 , and Katz invariant) is reduced to computations over a univariate field. Definition 4 Given system (4). Let A(x) := A(x, 0) and B(y) := B(0, y). We call the following the associated ODS with the first and second subsystem respectively of (4): dY dx dY y dy x = A(x) Y (13) = B(y) Y (14) Theorem 3 Given the completely integrable system (4) ( = A(x, y)Y = x−p (A0 (y) + A1 (y)x + . . . )Y x ∂Y ∂x = B(x, y)Y = y −q (B0 (x) + B1 (x)y + . . . )Y. y ∂Y ∂y The x, y-exponential parts of this system are those of its associated ODS (13) and (14) respectively. Proof. We prove the theorem for A(x, y). The same follows for B(x, y) by interchanging the order of the subsystems in system (4). Let s1 , t and T be as in Proposition 2. Upon the change of independent variable x = ts1 , the first subsystem of (4) is given by ∂Y = s1 t−1 A(ts1 , y)Y. ∂t (15) By change of basis Y = T Z we arrive at the equivalent subsystem ∂Y = Ã(t, y)Y ∂t 10 (16) with the notations and properties as in Proposition 2. It follows from (3) that ∂T = s1 t−1 AT − T Ã. (17) ∂t On the other hand, we have the following expansions as formal power series in y whose matrix coefficients lie in C((t))n×n : A(t, y) = ∞ X j Aj (t)y , Ã(t, y) = j=0 ∞ X Ãj (t)y j , j=0 and T (t, y) = ∞ X Tj (t)y j (18) j=0 with leading terms A(ts1 ), Ã, and T respectively. We Plug (18) in (17) and compare the like-power terms. In particular, we are interested in the relation between the leading terms which is clearly given by ∂T = s1 t−1 AT − TÃ. (19) ∂t Due to the form of T (t, y) characterized in Theorem 2, it is evident that T ∈ ∂ ∂ −s1 t−1 A(ts1 ) (resp. x ∂x −A(x)) GLn (C((t))). Hence, the systems given by ∂t ∂ and ∂t − Ã are equivalent. It follows that they have the same x-exponential parts āk (t) given in Remark 1. Two corollaries follow directly from Theorem 3. Corollary 1 Let κ = (κ1 , κ2 ) be as in Definition 3 denoting the Katz invariant of system (4). Then κ1 (resp. κ2 ) is the Katz invariant of the associate ODS (13) (resp. (14)). Corollary 2 Let γ = (γ1 , γ2) denote the true Poincaré rank of system (4). Then γ1 (resp. γ2 ) is the true Poincaré rank of the associate ODS (13) (resp. (14)). Proof. Consider system (13). By (Remark 3, [Barkatou, 1997]) we have γ1 − 1 ≤ κ1 ≤ γ1 . This fact establishes the proof since γ1 is an integer. The same holds for system (14). Hence, the Katz invariant, the true Poincaré rank, and most importantly Q1 , Q2 in (6), can be computed efficiently over univariate fields using the existing package ISOLDE [Barkatou et al., 2013]. Moreover, since now we know κ at any stage of formal reduction, it is left to give a compatible Moser-based rank reduction of system (4). We remark however, that although the rank reduction of [Barkatou et al., 2006] reduces the Poicaré rank to its minimal integer value, Moser-based rank reduction results in an equivalent system for which the Poincaré rank and the rank of the leading matrix coefficient are both minimal. In the univariate case, this is a necessary component of formal reduction, in particular when computing the Katz invariant. 11 6 Moser-based Rank Reduction We consider again system (4) and label its subsystems as follows: ∂Y = A(x, y)Y = x−p (A0 (y) + A1 (y)x + . . . )Y ∂x ∂Y = B(x, y)Y = y −q (B0 (x) + B1 (x)y + . . . )Y. y ∂y x (20) (21) Let T ∈ GLn (K). To keep track of applied transformations, we use the following notation for the equivalent system resulting upon the change of basis Y = T Z. ∂Z ∂x ∂Z y ∂y x = ÃZ, = B̃Z, ∂T ) ∂x ∂T T [B] := B̃ = T −1 (BT − y ). ∂y T [A] := Ã = T −1 (AT − x (22) (23) In particular, T −1 AT will be referred to as the similarity term of T [A]. We study Moser-based rank reduction of subsystem (20). The same results follow for subsystem (21) by interchanging (20) its order in system (4). We adapt the algorithm given for singularly-perturbed linear differential systems in [Barkatou et al., 2014] since it is well-suited to bivariate fields. It suffices to verify that the transformations in the proposed algorithm of system (20) are compatible with the second. We will see that this can be guaranteed by giving an additional structure to A0 (y), in particular form (24), rather than the form proposed in (Lemma 1, [Barkatou et al., 2014]). We remark that the algorithm of [Barkatou et al., 2014] is a generalization of Moser-based rank reduction developed by the second author of this article in [Barkatou, 1995] over a univariate field. We recall that, in the sequel, we drop x and y from the notation whenever ambiguity is unlikely to arise. Set r = rank(A0 (y)). Following [Barkatou, 1995; Moser, 1960] we define the Moser rank and Invariant of system (20) as the respective rational numbers: m(A) = max (0, p + r ) n µ(A) = min {m(T [A])|T ∈ GLn (K)}. Definition 5 The system (20) (the matrix A respectively) is called Moserreducible if m(A) > µ(A), otherwise it is said to be Moser-irreducible. It is easy to see from this definition that system (20) is regular if and only if µ(A) ≤ 1, i.e. the true Poincaré rank is zero. 12 Definition 6 System (4) is said to be Moser-irrreducible whenever each of its subsystems (20) and (21) is. The following theorem is the analog of (Theorem 1, [Barkatou et al., 2014]). Theorem 4 Given System (20) such that A0 (y) is of rank r and m(A) > 1. A necessary and sufficient condition for A to be Moser-reducible, i.e. for the existence of a T (x, y) ∈ Gln (K) such that r(Ã0 ) < r, is that the polynomial θ(λ) := xr det(λI + A0 + A1 )|x=0 x vanishes identically in λ. Moreover, T (x, y) can always be chosen to be compatible with system (21). More precisely, it is a product of transformations in GLn (Oy ) and polynomial transformations of the form diag(xα1 , . . . , xαn ) where α1 , . . . , αn are nonnegative integers. Remark 3 By Corollary 2, the true Poincaré rank of system (4) can be deduced from its associated ODS. However, the reduction criterion in Theorem 4 guarantees that the rank of the leading coefficient matrix of the equivalent Moser-irreducible system is minimum as well, not only its Poincaré rank. Moreover, this criterion furnishes the construction of the change of basis T (x, y) as will be demonstrated in the sequel. Theorem 4 is to be proved after giving its necessary building blocks. We start by the following lemma. Lemma 1 There exists a unimodular transformation U(y) ∈ GLn (Oy ) such that for the resulting equivalent system (22), we have   11 Ã0 O O (24) Ã0 (y) = Ã21 Or−d O  0 32 31 On−r Ã0 Ã0 where  Ã11 0 Ã21 0  and   11 Ã0 O Ã21 Or−d  0 31 Ã0 Ã32 0 are r × d and n × r matrices of full column ranks d and r respectively. Proof. It suffices to apply the unimodular transformation of (Lemma 1, [Barkatou et al., 2014]) to A0 (y) and then to the first left block of the resulting similar matrix. Denoting respectively by U1 (y), U2(y) these transformations, we set 13 U(y) = diag(U2 (y), In−r ).U1 (y). Hence, the leading coefficient matrix of U[A] has the form (24). Clearly, U(y) is compatible with system (21) as it is unimodular. Hence, without loss of generality, we assume that A0 (y) is in form (24) and partition A1 (y) conformally with A0 . Let   11 A0 O A13 1 . O A23 Gλ (A) = A21 (25) 0 1 31 32 33 A0 A0 A1 + λIn−r Then we have the following Lemma given and proved as (Lemma 2, [Barkatou et al., 2014]). Lemma 2 Det(Gλ (A) ≡ 0 vanishes identically in λ if and only if θ(λ) does. Proposition 3 Suppose that m(A) > 1 and det(Gλ (A)) ≡ 0 where Gλ (A) is given by (25). Then there exists a unimodular matrix Q(y) in GLn (Oy ) with det Q(y) = ±1, compatible with system (21), such that the matrix Gλ (Q[A]) has the form   11 A0 O U111 U211  A21 O U121 U221  0 , (26) Gλ (Q[A]) =   V111 V112 W1 + λIn−r−ρ W2  M111 M112 M2 W3 + λIρ where 0 ≤ ρ ≤ n − r, W1 , W3 are square matrices of orders (n − r − ρ) and ρ respectively , M112 is a null matrix, and   11   11 A0 U111 A0 U111 21 21   , (27) rank A0 U1 = rank A21 U121 11 0 M1 M2   11 A0 U111 < r. (28) rank A21 U121 0 Proof. Since Q(y) is independent form x, it follows from (22) that the discussion can be restricted to the similarity term of the transformations. Hence, the transformation Q(y) can be constructed as in the proof of (Proposition 2, [Barkatou et al., 2014]). As it is unimodular, it is necessarily compatible with system (21). It remains to remark however, that each row of [M111 M112 M2 ] is a linear combination of the rows of   11 A0 O U111 . A21 O U121 0 Hence, by construction, M112 is a null matrix. 14 Proposition 4 If m(A) > 1 and Gλ (A) ≡ 0 is as in (26) with conditions (27) and (28) satisfied, then system (20) (resp. A) is Moser-reducible and reduction can be carried out with the so-called shearing Y = SZ where S = diag(xIr , In−r−ρ , xIρ ) if ρ 6= 0 and S = diag(xIr , In−r ) otherwise. Furthermore, this shearing is compatible with system (21). Proof. We partition A(x, y) conformally with (26)  11  A A12 A13 A14 A21 A22 A23 A24   A= A31 A32 A33 A34  A41 A42 A43 A44 where A11 , A22 , A33 , A44 are of dimensions d, r − d, n − r − ρ, ρ It is easy to verify then, by (22) and (23), that  11 A A12 x−1 A13  A21 A22 x−1 A23 ∂ Ã(x, y) = S −1 AS − xS −1 S =  xA31 xA32 A33 ∂x 41 42 −1 43 A A x A − diag(Ir , On−r−ρ, Iρ )   11 B B 12 x−1 B 13 B 14  B 21 B 22 x−1 B 23 B 24  . B̃(x, y) = S −1 BS =  xB 31 xB 32 B 33 xB 34  B 41 B 42 x−1 B 43 B 44 Hence, the new leading coefficient matrix  11 A0 O  A21 O 0 Ã0 =   O O M111 O respectively.  A14 A24   xA34  A44 is U111 U121 O M2  O O  O O where rank(Ã0 ) < r since (27) and (28) are satisfied. It remains to prove the compatibility of S with the subsystem (21), in particular, that the normal crossings is preserved. It suffices to prove that the submatrices of B(x, y) which are multiplied by x−1 , i.e. B 13 , B 23 , B 43 , have no term independent from x so that no poles in x are introduced. This can be restated as requiring B 13 (0, y), B 23(0, y), and B 43 (0, y) to be null. This requirement is always satisfied due to the integrability condition (5). In fact, we can obtain from the former that B(0, y)A0(y) − A0 (y)B(0, y) = y 15 ∂A0 (y) . ∂y (29) On the other hand, since Gλ (A) is as in (26) then A0 (y) have the following form (30) and B(0, y) can be partitioned conformally   11 A0 O O O  A21 O O O 0 . (30) A0 (y) =  11  V1 V112 O O M111 O O O 11 B0y 21 B0y B(0, y) =  31 B0y 41 B0y  12 B0y 22 B0y 32 B0y 42 B0y 13 B0y 23 B0y 33 B0y 43 B0y  14 B0y 24  B0y  34  . B0y 44 B0y (31) Inserting (30) and (31) in (29), one can obtain the desired results by equating the entries of (29). In particular, upon investigating the entries of the L.H.S. in (Column 3), (Rows 1 and 2, Column 2), and (Row 4, Column 2), we observe the following respectively:   11 A0 O   13  B0y  A21 O 0  23 = On,n−ρ−r . The first matrix is of full rank r by •   V111 V112  B0y M111 O  13  B0y construction thus 23 is null. B0y  11  A0 12 B0y = Or,r−d. The first matrix is of full rank d by construction • A21 0 12 is null. thus B0y 43 12 12 • Finally, B0y V112 − M111 B0y = Oρ,(r−d) . But B0y is null and V112 is of 43 full column rank r − d by construction and so B0y is null as well. This completes the proof. We give hereby the proof of Theorem 4. Proof. (Theorem 4) For the necessary condition, we proceed as in the proof of Theorem 1 in [Barkatou et al., 2014]. As for the sufficiency, we set r = rank(A0 (y)). Without loss of generality, we can assume that A0 (y) has the form (24). Let Gλ (A) be given as in (25). Then, by Lemma 2, det(Gλ (A)) vanishes identically in λ if and only if θ(λ) does. Then the matrix S[Q[A]] where S, Q are as in Propositions 3 and 4 respectively, has the desired property. Corollary 3 Given system (4) with Poincaré rank (p, q). A necessary and sufficient for it to be Moser-reducible is that one of the polynomials ( θA (λ) := xrank(A0 ) det(λI + Ax0 + A1 )|x=0 θB (λ) := y rank(B0 ) det(λI + By0 + B1 )|y=0 16 vanishes identically in λ. An equivalent Moser-irreducible system can be attained via a change of basis compatible with both subsystems (20) and (21). We illustrate the process by this simple example. Example 2  # " 3 2 2  x + x + y y  ∂Y −3  Y  x ∂x = x −1 x3 + x2 − y # " 2 3  y − 2y − 6 y  ∂Y −2  Y  y ∂y = y −2y −3y 2 − 2y − 6 (32) The associated ODS are then respectively:  # " 3 2  x + x 0  ∂Y −3  Y,  x ∂x = x −1 x3 + x2 # " 2 3  y − 2y − 6 y  ∂Y −2  Y.  y ∂y = y −2y −3y 2 − 2y − 6 Via ISOLDE, we compute Q1 = s1 = s2 = 1 and (6) is given by −1 I x 2 Φ(x, y) xΛ1 y Λ2 e −1 and Q2 = −1 x 3 3 e y2 + y2 3 y2 + y2 I2 . Thus we have . +2 Upon the eigenvalue shifting Y = e x e y2 y Z we get from (32)  # " 3 2  x + y y  ∂Z −3  Z  x ∂x = x −1 x3 − y # " 2  y y  ∂Z −1  Z  y ∂y = y −2 −3y We  3arriveat the system of Example (1). By Algorithm 1, we compute T1 = yx −y . Hence, by Z = T1 U, we have 0 1  " #  −2 0  ∂U   x ∂x = −y 1 U " #  −2 0  ∂U   y ∂y = −2x3 −1 U   1 0 . By a simple calculation, we find T2 = y + 2x3 −1 3 A fundamental matrix of solutions is then given by 3 T1 T2 xΛ1 y Λ2 e x e y2     −2 0 −2 0 . and Λ2 = where Λ1 = 0 −1 0 1 −1 17 + y2 Algorithm 1 Moser-based Rank Reduction of System (4) Input: A(x, y), B(x, y) of (4) Output: T (x, y) a change of basis and a Moser-irreducible equivalent system {T [A], T [B]}. In particular, the Poincaré rank of this system is its true Poincaré rank. T ← In ; p ← Poincaré rank of A; U(y) ← Lemma 1; A ← U −1 AU; T ← T U; while Det(Gλ (A) = 0) and p > 0 do Q(y), ρ ← Proposition 3; S(x) ← Proposition 4; P ← QS; T ← T P ; ; A ← P −1 AP − xS −1 ∂S ∂x p ← Poincaré rank of A; U(y) ← Lemma 1; A ← U −1 AU; T ← T U; end while. ; B ← T −1 BT − yT −1 ∂T ∂y T ← In ; q ← Poincaré rank of B; U(x) ← Lemma 1; B ← U −1 BU; T ← T U; while Det(Gλ (B) = 0) and q > 0 do Q(x), ρ ← Proposition 3; S(y) ← Proposition 4; P ← QS; T ← T P ; B ← P −1 BP − yS −1 ∂S ; ∂y q ← Poincaré rank of B; U(x) ← Lemma 1; B ← U −1 BU; T ← T U; end while. A ← T −1 AT − xT −1 ∂T ; ∂x return (T, A, B). 18 7 Conclusion and Further Investigations We gave an explicit method to compute the x, y-exponential parts of a completely integrable pfaffian system with normal crossings in two variables. This gives the main information about the asymptotic behavior of its solutions. Moreover, this new approach limited the computations to a finite number of constant matrices instead of matrix-valued functions and constituted an eminent portion of the formal reduction. To complement our work, we gave a Moser-based rank reduction algorithm. Both results, allowed us to generalize the formal reduction of the univariate case as developed in [Barkatou, 1997] to the bivariate case. One field to investigate for this bivariate system would be an algorithm to construct a basis for the space of regular solutions (see, e.g., [Barkatou et al., 1999, 2013], for m = 1). Another research direction over bivariate fields is the generalization of techniques developed here to completely integrable pfaffian systems with no restriction to the locus of singularities (i.e. general crossings rather than normal crossings). Such systems are discussed e.g. in [Novikov et al., 2002]. And there remains of course the ultimate task of formal reduction of the multivariate system with no restriction to the number of variables. Theorem 1 was first given and proved in [Charrière, 1980] for bivariate systems. In the theory developed there, one operator ∆i was considered and the fact that Oy and Ox are principal ideal domains was used in many places to prove that certain modules introduced are free modules. This did not allow an immediate generalization to the case of more than two variables. The same obstacle arises in rank reduction whether in [Barkatou et al., 2006] or in adapting the Moser-based rank reduction algorithm of [Barkatou et al., 2014; Barkatou, 1995]. This limits our proposed formal reduction in Section 6 to m = 2. However a generalization of Proposition 2 is Theorem 2.3 in [Charrière et al., 1981]. This furnishes the generalization of Theorem 3 to a general multivariate system. Furthermore, it motivates the investigation of their formal reduction since the leading coefficient matrix of a change of basis which takes the system to a weak-triangular form, would be characterized. References M. Barkatou, S.S. Maddah, and H. Abbas. On the Reduction of SingularlyPerturbed Linear Differential Systems. Submitted to ISSAC’14. A preliminary version is available at arXiv. A. Awane and M. Goze. Pfaffian Systems and k-Symplectic Systems. Springer Science + Business Media Dordrecht, 2000. W. Balser. Formal Power Series and Linear Systems of Meromorphic Ordinary Differential Equations. Springer-Verlag, New York, 2000. 19 M. Barkatou. An algorithm to compute the exponential part of a formal fundamental matrix solution of a linear differential system. Journal of App. Alg. in Eng. Comm. and Comp., 8(1):1-23, 1997. M. Barkatou. A Rational Version of Moser’s Algorithm. In Proceedings of the International Symposium on Symbolic and Algebraic Computation, pages 297-302. ACM Press, July 1995. M. Barkatou and C. El Bacha. On k-simple forms of first-order linear differential systems and their computation. Journal of Sym. Comput., 54: 36-58, 2013. M. Barkatou and E. Pflugel. An algorithm computing the regular formal solutions of a system of linear differential equations. Journal of Sym. Comput., 28, 569-587, 1999. M. Barkatou and E. Pflugel. On the Moser-and super-reduction algorithms of systems of linear differential equations and their complexity. Journal of Sym. Comput., 44 (8), 1017-1036, 2009. M. Barkatou and E. Pflugel. ISOLDE, Integration of Systems of Ordinary Linear Differential Equations. Available at: http://isolde.sourceforge.net/ M. Barkatou and N. LeRoux. Rank Reduction of a class of Pfaffian Systems in Two Variables. In Proceedings of the International Symposium on Symbolic and Algebraic Computation, pages 204-211. ACM Press, 2006. R. Broucke. On Pfaff’s equations of motion in dynamics; Applications to Satellite Theory. Journal of Celestial Mechanics, 18(3): 207-222, 1978. H. Charrière. Triangulation Formelle de certains Systèmes de Pfaff Complètement Intégrables et Application à l’etude C ∞ des Systèmes non Linéaires. Ann. Scuola Norm. Sup. Pisa CI. Sci., 7(4): 625 - 714, 1980. H. Charrière and R. Gérard. Formal Reduction of Integrable Linear Connexion having a certain kind of Irregular Singularities. Analysis, 1:85-115, 1981. P. Deligne. Equations Différentielles à Points Singuliers Réguliers. Volume 163 of Lecture Notes In Mathematics. Springer-Verlag,1970. A. van den Essen. Regular Singularities along Normal Crossings. In Gerard ramis, editor, Systèmes de Pfaff et Equations Différentielles dans le Champ Complexe, volume 712 of Lecture Notes in Mathematics, pages 88-130. Springer-Verlag, 1979. A. van den Essen et A.H.M. Levelt. Irregular Singularities in Several Variables. Memoirs of AMS, 40(270), 1982. 20 R. Gérard et Y. Sibuya. Etude de certains systèmes de Pfaff avec singularités. In Gerard ramis, editor, Systemes de Pfaff et Equations Différentielles dans le Champ Complexe, volume 712 of Lecture Notes in Mathematics, pages 131-288. Springer-Verlag, 1979. N. LeRoux. Solutions formelles d’équations aux d’érivées partielles. Ph.D. Thesis. University of Limoges. 2006. A.H.M. Levelt. Stabilizing Differential Operators: a method for Computing Invariants at Irregular Singularities. Differential Equations and Computer Algebra, M. Singer (ed.), pages 181-228, 1991. Maddah S.S., http : //www.unilim.f r/pages perso/suzy.maddah/ J. Moser. The Order of a Singularity in Fuchs’ Theory. Mathematische Zeitschrift, 72:379- 398, 1960. D. Novikov, S. Yakovenko. Lectures on meromorphic flat connections, 2002. Available at: arXiv:math/0212334 W. Wasow. Asymptotic Expansions for Ordinary Differential Equations. Dover Phoenix Editions, 2002. 21
0math.AC
Inverse Classification for Comparison-based Interpretability in Machine Learning Thibault Laugel1 , Marie-Jeanne Lesot1 , Christophe Marsala1 , Xavier Renard2 , Marcin Detyniecki1,2,3 arXiv:1712.08443v1 [stat.ML] 22 Dec 2017 1 Sorbonne Universitı̈¿œs, UPMC Univ Paris 06, CNRS, LIP6 UMR 7606, 4 place Jussieu 75005 Paris, France 2 AXA – Data Innovation Lab, 48 rue Carnot 92150 Suresnes, France 3 Polish Academy of Science, IBS PAN, Warsaw, Poland [email protected] Abstract In the context of post-hoc interpretability, this paper addresses the task of explaining the prediction of a classifier, considering the case where no information is available, neither on the classifier itself, nor on the processed data (neither the training nor the test data). It proposes an instance-based approach whose principle consists in determining the minimal changes needed to alter a prediction: given a data point whose classification must be explained, the proposed method consists in identifying a close neighbour classified differently, where the closeness definition integrates a sparsity constraint. This principle is implemented using observation generation in the Growing Spheres algorithm. Experimental results on two datasets illustrate the relevance of the proposed approach that can be used to gain knowledge about the classifier. Introduction Bringing transparency to machine learning models is nowadays a crucial task. However, the complexity of today’s bestperforming models as well as the subjectivity and lack of consensus over the notion of interpretability make it difficult to address. Over the past few years, multiple approaches have been proposed to bring interpretability to machine learning, relying on intuitions about what ’interpretable’ means and what kind of explanations would help a user understand a model or its predictions. Existing categorizations of interpretability (Bibal 2016; Kim and Doshi-Velez 2017; DoshiVelez and Kim 2017; Biran and Cotton 2017) usually distinguish approaches mainly on the characteristics of these explanations: given a classifier to be interpreted, in-model interpretability relies on modifying its learning process to make it simpler (see for instance Abdollahi et al. 2016). Other approaches consist in building a new simpler model to replace the original classifier (Lakkaraju and Rudin 2017; Angelino et al. 2017). On the contrary, post-hoc interpretability focuses on building an explainer system using the results of the classifier to be explained. In this work, we propose a post-hoc approach that aims at explaining a single prediction of a model through comparison. In particular, given a classifier and an observation to be interpreted, we focus on finding the closest possible observation belonging to a different class. Explaining through particular examples has been shown in cognitive and teaching sciences to facilitate the learning process of a user (see e.g. Watson et al. (2008)). This is especially relevant in cases where the classifer decision to explain is complex and other interpretability approaches cannot provide meaningful explanations. Another motivation for our approach lies in the fact that in many applications of machine learning today, no information about the original classifier or existing data is made available to the end-user, making model- and data-agnostic intepretability approaches essential. To address these issues we propose Growing Spheres, a generative approach that locally explores the input space of a classifier to find its decision boundary. It has the specifity of not relying on any existing data other than the observation to be interpreted to find the minimal change needed to alter its associated prediction. The paper is organized as follows: we first present some existing approaches for post-hoc interpretability and how they relate to the one proposed in this paper. Then, we describe the proposed comparison-based approach as well as its formalization and motivations. We then describe the Growing Spheres algorithm. Finally, we illustrate the method through two real-world applications and analyze how it can be used to gain information about a classifier. Post-hoc Interpretability Post-hoc interpretability approaches aim at explaining the behavior of a classifier around particular observations to let the user understand their associated predictions, generally disregarding what the actual learning process of the model might be. Post-hoc interpretability of results has received a lot of interest recently (see for instance Kim and DoshiVelez (2017)), especially as black-box models such as deep neural networks and ensemble models are being more and more used for classification despite their complexity. This section briefly reviews the main existing approaches, depending on the hypotheses that are made about available inputs and on the forms the explanations take. These two axes of discussion, which obviously overlap, provide a good framework for the motivations of our approach. Available Inputs Let us consider the case of a physician using a diagnostic tool. It is natural to speculate that (s)he does not have any information about the machine learning model used to make disease predictions, neither may (s)he have any idea about what patients were used to train it. This raises the question of what knowledge (about the machine learning model and the training or other data) an end-user has, and hence what inputs a post-hoc explainer should use. Several approaches rely specifically on the knowledge of the algorithm used to make predictions, taking advantage of the classifier structure to generate explanations (Barbella et al. 2009; Hendricks et al. 2016). However, in other cases, no information about the prediction model is available (the model might be accessible only through an API or a software for instance). This highlights the necessity of having model-agnostic interpretability methods that can explain predictions without making any hypotheses on the classifier (Baehrens et al. 2009; Adler et al. 2017; Ribeiro, Singh, and Guestrin 2016). These approaches, sometimes called sensitivity analyzes, generally try to analyze how the classifier locally reacts to small perturbations. For instance, Baehrens et al. (2010) approximate the classifier with Parzen windows to calculate the local gradient of the model and understand what features locally impact the class change. Forms of Explanations Beyond the differences regarding their inputs, the variety of existing methods also comes from the lack of consensus regarding the definition, and a fortiori the formalization, of the very notion of interpretability. Depending on the task performed by the classifier and the needs of the end-user, explaining a result can take multiple forms. Interpretability approaches hence rely on the following assumptions to design explanations: 1. The explanations should be an accurate representation of what the classifier is doing. 2. The explanations should be understandably read by the user. Feature importances (Baehrens et al. 2009; Ribeiro, Singh, and Guestrin 2016), binary rules (Turner 2016) or visualizations (Krause, Perer, and Bertini 2016) for instance give different insights about predictions without any knowledge on the classifier. The LIME approach (Ribeiro, Singh, and Guestrin 2016) linearily approximates the local decision boundary of a classifier and calculates the linear coefficients of this approximation to give local feature importances, while Hendricks et al. (2016) identify class-discriminative properties that justify predictions and generate sentences to explain image classification. In this paper, we consider the case of instance-based approaches, which bring interpretability by comparing an observation to relevant neighbors (Mannino and Koushik 2000; Štrumbelj, Kononenko, and Robnik Šikonja 2009; Martens and Provost 2014; Kabra, Robie, and Branson 2015). These approaches use other observations (from the train set, from the test set or generated ones) as explanations to bring transparency to a prediction of a black-box classifier. One of the motivations for instance-based approaches lies in the fact that in some cases the two objectives 1 and 2 mentioned above are contradictory and cannot be both reached in a satisfying way. In these complex situations, finding examples is an easier and more accurate way to describe the classifier behavior than trying to force a specific inappropriate explanation representation, which would result in incomplete, useless or misleading explanations for the user. As an illustration, Baehrens et al. (2010) discuss how their approach based on Parzen windows does not succeed well in providing explanations for individual predictions that are at the boundaries of the training data, giving explanation vectors (gradients) actually pointing in the (wrong) opposite direction from the decision boundary. Comparison with observations from the other class would probably make more sense in such a case and give more useful insights. Existing instance-based approaches moreover often rely on having some prior knowledge, be it about the machine learning model, the train dataset, or other labelled instances. For instance, Kabra et al. (2015) try to identify which train observations have the highest direct influence over a single prediction. Comparison-based Interpretability In this section, we motivate the proposed approach in the light of the two axes of discussion presented in the previous section. Explaining by Comparing Disposing of knowledge on the classifier or data is an asset existing methods can use to create the explanations they desire. However, the democratization of machine learning implies that in a lot of nowadays cases, the end-user of an explainer system does not have access to any of this knowledge, making such approaches unrealistic. In this context, the need for a comparison-based interpretability tool that does not rely on any prior knowledge, including any existing data, constitutes one of the main motivations for our work. Due to its highly subjective nature, interpretability in machine learning sometimes looks up to cognitive sciences for a justification for building explanations (when they do not, they rely on intuitive ideas about what interpretable means). Although not mentioned by the previously cited instance-based approaches, it must be underlined that learning through examples also possesses a strong justification in cognitive and teaching sciences (Decyk 1994; Watson and Shipman 2008; Mvududu and Kanyongo 2011; van Gog, Kester, and Paas 2011). For instance, Watson et al. (2008) show through experiences that generated examples help students ’see’ abstract concepts that they had trouble understanding with more formal explanations. Driven by this cognitive justification and the need to have a tool that can be used when the available information is scarce, we propose an instance-based approach relying on comparison between the observation to be interpreted and relevant neighbors. Principle of the Proposed Approach In order to interprete a prediction through comparison, we propose to focus on finding an observation belonging to the other class and answer the question: ’Considering an observation and a classifier, what is the minimal change we need to apply in order to change the prediction of this observation?’. This problem is similar to inverse classification (Mannino and Koushik 2000), but we apply it to interpretability. Explaining how to change a prediction can help the user understand what the model considers as locally important. However, compared to feature importances which are often built to have some kind of statistical robustness, this approach does not claim to bring any causal knowledge. On the contrary, it gives local insights disregarding the global behavior of the model and thus differs from other interpretability approaches. For instance, Ribeiro et al. (2016) evaluate their method LIME by looking at how faithful to the global model the local explainer is. However, despite not providing any causal information, the proposed approach provides the exact values needed to change the prediction class, which is also very helpful to the user. Furthermore, it is important to note that our primary goal here is to give insights about the classifier, not the reality it is approximating. This approach thus aims at understanding a prediction regardless of whether the classifier is right or wrong, or whether or not the observations generated as explanations are absurd. This characteristic is shared with adversarial machine learning (Tygar 2011; Szegedy et al. 2014; Goodfellow, Shlens, and Szegedy 2015), which relates to our approach since it aims at ’fooling’ a classifier by generating close variations of original data in order to change their predictions. These adversarial examples rely on exploiting weaknesses of classifiers such as their sensitivity to unknown data, and are usually generated using some knowledge of the classifier (such as its loss function). The approach we propose also relies on generating observations that might not be realistic but without any knowledge about the classifier whatsoever and for the purpose of interpretability. Finding the Closest Ennemy For simplification purposes, we propose a formalization of the proposed approach for binary classification. However, it can be applied to multiclass classification. Let us consider a problem where a classifier f maps some input space X of dimension d to an output space Y = {−1, 1}, and suppose that no information is available about this classifier. Suppose all features are scaled to the same range. Let x = (xi )i ∈ X be the observation to be interpreted and f (x) ∈ Y its associated prediction. The goal of the proposed instance-based approach is to explain x through an other observation e ∈ X . The final form of explanation is the difference vector e − x. In particular, we focus on finding an observation e belonging to a different class than x, i.e. such that f (e) 6= f (x). For simplification purposes, we call ally an observation belonging to the same class as x by the classifier, and ennemy if it is classified to the other class. Recalling objective 1 mentioned earlier, the final explanation e−x we are looking for should be an accurate representation of what the classifier is doing. This is why we decide to transform this problem into a minimization problem by defining the function c : X × X → R+ such that c(x, e) is the cost of moving from observation x to ennemy e. Using this notation, we focus on solving the following minimization problem: e∗ = arg min{c(x, e) | f (e) 6= f (x)} (1) e∈X The difficulty of defining the cost function c comes from the fact that despite the classifier being designed to learn and optimize some specific loss function, the considered blackbox hypothesis compells us to choose a different metric. Thus, we define c as: c(x, e) = ||x − e||2 + γ||x − e||0 (2) P with ||e − x||0 = i≤d 1xi 6=ei ,γ ∈ R+ the weight associated to the vector sparsity and ||.||2 the Euclidean norm. Looking up to Strumbelj et al. (2009), we choose to use the l2 norm of the vector e − x as a component of the cost function to measure the proximity between e and x. However, recalling objective 2, we need to make sure that this cost function guarantees a final explanation that can be easily read by the user. In this regard, we consider that human users intuitively find explanations of small dimension to be simpler. Hence, we decide to integrate vector sparsity, measured by the l0 norm, as another component of the cost function c and combine it with the l2 norm as a weighted average. Due to the cost function c being discontinuous and the hypotheses made (black-box classifier and no existing data) solving problem (1) is difficult. Hence, we choose to solve sequentially the two components of the cost function using Growing Spheres, a two-step heuristic approach that approximates the solution of this problem. Growing Spheres In order to solve the problem defined in Equation (1), the proposed approach Growing Spheres uses instance generation without relying on existing data. Thus, considering an observation to interprete, we ignore in which direction the closest classifier boundary might be. In this context, a greedy approach to find the closest ennemy is to explore the input space X by generating instances in all possible direction until the decision boundary of the classifier is crossed, thus minimizing the l2 -component of our metric. This step is detailed in the next part, Generation. Then, in order to make the difference vector of the closest ennemy sparse, we simplify it by reducing the number of features used when moving from x to e (thus minimizing the l0 component of the cost function and generating the final solution e∗ ), as explained in the Feature Selection part. An illustration of the two steps of Growing Spheres is drawn in Figure 1. Figure 1: Illustration of Growing Spheres: The red circle represents the observation to interprete, the plus signs observations generated by Growing Spheres (blue for allies, black for ennemies). The white plus is the final ennemy e∗ used to generate explanations. Generation The generation step of Growing Spheres is detailed in Algorithm 1. Its main idea is to generate observations in the feature space in l2 -spherical layers around x until an ennemy is found. For two positive numbers a0 and a1 , we define a (a0 , a1 )-spherical layer SL around x as: SL(x, a0 , a1 ) = {z ∈ X : a0 ≤ ||x − z||2 ≤ a1 } To generate uniformly over these subspaces, we use the YPHL algorithm (Harman and Lacko 2010) which generates observations uniformly distributed over the surface of the unit sphere. We then draw U[a0, a1 ] -distributed values and use them to rescale the distances between the generated observations and x. As a result, we obtain observations that are uniformly distributed over SL(x, a0 , a1 ). The first step of the algorithm consists in generating uniformly n observations in the l2 -ball of radius η and center x, which corresponds to SL(x, 0, η) (line 1 of Algorithm 1), with n and η hyperparameters of the algorithm. In case this initial generation step already contains ennemies, we need to make sure that the algorithm did not miss the closest decision boundary. This is done by updating the value of the initial radius: η ← η/2 and repeating the initial step until no ennemy is found in the intial ball SL(x, 0, η) (lines 2 to 5). However, if no ennemy is found in SL(x, 0, η), we update a0 and a1 using η, generate over SL(x, a0 , a1 ) and repeat this process until the first ennemy has been found (as detailed in lines 6 to 11). In the end, Algorithm 1 returns the l2 -closest generated ennemy e from the observation to be interpreted x (as represented by the black plus in Figure 1). Once this is done, we focus on making the associated explanation as easy to understand as possible through feature selection. Feature Selection Let e be the closest ennemy found by Algorithm 1. Our second objective is to minimize the l0 component of the cost function c(x, e) defined in Equation (2). This means that we Algorithm 1 Growing spheres generation Require: f : X → {−1; 1} a binary classifier Require: x ∈ X an observation to be interpreted Require: Hyperparameters: η, n Ensure: Ennemy e 1: Generate (zi )i≤n uniformly in SL(x, 0, η) 2: while ∃ e ∈ (zi )i≤n | f (e) 6= f (x) do 3: η = η/2 4: Update (zi )i≤n by generating uniformly in SL(x, (0, η)) 5: end while 6: Set a0 = η, a1 = 2η 7: while 6 ∃ e ∈ (zi )i≤n | f (e) 6= f (x) do 8: a0 = a1 9: a1 = a1 + η 10: Generate (zi )i≤n uniformly in SL(x, a0 , a1 ) 11: end while 12: Return e, the l2 -closest generated ennemy from x Algorithm 2 Feature Selection Require: f : X → {−1; 1} a binary classifier Require: x ∈ X the observation to be interpreted Require: e ∈ X | f (e) 6= f (x) the solution of Algorithm 1 Ensure: Ennemy e∗ Set e0 = e 2: while f (e0 ) 6= f (x) do e∗ = e0 4: i = arg min |e0j − xj | j∈[1:d], e0j 6=xj Update e0i = xi 6: end while Return e∗ are looking to maximize the sparsity of vector e − x with respect to f (e) 6= f (x). To do this, we consider again a naive heuristic based on the idea that the smallest coordinates of e − x might be less relevant locally regarding the classifier decision boundary and should thus be the first ones to be ignored. The feature selection algorithm we use is detailed in Algorithm 2. The final explanation provided to interprete the observation x and its associated prediction is the vector x − e∗ , with e∗ the final ennemy identified by the algorithms (represented by the white plus in Figure 1). Experiments The aforementioned difficulties of working with interpretability make it often impossible to evaluate approaches and compare them one to another. Some of the existing approaches (Baehrens et al. 2009; Ribeiro, Singh, and Guestrin 2016; Doshi-Velez and Kim 2017) rely on surveys for evaluation, asking users questions to measure the extent to which they help the user in performing his final task, in order to assess some kind of explanation quality. However, creating reproducible research in machine Feature Min. shares of referenced articles in Mashable Avg. keyword (max. shares) Move +2016 +913 Table 1: Output examples of Growing Spheres for Article 1, predicted to be not popular by RF Feature Avg. keyword (max. shares) Min. shares of referenced articles in Mashable Text subjectivity Move -911 -3557 -0.03 Table 2: Output examples of Growing Spheres for Article 2, predicted to be popular by RF learning requires to define mathematical proxies for explanation quality. In this context, we present illustrative examples of the proposed approach applied to news and image classification. In particular, we analyze how the explanations given by Growing Spheres can help a user gain knowledge about a problem or identify weaknesses of a classifier. Additionally, we check that the explanations can be easily read by a user by measuring the sparsity of the explanations found. Application for News Popularity Prediction We apply our method to explain the predictions of a random forest algorithm over the news popularity dataset (Fernandes, Vinagre, and Cortez 2015). Given 58 numerical features created from 39644 online news articles from website Mashable, the task is to predict wether said articles have been shared more than 1400 times or not. Features for instance encode information about the format and content of the articles, such as the number of words in the title, or a measure of the content subjectivity or the popularity of the keywords used. We split the dataset and train a random forest classifier (RF) on 70% of the data. We use a grid search to look for the best hyperparameters of RF (number of trees) and test it on the rest of the data (0.70 final AUC score). We use γ = 1 to define the cost function c and set the hyperparameters of Algorithm 1 to η = 0.001 and n = 10000. Illustrative Example We apply Growing Spheres to two random observations from the test set (one from each class). For instance, let us consider the case of an article entitled ’The White House is Looking for a Few Good Coders’ (Article 1). This article is predicted to be not popular by RF. The explanation vector given by Growing Spheres for this prediction has 2 non-null coordinates that can be found in Table 1: among the articles referenced in Article 1, the least popular of them would need to have 2016 more shares in order to change the prediction of the classifier. Additionally, the keywords used in Article 1 are each associated to several articles using them. For each keyword, the most popular of these articles would need to have 913 more shares in order to change the prediction. In other words, Article 1 would be predicted to be popular by RF if the references and the keywords it uses were more popular themselves. On the opposite, as presented in Table 2, these same features would need to be reduced for Article 2, entitled ”Intern’ Magazine Expands Dialogue on Unpaid Work Experience’ and predicted to be popular, to change class. Additionally, the feature ’text subjectivity score’ (score between 0 and 1) would need to be reduced by 0.03, indicating that a slightly more objective point of view from the author would lead to have Article 2 predicted as being not popular. Figure 2: Sparsity distribution over the news test dataset. Reading: ’30% of the observations of our test dataset have explanations that use 5 features or less’. Sparsity Evaluation In order to check whether the proposed approach fulfills its goal of finding explanations that can be easily understood by the user, we evaluate the global sparsity of the explanations generated for this problem. We measure sparsity as the number of non-zero coordinates of the explanation vector ||x − e∗ ||0 . Figure 2 shows the smoothed cumulative distribution of this value for all 11893 test data points. We observe that the maximum value over the whole test dataset is 17, meaning that each observation of the test dataset only needs to change 17 coordinates or less in order to cross the decision boundary. Moreover, 80% of them only need to move in 9 directions or less, that is 15% of the features only. This shows that the proposed method indeed achieves sparsity in order to make explanations more readable. It is important to note that this does not mean that we only need 17 features to explain all the observations, since nothing guarantees different explanations use the same features. This experiment gives an illustration of how this method can be used to gain knowledge on articles popularity prediction. Applications to Digit Classification Another application for this approach is to get some understanding of how the model behaves in order to improve it. We use the MNIST handwritten digits database (LeCun et al. 1998) and apply Growing Spheres to the binary classification problem of recognizing the digits 8 and 9. The filtered dataset contains 11800 instances of 784 features (28 by 28 pictures of digits). We use a support vector machine classifier (SVM) with a RBF kernel and parameter C = 15. We a human observer would still probably identify the center digit as a noised version of the original 9 instead of an 8. Thus, despite achieving high accuracy and having learned that bottom-left pixels are important to turn a 9 into an 8 and reciprocally, the classifier still fails to understand the actual concepts making digits recognizable to a human. We also check the sparsity of our approach over the whole test set (3528 instances). Once again, our method seems to be generating sparse explanations since 100% of the test dataset predictions can be interpreted with explanations of at most 62 features (representing 7.9% of total features). Conclusion and Future Works Figure 3: Output example from the application of Growing Spheres for two instances. Example of original instance x (left column), its closest ennemy found e∗ (center) and the explanation vector x − e∗ (right). A white pixel indicates a 0 value, black a 1 train the model on 70% of the data and test it on the rest (0.98 AUC score). We use the same values for γ and the hyperparameters of Algorithm 1 as in the first experiment. Illustrative Example Given a picture of an 8 (Figure 3), our goal is to understand how, according to the classifier, we could transform this 8 into a 9 (and reciprocally), in order to get a sense of what parts of the image are considered important. Our intuition would be that ’closing the bottom loop’ of a 9 should be the most influential change needed to make a 9 become an 8, and hence features provoking a class change should include pixels found in the bottom-left area of the digits. Output examples to interprete a 9 and a 8 predictions are shown in Figure 3. Looking at Figure 3, the first thing we observe confirms our intuition that a good proportion of the non-null coordinates of the explanation vector are pixels located in the bottom-left part of the digits (as seen in pictures rightcolumn pictures). Hence, we can see when comparing left and center pictures that Growing Spheres found the closest ennemies of the original observation by either opening (top example) or closing (bottom example) the bottom part of the digits. However, we also note that some pixels of the explanation vectors are much harder to understand, such as the ones located on the top right corner of the explanation image for instance. This was to be expected since, as mentioned earlier, our method is trying to understand the classifier’s decision, not the reality it is approaximating. In this case, the fact that the classifier apparently considers these pixels to be influential the classification of these digits could be an evidence of the learned boundary inaccuracy. Finally, we note that the closest ennemies found by Growing Spheres (pictures in the center) in both cases are not proper 8 and 9 digits. Especially in the bottom example, The proposed post-hoc interpretability approach provides explanations of a single prediction through the comparison of its associated observation with its closest ennemy. In particular, we introduced a cost function taking into account the sparsity of the explanations, and described the implementation Growing Spheres, which answers this problem when having no information about the classifier nor existing data. We showed that this approach provides insights about the classifier through two applications. In the first one, Growing Spheres allowed us to gain meaningful information about features that were locally relevant in news popularity prediction. The second application highlighted both strengths and weaknesses of the support vector machine used for digits classification, illustrating what concepts were learned by the classifier. Furthermore, we also checked that the explanations provided by the proposed approach are indeed sparse. Beside collaborating with experts of industrial domains for explanations validation, outlooks for our work include focusing on the constraints imposed to the Growing Spheres algorithm. In numerous real-world applications, the final goal of the user may be such that it would be useless for him to have explanations using specific features. For instance, a business analyst using a model predicting whether or not a specific customer is going to make a purchase would ideally have an explanation based on features that he can leverage. In this context, forbidding the algorithm to generate explanations in specific areas of the input space or using specific features is a promising direction for future work. References [Abdollahi and Nasraoui 2016] Abdollahi, B., and Nasraoui, O. 2016. Explainable Restricted Boltzmann Machines for Collaborative Filtering. ICML Workshop on Human Interpretability in Machine Learning (Whi). [Adler et al. 2017] Adler, P.; Falk, C.; Friedler, S. A.; Rybeck, G.; Scheidegger, C.; Smith, B.; and Venkatasubramanian, S. 2017. Auditing black-box models for indirect influence. Proceedings - IEEE International Conference on Data Mining, ICDM 1–10. [Angelino et al. 2017] Angelino, E.; Larus-Stone, N.; Alabi, D.; Seltzer, M.; and Rudin, C. 2017. Learning Certifiably Optimal Rule Lists for Categorical Data. Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 35–44. [Baehrens et al. 2009] Baehrens, D.; Schroeter, T.; Harmeling, S.; Kawanabe, M.; Hansen, K.; and Mueller, K.-R. 2009. How to Explain Individual Classification Decisions. Journal of Machine Learning Research 11:1803–1831. [Barbella et al. 2009] Barbella, D.; Benzaid, S.; Christensen, J.; Jackson, B.; Qin, X. V.; and Musicant, D. 2009. Understanding Support Vector Machine Classifications via a Recommender System-Like Approach. Proceedings of the International Conference on Data Mining 305–11. [Bibal 2016] Bibal, A. 2016. Interpretability of Machine Learning Models and Representations : an Introduction. ESANN 2016 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (April):77–82. [Biran and Cotton 2017] Biran, O., and Cotton, C. 2017. Explanation and Justification in Machine Learning : A Survey. International Joint Conference on Artificial Intelligence Workshop on Explainable Artificial Intelligence (IJCAIXAI). [Decyk 1994] Decyk, B. N. 1994. Using Examples to Teaching Concepts. In Changing College Classrooms: New teaching and learning strategies for an inscreasingly complex world. 39–63. [Doshi-Velez and Kim 2017] Doshi-Velez, F., and Kim, B. 2017. Towards A Rigorous Science of Interpretable Machine Learning. 1–12. [Fernandes, Vinagre, and Cortez 2015] Fernandes, K.; Vinagre, P.; and Cortez, P. 2015. A proactive intelligent decision support system for predicting the popularity of online news. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 9273, 535–546. [Goodfellow, Shlens, and Szegedy 2015] Goodfellow, I. J.; Shlens, J.; and Szegedy, C. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representation. [Harman and Lacko 2010] Harman, R., and Lacko, V. 2010. On decompositional algorithms for uniform sampling from n-spheres and n-balls. Journal of Multivariate Analysis 101(10):2297–2304. [Hendricks et al. 2016] Hendricks, L. A.; Akata, Z.; Rohrbach, M.; Donahue, J.; Schiele, B.; and Darrell, T. 2016. Generating visual explanations. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9908 LNCS:3–19. [Kabra, Robie, and Branson 2015] Kabra, M.; Robie, A.; and Branson, K. 2015. Understanding classifier errors by examining influential neighbors. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, volume 07-12-June, 3917–3925. [Kim and Doshi-Velez 2017] Kim, B., and Doshi-Velez, F. 2017. Interpretable Machine Learning : The fuss , the concrete and the questions. In ICML Tutorial on interpretable machine learning. [Krause, Perer, and Bertini 2016] Krause, J.; Perer, A.; and Bertini, E. 2016. Using Visual Analytics to Interpret Predictive Machine Learning Models. ICML Workshop on Human Interpretability in Machine Learning (Whi):106–110. [Lakkaraju and Rudin 2017] Lakkaraju, H., and Rudin, C. 2017. Learning Cost-Effective and Interpretable Treatment Regimes. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics 54(3):166–175. [LeCun et al. 1998] LeCun, Y.; Bottou, L.; Bengio, Y.; and Haffner, P. 1998. Gradient-based learning applied to document recognition. Proceedings of the IEEE 86(11):2278– 2323. [Mannino and Koushik 2000] Mannino, M. V., and Koushik, M. V. 2000. The Cost Minimizing Inverse Classification Problem : a Genetic Algorithm Approach. Decision Support Systems 29(3):283–300. [Martens and Provost 2014] Martens, D., and Provost, F. 2014. Explaining Data-Driven Document Classifications. Mis Quarterly 38(1):73–99. [Mvududu and Kanyongo 2011] Mvududu, N., and Kanyongo, G. Y. 2011. Using real life examples to teach abstract statistical concepts. Teaching Statistics 33(1):12–16. [Ribeiro, Singh, and Guestrin 2016] Ribeiro, M. T.; Singh, S.; and Guestrin, C. 2016. Why Should I Trust You? Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD ’16 39(2011):1135–1144. [Štrumbelj, Kononenko, and Robnik Šikonja 2009] Štrumbelj, E.; Kononenko, I.; and Robnik Šikonja, M. 2009. Explaining instance classifications with interactions of subsets of feature values. Data and Knowledge Engineering 68(10):886–904. [Szegedy et al. 2014] Szegedy, C.; Zaremba, W.; Sutskever, I.; Bruna, J.; Erhan, D.; Goodfellow, I.; and Fergus, R. 2014. Intriguing properties of neural networks. International Conference on Learning Representation. [Turner 2016] Turner, R. 2016. A model explanation system. IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2016-November:1–5. [Tygar 2011] Tygar, J. D. 2011. Adversarial machine learning. In IEEE Internet Computing, volume 15, 4–6. [van Gog, Kester, and Paas 2011] van Gog, T.; Kester, L.; and Paas, F. 2011. Effects of worked examples, exampleproblem, and problem-example pairs on novices’ learning. Contemporary Educational Psychology 36(3):212–218. [Watson and Shipman 2008] Watson, A., and Shipman, S. 2008. Using learner generated examples to introduce new concepts. Educational Studies in Mathematics 69(2):97– 109.
2cs.AI
Segler et al. RESEARCH Generating Focussed Molecule Libraries for Drug Discovery with Recurrent Neural Networks arXiv:1701.01329v1 [cs.NE] 5 Jan 2017 Marwin HS Segler1* , Thierry Kogej2 , Christian Tyrchan3 and Mark P Waller4 Abstract In de novo drug design, computational strategies are used to generate novel molecules with good affinity to the desired biological target. In this work, we show that recurrent neural networks can be trained as generative models for molecular structures, similar to statistical language models in natural language processing. We demonstrate that the properties of the generated molecules correlate very well with the properties of the molecules used to train the model. In order to enrich libraries with molecules active towards a given biological target, we propose to fine-tune the model with small sets of molecules, which are known to be active against that target. Against Staphylococcus aureus, the model reproduced 14% of 6051 hold-out test molecules that medicinal chemists designed, whereas against Plasmodium falciparum (Malaria) it reproduced 28% of 1240 test molecules. When coupled with a scoring function, our model can perform the complete de novo drug design cycle to generate large sets of novel molecules for drug discovery. Keywords: computer-assisted drug design; recurrent neural networks 1 Introduction Chemistry is the language of nature. Chemists speak it fluently and have made their discipline one of the true contributors to human well-being, which has “change[d] the way you live and die”.[1] This is particularly true for medicinal chemistry. However, creating novel drugs is an extraordinarily hard and complex problem.[2] One of the many challenges in drug design is the sheer size of the search space for novel molecules. It has been estimated that 1060 drug-like molecules could possibly be synthetically accessible.[3] Chemists have to select and examine molecules from this large space to find molecules that are active towards a biological target. Active means for example that a molecule binds to a biomolecule, which causes an effect in the living organism, or inhibits replication of bacteria. Modern high-throughput screening techniques allow to test molecules in the order of 106 in the lab.[4] However, larger experiments will get prohibitively expensive. Given this practical limitation of in vitro experiments, it is desirable to have computational tools to narrow down the enormous search space. Virtual screening is a commonly used strategy to search for promising molecules amongst mil* Correspondence: [email protected] Institute of Organic Chemistry & Center for Multiscale Theory and Computation, Westfälische Wilhelms-Universität, Münster, Germany Full list of author information is available at the end of the article 1 lions of existing or billions of virtual molecules.[5] Searching can be carried out using similarity-based metrics, which provides a quantifiable numerical indicator of closeness between molecules. In contrast, in de-novo drug design, one aims to directly create novel molecules that are active towards the desired biological target.[6, 7] Here, like in any molecular design task, the computer has to i create molecules, ii score and filter them, and iii search for better molecules, building on the knowledge gained in the previous steps. Task i, the generation of novel molecules, is usually solved with one of two different protocols.[7] One strategy is to build molecules from predefined groups of atoms or fragments. Unfortunately, these approaches often lead to molecules that are very hard to synthesise.[8] Therefore, another established approach is to conduct virtual chemical reactions based on expert coded rules, with the hope that these reactions could then also be applied in practice to make the molecules in the laboratory.[9] These systems give reasonable drug-like molecules, and are considered as “the solution” to the structure generation problem.[2] We generally share this view. However, we have recently shown that the predicted reactions from these rulebased expert systems can sometimes fail.[10] Also, fo- Segler et al. cussing on a small set of robust reactions can unnecessarily restrict the possibly accessible chemical space. Task ii, scoring molecules and filtering out undesired structures, can be solved with substructure filters for undesirable reactive groups in conjunction with established approaches such as docking[11] or machine-learning (ML) approaches.[7, 12, 13] The ML approaches are split into two branches: Target prediction classifies molecules into active and inactive, and quantitative structure-activity relationships (QSAR) seek to quantitatively predict a real-valued measure for the effectiveness of a substance (as a regression problem). As molecular descriptors, Signature Fingerprints, Extended-Connectivity (ECFP) and atom pair (APFP) fingerprints and their fuzzy variants are the de-facto standard today.[14–16] Convolutional Networks on Graphs are a recent addition to the field of molecular descriptors.[17, 18] Random Forests and Neural Networks are currently the most widely used machine learning models for target prediction.[19–31] This leads to task iii, the search for molecules with the right binding affinity combined with optimal molecular properties. In earlier work, this was performed (among others) with classical global optimisation techniques, for example genetic algorithms or ant-colony optimisation.[7, 32] Furthermore, de novo design is related to inverse QSAR.[33–36] While in de novo design design, a regular QSAR mapping X → y from molecular descriptor space X to properties y is used as the scoring function for the global optimizer, in inverse QSAR one aims to find an explicit inverse mapping y → X, and then maps back from optimal points in descriptor space X to valid molecules. However, this is not well defined, because molecules are inherently discrete. Several protocols have been developed to address this, for example enumerating all structures within the constraints of hyper-rectangles in the descriptor space.[33–38] Gómez-Bombarelli et al. proposed to learn continuous representations of molecules with variational auto-encoders, based on the model by Bowman et al.,[39] and to perform Bayesian optimisation in this vector space to optimise molecular properties.[40] Nevertheless, this approach was not applied to create active drug molecules, and did not succeed in optimising more complex molecular properties, such as emission color and delayed fluorescence decay rate (kTADF ).[40] In this work, we suggest a novel, completely datadriven de novo drug design approach. It relies only on a generative model for molecular structures, based on a recurrent neural network, that is trained on large sets of molecules. Generative models learn a probability distribution over the training examples; sampling from this distribution generates new examples Page 2 of 17 similar to the training data. Intuitively, a generative model for molecules trained on drug molecules would "know" how valid and reasonable drug-like molecules look like, and could be used to generate more druglike molecules. However, for molecules, these models have been studied rarely, and rigorously only with traditional models such as Gaussian mixture models (GMM).[37, 41] Recently, recurrent neural networks (RNNs) have emerged as powerful generative models in very different domains, such as natural language processing,[42] speech,[43] images,[44] video,[45] formal languages,[46] computer code generation,[47] and music scores.[48] In this work, we highlight the analogy of language and chemistry, and show that RNNs can also generate reasonable molecules. Furthermore, we demonstrate that RNNs can also transfer their learned knowledge from large molecule sets to directly produce novel molecules that are biologically active by retraining the models on small sets of already known actives. We test our models by reproducing hold-out test sets of known biologically active molecules. 2 Methods 2.1 Representing Molecules To connect chemistry with language, it is important to understand how molecules are represented. Usually, they are modeled by molecular graphs, also called Lewis structures in chemistry. In molecular graphs, atoms are labeled nodes. The edges are the bonds between atoms, which are labeled with the bond order (e.g. single, double or triple). One could therefore envision having a model that reads and outputs graphs. Several common chemistry formats store molecules in such a manner. However, in models for natural language processing, the input and output of the model are usually sequences of single letters, strings or words. We therefore employ the Smiles format, which encodes molecular graphs compactly as human-readable strings. Smiles is a formal grammar which describes molecules with an alphabet of characters, for example c and C for aromatic and aliphatic carbon atoms, O for oxygen, -, = and # for single, double and triple bonds (see Figure 1).[49] To indicate rings, a number is introduced at the two atoms where the ring is closed. For example, benzene in aromatic Smiles notation would be c1ccccc1. Side chains are denoted by round brackets. To generate valid Smiles, the generative model would have to learn the Smiles grammar, which includes keeping track of rings and brackets to eventually close them. In morphine, a complex natural product, the number of steps between the first 1 and the second 1, indicating a ring, is 32. Having established a link between molecules and (formal) language, we can now discuss language models. Segler et al. Page 3 of 17 O O O N N N OH N Caffeine CN1c2ncn(C)c2C(=O)N(C)C1=O Ibuprofen CC(C)Cc1ccc(cc1)C(C)C(O)=O HO O H x1:n = (x1 , ..., xn ) and an initial state vector h0 , and returns a sequence of state vectors h1:n = (h1 , ..., hn ) and a sequence of output vectors y1:n = (y1 , ..., yn ). The RNN consists of a recursively defined function R, which takes a state vector hi and input vector xi+1 and returns a new state vector hi+1 . Another function O maps a state vector hi to an output vector yi .[50] N HO RNN(h0 , x1:n ) = h1:n , y1:n hi = R(hi−1 , xi ) yi = O(hi ) Morphine [H][C@]12C=C[C@H](O)[C@@H]3Oc4c5c(C[C@H]1N(C)CC[C@@]235)ccc4O Figure 1 Examples of molecules and their Smiles representation. To correctly create smiles, the model has to learn long term dependencies, for example to close rings (indicated by numbers) and brackets. The state vector hi stores a representation of the information about all symbols seen in the sequence so far. As an alternative to the recursive definition, the recur- 2.2 Language Models and Recurrent Neural Networks Given a sequence of words (w1 , ..., wi ), language models predict the distribution of the (i + 1)th word wi+1 .[50] For example, if a language model receives the sequence "Chemistry is", it would assign different probabilities to possible next words. "fascinating", "important", or "challenging" would receive high probabilities, while "runs" or "potato" would receive very low probabilities. Language models can both capture the grammatical correctness ("runs" in this sentence is wrong) and the meaning ("potato" does not make sense). Language models are implemented for example in message autocorrection in many modern smartphones. Interestingly, language models do not have to use words. They can also be based on characters or letters.[50] In that case, when receiving the sequence of characters chemistr, it would assign a high probability to y, but a low probability to q. To model molecules instead of language, we simply swap words or letters with atoms, or, more practically, characters in the Smiles alphabet, which form a (formal) language. For example, if the model receives the sequence c1ccccc, there is a high probability that the next symbol would be a "1", which closes the ring, and yields benzene. More formally, to a sequence S of symbols si at steps ti ∈ T , the language model assigns a probability of Pθ (S) = Pθ (s1 ) · T Y Pθ (st |st−1 , ..., s1 ) (2) (3) (4) (1) t=2 where the parameters θ are learned from the training set.[50] In this work, we use a recurrent neural network (RNN) to estimate the probabilities of Equation 1. In contrast to regular feedforward neural networks, RNNs maintain state, which is needed to keep track of the symbols seen earlier in the sequence. In abstract terms, an RNN takes a sequence of input vectors a) xt ht-1 R,O ht b) x1 h0 R,O θ yt x2 h1 h2 R,O θ y1 x3 h3 R,O θ y2 x4 y3 h4 R,O θ θ y4 Figure 2 a) Recursively defined RNN b) The same RNN, unrolled. The parameters θ (the weight matrices of the neural network) are shared over all time steps. rent network can also be unrolled for finite sequences (see Figure 2). An unrolled RNN can be seen as a very deep neural network, in which the parameters θ are shared among the layers, and the hidden state ht is passed as an additional input to the next layer. Training the unrolled RNN to fit the parameters θ can then simply be done by using backpropagation to compute the gradients with respect to the loss function, which is categorical cross-entropy in this work.[50] As the specific RNN function, in this work, we use the Long Short Term Memory (LSTM), which was introduced by Hochreiter and Schmidhuber.[51] It has been used successfully in many natural language processing tasks,[42] for example in Google’s Neural Machine Translation system.[52] For excellent in-depth discussions of the LSTM, we refer to the articles by Goldberg,[50] Graves,[53] Olah,[54] and Greff et al.[55] To encode the Smiles symbols as input vectors xt , we employ the "one-hot" representation.[53] This means if there are K symbols, and k is the symbol to be input at step t, then we can construct an input vector xt with length K, whose entries are all zero except the k-th entry, which is one. If we assume a very restricted set of symbols {c, 1, \n}, input c would correspond to xt = (1, 0, 0), 1 to xt = (0, 1, 0) and \n to xt = (0, 0, 1). The probability distribution Pθ (st+1 |st , ..., s1 ) of the next symbol given the already seen sequence is thus Segler et al. Page 4 of 17 1 2 3 ... 7 8 st c 1 c ... c 1 xt (1,0,0) (0,1,0) (1,0,0) (1,0,0) (0,1,0) h1 h2 h3 h8 Step t h9 c1ccccc1\n yt st+1 (0.2,0.8,0) (0.9,0,0.1) (0.8,0.1,0.1) 1 c c ... (0.2,0.8,0) (0.1,0.1,0.9) 1 \n gather symbols Figure 3 The Symbol Generation and Sampling Process. We start with a random seed symbol s1 , here c, which gets converted into a one-hot vector x1 and input into the model. The model then updates its internal state h0 to h1 and outputs y1 , which is the probability distribution over the next symbols. Here, sampling yields s2 =1. Converting s2 to x2 , and feeding it to the model leads to updated hidden state h2 and output y2 , from which can sample again. This iterative symbol-by-symbol procedure can be continued as long as desired. In this example, we stop it after observing an EOL (\n) symbol, and obtain the Smiles for benzene. The hidden state hi allows the model to keep track of opened brackets and rings, to ensure that they will be closed again later. a multinomial distribution, which is estimated using the output vector yt of the recurrent neural network at time step t by exp(ytk ) Pθ (st+1 = k|st , ..., s1 ) = PK k′ k′ =1 exp(yt ) (5) where ytk corresponds to the k-th element of vector yt .[53] Sampling from this distribution would then allow generating novel molecules: After sampling a Smiles symbol st+1 for the next time step t + 1, we can construct a new input vector xt+1 , which is fed into the model, and via yt+1 and Equation 5 yields Pθ (st+2 |st+1 , ..., s1 ). Sampling from the latter generates st+2 , which serves again also as the model’s input for the next step (see Figure 4). This symbol-bysymbol sampling procedure is repeated until the desired number of characters has been generated.[53] To indicate that a molecule is "completed", each molecule in our training data finishes with an “end of line” (EOL) symbol, in our case the single character \n (which means the training data is just a simple Smiles file). Thus, when the system outputs an EOL, a generated molecule is finished. However, we simply continue sampling, thus generating a regular Smiles file that contains one molecule per line. In this work, we used a network with three stacked LSTM layers, using the keras library.[56] The model was trained with back propagation through time,[53] using the ADAM optimizer at standard settings.[57] To mitigate the problem of exploding gradients during training, a gradient norm clipping of 5 is applied.[53] 2.3 Transfer Learning For many machine learning tasks, only small datasets are available, which might lead to overfitting with powerful models such as neural networks. In this situation, transfer learning can help.[58] Here, a model is first trained on a large dataset for a different task. Then, the model is retrained on the smaller dataset, which is also called fine-tuning. The aim of transfer learning is to learn general features on the bigger data set, which also might be useful for the second task in the smaller data regime. To generate focussed molecule libraries, we first train on a large, general set of molecules, then perform fine-tuning on a smaller set of specific molecules, and after that start the sampling procedure. 2.4 Target Prediction To verify whether the generated molecules are active on the desired targets, standard target prediction was employed. Machine learning-based target prediction aims to learn a classifier c : M → {1, 0} to decide whether a molecule m ∈ molecular descriptor space M is active or not against a target.[12, 13] The molecules are split into actives and inactives using a threshold on a measure for the substance effectiveness. pIC50 = − log10 (IC50 ) is one of the most widely used metrics for this purpose. IC50 is the half maximal inhibitory concentration, that is the concentration of drug that is required to inhibit 50% of a biological target’s function in vitro. To predict whether the generated molecules are active towards the biological target of interest, target prediction models (TPMs) were trained for all the tested targets (5-HT2A , Plasmodium falciparum and Staphylococcus aureus). We evaluated Random Forest, Segler et al. Page 5 of 17 Logistic Regression, (Deep) Neural Networks and Gradient Boosting Trees (GBT) as models with ECFP4 (Extended Connectivity Fingerprint with a diameter of 4) as the molecular descriptor.[14, 15] We found that GBTs slightly outperformed all other models, and used these as our virtual assay in all studies (see Supporting Information for details). ECFP4 fingerprints were generated with CDK version 1.5.13.[59, 60] ScikitLearn,[61] xgBoost[62] and keras[56] were used as the machine learning libraries. For 5-HT2A and Plasmodium, molecules are considered as active for the TPM if their IC50 reported in ChEMBL is < 100 nm, which translates to a pIC50 > 7, whereas for Staphylococcus, we used pMIC > 3. 2.5 Data The chemical language model was trained on a Smiles file containing 1.4 million molecules from the ChEMBL database, which contains molecules and measured biological activity data. The Smiles strings of the molecules were canonicalized (which means finding a unique representation that is the same for isomorphic molecular graphs)[63, 64] before training with the CDK chemoinformatics library, yielding a Smiles file that contained one molecule per line.[59, 60] It has to be noted that ChEMBL contains many peptides, natural products with complex scaffolds, Michael acceptors, benzoquinones, hydroxylamines, hydrazines etc. which is reflected in the generated structures (see below). This corresponds to 72 million individual characters, with a vocabulary size of 51 unique characters. 51 characters is only a subset of all Smiles symbols, since the molecules in ChEMBL do not contain many of the heavy elements. As we have to set the number of symbols as a hyperparameter during model construction, and the model can only learn the distribution over the symbols present in the training data, this implies that only molecules with these 51 Smiles symbols seen during training can be generated during sampling. The 5-HT2A , the Plasmodium falciparum and the Staphylococcus aureus dataset were also obtained from ChEMBL. The molecules for the hold-out test sets were removed from the training data. 2.6 Model Evaluation To evaluate the models for a test set T , and a set of molecules GN generated from the model by sampling, ∩T | we report the ratio of reproduced molecules |GN |T | , and enrichment over random (EOR), which is defined as, EOR = n |GN | m |RM | (6) where n = |GN ∩ T | is the number of reproduced molecules from T by sampling a set GN of |GN | = N molecules from the fine-tuned generative model, and m = |RM ∩ T | is the number of reproduced molecules from T by sampling a set RM of |RM | = M molecules from the generic, unbiased generative model trained only on the large dataset. Intuitively, EOR indicates how much better the fine-tuned models work when compared to the general model. 3 Results and Discussion In this work, we address two points: First, we want to generate large sets of diverse molecules for virtual screening campaigns. Second, we want to generate smaller, focussed libraries enriched with possibly active molecules for a specific target. For the first task, we can train a model on a large, general set of molecules to learn the Smiles grammar. Sampling from this model would generate sets of diverse, but unfocused molecules. To address the second task, and to obtain novel active drug molecules for a target of interest, we perform transfer learning: We select a small set of known actives for that target and we refit our pre-trained chemical language model with this small data-set. After each epoch, we sample from the model to generate novel actives. Furthermore, we investigate if the model actually benefits from transfer learning, by comparing it to a model trained from scratch on the small sets without pre-training. 3.1 Training the recurrent network We employed a recurrent neural network with three stacked LSTM layers, each with 1024 dimensions, and each one followed by a dropout[65] layer, with a dropout ratio of 0.2, to regularise the neural network. The model was trained until convergence, using a batch size of 128. The RNN was unrolled for 64 steps. It had 21.3 × 106 parameters. During training, we sampled a few molecules from the model every 1000 mini-batches to inspect progress. Within a few 1000 steps, the model starts to output valid molecules (see Table 1). 3.2 Generating Novel Molecules To generate novel molecules, 50,000,000 Smiles symbols were sampled from the model symbol-by-symbol. This corresponded to 976,327 lines, from which 97.7% were valid molecules after parsing with the CDK toolkit. Removing all molecules already seen during training yielded 864,880 structures. After filtering out duplicates, we obtained 847,955 novel molecules. A few generated molecules were randomly selected and depicted in Figure 4. The Supporting Information contains more structures. The created structures are not Segler et al. Page 6 of 17 Table 1 Molecules sampled during training. Batch Generated Example 0 1000 2000 3000 Oc.BK5i%ur+7oAFc7L3T=F8B5e=n)CS6RCTAR((OVCp1CApb) OF=CCC2OCCCC)C2)C1CNC2CCCCCCCCCCCCCCCCCCCCCCC O=C(N)C(=O)N(c1occc1OC)c2ccccc2OC O=C1C=2N(c3cc(ccc3OC2CCC1)CCCc4cn(c5c(Cl)cccc54)C)C O F O NH HN N O OH HN O F F F Cl N N H N N O N N O O O 10 O N HN H N O N N S ChEMBL Generated O N N O NH2 no no yes yes t-SNE of Phys.Chem Descriptors 15 N N N O N O O S O valid Ad F N H N H O 5 O N O 0 Cl Figure 4 A few randomly selected, generated molecules. Ad = Adamantyl −5 −10 −15 −20 just formally valid, but are also mostly chemically reasonable. In order to check if the de novo compounds could be considered as valid starting points for a drug discovery program, we applied the internal AstraZeneca filters.[66] At AstraZeneca, this flagging system is used to determine if a compound is suitable to be part of the high-throughput screening collection (if flagged as “core” or “backup”) or should be restricted for particular use (flagged as “undesirable” since it contains one or several unwanted substructures, e.g. undesired reactive functional groups). The filters were applied to the generated set of 848 k molecules and they flagged most of them, 640 k (75%), are either core or backup. Since the same ratio (75%) of core and backup compounds has been observed for the ChEMBL collection, we therefore conclude that the algorithm generates preponderantly valid screening molecules and faithfully reproduces the distribution of the training data. To determine whether the properties of the generated molecules match the properties of the training data from ChEMBL, we followed the procedure of Kolb:[67] We computed several molecular properties, namely molecular weight, BertzCT, the number of Hdonors, H-acceptors, and rotatable bonds, logP and total polar surface area for randomly selected subsets from both sets with the RDKit[68] library version 2016.03.1. Then, we performed dimensionality reduction to 2D with t-SNE (t-Distributed Stochastic Neighbor Embedding, a technique analogous to PCA), which is shown in Figure 5.[69] Both sets overlap almost completely, which indicates that the generated molecules very well recreate the properties of the training molecules. −15 −10 −5 0 5 10 15 20 Figure 5 t-SNE projection of 7 physicochemical descriptors of random molecules from ChEMBL (blue) and molecules generated with the neural network trained on ChEMBL (green), to two unitless dimensions. The distributions of both sets overlap significantly. Furthermore, we analysed the Bemis-Murcko scaffolds of the training molecules and the sampled molecules.[70] Bemis-Murcko scaffolds contain the ring systems of a molecule and the moieties that link these ring systems, while removing any side chains. They represent the scaffold, or “core” of a molecule, which series of drug molecules often have in common. The number of common scaffolds in both sets, divided by the union of all scaffolds in both sets (Jaccard index) is 0.12, which indicates that the language model does not just modify side chain substituents, but also introduces modifications at the molecular core. 3.3 Generating Active Drug Molecules and Focused Libraries 3.3.1 Targeting the 5-HT2A receptor To generate novel ligands for the 5-HT2A receptor, we first selected all molecules with pIC50 > 7 which were tested on 5-HT2A from ChEMBL (732 molecules), and then fine-tuned our pre-trained chemical language model on this set. After each epoch, we sampled 100,000 chars, canonicalised the molecules, and removed any sampled molecules that were already contained in the training set. Following this, we evaluated the generated molecules of each round of retraining with our 5-HT2A target prediction model (TPM). Segler et al. Page 7 of 17 In Figure 4, the ratio of molecules predicted to be active by the TPM after each round of fine-tuning is shown. Before fine-tuning (corresponding to epoch 0), the model generates almost exclusively inactive molecules. Already after 4 epochs of fine-tuning the model produced a set in which 50% of the molecules are predicted to be active. Influence of fine-tuning epochs on the ratio of actives 1.0 Ratio of actives 0.8 0.6 3.3.2 Targeting Plasmodium falciparum (Malaria) Plasmodium falciparum is a parasite that causes the most dangerous form of Malaria.[71] To probe our model on this important target, we used a more challenging validation strategy. We wanted to investigate whether the model could also propose the same molecules that medicinal chemists chose to evaluate in published studies. To test this, first, the known actives against Plasmodium falciparum with a pIC50 > 8 were selected from ChEMBL. Then, this set was split randomly into a training (1239 molecules) and a test set (1240 molecules). The chemical language model was then fine-tuned on the training set. 7500 molecules were sampled after each of the 20 epochs of refitting. Table 2 Reproducting known actives in the Plasmodium test set. EOR: Enrichment over random. 0.4 # 1 2 3 0.2 pIC50 Train. Test Gen. mols. Reprod. EOR >8 >8 >9 1239 100 100 1240 1240 1022 128,256 93,721 91,034 28% 7% 11% 66.9 19.0 35.7 0.0 0 5 10 Epochs of fine-tuning 15 20 Figure 6 Epochs of fine-tuning vs ratio of actives. Diversity Analysis In order to assess the novelty of the de novo molecules generated with the fine-tuned model, a nearest neighbor similarity/diversity analysis has been conducted using a commonly used 2D fingerprint (ECFP4) based similarity method (Tanimoto index).[67] Figure 7 shows the distribution of the nearest neighbor Tanimoto index generated by comparing all the novel molecules and the training molecules before and after n epochs of fine-tuning. For each bin, the white bars indicate the molecules generated from the unbiased, general model, while the darker bars indicate the molecules after several epochs of fine-tuning. Within the bins corresponding to lower similarity, the number of molecules decreases, while the bins of higher similarity get populated with increasing numbers of molecules. The plot thus shows that the model starts to output more and more similar molecules to the target-specific training set. Notably, after a few rounds of training not only highly similar molecules are produced, but also molecules covering the whole range of similarity, indicating that our method could not only deliver close analogs but new chemotypes or scaffold ideas to a drug discovery project.[5] To have the best of both worlds, that is diverse and focussed molecules, we therefore suggest to sample after each epoch of retraining and not just after the final epoch. This yielded 128,256 unique molecules. Interestingly, we found that our model was able to "redesign" 28% of the unseen molecules of the test set. In comparison to molecules sampled from the unspecific, untuned model, an Enrichment over Random (EOR) of 66.9 is obtained. With a smaller training set of 100 molecules, the model can still reproduce 7% of the test set, with an EOR of 19.0. To test the reliance on pIC50 we chose to use another cut-off of pIC50 > 9, and took 100 molecules in the training set and 1022 in the test set. 11% of the test set could be recreated, with an EOR of 35.7. To visually explore how the model populates chemical space, Figure 8 shows a t-SNE plot of the ECFP4 fingerprints of the test molecules and 2000 generated molecules that were predicted to be active by the target prediction model for Plasmodium falciparum. It indicates that the model has generated many similar molecules around the test examples. 3.3.3 Targeting Staphylococcus aureus (Golden Staph) To evaluate a different target, we furthermore conducted a series of experiments to reproduce known active molecules against Staphylococcus aureus. Here, we used actives with a pMIC > 3. MIC is the Mean Inhibitory Concentration, the lowest concentration of a compound that prevents visible growth of a microorganism. As above, the actives were split into a training and a test set. However, here, the availability of the data allows larger test sets to be used. After finetuning on the training set of 1000 molecules (Table 3, Entry 1), our model could retrieve 14% of the 6051 test molecules. When scaling down to a smaller training set of 50 molecules (the model gets trained on less than Segler et al. Page 8 of 17 Figure 7 Nearest-neighbour Tanimoto similarity distribution of the generated molecules for 5-HT2A after n epochs of fine-tuning against the known actives. The generated molecules are distributed over the whole similarity range. Generated molecules with a medium similarity can be interesting for scaffold-hopping.[5] Table 3 Reproducting known actives in the Staphylococcus test set. EOR: Enrichment over random. Entry 1 2 3a 4b 5c a Fine-tuning pMIC Train. Test Gen. mols. Reprod. EOR > > > > > 1000 50 50 50 0 6051 7001 7001 7001 7001 51,052 70,891 85,755 285 60,988 14% 2.5% 1.8% 0% 6% 155.9 21.6 6.3 — 59.6 3 3 3 3 3 learning rate = 10−4 . b No Pretraining. c 8 Generate-Test cycles. 1% of the data!), it can still reproduce 2.5% of the test set, and performs 21.6 times better than the unbiased model (Table 3, Entry 2). Using a lower learning rate (0.0001, Entry 3) for fine-tuning, which is often done in transfer learning, does not work as well as the standard learning rate (0.001, Entry 2). We additionally examined whether the model benefits from transfer learning. When trained from scratch, the model performs much worse than the pretrained and subsequently fine-tuned model (see Figure 9 and Table 3, Entry 4). Pretraining on the large dataset is thus crucial to achieve good performance against Staphylococcus aureus. 3.4 Simulating Design-Synthesis-Test Cycles The experiments we conducted so far are applicable if one already knows several actives. However, in drug discovery, one often does not have such a set to start with. Therefore, high throughput screenings are conducted to identify a few hits, which serve as a starting point for the typical cyclical drug discovery process: Molecules get designed, synthesised, and then tested in assays. Then, the best molecules are selected, and based on the gained knowledge new molecules are designed, which closes the cycle. Therefore, as a final challenge for our model, we simulated this cycle by iterating molecule generation ("synthesis"), selection of the best molecules with the machine learning-based target prediction ("virtual assay") and retraining the language model with the best molecules ("design") with Staphylococcus aureus as the target. We thus do not use a set of known actives to start the structure generation procedure (see Figure 10). We started with 100,000 sampled molecules from the unbiased chemical language model. Then, using our target prediction model, we extracted the molecules classified as actives. After that, the RNN was finetuned for 5 epochs on the actives, sampling ≈10,000 molecules after each epoch. The resulting molecules Segler et al. Page 9 of 17 t-SNE of ECFP4 20 Generated, Predicted Actives Plasmodium f. Test Set 15 RNN Target Prediction Model 1) Retrain 2) Sample 1) Score 2) Filter Inactives 10 5 New Active Molecules 0 −5 −10 −15 −20 −20 −15 −10 −5 0 5 10 15 20 Figure 8 t-SNE plot of the pIC50 >9 test set (blue) and the de novo molecules predicted to be active (green). The language model populates chemical space around the test molecules. Fine-Tuning vs Direct Training type 1.4 from scratch pretrained 1.2 Test Loss 1.0 0.8 0.6 Figure 10 Scheme of our de novo design cycle. Molecules are generated by the chemical language model and then scored with the target prediction model (TPM). The inactives are filtered out, and the RNN is retrained. Here, the TPM is a machine learning model, but it could also be a robot conducting synthesis and biological assays, or a docking program. 3.5 Why does the model work? Our results presented in Section 3.2 show that the general model trained on a large molecule set has learned the Smiles rules and can output valid, druglike molecules, which resemble the training data. However, sampling from this model does not help much if we want to generate actives for a specific target: We would have to generate very large sets to find actives for that target among the diverse range of molecules the model creates, which is indicated by the high EOR scores in our experiments. 0.4 0.2 0 1 2 3 4 5 6 7 8 0.14 9 10 11 12 13 14 15 16 17 18 19 Epochs Figure 9 Different training strategies on the Staphylococcus aureus dataset with 1000 training and 6051 test examples. Fine-tuning the pretrained model performs better than training from scratch (lower test loss [cross entropy] is better). 0.12 Normed Frequency 0.0 0.16 0.10 0.08 0.06 0.04 0.02 were filtered with the target prediction model, and the new actives appended to the actives from the previous round, closing the loop. Already after 8 iterations, the model reproduced 416 of the 7001 test molecules from the previous task, which is 6% (Table 3, Entry 5), and exhibits and EOR of 59.6. This EOR is higher than if the model is retrained directly on a set of 50 actives (Entry 2). Additionally, we obtained 60,988 unique molecules that the target prediction model classified as active. This demonstrates that in combination with a target prediction or scoring model, our model can also perform the complete de novo-design cycle. 0.00 0 10 20 30 Levenshtein Distance 40 50 60 Figure 11 Histogram of Levenshtein (String edit) distances of the Smiles of the reproduced molecules to their nearest neighbour in the training set (Staphylococcus aureus, model retrained on 50 actives). While in many cases the model makes changes of a few symbols in the Smiles, resembling the typical modifications applied when exploring series of compounds, the distribution of the distances indicates that the RNN also performs more complex changes by introducing larger moieties or generating molecules that are structurally different, but isofunctional to the training set. When fine-tuned to a set of actives, the probability distribution over the molecules captured by our model Segler et al. is shifted towards molecules active towards our target. To study this, we compare the Levenshtein (String edit) distance of the generated Smiles to their nearest neighbours in the training set in Figure 11. The Levenshtein distance of e.g. benzene c1ccccc1 and pyridine c1ccncc1 would be 1. Figure 11 shows that while the model often seems to have made small replacements in the underlying Smiles, in many cases it also made more complex modifications or even generated completely different Smiles. This is supported also by the distribution of the nearest neighbour fingerprint similarities of training and rediscovered molecules (ECFP4, Tanimoto, Figure 12). Many rediscovered molecules are in the medium similarity regime. Because we perform transfer learning, during finetuning, the model does not "forget" what it has learned. A plausible explanation why the model works is therefore that it can transfer the modifications that are regularly applied when series of molecules are studied, to the molecules it has seen during fine-tuning. 1.0 Nearest Neighbour Distribution - Training vs Reproduced Molecules Similarity 0.8 0.6 0.4 0.2 0.0 Figure 12 Violin plot of the nearest-neighbour ECFP4-Tanimoto similarity distribution of the 50 training molecules against the rediscovered molecules in Table 3, Entry 2. The distribution suggests the model has learned to make typical small functional group replacements, but can also reproduce molecules which are not too similar to the training data. 4 Conclusion In this work, we have shown that recurrent neural networks based on the Long Short Term Memory (LSTM) can be applied to learn a statistical chemical language model. The model can generate large sets of novel molecules with similar physico-chemical properties to the training molecules. This can be used to generate libraries for virtual screening. Furthermore, we demonstrated that the model performs transfer learning when fine-tuned to smaller sets of molecules active towards Page 10 of 17 a specific biological target, which enables the creation of novel molecules with the desired activity. By iterating cycles of structure generation with the language model, scoring with a target prediction model (TPM) and retraining of the model with increasingly larger sets of highly scored molecules, we showed that we do not even need a set of active known active molecules to start our procedure with, as the TPM could also be a docking program, or a robot conducting synthesis[72] and biological testing. We see three main advantages of our method. First, it is conceptually orthogonal to established molecule generation approaches, as it learns a generative model for molecular structures. Second, our method is very simple to setup, train and to use, and can be adapted to different datasets without any modifications to the model architecture, and does not depend on handencoded expert knowledge. Furthermore, it merges structure generation and optimisation in one model. A weakness of our model is interpretability. In contrast, existing de-novo design methods settled on virtual reactions to generate molecules, which has advantages as it minimises the chance of obtaining "overfit", weird molecules, and increases the chances to find synthesizable compounds.[2, 7] To extend our work, it is just a small step to cast molecule generation as a reinforcement learning problem, where the pre-trained LSTM generator could be seen as a policy, which can be encouraged to create better molecules with a reward signal obtained from a target prediction model.[73] In addition, different approaches for target prediction, for example docking, could be evaluated.[7, 11] Deep Learning is not a panacea, and we join Gawehn et al. in expressing “some healthy skepticism” regarding its application in drug discovery.[26] Generating molecules that are almost right is not enough, because in Chemistry, a miss is as good as a mile, and drug discovery is a “needle in the haystack” problem – in which also the needle looks like hay. Nevertheless, given that we have shown in this work that our model can rediscover those needles, and other recent developments,[26, 74–76] we believe that deep neural networks can be complimentary to established approaches in drug discovery. The complexity of the problem certainly warrants the investigation of novel approaches. Eventually, success in the wet lab will determine if the new wave[21] of neural networks will prevail. Competing interests The authors declare that they have no competing interests. Segler et al. Acknowledgements The project was conducted during a research stay of M.S. at AstraZeneca R&D Gothenburg. We thank H. Chen and O. Engkvist for valuable discussions and feedback on the manuscript, and G. Klambauer for helpful suggestions. Author details 1 Institute of Organic Chemistry & Center for Multiscale Theory and Computation, Westfälische Wilhelms-Universität, Münster, Germany. 2 External Sciences, Discovery Sciences, AstraZeneca R&D Gothenburg, Sweden. 3 Department of Medicinal Chemistry, IMED RIA, AstraZeneca R&D Gothenburg, Sweden. 4 Department of Physics & International Centre for Quantum and Molecular Structures,Shanghai University, China. References 1. Whitesides, G. M. Angew. Chem. Int. Ed. 2015, 54, 3196–3209. 2. Schneider, P.; Schneider, G. J. Med. Chem. 2016, 59, 4077–4086. 3. Reymond, J.-L.; Ruddigkeit, L.; Blum, L.; van Deursen, R. Wiley Interdisc. Rev. Comp. Mol. Sci. 2012, 2, 717–733. 4. Schneider, G.; Baringhaus, K.-H. Molecular design: concepts and applications; John Wiley & Sons, 2008. 5. Stumpfe, D.; Bajorath, J. Wiley Interdisc. Rev. Comp. Mol. Sci. 2011, 1, 260–282. 6. Schneider, G.; Fechner, U. Nat. Rev. Drug Disc. 2005, 4, 649–663. 7. Hartenfeller, M.; Schneider, G. Wiley Interdisc. Rev. Comp. Mol. Sci. 2011, 1, 742–759. 8. Hartenfeller, M.; Zettl, H.; Walter, M.; Rupp, M.; Reisen, F.; Proschak, E.; Weggen, S.; Stark, H.; Schneider, G. PLoS Comput Biol 2012, 8, e1002380. 9. Hartenfeller, M.; Eberle, M.; Meier, P.; Nieto-Oberhuber, C.; Altmann, K.-H.; Schneider, G.; Jacoby, E.; Renner, S. J. Chem. Inf. Mod. 2011, 51, 3093–3098. 10. Segler, M.; Waller, M. P. manuscript submitted 2016, 11. Kitchen, D. B.; Decornez, H.; Furr, J. R.; Bajorath, J. Nat. Rev. Drug Disc. 2004, 3, 935–949. 12. Varnek, A.; Baskin, I. J. Chem. Inf. Mod. 2012, 52, 1413–1437. 13. Mitchell, J. B. Wiley Interdisc. Rev. Comp. Mol. Sci. 2014, 4, 468–481. 14. Riniker, S.; Landrum, G. A. J. Cheminf. 2013, 5, 1. 15. Rogers, D.; Hahn, M. J. Chem. Inf. Mod. 2010, 50, 742–754. 16. Alvarsson, J.; Eklund, M.; Engkvist, O.; Spjuth, O.; Carlsson, L.; Wikberg, J. E.; Noeske, T. J. Chem. Inf. Mod. 2014, 54, 2647–2653. 17. Duvenaud, D. K.; Maclaurin, D.; Iparraguirre, J.; Bombarell, R.; Hirzel, T.; Aspuru-Guzik, A.; Adams, R. P. Convolutional networks on graphs for learning molecular fingerprints. Adv. Neural Inf. Proc. Sys. 2015; pp 2224–2232. 18. Kearnes, S.; McCloskey, K.; Berndl, M.; Pande, V.; Riley, P. arXiv preprint arXiv:1603.00856 2016, 19. Zupan, J.; Gasteiger, J. Analytica Chimica Acta 1991, 248, 1–30. 20. Gasteiger, J.; Zupan, J. Angew. Chem. Int. Ed. 1993, 32, 503–527. 21. Zupan, J.; Gasteiger, J. Neural networks in chemistry and drug design; John Wiley &amp; Sons, Inc., 1999. 22. Lusci, A.; Pollastri, G.; Baldi, P. J. Chem. Inf. Mod. 2013, 53, 1563–1575. 23. Unterthiner, T.; Mayr, A.; Klambauer, G.; Steijaert, M.; Wegner, J. K.; Ceulemans, H.; Hochreiter, S. Adv. 2014, 27. 24. Unterthiner, T.; Mayr, A.; Klambauer, G.; Hochreiter, S. arXiv preprint arXiv:1503.01445 2015, 25. Schneider, P.; Müller, A. T.; Gabernet, G.; Button, A. L.; Posselt, G.; Wessler, S.; Hiss, J. A.; Schneider, G. Molecular Informatics 2016, 26. Gawehn, E.; Hiss, J. A.; Schneider, G. Molecular Informatics 2016, 35, 3–14. 27. Ramsundar, B.; Kearnes, S.; Riley, P.; Webster, D.; Konerding, D.; Pande, V. arXiv preprint arXiv:1502.02072 2015, 28. Kearnes, S.; Goldman, B.; Pande, V. arXiv preprint arXiv:1606.08793 2016, 29. Behler, J. Intern. J. Quantum Chem. 2015, 115, 1032–1050. 30. Behler, J.; Parrinello, M. Phys. Rev. Lett. 2007, 98, 146401. Page 11 of 17 31. Ma, J.; Sheridan, R. P.; Liaw, A.; Dahl, G. E.; Svetnik, V. J. Chem. Inf. Mod. 2015, 55, 263–274. 32. Reutlinger, M.; Rodrigues, T.; Schneider, P.; Schneider, G. Angew. Chem. Int. Ed. 2014, 53, 4244–4248. 33. Miyao, T.; Arakawa, M.; Funatsu, K. Molecular Informatics 2010, 29, 111–125. 34. Miyao, T.; Kaneko, H.; Funatsu, K. J. Chem. Inf. Mod. 2016, 56, 286–299. 35. Takeda, S.; Kaneko, H.; Funatsu, K. J. Chem. Inf. Mod. 2016, 56, 1885–1893. 36. Mishima, K.; Kaneko, H.; Funatsu, K. Molecular Informatics 2014, 33, 779–789. 37. White, D.; Wilson, R. C. J. Chem. Inf. Mod. 2010, 50, 1257–1274. 38. Patel, H.; Bodkin, M. J.; Chen, B.; Gillet, V. J. J. Chem. Inf. Mod. 2009, 49, 1163–1184. 39. Bowman, S. R.; Vilnis, L.; Vinyals, O.; Dai, A. M.; Jozefowicz, R.; Bengio, S. arXiv preprint arXiv:1511.06349 2015, 40. Gómez-Bombarelli, R.; Duvenaud, D.; Hernández-Lobato, J. M.; Aguilera-Iparraguirre, J.; Hirzel, T. D.; Adams, R. P.; Aspuru-Guzik, A. arXiv preprint arXiv:1610.02415 2016, 41. Voss, C. Modeling Molecules with Recurrent Neural Networks. 2015; http://csvoss.github.io/projects/2015/10/08/rnns-and-chemistry.html. 42. Jozefowicz, R.; Vinyals, O.; Schuster, M.; Shazeer, N.; Wu, Y. arXiv preprint arXiv:1602.02410 2016, 43. Graves, A.; Eck, D.; Beringer, N.; Schmidhuber, J. Biologically plausible speech recognition with LSTM neural nets. International Workshop on Biologically Inspired Approaches to Advanced Information Technology. 2004; pp 127–136. 44. van den Oord, A.; Kalchbrenner, N.; Kavukcuoglu, K. arXiv preprint arXiv:1601.06759 2016, 45. Srivastava, N.; Mansimov, E.; Salakhutdinov, R. CoRR, abs/1502.04681 2015, 2. 46. Gers, F. A.; Schmidhuber, E. IEEE Transactions on Neural Networks 2001, 12, 1333–1340. 47. Bhoopchand, A.; Rocktäschel, T.; Barr, E.; Riedel, S. arXiv preprint arXiv:1611.08307 2016, 48. Eck, D.; Schmidhuber, J. Finding temporal structure in music: Blues improvisation with LSTM recurrent networks. Neural Networks for Signal Processing, 2002. Proceedings of the 2002 12th IEEE Workshop on. 2002; pp 747–756. 49. Weininger, D. J. Chem. Inf. Comp. Sci. 1988, 28, 31–36. 50. Goldberg, Y. J. Artif. Intell. Res. 2016, 57, 345–420. 51. Hochreiter, S.; Schmidhuber, J. Neural computation 1997, 9, 1735–1780. 52. Johnson, M.; Schuster, M.; Le, Q. V.; Krikun, M.; Wu, Y.; Chen, Z.; Thorat, N.; Viégas, F.; Wattenberg, M.; Corrado, G. arXiv preprint arXiv:1611.04558 2016, 53. Graves, A. arXiv preprint arXiv:1308.0850 2013, 54. Olah, C. Understanding LSTM Networks. http://colah.github.io/posts/2015-08-Understanding-LSTMs/. 55. Greff, K.; Srivastava, R. K.; Koutník, J.; Steunebrink, B. R.; Schmidhuber, J. arXiv preprint arXiv:1503.04069 2015, 56. Chollet, F. Keras. https://github.com/fchollet/keras, retrieved on 2016-10-24. 57. Kingma, D.; Ba, J. arXiv preprint arXiv:1412.6980 2014, 58. Cireşan, D. C.; Meier, U.; Schmidhuber, J. Transfer learning for Latin and Chinese characters with deep neural networks. The 2012 International Joint Conference on Neural Networks (IJCNN). 2012; pp 1–6. 59. Steinbeck, C.; Hoppe, C.; Kuhn, S.; Floris, M.; Guha, R.; Willighagen, E. L. Current pharmaceutical design 2006, 12, 2111–2120. 60. Steinbeck, C.; Han, Y.; Kuhn, S.; Horlacher, O.; Luttmann, E.; Willighagen, E. J. Chem. Inf. Comp. Sci. 2003, 43, 493–500. 61. Pedregosa, F. et al. J. Machine Learning Res. 2011, 12, 2825–2830. 62. Chen, T.; Guestrin, C. arXiv preprint arXiv:1603.02754 2016, 63. Weininger, D.; Weininger, A.; Weininger, J. L. J. Chem. Inf. Comp. Sci. 1989, 29, 97–101. 64. Checked on 14.12.2016. https://en.wikipedia.org/wiki/Graph_canonization. Segler et al. 65. Srivastava, N.; Hinton, G. E.; Krizhevsky, A.; Sutskever, I.; Salakhutdinov, R. Journal of Machine Learning Research 2014, 15, 1929–1958. 66. Cumming, J. G.; Davis, A. M.; Muresan, S.; Haeberlein, M.; Chen, H. Nat. Rev. Drug Disc. 2013, 12, 948–962. 67. Chevillard, F.; Kolb, P. J. Chem. Inf. Mod. 2015, 55, 1824–1835. 68. RDKit: Open-source cheminformatics; http://www.rdkit.org. 69. Maaten, L. v. d.; Hinton, G. J. Machine Learning Res. 2008, 9, 2579–2605. 70. Bemis, G. W.; Murcko, M. A. J. Med. Chem. 1996, 39, 2887–2893. 71. Williamson, A. E.; Todd, M. H. ACS central science 2016, 2, 687–701. 72. Ley, S. V.; Fitzpatrick, D. E.; Ingham, R.; Myers, R. M. Angew. Chem. Int. Ed. 2015, 54, 3449–3464. 73. Sutton, R. S.; Barto, A. G. Reinforcement learning: An introduction; MIT press Cambridge, 1998; Vol. 1. 74. Schmidhuber, J. Neural Networks 2015, 61, 85–117. 75. Altae-Tran, H.; Ramsundar, B.; Pappu, A. S.; Pande, V. arXiv preprint arXiv:1611.03199 2016, 76. Graves, A.; Wayne, G.; Reynolds, M.; Harley, T.; Danihelka, I.; Grabska-Barwińska, A.; Colmenarejo, S. G.; Grefenstette, E.; et al., Nature 2016, 538, 471–476. Additional Files Generated Molecules In the following, a few randomly selected molecules produced with the general model trained on ChEMBL are shown. Page 12 of 17 Segler et al. Page 13 of 17 Segler et al. Page 14 of 17 Segler et al. Page 15 of 17 Segler et al. Page 16 of 17 Segler et al. Page 17 of 17
9cs.NE
Fast Algorithm for Finding Maximum Distance with Space Subdivision in E2 Vaclav Skala1, Zuzana Majdisova1 1 Faculty of Applied Sciences, University of West Bohemia, Univerzitni 8, CZ 30614 Plzen, Czech Republic Abstract. Finding an exact maximum distance of two points in the given set is a fundamental computational problem which is solved in many applications. This paper presents a fast, simple to implement and robust algorithm for finding this maximum distance of two points in E2. This algorithm is based on a polar subdivision followed by division of remaining points into uniform grid. The main idea of the algorithm is to eliminate as many input points as possible before finding the maximum distance. The proposed algorithm gives the significant speed up compared to the standard algorithm. Keywords: maximum distance; polar space subdivision; uniform 2D grid; points reduction 1 Introduction Finding a maximum distance of two points in the given data set is a fundamental computational problem. The solution of this problem is needed in many applications. A standard brute force (BF) algorithm with    complexity is usually used, where  is a number of points in the input dataset. If large sets of points have to be processed, then the BF algorithm leads to very bad time performance. Typical size of datasets in computer graphics is usually 10 and more points. Therefore the processing time of the BF algorithm for such sets is unacceptable. However, our main goal is to find the maximum distance, not all the pairs of two points having a maximum distance. Therefore the complexity of this algorithm should be lower. Various approaches, how to solve finding the maximum distance, are described in [9]. Other algorithms for finding the maximum distance of two points are in [1], [7]. 1.1 Brute Force Algorithm The standard BF algorithm for finding a maximum distance in set of points uses two nested loops. We can find such type of algorithms in many books dealing with fundamental algorithms and data structures, e.g. [4], [6]. In general, the BF algorithm can be described by Algorithm 1. //Square of the distance FUNCTION distance(A,B: point) distance := (A.x - B.x)^2 + (A.y - B.y)^2; END FUNCTION dist := 0; FOR i := 1 to N-1 do FOR j := i + 1 to N do dij := distance(Xi, Xj); IF dist < dij THEN dist := dij; END IF END FOR END FOR dist := SQRT(dist); Algorithm 1. Brute force algorithm Complexity of Algorithm 1 is clearly    and thus run time significantly increases with size of the input dataset. In practice, we can expect that points in input set are not organized in a very specific manner and points are more or less uniformly distributed. In this case, we can use “output sensitive” algorithms which lead to efficient solutions. We propose such algorithm in Section 2. 2 Proposed Algorithm In this section, we introduce a new algorithm for finding a maximum distance of two points in the given dataset in E2. The main idea of this algorithm is to eliminate as many input points as possible using an algorithm with  complexity using space subdivision and determines the maximum distance for the remaining points with    complexity, where ≪ . We use polar space subdivision for this elimination of points. This section is organized as follows. In Section 2.1, we present the first step of the algorithm which is an axis aligned bounding box (AABB) and an initial convex polygon construction followed by the location of points inside the initial convex polygon. Section 2.2 describes how to divide the points into non-overlapping 2 triangular shape sectors. Section 2.3 presents reduction of the points [2] which have absolutely no influence on the value of maximum distance. In Section 2.4, we describe the division of remaining points into uniform 2 grid. Finally, the finding of the maximum distance of two points is made in Section 2.5. 2.1 Location of Points inside Initial Polygon An important property is that two points with maximal distance are lying on the convex hull of a given set of points [10]. This fact is apparent if we consider a case in which two points with the largest distance are part of the convex hull. It is then obvious that there are another two points with larger distance. We also know that the most extreme point on any axis is part of the convex hull. These properties are used to significantly speedup the proposed algorithm for finding the exact maximal distance. At the beginning of our proposed algorithm, we need to find the exact extremal points in both axes, i.e. axis aligned bounding box (AABB) of a given dataset. The time complexity of this step is . So we generally get four distinct extremal points or less. Now, we can create a convex polygon using these extremal points, see Fig. 1. One important property of this polygon is that any point lying inside has no influence on the value of maximal distance. Due to this fact, we can perform a fast and simple initial test for a point inside/outside the initial polygon and discard a lot of points. a) b) c) Fig. 1. Location of AABB and initial testing polygon for 10 points: a) uniform points in ellipse, b) uniform points in rectangle, c) Gauss points. The location test of a point inside a polygon can be performed as follows. Each edge of the polygon is an oriented line and so we can calculate outer product [10]:      ∧               , (1) where  is the point and edge with index  is determined by point  and direction vector    ,  . If the polygon has an anticlockwise orientation and outer product    0 for at least one  ∈ !0,1,2,3#, then point  does not lie inside the polygon and has to be further processed. Otherwise, point  can be discarded as it is inside. 2.2 Division of Points into Polar Sectors Only the points which lie outside or on the boundary of the initial convex polygon will be further processed. Firstly, we perform the division of AABB into eight non-overlapping 2 triangular shape sectors, i.e. polar subdivision. This division of AABB is using a center point and angular division, see Fig. 2. The center point $ is determined as the average of all corners of the AABB. When we do the division of points into non-overlapping sectors, we also determine angle between the -axis and the vector %    $ for each point . This can be performed using two different calculations. One way is to use an exact angle from 0 to 2&. For this approach, we have to calculate the angle using the following formula: '(  arctg2. ,  / . (2) However, calculation of function arctg2 takes a lot of computing time. Therefore, we use a simplified calculation of approximated angle. When the angle is determined, we have to locate the exact sectors (half of the quadrant for square AABB), where the point is located, and then calculate the intersection with the given edge. Calculation of the intersection with the given edge of AABB is easy. The distribution of simplified angle can be seen in Fig. 2. Calculation of simplified angle is faster than the formula (2). Fig. 2. Non-overlapping sectors for division and uniform distribution of simplified angle on AABB. Angle ' ∈ 10,8 instead of 10,2&. Now we have the procedure how to calculate the simplified angle and therefore we are able to divide the points into sectors to which the given points belong. For each sector with index , one minimal point 345 is determined. This point has  the minimum (from all points in a sector) distance from the nearest corner of AABB. (Note that the nearest corner of AABB lies in the same quadrant as the point.) The initial points 345 are lying on the edges of the initial polygon, see Fig. 3. These  points can be calculated as an intersection point of the middle axis of a sector and the edge of the initial polygon. Fig. 3. Visualization of initial 645 points (red dots on the edges of the initial polygon). All minimum points 345 are connected into a polygon with vertices  …, 345 8 . For each new point we have to check whether the distance from this point to the to the same corner of nearest corner of AABB is smaller than the distance from 345  AABB. If this is true, then we have to replace point 345 with a processed point, add  this point into the sector with index  and recalculate the test lines 9 : and 9 ; , see Fig. 4. Otherwise we continue with the next step. In the next step, we check whether the processed point lies over or under the test line segments 9 : and 9 ; . We can compare the angle of the point with the angle of point 345 . If the angle is smaller, then we have to use the line 9 : , otherwise we have  to use the line 9 ; . If the point lies under the test line, it can be eliminated, because such a point has no influence on the value of maximum distance. Otherwise we add this point into the sector with index . 3745 , Fig. 4. Visualization of test lines 9: and 9; . 2.3 Reduction of Points for Testing All points, which can have an influence on the value of maximum distance, are already divided into polar sectors. We gave points 345 some initial values before  starting to divide the points into non-overlapping sectors and we used them to check whether to add or eliminate a point. Values of points 345 have changed during the  division process; hence we recheck all remaining points using the final values of . Moreover, we perform union of the vertices of initial polygon and points 345  minimum points 345 before new testing and connect them into a polygon, see  Fig. 5a). In this step, we check whether the processed point lies over or under the line segments 9 :: , 9 : , 9 ; and 9 ;; , see Fig. 5b). We select the concrete test line according to the angle again. a) b) Fig. 5. Visualization of test lines for rechecking all remaining points We minimize the number of points, which have an influence on the largest distance, using this step. Final sets of remaining points for input datasets with different distributions of points are shown in Fig. 6. a) b) c) Fig. 6. Remaining points (red dots) which have influence on the maximum distance (10 input points): a) uniform points in ellipse, b) uniform points in rectangle, c) Gauss points. 2.4 Division of Remaining Points into Uniform Grid We have a set of suspicious points, i.e. points which can have an influence on the final maximum distance. In this step, these suspicious points will be further processed. Firstly, we define the uniform grid of AABB. This uniform grid contains < cells. Thus, each cell has index   =>? ∙ A B>9, width C and height C where: C  DDEEFGHI , C  DDEEI(JIH . (3) Now, we can perform the division of suspicious points into a defined uniform grid. We are able to calculate the exact index of a cell to which the given point  belongs using following formulae:   45   45 =>?  K L , B>9  M N, C C (4) where 45 and 45 are the coordinates of bottom left corner of AABB, see Fig. 7. After performing previous step, we determined all possible pairs of nonempty P(QQ cells. Moreover, for each pair of nonempty cells, the shortest distance CO , i.e. the P(QQ distance of the nearest corners of cells, and the largest distance O , i.e. the distance of the farthest corners of cells, are determined, see Fig. 7. Fig. 7. Uniform grid of AABB. Value shortest distance of two cells. P(QQ presents the largest distance of two cells and C P(QQ presents the 2.5 Find Maximal Distance of Two Points Now a maximum distance of two points in the given dataset can be found by P(QQ following steps. We determine the maximum value C4R from the shortest distances P(QQ CO which were calculated for all pairs of nonempty cells. When this value is known, we can eliminate all pairs of nonempty cells for which the largest distance OP(QQ is P(QQ smaller than C4R . For remaining pairs of nonempty cells, we perform the following. For each pair of nonempty cells, the maximum distance O between points in these cells is determined, i.e. we calculate all distances from points in one cell to points in second cell and determine their maximum. Finally, we find the maximum value of these maximum distances O . 3 Experimental Results The proposed algorithm has been implemented in C# using .Net Framework 4.5 and tested on datasets using a PC with the following configuration: • CPU: Intel® Core™ i7-2600 (4 × 3.40 GHz) • memory: 16 GB RAM • operating system Microsoft Windows 7 64bits 3.1 Distribution of Points The proposed algorithm for finding the maximum distance of two points has been tested using different datasets. These datasets have different types of distributions of points. For our experiments, we used well-known distributions such as randomly distributed uniform points in an ellipse, uniform points in a rectangle or points with a Gaussian distribution. Other distributions used were Halton points and Gauss ring points. Both of these distributions are described in the following text. Halton Points. Construction of a Halton sequence is based on a deterministic method. This sequence generates well-spaced “draws” points from the interval 1S, T]. The sequence uses a prime number as its base and is constructed based on finer and finer prime-based divisions of sub-intervals of the unit interval. The Halton sequence [3] can be described by the following recurrence formula: fghi [k VW9X>YZ[  ∑lm j 7 ]^_` [ aM ^N mod Ze, ] (5) where Z is the prime number and is the index of the calculated element. For the 2 space, subsequent prime numbers are used as a base. In our test, we used !2,3# for the Halton sequence and we got a following sequence of points in a rectangle: 1 1 1 2 3 1 1 4 5 7 VW9X>Y2,3,5  op W, qr , p W, qr , p W, qr , p W, qr , p W, qr , 2 3 4 3 4 9 8 9 8 9 3 2 7 5 1 8 9 1 p W, qr , p W, qr , p W, qr , p W, qr , … x 8 9 8 9 16 9 16 27 (6) where W is a width of the rectangle and q is a height of the rectangle. Visualization of the dataset with 103 points of the Halton sequence from (6) can be seen in Fig. 8. We can see that the Halton sequence in 2 space covers this space more evenly than randomly distributed uniform points in the same rectangle. Fig. 8. 2 Halton points generated by VW9X>Y2,3 (left) and 2 uniform distribution (right). Number of points is 10y in both cases. random points in a rectangle with Gauss Ring Points. It is a special distribution of points in z{. Each point is determined as follows: |  }W ∙ ~ ∙ cos.=WYC0,2&/ , q ∙ ~ ∙ sin.=WYC0,2&/ ‚ ~  0.5 A 0.5 ∙ ƒ„Y ∙ =WYC (7) R†‡‡ where W is a length of semi-major axis, q is a length of semi-minor axis, ƒ„Y is a randomly generated number from set !1,1#, =WYC R†‡‡ is a randomly generated number with Gauss distribution from interval 10, ∞ and =WYC0,2& is a random number with uniform distribution from 0 to 2&. Visualization of the dataset with 10y Gauss ring points can be seen in Fig. 9. We can see that this dataset consists of a large set of points, which are close to the ellipse, and a small set of points, which are far from this ellipse. Fig. 9. 2 Gauss ring points. Number of points is 10y . 3.2 Optimal Size of Grid In the proposed approach, the remaining points are divided into uniform grid < after their elimination by polar division. The size of the grid has significantly influence on the number of pairs of points for which their mutual distance is determined. Simultaneously the time complexity is increasing with growing size of the grid. Therefore, we need know an estimation of the optimal size of the grid, which should be dependent on the distribution of points and on the number of points. Therefore, we have to measure it for each type of input points separately. We measured the time performance of our proposed algorithm for different distributions of points, different numbers of points and different sizes of grid. Measurement for 10‰ points is presented in Fig. 10. For all tested distributions of input points, we can see that the time performance decreases with the increasing size of grid until the optimal size of the grid is achieved. After that time, the complexity increases with the increasing number of divisions. Moreover, for all tested distributions of input points, except uniform points in the ellipse, it can be seen that the time complexity is practically independent on size of the grid. This is due to the fact that size of set of suspicious points is very small and the number of nonempty cells is small too, see Fig. 6 b)- Fig. 6 c). Thus the time complexity of division into uniform grid and consequent calculation is almost insignificant. 21 time [s] time [s] 17 13 9 5 64 128 256 512 Grid size 1 024 1.230 1.225 1.220 1.215 1.210 1.205 1.200 64 128 a) 1.175 1.170 time [s] time [s] 256 512 256 512 b) 1.180 1.165 1.160 1.155 64 Grid size 128 256 512 Grid size 1.150 1.125 1.100 1.075 1.050 1.025 1.000 64 128 c) Grid size d) 0.962 time [s] 0.960 0.958 0.956 0.954 64 128 Grid size 256 512 e) Fig. 10. The time performance of algorithm for finding maximum distance of two points for different points distributions and different size of grid. The size of grid denotes the number of cells in one axis. The number of input points is 10‰ . Distribution of points are: a) uniform points in ellipse, b) uniform points in rectangle, c) Halton points, d) Gauss points, e) Gauss ring points. 512 256 256 128 Grid size Grid size Fig. 11 presents the optimal size of grid for different distributions of points and different numbers of points. It can be seen that the optimal size of grid increases with the increasing number of points. Moreover, we can see that for uniform distribution of points in the ellipse is needed larger size of the grid than for other tested distributions. This is due to the fact that for this distribution of points is the number of suspicious points substantially larger. 128 64 64 32 32 16 1E+05 1E+06 1E+07 number of points 1E+08 1E+05 1E+06 1E+07 number of points b) 256 256 128 128 Grid size Grid size a) 1E+08 64 32 64 32 16 16 1E+05 1E+06 1E+07 number of points 1E+08 1E+05 1E+06 1E+07 number of points c) 1E+08 d) Grid size 256 128 64 32 16 1E+05 1E+06 1E+07 number of points 1E+08 e) Fig. 11. Optimal number of grid size for algorithm for finding maximum distance of two points for different points distributions and different number of points. The size of grid denotes the number of cells in one axis. Distribution of points are: a) uniform points in ellipse, b) uniform points in rectangle, c) Halton points, d) Gauss points, e) Gauss ring points. Evaluating experimental results for different distributions of points and different numbers of input points, i.e. 10Š , √10 ∙ 10Š , 10‰ , √10 ∙ 10‰ and 108 , including results from Fig. 10 and Fig. 11, we came to the following conclusion. The optimal size of the grid is dependent on the number of input points, more precisely the size of the grid is dependent on number of suspicious point. Size of the grid has to increase with the increasing number of points. 3.3 Time Performance In some applications, the time performance is one of an important criterion. Therefore, running times were measured for different number of input points with different distributions of points. Measurements were performed many times and average running times, calculated from the measured results, are in Table 1. Moreover, we can see these running times in Fig. 12. Table 1. The time performance of convex hull for different number of input points and different distributions of points. Time [ms] Number of points Uniform ○ Uniform □ Halton Gauss GaussRing 1E+5 32.9 11.5 11.0 9.0 8.8 √10E+5 137.6 37.4 36.3 30.6 29.8 1E+6 466.2 119.1 113.5 93.3 93.4 √10E+6 1 745.5 367.8 355.8 315.0 296.0 1E+7 5 631.3 1 203.9 1 158.0 1 009.2 954.9 √10E+7 17 976.5 3 596.6 3 579.0 3 221.5 3 057.9 56 769.0 11 154.0 11 505.0 12 004.0 9 680.0 1E+8 It can be seen that the best time performance is for the Gauss ring points. The time performance for Halton points and for uniform distribution of points inside a rectangle is similar. Overall, we can say that for all tested distributions of input points, except uniform points in an ellipse, is the running time practically similar. This is expected behavior because most of the points are eliminated during the phase of polar division. Therefore, there are only a few points and nonempty cells of uniform grid for finding the maximum distance. The worst time performance was obtained for uniform points in an ellipse. 1E+5 Time [ms] 1E+4 1E+3 Uniform ○ Uniform □ Halton 1E+2 Gauss GaussRing 1E+1 1E+5 1E+6 Points count 1E+7 1E+8 Fig. 12. The time performance of algorithm for finding maximum distance two points for different number of input points and different distribution of this points. 3.4 Comparison with Other Algorithms We compared our proposed algorithm for finding exact maximum distance of two points in the given dataset with the BF algorithm, whose time complexity is   , and with the algorithm proposed in [8], which has expected time complexity , where  is the number of input points. It should be noted that the results for the algorithm in [8] are based on the use of the ratio of the BF algorithm to this algorithm. Running times were measured for different numbers of input points with uniformly distributed points. The resultant speed-up of our proposed algorithm with respect to the BF algorithm and algorithm in [8] can be seen in Fig. 13 and Fig. 14. 1.E+07 ν 1.E+06 1.E+05 Proposed alg. vs. BF 1.E+04 1.E+03 1E+5 1E+6 Points count 1E+7 Fig. 13. The speed-up of our proposed algorithm for uniformly distributed points with respect to BF algorithm for the same datasets. 1.54 1.52 ν 1.50 1.48 1.46 1.44 1.42 Proposed alg. vs. Alg. [2] 1.40 Points count 1E+5 1E+6 1E+7 Fig. 14. The speed-up of our proposed algorithm for uniformly distributed points with respect to algorithm in [8] for the same datasets. It can be seen that the speed-up of the proposed algorithm is significant with respect to BF algorithm and grows with the number of points processed. Moreover, our algorithm is in average 1.5 times faster than the algorithm in [8]. 4 Conclusion A new fast algorithm for finding an exact maximum distance of two points in Œ  with ŽŽ‘’Ž“  complexity has been presented. This algorithm uses a space division technique. It is robust and can process a large number of points. The advantages of our proposed algorithm are simple implementation and robustness. Moreover, our algorithm can be easily extended to E3 by a simple modification. For future work, the algorithm for finding exact maximum distance of two points, can be easily parallelized, as most of the steps are independent. The second thing is to extend this algorithm to E3. Acknowledgments. The authors would like to thank their colleagues at the University of West Bohemia, Plzen, for their discussions and suggestions, and anonymous reviewers for their valuable comments and hints provided. The research was supported by MSMT CR projects LH12181 and SGS 2013-029. References 1. Clarkson, K.L., Shor, P.W.: Applications of random sampling in computational geometry, II. Discrete & Computational Geometry, 1989, Vol.4, No.1, pp.387-421. 2. Dobkin, D. P., Snyder, L.: On a general method for maximizing and minimizing among certain geometric problems. Proceedings of the 20th Annual Symposium on the Foundations of Computer Science, 1979, pp. 9-17. 3. Fasshauer, G.E.: Meshfree Approximation Methods with MATLAB. World Scientific Publishing Co., Inc., 2007. 4. Hilyard, J., Teilhet, S.: C# cookbook. O'Reilly Media, Inc., 2006. 5. Liu, G., Chen, Ch.: A new algorithm for computing the convex hull of a planar point set, Journal of Zhejiang University SCIENCE A, 2007, Vol.8, No.8, pp.1210-1217. 6. Mehta, D. P., Sahni, S: Handbook of data structures and applications. CRC Press, 2004. 7. O'Rourke, J.: Computational geometry in C. Cambridge university press, 1998. 8. Skala, V.: Fast Oexpected (N) algorithm for finding exact maximum distance in E2 instead of O (N2) or O (N lgN). AIP Conference Proceedings, 2013, No.1558, pp.2496-2499. 9. Snyder, W.E., Tang, D.A.: Finding the extrema of a region. IEEE Trans. on Pattern Analysis and Machine Intelligence, 1980, Vol.2, No.3, pp.266-269. 10. Vince, J.: Geometric algebra for computer graphics. Springer Science & Business Media, 2008.
8cs.DS
Directed multicut is W [1]-hard, even for four terminal pairs∗ Marcin Pilipczuk† Magnus Wahlström‡ arXiv:1507.02178v3 [cs.DS] 12 Feb 2018 Abstract We prove that Multicut in directed graphs, parameterized by the size of the cutset, is W [1]-hard and hence unlikely to be fixed-parameter tractable even if restricted to instances with only four terminal pairs. This negative result almost completely resolves one of the central open problems in the area of parameterized complexity of graph separation problems, posted originally by Marx and Razgon [SIAM J. Comput. 43(2):355–388 (2014)], leaving only the case of three terminal pairs open. The case of two terminal pairs was shown to be FPT by Chitnis et al. [SIAM J. Comput. 42(4):1674–1696 (2013)]. Our gadget methodology also allows us to prove W [1]-hardness of the Steiner Orientation problem parameterized by the number of terminal pairs, resolving an open problem of Cygan, Kortsarz, and Nutov [SIAM J. Discrete Math. 27(3):1503-1513 (2013)]. 1 Introduction The study of cuts and flows is one of the central areas of combinatorial optimization, with decades of intensive research on polynomial-time exact and approximate algorithms. Since the seminal work of Marx [23], it has also become one of the most dynamic research directions in parameterized complexity, under the name of graph separation problems. The key contribution of Marx’ paper [23] lies in the notion of an important separator, which is a kind of greedy cut that is useful in some graph cut problems. Marx showed that the number of important separators of size up to k in a graph is bounded as a function of k alone, and gave applications to a number of graph separation problems, in particular an FPT algorithm for Multiway cut [23].1 (An improved bound was given by Chen et al. [4], with a simple but influential proof method.) These techniques also led to FPT algorithms for Directed Feedback Vertex Set [5] and eventually for Almost 2-SAT [30], which is a powerful generic problem encapsulating a number of other well-studied problems, such as Odd Cycle Transversal and Vertex Cover parameterized by the excess above a maximum matching. Further study of the graph separation problems in the realm of parameterized complexity revealed a plethora of other algorithmic techniques: the technique of shadow removal [28] lead to an FPT algorithm for the directed version of Multiway Cut [8], the framework of randomized contractions [6] lead to an FPT algorithm for Minimum Bisection [11], whereas the idea to guide a branching algorithm by the solution to the LP relaxation [12] lead not only to the fastest known algorithm for Odd Cycle Transversal [22], but also can be cast into a very general CSP framework [31]. In tandem with these developments, we have gained a growing understanding of the structure of boundedsize cuts in graphs. Starting again with the proof that bounded size important separators are bounded in number, we wish to highlight two further main contributions in this vein. First, Marx et al. [27] showed that all inclusion-minimal st-cuts of size at most k in a graph G (for fixed vertices s, t) are contained in (essentially) ∗ An extended abstract of this work has been presented at SODA 2016 [29]. of Warsaw, Poland, [email protected]. Research done while the author was at University of Warwick, partially supported by the Centre for Discrete Mathematics and its Applications (DIMAP) at the University of Warwick and by Warwick-QMUL Alliance in Advances in Discrete Mathematics and its Applications. ‡ Royal Holloway University of London, UK, [email protected] 1 In the Multiway Cut problem, the input consists of a graph G, a set T ⊆ V (G) of terminals, and an integer p; the goal is to delete at most p edges (in the edge-deletion variant) or nonterminal vertices (in the node-deletion variant) so that every terminal lies in a different connected component of the resulting graph, that is, to separate all pairs of terminals. † University a subgraph of G of treewidth at most f (k). This statement is attractive in its simplicity, although algorithmic applications of it tend to have a bad running time dependency on k (since f (k) is already exponential, and a treewidth dynamic programming algorithm would normally have running time exponential in f (k)). Second, the FPT algorithm for Minimum Bisection [11] involves a technically intricate but very powerful decomposition of the input graph in a tree-like manner into “nearly unbreakable” parts (see the paper for details). However, these two results apply only to undirected graphs, and for directed graphs we have a much weaker grasp of the structure. A central milestone in the above developments was the discovery in 2010 of FPT algorithms for Multicut, a robust generalization of Multiway Cut, parameterized by the size of the cutset only [3, 28]. In this problem we are given a graph G, a family T of k terminal pairs, and an integer p; the goal is to delete at most p nonterminal vertices from the graph such that all terminal pairs are separated.2 Marx and Razgon [28] also proved that a similar result is unlikely in directed graphs, showing that Directed Multicut is W [1]-hard parameterized by the cutset only. In contrast, Directed Multiway Cut is FPT by the same parameter [8]. Marx and Razgon [28] asked about the complexity of Directed Multicut when you restrict also the number of terminal pairs, either assuming it is constant or by adding it to the parameter. Since then, this has become one of the most important open problems in the study of graph separation problems in parameterized complexity. It was positively resolved for DAGs (i.e., the problem is FPT on directed acyclic graphs parameterized by both the cutset and the number of terminals) [19], but otherwise little progress has been made. In particular, it has been repeated in the survey of Marx [26] on future directions of parameterized complexity, where also the study of cut problems in directed graphs has been identified as an important research direction. Similarly, the question of the structure of bounded-size directed cuts (e.g., the existence of a directed version of [27]) has been floating around the community. Our results. We almost completely resolve the question of Marx and Razgon [28]: Theorem 1.1. Directed Multicut is W [1]-hard when parameterized by p, the size of the cutset, even if restricted to instances with only four terminal pairs. Furthermore, assuming the Exponential Time Hypothesis (ETH), there is no algorithm solving n-vertex instances of Directed Multicut with four terminal pairs in time f (p)no(p/ log p) for any computable function f . Since Directed Multicut is polynomial-time solvable for one terminal pair, and reduces to Directed Multiway Cut for two terminal pairs [8], only the case of three terminal pairs remains open. The Exponential Time Hypothesis (ETH) [18], now a standard lower bound assumption in parameterized complexity and moderately-exponential algorithms (cf. [21]), essentially asserts that there exists no algorithm verifying satisfiability of 3-CNF SAT formulae in time subexponential in the number of variables. The ETH lower bound of Theorem 1.1 implies that a brute-force solution running in time nO(p) is close to optimal. Furthermore, we observe that our gadgets and reduction outline, after minor modifications, gives also a lower bound for the Steiner Orientation problem, answering an open question of [9]. In the Steiner Orientation problem, given a mixed graph G with k terminal pairs T , one asks for an orientation of all undirected edges of G, such that for every terminal pair (s, t) ∈ T there is a path from s to t in the oriented graph. Theorem 1.2. Steiner Orientation is W [1]-hard when parameterized by k, the number of terminal pairs. Furthermore, assuming ETH, there is no algorithm solving n-vertex instances of Steiner Orientation in time f (k)no(k/ log k) for any computable function f . Cygan, Kortsarz, and Nutov [9] showed an nO(k) -time algorithm; Theorem 1.2 implies that there is little hope for a fixed-parameter algorithm, and that the running time of the algorithm of Cygan, Kortsarz, and Nutov is close to optimal. We also show a structural result for directed st-cuts of bounded size. A graph G is k-cut-minimal (for arc-cuts) if it contains a source vertex s and a sink vertex t, and every other vertex is incident to at least one arc that participates in an inclusion-minimal st-cut of size at most k. (For example, one can reduce an 2 In this paper we use consistently the node-deletion variant of Multicut; note that it is equivalent to the edge-deletion setting in the directed case, and strictly more general in the undirected case. s t s t Figure 1: An example of 5-cut-minimal graph with unbounded treewidth of the underlying undirected graph. The right panel shows a minimal cut of size five; observe that every edge of the graph participates in a similar cut, except for a few edges in the four corners of the graph, which can be easily covered by other small cuts. arbitrary graph to a k-cut-minimal one by repeatedly bypassing every vertex that is not incident to any such arcs.) We have the following. 2 Theorem 1.3. Every k-cut-minimal graph has directed treewidth at most f (k), where f (k) = 2O(k ) . We note that this result is likely not as tight as it could be, both in terms of the choice of width measure and the function f (k). However, as discussed below, our results also show that Directed Multicut is essentially hard already for four terminal pairs and directed pathwidth two, so for the purpose of the Directed Multicut problem, a sharpening of Theorem 1.3 is not likely to help (even though it may be useful for other problems). Discussion. In the presence of the lower bound of Theorem 1.1, whose proof in this manuscript takes less than five pages including a figure and is not very technically complex, the natural question is why the lower bound was so elusive in the past five years, despite significant effort. The idea to represent an n-wise choice in the reduction (e.g., the choice of a vertex of a clique or an image of a vertex of the pattern graph in the case of the Subgraph Isomorphism problem) as a choice of a single-vertex cut on a n-vertex bidirectional path connecting a terminal pair, seems quite natural, especially in the light of the FPT algorithm for Directed Multicut in DAGs [19] and a deeper study of where this algorithm uses the assumption of acyclicity. However, a gadget to check an arbitrary binary relation between two such choices was elusive; we stumbled upon a “correct” construction by investigating the structural question that led to Theorem 1.3 (the idea being that a sufficiently powerful structural result could have been useful in designing an efficient algorithm). A few words about directed width measures may be in order (for more, see, e.g., [1, 20]). Two approaches are possible. On the one hand, one can simply consider the underlying undirected graph and ignore the arc orientations; e.g., if the underlying undirected graph of a directed graph G has bounded treewidth, then many problems are solvable on G via standard dynamic programming. On the other hand, several width notions specific to directed graphs have been proposed (to name a few: directed pathwidth; directed treewidth; DAG-width; Kelly-width). Of these, directed treewidth is the most general and directed pathwidth the most restrictive. It has been noted that these directed width notions are rather more difficult to use in algorithms than the undirected variants (e.g., [16, 15]), but on the other hand they are more permissive (e.g., they all include DAGs as a constant-width base case). Our gadgets are based around a counterexample against the first of these approaches. Figure 1 shows a graph which is 5-cut-minimal (in fact, where every arc participates in a minimal st-cut of bounded size), but whose underlying undirected graph is a grid (and thus has unbounded treewidth). Our hardness reduction uses this graph to route one commodity horizontally and one vertically, allowing us to control which pairs of flows can be killed at unit cost. Also note that the graph in Figure 1 is acyclic; in fact, the reduction of Theorem 1.1 outputs an instance of integer-weighted Directed Multicut of directed pathwidth 2. Standard reductions (replacing a vertex of weight w by w unit-weight copies) creates an instance of unweighted Directed Multicut with directed pathwidth bounded polynomially in the parameter. Hence Directed Multicut remains W [1]-hard, even for four terminal pairs, if we parameterize by both the size of the cutset and the directed pathwidth of the input graph. By the discussion above, this leaves little room for generalizing the FPT-algorithm for DAGs [19] to broader classes. Organization and notation. We show the reduction for Theorem 1.1 in Section 2 and for Theorem 1.2 in Section 3. We prove Theorem 1.3 in Section 4. We use standard graph notation, see e.g. [2]. Both our hardness reductions start from the W [1]-hard Partitioned Subgraph Isomorphism problem, parameterized by the number of edges of the pattern graph. An input to Partitioned Subgraph Isomorphism consists of two graphs G and H U with |E(H)| = k, where V (G) is partitioned into |V (H)| color classes, one for each vertex of H: V (G) = i∈V (H) Vi ; the goal is to check if there exists a homomorphism φ : V (H) → V (G) such that φ(i) ∈ Vi for every i ∈ V (H). The W [1]and ETH-hardness of Partitioned Subgraph Isomorphism has been shown by Marx: Theorem 1.4 (Cor. 6.3 of [24]). Partitioned Subgraph Isomorphism is W [1]-hard when parameterized by k = |E(H)|. Furthermore, assuming ETH, there is no algorithm solving n-vertex instances of Partitioned Subgraph Isomorphism in time f (k)no(k/ log k) for any computable function f . Both our reductions work in polynomial time and, given a Partitioned Subgraph Isomorphism instance (G, H), output an instance with the corresponding parameter bounded linearly in k = |E(H)| and size bounded polynomially in the input size. In both S reductions, given an input instance (G, H) of Partitioned Subgraph Isomorphism, we denote V (G) = i∈V (H) Vi , k = |E(H)|, and ` = |V (H)|. Furthermore, without loss of generality we assume that H does not have any isolated vertices and thus ` ≤ 2k. Indeed, if some color class Vi of V (G) is empty, we can output a trivial no-instance, and otherwise we can delete all isolated vertices from H and their corresponding color classes in G without changing the answer to the problem. We also fix some total order < on the set V (H) and, by some potential padding, assume that |Vi | = n and Vi = {vai : 1 ≤ a ≤ n} for every i ∈ V (H). For discussion on the output of the reduction of Theorem 1.1, we need to recall the definition of directed pathwidth; we follow here Kreutzer and Ordyniak [20]. Definition 1.1. Let G be a directed graph. A directed path decomposition is a pair (P, β) where P = v1 , v2 , . . . , vs is a directed path and β : V (P ) → 2V (G) is a mapping satisfying: 1. For every v ∈ V (G) the set β −1 (v) is connected in P and nonempty. 2. For every arc (u, v) ∈ E(G) there are indices 1 ≤ i ≤ j ≤ s such that u ∈ β(vi ) and v ∈ β(vj ). The width of (P, β) is max1≤i≤s |β(vi )|, and the directed pathwidth of G is the minimum width among all its directed path decompositions. For every 1 ≤ i ≤ s, the set β(vi ) is called a bag at node vi . Note that directed pathwidth of a nonempty directed acyclic graph G equals 1: we can take vertices of G one-by-one in any topological ordering of G. 2 Hardness for Directed Multicut We reduce an input Partitioned Subgraph Isomorphism instance (G, H) to a node-weighted variant of Directed Multicut, where every non-terminal vertex has a weight being a positive integer, and the goal is to find a cutset of total weight not exceeding the budget p. We fix some integer constant M ; in fact it suffices to set M = 2, but it helps to think of it as a sufficiently large integer constant. We use three levels of weight: there will be light vertices, of weight 1, heavy vertices, of various integer weights being multiples of M , usually depending on the degree of the corresponding vertex of H, and undeletable vertices, of weight p+1. Observe that it is easy to reduce the weighted variant to the original one by replacing every vertex of weight w with w unit-weight vertices. Thus, it suffices to show the reduction to the weighted variant, with only four terminal pairs. Construction. Let us now describe the construction of the (weighted) Directed Multicut instance (G0 , T , p). We start by setting budget p = (6M + 1)k. We also introduce eight terminals, arranged in four terminal pairs: (sx0→n , tx0→n ), (sy0→n , ty0→n ), < (s< n→0 , tn→0 ), > (s> n→0 , tn→0 ). For every i ∈ V (H), we introduce a bidirected path on 2n + 1 vertices z0i , ẑ1i , z1i , ẑ2i , z2i , . . . , ẑni , zni , called henceforth the z-path for vertex i, and denoted by Z i . Similarly, for every ordered pair (i, j) where ij ∈ E(H), we introduce two bidirected paths on 2n + 1 vertices i,j i,j i,j i,j i,j i,j xi,j 0 , x̂1 , x1 , x̂2 , x2 , . . . , x̂n , xn ; y0i,j , ŷ1i,j , y1i,j , ŷ2i,j , y2i,j , . . . , ŷni,j , yni,j . We call these paths the x-path and the y-path for the pair (i, j), and denote them by X i,j and Y i,j . All vertices i,j i i,j i,j i zai , xi,j a , ya are undeletable, while all vertices ẑa , x̂a , ŷa are heavy: vertex ẑa has weight M · degH (i) and i,j i,j the vertices x̂a and ŷa have weight M each. Note that so far we have created 4k + ` paths, each having 2n + 1 vertices. Furthermore, if we are to delete one heavy vertex from each of these paths, the total cost would be   X M · 4k + degH (i) = 6kM. i∈V (H) i i i,j For every pair (i, j) with ij ∈ E(H), and every 0 ≤ a ≤ n, we add arcs (xi,j a , za ) and (za , ya ). Furthermore, we attach terminals to the paths as follows. i,j y • for every pair (i, j) with ij ∈ E(H), we add arcs (sx0→n , xi,j 0 ) and (yn , t0→n ); • for every i ∈ V (H) we add arcs (sy0→n , z0i ) and (zni , tx0→n ); i,j < i,j • for every pair (i, j) with ij ∈ E(H) and i < j we add arcs (s< n→0 , xn ) and (y0 , tn→0 ); i,j > i,j • for every pair (i, j) with ij ∈ E(H) and i > j we add arcs (s> n→0 , xn ) and (y0 , tn→0 ). We refer to Figure 2 for an illustration. Intuitively, the so-far constructed bidirectional paths and terminals require to delete at least one heavy vertex per bidirectional path; the connections between paths ensure that i,j i for every i ∈ V (H), we need to chose one index 1 ≤ φ(i) ≤ n and delete vertices ẑφ(i) , x̂i,j φ(i) , and ŷφ(i) , that is, cut all paths corresponding to the vertex i at the same place. The choice of the index φ(i) corresponds to the choice of the image of i in the sought homomorphism. Let us now introduce gadgets that check the edge relations between the chosen vertices. For every pair (i, j) with ij ∈ E(H), i < j we introduce an acyclic n × n grid with vertices pi,j a,b for 1 ≤ a, b ≤ n and arcs i,j i,j i,j i,j (pa,b , pa+1,b ) for every 1 ≤ a < n and 1 ≤ b ≤ n, as well as (pa,b , pa,b+1 ) for every 1 ≤ a ≤ n and 1 ≤ b < n. We call this grid p-grid for the pair (i, j), and denote it by P i,j . We set the vertex pi,j a,b to be a light vertex i j if va vb ∈ E(G), and undeletable otherwise. Finally, for every 1 ≤ a ≤ n we introduce arcs: i,j (xi,j a , pa,1 ), i,j (pi,j a,n , ya−1 ), i,j (xj,i a , p1,a ), j,i (pi,j n,a , ya−1 ). Intuitively, after deleting the aforementioned heavy vertices on the x-, y-, and z-paths, for fixed ij ∈ E(H), i,j < < i < j, there is only one remaining path from xi,j n (an out-neighbor of sn→0 ) to y0 (an in-neighbor of tn→0 ), passing through the φ(i)-th row of the p-grid for the pair (i, j), and there is only one remaining path from j,i > > xj,i n (an out-neighbor of sn→0 ) to y0 (an in-neighbor of tn→0 ), passing through the φ(j)-th column of the p-grid for the pair (i, j). We can kill both these paths with a single vertex pi,j φ(i),φ(j) , but only the existence j i of the edge vφ(i) vφ(j) ensures that this vertex is light, not undeletable. This concludes the construction of the instance (G0 , T , p). We now formally show that the constructed instance is equivalent to the input Partitioned Subgraph Isomorphism instance (G, H). From a homomorphism to a cutset. of H into G. Define i Let φ : V (H) → [n] be such that i 7→ vφ(i) ∈ Vi is a homomorphism i,j X = {x̂i,j φ(i) , ŷφ(i) : (i, j) ∈ V (H) × V (H) s.t. ij ∈ E(H)}∪ i ∪ {ẑφ(i) : i ∈ V (H)} ∪ {pi,j φ(i),φ(j) : (i, j) ∈ V (H) × V (H) s.t. ij ∈ E(H), i < j}. The total weight of the vertices in X equals: X M · degH (i) + k = (6M + 1)k = p. 2k · 2 · M + i∈V (H) Note that the fact that pi,j φ(i),φ(j) is light for every ij ∈ E(H), i < j follows from the assumption that the i vertices i 7→ vφ(i) is a homomorphism. Consequently, X is of weight exactly p. We now show that it is a multicut in (G0 , T ). We start with a simple observation about the structure of the graph G0 . While the x-, y-, and z-paths are bidirected, they — together with the p-grids — are arranged in a DAG-like fashion. That is, there are directed arcs from X i,j to Z i , from Z i to Y i,j , from X i,j and X j,i to P i,j , and from P i,j to Y i,j and Y j,i , but all cycles in G0 are contained in one x-, y-, or z-path. Consider first the terminal pair (sx0→n , tx0→n ). The out-neighbors of sx0→n are the endpoints xi,j 0 for every pair (i, j) with ij ∈ E(H); the only in-neighbors of tx0→n are the endpoints zni for every i ∈ V (H). Thus, by the previous observation, the only paths from sx0→n to tx0→n in the graph G0 start by going to some vertex i,j i,j i i i xi,j up to some vertex xi,j a , use the arc (xa , za ) to fall to Z , and then traverse Z to the 0 , traverse X i x x endpoint zn . (In particular, there are no paths from s0→n to t0→n that contain a vertex of some grid P i,j .) However, all such paths for a ≥ φ(i) are cut by the vertex x̂i,j φ(i) ∈ X, while all such paths for a < φ(i) are i cut by the vertex ẑφ(i) ∈ X. Consequently, the terminal pair (sx0→n , tx0→n ) is separated in H \ X. A similar argument holds for the pair (sy0→n , ty0→n ). By the same reasoning, the only paths between sy0→n and ty0→n in the graph H are paths that start by going to some vertex z0i , traverse Z i up to some vertex zai , use the arc (zai , yai,j ) for some ij ∈ E(H) to fall to Y i,j , and then continue along this y-path to the vertex i yni,j . However, all such paths for a ≥ φ(i) are cut by the vertex ẑφ(i) ∈ X, while all such paths for a < φ(i) i,j are cut by the vertex ŷφ(i) ∈ X. < < Let us now focus on the terminal pair (s< n→0 , tn→0 ). Observe that there are two types of paths from sn→0 < i,j to tn→0 in the graph H. The first type consists of paths that starts by going to some vertex xn where i < j, i,j i i i traverse X i,j up to some vertex xi,j a , use the arc (xa , za ) to fall to Z , then traverse Z up to some vertex 0 0 0 zbi , use the arc (zbi , ybi,j ) for some j 0 > i to fall to Y i,j , and finally traverse this y-path to the endpoint y0i,j . i,j 0 i However, similarly as in the previous cases, the vertices x̂i,j φ(i) , ẑφ(i) , ŷφ(i) ∈ X cut all such paths. The second type of paths use the p-grids in the following manner: the path starts by going to some vertex i,j i,j i,j i,j xi,j up to some vertex xi,j , traverse this n where i < j, traverse X a , use the arc (xa , pa,1 ) to fall to P i,j i,j i,j i,j p-grid up to a vertex pb,n where b ≥ a, use the arc (pb,n , yb−1 ) to fall to Y , and traverse this path to the endpoint y0i,j . These paths are cut by X as follows: the paths where a < φ(i) are cut by x̂i,j φ(i) ∈ X, the paths i,j where b > φ(i) are cut by ŷφ(i) , while the paths where a = b = φ(i) are cut by the vertex pi,j φ(i),φ(j) ∈ X; note i,j < that the φ(i)-th row of the grid is the only path from pi,j φ(i),1 to pφ(i),n . Please observe that the terminal tn→0 cannot be reached from P i,j by going to the other y-path reachable from this p-grid, namely Y j,i , as Y j,i has only outgoing arcs to the terminal t> n→0 since j > i. > i,j i i,j 0 A similar argument holds for the pair (s> , n→0 , tn→0 ). The paths going through X , i > j, Z , and Y 0 i,j i i,j j,i i,j i > j 0 , are cut by vertices x̂i,j , ẑ , ŷ ∈ X. The paths going through X , i > j, P , and Y , are cut φ(i) φ(i) φ(i) i,j j,i by the vertices x̂i,j φ(i) , ŷφ(i) , pφ(j),φ(i) . Again, it is essential that the other y-path reachable from the p-grid for < the pair (j, i), namely Y j,i , does not have outgoing arcs to the terminal t> n→0 , but only to the terminal tn→0 . 0 We infer that X is a solution to the Directed Multicut instance (G , T , p). From a multicut to a homomorphism. Let X be a solution to the Directed Multicut instance (G0 , T , p). Our goal is to find a homomorphism of H into G. First, let us focus on heavy vertices in X. Observe that for every pair (i, j), ij ∈ E(H) the following three paths needs to be cut by X: • a path from sx0→n to tx0→n that traverses the entire path X i,j up to the vertex xi,j n , and uses the arc i x (xi,j , z ) to reach t , n n 0→n i i • a path from sx0→n to tx0→n that starts with using the arc (xi,j 0 , z0 ), and then traverses Z up to the i vertex zn , and • a path from sy0→n to ty0→n that starts with using the arc (z0i , y0i,j ), and then traverses Y i,j up to the vertex yni,j . We infer that X needs to contain at least one heavy vertex on every x-, y-, and z-path in H. Recall that the total weight of exactly one heavy vertex from each of these paths is 6kM = p − k. Thus, we have only k slack in the budget constraint. We say that a path X i,j , Y i,j , or Z i is normal if it contains exactly one vertex of X, and cheated otherwise. We say that a pair (i, j) for ij ∈ E(H) is normal if each of the paths X i,j , Y i,j , X j,i , Y j,i , Z i , and Z j is normal. A pair (i, j) is cheated if it is not normal. Note that (i, j) is normal if and only if (j, i) is normal. i For every i ∈ V (H) we fix one φ(i) ∈ [n] such that ẑφ(i) ∈ X. Fix now a normal pair (i, j), ij ∈ E(H). Assume i < j; a symmetrical argument holds for i > j but > < < i,j i i,j uses the terminal pair (s> n→0 , tn→0 ) instead of (sn→0 , tn→0 ). Let x̂a , ẑb , ŷc ∈ X. Observe that a ≤ b, as i,j x x i,j i otherwise the path from s0→n to t0→n that traverses X up to the vertex xi,j a−1 , uses the arc (xa−1 , za−1 ), i i and traverses Z up to the endpoint zn is not cut by X, a contradiction. A similar argument for the terminal < pair (sy0→n , ty0→n ) implies that b ≤ c. However, if a < b, then the path from s< n→0 to tn→0 that traverses i,j i,j i,j i i i X up to the vertex xa , uses the arc (xa , za ), traverses Z up to the endpoint z0 , and finally uses the arc (z0i , y0i,j ), is not cut by X, a contradiction. A similar argument implies gives a contradiction if b < c. i,j i We infer that for every normal pair (i, j) we have ẑφ(i) ∈ X and x̂i,j φ(i) , ŷφ(i) ∈ X. Fix now a normal pair (i, j) with i < j. Observe that the following paths are not cut by the heavy vertices in X: i,j i,j < i,j • a path from s< up to the vertex xi,j n→0 to tn→0 that traverses X φ(i) , uses the arc (xφ(i) , pφ(i),1 ), traverses i,j i,j i,j the φ(i)-th row of P i,j up to the vertex pi,j up to φ(i),n , uses the arc (pφ(i),n , yφ(i)−1 ), and traverses Y the endpoint y0i,j ; j,i i,j > j,i • a path from s> up to the vertex xj,i n→0 to tn→0 that traverses X φ(j) , uses the arc (xφ(j) , p1,φ(j) ), traverses i,j j,i j,i the φ(j)-th column of P i,j up to the vertex pi,j n,φ(j) , uses the arc (pn,φ(j) , yφ(j)−1 ), and traverses Y up to the endpoint y0j,i . Consequently, X needs to contain at least one light vertex in the p-grid P i,j . Furthermore, if X contains exactly one light vertex in P i,j , then, as the only vertex in common of the two aforementioned paths for a i,j fixed choice of normal (i, j), i < j, is the vertex pi,j φ(i),φ(j) , we have that pφ(i),φ(j) ∈ X is a light vertex, and, j i by construction, vφ(i) vφ(j) ∈ E(G). It remains to show that every pair (i, j), ij ∈ E(H), is normal. Indeed, if this is the case, then, as p = 6kM + k, the total weight of exactly one heavy vertex on each path X i,j , Y i,j , and Z i is 6kM , and there are exactly k grids P i,j , every grid P i,j contains exactly one vertex of X, and the argumentation from the i previous section shows that i 7→ vφ(i) is a homomorphism, concluding the proof of Theorem 1.1. Recall that (i, j) is normal if and only if (j, i) is normal. Let c be the number of cheated pairs (i, j), i < j. If (i, j), i < j, is cheated, then there is a witness for it: one of the paths X i,j , Y i,j , X j,i , Y j,i , Z i , or Z j is cheated, that is, contains more than one vertex of X. However, note that a cheated path X i,j , Y i,j , X j,i , or Y j,i is a witness only that (i, j) and (j, i) is cheated. Let cXY be the number of cheated x- and y-paths. Furthermore, a cheated path Z i is a witness that (i, j) is cheated for every ij ∈ E(H): there are only degH (i) such pairs (i, j). We infer that X c ≤ cXY + degH (i). i∈V (H):Z i cheated On the other hand, a cost of a second heavy vertex in X on an x- or y-path is M , while the cost of a second heavy vertex on Z i is M · degH (i). Furthermore, recall that if (i, j), i < j, is normal, then P i,j contains at least one vertex of X. Thus, the total weight of X is at least X 6kM + M · cXY + M · degH (i) + k − c i∈V (H):z i cheated ≥ 6kM + M · c + k − c = p + (M − 1)c. Consequently, if M > 1 and the weight of X is at most p, we have c = 0. This finishes the proof of Theorem 1.1. The resulting digraph can easily be shown to have directed pathwidth 2. Clearly, it cannot have smaller directed pathwidth, as it contains two-vertex cycles. In the other direction, order the vertices of the resulting graphs as follows. 1. All source terminals. 2. The vertices xi,j a , sorted first by the pair (i, j) lexicographically, and then by the subscript a. 3. The vertices zai , sorted first by i, and then by the subscript a. 4. The vertices pi,j a,b , sorted first by the pair (i, j) lexicographically, and then by the pair (a, b) lexicographically. 5. The vertices yai,j , sorted first by the pair (i, j) lexicographically, and then by the subscript a. 6. All sink terminals. Observe now that we can construct a directed path decomposition of the resulting graph by taking bags consisting of every two consecutive vertices in this order. We infer that Directed Multicut is W [1]-hard already for integer-weighted instances, parameterized by total solution weight, for instances with 4 terminals and directed pathwidth 2. This is in sharp contrast to the result that it is FPT for DAGs [19]. 3 Hardness for Steiner Orientation Construction. Given an input Partitioned Subgraph Isomorphism instance (G, H), we construct an equivalent Steiner Orientation instance (G0 , T ) as follows. First, we introduce a number of undirected paths on n vertices: for every i ∈ V (H) we introduce a path C i on vertices ci1 , ci2 , . . . , cin and a path Di on vertices di1 , di2 , . . . , din , while for every ordered pair (i, j) where i,j i,j i,j ij ∈ E(H), we introduce a path X i,j on vertices xi,j on vertices y1i,j , y2i,j , . . . , yni,j . 1 , x2 , . . . , xn and a path Y We connect these paths as follows: for every i ∈ V (H) and 1 ≤ a ≤ n we add an arc (cia , dia ), while for every i i i,j pair (i, j) with ij ∈ E(H) and for every 1 ≤ a ≤ n we add arcs (xi,j a , da ) and (ca , ya ). Furthermore, for i i i i every i ∈ V (H) we add terminal pairs (c1 , dn ) and (cn , d1 ) and for every pair (i, j) where ij ∈ E(H), we add i,j i i,j i i i,j i terminal pairs (xi,j 1 , dn ), (xn , d1 ), (c1 , yn ), and (cn , y1 ). i For an index 1 ≤ a ≤ n, we say that the path C is oriented towards cia if for every 1 ≤ b < n, the edge i i cb cb+1 is oriented from cib to cib+1 if b < a and from cib+1 to cib if b ≥ a. Similarly, we say that the path Di is oriented away from dia if for every 1 ≤ b < n, the edge dib dib+1 is oriented from dib+1 to dib if b < a and from dib to dib+1 if b ≥ a, and similar notions are defined for the paths X i,j and Y i,j . Informally speaking, the introduced paths play the role of x−, y−, and z− paths from the reduction for Directed Multicut. In the currently constructed graph, the only way to satisfy both the terminal pair (ci1 , din ) and the terminal pair (cin , di1 ) is to chose a number 1 ≤ φ(i) ≤ n and direct the path C i towards ciφ(i) and the path Di away from diφ(i) . The choice of φ(i) corresponds to the image of i ∈ V (H) in the sought homomorphism. The additional terminal pairs ensure that the choice is copied to other paths: X i,j needs to i,j i,j be directed towards xi,j needs to be directed away from yφ(i) . In the remainder of the construction, φ(i) and Y we will not introduce any more edge nor arc incident to a vertex of any path C i or Di , and only arcs going out of the paths X i,j and arcs going towards the paths Y i,j . In this way we will not introduce any unwanted way of satisfying the terminal pairs introduced so far, guaranteeing the desired behavior. Let us now proceed to the construction of the p-grids. Similarly as in the case of Directed Multicut, for every pair (i, j) with ij ∈ E(H) and i < j we introduce an acyclic n × n grid (called again a p-grid ) with i,j i,j i,j i,j vertices pi,j a,b for 1 ≤ a, b ≤ n and arcs (pa,b , pa+1,b ) for every 1 ≤ a < n and 1 ≤ b ≤ n, as well as (pa,b , pa,b+1 ) for every 1 ≤ a ≤ n and 1 ≤ b < n. We connect the grid to the previously constructed vertices as follows: for every 1 ≤ a ≤ n we introduce arcs i,j (xi,j a , pa,1 ), i,j (pi,j a,n , ya ), i,j (xj,i a , p1,a ), j,i (pi,j n,a , ya ); please note the lack of shift by one as compared to the Directed Multicut construction. Furthermore, i,j j,i j,i we add terminal pairs (xi,j n , y1 ) and (xn , y1 ). j,i i,j Observe that, if the paths X and X j,i were directed towards xi,j φ(i) and xφ(j) respectively, while the i,j j,i paths Y i,j and Y j,i were directed away from yφ(i) and yφ(j) respectively, there are unique paths in the graph i,j satisfying the newly introduced terminal pairs: the one from xi,j n to y1 needs to traverse the grid for the j,i j,i pair (i, j) along the φ(i)-th row, while the one from xn to x1 needs to traverse it along the φ(j)-th column. These two paths intersect at the vertex pi,j φ(i),φ(j) ; we finish the construction by encoding the edges of G by the following modification of the vertices pi,j a,b . i,j j,i For every vertex pa,b , we call its incident four arcs as follows: the north arc goes from pi,j a−1,b (or xb if i,j i,j i,j j,i i,j a = 1) to pa,b , the south arc goes from pa,b to pa+1,b (or yb if a = n), the west arc goes from pa,b−1 (or i,j i,j i,j i,j i j xi,j a if b = 1) to pa,b , while the east arc goes from pa,b to pa,b+1 (or ya if b = n). If va vb ∈ E(G), we keep i,j i,j i,j the vertex pi,j a,b intact; otherwise, we split the vertex pa,b into two vertices pa,b,SW , pa,b,N E , connected by an i,j undirected edge, with pi,j a,b,SW incident to the south and west arcs and pa,b,N E incident to the north and east i,j arcs. With this construction, we cannot traverse the split vertex pa,b from north to south and from west to east at the same time, forbidding us from choosing φ(i) = a and φ(j) = b simultaneously. This implies that (G0 , T ) is a positive instance if and only if (G, H) is a positive instance. This finishes the description of the constructed Steiner Orientation instance (G0 , T ). Note that the number of terminal pairs is bounded by O(k + `) = O(k). We now prove formally that the reduction is a correct hardness reduction for Steiner Orientation. i From a homomorphism to an orientation. Let φ : [k] → [n] be such that i 7→ vφ(i) is a homomorphism of H into G. We start by orienting some of the edges of H as follows. For every i ∈ V (H), orient the path C i towards ciφ(i) and the path Di away from diφ(i) . Similarly, for every pair (i, j) with ij ∈ E(H), orient the i,j i,j path X i,j towards xi,j away from yφ(i) . φ(i) and orient the path Y Let G00 be the mixed graph obtained so far. For every terminal pair (s, t) ∈ T , we exhibit a path in G00 from s to t in such a way that no two such paths share an undirected edge. This proves that the remaining undirected edges can be oriented in the desired way. It is straightforward to observe that for every terminal pair (s, t) involving a c-vertex or a d-vertex (i.e., one introduced in the first part of the construction) there exists a directed path in G00 from s to t consisting of i,j i i directed arcs only: we may traverse from any endpoint of X i,j or C i up to xi,j φ(i) or cφ(i) , fall to dφ(i) or yφ(i) , i,j and go along the path Di or Y i,j to any of its endpoints. Thus, it remains to focus on the pairs (xi,j n , y1 ) j,i j,i and (xn , y1 ) for ij ∈ E(H), i < j. For the first pair, we traverse X i,j up to xi,j φ(i) , then traverse along the φ(i)-row of the grid (i.e., using vertices pi,j φ(i),b for 1 ≤ b ≤ n; if any of these vertices is split, we traverse it from west to east using the i,j intermediate undirected edge), and traverse Y i,j from yφ(i) up to y1i,j . The path for the second pair is similar, but uses the φ(j)-th column of the grid, and traverses every vertex pi,j a,φ(j) for 1 ≤ a ≤ n from north to south. j i These two paths intersect at pi,j φ(i),φ(j) . Since vφ(i) vφ(j) ∈ E(G), this vertex is not split and the two aforementioned paths do not share an undirected edge. As only these two paths are present in the grid for the pair (i, j), and all undirected edges in G00 are contained in such grids, we conclude that (G0 , T ) is a yes-instance. From an orientation to a homomorphism. Assume that (G0 , T ) is a yes-instance, and let G00 be an oriented graph G0 such that for every (s, t) ∈ T , there is a path from s to t in G00 . Fix a vertex i ∈ V (H). Recall that no arc leads toward any path C i or X i,j , and no arc leads from any path Di or Y i,j . Furthermore, all arcs leaving C i lead to Di or one of the paths Y i,j , and all arcs going into Di start in C i or in one of the paths X i,j . We infer that the path from ci1 to din and the path from cin to di1 in G00 both need to be completely contained in G00 [C i ∪ Di ]. Furthermore, such a path for (ci1 , din ) traverses C i up to some vertex cia , falls to dia , and continues along Di , and similarly for the pair (cin , di1 ). We infer that there exists an index 1 ≤ φ(i) ≤ n such that C i is oriented towards ciφ(i) , while Di is oriented away from diφ(i) . i We claim that i 7→ vφ(i) is a homomorphism of H into G. Fix an edge ij ∈ E(H), i < j; we aim to show j i that the vertex pi,j φ(i),φ(j) is not split, which is equivalent to vφ(i) vφ(j) ∈ E(G). i i,j i A similar reasoning as earlier for the path X i,j and terminal pairs (xi,j 1 , dn ) and (xn , d1 ) implies that i,j j,i j,i X is oriented towards xφ(i) . Analogously, we obtain that X is oriented towards xφ(j) , Y i,j is oriented i,j i,j j,i away from yφ(i) , and Y j,i is oriented away from yφ(j) . i,j The only arcs leaving the path X are arcs going towards Di and the p-grid for the pair (i, j). Similarly, the only arcs ending in Y i,j start in C i and in the aforementioned p-grid, and analogous claims hold for i,j j,i j,i the paths X j,i and Y j,i . We infer that the paths in H 0 for terminal pairs (xi,j n , y1 ) and (xn , y1 ) need to traverse through the p-grid for the pair (i, j). With the paths X i,j , X j,i , Y i,j , and Y j,i oriented as described, even with keeping the undirected edges in the grid not oriented, the only path for the first terminal pair traverses the φ(i)-th row of the grid from i,j i,j xi,j φ(i) , through pφ(i),b for 1 ≤ b ≤ n (split or not), towards yφ(i) , and similarly the only path for the second terminal pair traverses the φ(j)-th column of the grid. If the vertex pi,j φ(i),φ(j) is split, these paths traverse i,j the undirected edge pi,j φ(i),φ(j),SW pφ(i),φ(j),N E in opposite directions, a contradiction. This concludes the proof of Theorem 1.2. 4 Directed treewidth bound of k-cut-minimal graphs We now prove the directed treewidth upper bound (Theorem 1.3). For the duration of this section, we will consider arc cuts for convenience, but the result also implies a very similar statement for vertex cuts. We will need some further preliminaries. For a vertex set U , we let δ(U ) denote the set of arcs leaving U . Let G = (V, A) be a digraph. A set T ⊆ V is well-linked if for every pair of equal sized subsets X and Y of T , there are |X| vertex disjoint paths from X to Y in G − (T \ (X ∪ Y )). Well-linked sets are connected to directed treewidth in the following sense. Theorem 4.1 (Cor. 6.4.24 of [20]). Let G be a digraph with no well-linked set of cardinality more than k. Then G has directed treewidth O(k). In what follows we will work only with well-linked sets, and thus we omit the definition of directed treewidth. For the definition of directed treewidth, and more on directed width notions, see Kreutzer and Ordyniak [20]. We will show that a k-cut-minimal graph cannot contain an arbitrarily large well-linked set. To illustrate the approach, assume that T ⊆ V is a well-linked set of sufficiently large size (|T | > f (k) for some f (k) yet to be specified). We will identify a set U ⊆ V with |δ(U )| ≤ k, such that |T ∩ U |, |T \ U | > k. This contradicts the assumption that T is well-linked, and implies that G has bounded directed treewidth. The basic engine of the proof is the anti-isolation lemma, due to Marx. For this, we need to recall the notion of important separators. (We use the version for directed graphs [8], adapted to our purpose; in particular, we use arc separators instead of vertex separators. The original definition for undirected graphs was [23].) Let G = (V, A) be a digraph with s, t ∈ V . An important st-separator is a minimal s-t-cut C ⊆ A such that there is no s-t-cut C 0 ⊆ A, C 0 = 6 C, with |C 0 | ≤ |C| such that every vertex reachable from s in G − C 0 is also reachable from s in G − C . Lemma 4.2 ([8]). There are at most 4k important s-t-separators of size at most k. It is important to note that every s-t-cut C can be “pushed” to an important s-t-separator C 0 with |C | ≤ |C|, such that every vertex reachable from s in G − C is also reachable from s in G − C 0 . We state and prove the anti-isolation lemma. (This is taken from a set of lecture slides of Marx [25]; to the best of our knowledge, no proof has appeared in a formally reviewed publication.) Because the expression will be used several times, define g(k) = (k + 1)4k+1 . 0 Lemma 4.3 (Anti-isolation [25]). Let s, v1 , . . . , vr be vertices in a digraph G = (V, A), and let C1 , . . . , Cr ⊆ A be arc sets of size at most k such that for all i, j ∈ [r] there is a path from s to vj in G − Ci if and only if i = j. Then r ≤ g(k). Proof. Add a vertex t, and an arc (vi , t) for every i ∈ [r]. Then for every i ∈ [r], the cut Ci ∪ {vi , t} is an s-t-cut of size at most k + 1, and can be pushed to an important separator Ci0 of size at most k + 1. Note that necessarily (vi , t) ∈ Ci0 . Since there are only at most 4k+1 important separators of size at most k + 1, and each of them contains at most k + 1 arcs (vj , t), j ∈ [r], and since every such arc is contained in an important separator, we conclude that r ≤ (k + 1)4k+1 = g(k). We will also use the following dual form. Lemma 4.4. Let t, v1 , . . . , vr be vertices in a digraph G = (V, A), and let C1 , . . . , Cr ⊆ A be arc sets of size at most k such that for all i, j ∈ [r] there is a path from vj to t in G − Ci if and only if i = j. Then r ≤ g(k). Proof. Simply apply the anti-isolation lemma to the reversed graph G0 = (V, {(v, u) : (u, v) ∈ A}). Let us now recall the sunflower lemma. A sunflower is a collection {X1 , . . . , Xr } of subsets of a ground set V such that all pairwise intersections are identical, i.e., there is a set K ⊆ V (the core of the sunflower) such that for all i, j ∈ [r], i 6= j we have Xi ∩ Xj = K. The (pairwise disjoint) sets Xi \ K for i ∈ [r] are called the petals of the sunflower. The famous Sunflower Lemma says the following (original lemma is due to Erdős and Rado [13]; the following is from Flum and Grohe [14]). Lemma 4.5. Let H ⊆ 2V be a collection of subsets of size d of a ground set V . If |H| > d!k d , then H contains a sunflower of cardinality more than k. Observe that for any minimal st-cut C containing an arc (u, v), the graph G − C contains both an su-path and a vt-path. Using the Erdős-Rado sunflower lemma, we can then sharpen these statements into the following. Lemma 4.6. Let G = (V, A) be a digraph, with two distinguished vertices s, t ∈ V . Let F ⊆ A be a collection of arcs such that every arc (u, v) ∈ F participates in some minimal st-cut of size at most k. If |F | > h(k) 2 where h(k) = 2O(k ) , then there is a minimal st-cut C ⊆ A in G of size at most k that splits F , i.e., there are more than k arcs (u, v) ∈ F \ C such that G − C contains an su-path, and more than k arcs (u, v) ∈ F \ C such that G − C contains a vt-path. Proof. For each (u, v) ∈ F , let Cuv ⊆ A be a minimal s-t-cut with (u, v) ∈ Cuv , with |Cuv | ≤ k. Let Suv denote the set of vertices reachable from s in G − Cuv , and let Tuv denote the set of vertices that reach t in G − Cuv . From the observation stated before the lemma statement, by the minimality of Cuv we have u ∈ Suv and v ∈ Tuv . Also let U = {u : (u, v) ∈ F } and W = {v : (u, v) ∈ F }. We first make a claim to lower-bound the size of U and W . (This is standard, but we include a proof for completeness.) Claim 4.7. For every vertex v, at most 2g(k) arcs incident to v participate in minimal s-t-cuts of size at most k. Proof. We bound the number of in-arcs and out-arcs separately. For the in-arcs, consider the graph resulting by adding k + 1 arcs (v, t). Note that every minimal s-t-cut that contains an in-arc of v remains a minimal s-t-cut. As in the proof of the anti-isolation lemma, we may push each such cut to an important separator, and this operation will not decrease the set of in-arcs of v contained in the cut. Hence at most g(k) in-arcs of v participate in minimal s-t-cuts of cardinality at most k. The proof bounding out-arcs is entirely analogous. y We make a further subsidiary claim. Claim 4.8. There are at most 2O(k 2 ) arcs (u, v) ∈ F such that |Suv ∩ U | ≤ 2k. Proof. Consider the collection S = {Suv ∩ U : (u, v) ∈ F }. Let X1 , X2 , . . . , Xr be a sunflower in S with core K and let Ci be the cut Cuv such that Suv ∩ U = Xi for i ∈ [r]. Pick a vertex xi ∈ Xi \ K for every i ∈ [r]. Then, the vertices s and xi together with cuts Ci satisfy the prerequisities for the anti-isolation lemma. Consequently, S does not contain a sunflower of cardinality more than g(k). Hence by the sunflower lemma, it contains at most d!(g(k))d distinct sets of cardinality d, for each 2 1 ≤ d ≤ 2k. Summing, and ignoring the constant factor, we find that S contains only 2O(k ) sets of size at most 2k. By the degree observation in the previous claim, every u ∈ U is an endpoint for at most g(k) arcs 2 2 (u, v) ∈ F ; hence there are at most g(k)2O(k ) = 2O(k ) arcs uv ∈ F such that |Suv ∩ U | ≤ 2k, as promised. y The dual bound also holds. Claim 4.9. There are at most 2O(k 2 ) arcs (u, v) ∈ F such that |Tuv ∩ W | ≤ 2k. Proof. This proof is identical to the previous one (except using the form Lemma 4.4 instead of the usual anti-isolation lemma). y Hence, if |F | is large enough, there is at least one arc (u, v) ∈ F such that |Suv ∩ U |, |Tuv ∩ W | > 2k. Naturally, for every u0 ∈ Suv ∩ U there is a corresponding arc (u0 , v 0 ) ∈ F and similarly for Tuv . Since Cuv contains at most k arcs, this leaves more than k further arcs of each type, and the cut Cuv fits the requirements of this lemma. This finishes the proof. From here, Theorem 1.3 follows easily. Recall that T is a proposed well-linked set. Since G is k-cut-minimal, every vertex v ∈ T is incident to some arc that participates in a minimal st-cut of size at most k. This gives us a collection FT ⊆ A of arcs as in Lemma 4.6, with |FT | ≥ |T |/2. If |FT | > h(k), then the cut C provided 2 by the lemma is a witness that T is not well-linked. Hence |T | is bounded by 2O(k ) , and by Theorem 4.1 the directed treewidth of G is bounded by f (k). 5 Conclusions We have presented reductions showing W [1]- and nearly tight ETH-hardness of Directed Multicut and Steiner Orientation. We would like to conclude with two open problems. The first one is the most natural one: is Directed Multicut, parameterized by the size of the cutset, fixed-parameter tractable for three terminal pairs? It seems that our main gadget (the p-grid that we use to check an auxiliary binary relation) inherently requires four commodities to work: two that pass through it horizontally and vertically, and two additional for synchronizing the cutpoints of the input and output bidirectional paths. On the other hand, we were not able to extract any combinatorial property of the solutions in the three terminal case that would warrant an FPT algorithm. As a related question, we would also like to ask whether the two terminal case is WK[1]-hard parameterized by the cutset, or whether it admits a so-called polynomial Turing kernel (see [17]). It is known not to admit a polynomial kernel under standard complexity-theoretical assumptions [10], but nothing is known about Turing kernels (even conjecturally). Secondly, we would like to repeat from [7] the question of fixed-parameter tractability of the `-Chain SAT problem, parameterized the cutset. In this problem (with a fixed integer ` in the problem description) we are given an integer k and a set of n binary variables, unary constraints, and constraints of the form (x1 ⇒ x2 ) ∧ (x2 ⇒ x3 ) ∧ . . . ∧ (x`−1 ⇒ x` ); one asks to delete at most k constraints to get a satisfiable instance. It is easy to see that this problem can be cast as a cut problem in directed graphs via the natural implication/arc correspondence. While it is reasonable to suspect that a strong structural result for k-cut-minimal graphs may lead to an FPT algorithm for this problem, our lower bound methodology seems irrelevant, as it inherently requires different commodities. Acknowledgements. We would like to acknowledge a number of insightful discussions with various people on the graph cut problems in directed graphs, in particular on k-cut-minimal graphs; we especially thank Anudhyan Boral, Marek Cygan, Alina Ene, Tomasz Kociumaka, Stefan Kratsch, Daniel Loksthanov, Dániel Marx, Michal Pilipczuk, Saket Saurabh, and Michal Wlodarczyk. References [1] S. A. Amiri, L. Kaiser, S. Kreutzer, R. Rabinovich, and S. Siebertz. Graph searching games and width measures for directed graphs. In E. W. Mayr and N. Ollinger, editors, 32nd International Symposium on Theoretical Aspects of Computer Science, STACS 2015, March 4-7, 2015, Garching, Germany, volume 30 of LIPIcs, pages 34–47. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2015. [2] J. Bang-Jensen and G. Gutin. Digraphs: Theory, Algorithms and Applications. Springer, 2008. [3] N. Bousquet, J. Daligault, and S. Thomassé. Multicut is FPT. In L. Fortnow and S. P. Vadhan, editors, Proceedings of the 43rd ACM Symposium on Theory of Computing, STOC 2011, San Jose, CA, USA, 6-8 June 2011, pages 459–468. ACM, 2011. [4] J. Chen, Y. Liu, and S. Lu. An improved parameterized algorithm for the minimum node multiway cut problem. Algorithmica, 55(1):1–13, 2009. [5] J. Chen, Y. Liu, S. Lu, B. O’Sullivan, and I. Razgon. A fixed-parameter algorithm for the directed feedback vertex set problem. J. ACM, 55(5), 2008. [6] R. H. Chitnis, M. Cygan, M. Hajiaghayi, M. Pilipczuk, and M. Pilipczuk. Designing FPT algorithms for cut problems using randomized contractions. In 53rd Annual IEEE Symposium on Foundations of Computer Science, FOCS 2012, New Brunswick, NJ, USA, October 20-23, 2012, pages 460–469. IEEE Computer Society, 2012. [7] R. H. Chitnis, L. Egri, and D. Marx. List H-coloring a graph by removing few vertices. In H. L. Bodlaender and G. F. Italiano, editors, Algorithms - ESA 2013 - 21st Annual European Symposium, Sophia Antipolis, France, September 2-4, 2013. Proceedings, volume 8125 of Lecture Notes in Computer Science, pages 313–324. Springer, 2013. [8] R. H. Chitnis, M. Hajiaghayi, and D. Marx. Fixed-parameter tractability of directed multiway cut parameterized by the size of the cutset. SIAM J. Comput., 42(4):1674–1696, 2013. [9] M. Cygan, G. Kortsarz, and Z. Nutov. Steiner forest orientation problems. SIAM J. Discrete Math., 27(3):1503–1513, 2013. [10] M. Cygan, S. Kratsch, M. Pilipczuk, M. Pilipczuk, and M. Wahlström. Clique cover and graph separation: New incompressibility results. TOCT, 6(2):6, 2014. [11] M. Cygan, D. Lokshtanov, M. Pilipczuk, M. Pilipczuk, and S. Saurabh. Minimum bisection is fixed parameter tractable. In D. B. Shmoys, editor, Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31 - June 03, 2014, pages 323–332. ACM, 2014. [12] M. Cygan, M. Pilipczuk, M. Pilipczuk, and J. O. Wojtaszczyk. On multiway cut parameterized above lower bounds. TOCT, 5(1):3, 2013. [13] P. Erdős and R. Rado. Intersection theorems for systems of sets. Journal of the London Mathematical Society, s1-35(1):85–90, 1960. [14] J. Flum and M. Grohe. Parameterized Complexity Theory. Springer, 2006. [15] R. Ganian, P. Hlinený, J. Kneis, D. Meister, J. Obdrzálek, P. Rossmanith, and S. Sikdar. Are there any good digraph width measures? In V. Raman and S. Saurabh, editors, Parameterized and Exact Computation - 5th International Symposium, IPEC 2010, Chennai, India, December 13-15, 2010. Proceedings, volume 6478 of Lecture Notes in Computer Science, pages 135–146. Springer, 2010. [16] R. Ganian, P. Hlinn, J. Kneis, A. Langer, J. Obdrlek, and P. Rossmanith. Digraph width measures in parameterized algorithmics. Discrete Applied Mathematics, 168(0):88 – 107, 2014. Fifth Workshop on Graph Classes, Optimization, and Width Parameters, Daejeon, Korea, October 2011. [17] D. Hermelin, S. Kratsch, K. Soltys, M. Wahlström, and X. Wu. A completeness theory for polynomial (turing) kernelization. Algorithmica, 71(3):702–730, 2015. [18] R. Impagliazzo, R. Paturi, and F. Zane. Which problems have strongly exponential complexity? J. Comput. Syst. Sci., 63(4):512–530, 2001. [19] S. Kratsch, M. Pilipczuk, M. Pilipczuk, and M. Wahlström. Fixed-parameter tractability of multicut in directed acyclic graphs. SIAM J. Discrete Math., 29(1):122–144, 2015. [20] S. Kreutzer and S. Ordyniak. Width-measures for directed graphs and algorithmic applications. In M. Dehmer and F. Emmert-Streib, editors, Quantitative Graph Theory: Mathematical Foundations and Applications. Chapman and Hall/CRC Press, 2014. [21] D. Lokshtanov, D. Marx, and S. Saurabh. Lower bounds based on the exponential time hypothesis. Bulletin of the EATCS, 105:41–72, 2011. [22] D. Lokshtanov, N. S. Narayanaswamy, V. Raman, M. S. Ramanujan, and S. Saurabh. Faster parameterized algorithms using linear programming. ACM Transactions on Algorithms, 11(2):15:1–15:31, 2014. [23] D. Marx. Parameterized graph separation problems. Theor. Comput. Sci., 351(3):394–406, 2006. [24] D. Marx. Can you beat treewidth? Theory of Computing, 6(1):85–112, 2010. [25] D. Marx. Important separators and parameterized algorithms, 2011. Lecture slides; available at http://www.cs.bme.hu/~dmarx/papers/marx-mds-separators-slides.pdf. [26] D. Marx. What’s next? Future directions in parameterized complexity. In H. L. Bodlaender, R. Downey, F. V. Fomin, and D. Marx, editors, The Multivariate Algorithmic Revolution and Beyond - Essays Dedicated to Michael R. Fellows on the Occasion of His 60th Birthday, volume 7370 of Lecture Notes in Computer Science, pages 469–496. Springer, 2012. [27] D. Marx, B. O’Sullivan, and I. Razgon. Finding small separators in linear time via treewidth reduction. ACM Transactions on Algorithms, 9(4):30, 2013. [28] D. Marx and I. Razgon. Fixed-parameter tractability of multicut parameterized by the size of the cutset. SIAM J. Comput., 43(2):355–388, 2014. [29] M. Pilipczuk and M. Wahlström. Directed multicut is W [1]-hard, even for four terminal pairs. In R. Krauthgamer, editor, Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, January 10-12, 2016, pages 1167–1178. SIAM, 2016. [30] I. Razgon and B. O’Sullivan. Almost 2-SAT is fixed-parameter tractable. J. Comput. Syst. Sci., 75(8):435–450, 2009. [31] M. Wahlström. Half-integrality, LP-branching and FPT algorithms. In C. Chekuri, editor, Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5-7, 2014, pages 1762–1781. SIAM, 2014. x-path for pair (j, i) sx0→n xj,i 0 xj,i n s> n→0 t< n→0 xi,j 0 y-path for pair (i, j) x-path for pair (i, j) y0i,j xi,j n yni,j s< n→0 t> n→0 y0j,i ynj,i ty0→n y-path for pair (j, i) x-path sx0→n z-path sy0→n y-path t< n→0 x̂i,j a s< n→0 ẑai ŷai,j tx0→n ty0→n Figure 2: Illustration of the reduction for Directed Multicut. Black vertices are light, gray are heavy, and white are undeletable. The top figure illustates a p-grid, together with an intended solution marked by red circles. Here, the vertex p1,1 lies in the top-left corner of the grid, the first coordinate describes the row of the grid, and the second one the column. The bottom figure illustrates an x-, z-, and y-path for a pair (i, j) with ij ∈ E(H) and i < j. X j,i X i,j Y i,j Y j,i Y i,j Ci Di X i,j Figure 3: Illustration of the reduction for Steiner Orientation. Thick gray arrows represent terminal pairs. The top figure illustates a p-grid; dashed rectangles represent single entities pi,j a,b . The bottom figure i,j i,j i i illustrates synchronization between paths X , Y , C , and D .
8cs.DS
Information Sciences Information Sciences 00 (2014) 1–16 arXiv:1410.3744v1 [cs.CV] 14 Oct 2014 Refined Particle Swarm Intelligence Method for Abrupt Motion Tracking Mei Kuan Lim1 , Chee Seng Chan1 , Dorothy Monekosso2 and Paolo Remagnino3 1 University of Malaya, Center of Image and Signal Processing, 50603 Kuala Lumpur, Malaysia; of West England, Eng. & Maths., Bristol BS16 1QY, United Kingdom; 3 Kingston University, Comp. & Info. Sys., Surrey KT1 2EE, United Kingdom 2 University Abstract Conventional tracking solutions are not feasible in handling abrupt motion as they are based on smooth motion assumption or an accurate motion model. Abrupt motion is not subject to motion continuity and smoothness. To assuage this, we deem tracking as an optimisation problem and propose a novel abrupt motion tracker that based on swarm intelligence - the SwaTrack. Unlike existing swarm-based filtering methods, we first of all introduce an optimised swarm-based sampling strategy to tradeoff between the exploration and exploitation of the search space in search for the optimal proposal distribution. Secondly, we propose Dynamic Acceleration Parameters (DAP) allow on the fly tuning of the best mean and variance of the distribution for sampling. Such innovating idea of combining these strategies in an ingenious way in the PSO framework to handle the abrupt motion, which so far no existing works are found. Experimental results in both quantitative and qualitative had shown the effectiveness of the proposed method in tracking abrupt motions. Keywords: abrupt motion, visual tracking, particle swarm optimisation 1. Introduction Visual tracking is one of the most important and challenging research topics in computer vision. One of the main reason is due to it’s pertinent in the tasks of motion based recognition, automated surveillance, video indexing, humancomputer interaction and vehicle navigation [1, 2]. In general, motion estimation in a typical visual tracking system can be formulated as a dynamic state estimation problem: xt = f (xt −1, vt −1) and zt = h(xt , wt ), where xt is the current state, f is the state evolution function, vt − 1 is the evolution process noise, zt is the current observation, h denotes the measurement function, and wt is the measurement noise. The task of motion estimation is usually completed by utilizing predictors such as Kalman filters [3, 4, 5] particle filters [6, 7, 8] or linear regression techniques [9]. This is commonly further enhanced by assuming that motion is always governed by Gaussian distribution based on Brownian motion or constant velocity motion models [2, 10]. While this assumption holds true to a certain degree of smooth motion, it tends to fail in the case of abrupt motion such as fast motion (e.g. the movement of ball in sport events), camera switching (tracking of subject in a camera topology), low frame-rate video as illustrated in Fig. 1. The main reason is that the state equation could not cope with the unexpected dynamic movement, e.g. sudden or sharp changes of the camera/object motion in adjacent frames. Nonetheless, such sampling-based solutions also suffered from the well-known local trap problem and particle I Corresponding Author: Mei Kuan Lim (email: [email protected]; phone/fax: +0060379676433) 1 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 2 Figure 1. Example of the abrupt motion in different scenarios. Top: Abrupt Motion with Inconsistent Speed. Middle: Switching of Camera during a Boxing Game. Bottom: Low Frame Rate of Video due to Downsampling. degeneracy problem. In order to handle these issues, one of the earliest work [11] considered tracking in low frame rate video. The work considered tracking in low frame rate as to abrupt motion and proposed a cascade particle filters to tackle this issue. This is, then, followed by a number of sampling strategies [12, 13, 14, 15, 16] incorporated into Markov Chain Monte Carlo (MCMC) tracking framework. Their method alleviates the constant velocity motion constraint in MCMC by improvising the sampling efficiency. These aforementioned works have shown satisfactory results in tracking abrupt motion, however, we observed that most of the work had been focused on employing different sampling strategy into the Bayesian filtering framework. There are clear trends of increased complexity; as methods have gotten more complicated to cope with more difficult tracking scenarios. Often these sophisticated methods compensate the increased in complexity in a certain aspect of the algorithm by reducing the other aspect of it. For example, the increased number of subregions for sampling to cope with the variation of abrupt motion is compensated by using a smaller number of samples to reduce, if not maintaining the computational cost incurred. However, are these complex and sophisticated methods really necessary? Recently, Particle Swarm Optimization (PSO) [17, 18, 19, 20, 21], a new population based stochastic optimization technique, has received more and more attention because of its considerable success. Unlike the independent particles in the particle filter, the particles in PSO interact locally with one another and with their environment in analogy with the cooperative and social aspects of animal populations, for example as found in birds flocking. With this, Li et al. [22] employed PSO in contour tracking problem to handle the abrupt motions. However, in the PSO method, there is a possibility that most samples will get trapped in a few strong local maxima. Hence, the PSO method fails to track highly abrupt motions. In this paper, we proposed SwaTrack - Swarm intelligence-based Tracking algorithm to handle the abrupt motion. Our contributions are firstly, in contrast to the conventional abrupt motion solutions that based on different sampling methods in Bayesian filtering which are computational expensive, we deem tracking as an optimisation problem and adopted particle swarm optimisation algorithm soley as the motion estimator. In particular, we replace the state equation, xt = f (xt − 1, vt − 1) with a novel velocity model in the PSO. Secondly, we introduced Dynamic Acceleration Parameters (DAP) and Exploration Factor (EF ) into the PSO framework to avoid the swarm explosion and divergence problem in tracking highly abrupt motion. While the PSO is not new, it is the innovating idea of combining the DAP and EF in an ingenious way to handle the abrupt motion which so far no existing works are found. Experimental results using a large scale of public datasets and comparison with the state-of-the-art algorithms have shown the effectiveness and robustness of the proposed method in terms of dataset unbiased, different size of object and recovery from error. The rest of this paper is organised as follows. In Section 2, we provide the background work in tracking abrupt motion. The PSO is revisited in Section 3 and its limitation to handle abrupt motion. Proposed work is detailed in 2 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 (a) Particle degeneracy 3 (b) Trapped in local optima Figure 2. Known problem of sampling-based tracking such as particle filter tracking and its variation (a) particle degeneracy problem (b) trapped in local optima. Section 3 while experimental results and discussion are given in Section 5. Finally, conclusion is drawn in Section 6. 2. Related Work While considerable research efforts exist in relation to visual tracking, only a handful corresponds to abrupt motion [23, 14, 24, 16]. Abrupt motion can be defined as situations where the objects motion changes at adjacent frames with unknown pattern in scenarios such as i) partially low-frame rate, ii) switching of cameras view in a topology network or iii) the irregular motion of the object. Therefore conventional sampling-based solutions that assume Gaussian distribution based on Brownian motion or constant velocity motion models tend to fail in this area as illustrated in Fig. 2 . For a complete review on the general visual tracking, we encourage the reader to [1, 2] while this literature review section will only focus on work that handle abrupt motion. In the recent work, Markov Chain Monte Carlo (MCMC) has been proposed to overcome the computational complexity in PF when the state space increases [25]. While MCMC methods cope better in a high-dimensional state space, a common problem is the need to have a large number of samples, especially when tracking abrupt motion. Thus, to deal with abrupt motion, there has been a handful of work which introduced modifications and refinements on the conventional MCMC. Kwon et al. in [12], introduced an integration of the Wang-Landau algorithm into the MCMC tracking framework to track abrupt motion. Their method alleviates the constant-velocity motion constraint in MCMC by improvising the sampling efficiency using the proposed annealed Wang-Landau Monte Carlo (A-WLMC) sampling method. The A-WLMC method increases the flexibility of the proposal density in MCMC by utilising the likelihood and density of states terms for resampling. Then, another variation of MCMC known as the interactive MCMC (IMCMC) was proposed [13], where multiple basic trackers are deployed to track the motion changes of a corresponding object. The basic trackers which comprise of different combinations of observation and motion models are then fused into a compound tracker using the IMCMC framework. The exchange of information between these trackers has been shown to cope with abrupt motion while retaining the number of samples used. In another advancement, an intensively adaptive MCMC (IA-MCMC) sampler [16] has been proposed. Their method further reduces the number of samples required when tracking abrupt motion by performing a two-step sampling scheme; the preliminary sampling step to discover the rough landscape of the proposal distribution (common when there is large motion uncertainty in abrupt motion) and the adaptive sampling step to refine the sampling space towards the promising regions found by the preliminary sampling step. In another attempt for effective sampling of abrupt motion, [14] proposed the N-fold Wang-Landau (NFWL) tracking method that uses the N-fold algorithm to estimate the density of states which will then be used to automatically increase or decrease the variance of the proposal distribution. The NFWL tracking method copes with abrupt changes in both position and scale by dividing the state space into larger number of subregions. Therefore, the N-fold algorithm was introduced during sampling to cope with the exponentially increased number of subregions. Motivated by the meta-level question prompted in [26] on whether there is a need to have more training data or better models for object detection, we raise similar question in the domain of this area; will continued progress in visual tracking be driven by the increased complexity of tracking algorithms? As indicated in the earlier section, often these sophisticated methods compensate the increased in complexity in a certain aspect of the algorithm by 3 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 4 reducing the other aspect of it. Furthermore, according to [10], different scenarios require different dynamic models. If motion models only work sometimes, on a particular scenario, then how far should the increased in complexity of tracking algorithms be, in order to cope with the challenges of real-time tracking scenarios? Should we look into less complex methods instead, since motion models only work sometimes? Hence, we study a simple and yet effective algorithm, the SwaTrack that utilise the PSO framework to effectively handle the abrupt motion using the particles sharing information themselves. We deem the tracking as an optimisation problem, and hence the proposed method is dataset unbias and able to recover from error. Work that are considered similar to us are [22, 27]. Li et al [22] proposed a two-layer tracking framework in which PSO is successfully combined with a level set evolution. In the first layer, PSO is adopted to capture the global motion of the target and to help construct the coarse contour. In the second layer, level set evolution based on the coarse contour is carried out to track the local deformation. However, there is a possibility that most samples will get trapped in a few strong local maxima. Hence, the PSO method fails to track highly abrupt motions. Zhang et al. [27] proposed a swarm intelligence based particle lter algorithm with a hierarchical importance sampling process which is guided by the swarm intelligence extracted from the particle conguration, and thus greatly overcome the sample impoverishment problem suffered by particle lters. Unfortunately, it cannot be a perfect solution either as it is still depends on the Gaussian approximation. In order to handle this issue, we introduce 1) DAP - a dynamic acceleration parameters by utilising the averaged velocity information of the particles; and 2) EF - a mechanism that balance the tradeoffs between exploration and exploitation of the swarm into the PSO framework. With this, the SwaTrack will able to alleviate these problems and track in highly abrupt motion or recover from tracking error. 3. Particle Swarm Optimisation Revisit Particle Swarm Optimisation (PSO) - a population-based stochastic optimisation technique was developed by Kennedy and Eberhart in 1995 [17]. It was inspired by the social behaviour of a flock of birds. The operation of the PSO can be described as let us assume an n-dimensional search space, S ⊂ Rn and a swarm comprising of I particles. Each particle represents a candidate solution to the search problem and is associated to a fitness function (cost function), f : S → R. At every kth iteration, each particle is represented as {xki }i=1,...,I at kth iteration, where k = 1, 2, ...K. Each particle, xki has its own velocity, v(xki ) and a corresponding fitness value (cost), f (xki ). The best position encountered by the ith particle (personal best) will be denoted as {p(xki )}i=1,...,I and the fitness value as pBestki = f (p(xki )). For every kth iteration, the particle with the best fitness value will be chosen as the global best and is denoted as the index of the particle is denoted as f . Finally, the overall best position found by the swarm will denote as gBestki = f (p(xkg )). The PSO algorithm is shown in Algo 1: 1. Initialisation, at iteration k = 0 • Initialise a population of I particles, {xki }i=1,...,I with positions, p(xki ),at random within the search space, S. • Initialise the velocities, v(xki ) at random within [1, −1]. • Evaluate the fitness value of each particle and identify their personal best pBestki = f (p(xki )). • Identify the global best gth particle and update the global best information, gBestk = f (p(xkg )). 2. Repeat at iteration k = 1, 2, ...K until the stopping criterion is met. • For each ith particle, compute the new velocity according to: vik+1 = [(ω ∗ vik ) + (c1 ∗ r1 ∗ (pBestki − xki )) + (c2 ∗ r2 ∗ (gBestk − xki )] (1) • For each ith particle, move them using the computed new velocity as in Eq. 2 and update its position according to: i p(xk+1 ) = p(xk )i + vik+1 (2) i • For each ith particle, ensure the newly computed position is within state space, p(xk+1 )⊂S • Update pBestki , p(pBestki ), g, gBestk , p(gBestkg ). 4 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 5 • Check for Convergence • End Repeat The parameters ω, c1 and c2 are positive acceleration constants used to scale the influence of the inertia, cognitive and social components respectively; r1 , r2 ⊂ (0, 1) are uniformly distributed random numbers to randomise the search exploration. 3.1. Limitations for Abrupt Motion Tracking However, the traditional PSO does not able to cope with abrupt motion, due to few reasons: Constant Acceleration Parameters: The parameter c1 controls the influence of the cognitive component, (c1 ∗ r1 ∗ (pBestki − xki )) which represents the individual memory of particles (personal best solution). A higher values gives more emphasize on the cognitive component and vice versa. In contrast, the parameter c2 controls the influence of the social component,(c2 ∗ r2 ∗ (gBestk − xki ) which indicates the joint effort of all particles to optimize a particular fitness function, f . A drawback of the current PSO is the lack of a reasonable mechanism to effectively handle the acceleration parameters (ω, c and r); which always set to a constant variable. For example, many applications of the PSO and its variant set these parameters c1 = c2 = 2.00, which gives the stochastic factor a mean of 1.0 and giving equal importance to both the cognitive and social components [17]. This limits the search space and therefore could not cope with abrupt motion. Therefore, it is essential to have dynamic acceleration parameters that able to cope with unexpected dynamic motion. Tradeoffs in Exploration and Exploitation: The inertia weight, ω serves an important value that directs the exploratory behaviour of the swarms. High inertia weights accentuates the influence of previous velocity information and force the swarm to explore a wider search space; while a decreasing inertia weight reduces the influence of previous velocity and exploit a smaller search space. Often, the inertia value that controls the influence of the previous velocity is set to ω ∈ [0.8, 1.2] [28]. Recently, decaying inertia weigh, ω = 0.9 → 0.4 has been proposed and tested, with the aim of favouring global search at the start of the algorithm and local search later. While these settings has been tested to work well in other optimisation problems, one must note that it is not applicable in tracking abrupt motion where the dynamic change is unknown. Therefore, a solution that able to handle the tradeoffs between the exploration and exploitation will be beneficial. 4. Proposed Method - SwaTrack In this section, we present our proposed SwaTrack - a variant of the traditional PSO to track target with arbitrary motion. Particularly, we will discuss how the ingenious combination of Dynamic Acceleration Parameters (DAP) and Exploration Factor EF in the proposed PSO framework has alleviated the problem of swarm explosion and divergence problem. 4.1. Dynamic Acceleration Parameters (DAP) PSO is a population based stochastic optimization technique. Since PSO is an iterative solution, efficient convergence is an important issue toward a real time abrupt motion estimation system. However, the strict threshold of the conventional PSO velocity computation as in Eq. 2 will always lead to particles converging to a common state estimate (the global solution). One reason is that the velocity update equation uses a decreasing inertia value which indirectly forces the exploration of particles to decrease over the iterations. On the other hand, an increasing inertia value will lead to swarm explosion in some scenarios. To overcome this, we introduce DAP - a mechanism to self-tune the acceleration parameters by utilising the averaged velocity information of the particles. That is, we normalised the acceleration parameters so that they can be compared fairly with respect to the estimated velocity, p(w ∩ c1 ∩ c2 ) = 1. The fitness function information is incorporated in the PSO framework in order to refine the acceleration parameters dynamically rather than a static value. The basic idea is that when an object moves consistently in a particular direction, C → 1, the inertia, w and cognitive weight, c1 values are increased to allow resistance of any changes in its state of motion in the later frames. Otherwise when C → 0, the social weight c2 is increased by a stepsize to reduce its resistance to motion changes 5 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 6 as Eq. 3. The increase of the social weight allows global influence and exploration of the search space, which is relevant when the motion of a target is dynamic. The exploitation within nearby regions is reasonable when an object is moving with small motion.   c1 = c1 + m; c2 = c2 − m; ω = ω + m         c1 = c1 − m; c2 = c2 + m; ω = ω − m          ∗ condition on p(ω ∩ c ∩ c ) = 1 1 2 C→1 otherwise (3) The C is estimated by computing the frequency of the change in the quantised motion direction of the object; C → 1 represent consistent motion with minimal change of direction, while C → 0 represent inconsistent or dynamic motion. 4.1.1. Exploration Factor (EF ) The normalisation of DAP as 1 will restrict the overall exploration of the state to a certain degree. Hence, we refine this by introducing the exploration factor, EF which serves as a multiplying factor to increase or decrease the exploration. We define the exploration factor, EF as the parameters that adaptively 1. increase the exploration with high variance, and 2. increase the exploitation with low variance. By utilising these exploitation and exploration abilities, our method is capable to recover from being trapped into a common state (local optima). Thus, the proposed SwaTrack copes better with both the smooth and abrupt motion. At every kth iteration, the quality of the estimated position upon convergence (global best) is evaluated using its fitness value. f (gBestkg ) → 1 indicates high likelihood whereas f (gBestkg ) → 0 indicates low likelihood or no similarity between an estimation and target. When f (gBestkg ) ≤ T MinF , where T MinF is a threshold, we know that there is low resemblance between the estimation and target and most likely the proposal distribution may not match the actual posterior. Thus in this scenario, EF is increased alongside the maximum number of iterations, K by empirically determined step sizes m and n respectively. This drives the swarm of particles to explore the region beyond the current local maxima (increase exploration). However, when an object has left the scene, K tend to increase continuously and cause swarm explosion. Thus, we limit K ⊂ S. E α f (gBestkg ) (4) f (gBestkg ) In another scenario, where ≥ T MinF , EF is decreased alongside K; constraining the search around the current local maximum (exploitation). In a straightforward manner, it is always best to drive particles at its maximum velocity to provide a reasonable bound in order to cope with the maximum motion change. However, this is not reasonable for real-time applications as it incurs unnecessary computational cost especially when the motion is not abrupt. Thus, by introducing the adaptive scheme to automatically adjust the exploration and exploitation behaviour of the swarm, SwaTrack is able to cope with both the smooth and abrupt motion with less computational cost. Also, we observed that since the particles in SwaTrack exchange information with one another, we only need a few particles for sampling. 4.2. Novel Velocity Model With the introduction of DAP and EF , the novel velocity model, v0 in our PSO framework is represented as: v̀ik+1 = EF k [(ω ∗ v̀ik ) + (c1 ∗ r1 ∗ (pBestki − xki )) + (c2 ∗ r2 ∗ (gBestk − xki )] (5) where EF k is the exploration factor at iteration k and c, r, ω are the acceleration parameters with the condition p(w ∩ c1 ∩ c2 ) = 1. The normalised condition applied to the acceleration allows on the fly tuning of these parameters 6 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 7 according to the quality of the fitness function. The fitness function used here is represented by the normalised distant measure between the appearance model of an estimation and the object-of-interest. The fitness value of a particle, f (xki ) measures how well an estimation of the object’s position matches the actual object-of-interest; where 1 represents the highest similarity between an estimation and target and 0 represents no similarity. At every kth iteration, each particle varies its velocity according to Eq. 5 and move its position in the search space according to: i p(xk+1 ) = p(xk )i + v̀ik+1 (6) Note that the motion of each particle is directed towards the promising region found by the global best, gBestk from previous iteration, k = k − 1. 1. Initialisation, at iteration k = 0 • Initialise a population of I particles, {xki }i=1,...,I with positions, p(xki ),at random within the search space, S. • Initialise the velocities, v(xki ) at random within [1, −1]. • Evaluate the fitness value of each particle and identify their personal best pBestki = f (p(xki )). • Identify the global best gth particle and update the global best information, gBestk = f (p(xkg )). 2. Repeat at iteration k = 1, 2, ...K until the stopping criterion is met. • For each ith particle, compute the new velocity according to: v̀ik+1 = Ek [(ω ∗ v̀ik ) + (c1 ∗ r1 ∗ (pBestki − xki )) + (c2 ∗ r2 ∗ (gBestk − xki )] where, p(w ∩ c1 ∩ c2 ) = 1 • If f (gBestkg ) ≤ T MinF then E = E + n, K = K + n else then E = E − n, K = K − n end If • If C → 1 then c1 = c1 + m, c2 = c2 − m, ω = ω + m else then c1 = c1 − m, c2 = c2 + m, ω = ω − m end If • For each ith particle, move them using the computed new velocity as in Eq. 2 and update its position according to: i p(xk+1 ) = p(xk )i + v̀ik+1 i • For each ith particle, ensure the newly computed position is within state space, p(xk+1 )⊂S • Update pBestki , p(pBestki ), g, gBestk , p(gBestkg ). • Check for Convergence • End Repeat 5. Experimental Results & Discussion In this section, we verify the feasibility and robustness of our proposed method in handling abrupt motion via various experiments using public and synthetic datasets. The experiments were performed on an Intel Core-2 processor with C++ and OpenCV implementation. 7 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 8 5.1. Experimental Settings We assumed the object-of-interest to be known and hence initialise manually the 2D position of the target in the first frame as automatic initialisation is another research topic by itself. The object is represented by its appearance model, which comprises of HSV histogram with uniform binning; 32 bins. The normalised Bhattacharyya distant measure is used as the fitness value (cost function) to measure the quality of the estimation; where 1 represents the highest similarity between an estimation and target and 0 represents no similarity. Here, the initial values for SwaTrack are EF = 25, ω = 0.4, c1 = 0.3, c2 = 0.3, K = 30, I = 15 respectively. These values are set empirically and are not as critical; the adaptive mechanism in the proposed method allows adjustment of these parameters according to the quality of the observation model. We manually labelled the ground truth of nth object. The ground truth is described as bounding box information, Xn (xn ,yn ,wn ,hn = x-positions, y-positions, width, height). We compare the state-of-the-art results of PSO, PF [30, 31], BDM [23], FragTrack [32], A-WLMC [12] and CT [19], respectively in terms of both the detection accuracy (%) and processing time (milliseconds per frame). Figure 3. Sample shots of the dataset employed. 5.2. Dataset We tested our proposed method with a number of public and synthetic datasets. In the quantitative experiments, we employed 5 public datasets (TableTennis, Youngki, Boxing and Tennis) as illustrated in Fig. 3. Rapid Motion of Small Object: The T ableT ennis(T ableT ) dataset consists of 5 video sequences to test the effectiveness of the proposed method in terms of tracking small object (e.g. table tennis ball) that exhibits fast motion. Sequence 11 , the SIF Table Tennis sequence is a widely used dataset in the area of computer vision, especially for evaluation of detection and tracking methods. This sequence has complex, highly textured background and exhibit camera movement with some occlusion between the ball and the player’s arm. Sequence 22 , is a sample training video from the ITTF video library which is created to expose players, coaches and umpires to issues related to service action. Although this sequence is positioned to provide the umpire’s point of view of a service, it is very challenging as the size of the tennis ball is very small; about 8x8 pixels to 15x15pixels for an image resolution of 352x240. The video comprises of 90 frames including 10 frames in which severe occlusion happens, where the ball is hidden by the player’s arm. Sequence 33 is a match obtained from a publicly available source. In this sequence, the tennis ball is relatively large as it features a close-up view of the player. However, there are several frames where the ball appears to be blurred 1 The SIF training data is available at http://www.sfu.ca/∼ibajic/datasets.html ITTF training and demo dataset is available at http://www.ittf.com 3 The video is available at http://www.youtube.com/watch?v=C9D88AcmLjI 2 The 8 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 9 due to the low frame rate and abrupt motion of the tennis ball. Sequence 4 and 54 is captured at a higher frame rate, thus the spatial displacement of the ball from one frame to another appears to be smaller (less abrupt) and the ball is clearer. This is to test the ability of proposed method to handle normal visual tracking scenario. Since the dataset didnt provide any groundtruth, we manually labelled the ground truth of nth object. The ground truth is described as bounding box information, Xn (xn ,yn ,wn ,hn = positions in the x-dimension, y-dimension, width, height). If the paper is accepted, we will make the dataset and groundtruth publicly available. Switching Camera: The Youngki and Boxing dataset [14] comprise of frames edited from different cameras (camera switching). This results in an object appearing at the different part of the image. Low-frame rate T ennis dataset [14] comprises of downsampled data to simulate abrupt change. The frames are downsampled from a video with more than 700 original frames, by keeping one frame in every 25frames. The rapid motion of the tennis player from one frame to another due to the downsampling made tracking extremely difficult. Downsampling is done to simulate abrupt motion during low-frame rates. In the qualitative experiments, on top of the 5 public datasets, we included 1 more dataset that consists of 3 video sequences to further test the robustness of the proposed method. Abrupt Motion with Inconsistent Speed: The first sequence of the dataset is to track a synthetic ball which moves randomly across the sequence with inconsistent speed, whilst the second sequence tracks a soccer ball which is being juggled in a free-style manner in a moving scene with a highly textured background (grass). Multiple targets: In the third sequence is two simulated balls moving at random. We intend to demonstrate the capability of the proposed system to track multiple targets; whilst most of the existing solutions are focused on single target. 5.3. Quantitative Results 5.3.1. Experiment 1: Detection Rate Detection rate refers to the correct number and placement of the objects in the scene. For this purpose, we denote the ground truth of nth object as GTn and the output from the tracking algorithms of jth object is denoted as ξn . We describe the ground truth and tracker output of each nth object as bounding box information , Xn (xn ,yn ,wn ,hn = xposition, y-position, width, height). The coverage metric determines if a GT is being tracked, or if an ξ is tracking accurately. In [33], it is shown that the F-measure, F suited this task as the measure is 1.0 when the estimate, ξn overlaps perfectly with the ground truth, GTn . Two fundamental measures known as precision and recall are used to determine the F-measure. Recall: Recall measures how much of the GT is covered by the ξ and takes value of 0 if there is no overlap and 1 if they are fully overlapped. Given a ground truth, GTn and a tracking estimate, ξn , the recall, <n is expressed as: |ξn ∩ GT n | (7) |GT n | Precision: Precision measures how much of the ξ covers the GT takes value of 0 if there is no overlap and 1 if they are fully overlapped. The precision, ℘n is expressed as: <n = ℘n = |ξn ∩ GT j | |ξn | (8) 2<n ℘n <n + ℘n (9) F-measure: The F-measure, Fn is expressed as: Fn = Coverage Test In this experiment, we employ the F − measure according to the score measurement of the known PASCAL challenge [34]. That is, if the Fn of nth object is larger than 0.5, the estimation is considered as correctly tracked in the frame. Table. 1 demonstrates the detection accuracy of the benchmarked tracking algorithms for all 8 test sequences. Overall, the experimental results show that the average tracking accuracy of the proposed method surpasses most of the state-of-the art tracking methods with an average detection accuracy of 91.39%. For all 6 test sequences (TableT1, TableT2, TableT5, Youngki and T ennis), the SwaTrack generates the best tracking results amongst the rest and Rank 2 for TableT4 and Boxing, respectively. 4 This dataset can be obtained from http://xgmt.open.ac.uk 9 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 10 Table 1. Experiment results - Comparison of the Detection Rate (in %) TableT1 TableT2 TableT3 TableT4 TableT5 Average PSO 70.1 83.1 58.2 59.6 60.3 66.26 PF [30, 31] 58.4 69.8 52.1 47.3 34.5 52.42 BDM [23] 68.3 53.4 67.3 73.2 64.2 65.28 FragTrack [32] 64.9 24.1 55.3 57.2 9.7 42.24 A-WLMC [12] 47.2 3.2 8.7 6.9 5.4 14.28 CT [19] 72.3 4.3 24.5 98.2 36.3 47.12 SwaTrack 87.8 93.1 74.1 97.3 72.8 85.02 In the meantime, methods that do not built on sophisticated motion model, the FragTrack [32] employs refine appearance model that adapts to the changes of the object. Even so, it still performs poorly in this condition when compared to the others with an average accuracy of 37.19%. PF on the other hand, gives the detection accuracy of 85.6%. This is expected as it is known that PF algorithm is constraint to a fixed Gaussian motion model. Once PF has lost track of the object, it has the tendency to continue searching for the object in the wrong region such as shown in Fig. 4a; leading to error propagation and inability to recover from incorrect tracking. The proposed method copes better with abrupt motion and is not subjected to trapped in local optima as shown in Fig. 4b. While the MCMC tracking method is still subjected to a certain degree of recovery as shown in Fig. 6. Table 2. Experiment results - Comparison of the Detection Rate (in %) Tennis Youngki Boxing Average PSO 87.3 87.1 82.4 85.6 PF [30, 31] 67.3 47.2 16.3 43.6 FragTrack [32] 20.6 27.5 48.3 32.13 A-WLMC [12] 95.1 86.8 98.1 93.33 SwaTrack 98.3 98.7 96.3 97.76 Dataset Unbias The problem of dataset bias was highlighted in [35] where the paper argue that “Is it to be expected that when training on one dataset and testing on another there is a big drop in performance?” In here, we replicate similar scenario in tracking domain and observe that though the A-WLMC method [12] performs well in TableT4 and Youngki sequence, they do not produce consistent results when tested across the other datasets as shown in Table 1-2 . For example, we can notice that the average detection accuracy of A-WLMC is 14.28% for TableT dataset, and 93.33% for Tennis, Boxing and Youngki dataset respectively. The indicate that the A-WLMC solution [12] is dataset bias as it seem to only work well in their proposed dataset, but performed porrly when is employed on different dataset. Perhaps this is due to the motion model employed by these tracking methods that works well only on certain scenarios, alluding to the notion in [10] that different motion requires different motion models. This is indeed not the case for our proposed SwaTrack. Our overall detection rates are 85.02% and 97.76%, respectively. For all sequences that exhibit different challenging conditions, e.g. rapid motion (T ableT 1 − 5), low-frame rate (T ennis), the Swatrack has shown its robustness to cope without any ease. We further investigated the dataset bias problem and found out that there is an influence of object size to the detection rate. For instance, A-WLMC algorithm [12] performs poorly for sequences in which the resolution of the object-of-interest is small, such as in Table Tennis dataset and performs surprisingly well when the object is large such as in the Youngki, Boxing and T ennis dataset, respectively. This indicates the need to have better representation of the object for a more accurate acceptance and rejection of estimations in the MCMC. 5.3.2. Experiment 2: Computational Cost Fig. 5 demonstrates the comparison of the proposed method with state-of-the-art solution in terms of time complexity. As for the processing time, the SwaTrack algorithm requires the least processing time with an average of 63 milliseconds per frame. In contrary, MCMC-based solution such as A-WLMC [12] and PF [30, 31] require higher processing time. This is likely due to the inherent correlation between MCMC samplers which suffer from slow convergence when an object has not been tracked accurately. Notice that in scenarios where the MCMC requires high 10 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 11 (a) Sample detections from PF tracking. (b) Sample detections from SwaTrack tracking. Figure 4. Sample output to demonstrates incorrect tracking due to trapped in local optima. The aim is to track the person in dark skin and purple short. From Frame 449-451 (a), PF lost track of the object due to sampling from incorrect distribution during abrupt motion.. On the other hand, the results in (b) demonstrate the capability of the SwaTrack tracking in dealing with the non-linear and non-Gaussian motion of the object. Figure 5. Time Complexity. This figure illustrates the comparison of processing time (milliseconds per frame) between the proposed SwaTrack, standard PSO, PF, BDM, FragTrack, A-WLMC and CT 11 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 12 processing time, the accuracy of the MCMC is minimal; the increase in computational cost is due to the increase of search space when the observation model is unlikely representing the target. Note that the optimal number of samples deployed in the PF and MCMC throughout the sequences has been selected empirically; where it ranges from 150 to 1000 particles in PF, 600 to 1000 particles in MCMC with 600 iterations while SwaTrack uses 10-50 particles with 5-70 iterations. Intuitively, an increase in the number of samples would lead to an increase in computational cost as each particle would need to be evaluated against the appearance observation; elucidating the minimal processing time required by the proposed SwaTrack. As shown in Table 1-2, in which the SwaTrack detection rate is Rank 2, though the CT [19] and A-WLMC [12] achieved better but their average processing time are almost increase by 3x compared to SwaTrack. As compared to the A-WLMC tracking which increases its subregions for sampling when the state space increases, our method adaptively increases and decreases its proposal variance for a more effective use of samples. Thus the processing time required is much lesser as compared to the other methods. The advantage of the dynamic mechanism is shown when comparing the processing time of SwaTrack to PSO (average of 195.20 milliseconds per frame); where the processing time of PSO is 3x more than that of SwaTrack. In summary, the experimental results demonstrate the capability of the proposed system to cope with the variety of scenario that exhibits highly abrupt motion. The adaptation of a stochastic optimisation method into tracking abrupt motion has been observed to incur not much additional processing cost, yet at the same time is able to have fair tracking accuracy as compared to the more sophisticated methods. Thus, the preliminary results give a promising indication that sophisticated tracking methods may not be necessary after all. 5.4. Qualitative Results Low Frame Rate The sequence aims to track a tennis player in a low-frame rate video, which is down-sampled from a 700 frames sequence by keeping one frame in every 20 frames. Here, the target (player) exhibits frequent abrupt changes which violate the smooth motion and constant velocity assumptions. Thus, motion that is governed by Gaussian distribution based on the Brownian or constant-velocity motion models will not work in this case. Fig. 6 shows sample shots to compare the performance between conventional PF tracking (500 samples), A-WLMC (600 samples) [14], IA-MCMC (300 samples)[16] and SwaTrack (50 samples). It is observed that the tracking accuracy of SwaTrack is better than PF and A-WLMC even by using fewer samples. While the performance of SwaTrack is comparable to IA-MCMC, SwaTrack requires fewer samples and thus requires less processing requirement. These results further verify that the proposed method is able to track the moving targets accurately and effectively, regardless of the variety of change in the target’s motion. Local Miminum Problem In this experiment, we aim to test the capability of SwaTrack to recover from incorrect tracking. This is to test the capability of the DAP and EF to handle the abrupt motion. Fig. 7 shows the result for Youngki where the camera switches. Due to this phenomenon, the subject will have a drastic change of position the adjacent image. It can be seen that the SwaTrack is able to cope with this problem. Secondly, we simulate another challenging scenario in which incorrect tracking is most likely to happen by sampling frames from 2 different datasets as shown in Fig.8 (a). The frames in the Boxing sequence are combined in an alternative manner with the frames from the Youngki sequence. In this combined sequence, the object-of-interest which is highlighted in the ellipse in Frame 1 of in Fig. 8 (a) tend to disappear from one frame and re-appear in the subsequent frame interchangeably. From the qualitative results shown in Fig. 8 (b), we observe that the A-WLMC tracking [14] is not robust and does not cope well with inaccurate tracking. When the object-of-interest disappear from the scene (i.e. Frame 77), the A-WLMC gives an erroneous estimation of the object. In the subsequent frame, where the object re-appears, the A-WLMC has difficulty to recover from its tracking such as shown in Frame 78 where the estimation does not fit the actual position of the object accurately. In the subsequent frames, the A-WLMC tend to continuously missed tracked of the object. Although the sampling efficiency in the A-WLMC adopts a more efficient proposal distribution as compared to the standard PF, it is still subjected to a certain degree of trapped in local optima. Furthermore, the A-WLMC utilizes the information of historical samples for intensive adaptation, thus requiring more frames information to recover from inaccurate tracking. The proposed SwaTrack on the other hand, is observed to work well in this experiment, where minimal frame is required to recover from erroneous tracking. As shown in Fig. 8 (c), the SwaTrack is able to track the object accurately when the object appear or re-appears in the scene (as shown in the even frame number). The inaccurate tracking in the odd frame number is reasonable as the object does not appear in those scenes. This is made possible due to the information exchange and cooperation 12 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 13 between particles in a swarm that provide a way to escape the local optima and reach the global maximum; leading to and optimised proposal distribution. Sensitivity to Object Size We further tested the proposed SwaTrack, PF [30, 31] and A-WLMC [14] on resized sequences of similar data to simulate scenario in which the object size is smaller. Thus, the initial frame size of 360x240 is reduced into half, to 180x120 pixels. From our observations, the SwaTrack is the least sensitive towards the size of object-of-interest, while the detection accuracy of the A-WLMC is reduced as the size of object gets smaller. This is due to the robustness of the optimised sampling in SwaTrack as compared to the least robust method of rejection and acceptance as proposed in the A-WLMC. The overall detection accuracy of the proposed SwaTrack remain at an average of 90% regardless of the object’s size whereas the detection accuracy of PF and A-WLMC decrease significantly by more than 25% when the object’s size decreases. Sample output is as shown in Fig. 9. Finally, we evaluated the proposed SwaTrack on videos obtained from Youtube and the qualitative results are as depicted in Fig. 10. Abrupt motion with Inconsistent Speed: The first aim to track a synthetic ball which moves randomly across the sequence with inconsistent speed, whilst the second sequence tracks a soccer ball which is being juggled in a free-style manner in a moving scene with a highly textured background (grass). It is observed that the SwaTrack is able to track the abrupt motion of the balls efficiently. Multiple targets: In the third sequence, we demonstrate the capability of the proposed system to track multiple targets; two simulated balls moving at random. Most of the existing solutions are focused on single target. 5.5. Sampling-based vs Iterative-based Solutions Motivated by the meta-level question prompted in [26] on whether there is a need to have more training data or better models for object detection, we raise similar question in the domain of this area; will continued progress in visual tracking be driven by the increased complexity of tracking algorithms? Intuitively, an increase in the number of samples in sampling-based tracking methods such as PF and MCMC would increase the tracking accuracy. One may also argue that the additional computational cost incurred in the iterative nature of the proposed SwaTrack and MCMC would complement the higher number of particles required by the PF. Thus, in order to investigate if these intuitions hold true, we perform experiments using an increasing number of samples and iterations. We then observe the behaviors of PF and SwaTrack in terms of accuracy and processing time with the increase in complexity. PF is chosen in this testing as it bears close resemblance to the proposed SwaTrack algorithm in which a swarm of particles are deployed for tracking. 5.5.1. Sample of Particles vs Accuracy Particle Filter: In the PF algorithm, we vary the number of samples or particles (i.e. 50, 100, · · · , 2000) used throughout the sequence to determine the statistical relationship between number of samples and performance. We gauge the performance by the detection accuracy (%) and processing time (in milliseconds per frame). The average performance across all 5 datasets (TableT) are as shown in Fig. 11a. Sample of the performance for sequence T ableT 1 and T ableT 2 are as shown in Fig. 12. The results demonstrate that the number of particles used in PF is correlated to the detection accuracy; where the increase in the number of particles tends to increase the accuracy. Similarly, the average time taken also increases exponentially as the number of particles used in PF grows. This alludes the fact that as the number of particles increase, the estimation processes which include object representation, prediction and update also multiply. However, it is observed that PF reaches plateau after hitting the optimal accuracy, after which any increase in the number of particles will either have a decrease in accuracy or no significant improvement. From Fig. 11, we can see the detection accuracy decreases after the optimal solution, which is given when the number of particles are 600. Our findings provoke the underlying assumption that the increase of number of particles will lead to an increase in the accuracy. Thus, we raise the question of whether complex (in this context the complexity is proportional to the number of particles deployed) tracking methods are really necessary? Also, the best parameter configurations may differ from one sequence to another due to the different motion behaviour portrayed by the object in each sequence. For example, in Fig. 12(a), the optimal setting is 250 particles which produces detection accuracy of 55% and takes 1.78 seconds of processing time. Whilst the second sequence has a different optimal setting of 150 particles as shown in Fig. 12(b). This advocates the notion as in [10] that motion models indeed only work for sometimes. SwaTrack: Similarly, we perform the different parameter settings test on the proposed SwaTrack algorithm and the average results are demonstrated in Fig. 11b, while Fig. 13 illustrate the results for T ableT 1 and T ableT 2. 13 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 14 In addition to the number of particles used in PF tracking, the proposed SwaTrack has an additional influencing parameter, the maximum number of iterations. We vary the number of particles against the number of iterations for fair evaluation. As illustrated in the left y-axis of the chart (bottom graph), we can see that the average processing time increases as the number of iterations increase. However, the increment seems to be valid until it reaches a maximal value; in which any increase in the iterations would not incur much difference in its processing time. Notice that the processing time for different higher number of iterations (55 & 70) tend to overlap with one another, demonstrating minimal increase in processing time as the number of iterations grows. This is due to the optimisation capability of the proposed SwaTrack to terminate its search upon convergence, regardless of the defined number of iterations. This is particularly useful in ensuring efficient search for the optimal solution, with minimal number of particles. As for the detection accuracy, we can see that in general the average accuracy of the proposed SwaTrack is higher than PF, with an average accuracy of 92.1% in the first sequence as shown in Fig. 13a. The sudden decrease in accuracy for SwaTrack tracking with 70 number of iterations as shown in Fig. 13a may be due to the erratic generation of random values in C++ implementation. This behaviour is not observed in other sequences, where their detection accuracy is consistent across frames. Thus far, we take an average result for each test case over 10 runs to ensure reliable results and we believe that with a higher number of runs, we would be able to obtain unbiased results without outliers. In summary, the results further validate our findings that the proposed SwaTrack is able to achieve better accuracy as compared to PF, whilst requiring only about 10% of the number of samples used in PF with minimal number of iterations. This is made possible by an iterative search for the optimal proposal distribution, incorporating available observations rather than making strict assumptions on the motion of an object. Thus, we believe that the findings from our study create prospects for a new paradigm of object tracking. Again, we raise the question if there is a need to make complex existing tracking methods by fusing different models and algorithms to improve tracking efficiency? Would simple optimisation methods be sufficient? 5.5.2. Number of Samples vs Processing Time Particle Filter: In the PF algorith,m we vary the number of samples or particles (i.e. 50, 100, · · · , 2000) used throughout the sequence to determine the statistical relationship between number of samples and detection accuracy. The lowest value of the parameter value is determined based on the minimal configuration to allow tracking while the highest value is set to the maximal configuration before it reaches a plateau detection accuracy. The detection accuracy and performance of the PF algorithm with different parameter settings are as shown in Fig. 14-18a. The results demonstrate that the number of particles used in PF is correlated to the detection accuracy; where the increases in the number of particles tend to increase the accuracy. Similarly, the average time taken also increases as the number of particles used in PF grows. This alludes the fact that as the number of particles increase, the estimation processes which include object representation, prediction and update also multiply. However, it is observed that PF reaches a plateau detection accuracy after hitting the optimal accuracy, after which any increase in the number of particles will either have a decrease in accuracy or no significant improvement. Thus, the underlying assumption that the increase of number of particles will lead to an increase in the accuracy does not hold true. This may be due to the resampling step in most PF algorithms that is highly prone to error propagation. Also, the best parameter configurations may differ from one sequence to another due to the different motion behaviour portrayed by the object in each sequence. For example, in Fig. 14, the optimal setting is 250 number of particles which produces detection accuracy of 55% and takes 1.78 seconds of processing time. Note that in this set of experiments, other parameters such as the mean and variance for the Gaussian distribution in PF is not optimal values as compared to the earlier experiment. A standard configuration of Gaussian white noise is used across frames. Thus, the results obtained may slightly differ. SwaTrack: Similarly, we perform the different parameter settings test on the proposed SwaTrack algorithm and the results are demonstrated in Fig. 14-18b. In addition to the number of particles used in PF tracking, the proposed SwaTrack has an additional influencing parameter, the maximum number of iterations. Thus, here we vary the number of particles against the number of iterations and obtain their detection accuracy. As illustrated in the left y-axis of the chart (bottom graph), we can see that the average processing time increases as the number of iterations increase. However, the processing time taken reaches a maximal value, where the different number of iterations require almost comparable amount of time. This can be seen by the overlapping results as shown in Fig. 14-18b, in particular. This demonstrate that the effectiveness of the termination criteria in the proposed SwaTrack. When a global solution has been found by the entire swarm (swarm reaches convergence), the search activity terminates despite the initial setting value of the number of iterations. Also, our proposed method which automatically changes the number of iterations 14 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 15 according to the swarms search quality allows a self-tuned setting of the maximum iteration number. As for the detection accuracy, we can see that in general the average accuracy of the proposed SwaTrack is higher than PF, with an average accuracy of 92.1% in the first sequence as shown in Fig. 14b. In summary, the results further validate our findings that the proposed SwaTrack is able to achieve better accuracy as compared to PF, whilst requiring only about 10% of the number of samples used in PF with minimal number of iterations. 5.5.3. Sampling Strategy To further evaluate the robustness of the proposed algorithm as well as to understand the behaviours of other algorithms when tracking abrupt motion, we perform the sampling strategy test. In this test, we simulate the scenario of receiving inputs from the sensors with a lower frame rate by downsampling the number of frames from the test sequence; assuming the actual data are obtained at normal rate of 25 frames per second to a lower rate of 5 frames per second. Fig. 19 demonstrates the detection accuracy between the proposed SwaTrack and PF for all four sequences by down-sampling each sequence to simulate the 5 frames per second scenario. Note that the detection accuracy is determined by comparing the ground truth for the sampled frames only. However, it is observed that in general the proposed SwaTrack has better detection accuracy as compared to PF in both situations; with and without sampling. The average detection accuracy of SwaTrack for the complete sequences is about 95.5% whereas the average for PF is about 62.5%. During sampling, the average detection of accuracy of SwaTrack is about 77.25% whereas PF is about 32.75%. We can see that the detection accuracy of PF drops drastically when the frame rate decreases. This is because, in low frame rate videos, the target tends to have abrupt motion and thus, methods that assume Gaussian distribution in its dynamic motion model such as PF fail in such cases. The changes between detection accuracy on complete and sampled sequence is as indicated in red in Fig. 19. SwaTrack on the other hand, copes better with low frame rate with an average accuracy of more than 70% although there is a decrease in its efficiency. This is because, the proposed SwaTrack algorithm allows iterative adjustment of the exploration and exploitation of the swarm in search for the optimal motion model without making assumptions on the target’s motion. We can thus conclude that the proposed SwaTrack algorithm is able to cope with scenarios where the frame rate is low. 6. Conclusions In this paper, we presented a novel swarm intelligence-based tracker for visual tracking that copes with abrupt motion efficiently. The proposed SwaTrack optimised the search for the optimal distribution without making assumptions or need to learn the motion model before-hand. In addition, we introduced an adaptive mechanism that detects and responds to changes in the search environment to allow on the tuning of the parameters for a more accurate and effective tracking. Experimental results show that the proposed algorithm improves the accuracy of tracking while significantly reduces the computational overheads, since it requires less than 20% of the samples used by PF. In future, we would like to further investigate the robustness of the proposed method as well as its behaviour change with the different parameter settings and sampling strategy. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] H. Yang, L. Shao, F. Zheng, L. Wang, Z. Song, Recent advances and trends in visual tracking: A review, Neurocomp. 74 (2011) 3823–3831. A. Yilmaz, O. Javed, M. Shah, Object tracking: A survey, ACM Comp. Surv. 38. G. Welch, G. Bishop, An introduction to the kalman filter (1995). E. A. Wan, R. Van Der Merwe, The unscented kalman filter for nonlinear estimation, in: AS-SPCC, 2000, pp. 153–158. M. Oussalah, J. D. Schutter, Possibilistic kalman filtering for radar 2d tracking, Information Sciences 130 (14) (2000) 85 – 107. M. Isard, A. Blake, Condensationconditional density propagation for visual tracking, IJCV 29 (1) (1998) 5–28. M. S. Arulampalam, S. Maskell, N. Gordon, T. Clapp, A tutorial on particle filters for online nonlinear/non-gaussian bayesian tracking, IEEE TSP 50 (2) (2002) 174–188. Efficient visual tracking using particle filter with incremental likelihood calculation, Information Sciences 195 (2012) 141 – 153. L. Ellis, N. Dowson, J. Matas, R. Bowden, Linear regression and adaptive appearance models for fast simultaneous modelling and tracking, IJCV 95 (2) (2011) 154–179. F. J. Cristina Garca Cifuentes, Marc Sturzel, G. J. Brostow, Motion models that only work sometimes, in: BMVC, 2012, pp. 1–12. Y. Li, H. Ai, T. Yamashita, S. Lao, M. Kawade, Tracking in low frame rate video: A cascade particle filter with discriminative observers of different life spans, IEEE TPAMI 30 (10) (2008) 1728–1740. 15 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] 16 J. Kwon, K. M. Lee, Tracking of abrupt motion using wang-landau monte carlo estimation, in: ECCV, pp. 387–400. J. Kwon, K. M. Lee, Visual tracking decomposition, in: CVPR, 2010, pp. 1269–1276. J. Kwon, K. M. Lee, Wang-landau monte carlo-based tracking methods for abrupt motions, IEEE TPAMI 35 (4) (2013) 1011–1024. X. Zhang, W. Hu, X. Wang, Y. Kong, N. Xie, H. Wang, H. Ling, S. Maybank, A swarm intelligence based searching strategy for articulated 3d human body tracking, in: CVPRW, 2010, pp. 45–50. X. Zhou, Y. Lu, J. Lu, J. Zhou, Abrupt motion tracking via intensively adaptive markov-chain monte carlo sampling, IEEE TIP 21 (2012) 789 –801. R. Eberhart, J. Kennedy, A new optimizer using particle swarm theory, in: MHS, 1995, pp. 39–43. A study of particle swarm optimization particle trajectories, Information Sciences 176 (8) (2006) 937 – 971. X. Zhang, W. Hu, S. Maybank, X. Li, M. Zhu, Sequential particle swarm optimization for visual tracking, in: CVPR, 2008, pp. 1–8. G. Tong, Z. Fang, X. Xu, A particle swarm optimized particle filter for nonlinear system state estimation, in: CEC, 2006, pp. 438 –442. F. Neri, E. Mininno, G. Iacca, Compact particle swarm optimization, Information Sciences 239 (2013) 96 – 121. W. Li, X. Zhang, W. Hu, Contour tracking with abrupt motion, in: ICIP, 2009, pp. 3593–3596. K. C. P. Wong, L. S. Dooley, Tracking table tennis balls in real match scenes for umpiring applications, BJMCS 1(4) (2011) 228–241. Y. Liu, S. Lai, B. Wang, M. Zhang, W. Wang, Feature-driven motion model-based particle-filter tracking method with abrupt motion handling, Opt. Eng. 51(4). I. Zuriarrain, F. Lerasle, N. Arana, M. Devy, An mcmc-based particle filter for multiple person tracking, in: ICPR, 2008, pp. 1–4. X. Zhu, C. Vondrick, D. Ramanan, C. Fowlkes, Do we need more training data or better models for object detection?, in: BMVC, 2012, pp. 1–11. X. Zhang, W. Hu, S. Maybank, A smarter particle filter, in: ACCV, Springer, 2010, pp. 236–246. Y. Shi, R. Eberhart, A modified particle swarm optimizer, in: WCCI, 1998, pp. 69–73. L. P. Kaelbling, M. L. Littman, A. W. Moore, Reinforcement learning: a survey, JAIR 4 (1996) 237–285. F. Yan, W. Christmas, J. Kittler, A tennis ball tracking algorithm for automatic annotation of tennis match, Sig. Proc. (2005) 619–628. E. Maggio, A. Cavallaro, Accurate appearance-based bayesian tracking for maneuvering targets, CVIU 113 (4) (2009) 544–555. A. Adam, E. Rivlin, I. Shimshoni, Robust fragments-based tracking using the integral histogram, in: CVPR, 2006, pp. 798–805. K. Smith, D. Gatica-Perez, J. Odobez, S. Ba, Evaluating multi-object tracking, in: CVPRW, 2005, pp. 36–36. M. Everingham, L. Gool, C. K. Williams, J. Winn, A. Zisserman, The pascal visual object classes (voc) challenge, IJCV 88 (2010) 303–338. A. Torralba, A. A. Efros, Unbiased look at dataset bias, in: CVPR, 2011, pp. 1521–1528. 16 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 17 (a) Sample detections from PF. (b) Sample detections from SwaTrack. (c) Sample detections from A-WLMC. (d) Sample detections from IA-MCMC. Figure 6. A comparison between PF, SwaTrack, A-WLCM [14] and IA-MCMC [16]. It is observed that the SwaTrack tracking gives a more accurate fit of the state. 17 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 18 (a) Sample of SwaTrack on Boxing sequence. (b) Sample of SwaTrack on Youngki sequence. Figure 7. Sample outputs to demonstrate the flexibility of the proposed SwaTrack to recover from incorrect tracking. Minimal frames (1-2frames) are required to escape from local optima and achieve global maximum. (a) Sample shots of the dataset that is obtained by combining frames from two different sequences. The object enclosed in the ellipse is the object to be tracked. (b) Sample detections by the A-WLMC tracking. A-WLMC tend to tracked the object inaccurately once it has lost or missed tracked of the object as shown from Frame 79 onwards. (c) Sample detections by the SwaTrack tracking. In Frame 77, since the object-of-interest does not appear in the frame, inaccurate tracking happens. However, the SwaTrack is able to recover its tracking at the following frame, Frame 78. Figure 8. Sample outputs to demonstrate the capability to recover from incorrect tracking. 18 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 (a) Sample detections from A-WLMC on reduced image size. A-WLMC has a high tendency to lost track of the object when it moves abruptly, and demonstrate continuous inaccurate tracking such as shown in Frame 279-284. Note that for similar frames, MCMC is able to track the object accurately when the image size is larger. Number of iterations = 600, particles = 600. (b) Sample detections from SwaTrack on reduced image size. SwaTrack produces consistent tracking as compared to PF and A-WLMC, regardless of the size of object. Number of iterations = 30, particles =20. Figure 9. Qualitative Results: Comparison between A-WLMC and Our Proposed Method in term of different image size. Figure 10. Sample shots of tracking results on our proposed method. 19 19 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 (a) PF 20 (b) SwaTrack Figure 11. A comparison between PF and SwaTrack in terms accuracy vs different number of samples and accuracy vs different number of samples and iteration (a) Sequence 1. (b) Sequence 2. Figure 12. The accuracy and performance of PF with different number of samples for T ableT 1 − 2. (a) Sequence 1. (b) Sequence 2. Figure 13. The accuracy and performance of SwaTrack with different number of samples and iterations for T ableT 1 − 2. 20 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 (a) PF (b) SwaTrack Figure 14. TableTennis 1: The accuracy and performance of PF/SwaTrack with different parameter settings (a) PF (b) SwaTrack Figure 15. TableTennis 2: The accuracy and performance of PF with different parameter settings (a) PF (b) SwaTrack Figure 16. TableTennis 3: The accuracy and performance of PF with different parameter settings 21 21 M.K. Lim et al. / Information Sciences 00 (2014) 1–16 (a) PF (b) SwaTrack Figure 17. TableTennis 4: The accuracy and performance of PF with different parameter settings (a) PF (b) SwaTrack Figure 18. TableTennis 5: The accuracy and performance of PF with different parameter settings Figure 19. The detection accuracy of SwaTrack against PF during sampling for sequence 1 to 4. 22 22
9cs.NE
Adapting the Bron-Kerbosch Algorithm for Enumerating Maximal Cliques in Temporal Graphs∗ arXiv:1605.03871v2 [cs.DS] 2 May 2017 Anne-Sophie Himmel1 , Hendrik Molter1 , Rolf Niedermeier1 , and Manuel Sorge2 1 Institut für Softwaretechnik und Theoretische Informatik, TU Berlin, Germany, [email protected], {h.molter, rolf.niedermeier}@tu-berlin.de 2 Ben Gurion University of the Negev, Department of Industrial Engineering and Management, Be’er Sheva, Israel, [email protected] May 3, 2017 Abstract Dynamics of interactions play an increasingly important role in the analysis of complex networks. A modeling framework to capture this are temporal graphs which consist of a set of vertices (entities in the network) and a set of time-stamped binary interactions between the vertices. We focus on enumerating ∆-cliques, an extension of the concept of cliques to temporal graphs: for a given time period ∆, a ∆-clique in a temporal graph is a set of vertices and a time interval such that all vertices interact with each other at least after every ∆ time steps within the time interval. Viard, Latapy, and Magnien [ASONAM 2015, TCS 2016] proposed a greedy algorithm for enumerating all maximal ∆-cliques in temporal graphs. In contrast to this approach, we adapt the Bron-Kerbosch algorithm—an efficient, recursive backtracking algorithm which enumerates all maximal cliques in static graphs—to the temporal setting. We obtain encouraging results both in theory (concerning worst-case running time analysis based on the parameter “∆-slice degeneracy” of the underlying graph) as well as in practice1 with experiments on real-world data. The latter culminates in an improvement for most interesting ∆-values concerning running time in comparison with the algorithm of Viard, Latapy, and Magnien. ∗ A preliminary version of this article appeared in the Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining [10]. Parts of this work are based on the first author’s Bachelor thesis at TU Berlin [9]. 1 Code freely available at http://fpt.akt.tu-berlin.de/temporalcliques/ (GNU General Public License). 1 1 Introduction Network analysis is one of the main pillars of data science. Focusing on networks that are modeled by undirected graphs, a fundamental primitive is the identification of complete subgraphs, that is, cliques. This is particularly true in the context of detecting communities in social networks. Finding a maximum-cardinality clique in a graph is a classical NP-hard problem, so super-polynomial worst-case running time seems unavoidable. Moreover, often one wants to solve the more general task of not only finding one maximum-cardinality clique but to list all maximal cliques. Their number can be exponential in the graph size. The famous Bron-Kerbosch algorithm (“Algorithm 457” in Communications of the ACM 1973, [3]) addresses this task and still today forms the basis for the best (practical) algorithms to enumerate all maximal cliques in static graphs [4]. However, to realistically model many real-world phenomena in social and other network structures, one has to take into account the dynamics of the modeled system of interactions between entities, leading to so-called temporal networks. In a nutshell, compared to the standard static networks, the interactions in temporal networks (edges) appear sporadically over time (while the vertex set remains static). Indeed, as Nicosia et al. [22] pointed out, in many realworld systems the interactions among entities are rarely persistent over time and the non-temporal interpretation is an “oversimplifying approximation”. In this work, we use the standard model of temporal graphs. A temporal graph consists of a vertex set and a set of edges, each with an integer timestamp. The generalization of a clique to the temporal setting that we study is called ∆-clique and was introduced by Viard et al. [28, 29]. Intuitively, being in a ∆-clique means to be regularly in contact with all other entities in this ∆-clique. In slightly more formal terms, each pair of vertices in the ∆-clique has to be in contact in at least every ∆ time steps. A fully formal definition is given in Section 2. We present an adaption of the framework of Bron and Kerbosch to temporal graphs. To this end, we overcome several conceptual hurdles and propose a temporal version of the Bron-Kerbosch algorithm as a new standard for efficient enumeration of maximal ∆-cliques in temporal graphs. 1.1 Related Work Our work relates to two main lines of research. First, enumerating ∆-cliques in temporal graphs generalizes the enumeration of maximal cliques in static graphs, this being subject of many different algorithmic approaches (sometimes also exploiting specific properties such as the “degree of isolation” of the cliques searched for) [3, 4, 12, 14, 16, 25]. Indeed, clique finding is a special case of dense subgraph detection. Second, more recently, mining dynamic or temporal networks for periodic interactions [17] or preserving 2 structures [26] (in particular, this may include cliques as a very fundamental pattern) has gained increased attention. Our work is directly motivated by the study of Viard et al. [28, 29] who introduced the concept of ∆-cliques and provided a corresponding enumeration algorithm for ∆-cliques. In fact, following one of their concluding remarks on future research possibilities, we adapt the Bron-Kerbosch algorithm to the temporal setting, thereby outperforming their greedy-based approach in most cases. 1.2 Results and Organization Our main contribution is to adapt the Bron-Kerbosch recursive backtracking algorithm for clique enumeration in static graphs to temporal graphs. In this way, we achieve a significant speedup for most interesting time period values ∆ (typically two orders of magnitude of speedup) when compared to a previous algorithm due to Viard et al. [28, 29] which is based on a greedy approach. We also provide a theoretical running time analysis of our Bron-Kerbosch adaption employing the framework of parameterized complexity analysis. The analysis is based on the parameter “∆-slice degeneracy” which we introduce, an adaption of the degeneracy parameter that is frequently used in static graphs as a measure for sparsity. This extends results concerning the static Bron-Kerbosch algorithm [4]. A particular feature to achieve high efficiency of the standard Bron-Kerbosch algorithm is the use of pivoting, a procedure to reduce the number of recursive calls of the Bron-Kerbosch algorithm. We show how to define this and make it work in the temporal setting, where it becomes a significantly more delicate issue than in the static case. In summary, we propose our temporal version of the Bron-Kerbosch approach as a current standard for enumerating maximal cliques in temporal graphs. The paper is organized as follows. In Section 2, we introduce all main definitions and notations. In addition, we give a description of the original Bron-Kerbosch algorithm as well as two extensions: pivoting and degeneracy ordering. In Section 3, we propose an adaption of the Bron-Kerbosch algorithm to enumerate all maximal ∆-cliques in a temporal graph, prove the correctness of the algorithm and give a running time upper bound. Furthermore, we adapt the idea of pivoting to the temporal setting. In Section 4 we adapt the concept of degeneracy to the temporal setting and give an improved running time bound for enumerating all maximal ∆-cliques. In Section 5, we present the main results of the experiments on real-world data sets. We measure the ∆-slice degeneracy of real-world temporal graphs, we study the efficiency of our algorithm, and compare its running time to the algorithm of Viard et al. [28], showing a significant performance increase due to our Bron-Kerbosch approach. We conclude in Section 6, also presenting directions for future research. 3 2 Preliminaries In this section we introduce the most important notations and definitions used throughout this article. 2.1 Graph-Theoretic Concepts In the following we provide definitions of adaptations to the temporal setting for central graph-theoretic concepts. 2.1.1 Temporal Graphs The motivation behind temporal graphs, which are also referred to as temporal networks [11], time-varying graphs [22], or link streams [28], is to capture changes in a graph that occur over time. In this work, we use the well-established model where each edge is given a time stamp [2, 11, 28]. Assuming discrete time steps, this is equivalent to a sequence of static graphs over a fixed set of vertices [5, 19]. Formally, the model is defined as follows. Definition 1 (Temporal Graph). A temporal graph G = (V, E, T ) is defined  as a triple consisting of a set of vertices V , a set of time-edges E ⊆ V2 ×T , and a time interval T = [α, ω], where α, ω ∈ N, T ⊆ N and ω − α is the lifetime of the temporal graph G.  The notation V2 describes the set of all possible undirected edges {v1 , v2 } with v1 6= v2 and v1 , v2 ∈ V . A time-edge e = ({v1 , v2 }, t) ∈ E can be interpreted as an interaction between v1 and v2 at time t. Note that we will restrict our attention to discretized time, implying that changes only occur at discrete points in time. This seems close to a natural abstraction of real-world dynamic systems and “gives the problems a purely combinatorial flavor” [20]. 2.1.2 ∆-Cliques A straightforward adaptation of a clique to the temporal setting is to additionally assign a lifetime I = [a, b] to it, that is, the largest time interval such that the clique exists in each time step in said interval. However, this model is often too restrictive for real-world data. For example, if the subject matter of examination is e-mail traffic and the data set includes e-mails with time stamps including seconds, we are not interested in people who sent e-mails to each other every second over a certain time interval, but we would like to know which groups of people were in contact with each other, say, at least every seven days over months. One possible approach would be to generalize the time stamps, taking into account only the week an e-mail was sent, resulting in a loss of accuracy in the data set. The constraint of each pair of vertices being connected in each time step can be relaxed by introducing an 4 additional parameter ∆, quantifying how many time steps may be skipped between two connections of any vertex pair. These so-called ∆-cliques were introduced by Viard et al. [28, 29] and are formally defined as follows. Definition 2 (∆-Clique). Let ∆ ∈ N. A ∆-clique in a temporal graph G = (V, E, T ) is a tuple C = (X, I = [a, b]) with X ⊆ V , b − a ≥ ∆, and I ⊆ T such that for all τ ∈ [a, b − ∆] and for all v, w ∈ X with v 6= w there exists a ({v, w}, t) ∈ E with t ∈ [τ, τ + ∆]. In other words, for a ∆-clique C = (X, I) all pairs of vertices in X interact with each other at least after every ∆ time steps during the time interval I. We implicitly exclude ∆-cliques with time intervals smaller than ∆. It is evident that the parameter ∆ is a measurement of the intensity of interactions in ∆-cliques. Small ∆-values imply that the interaction between vertices in a ∆-clique has to be more frequent than in the case of large ∆values. The choice of ∆ depends on the data set and the purpose of the analysis. We can also consider ∆-cliques from another point of view. For a given temporal graph G = (T, V, E) and a ∆ ∈ N, the static graph G∆ τ = (Vτ , Eτ ) describes all contacts that appear within the ∆-sized time window [τ, τ + ∆] with τ ∈ [α, ω − ∆] in the temporal graph G, that is Vτ = V and for every {v1 , v2 } ∈ Eτ there is a time step t ∈ [τ, τ + ∆] such that ({v1 , v2 }, t) ∈ E. The existence of a ∆-clique C = (X, I = [a, b]) indicates that all vertices in X form a clique in all static graphs G∆ τ with τ ∈ [a, b − ∆]. This implies that all vertices in X are pairwise connected to each other in the static graphs of all sliding, ∆-sized time windows from time a until b − ∆. By setting ∆ to the length of the whole lifetime of the temporal graph, every ∆-clique corresponds to a normal clique in the underlying static graph that results from ignoring the time stamps of the time-edges. We are most interested in ∆-cliques that are not contained in any other ∆-clique. For this we also need to adapt the notion of maximality to the temporal setting [28, 29]. Let G be a temporal graph. We call a ∆-clique C = (X, I) in G vertex-maximal if we cannot add any vertex to X without having to decrease the clique’s lifetime I. That is, there is no ∆-clique C 0 = (X 0 , I 0 ) in G with I ⊆ I 0 and X ( X 0 . We say that a ∆-clique is time-maximal if we cannot increase the lifetime I without having to remove vertices from X. That is, there is no ∆-clique C 0 = (X 0 , I 0 ) in G with I ( I 0 and X ⊆ X 0 . We call a ∆-clique maximal if it is both vertex-maximal and time-maximal. 2.1.3 ∆-Neighborhood, ∆-Cut, and other Temporal Graph Concepts In this section, we introduce and define further graph theoretical concepts that need to be adapted to the temporal setting. 5 We refer to a tuple (v, I = [a, b]) with v ∈ V and I ⊆ T as a vertexinterval pair of a temporal graph. We call a the starting point of interval I and b the endpoint of interval I. Let X be a set of vertex-interval pairs. The modified element relation (v, I) @ − X (temporal membership) expresses that there exists a vertex-interval pair (v, I 0 ) ∈ X with I ⊆ I 0 . Using these definitions, we can adapt the notion of a neighborhood of a vertex to temporal graphs. Intuitively, we want that two vertex-interval pairs are neighbors if they can be put into a ∆-clique together. Definition 3 (∆-Neighborhood). For a vertex v ∈ V and a time interval I ⊆ T in a temporal graph, the ∆-neighborhood N ∆ (v, I) is the set of all vertex-interval pairs (w, I 0 = [a0 , b0 ]) with the property that for every τ ∈ [a0 , b0 − ∆] at least one edge ({v, w}, t) ∈ E with t ∈ [τ, τ + ∆] exists. Furthermore, b0 − a0 ≥ ∆, I 0 ⊆ I, and I 0 is maximal, that is, there is no time interval I 00 ⊆ I with I 0 ⊂ I 00 satisfying the properties above. Notice that being a ∆-neighbor of another vertex is a symmetric relation. If (w, I 0 ) @ − N ∆ (v, I), then we say that w is a v∆-neighbor of v during the time interval I 0 . In Figure 1, we visualize the concepts of ∆-neighborhood and ∆-clique in a temporal graph. See also Example 1 below. We need to define a suitable way of intersecting of two sets of vertexinterval pairs, so that, as the intuition suggests, a ∆-clique is just the intersection of the “closed” ∆-neighborhoods2 of its elements over the lifetime of the clique. Definition 4 (∆-Cut). Let X and Y be two sets of vertex-interval pairs. The ∆-cut X uY contains for each vertex, all intersections of intervals in X and Y that are of size at least ∆. More precisely, X u Y = {(v, I ∩ I 0 ) | (v, I) ∈ X ∧ (v, I 0 ) ∈ Y ∧ |I ∩ I 0 | ≥ ∆}. In other words, the ∆-cut X u Y contains all vertex-interval pairs (v, I) such that (v, I) @ − X and (v, I) @ − Y , as well as |I| ≥ ∆, and I is maximal under these properties. That is, there is no J with I ( J and J ⊆ I 0 and J ⊆ I 00 such that (v, I 0 ) @ − X and (v, I 00 ) @ − Y for some I 0 and I 00 . Example 1. In Figure 1 we visualize a temporal graph and the concepts of ∆-neighborhood and ∆-clique. We consider a temporal graph G = (T, V, E) with T = [0, 8], V = {a, b, c}, E = {({a, b}, 2), ({a, b}, 3), ({a, c}, 4), ({b, c}, 5), ({a, c}, 6)}, and ∆ = 2. The vertices are visualized as horizontal lines. The connections between two vertices at a specific time step represent the timeedges of the temporal graph. We visualize the ∆-neighborhood of each vertex of the temporal graph over the whole time interval T in Figures 1(a)-1(c): 2 In static graphs, the closed neighborhood of a vertex includes the vertex itself. 6 0 1 2 3 4 5 6 7 8 5 6 7 8 5 6 7 8 5 6 7 8 a b c (a) N ∆ (a, T ) 0 1 2 3 4 a b c (b) N ∆ (b, T ) 0 1 2 3 4 a b c (c) N ∆ (c, T ) 0 1 2 3 4 a b c (d) Maximal ∆-Clique ({a, b, c} , [3 , 5]) Figure 1: ∆-Neighborhoods and a ∆-clique of a temporal graph with ∆ = 2. The lifetime of the graph is T = [0, 8]. The elements of the ∆-neighborhoods in (a), (b), and (c) are shaded in yellow and green (hatched), respectively. A maximal ∆-clique (d) is shaded in yellow. • In Figure 1(a), we consider the ∆-neighborhood N ∆ (a, T ) of vertex a during the whole time interval T . The yellow shaded bar marks the vertex-interval pair (b, [0, 5]) ∈ N ∆ (a, T ). The vertex b is a ∆neighbor of a during [0, 5] because for every τ ∈ [0, 5 − ∆ = 3] at 7 least one time-edge ({a, b}, t) ∈ E with t ∈ [τ, τ + ∆] exists since ({a, b}, 2), ({a, b}, 3) ∈ E. The same holds for the vertex-interval pair (c, [2, 8]) ∈ N ∆ (a, T ) which is marked in hatched green. • In Figure 1(b), we visualize the ∆-neighborhood N ∆ (b, T ) of b over the whole lifetime T of the temporal graph. The vertex-interval pair (c, [3, 7]) ∈ N ∆ (b, T ) is marked in hatched green. The vertex-interval pair (a, [0, 5]) ∈ N ∆ (b, T ) is shaded in yellow. It becomes evident that being a ∆-neighbor of another vertex is a symmetric relation—if a is a ∆-neighbor of b during [0, 5], then b is also a ∆-neighbor of a during [0, 5]. • In Figure 1(c), we visualize the ∆-neighborhood N ∆ (c, T ) of c over the whole lifetime T of the temporal graph. The vertex-interval pair (b, [3, 7]) ∈ N ∆ (c, T ) is marked in hatched green. The vertex-interval pair (a, [2, 8]) ∈ N ∆ (c, T ) is shaded in yellow. Figure 1(d) shows the maximal ∆-clique ({a, b, c}, [3, 5]). During the time interval [3, 5], a and b are ∆-neighbors, b and c are ∆-neighbors and a and c are ∆-neighbors, see Figures 1(a)-1(c). We cannot increase the time interval because at time step 2 the vertices b and c are not yet ∆-neighbors and at time step 6 the vertices a and b are no longer ∆-neighbors. Further nontrivial maximal ∆-cliques in this temporal graph are: ({a, b}, [0, 5]), ({a, c}, [2, 8]), ({b, c}, [3, 7]), as well as the trivial ∆-cliques ({a}, [0, 8]), ({b}, [0, 8]), and ({c}, [0, 8]). 2.2 Bron-Kerbosch Algorithm In this section, we explain the basic idea of the (static) Bron-Kerbosch algorithm. We also present two techniques known from the literature which improve the running time of the algorithm. The Bron-Kerbosch algorithm [3] enumerates all maximal cliques in undirected, static graphs. It is a widely used recursive backtracking algorithm which is easy to implement and more efficient than alternative algorithms in many practical applications [4]. The Bron-Kerbosch algorithm, see Algorithm 1, receives three disjoint vertex-sets as an input: P , R, and X. The set R induces a clique and P ∪ X is the set of all vertices which are adjacent to every vertex in R. Each vertex in P ∪X is a witness that the clique R is not maximal yet. The set P contains the vertices that have not been considered yet whereas the set X includes all vertices that have already been considered in earlier steps. In each recursive call, the algorithm checks whether the given clique R is maximal or not. If P ∪ X = ∅, then there are no vertices that can be added to the clique and therefore, the clique is maximal and can be added to the solution. Otherwise, the clique is not maximal because at least one vertex exists that 8 Algorithm 1 Enumerating all Maximal Cliques 1: function BronKerbosch(P, R, X) . R : a clique . P ∪ X : set of all vertices v such that R ∪ {v} is a clique and where • vertices in P have not yet been considered as additions to R and • vertices in X already have been considered in earlier steps 2: 3: 4: 5: 6: 7: 8: 9: 10: if P ∪ X = ∅ then add R to the solution end if for v ∈ P do BronKerbosch(P ∩ N (v), R ∪ {v}, X ∩ N (v))) P ← P \ {v} X ← X ∪ {v} end for end function is adjacent to all vertices in R and consequently would form a clique with R. For each v ∈ P the algorithm makes a recursive call for the clique R ∪ {v} and restricts P and X to the neighborhood of v. After the recursive call, vertex v is removed from P and added to X. This guarantees that the same maximal cliques are not detected multiple times. For a graph G = (V, E) the algorithm is initially called with P = V and R = X = ∅. 2.2.1 Pivoting Bron and Kerbosch [3] introduced a method to increase the efficiency of the basic algorithm by choosing a pivot element to decrease the number of recursive calls. It is based on the observation that for any vertex u ∈ P ∪ X either u itself or one of its non-neighbors must be contained in any maximal clique containing R. This is true since if neither u nor one of the non-neighbors of u are included in a clique containing R, then this clique cannot be maximal because u can be added to this clique due to the fact that only neighbors of u were added to R. Hence, if we modify the BronKerbosch algorithm (Algorithm 1) so that we choose an arbitrary pivot element u ∈ P ∪ X and iterate only over u and all its non-neighbors, then we still enumerate all maximal cliques containing R but decrease the number of recursive calls in the for-loop of Algorithm 1. Tomita et al. [25] have shown that if u is chosen from P ∪ X such that u has the most neighbors in P , then all maximal cliques of a graph G = (V, E) are enumerated in O(3|V |/3 ) time, see Algorithm 2. 9 Algorithm 2 Enumerating all Maximal Cliques in a Graph with Pivoting 1: function BronKerboschPivot(P, R, X) . R : a clique . P ∪ X : set of all vertices v such that R ∪ {v} is a clique and where • vertices in P have not yet been considered as additions to R and • vertices in X already have been considered in earlier steps 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: if P ∪ X = ∅ then add R to the solution end if choose pivot vertex u ∈ P ∪ X with |P ∩ N (u)| = max | P ∩ N (v) | v∈P ∪X for v ∈ P \ N (u) do BronKerboschPivot(P ∩ N (v), R ∪ {v}, X ∩ N (v))) P ← P \ {v} X ← X ∪ {v} end for end function 2.2.2 Degeneracy of a Graph Degeneracy is a measure of graph sparsity. Real-world instances of static graphs (especially social networks) are often sparse, resulting in a small degeneracy value [4]. This motivates a modification of the Bron-Kerbosch algorithm which we present in this section and the complexity analysis of this algorithm parameterized by the degeneracy of the input graph. The degeneracy of a graph is defined as follows. Definition 5 (Degeneracy). The degeneracy of a static graph G is defined as the smallest integer d ∈ N such that each subgraph G0 of G contains a vertex v with degree at most d. If a graph has degeneracy d, we also call it d-degenerated. It is easy to see that the maximal clique size of a d-degenerated graph is at most d + 1: If there is a clique of size at least d + 2, then the vertices of this clique would form a subgraph in which every vertex v of the clique has a degree larger than d. For each d-degenerated graph there is a degeneracy ordering, which is a linear ordering of the vertices with the property that for every vertex v we have that at most d of its neighbors occur at a later position in the ordering. The degeneracy d and a corresponding degeneracy ordering for a graph G = (V, E) can be computed in linear time [4]: For graph G, the vertex with the smallest degree is selected in each step and removed from the graph until no vertex is left. The degeneracy of the graph is the highest degree of a vertex at the time the vertex has been removed from the graph and a corresponding degeneracy ordering is the order in which the vertices were removed from the graph. 10 Algorithm 3 Enumerating all Maximal Cliques in a Graph with Degeneracy Ordering 1: function BronKerboschDeg(P, R, X) . R : a clique . P ∪ X : set of all vertices v such that R ∪ {v} is a clique and where • vertices in P have not yet been considered as additions to R and • vertices in X already have been considered in earlier steps 2: 3: 4: 5: 6: 7: for vi in a degeneracy odering v0 , v1 , . . . , vn of G = (V, E) do P ← N (vi ) ∩ {vi+1 , . . . , vn−1 } X ← N (vi ) ∩ {v0 , . . . , vi−1 } BronKerboschPivot(P, {vi }, X) end for end function For a graph G = (V, E) with degeneracy d, Eppstein et al. [4] showed that using the degeneracy ordering of G in the outer-most recursive call and afterwards using pivoting, all maximal cliques can be enumerated in O(d·|V |· 3d/3 ) time, see Algorithm 3. In other words, enumerating maximal cliques is fixed-parameter tractable with respect to the parameter degeneracy d of the input graph. 3 Bron-Kerbosch Algorithm for Temporal Graphs We adapt the static Bron-Kerbosch algorithm to the temporal setting to enumerate all ∆-cliques, see Algorithm 4. The input of the algorithm consists of two sets P and X of vertex-interval pairs as well as a tuple R = (C, I), where C is a set of vertices and I a time interval. The idea is that in every recursive call of the algorithm, R is a time-maximal ∆-clique, and the sets P and X contain vertex-interval pairs that are in the ∆-neighborhood of every vertex in C during an interval I 0 ⊆ I. In particular, P ∪ X includes all vertex-interval pairs (v, I) for which (C ∪ {v}, I) is a time-maximal ∆clique. While each vertex-interval pair in P still has to be combined with R to ensure that every maximal ∆-clique will be found, for every vertexinterval pair (v, I 0 ) ∈ X every maximal ∆-clique (C 0 , I 00 ) with C ∪ {v} ⊆ C 0 and I 00 ⊆ I 0 has already been detected in earlier steps. We show below that if ∀(w, I 0 ) ∈ P ∪ X : I 0 ( I, then there is no vertex v that forms a ∆-clique together with C over the whole time interval I. Consequently, R = (C, I) is a maximal ∆-clique. In one step, for every vertex-interval pair (v, I 0 ) ∈ P a recursive call is initiated for the ∆-clique R0 = (C ∪ {v}, I 0 ) with all parameters restricted to the ∆-neighborhood of v in the time interval I 0 , that is, P u N ∆ (v, I 0 ) and X u N ∆ (v, I 0 ). For the set P 0 for example, we get a set of all time-maximal 11 Algorithm 4 Enumerating all Maximal ∆-Cliques 1: function BronKerboschDelta(P, R = (C, I), X) . R = (C, I) : time-maximal ∆-clique . P ∪ X : set of all vertex-interval pairs (v, I 0 ) such that I 0 ⊆ I and (C ∪ {v}, I 0 ) is a time-maximal ∆-clique and where • vertex-interval pairs in P have not yet been considered as additions to R and • vertex-interval pairs in X already have been considered in earlier steps 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: if ∀(w, I 0 ) ∈ P ∪ X : I 0 ( I then add R to the solution end if for (v, I 0 ) ∈ P do R0 ← (C ∪ {v}, I 0 ) P 0 ← P u N ∆ (v, I 0 ) X 0 ← X u N ∆ (v, I 0 ) BronKerboschDelta(P 0 , R0 , X 0 ) P ← P \ {(v, I 0 )} X ← X ∪ {(v, I 0 )} end for end function vertex-interval pairs (w, I 00 ) for which it holds that (w, I 00 ) @ − N ∆ (v, I 0 ) and 00 (w, I ) @ − P . This restriction is made so that for all (w, I 00 ) ∈ P 0 of the recursive call the vertex w is not only a ∆-neighbor of all x ∈ C but also of the vertex v during the time I 00 ⊆ I 0 . After the recursive call for ∆-clique (C ∪ {v}, I 0 ), the tuple (v, I 0 ) is removed from the set P and added to the set X to avoid that the same cliques are found multiple times. For a temporal graph G = (V, E, T ) and a given time period ∆, the initial call of Algorithm 4 to enumerate all maximal ∆-cliques in graph G is made with P = {(v, T ) | v ∈ V }, R = (∅, T ) and X = ∅. In the remainder of this document we will always assume that BronKerboschDelta is initially called with those inputs. 3.1 Analysis In the following, we prove the correctness of the algorithm and analyze its running time. We start with arguing that the sets P and X behave as claimed. Lemma 1. For each recursive call of BronKerboschDelta with R = d (C, I) and C 6= ∅, it holds that P ∪ X = v∈C N ∆ (v, I). 12 Proof. We prove this by induction on the recursion depth, that is, the number |C| of vertices in the clique in the current recursive call. In the initial call we have that C = ∅. In each iteration of the first call we have that P ∪ X = {(v, T ) | v ∈ V } since, whenever a vertex-interval pair is removed from P , then it is added to X, and initially P = {(v, T ) | v ∈ V }. For every recursive call of BronKerboschDelta with R0 = (C 0 , I 0 ), P 0 , and X 0 , and C 0 = {v} for some vertex v we have that P 0 = P u N ∆ (v, I 0 ) and X 0 = X u N ∆ (v, I 0 ). Hence, we get P 0 ∪ X 0 = {(v, T ) | v ∈ V } u N ∆ (v, I 0 ) = N ∆ (v, I 0 ). Now we assume that we are in a recursive call of BronKerboschDelta with R = (C, I), P , and |C| > 1. By the induction hypothesis we d X, where ∆ know that P ∪ X = v∈C N (v, I). Let (v, I 0 ) ∈ P be the vertex added to the ∆-clique, that is, in the next recursive call we have that R0 = (C 0 , I 0 ), with C 0 = C ∪ {v}, and P 0 = P u N ∆ (v, I 0 ) as well as X 0 = X u N ∆ (v, I 0 ). Then, P 0 ∪ X 0 = (P u N ∆ (v, I 0 )) ∪ (X u N ∆ (v, I 0 )) = (P ∪ X) u N ∆ (v, I 0 ) l = N ∆ (w, I) u N ∆ (v, I 0 ) w∈C = l N ∆ (w, I 0 ). w∈C 0 This proves the claim. Next, we show that the set R behaves as claimed, that is, R is indeed a time-maximal ∆-clique in each recursive call of BronKerboschDelta. Lemma 2. In each recursive call of BronKerboschDelta, R = (C, I) is a time-maximal ∆-clique. Proof. We show by induction on the recursion depth that R = (C, I) is a time-maximal ∆-clique and that all vertex-interval pairs (v, I 0 ) in P are ∆-neighbors during I 0 to all vertices in the ∆-clique R and that I 0 is maximal under this property. The algorithm is initially called with R = (∅, T ), which is a trivial time-maximal ∆-clique, and P = {(v, T ) | v ∈ V }, which fulfills the desired property since the initial ∆-clique is empty and T is the maximum time interval. In each recursive call BronKerboschDelta is called with (P u N ∆ (v, I 0 ), (C ∪ {v}, I 0 ), X u N ∆ (v, I 0 )) for some (v, I 0 ) ∈ P . By the induction hypothesis, v is a ∆-neighbor to all vertices in C during time interval I 0 , and I 0 is maximal. Hence, (C ∪ {v}, I 0 ) is a time-maximal ∆-clique. Furthermore, each vertex-interval pair (v 0 , I 00 ) in P u N ∆ (v, I 0 ) is in the ∆-neighborhood of each vertex-interval pair (v 00 , I 0 ) with v 00 ∈ C ∪{v}, 13 since it is both in P and hence in the ∆-neighborhood of each vertex in C and in N ∆ (v, I 0 ). The maximality of I 0 follows from the fact that the ∆-cut and ∆-neighborhood operations preserve maximality of intervals by definition. Now we can prove the correctness of the algorithm. Theorem 1 (Correctness of Algorithm 4). Let G = (V, E, T ) be a temporal graph. If algorithm BronKerboschDelta(P, R, X) is run on input (V × {T }, (∅, T ), ∅), then it adds all maximal ∆-cliques of G, and only these, to the solution. Proof. Let R∗ = (C ∗ , I ∗ ) be a maximal ∆-clique with |C ∗ | > 1. For a recursive call of BronKerboschDelta on (P, R, X), say that a vertex is a candidate, if there is an interval I with I ∗ ⊆ I such that (v, I) ∈ P . We show by induction on |C ∗ | − `, that for each ` = 0, 1, . . . , |C ∗ | there is a recursive call of BronKerboschDelta on (P, R = (C, I), X) with C ⊆ C ∗ and ` = |C ∗ \ C| candidates. Clearly, in the initial call, C = ∅ ⊆ C ∗ and each vertex in C ∗ is a candidate. Now assume that there is a recursive call with (P, R = (C, I), X) and C ⊆ C ∗ , and with ` − 1 = |C ∗ \ C| candidates. Consider the for-loop in that recursive call and consider the first vertex-interval pair (v, I 0 ) in that loop in which v is a candidate and I ∗ ⊆ I 0 . BronKerboschDelta proceeds with a recursive call on (P u N ∆ (v, I 0 ), R0 = (C ∪ {v}, I 0 ), X u N ∆ (v, I 0 )). Observe that each candidate except v remains a candidate also in this recursive call. Furthermore, |C ∗ \ (C ∪ {v})| = `. Thus, by induction there is a recursive call with the sets (P, R, X) in which R∗ = R. Since R∗ is maximal d 00 by assumption, for each vertex-interval pair (w, I ) ∈ v∈C ∗ N ∆ (v, I ∗ ) we have I 00 ( I ∗ . By Lemma 1 we have ∀(w, I 0 ) ∈ P ∪ X : I 0 ( I ∗ and hence, R∗ is added to the solution. Now assume that R = (C, I) is added to the solution. By Lemma 2, R is a time-maximal ∆-clique. By Lemma 1 and since P ∪ X = ∅, there is no vertex that can be added to R. Hence, R is a maximal ∆-clique. Next, we analyze the running time of BronKerboschDelta. We start with the following observation. Lemma 3. For every time-maximal ∆-clique R of a temporal graph G = (V, E, T ), there is at most one recursive call of BronKerboschDelta with R as an input. Proof. Assume that there are two recursive calls A and B of BronKerboschDelta with the same R = (C, I). Let R0 = (C 0 , I 0 ), with C 0 ⊂ C and I ⊆ I 0 , occur in the recursive call corresponding to the closest common ancestor of the recursive calls A and B in the recursion tree. Hence, 14 there are two vertex-interval pairs (v, J), (w, J 0 ) ∈ P that lead to the calls A and B, respectively, in the for loop. Consider the case v = w. Then, J and J 0 must overlap in at least ∆ time steps, because I ⊆ J, J 0 ⊆ I 0 . However, P is contained in the ∆cut of the ∆-neighborhoods of C 0 over I 0 and thus, for each vertex no two vertex-interval pairs in P overlap in ∆ time steps, a contradiction. Now consider the case v 6= w. Without loss of generality due to symmetry assume that (v, J) is processed first in the for loop. Then, when processing (w, J 0 ), pair (v, J) has been added to X. This is a contradiction to the fact that recursive call B outputs R, that is, it outputs a clique with time interval I ⊆ J. Hence, we have that there cannot be two recursive calls of BronKerboschDelta with R = (C, I). Now we upper-bound the running time for computing a ∆-cut. Lemma 4. Let X and Y be two sets of vertex-interval pairs with the following properties. • For every (v, I) ∈ X ∪ Y we have that |I| ≥ ∆, • for every (v, I) ∈ X and (v, I 0 ) ∈ X we have that |I ∩ I 0 | < ∆, • for every (v, I) ∈ Y and (v, I 0 ) ∈ Y we have that |I ∩ I 0 | < ∆, • X and Y are sorted lexicographically by first the vertex and then the starting point of the interval. Then the ∆-cut X u Y can be computed in O(|X| + |Y |) time such that it is also sorted lexicographically by first the vertex and then the starting point of the interval. Proof. The ∆-cut X u Y of two sets of vertex-interval pairs X and Y can be computed in the following way. For every vertex v, we do the following: 1. Select the first vertex-interval pairs (v, I) and (v, I 0 ) from X and Y , respectively. 2. If |I ∩ I 0 | > ∆, then add (v, I ∩ I 0 ) to the output (the ∆-cut). If the endpoint of I 0 is smaller than the endpoint of I, then replace (v, I 0 ) with the next vertex-interval pair in Y , otherwise replace (v, I) with the next vertex-interval pair in X. 3. Repeat Step 2 until all vertex-interval pairs containing vertex v are processed. Note that the intervals for each vertex v are added to the output in order of their starting point. Furthermore, by construction of the algorithm we have that for each (v, I) in the output, (v, I) is also in the ∆-cut X u Y . It remains to show that for all (v, I) ∈ X and (v, I 0 ) ∈ Y with |I ∩ I 0 | ≥ ∆ we have that (v, I ∩ I 0 ) is included in the output. Let I = [a, b] and I 0 = [a0 , b0 ]. At some point, the procedure processes in Step 2 for the first time one of (v, I) ∈ X or (v, I 0 ) ∈ Y . Without loss of generality, let (v, I) ∈ X be 15 processed first. If at the same time also (v, I 0 ) ∈ Y is processed, clearly, (v, I ∩ I 0 ) is added to the output, as required. Now assume that Step 2 processes some other vertex-interval pair (v, I 00 = [a00 , b00 ]) ∈ Y , a00 < a0 , together with (v, I) ∈ X. Since |I ∩ I 0 | ≥ ∆ and |I 0 ∩ I 00 | < ∆ we have that b00 < b and hence, (v, I) is not replaced in this step. Consequently, the procedure eventually adds (v, I ∩ I 0 ) to the output. In each step of the procedure at least one new vertex-interval pair is processed and each vertex-interval pair in X and Y is only processed once. Hence, the running time is in O(|X| + |Y |). Lemmata 3 and 4 allow us to upper-bound the running time of BronKerboschDelta depending on the number of different time-maximal ∆-cliques of the input graph. Theorem 2. Let G = (V, E, T ) be a temporal graph with x distinct timemaximal ∆-cliques. Then BronKerboschDelta enumerates all maximal ∆-cliques in O(x · |E| + |E| · |T |) time. Proof. We assume that all edges of the temporal graph are sorted by their time stamp. Note that this can be done in a preprocessing step in O(|E|·|T |) time using Counting Sort. Furthermore, we assume that for each vertex v, the ∆-neighborhood N ∆ (v, T ) is given. These neighborhoods can be precomputed in O(|E|) time, assuming that the edges are sorted by their time stamps. By Lemma 3 we know that for each time-maximal ∆-clique there is at most one recursive call of BronKerboschDelta. By charging the computation of P 0 , R0 , and X 0 to the corresponding recursive call, for each recursive call we compute a constant number of ∆-neighborhoods and ∆-cuts. The size of the sets P , X, and any ∆-neighborhood is upper-bounded by |E| and each of these sets has the property that for every (v, I) and (v, I 0 ) out of the same set we have that |I ∩ I 0 | < ∆. Given N ∆ (v, T ), N ∆ (v, I) can be computed in O(|E|) time for any I and by Lemma 4, a ∆-cut can be computed in O(|E|) time. Hence, all maximal ∆-cliques can be enumerated in O(x · |E| + |E| · |T |) time. We now use a general upper bound for the number of time-maximal ∆cliques in a temporal graph to bound the overall running time of BronKerboschDelta. Corollary 1. Let G = (V, E, T ) be a temporal graph. BronKerboschDelta enumerates all maximal ∆-cliques of G in O(2|V | · |T | · |E|) time. Proof. Note that the vertex set of each maximal ∆-clique induces a static clique in the static graph G underlying G that has an edge between two vertices if and only if there is a time-edge in G between these vertices at some time step. Furthermore, for each clique in G, there are at most |T | 16 maximal ∆-cliques because their time intervals are pairwise not contained in one-another. Hence, the number of time-maximal ∆-cliques of any temporal graph is upper-bounded by 2|V | ·|T |. By Theorem 2, we get an overall running time in O(2|V | · |T | · |E|). 3.2 Pivoting In this section, we explain how we can decrease the number of recursive calls of BronKerboschDelta by using pivoting. Recall that the idea of pivoting in the classic Bron-Kerbosch algorithm for static graphs is based on the observation that for any vertex u ∈ P ∪ X either u itself or one of its non-neighbors must be contained in any maximal clique containing R. Vertex u is also called pivot. A similar observation holds for maximal ∆-cliques in temporal graphs. Instead of vertices, however, we now choose vertex-interval pairs as pivots: For any (vp , Ip ) ∈ P ∪ X and any maximal ∆-clique Rmax = (Cmax , Imax ) with Imax ⊆ Ip , either vertex vp or one vertex w 6= vp which is not a ∆neighbor of vp during the time Imax , that is, (w, Imax ) 6@ − N ∆ (vp , Ip ), must be contained in Cmax . By choosing a pivot element (vp , Ip ) ∈ X ∪P we only have to iterate over all elements in P which are not in the ∆-neighborhood of the pivot element, see Algorithm 5. In other words, we do not have to make a recursive call for any (w, I 0 ) ∈ P which holds (w, I 0 ) @ − N ∆ (vp , Ip ). In Figure 2 we give an illustrative example for pivoting. In this example, we assume that the algorithm runs on a temporal graph such that the set P = {(a, [0, 8]), (b, [0, 4]), (c, [1, 3]), (c, [5, 8])} occurs within a recursive call of BronKerboschDeltaPivot. For simplicity, we show in Figure 2(a) only the subgraph containing the elements of P and the relation between these elements rather than displaying the whole graph. In Figure 2(b), we choose element (a, [0, 8]) (hatched) as pivot. It can be seen that the elements (b, [0, 4]) and (c, [5, 8]) lie completely in the ∆-neighborhood (dotted) of the pivot, that is, (b, [0, 4]), (c, [5, 8]) @ − N ∆ (a, [0, 8]). These two elements can therefore be left out in the iteration over the elements in P of the BronKerboschDelta. We only have to iterate over the pivot (a, [0, 8]) and the element (c, [1, 3]) which is not completely in the ∆-neighborhood of our chosen pivot. In Figure 2(c), we can see that for every maximal ∆-clique (C, I) with respect to P either a ∈ C, I ⊆ [0, 8] or c ∈ C, I ⊆ [1, 3]. The figure hence shows that iterating over the elements (b, [0, 4]) and (c, [5, 8]) will not find any maximal ∆-clique that we do not find via one of the elements (a, [0, 8]) and (c, [1, 3]). Next, we formally prove the correctness of this procedure. Proposition 1. For each ∆-clique R = (C, I) and a pivot element (vp , Ip ) ∈ P ∪ X, the following holds: for every Rmax = (Cmax , Imax ) with C ⊂ Cmax 17 0 1 2 3 4 5 6 7 8 a b c (a) P = {(a, [0, 8]), (b, [0, 4]), (c, [1, 3]), (c, [5, 8])} 0 1 2 3 4 5 6 7 8 a b c (b) Pivot (a, [0, 8]) with (b, [0, 4]), (c, [5, 8]) ∈ N ∆ (a, [0, 8]) 0 1 2 3 4 5 6 7 8 a b c (c) ∆-cliques Figure 2: A exemplary set P of BronKerboschDeltaPivot, a possible pivot element (hatched) including its ∆-neighborhood (dotted), and all maximal ∆-cliques with respect to set P , ∆ = 2. and Imax ⊆ Ip ⊆ I it either holds that vp ∈ Cmax or otherwise there is a vertex w ∈ Cmax that satisfies (w, I 0 ) ∈ P ∪ X, Imax ⊆ I 0 , and (w, Imax ) 6@ − N ∆ (vp , Ip ), and consequently (w, I 0 ) 6@ − N ∆ (vp , Ip ). Proof. Let Rmax = (Cmax , Imax ) be a maximal ∆-clique with C ⊂ Cmax and Imax ⊆ Ip ⊆ I. Assume that vp ∈ / Cmax and for each w ∈ Cmax it holds that (w, Imax ) @ − N ∆ (vp , Ip ). Consequently, for each w ∈ Cmax \ C there exists a (w, I 0 ) ∈ P ∪ X with Imax ⊆ I 0 . Because vp is a ∆-neighbor of all vertices in Cmax \ C at least during Imax and a ∆-neighbor of all vertices in C during Ip , the vertex vp can be added to the ∆-clique Rmax , yielding another ∆-clique with at least the same lifetime. This is a contradiction to the assumption that Rmax is maximal. 18 Algorithm 5 Enumerating all Maximal ∆-Cliques in a Temporal Graph with Pivoting 1: function BronKerboschDeltaPivot(P, R = (C, I), X) . R = (C, I) : time-maximal ∆-clique . P ∪ X : set of all (v, I 0 ) s.t. I 0 ⊆ I and (C ∪ {v}, I 0 ) is a time-maximal ∆-clique 2: if ∀(w, I 0 ) ∈ P ∪ X : I 0 ( I then 3: add R to the solution 4: end if 5: choose pivot element (vp , Ip ) ∈ P ∪ X 6: for (v, I 0 ) ∈ P \ {(w, I 00 ) | (w, I 00 ) ∈ P ∧ (w, I 00 ) @ − N ∆ (vp , Ip )} do 0 0 7: R ← (C ∪ {v}, I ) 8: P 0 ← P u N ∆ (v, I 0 ) 9: X 0 ← X u N ∆ (v, I 0 ) 10: BronKerboschDeltaPivot(P 0 , R0 , X 0 ) 11: P ← P \ (v, I 0 ) 12: X ← X ∪ (v, I 0 ) 13: end for 14: end function An optimal pivot element is chosen in such a way that it minimizes the number of recursive calls. It is the element in the set P ∪ X having the largest number of elements in P in its ∆-neighborhood. We have seen that the whole procedure is quite similar to pivoting in the basic Bron-Kerbosch algorithm but with one difference: we are able to choose more than one pivot element. The only condition that has to be satisfied is that the time intervals of the pivot elements cannot overlap: For each ∆-clique R = (C, I) in a recursive call of the algorithm, choosing a pivot element (vp , Ip ) ∈ P ∪ X only affects maximal ∆-cliques Rmax = (Cmax , Imax ) fulfilling Imax ⊆ Ip . Moreover, for all elements (w, I 0 ) ∈ P satisfying (w, I 0 ) @ − N ∆ (vp , Ip ) it holds I 0 ⊆ Ip . Consequently, a further pivot 0 0 element (vp , Ip ) ∈ P ∪ X fulfilling that Ip0 does not overlap with Ip neither interferes with the considered maximal ∆-cliques nor with the vertex-interval pairs in P that are in the ∆-neighborhood of the pivot element (vp , Ip ). The problem of finding the optimal set of pivot elements in P ∪ X can be formulated as a weighted interval scheduling maximization problem: Weighted Interval Scheduling Input: A set J of jobs j with a time interval Ij and a weight wj each. P Task: Find a subset of jobs J 0 ⊆ J that maximizes j∈J 0 wj such that for all i, j ∈ J 0 with i 6= j, the time intervals Ii and Ij do not overlap. In our problem, the jobs are the elements of P ∪ X and the weight of an 19 element is thereby the number of all elements that are in P and lie in the ∆neighborhood of this element. Formally, the jobs are the elements (v, I 0 ) ∈ P ∪X, the corresponding time interval is I 0 of the element (v, I 0 ) and the corresponding weight w(v,I 0 ) = |{(v, I) | (v, I) ∈ P ∧ (v, I) @ − N ∆ (v, I 0 )}|. This problem can be solved efficiently in O(min(|E|, |V | · |T |) · log(min(|E|, |V | · |T |))) time by using dynamic programming [15, Chapter 6.1] under the assumption that the weights of the potential pivot elements are known. 4 Degeneracy of Temporal Graphs Recall from Section 2.2.2 that one can upper-bound the running time of the static Bron-Kerbosch algorithm using the degeneracy of the input graph. The degeneracy of a graph G is the smallest integer d such that every nonempty subgraph of G contains a vertex of degree at most d. We now give an analogue for the temporal setting, motivated by the fact that static graphs are often sparse in practice as measured by small degeneracy [4]. Intuitively, we want to capture the fact that a temporal graph keeps its degeneracy value during its whole lifetime. Definition 6 (∆-slice degeneracy). A temporal graph G = (V, E, T ) has ∆-slice degeneracy d if for all t ∈ T we have that the graph Gt = (V, Et ), where Et = {{v, w} | ({u, w}, t0 ) ∈ E for some t0 ∈ [t, t+∆]}, has degeneracy at most d. Using the parameter ∆-slice degeneracy, we can upper-bound the number of time-maximal ∆-cliques of a temporal graph. Lemma 5. Let G = (V, E, T ) be a temporal graph with ∆-slice degeneracy d. Then, the number of time-maximal ∆-cliques in G is at most 3d/3 · 2d+1 · |V | · |T |. Proof. Let G = (V, E, T ) be a temporal graph with ∆-slice degeneracy d. Then we call the graph Gt = (V, Et ), where Et = {{v, w} | ({u, w}, t0 ) ∈ E for some t0 ∈ [t, t + ∆]} a ∆-slice of G at time t. The vertex set of each time-maximal ∆-clique which starts at time t is also a clique in Gt , otherwise there would be two vertices which are disconnected for more than ∆ timesteps. Since Gt has degeneracy at most d, the number of maximal cliques of Gt is upper-bounded by 3d/3 · |V | [4]. Furthermore, the maximum size of a clique is upper-bounded by d + 1. Hence, the total number of cliques is upper-bounded by 3d/3 · 2d+1 · |V |. Note that for each of those cliques we have at most one time-maximal ∆-clique starting at time t. Hence, the total number of ∆-cliques is at most 3d/3 · 2d+1 · |V | · |T |. Lemma 5 now allows us to bound the running time of Algorithm 4 using the ∆-slice degeneracy d of the input graph G. 20 Theorem 3. Let G = (V, E, T ) be a temporal graph with ∆-slice degeneracy d. Then, BronKerboschDelta enumerates all ∆-cliques of G in O(3d/3 · 2d · |V | · |T | · |E|) time. Proof. By Lemma 5 we know that the number of time-maximal ∆-cliques in a temporal graph with ∆-slice degeneracy d is at most 3d/3 · 2d+1 · |V | · |T |. Hence, by Theorem 2, we get an overall running time in O(3d/3 · 2d · |V | · |T | · |E|). Note that Theorem 3 implies that enumerating all maximal ∆-cliques is fixed-parameter tractable with respect to the parameter ∆-slice degeneracy. Hence, while NP-hard in general, the problem can be solved efficiently if the ∆-slice degeneracy of the input graph is small. 5 Experimental Results In this section we present our experimental results. We give the ∆-slice degeneracy of several real-world temporal graphs for several values for ∆. Then we show the behavior of our implementation of BronKerboschDeltaPivot (Algorithm 5) applied to these real-world temporal graphs and compare it to the algorithm implemented by Viard et al. [29]. 5.1 Setup and Statistics We now give details of the implementation and the used reference algorithm, and introduce the data sets we used in the experiments. Furthermore, we explain how the values of ∆ were chosen, give some statistics for the data set, and calculate the ∆-slice degeneracy of the data sets for the chosen values of ∆. Implementation. We implemented3 BronKerboschDeltaPivot with slight modifications that allow the algorithm to use multiple pivot elements (we refer to this version as BronKerboschDeltaPivot*). Furthermore, we implemented a simple algorithm to compute the ∆-slice degeneracy. Both implementations are in Python 2.7.12 and all experiments were carried out on an Intel Xeon E5-1620 computer with four cores clocked at 3.6 GHz and 64 GB RAM. We did not utilize the parallel-processing capabilities although it should be easy to achieve almost linear speed-up with growing number of cores due to the simple nature of BronKerboschDeltaPivot. The operating system was Ubuntu 16.04.4 with Linux kernel version 4.4.057. We compared BronKerboschDeltaPivot* with the algorithm by Viard et al. [29] which was also implemented in Python. We modified their 3 Code freely available at http://fpt.akt.tu-berlin.de/temporalcliques/ (GNU General Public License). 21 source code4 by removing the text output in their implementation in order to avoid speed differences. We call their algorithm Algorithm VLM below. Data Sets. We chose several freely available real-world temporal graphs aiming for an overview over the different kinds of contexts in which such graphs arise, that is, an overview over different modes of communication and different kinds of entities and environments in which this communication takes place. However, a focus is on temporal graphs based on physical proximity of individuals, since previous work on ∆-cliques also focused on these [28, 29]. The contexts and sources of our test set of temporal graphs are as follows: • internet-router communication: as733 [18], • email communication: karlsruhe [7], • social-network communication: facebook-like [23], and • physical-proximity5 between – high school students: highschool-2011, highschool-2012, highschool2013 [1, 6, 24], – patients and health-care workers: hospital-ward [27], – attendees of the ACM Hypertext 2009 conference: hypertext [13], – attendees of the Infectious SocioPatterns event: infectious [13], and – children and teachers in a primary school: primaryschool [24]. Table 1 contains the number of vertices, edges, temporal resolution, and lifetime of the corresponding temporal graphs. As a time step we fixed one second for each of the data sets. Viard et al. [29], as the first work on enumerating ∆-cliques, used the data set highschool-2012 in their experiments. Chosen values of ∆. In order to limit the influence of time scales in the data and to make running times comparable between instances, as well as to be able to present the results in a unified way, we chose the ∆-values as follows. We decided on a reference point of the edge appearance rate that is, of the average number of edges per time step and we fixed a set of ∆values for this reference point. For each considered instance we then scaled the reference ∆-values proportionally to the quotient of the reference edge appearance rate and the edge appearance rate in the instance. 4 5 Code freely available at https://github.com/TiphaineV/delta-cliques . Available at http://www.sociopatterns.org/datasets . 22 Table 1: Statistics for the data sets used in our experiments. Instance as733 facebook-like highschool-2011 highschool-2012 highschool-2013 hospital-ward hypertext infectious karlsruhe primaryschool Vertices Edges Resolution Lifetime (s) 7,716 1,899 126 180 327 75 113 10,972 1,870 242 11,410,810 59,835 28,560 45,047 188,508 32,424 20,818 415,912 461,661 125,773 1d 1s 20s 20s 20s 20s 20s 20s 1s 20s 67,824,000 16,736,181 272,330 729,500 363,560 347,500 212,340 6,946,340 123,837,267 116,900 As the reference point we chose the edge appearance rate of 1/5 edges per time step; this value was chosen for convenience within the interval of edgeappearance rates in the studied data sets (see Table 1). Since, intuitively, the ∆-values of interest in practice increase exponentially, we chose as reference ∆-values the numbers 0 and 5i for i = 1, 2, . . .. As mentioned, for each instance, these values are then multiplied by the quotient of edge appearance rates. That is, if the instance has m edges and lifetime `, then we scaled the reference ∆-values by the factor (1/5)/(m/`) = `/(5m). For example, for highschool-2012 we obtain the ∆-values {0, 80, 404, 2024, 10121, 50606, 253034, . . .}. For reference, recall that each time step in highschool-2012 corresponds to one second (a day has 86,000 seconds and a week has 604,800 seconds). In figures, we refer to each scaled value of ∆ by ∆ ∼ 5i for some concrete i. Viard et al. [28] used ∆-values according to 60 seconds, 15 minutes, 1 hour and 3 hours. ∆-Slice Degeneracy. The ∆-slice degeneracies for our set of instances are shown in Table 2 together with the static degeneracy of the underlying static graph which has an edge whenever there is an edge at some time step in the temporal graph. Clearly, as the value of ∆ increases, the ∆-slice degeneracy approaches—and is upper-bounded by—the static degeneracy. The static degeneracy of our instances is small in comparison with the size of the graph. This falls in line with the analysis by Eppstein et al. [4] for many real-world graphs. Moreover, for many practically relevant values of ∆ the ∆-slice degeneracy is still significantly smaller. For example, in the instance highschool-2012, the scaled value of ∆ corresponding to 53 equals 2204 time steps (seconds) and the corresponding ∆-slice degeneracy is 5. This indicates that ∆-slice degeneracy can be a very promising (that is, also small) parameter when designing and analyzing algorithms for temporal graphs. We computed the ∆-slice degeneracies using a straightforward approach. 23 Table 2: Static degeneracy and ∆-slice degeneracy. Empty cells indicate that the lifetime of the temporal graph is smaller than the scaled ∆-value. Instance as733 facebook-like highschool-2011 highschool-2012 highschool-2013 hospital-ward hypertext infectious karlsruhe primaryschool Static ∆=0 ∼ 53 ∼ 55 ∼ 57 ∼ 59 24 20 21 18 24 22 28 18 33 47 13 1 4 4 4 4 6 4 2 4 13 3 7 5 5 6 7 9 6 4 14 6 11 6 9 11 8 18 9 10 15 19 19 12 14 18 22 18 17 31 24 18 32 We iteratively computed for each ∆-long time interval the graph induced by the edges in that time interval. For each of these graphs we computed the static degeneracy using an implementation from the NetworkX python library [8]. This approach is rather inefficient. For example, it took about seven hours to compute the ∆-slice degeneracy for karlsruhe with ∆ ∼ 55 (equating to a ∆ value of about two hours). 5.2 Results and Running Times We now study the efficiency of BronKerboschDeltaPivot*, evaluate pivoting strategies, and compare the result to Algorithm VLM. Pivoting. Generally we observed that pivoting plays a negligible role when ∆ is small compared to the overall lifetime of the graph, that is, when ∆ is less than roughly one third of the lifetime. In this case, pivoting has almost no effect on the running time and the number of recursive calls. For larger values of ∆, however, pivoting can make a clear difference depending on the type of temporal graph. We tested five strategies for selecting a set of pivots from P in BronKerboschDeltaPivot*. Call a set of pivots is maximal if the interval of each element from P overlaps with at least one pivot. We tested the following variants of pivot sets: 1A) a single arbitrary pivot, 1G) a single pivot maximizing the number of elements removed from P , MA) an arbitrary maximal set of pivots (pivots picked one-by-one arbitrarily), 24 No Pivoting 1A 1G MA MG MM Running time (s) 30 20 10 0 0 2 4 ∆ 6 ·105 Figure 3: Running time for different pivoting strategies on highschool-2012. MG) a maximal set of pivots (pivots picked one by one according to the maximum number of further elements removed from P ), and MM) a set of pivots which maximizes the number of elements removed from P . Clearly, each strategy has its own trade-off between the time needed to compute the pivots and the possible reduction in recursive calls. Running times are given for highschool-2012 in Figure 3 with ∆ between 15,000 and 725,000. We note that running times for some very small values of ∆ below 15,000 are larger than 30 s and hence do not fit in the chart. We consider this phenomenon more closely below. For ∆ ≤ 15,000 there is no appreciable difference between the pivoting strategies. In terms of relative difference between pivoting strategies, highschool-2012 seems to be a representative example. Strategies 1G and MG seem to be the best options: they do not incur much overhead compared to no pivoting for small ∆ and yield strong running time improvements for larger ∆. In comparison to no pivoting, strategies 1G and MG achieve a 60 % reduction in recursive calls for ∆-values of around 7 · 106 in highschool-2012. Since the running times of strategy 1G and MG are so close to each other we conclude that in most cases there is only one important pivot that should be selected. We were surprised to see that maximizing the overall number of elements removed from P via the pivot set (strategy MM) results in slightly worse running times and slightly larger numbers of recursive calls. The number of elements that are removed by a pivot in one recursive call of the algorithm ranges between one and 14 while many of the calls remove two to four elements. Notice that occasional reduction by ten or more elements can 25 No Pivoting 1A 1G MA MG MM Running time (s) 50 45 40 0 0.5 1 ∆ 1.5 2 ·107 Figure 4: Running time for different pivoting strategies on facebook-like. substantially decrease the search space, because in general its size depends exponentially on the size of P . Figure 4 shows running times for facebook-like. On this graph, pivoting seldom removes more than one element from the candidate set P in one call of the recursive procedure. Hence, for this instance, pivoting mainly incurs overhead for computing the pivots, but do not substantially decrease the search space. We consequently observe about 10 % slower running times, regardless of the pivoting strategy. In conclusion, strategy 1G offers the best trade-off between additional running time spent with computing the pivot(s) and running time saved due to decreased number of recursive calls. Overall, the the possible benefits seem to outweigh the overhead incurred by pivoting on some instances. All remaining experiments were thus carried out with strategy 1G. Running Times and Comparison with Algorithm VLM. We experimented with BronKerboschDeltaPivot* (Algorithm 5) using pivoting strategy 1G and with Algorithm VLM for ∆ = 0 and ∆ ∼ 5i with i = 1, 3, 5, 7, 9 (where the lifetime allowed such values of ∆). An excerpt of the results is given in Table 3. Clearly, larger instances with more vertices or edges demand a longer running time. However, even large instances like infectious can still be solved within one hour. From our theoretical results in Section 3 we expected that the running time of BronKerboschDeltaPivot* increases exponentially with growing ∆-slice degeneracy. As the ∆-slice degeneracy grows very slowly with increasing ∆ (see Table 2), we expected a corresponding moderate growth in running time with respect to ∆. For larger ∆, this is consistent with the ex- 26 Table 3: ∆-clique statistics and running times: |C| denotes the number of maximal ∆-cliques, s denotes the maximum ∆-clique size, ` the maximum ∆-clique lifetime divided by 105 , tBKD and tVLM denote the running time in seconds of BronKerboschDelta* and Algorithm VLM, respectively. Empty cells represent an exceeded running time limit of one hour. ∆=0 Instance facebook-like highschool-2011 highschool-2012 highschool-2013 hospital-ward hypertext infectious karlsruhe primaryschool |C| s ` tBKD tVLM 61,648 26,510 42,285 172,362 27,910 19,150 349,787 2 5 5 5 5 6 5 1,674 27 73 36 35 21 695 169 131 248 1,952 370 85 1,530 107,121 5 12 995 12 7 12 118 14 5 2,515 1,494 147 ∆ ∼ 53 Instance facebook-like highschool-2011 highschool-2012 highschool-2013 hospital-ward hypertext infectious karlsruhe primaryschool |C| s ` tBKD tVLM 33,876 7,394 9,501 57,121 8,694 6,345 134,787 4 7 6 6 7 7 9 1,675 27 73 36 35 21 695 70 5 8 178 15 8 1,195 1,141 153 236 1,990 226 107 83,314 9 12 83 ∆ ∼ 55 Instance facebook-like highschool-2011 highschool-2012 highschool-2013 hospital-ward hypertext infectious karlsruhe primaryschool |C| s ` tBKD 23,247 7,760 7,536 29,752 10,869 7,459 163,162 235,684 508,430 5 10 7 8 12 7 16 9 20 1,709 28 75 37 36 23 697 12,417 15 47 4 4 23 7 4 1,277 1,235 890 27 tVLM 1,365 2,193 Running time (s) 103 BronKerboschDeltaPivot* Algorithm VLM 102 101 102 103 104 ∆ Figure 5: Running time vs. ∆ on highschool-2012. perimental results, as shown in Figures 3, 4 and Table 3. However, for (very) small ∆ we often observe an initial spike in the running time (and number of ∆-cliques) which then subsides. This is also shown in Figure 5. A possible explanation for this spike is that, for small ∆, the ∆-neighborhood of many vertices becomes very fragmented, leading to large candidate sets P in the algorithm (although the size of P is still linear in the input size for constant ∆-slice degeneracy). Furthermore, if ∆ is small, then many singleton edges may form maximal ∆-cliques themselves. These ∆-cliques then get taken up into larger maximal ∆-cliques when ∆ increases, which decreases the number of ∆-cliques and running times for BronKerboschDeltaPivot*. On facebook-like our algorithm notably is comparably efficient given the relatively large size (see Figures 4 and 6). Furthermore, the number of ∆-cliques does not seem to vary strongly with changing values of ∆. These two facts may hint at some special structure that is present in temporal graphs based on online social networks, in addition to small ∆-slice degeneracy. Algorithm VLM is usually faster than BronKerboschDeltaPivot* for small values of ∆ below the ∆ ∼ 53 threshold. Starting from there, however, BronKerboschDeltaPivot* outperforms Algorithm VLM with running times smaller by at least one order of magnitude and up to three orders of magnitude (see Table 3). In terms of main memory, 385 MB is the maximum used by BronKerboschDeltaPivot* over all solved instances, attained on infectious for ∆ = 0. On this instance, Algorithm VLM uses 494 MB and often more than 1 GB. Finally we mention that, when increasing the time limit to six hours, BronKerboschDeltaPivot* can solve all instances of karlsruhe for ∆ = 0 28 Running time (s) BronKerboschDeltaPivot* Algorithm VLM 103 102 103 104 ∆ Figure 6: Running time vs. ∆ on facebook-like. and ∆ ∼ 5i for i = 1, 3, 5, 7, 9 wherein the last value of ∆ involves enumerating 43 · 106 maximal ∆-cliques. 6 Conclusion and Outlook We studied the algorithmic complexity of enumerating ∆-cliques in temporal graphs. We adapted the Bron-Kerbosch algorithm ([3]), including the procedure of pivoting to reduce the number of recursion calls, to the temporal setting and provided a theoretical analysis. For the theoretical analysis, we formalized and employed the concept of ∆-slice degeneracy which may be a useful parameter when analyzing problems in sparse temporal graphs. In experiments on real-world data sets, we showed that our algorithm is notably faster than the first approach for enumerating all maximal ∆-cliques in temporal graphs due to Viard et al. [28, 29]. Our experimental results further reveal that pivoting can notably decrease the running time for large values of ∆. Furthermore, we measured the ∆-slice degeneracy for different ∆-values and showed that it is reasonably small in many real-world data sets. As to future research, an algorithmic challenge is to find a more efficient way to compute the ∆-slice degeneracy of a given temporal graph, perhaps via different characterizations as in the case of static graphs. See [4] for an account of several equivalent definitions of the degeneracy of a static graph. Regarding the adapted version of the Bron-Kerbosch algorithm, our theoretical analysis (based on the ∆-slice degeneracy parameter) of the running time still leaves room for improvement. In particular, we leave the impact of pivoting on the running time upper bound as an open question for future 29 research. It furthermore makes sense to try and implement further improved branching rules on top of pivoting. This was also successful for the static Bron-Kerbosch algorithm [21]. Another interesting question is whether an analogue to the degeneracy ordering can be defined in the temporal setting and, if so, whether it can be used to further improve the algorithm. Acknowledgements. Anne-Sophie Himmel, Hendrik Molter and Manuel Sorge were partially supported by DFG, project DAPA (NI 369/12). Manuel Sorge gratefully acknowledges support by the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreement number 631163.11 and by the Israel Science Foundation (grant no. 551145/14). We are grateful to two anonymous SNAM reviewers whose feedback helped to significantly improve the presentation and to eliminate some bugs and inconsistencies. References [1] A. Barrat and J. Fournet. Contact patterns among high school students. PLoS ONE, 9(9):e107878, 2014. [2] S. Boccaletti, G. Bianconi, R. Criado, C. I. Del Genio, J. GómezGardeñes, M. Romance, I. Sendiña-Nadal, Z. Wang, and M. Zanin. The structure and dynamics of multilayer networks. Physics Reports, 544(1):1–122, 2014. [3] C. Bron and J. Kerbosch. Algorithm 457: finding all cliques of an undirected graph. Communications of the ACM, 16(9):575–577, 1973. [4] D. Eppstein, M. Löffler, and D. Strash. Listing all maximal cliques in large sparse real-world graphs in near-optimal time. ACM Journal of Experimental Algorithmics, 18(3):3.1:1–3.1:21, 2013. [5] T. Erlebach, M. Hoffmann, and F. Kammer. On temporal graph exploration. In Proceedings of the 42nd International Colloquium on Automata, Languages, and Programming (ICALP 2015), volume 9134 of LNCS, pages 444–455. Springer, 2015. [6] V. Gemmetto, A. Barrat, and C. Cattuto. Mitigation of infectious disease at school: targeted class closure vs school closure. BMC Infectious Diseases, 14(1):1, 2014. [7] R. Goerke. Email network of KIT informatics. http://i11www.iti. uni-karlsruhe.de/en/projects/spp1307/emaildata, 2011. 30 [8] A. A. Hagberg, D. A. Schult, and P. J. Swart. Exploring network structure, dynamics, and function using NetworkX. In Proceedings of the 7th Python in Science Conference (SciPy 2008), pages 11–15, 2008. [9] A.-S. Himmel. Enumerating maximal cliques in temporal graphs. Bachelorthesis, TU Berlin, January 2016. URL http://fpt.akt.tu-berlin.de/publications/theses/ BA-anne-sophie-himmel.pdf. Bachelor thesis. [10] A.-S. Himmel, H. Molter, R. Niedermeier, and M. Sorge. Enumerating maximal cliques in temporal graphs. In Proceedings of the 2016 IEEE/ACM International Conference On Advances in Social Networks Analysis and Mining (ASONAM 2016), pages 337–344. IEEE, 2016. [11] P. Holme and J. Saramäki. Temporal networks. Physics Reports, 519 (3):97–125, 2012. [12] F. Hüffner, C. Komusiewicz, H. Moser, and R. Niedermeier. Isolation concepts for clique enumeration: Comparison and computational experiments. Theoretical Computer Science, 410(52):5384–5397, 2009. [13] L. Isella, J. Stehlé, A. Barrat, C. Cattuto, J.-F. Pinton, and W. Van den Broeck. What’s in a crowd? Analysis of face-to-face behavioral networks. Journal of Theoretical Biology, 271(1):166–180, 2011. [14] H. Ito and K. Iwama. Enumeration of isolated cliques and pseudocliques. ACM Transactions on Algorithms, 5(4):40, 2009. [15] J. Kleinberg and É. Tardos. Algorithm Design. Pearson Education, 2006. [16] C. Komusiewicz, F. Hüffner, H. Moser, and R. Niedermeier. Isolation concepts for efficiently enumerating dense subgraphs. Theoretical Computer Science, 410(38):3640–3654, 2009. [17] M. Lahiri and T. Y. Berger-Wolf. Periodic subgraph mining in dynamic networks. Knowledge and Information Systems, 24(3):467–497, 2010. [18] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: densification laws, shrinking diameters and possible explanations. In Proceedings of the eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 177–187. ACM, 2005. [19] O. Michail. An introduction to temporal graphs: An algorithmic perspective. Internet Mathematics, 12(4):239–280, 2016. [20] O. Michail and P. G. Spirakis. Traveling salesman problems in temporal graphs. Theoretical Computer Science, 634:1–23, 2016. 31 [21] K. A. Naudé. Refined pivot selection for maximal clique enumeration in graphs. Theoretical Computer Science, 613:28–37, 2016. [22] V. Nicosia, J. Tang, C. Mascolo, M. Musolesi, G. Russo, and V. Latora. Graph metrics for temporal networks. In P. Holme and J. Saramäki, editors, Temporal Networks, pages 15–40. Springer Berlin Heidelberg, 2013. [23] T. Opsahl and P. Panzarasa. Clustering in weighted networks. Social Networks, 31(2):155–163, 2009. [24] J. Stehlé, N. Voirin, A. Barrat, C. Cattuto, L. Isella, J.-F. Pinton, M. Quaggiotto, W. Van den Broeck, C. Régis, B. Lina, et al. Highresolution measurements of face-to-face contact patterns in a primary school. PLoS ONE, 6(8):e23176, 2011. [25] E. Tomita, A. Tanaka, and H. Takahashi. The worst-case time complexity for generating all maximal cliques and computational experiments. Theoretical Computer Science, 363(1):28–42, 2006. [26] T. Uno and Y. Uno. Mining preserving structures in a graph sequence. Theoretical Computer Science, 654:155–163, 2016. [27] P. Vanhems, A. Barrat, C. Cattuto, J.-F. Pinton, N. Khanafer, C. Régis, B.-a. Kim, B. Comte, and N. Voirin. Estimating potential infection transmission routes in hospital wards using wearable proximity sensors. PLoS ONE, 8(9):e73970, 2013. [28] J. Viard, M. Latapy, and C. Magnien. Revealing contact patterns among high-school students using maximal cliques in link streams. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pages 1517–1522. ACM, 2015. [29] T. Viard, M. Latapy, and C. Magnien. Computing maximal cliques in link streams. Theoretical Computer Science, 609:245–252, 2016. 32
8cs.DS
arXiv:1802.04607v2 [math.GR] 7 Mar 2018 A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS PATRICK DEHORNOY Abstract. We establish a new, fairly general cancellativity criterion for a presented monoid that properly extends the previously known criteria. It is based on a new version of the word transformation called factor reversing, and its specificity is to avoid any restriction on the number of relations in the presentation. As an application, we deduce the cancellativity of some natural extension of Artin’s braid monoid in which crossings are colored. Establishing that a presented monoid (or semigroup) is cancellative is in general a nontrivial task, see for instance [13]. If a distinguished expression (“normal form”) has been identified for each element of the monoid, and if, for each element a of the considered monoid M and every generator s of the considered presentation, the normal form of a can be retrieved from that of sa and s, then one can indeed conclude that sa = sb implies a = b. But, when no normal form is known, no generic method is available. Adjan’s criterion based on the left graph [1, 15] is useful, but, by definition, it applies only to presentations with (very) few defining relations. Ultimately relying on Garside’s analysis of the braid monoids Bn+ [12], the so-called reversing method [5, 8] provides a simple criterion, which proved to be useful for many concrete presentations, typically those of all Artin–Tits monoids. However, an intrinsic limitation of the method is that it only applies to monoid presentations (S, R) that contain a limited number of relations, namely those such that, for all s, t in S, there exists at most one relation of the form s... = t... in R (“right-complemented” presentations). The aim of this paper is to extend the previous criterion by developing a new approach that does not require any limitation on the number of defining relations. The result we prove takes the following form: Proposition. If (S, R) is a semigroup presentation such that (i) there exists an ≡R -invariant map λ from S ∗ to ordinals satisfying λ(sw) > λ(w) for all s in S and w in S ∗ , and (ii) for every s in S, for every relation w=w′ in R, and for every (S, R)-grid from (s, w), there exists an equivalent grid from (s, w′ ), and vice versa. Then the monoid hS | Ri+ admits left cancellation. In the above statement, ≡R refers to the congruence on the free monoid S ∗ generated by the relations of R, and an (S, R)-grid is a certain type of rectangular van Kampen diagram specified in Definition 1.1 below. Note that Condition (i) in the above statement is trivial when each relation in R consists of two words with the same length (“homogeneous presentation”). As an application, we deduce: 1991 Mathematics Subject Classification. 20B30, 20F55, 20F36. Key words and phrases. semigroup presentation, van Kampen diagram, rewrite system, cancellativity, word problem, Garside monoid, group of fractions, monoid embeddability, Artin–Tits groups. 1 2 PATRICK DEHORNOY Proposition. For every n and every nonempty set C, the monoid +  (b) (a) (a) (b) for |i − j| > 2 σi σj = σj σi (a) + . Bn,C := σi | i 6 n, a ∈ C (c) (b) (a) (a) (b) (c) for |i − j| = 1 σi σj σi = σj σi σi is left and right cancellative. + The monoid Bn,C is an extension of Artin’s Bn+ of positive n-strand braids, and it is a typical example of a monoid that is inaccessible to all previously known + methods. We shall see that the elements of Bn,C admit a natural interpretation + and its enveloping in terms of braids with C-colored crossings, and both Bn,C group might be structures of independent interest. They are in particular directly reminiscent of (but not identical to) the monoids investigated in [2]. 1. Using reversing grids As in [8], our cancellativity criterion is based on some word transformation called factor (or subword) reversing, and on a criterion for establishing that the latter is complete, meaning that it detects every word equivalence with respect to the presentation. The specificity of the current paper is to extend the framework so as to avoid any restriction on the number of relations in the presentation. This is done by introducing the new notion of a reversing grid (Section 1.1), then establishing a convenient completeness criterion (Section 1.2), and finally deducing the expected cancellativity criterion an various other consequences (Section 1.3). 1.1. The notion of a reversing grid. If S is a nonempty set, we denote by S ∗ the free monoid of all words in S, and use ε for the empty word. A monoid presentation is a pair (S, R), where R is a list of (unordered) pairs of words of S ∗ ; as usual, we write relations with an equality sign, thus writing w=w′ for {w, w′ }. We then denote by hS | Ri+ the monoid presented by (S, R), that is, the monoid S ∗ /≡R , where ≡R is the congruence on S ∗ generated by R. By a semigroup presentation we mean a monoid presentation (S, R) such that R contains no relation of the form w=ε with w 6= ε (“ε-relation”). In this case, the only invertible element in hS | Ri+ is the unit 1, represented by the empty word. Our main subject of investigation is a certain binary relation (or rewrite system) on S × S associated with (S, R) as follows. Definition 1.1. If (S, R) is a monoid presentation, an (S, R)-grid is a rectangular diagram consisting of finitely many matching S ∪ {ε}-labeled pieces of the types t s1 -s sp tq t1 s - s with s, t, s1 , ..., sp , t1 , ..., tq in S and st1 ··· tq = ts1 ··· sp a relation of R, ε ε, s t s, ε ε ε, ε ε with s, t in S. ε ε ε t For u, v, u1 , v1 in S ∗ , we say that an (S, R)-grid Γ goes from (u, v) to (u1 , v1 ) if the labels of the left and top edges of Γ form the words u and v, respectively, whereas the labels of the right and bottom edges form the words u1 and v1 . If there exists an (S, R)-grid from (u, v) to (u1 , v1 ), we say that (u, v) is right R-reversible to (u1 , v1 ), A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS 3 v written (u, v) yR (u1 , v1 ) or, in a diagrammatic way, u yR u1; we then v1 often skip R if there is no ambiguity. Example 1.2. Consider the Artin presentation of the n-strand braid monoid +  σi σj = σj σi for |i − j| > 2 (1.1) Bn+ := σ1 , ..., σn−1 . σi σj σi = σj σi σj for |i − j| = 1 For n > 4, a typical grid for (1.1) is σ2 σ3 σ1 (1.2) σ3 σ1 σ1 σ1 σ2 σ2 σ2 σ2 σ3 σ2 σ3 σ1 σ2 σ1 σ2 ε ε σ3 ε σ1 ε σ3 σ1 It contains eight squares, of which five correspond to relations of (1.1), and it goes from (σ1 , σ2 σ3 σ2 ) to (σ1 σ2 σ3 , σ2 σ1 σ3 σ2 σ1 ), witnessesing for the right reversing relation σ2 σ3 σ2 (σ1 , σ2 σ3 σ2 ) y (σ1 σ2 σ3 , σ2 σ1 σ3 σ2 σ1 ), alias σ1 σ1 σ2 σ3 . y σ2 σ1 σ3 σ2 σ1 In all five types of elementary pieces considered in Definition 1.1, the labels of the two possible paths from the top-left vertex to the bottom-right vertex form words that are ≡R -equivalent, i.e., represent the same element in the monoid hS | Ri+ . An easy induction on the number of elementary pieces implies: Lemma 1.3. For every monoid presentation (S, R), and for all words u, v, u1 , v1 in S ∗ , the relation (u, v) yR (u1 , v1 ) implies uv1 ≡R vu1 . In particular, (1.3) (u, v) yR (ε, ε) implies u ≡R v. In other words, a reversing grid from (u, v) to (u1 , v1 ) is a special type of van Kampen diagram witnessing for the ≡R -equivalence of the words uv1 and vu1 . Remark 1.4. In literature [5, 6, 7, 11], reversing was described in terms of signed S-words, defined to be words in a symmetrized alphabet S ∪ S with S consisting of one copy s for each letter s of S. If w, w′ are signed S-word, one declares that w yR w′ holds if one can go from w to w′ by a finite sequence of transformations, each of which consists either in deleting some length two factor ss, or in replacing some length two factor st with t1 ··· tq sp ··· s1 , where st1 ··· tq = ts1 ··· sp is a relation of R. The connection with our current approach is easy: writing w for the word obtained from w by exchanging s and s everywhere and reversing the order of letters, the relation (u, v) yR (u1 , v1 ) of Definition 1.1 is equivalent to uv yR v1 u1 in the sense of signed word reversing. The advantage of the current description is to make it more visible that reversing only involves positive words and the presented monoid, without connection with inverting the elements and moving to a group context. In any case, the reversing grid is the fundamental object, and it seems more natural to begin with it. 4 PATRICK DEHORNOY One of the advantages of the current grid-based approach is to make the following technical result almost straightforward: Lemma 1.5. For every monoid presentation (S, R), and for all u, v ′ , v ′′ , u1 , v1 in S ∗ , the following are equivalent: (i) The relation (u, v ′ v ′′ ) yR (u1 , v1 ) holds; (ii) There exist u′ , v1′ , v1′′ in S ∗ satisfying (u, v ′ ) yR (u′ , v1′ ), (u′ , v ′′ ) yR (u1 , v1′′ ), and v1 = v1′ v1′′ . Proof. Assume that Γ is an (S, R)-grid from (u, v ′ v ′′ ) to (u1 , v1 ). By definition, Γ is a juxtaposition of elementary diagrams as in Definition 1.1. Grouping the diagrams that lie below v ′ on the one hand, v′ v ′′ ′′ ′ and below v on the other hand, splits Γ into two grids Γ y u′ y u1 and Γ′′ . By construction, the input of Γ′ is (u, v ′ ); call u ′ ′ ′ its output (u , v1 ). Then, by construction, the input of Γ v1′ v1′′ is (u′ , v ′′ ), and its output has the form (u1 , v1′′ ), with v 1 v1 = v1′ v1′′ . So (i) implies (ii). Conversely, concatenating a grid from (u, v ′ ) to (u′ , v1′ ) and a grid from (u′ , v ′′ ) to (u1 , v1′′ ) provides a grid from (u, v ′ v ′′ ) to (v1′ v1′′ , u1 ), so (ii) implies (i).  1.2. Completeness of reversing. A reversing grid is a van Kampen diagram of a special type, namely one in which at most two edges (one horizontal, one vertical) start from each node. If there exists an (S, R)-grid from (u, v) to (ε, ε), then, by Lemma 1.3, the words u and v must be ≡R -equivalent. Conversely, if u and v are ≡R -equivalent words, there must exist a van Kampen diagram connecting u and v but, in general, there is no reason why the latter could be chosen with the special form of a reversing grid. We now consider the case when such a choice is possible. Definition 1.6. We say that right reversing is complete for a monoid presentation (S, R) if the converse of (1.3) also holds, that is, if, for all u, v in S ∗ , (1.4) (u, v) yR (ε, ε) is equivalent to u ≡R v. This definition is theoretical, and our aim will be is to establish a practical criterion characterizing completeness of reversing. Two such criteria have already appeared. A first criterion is described in [7], in terms of what is called the cube condition: in principle, this criterion works for arbitrary presentations but, in practice, it can be used only for complemented presentations, namely presentations with at most one relation s... = t... for each pair of generators (s, t). Another criterion is described in [6], but, even in theory, it does not apply to presentations that are not complemented. What we do below is to establish a new completeness criterion that extends the one of [6] and works for every presentation, complemented or not. The main point is that this new criterion, contrary to the cube condition, remains tractable in the non-complemented case, i.e., without any restriction on the number of relations in the considered presentation. It follows from the definition of a reversing grid that reversing can be complete only for semigroup presentations, that is, for presentations containing no ε-relation: indeed, by definition, (w, ε) y (ε, ε) is impossible for w nonempty. So we shall hereafter restrict to semigroup presentations. We start from the following observation. Lemma 1.7. Let (S, R) be a semigroup presentation. Say that two (S, R)-grids Γ, Γ′ are equivalent if the labels of the four edges of Γ form words that are ≡R -equivalent A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS 5 to their counterparts in Γ′ . Then a sufficient condition for right reversing to be complete for (S, R) is that, for all u, v in S ∗ , (♦∗ ) For every grid from (u, v), and for all u′ , v ′ satisfying u′ ≡R u and v ′ ≡R v, there is an equivalent grid from (u′ , v ′ ). Proof. Assume that (♦∗ ) holds for all u, v in S ∗ , and let u, u′ be ≡R -equivalent words. A trivial induction on the length of u shows u that there exists a grid Γ from (u, u) to (ε, ε), as s1 sℓ shown on the right. Applying (♦∗ ) to Γ and to the s1 ε ε ε equivalences u ≡R u and u ≡R u′ , we conclude that ′ ′ ε s ℓ there exists a grid Γ from (u, u ) that is equivalent u sℓ ε to Γ. Let (u′1 , v1′ ) be the output of Γ′ . Then, by assumption, we have u′1 ≡R ε and v1′ ≡R ε. Because sℓ sℓ sℓ ε R contains no ε-relation, u′1 ≡R ε implies u′1 = ε, ε ε and, similatly, v1′ ≡R ε implies v1′ = ε. ′ ′ Then Γ witnesses that (u, u ) right-reverses to (ε, ε). Therefore, right reversing is complete for (S, R).  As it stands, Lemma 1.7 does not provide a tractable criterion, because it involves arbitrary pairs of ≡R -equivalent words in S ∗ . We show now that, under convenient finiteness assumptions (“noetherianity”), the most elementary instances of compatibility are sufficient to deduce the full condition. If M is a monoid and g, h belong to M , one says that g properly right-divides h, written g ≺R h or h ≻R g, if h = h′ g holds for some non-invertible element h′ of M (proper left-division ≺L would be defined symmetrically with g on the left). Definition 1.8. A monoid M is called right noetherian if there is no no infinite descending sequence with respect to proper right-divisibility relation in M , that is, every sequence g0 ≻R g1 ≻R ... in M is finite. Lemma 1.9. For every monoid M , the following are equivalent: (i) The monoid M is right noetherian. (ii) There exists a map λ from M to ordinals such that, for all g, g ′ in M , (1.5) g ≻R g ′ implies λ(g) > λ(g ′ ). (iii) There exists a map λ from M to ordinals satisfying, for all g, h in M , (1.6) λ(gh) > λ(h) + λ(g), and λ(g) > 0 whenever g is non-invertible. Proof. The equivalence of (i) and (ii) is standard: for ≻R to admit no infinite descending sequence means that the relation ≻R is well-founded, and it is well known that this amounts to the existence of a map to the ordinals that decreases along ≻R . Next, (iii) implies (ii): indeed, assuming g = hg ′ with h non-invertible and applying (1.6), we obtain λ(g) > λ(g ′ ) + λ(h) > λ(g ′ ). Finally, assume (i), whence (ii). As above, the relation ≻R is well founded, so, by standard arguments, there exists a map λ : M → Ord inductively defined by ( 0 if g is invertible, (1.7) λ(g) := max{λ(f ) + 1 | f ≺R g} otherwise. We claim that this particular function λ, which satisfies (1.5) by construction, also satisfies (1.6). First, we observe that, if g is not invertible, then g ≻R 1 is true, 6 PATRICK DEHORNOY so we must have λ(g) > λ(1) = 0. So the second assertion in (1.6) is true. Next, we observe that, if g is invertible, then λ(gh) > λ(h) holds. Indeed, the inequality is trivial for λ(h) = 0, and, otherwise, the sets {f | f ≺R h} and {f | f ≺R gh} coincide, and we deduce λ(gh) = max{λ(f ) + 1 | f ≺R gh} = max{λ(f ) + 1 | f ≺R h} = λ(h). We prove now using induction on λ(g) that λ(gh) > λ(h) + λ(g) holds for every h in M . Assume first λ(g) = 0. Then g must be invertible, and we established above the equality λ(gh) = λ(h) = λ(h) + λ(g), as expected. Assume now λ(g) > 0. Then g is not invertible and, by definition, we have λ(g) = max{λ(f ) + 1 | f ≺R g}. Let h be an arbitrary element of M . Then gh is not invertible, and we obtain λ(gh) = max{λ(f ) + 1 | f ≺R gh} by definition > max{λ(f h) + 1 | f ≺R g} because f ≺R g implies f h ≺R gh > max{λ(h) + λ(f ) + 1 | f ≺R g} by induction hypothesis = λ(h) + max{λ(f ) + 1 | f ≺R g} by monotonicity of ordinal addition = λ(h) + λ(g) by definition. Thus the first inequality in (1.6) is established, and (i) implies (iii).  Translating the previous result at the level of presentations, we can state: Lemma 1.10. If (S, R) is a semigroup presentation, the monoid hS | Ri+ is right noetherian if, and only if, the following equivalent conditions hold: (1.8) (1.9) there exists an ≡R -invariant map λ from S ∗ to the ordinals satisfying λ(sw) > λ(w) for all s in S and w in S ∗ ; there exists an ≡R -invariant map λ from S ∗ to the ordinals satisfying λ(uv) > λ(v) + λ(u) for all u, v in S ∗ , and λ(s) > 0 for s in S. Thus, (1.8) provides a sufficient condition for right noetherianity, and then one is ensured that the stronger condition (1.9) can be satisfied (possibly by another map λ′ ). As already noted, in the case of a homogeneous presentation, i.e., one where all relations have the form w=w with w, w′ of the same length, defining λ(w) to be the length of w provides a map λ witnessing for (1.9). The main technical result we shall establish is the following criterion for the completeness of reversing: Lemma 1.11. A semigroup presentation (S, R) satisfying (1.8) satisfies (♦∗ ) if, and only if, for every element s in S and every relation w=w′ in R, for every grid from (s, w), there is an equivalent grid from (s, w′ ), and vice versa. ′ Proof. One implication is trivial: (♦) for s and w=w follows from applying (♦∗ ) to the words s and w with the equivalences s ≡R s and w′ ≡R w. The point is to establish the converse implication. This will be done using two nested inductions. First, we fix a map λ from S ∗ to ordinals satisfying (1.9), which is possible by Lemma 1.10. By the properties of ordinal addition, we always have (♦) (1.10) λ(u) 6 λ(uv), λ(v) 6 λ(uv), and λ(v) < λ(uv) for u nonempty. If Γ is a (S, R)-grid from (u, v) to (u1 , v1 ), the parameter λ(uv1 ), which, by Lemma 1.3, is also equal to λ(vu1 ), will be called the diagonal of Γ. Then, for α A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS 7 an ordinal, we introduce the special case of Condition (♦∗ ) corresponding to grids whose diagonal is at most α: For every grid with diagonal 6 α from (u, v), and for all u′ , v ′ satisfying u′ ≡R u and v ′ ≡R v, there is an equivalent grid from (u′ , v ′ ). (♦α∗ ) Next, for w, w′ in S ∗ , we write distR (w, w′ ) for the combinatorial distance between w and w′ with respect to R, namely the minimal length of an R-derivation from w to w′ if w and w′ are ≡R -equivalent, and ∞ otherwise. Then, for d a natural number, we consider the special case of Condition (♦α∗ ) corresponding to distances between the sources of the old and new grids bounded by d: ∗ (♦α,d ) For every grid with diagonal 6 α from (u, v), and for all u′ , v ′ satisfying distR (u, u′ ) + distR (v, v ′ ) 6 d, there is an equivalent grid from (u′ , v ′ ). It should be clear that (♦∗ ) for two words u, v is equivalent to the conjunction ∗ of all (♦α,d ) for u, v. Using an induction on α and, for a given α, on d, we shall ∗ establish that, if (♦) is true for every s and every relation w=w′ of R, then (♦α,d ) is true for all u, v. Assume first α = 0. Assume that Γ is a grid with zero diagonal from (u, v) to (u1 , v1 ), and u′ ≡R u and v ′ ≡R v hold. By construction, λ(w) = 0 implies w = ε, so λ(uv1 ) = λ(vu1 ) = 0 requires u = v = u1 = v1 = ε. Next, the assumption u′ ≡R ε implies u′ = ε = u, and v ′ ≡R v implies v ′ = ε = v. Then choosing Γ′ := Γ provides the expected condition. So (♦0∗ ) is true for all u, v. Assume now α > 0 and d = 0. Assume that Γ is a grid with diagonal 6 α from (u, v) to (u1 , v1 ), and distR (u, u′ ) + distR (v, v ′ ) = 0 holds. By definition, we have u′ = u and v ′ = v. Then choosing Γ′ := Γ provides the expected condition. ∗ ) is true for all u, v and for every α. So (♦α,0 Assume now α > 0 and d = 1. Assume that Γ is a grid with diagonal 6 α from (u, v) to (u1 , v1 ), and distR (u, u′ ) + distR (v, v ′ ) = 1 holds. Up to a symmetry, we may assume u′ = u and distR (v ′ , v) = 1. By definition, the latter relation means that there exists a relation w=w′ in R and two words v0 , v2 satisfying v = v0 wv2 and v ′ = v0 w′ v2 . As v is the product v0 wv2 , repeated applications of Lemma 1.5 show that the assumption (u, v) yR (u1 , v1 ) implies the existence of u0 , u2 and v3 , v4 , and v5 satisfying v1 = v3 v4 v5 and (u, v0 ) yR (u0 , v3 ), (u0 , w) yR (u2 , v4 ), and (u2 , v2 ) yR (u1 , v5 ), corresponding to a decomposition of the grid Γ into the union of three grids u v0 v w v2 y u0 y u2 y v3 v4 v1 v5 u1 8 PATRICK DEHORNOY Assume first that the word u0 is empty. Then, necessarily, we have u1 = u2 = ε, v4 = w, and v5 = v2 . Then the situation is as the left diagram below v w v0 u ε y v2 ε y v3 w v1 y v′ w′ v0 ε u v2 y ε v3 y v2 ε y ε v2 w′ v1′ ∗ and the right diagram shows that (♦α,1 ) is satisfied with u′1 := ε and v1′ := v3 w′ v2 . Assume now that u0 is not empty. Then we write u0 = su3 with s in S. Splitting the grid again, we obtain the existence of words u4 , ..., u7 and v6 , v7 such that the situation is as in the left diagram below v w v0 s u y v3 v0 v2 u6 v6 u4 y v7 u3 y u5 y u7 v4 v1 v5 y v′ w′ s u u1 y v3 y v6′ u3 y v4′ v1′ v2 u′4 y u′6 v7′ u′5 y u′7 u′1 v5′ We shall now establish the existence of words u′3 , ..., u′7 and v4′ , ..., v7′ such that the right diagram above is a legitimate (S, R)-grid, with u′i ≡R ui and vj′ ≡R vj for all i and j. We begin with the top median square. By assumption, we have (s, w) yR (u4 , v6 ) and w=w′ ∈ R. By (♦), there exist u′4 and v6′ satisfying u′4 ≡R u4 , v6′ ≡R v6 and (s, w′ ) yR (u′4 , v6′ ). Consider now the bottom median square. Then u3 ≡R u3 is trivial, whereas v6′ ≡R v6 and (u3 , v6 ) yR (u5 , v4 ) hold by construction. Moreover, (1.10) implies λ(u3 v4 ) < λ(su3 v4 ) 6 λ(v0 su3 v4 ) 6 λ(v0 su3 v4 v5 ) = λ(uv1 ) 6 α, whence β := λ(u3 v4 ) < α. By induction hypothesis, (♦β∗ ) is true for u3 and v6 , and we deduce the existence of u′5 and v4′ satisfying u′5 ≡R u5 , v4′ ≡R v4 and (u3 , v6′ ) yR (u′5 , v4′ ). We move to the top right square. Then v2 ≡R v2 is trivial, whereas u′4 ≡R u4 and (u4 , v2 ) yR (u6 , v7 ) hold by construction. Moreover, because w cannot be empty, since R contains no ε-relation, (1.10) implies λ(u4 v7 ) < λ(wu4 v7 ) 6 λ(v0 wu4 v7 ) 6 λ(v0 wu4 v7 u7 ) = λ(uv1 ) 6 α, whence γ := λ(u4 v7 ) < α. By induction hypothesis, (♦γ∗ ) is true for u4 and v2 , and we deduce the existence of u′6 and v7′ satisfying u′6 ≡R u6 , v7′ ≡R v7 and (u′4 , v2 ) yR (u′6 , v7′ ). A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS v7′ 9 Finally, we consider the bottom right square. By construction, we have u′5 ≡R u5 , ≡R v7 and (u5 , v7 ) yR (u7 , v5 ). Moreover, (1.10) implies λ(u5 v5 ) 6 λ(v6 u5 v5 ) < λ(sv6 u5 v5 ) 6 λ(v0 sv6 u5 v5 ) = λ(uv1 ) 6 α, whence δ := λ(u5 v5 ) < α. By induction hypothesis, (♦δ∗ ) is true for u5 and v7 , and we deduce the existence of u′7 and v5′ satisfying u′7 ≡R u7 , v5′ ≡R v5 and (u′5 , v7′ ) yR (u′7 , v5′ ). Put u′1 := u′6 u′7 and v1′ := v3 v4′ v5′ . Then u′1 ≡R u1 and v1′ ≡R v1 hold, and the ∗ right diagram below witnesses for (v, v ′ ) yR (u′1 , v1′ ). Thus (♦α,1 ) is satisfied for u ∗ and v, which completes the case d = 1 in the induction for (♦α ). Assume finally α > 0 and d > 2. Assume that Γ is a grid with diagonal 6 α from (u, v) to (u1 , v1 ), and distR (u, u′ ) + distR (v, v ′ ) = d holds. We can find two words u′′ , v ′′ satisfying distR (u′′ , u) + distR (v ′′ , v) = d − 1 and distR (u′ , u′′ ) + distR (v ′ , v ′′ ) = 1. ∗ By assumption, we have λ(uv1 ) 6 α. By induction hypothesis, (♦α,d−1 ) is true ′′ ′′ for u and v, so we deduce the existence of u1 , v1 satisfying u′′1 ≡R u1 , v1′′ ≡R v1 , and (u′′ , v ′′ ) yR (u′′1 , v1′′ ). Now u′′ ≡R u and v1′′ ≡R v1 imply λ(u′′ v1′′ ) = λ(uv1 ) 6 α. By induction hypothesis, ∗ ) is true for u′′ and v ′′ , so we deduce the existence of u′1 , v1′ satisfying (♦α,1 u′1 ≡R u′′1 , v1′ ≡R v1′′ , and (u′ , v ′ ) yR (u′1 , v1′ ). By transitivity of ≡R , we have u′1 ≡R u1 and v1′ ≡R v1 , and we conclude that ∗ ) is true for u and v. This completes the induction.  (♦α,d 1.3. Main results. We are now ready to state the main results of the paper and, in particular, to establish the cancellativity criterion announced in the title. First, summarizing the results established so far directly gives the following: Proposition 1.12. Assume that a semigroup presentation (S, R) satisfies (1.8)— which is true in particular if (S, R) is homogeneous—and (♦) for every s in S and every relation w=w′ in R. (i) For all u, v, u1 , v1 in S ∗ satisfying (u, v) yR (u1 , v1 ), and for all u′ , v ′ in S ∗ satisfying u′ ≡R u and v ′ ≡R v, there exist u′1 , v1′ satisfying (u′ , v ′ ) yR (u′1 , v1′ ), with u′1 ≡R u1 and v1′ ≡R v1 . (ii) For all u, v in S ∗ , the words u and v represent the same element of the monoid hS | Ri+ if, and only if, (u, v) yR (ε, ε) holds. Proof. Point (i) is Condition (♦∗ ) for u, v, and Lemma 1.11 states that the latter holds whenever (1.8) holds and so does (♦) for every s in S and every relation w=w′ in R. (ii) By Lemma 1.7, (i), that is, (♦∗ ) for all u, v, implies that reversing is complete for (S, R), which, by definition, implies the equivalence of (ii).  Let us turn to left cancellability. Then completeness of right reversing is useful, as it shows that, if there is no obvious counter-example to left cancellativity, then there is no hidden counter-example either: Lemma 1.13. If right reversing is complete for the presentation (S, R) and R contains no relation of the form su = sv with s in S and u 6= v in S ∗ , then the monoid hS | Ri+ admits left cancellation. 10 PATRICK DEHORNOY Proof. It is enough to prove that, for all words u, v in S ∗ , every relation of the form s v su ≡R sv with s in S implies u ≡R v. So assume su ≡R sv. By completeness of right reversing, we deduce (su, sv) yR s u1 ε (ε, ε). By Lemma 1.5, a grid witnessing for (su, sv) yR (ε, ε) v1 v2 decomposes into four grids, as shown on the right. The assumpu2 ε tion about the presentation requires u = v = ε, which in turn u 1 1 implies u2 = u and v2 = v. ε ε Then the bottom right square witnesses for (u, v) yR (ε, ε), which, by Lemma 1.3, implies u ≡R v.  Putting things together, we deduce the practical cancellativity criterion that is the main result of this paper, as stated in the preamble of the paper: Proposition 1.14. Assume that a semigroup presentation (S, R) satisfies (1.8)— which is true in particular if (S, R) is homogeneous—and (♦) for every s in S and every relation w=w′ in R. Then a sufficient condition for the monoid hS | Ri+ to be left cancellative is that there is no relation sw = sw′ with w 6= w′ in R. Of course, a symmetric criterion exists for right cancellativity: right noetherianity is to be replaced with left noetherianity, meaning the non-existence of an infinite descending sequence with respect to proper left divisibility, and right reversing grids are to be replaced with their left counterparts, in which one starts from the bottom and right edges and uses the relations to build a rectangular diagram in which the output corresponds to the left and top edges. Note that a right reversing grid is not a left reversing grid, in particular because “cancellation squares” are not the s ε same: s ε in a right reversing grid, to be compared with ε ε reversing grid. s in a left s Remark 1.15. Contrary to Adjan’s cancellability criterion of [1, 15], the criterion of Proposition 1.14 does not guarantee that the monoid embeds in its enveloping group. For instance, consider the monoid M with presentation (1.11) ha, b, c, d, a′, b′ , c′ , d′ | ac = bd, ac′ = bd′ , a′ c = b′ di+ . The monoid M fails to satisfy the first Malcev condition [4, Chapter 12] and, therefore, it does not embed in its enveloping group. However, the presentation of (1.11) is eligible for the cancellability criterion of Proposition 1.14—but not for Adjan’s criterion, since (a, b) is a cycle in the left graph. We conclude with one more application of completeness of right reversing, now in terms of common (right) multiples. Proposition 1.16. Assume that a semigroup presentation (S, R) satisfies (1.8)— which is true in particular if (S, R) is homogeneous—and (♦) for every s in S and every relation w=w′ in R. Then two elements a, b of hS | Ri+ respectively represented by words u and v in S ∗ admit a common right multiple if, and only if, there exists at least one (S, R)-grid from (u, v); in this case, every common right multiple of a and b is a right multiple of an element represented by uv1 and by vu1 with u1 , v1 satisfying (u, v) yR (u1 , v1 ). A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS 11 Proof. Assume that there exists a grid from (u, v), say (u, v) yR (u1 , v1 ). By Lemma 1.3, this implies uv1 ≡R vu1 , which shows that the element of hS | Ri+ represented by uv1 and vu1 is a common right multiple of a and b. v u′ Conversely, assume that c is a common right multiple of a and b: this means that there exist words u′ , v ′ such that c is repre- u u1 ε sented by uv ′ and vu′ , which therefore satisfy uv ′ ≡R vu′ . Unv2 der the assumptions, right reversing is complete for (S, R), so ′ v1 v u ε ′ ′ 2 (uv , vu ) yR (ε, ε) holds. Splitting a reversing grid in four pieces as shown on the right, we see that there exists a grid ε ε from (u, v), and that the equivalences u′ ≡R u1 v2 , v2 ≡R u2 , and v ′ ≡R v1 u2 are satisfied. The latter show that c is a right multiple of the element represented by uv1 and vu1 .  Corollary 1.17. Assume that a semigroup presentation (S, R) satisfies the assumptions of Proposition 1.16 and, moreover, it is right complemented, i.e., if, for all s, t in S, there is at most one relation s...=t... in R. Then two elements a, b of hS | Ri+ respectively represented by u and v in S ∗ admit a common right multiple if, and only if, (u, v) yR (u1 , v1 ) holds for some u1 , v1 ; in this case, the element represented by uv1 and vu1 is a right lcm of a and b. Proof. The assumption that (S, R) is right complemented implies that an (S, R)grid from (u, v) is unique when it exists. Thus, Proposition 1.16 says that every common right multiple of a and b is a right multiple of the element represented by uv1 . So the latter element, when it exists, is a right lcm of a and b.  Specializing even more, we finally obtain: Corollary 1.18. Assume that a semigroup presentation (S, R) satisfies the assumptions of Proposition 1.16 and, moreover, for all s, t in S, the exist s′ , t′ in S such that st′ =ts′ is a relation of R. Then any two elements of the monoid hS | Ri+ admit a right lcm. Proof. The presentation is eligible for Corollary 1.17, so we know that any two elements with a common right multiple admit a right lcm. The additional assumption about (S, R) guarantees that, for all words u, v in S ∗ , there exists one (S, R)-grid from (u, v): indeed, obstructions arise when a relation s...=t... is missing, and when the process never terminates because smaller and smaller arrows appear without end. The assumption that there always exist a relation s...=t... discards the first obstruction; the assumption that the relations involve words of length 6 2 discards the second one. Thus, any two elements of the monoid hS | Ri+ admit a common right multiple, hence a right lcm.  Remark 1.19. The cancellativity criterion of Proposition 1.14 subsumes the one established in [6] in the case of a right complemented presentation. In such a case, there exists at most one (R, S)-grid admitting a given source (u, v), and, therefore, the output words can be seen as functions of u and v. Then, the cancellativity criterion can be stated as a compatibility of the functions in question, called “complement”, with the equivalence relation ≡R . In our general case, the scheme of the proof remains the same, but one needs to find a different formalism, which makes the extension nontrivial. In [6], in addition to qualitative aspects, some quantitative results are established, and they can be extended to our current framework. 12 PATRICK DEHORNOY Say that a semigroup presentation (S, R) has defect d if, for every s in S, every relation w=w′ in R, and every (S, R)-grid Γ from (s, w), there exists an equivalent (S, R)-grid Γ′ from (s, w′ ) such that the cumulated distances between the output words of Γ and Γ′ is bounded above by d, and d is minimal with that property. Then the inductive proof of Proposition 1.11 can be adapted to show that, if (S, R) has finite defect d and Γ is a grid from (u, v), then, for all u′ ≡R u and v ′ ≡R v, there exists an equivalent grid Γ′ from (u′ , v ′ ) such that the distance between the outputs of Γ and Γ′ is bounded by an explicit function of the distance between their inputs, actually a double exponential of base d. We do not go into details. 2. Applications to variants of braid monoids As an application of the results of Section 1, we now establish that the monoids of colored braids, which are extensions of the classical Artin braid monoids, admit cancellation. 2.1. Braids with colored crossings. We mentioned in Example 1.2 that, for n > 1, the standard n-strand monoid Bn+ is the monoid presented by (1.1). We recall, for instance from [3] or [10], that, under interpreting σi as the elementary crossing that exchanges the strands at positions i and i + 1 as in 1 σi : 2 i−1 ··· i i+1 i+2 n ··· the monoid Bn+ is the monoid of isotopy classes of positive n-strand braid diagrams. We now consider an extension of the monoid Bn+ : Definition 2.1. For n > 1 and C a nonempty set, the monoid of positive C-colored braids is the monoid with presentation +  (b) (a) (a) (b) for |i − j| > 2 σi σj = σj σi (a) + . (2.1) Bn,C := σi | i 6 n, a ∈ C (c) (b) (a) (a) (b) (c) for |i − j| = 1 σi σj σi = σj σi σj (a) The idea is that the generator σi corresponds (as usual) to a crossing at positions i and i+1 with, in addition, an attached “color” a in C. The relations of (2.1) are then natural if we imagine that the colors are connected with the names, or initial positions, of the strands (as opposed to the current positions). Typically, we may think of taking for C the set of all (unordered) pairs in {1, ..., n}, the mean(p,q) being “the strands starting at positions p and q cross at ing of the crossing σi position i”, see Figure 1. Of course, when the colour set C is a singleton, we can forget about colours, and + the monoid Bn,C is simply the n-strand monoid—which is known to be cancellative since Garside [12]. By contrast, for #C > 2 and n > 3, the presentation of (2.1) is not complemented (for some generators s, t, there is more than one relation of the type s... = t... in the presentation), and no simple criterion seems to apply. Here we shall prove: + admits left and right cancellation. Proposition 2.2. The monoid Bn,C The proof consists of applying the criterion of Proposition 1.14, namely consid(a) ering all generators σi and all relations w=w′ of (2.1), and checking that, for every (a) reversing grid built from σi and w, there exists an equivalent reversing grid built A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS p q r p q 13 r (p,q) σi (q,r) σi+1 (p,r) σi+1 (p,r) ∼ σi (q,r) (p,q) σi σi+1 (p,q) the meaning “the Figure 1. Colored braid relation: if we give σi strands starting at positions p and q cross at position i”, that is, if we take into account the names (origins) of the strand that cross, then the relations of (2.1) appear naturally. (a) from σi and w′ , and vice versa. We shall see that there are only two critical cases, with all other cases either reducing to them or being trivial. (a) Lemma 2.3. Property (♦) holds for σ1 (b) (c) (d) (d) (c) (b) and the relation σ2 σ3 σ2 = σ3 σ2 σ3 . (a) (b) (c) (d) Proof. We look at all possible grids from (σ1 , σ2 σ3 σ2 ), and exhibit for each of (a) (d) (c) (b) them an equivalent grid from (σ1 , σ3 σ2 σ3 ), and conversely. First, we see using (a) (b) (c) (d) the definition that the valid grids from (σ1 , σ2 σ3 σ2 ) are the following grids, where e and f are arbitrary elements of the color set C: (b) (c) σ2 (d) σ3 σ2 (f) (e) (e) σ1 (2.2) (c) σ1 σ3 (a) σ1 (a) σ2 (e) (b) σ2 σ1 ∗ (f) (f) (d) σ2 σ1 (e) σ2 (f) (d) ε ε ε σ1 (a) σ3 ε σ2 σ3 (c) σ3 σ1 ∗ σ2 (a) (a) σ3 (d) σ1 A priori, one might use different colors f, f ′ in the squares marked ∗, but f 6= f ′ (f) (f ′) leads to a grid that cannot be completed, since there is no relation σ2 ... = σ2 ... in (2.1). Now, consider the following valid grid: (d) (c) σ3 (b) σ2 σ3 (f) (2.3) (a) (f) (b) σ1 σ1 σ3 (a) σ1 (e) σ1 (d) σ3 σ2 (a) σ2 (f) σ2 (c) σ1 (a) σ3 (e) σ3 (b) σ2 (f) (e) (a) The right edges of (2.2) and (2.3) both yield the word σ1 σ2 σ3 . For the bottom edges, using ≡ for the congruence generated by the relations of (2.1), we find (d) (f) (c) (e) (b) (d) (f) (e) (c) (b) (e) (f) (d) (c) (b) σ3 σ2 σ1 σ3 σ2 ≡ σ3 σ2 σ3 σ1 σ2 ≡ σ2 σ3 σ2 σ1 σ2 (e) (f) (b) (c) (d) (e) (b) (f) (c) (d) ≡ σ2 σ3 σ1 σ2 σ1 ≡ σ2 σ1 σ3 σ2 σ1 , 14 PATRICK DEHORNOY which shows that (2.2) and (2.3) are equivalent grids. (a) (d) (c) (b) Conversely, starting from σ1 and σ3 , σ2 σ3 , the only possible reversing grids have the form of (2.3) for some e and f in C, and then (2.2) provides the expected equivalent grid.  (a) Lemma 2.4. Property (♦) holds for σ2 (b) (c) (c) (b) and the relation σ1 σ3 = σ3 σ1 . (a) (b) (c) Proof. As in Lemma 2.3, we look at all reversing grids from (σ2 , σ1 σ3 ), and (a) (c) (b) exhibit an equivalent grid from (σ2 , σ3 σ1 ), and conversely. The grids from (a) (b) (c) (σ2 , σ1 σ3 ) are the following grids, with d, e, f arbitrary in C: (b) (c) σ1 σ3 (e) σ2 (d) σ2 (e) σ2 (d) (c) σ3 (a) (2.4) σ3 σ2 (f) (a) (d) σ1 (b) σ1 σ1 (a) σ1 (e) σ2 (a) σ2 (f) σ3 (c) σ2 σ1 On the other hand, the following grid is also valid: (c) (b) σ3 σ1 (e) σ2 (f) σ2 (e) σ2 (f) (b) σ1 (a) (2.5) σ1 σ2 (d) (a) (f) σ3 (c) σ3 σ3 (a) σ3 (e) σ2 (a) σ2 (d) σ1 (b) σ2 σ3 The right edges of (2.4) and (2.5) correspond to equivalent words, since we have (e) (d) (f) (a) (e) (f) (d) (a) σ2 σ1 σ3 σ2 ≡ σ2 σ3 σ1 σ2 . Similarly, we find for the bottom edges (f) (c) (e) (d) (b) (f) (d) (e) (c) (b) (d) (f) (e) (b) (c) (d) (b) (e) (f) (c) σ3 σ2 σ1 σ2 σ3 ≡ σ3 σ1 σ2 σ1 σ3 ≡ σ1 σ3 σ2 σ3 σ1 ≡ σ1 σ2 σ3 σ2 σ1 . Hence (2.4) and (2.5) are equivalent grids. (a) (c) (b) Conversely, the possible reversing grids from (σ2 , σ3 , σ1 ) have the form of (2.5) for some f , e, and d in C, and then (2.4) provides the expected equivalent grid.  (a) and all relations of (2.1). Lemma 2.5. Property (♦) holds for all σi (a) Proof. First consider the case of σi (b) (c) (d) and a relation σj σk σj (a) (d) (c) (b) = σk σj σk with, (b) (c) (d) say, k = j + 1. For i 6 j − 2, every grid from (σi , σj σk σj ) is a commutation (a) (d) (c) (b) grid and then there exists an equivalent grid from (σi , σk σj σk ) as shown below: (b) σj (2.6) (a) (c) σk (a) σi σi (b) σj (c) σk (d) (d) σj (a) σi (d) σj σk (a) σi (a) (c) σj (a) σi σi (d) σk (c) σj (b) σk (a) σi (b) σk (a) σi A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS (a) 15 (d) (c) (b) The case when we start with a grid from (σi , σk σj σk ) is similar. The case i = j − 1 corresponds to Lemma 2.3 for i = 1, and the general case is similar, since the relations of (2.1) are invariant under shifting the indices. (a) (b) (c) (d) Next, assume i = j. Then a grid from (σi , σj σk σj ) exists only for a = b, and then it is as in the left hand diagram below, in which case the right hand diagram provides an equivalent grid for e = c: (c) (d) (b) σj σk σk (b) (d) (c) σj σj σk (e) σj ε σ(b) ε k ε (a) (a) σ (2.7) σi i ε ε ε (a) (a) σk σk ε ε (c) (d) σk σj ε ε (e) (d) σk σj (d) (c) (b) (a) In the other direction, the only possible grids from (σi , σk σj σk ) correspond to the right hand diagram in (2.7) with e = c and a = b, in which case the left diagram provides the required equivalent grid. The case i = j + 1 = k is symmetric to i = j. Similarly, the case i = j + 2 = k + 1 is symmetric to i = j − 1. Finally, the cases i > k + 2 are symmetric to i 6 j − 2. (c) (b) (b) (c) (a) We now consider the case of σi and a relation σj σk = σk σj with, say, k > j + 2. The case i 6 j − 2 is similar to that of (2.6), with commutation grids. (a) (b) (c) Assume i = j − 1. Then the grids from (σi , σj σk ) are as on the left diagram below, with d arbitrary in C, and the right diagram then provides the expected (a) (c) (b) equivalent grid from (σi , σk σj ): (b) (c) (b) (c) σj σk σ σ j (2.8) k (d) σi (a) σi (c) σk (a) (a) σj (d) σj (d) (d) σi (a) σi σi (a) σi (a) σj σj (b) (c) (c) σi σk σk (a) (d) (b) σj σi (c) (b) In the other direction, the only grids from (σi , σk σj ) are those shown in the right diagram of (2.8) with d arbitrary in C, and the left diagram then provides the expected equivalent grid. The case i = j is almost trivial: grids may exist only for a = b, and then they take the form (b) (b) (c) (c) σj σj σk σk (2.9) (a) σi ε ε ε (c) (a) (a) σi σi (c) ε ε σk σk Next, assume j + 1 6 i 6 k − 1. If k = j + 2 holds, typically i = 2, j = 1, k = 3, we are, up to a shifting of the indices, in the situation of Lemma 2.4, and so (♦) is guaranteed. Otherwise, either i is adjacent to exactly one of j or k, and the situation is that of (2.8), or i is at distance at least 2 from both j and k, and the situation is that of (2.7). Finally, the cases of i = k, i = k + 1, and i > k + 2 are symmetric to those of (2.9), (2.8), and (2.7), respectively. Thus, all cases have been successfully treated.  We can now easily complete the proof of Proposition 2.2: 16 PATRICK DEHORNOY Proof of Proposition 2.2. The presentation (2.1) is eligible for the criterion of Proposition 1.14. Indeed, it contains no ε-relation, and all relations are of the form w=w′ + with w, w′ of the same length. Hence the monoid Bn,C is right noetherian. By Proposition 1.14 and Lemma 2.5, right reversing is complete for (2.1). Hence, as the presentation contains no relation contradicting left cancellation, the monoid admits left cancellation. Finally, the symmetry of the relations guarantees that the monoid is isomorphic to the opposed monoid, and, therefore, right cancellativity automatically follows from left cancellativity.  Inspecting the proofs above shows that, in the worst cases, the combinatorial distance between the outputs of the old and the new grids is at most 5, so, according to the terminology sketched in Remark 1.19, the defect of the presentation (2.1) is 5, which could be used to obtain explicit upper bounds on the number or reversing steps needed to possibly establish the equivalence of words. As mentioned in Remark 1.15, our current approach says nothing about the embeddability of the involved monoid in a group. So the obvious question after Proposition 2.2 is + Question 2.6. Does the monoid Bn,C embed in its enveloping group, that is, in the group defined by the presentation (2.1)? A classical sufficient condition is provided by Ore’s theorem [14] stating in the current context that a cancellative monoid M in which any two elements admit a common right multiple embeds in its enveloping group, which, in addition, is then a group of right fractions for M . This applies for instance to the monoid Bn+ . + admits no common multiple: for a 6= b, However, for #C > 2, the monoid Bn,C (a) (b) the elements σ1 and σ1 admit no common right (or left) multiple, since there is (a) (b) no valid reversing grid from (σ1 , σ1 ). In [9], the embeddability criterion of Ore’s theorem is extended to cancellative monoids with no nontrivial invertible elements that satisfy the following “3-Ore condition”: any three elements of M which pairwise admit a common right multiple (2.10) admit a common right multiple, and similarly for left multiples, provided any two elements of M admit a left and a right gcd, i.e., greatest lower + bounds with respect to left and right division. For #C > 2, the monoid Bn,C (a) (a) does not admit gcds: for instance, for a 6= b, the elements σ1 and σ2 left divide (a) (a) (a) (a) (b) (a) (a) (a) both σ1 σ2 σ1 and σ1 σ2 σ1 , but no common multiple of σ1 and σ2 left divides the above elements. This leads to two new questions: + satisfy the 3-Ore condition (2.10)? Question 2.7. Does the monoid Bn,C Question 2.8. Is the 3-Ore condition (2.10) sufficient for implying the embeddability of a monoid in its enveloping group in the case of a cancellative monoid that need not admit gcds? + 2.2. A variant. In [2], the authors consider a variant of the monoid Bn,C with the same generators but with a restricted list of relations: Definition 2.9. For n > 1 and C a nonempty set, the monoid of restricted positive C-colored braids is the monoid with presentation +  (b) (a) (a) (b) for |i − j| > 2 σi σj = σj σi (a) + e . (2.11) Bn,C := σi | i 6 n, a ∈ C (a) (a) (b) (b) (a) (a) for |i − j| = 1 σi σj σi = σj σi σj A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS 17 All relations of (2.11) are relations of (2.1), but, in the “Yang-Baxter” relations, + the median color must be equal to one of the extremal colors. Thus the monoid Bn,C e+ . The authors of [2] ask whether the monoid B e+ is a quotient of the monoid B n,C n,C is cancellative. Frustratingly, the criterion of Proposition 1.14 cannot be applied: Fact 2.10. Right reversing is not complete for the presentation (2.11). (a) (b) (c) (c) (c) (c) (b) Proof. Property (♦) fails for σ1 and the relation σ2 σ3 σ2 = σ3 σ2 σ3 . Indeed, we have the following valid grid (c) (c) σ3 (b) σ2 σ3 (a) (2.12) (a) (a) (b) σ1 σ1 σ3 (a) σ1 (b) σ1 (c) (a) σ3 σ2 (a) σ2 (c) σ2 (a) σ3 (b) σ1 (b) σ3 (a) σ2 (b) (c) (c) and there may exist no equivalent grid from (σ1 , σ2 σ3 σ2 ). Indeed, according to what was seen in the proof of Lemma 2.3, the only possible form for such a grid would be (b) (c) σ2 (c) σ3 σ2 (y) (x) σ1 (2.13) (c) (x) σ1 σ3 (a) σ1 (x) σ2 (b) σ1 (y) (x) σ2 (c) ε ε ε σ1 (a) σ3 ε (c) σ2 (c) σ1 (y) σ3 σ3 (y) σ2 σ2 (a) σ2 σ1 (a) (a) σ3 (c) σ1 (a) (b) (a) (y) (x) (a) with x ∈ {a, b} and y ∈ {a, c} ∩{x, c}. The equivalence of σ1 σ2 σ3 and σ1 σ2 σ3 would require in particular x = b. But, on the other hand, the equivalence class (c) (a) (c) (b) (b) of the word σ3 σ2 σ1 σ3 σ2 on the bottom edge of (2.12) with respect to the congruence generated by the relations of (2.11) consists of two words only, namely (c) (a) (c) (b) (b) (c) (a) (b) (c) (b) (b) σ3 σ2 σ1 σ3 σ2 and σ3 σ2 σ3 σ1 σ2 , none of which begins with σ2 . Hence no (a) (b) (c) (c) (σ1 , σ2 σ3 σ2 )-grid may be equivalent to (2.12).  e+ is not cancellative, The above negative result does not say that the monoid B n,C it just says that the criterion of Proposition 1.14 fails to apply. The proof of Fact 2.10 provides an explicit example of a valid relation that cannot be checked using reversing, namely (2.14) (b) (c) (c) (a) (b) (a) (a) (c) (a) (c) (b) (b) σ2 σ3 σ2 σ1 σ2 σ3 ≡ σ1 σ3 σ2 σ1 σ3 σ2 , (c) whose only proof requires introducing an intermediate word beginning with σ3 , for (c) (b) (b) (a) (b) (a) instance σ3 σ2 σ3 σ1 σ2 σ3 . In other words, every van Kampen diagram witnessing for (2.14) must contain a vertex from which three edges start. By adding (2.14) as a new (redundant) relation in the presentation, we can make the above relation eligible for factor reversing, but new obstructions are likely to appear, and it is not 18 PATRICK DEHORNOY clear why the completion procedure thus sketched should come to an end. Thus, the following question is left open: e+ admit cancellation? Does it embed in Question 2.11. [2] Does the monoid B n,C its enveloping group? References [1] S.I. Adyan, On the embeddability of monoids, Soviet. Math. Dokl. 1-4 (1960) 819–820. [2] A. Berenstein, J. Greenberg, and J.R. Li, Monomial braidings, in preparation, http://www.wisdom.weizmann.ac.il/∼jianrong/mon braid fin.pdf. [3] J. Birman, Braids, Links, and Mapping Class Groups, Annals of Math. Studies 82 Princeton Univ. Press (1975). [4] A.H. Clifford & G.B. Preston, The algebraic Theory of Semigroups, vol. 1, Amer. Math. Soc. Surveys 7, (1961). [5] P. Dehornoy, Groups with a complemented presentation, J. Pure Appl. Algebra 116 (1997) 115–137. [6] P. Dehornoy, On completeness of word reversing, Discrete Math. 225 (2000) 93–119. [7] P. Dehornoy, Complete positive group presentations, J. Algebra 268 (2003) 156–197. [8] P. Dehornoy, The subword reversing method, Internat. J. Algebra Comput. 21 (2011) 71–118. [9] P. Dehornoy, Multifraction reduction I: The 3-Ore case and Artin-Tits groups of type FC, J. Comb. Algebra 1 (2017) 185–228. [10] P. Dehornoy, with I. Dynnikov, D. Rolfsen, B. Wiest, Ordering Braids, Mathematical Surveys and Monographs vol. 148, Amer. Math. Soc. (2008). [11] P. Dehornoy & B. Wiest, On word reversing in braid groups, Int. J. Algebra Comput. 16(5) (2006) 931–947. [12] F.A. Garside, The braid group and other groups, Quart. J. Math. Oxford 20-78 (1969) 235– 254. [13] R.C. Lyndon & P.E. Schupp, Combinatorial Group Theory, Springer-Verlag; 1977, reprinted in 2001. [14] Ø. Ore, Linear equations in non-commutative fields, Ann. of Math. 34 (1933) 480–508. [15] J.H. Remmers, On the geometry of semigroup presentations, Adv. Math. 36 (1980) 283–296. Laboratoire de Mathématiques Nicolas Oresme, UMR 6139 CNRS, Université de Caen, 14032 Caen, France E-mail address: [email protected] URL: dehornoy.users.lmno.cnrs.fr
4math.GR
Quickest Change Detection Approach to Optimal Control in Markov Decision Processes with Model Changes arXiv:1609.06757v2 [stat.AP] 1 Mar 2017 Taposh Banerjee1 , Miao Liu2 and Jonathan P. How3 Abstract— Optimal control in non-stationary Markov decision processes (MDP) is a challenging problem. The aim in such a control problem is to maximize the long-term discounted reward when the transition dynamics or the reward function can change over time. When a prior knowledge of change statistics is available, the standard Bayesian approach to this problem is to reformulate it as a partially observable MDP (POMDP) and solve it using approximate POMDP solvers, which are typically computationally demanding. In this paper, the problem is analyzed through the viewpoint of quickest change detection (QCD), a set of tools for detecting a change in the distribution of a sequence of random variables. Current methods applying QCD to such problems only passively detect changes by following prescribed policies, without optimizing the choice of actions for long term performance. We demonstrate that ignoring the reward-detection trade-off can cause a significant loss in long term rewards, and propose a two threshold switching strategy to solve the issue. A non-Bayesian problem formulation is also proposed for scenarios where a Bayesian formulation cannot be defined. The performance of the proposed two threshold strategy is examined through numerical analysis on a non-stationary MDP task, and the strategy outperforms the state-of-the-art QCD methods in both Bayesian and non-Bayesian settings. I. I NTRODUCTION AND M OTIVATION In their life time, autonomous agents may be required to deal with non-stationary stochastic environments, where parameters of the world (dynamics, cost and goals) change over time (for the same states spaces). For example, in robotic navigation, a path planner might need to accommodate dynamically changing friction coefficients of road surfaces or wind conditions to ensure safety. In inventory control, an order management agent might need to account for the time varying distribution of demands for goods and services when determining the order at each decision period. A service robot may have to adapt to different personality or behavior of the person it is assisting. In a multi-agent system, an agent may have to adapt to changing strategies of the opponent or other players [1]. In order to maximize long term rewards, it is paramount that the agents are able to quickly detect the changes in the environment and adapt their policies accordingly. When the environment is stationary, many of these problems for autonomous agents, path planning or robot control can be formulated as an MDP, for which there is a rich 1 Taposh Banerjee is with the School of Engineering and Applied Sciences, Harvard University, Cambridge, MA. [email protected] 2 Miao Liu is with IBM T. J. Watson Research Center, Yorktown Heights, New York. [email protected] 3 Jonathan P. How is with the Laboratory for Information and Decision Systems (LIDS), Massachusetts Institute of Technology, Cambridge, MA. [email protected] Work completed while the first two authors were at LIDS, MIT. literature [2].When the environment is non-stationary, there is a limited understanding on the best strategy to employ. In this paper, we are interested in the case where the nonstationary process consists of several stationary processes. Each stationary process corresponds to an MDP, and the non-stationary nature is captured by changes in the transition and/or reward structure of the MDPs. That is, we consider the whole operation in a non-stationary environment as a global task, which can be decomposed into several stationary subtasks. This is a general case often encountered in real world applications, such as robotics, inventory controls, etc. For example, in inventory control, it is reasonable to assume that the demand rate would be steady for some time, before changing to another value. For path planning, one can assume that the road surfaces or wind conditions are steady for a while before changing, etc. Solving dynamic decision making in non-stationary environments optimally is an extremely hard problem. Although it is extensively studied in the literature, due to the analytical intractability of the problem, however, existing works aim towards developing approximate solutions. For example, in some papers, the problem is reformulated as a Partially Observable MDP (POMDP), and approximate POMDP solvers are used to obtain a solution; e.g., see [3] and [4]. In others, estimates are maintained of the current MDP parameters, and next state or reward predictors are used to assess whether the parameters of the active MDP has changed; see e.g. [5] and [6]. In [7] and [8], new models such as hidden mode MDPs (hmMDPs) and mixed observability MDPs (MOMDPs) are proposed to capture the transition between different MDPs, and approximate solutions are obtained. Although these approximate solutions are promising tools for solving non-stationary MDPs, they are restricted to problems where the model sizes are known a priori, and they might still suffer from high computational overhead. The approach of multitask or transfer learning has also been used to study these problems. However, in these approaches, tasks are usually assumed to be well separated and given before learning and planning take place. There is no explicit concept of automatic change detection in these problems. Problems of this nature are also explored in the adaptive control literature. For example, in [9] and [10], the authors study optimal control of an MDP with unknown parameters in the transition kernel. Again, there is no concept of a change in this problem. In this paper, we approach the problem of optimal control in MDPs with model changes through the viewpoint of classical quickest change detection (QCD) [11]. The changes in properties of MDPs (transition or reward) cause a change in the law of the state-action sequence. Tools and ideas from the QCD literature can be used to detect these changes in law. QCD algorithms are scalable, and are optimized for quickest detection. In spite of these properties, these tools are either never used, or are not fully exploited in science and engineering literature, especially in the problem of interest in this paper. For example, sequential detection approaches are applied in [12] and [13], where the optimal policy for each MDP is executed, and a change detection algorithm is employed to detect model changes. We will show in this paper that such a naive approach may lead to significant loss in performance. The key idea is that what is optimal for optimizing rewards may not necessarily be optimal for quickest detection of model changes. Thus, there is a fundamental reward-detection trade-off to be exploited. The purpose of this paper is to articulate this trade-off in a mathematically precise manner, and to propose solutions that we claim best exploit this trade-off. Specifically, we propose a computationally efficient, simple two-threshold strategy to quickly detect model changes, without significant loss in rewards. We show that such an approach is superior to the existing methods in the literature. Specifically, we show that the two-threshold strategy leads to better performance as compared to the single threshold classical QCD tests, as employed in [13]. Note that it is shown in [13] that a QCD approach is better (with respect to the Bayesian problem we use in this paper; see (2) below) than other approaches in the literature, e.g., [6]. For benchmarking purposes, we also compare with the MOMDP solution [8] and a random action strategy. II. P ROBLEM F ORMULATION Assuming we have a family of MDPs {Mθ }, where θ takes value in some index set Θ, which could be finite or infinite. For each θ , an MDP is defined by a four tuple: Mθ = (S , A , Tθ , Rθ ), where S and A are respectively the state space and the action space common to all MDPs, Tθ is the transition kernel, and Rθ is the reward function. A decision maker observes a sequence of states {sk }k≥0 , sk ∈ S , ∀k, and for each observed state sk , it chooses an action ak ∈ A . For each pair (sk , ak ), the next state sk+1 takes values according to the law dictated by the kernel: ∀k Tθ (s, a, s0 ) :=P(sk+1 = s0 | ak = a, sk = s), s, s0 ∈ S , a ∈ A . The reward obtained by choosing action ak after observing sk is given by Rθ (sk , ak ). We operate in a non-stationary environment, which means that the transition structure or the reward structure can change over time. Specifically, at time say γ1 , the parameter θ of the MDP changes from θ = θ0 to say θ = θ1 . At a later time, say γ2 , the parameter changes from θ = θ1 to θ = θ2 , and so on. To be precise, denote the non-stationary dynamics for k ≥ 0 as P(sk+1 = s0 | ak = a,sk = s)  Tθ0 (s, a, s0 ), for k < γ1 = Tθ1 (s, a, s0 ), for γ1 ≤ k < γ2 (1) Reward for (sk , ak ) := Rk (sk , ak )  Rθ0 (sk , ak ), for k < γ1 = Rθ1 (sk , ak ), for γ1 ≤ k < γ2 . For simplicity of exposition, for now we restrict our attention to the case where there is only one change point γ, and there are only two models, a pre-change model M0 = (S , A , T0 , R0 ) and a post-change model M1 = (S , A , T1 , R1 ). In Section VI, we discuss extensions of the ideas developed for the two model case, to the case where there are more than two models (possibly infinite), and possibly more than one change point. We consider two different problem formulations: Bayesian and Non-Bayesian. A. Bayesian Formulation Suppose we have a prior on the single change point γ = γ1 , and we have chosen a policy Π = (π1 , π2 , · · · ) that maps the states {sk } to actions {ak }. The MDPs M0 and M1 , the policy Π, and the prior on the change point, together induce a joint distribution on the product space of state spaces and actions which we denote by P, and the corresponding expectation by E. The objective is to choose the policy Π so as to maximize a long term reward. h i ∞ (2) max E ∑k=0 β k Rk (sk , ak ) , Π where β ∈ [0, 1) is a discount factor. Note that the change point γ is unobservable. As a result, a Markov policy may not be optimal, and the policy Π above has to use the past history to choose the optimal action. To accommodate model changes, problem (2) can be reformulated as a Partially Observable MDP (POMDP) (see Lemma 1 below), and can be solved using approximate POMDP solvers. However, it is computationally expensive to solve this problem numerically, especially when the number of possible models is large. We thus use other approaches to obtain approximate solutions. The vehicle we have chosen to obtain the approximate solutions is the theory of QCD. We show in Section VII that our proposed solutions performs as well as the solution obtained from standard approximate POMDP solvers in the literature, while at the same time it incurs significantly less computational cost, online and off-line. Lemma 1: The non-stationary MDP problem (2) is equivalent to a POMDP problem with the model specified as f, Ω, R), e where X = S × Θ is the MPOMDP (X , A , O, T POMDP state space, which concatenates the fully observable MDP state space S and the unobservable model index space Θ; O is the set of observations, which is equivalent to the set f: X × A × X → [0, 1] is the POMDP state of MDP states; T transition function; Ω : X ×A ×O → [0, 1] is the observation function; Re : X × A → R is the reward function with  f x0 = (s0 , θ 0 )|x = (s, θ ), a = Tθ 0 (s, a, s0 )F (θ 0 |θ )I(θ 0 6= θ ) T + Tθ (s, a, s0 )F (θ 0 |θ )I(θ 0 = θ ) ω(o|x0 , a) = I(o = s0 ) R̃(x, a) = Rθ (s, a) (3) where I(·) is an indicator function, and F is a model transition matrix. Given the prior over a change point to be geometric distribution, i.e.,γ ∼ Geom(λ ), it can be shown that  λ I(θ 0 6= θ )+(1 − λ )I(θ 0 = θ ) if θ = 0 0 F (θ |θ ) = . I(θ 0 6= θ ) if θ = 1 (4) By converting the original non-stationary MDP problem into a POMDP problem, one can apply any existing POMDP solvers to obtain an approximate POMDP policy, which maps the belief state b(x) to an action a. Considering the fact that here the state space can be factorized into an observable part and an unobservable part, this POMDP model can be treated as a mixed observable MDP (MOMDP). In an MOMDP, the belief state becomes a union of |S| disjoint |Θ|-dimension subspaces, and all the operations are performed in the lower dimension, hence is more time efficient to solve a MOMDP than to solve a POMDP. B. Non-Bayesian Formulation In practice, a prior on the change point is not often known. Thus, a Bayesian formulation cannot be defined. If the change point is treated as an unknown constant, there are infinite possible laws on the state-action joint spaces, one for each possible change point. In statistics, there are two ways to study non-Bayesian problems: minimax or maxmin and NeymanPearson type criteria. For minimax or maxmin criterion we may consider the following problem: h i ∞ max min Eγ ∑k=0 β k Rk (sk , ak ) , Π γ where Eγ is the expectation with respect to the probability measure when change occurs at time γ. However, there are two major issues with such an approach in practice. First, a minimax approach may lead to a conservative or pessimistic approach to policy design. Secondly, it is not always straightforward to compute such costs for comparing various competing algorithms. Since the problem under consideration is about identifying the correct regime, we also consider a Neyman-Pearson type of criterion: trying to maximize reward in one regime subject to a constraint on the performance under alternative regime. We take this approach (in addition to the Bayesian formulation) in our paper and consider the following problem. max Π subj. to h E1 , i ∞ ∑k=0 β k Rk (sk , ak ) ≥ α. ∑ h E∞ i ∞ β k Rk (sk , ak ) k=0 (5) Thus, the objective is to optimize rewards when the change occurs at time 1, subject to a constraint on the performance when the change never occurs. In sequential analysis literature, one often uses a minimax objective rather than the average under E1 . As mentioned earlier, this leads to a pessimistic viewpoint. Also, for many sequential detection algorithms in the literature, the worst case is often achieved for γ = 1.  k Thus, E1 ∑∞ k=0 β Rk (sk , ak ) can also be seen as a proxy for the minimax or maxmin reward. Another advantage of the Neyman-Pearson type criterion is that it maintains a balance in reward structure between the pre- and post-change regime. A discounted cost criterion with a discount factor β < 1, as chosen in Bayesian and maxmin problems, may not always be appropriate for the application in hand. This is because such a criterion penalizes under-performing under M0 more than it penalizes underperforming under M1 . In reality, we may be interested in maintaining good performance under every regime. C. Oracle Policy Let V0 (x) and V1 (x) be the cost/reward to go at state x for the MDP models M0 and M1 , respectively. Suppose the following conditions are satisfied: 1) the change point is exactly known, 2) the change point γ >> 1, 3) for some small δ > 0, the function |V1 (x) − V1 (y)| ≤ δ , ∀x, y, that is the reward to go for the model M1 is not sensitive to the initial state x. The implication of the first two conditions is that it is approximately optimal to use the optimal policy for M0 before the change point. The implication of the last condition is that, no matter which policy is used for model M0 , it is still approximately optimal to use the optimal policy for model M1 after the change point. As a result, if all three of these conditions are satisfied, then one can just implement the optimal policy for the model M0 before change and use the optimal policy for the model M1 after change, and achieve close to maximum average rewards. In the following, such a policy is referred to as the Oracle. Since the change point is unknown, it is clear that if the change can be reliably detected, then one can hope to achieve rewards close to what the Oracle can achieve. There are powerful algorithms in the literature that one can use to detect this change as quickly as possible. We briefly discuss relevant ideas and algorithms in the next section, which serves as a background to readers not familiar with the literature on quickest change detection. III. BACKGROUND ON Q UICKEST C HANGE D ETECTION In the quickest change detection literature, algorithms are developed that allows one to quickly detect a change in the distribution of a stochastic process from one law to another. The optimality properties of the algorithms are studied under various modeling assumptions and problem formulations. The theoretical foundations were laid by the work of Wald [14] and Shiryaev [15]; see also [11] for a survey of the area. We discuss three such algorithms in the context of problems (2) and (5). Suppose we employ a certain policy Π and observe a sequence of states and actions (driven by the policy) {(sk , ak )}. At the change point Γ, modeled as a random variable with prior probability mass function φ , the model changes from M0 to M1 . Thus, the law of the stochastic sequence {(sk , ak )} changes. Then the following algorithm, called the Shiryaev algorithm [16], has strong optimality properties. The Shiryaev algorithm dictates that we compute the following statistic at each time n: T1 (si−1 , ai−1 , si ) , T i=k 0 (si−1 , ai−1 , si ) n Sn = ∑ 1≤k≤n φ (k) ∏ (6) and declare that a change in the model has occurred at the stopping time τs = min{n ≥ 1 : Sn > A}. (7) Here, A is a threshold chosen to control false alarms. If the prior on the change point is geometric with parameter ρ, then the statistic Sn can be computed recursively: 1 + Sn−1 T1 (sn−1 , an−1 , sn ) Sn = ; 1 − ρ T0 (sn−1 , an−1 , sn ) It is shown in [16] that if A = 1−ζ ζ S0 = 0. (8) then | log ζ | as ζ → 0. Iπ + d τ:P(τ≤Γ)≤ζ (9) Thus, the Shiryaev algorithm achieves the best average detection delay over all stopping times that satisfied a given probability of false alarm constraint of ζ , as ζ → 0. Here, d is a constant that is a function of the prior φ and equals | log(1 − ρ)| for Γ ∼ Geom(ρ). The quantity Iπ is the Kullback-Leibler information number defined by   T1 (sk−1 , ak−1 , sk ) 1 n under P1 . (10) Iπ = lim ∑ log n→∞ n T0 (sk−1 , ak−1 , sk ) k=1 E[(τs − Γ)+ ] ∼ E[(τ − Γ)+ ] ∼ min Thus, larger this number Iπ is, the smaller is the detection delay. We use the subscript π to emphasize that the information number is a function of the policy Π employed. If the prior on the change point is not known, or if a prior cannot be defined, one can replace the Shiryaev statistic by the CUmulative SUM statistic (CUSUM) [17] n Wn = T1 (si−1 , ai−1 , si ) ∑ log T0 (si−1 , ai−1 , si ) , n−m≤k≤n max (11) i=k where m is a window size that depends on the false alarm constraint. The CUSUM algorithm has strong optimality properties, similar to (9), but with average delay and probability of false alarm expressions replaced by suitable minimax delay and mean time to false alarm expressions [17]. Specifically, if τc = min{n ≥ 1 : Wn > A}, (12) then, with A = log η, sup Eγ [τc − γ|τc > γ] ∼ γ ∼ min sup Eγ [τ − γ|τ > γ] τ:E∞ [τ]≥η γ | log η| as η → ∞. Iπ (13) Here, Eγ is the expectation when the change point is at γ, and E∞ is the expectation when the change never occurs. Thus, the CUSUM algorithm minimizes the maximum of detection delay–maximum over all possible change points–subject to a constraint η on the mean time to false alarm, as η → ∞. Again, the optimal performance, for a given false alarm, depends on the information number Iπ . Thus, the number Iπ is the fundamental quantity of interest in quickest change detection problems. It will also play a fundamental role in the rest of the paper. An alternative to CUSUM in the non-Bayesian setting is to put ρ = 0 in the Shiryaev algorithm and obtain what is called the Shiryaev-Roberts (SR) statistic SRn = (1 + SRn−1 ) T1 (sn−1 , an−1 , sn ) ; T0 (sn−1 , an−1 , sn ) SR0 = 0, (14) and use the stopping time τsr = min{n ≥ 1 : SRn > A}. (15) In the numerical results reported in Section VII, we use the SR test instead of CUSUM because of the ease of implementation. The algorithms discussed above can be easily modified to also account for a change of distribution of rewards. We do not discuss that here for simplicity of exposition. Also, the state and action sequences are more informative. Thus, unless only the reward undergoes a change, and the transition functions do not change, only then it will be useful to consider rewards for detection. Trade-off Between Detection Performance and Reward Note that the problems in (2) and (5) are not classical change detection problems. The objective is not to optimize delay subject to constraint on false alarms, but to optimize long term rewards. Thus, while quick detection is key, what is optimal for change detection may not be optimal with respect to optimizing rewards, and vice versa. Thus, there is a fundamental trade-off between detection performance and maximizing rewards. See Section IV below for a more rigorous statement. The fundamental contribution of this paper is a computationally efficient two-threshold algorithm that optimizes this detection-reward trade-off to achieve near optimal performance. As discussed in the introduction, most of the works in the existing literature either do not exploit tools from the change detection literature, or very few who exploit them, ignore this trade-off in their design. IV. Q UICKEST D ETECTION WITH L OCALLY O PTIMAL S OLUTION One approach to solving either (2) or (5) is to use a locally optimal approach, i.e., to start with using the optimal policy for model M0 , compute the change detection statistics (Shiryaev, SR or CUSUM) over time, and switch to the optimal policy for the model M1 at the time when the change detection algorithm crosses its threshold. Mathematically, let Π0 = (π0 , π0 , · · · ) be the (stationary) Markov optimal policy for model M0 , and let Π1 = (π1 , π1 , · · · ) be the (stationary) Markov optimal policy for model M1 . Then use the following policy Πloc = (π0 , π0 , · · · , π0 , π1 , π1 , · · ·), (16) | {z } | {z } τ−1 times τ onward where τ is the stopping time for the Shiryaev, SR or the CUSUM algorithm. a) Choosing the threshold: In the quickest change detection problem, the threshold A used in the Shiryaev, SR or CUSUM tests is designed to satisfy the constraint on the rate of false alarms. However, for problems in (2) and (5), there is no notion of a false alarm. For the non-Bayesian criterion, one can choose the threshold to satisfy the constraint of α (see (5)). However, in the Bayesian setting, the threshold is a free parameter, and can be optimized for optimal performance. b) Issues with policy Πloc : As we will show in Section VII, the policy Πloc may lead to poor performance. This is because, as discussed in Section III, the detection performance of the stopping rule τ used depends on the information number Iπ0 ; see (10). Let Algorithm 5.1: ΠTT : Two-Threshold Switching Strategy Require: Thresholds A and B, B < A; optimal policies π0 , π1 , πKL ; transition kernels T1 (s, a, s0 ) and T0 (s, a, s0 ) 1: Start with S0 = 0 2: while Sn ≤ A do 3: Use locally optimal policy Π0 = (π0 , π0 , · · · ) 4: Compute the statistic Sn using (8) 5: If Sn ≤ B continue using the policy π0 6: If Sn > B use πKL 7: n=n+1 8: end while 9: Switch to policy Π1 = (π1 , π1 , · · · ) 10: return Imax := max Iπ . π Then, it is possible that Iπ0  Imax , and that Iπ0 is itself quite small. This may lead to poor detection performance, and hence may cause significant loss of revenue or rewards. If it so happens that Iπ0 ≈ Imax , and Iπ0 is significant, then one can expect that this simple strategy Πloc itself may lead to near optimal performance. But, this is more a matter of chance, and more sophisticated approaches are needed that considers every possibility. We note that in some cases one may be able to use MOMDP or POMDP based approximations to compute the optimal policy for our problem, but such solutions are computationally demanding. Using a quickest change detection approach leads to computationally efficient algorithmic techniques. V. A T WO -T HRESHOLD S WITCHING S TRATEGY TO E XPLOIT R EWARD -D ETECTION T RADE -O FF One way to improve the performance of the policy Πloc is to replace the policy Π0 by another policy that better exploits the reward-detection trade-off. One option is to replace Π0 by a policy that maximizes the information number Iπ . Define for each state s ∈ S , the information maximizing policy πKL (s) as T1 (s, a, s0 ) πKL (s) = arg maxa ∑ T1 (s, a, s0 ) log . (17) T0 (s, a, s0 ) s0 Specifically, use ΠKL = (πKL , πKL , · · · , πKL , π1 , π1 , · · ·). | {z } | {z } τ−1 times (18) τ onward Using this policy will lead to quickest and most efficient detection of model changes. However, since the policy πKL may not be optimal for the MDP model M0 , it may cause significant loss of rewards before the change point. We propose to use a simple two-threshold strategy that switches between π0 and πKL , using π0 to optimize rewards, and switching to πKL for information extraction. The proposed switching strategy is closely related to the notion of sequential design of experiments [18], or to the notion of exploitation and exploration in multi-arm bandit problems [19]. The two-threshold policy ΠTT is described in Algorithm 5.1. In words, fix two thresholds A and B, with B < A. Also, assume that we are in the Bayesian setting so that we can compute the Shiryaev statistic Sn (8). Then the policy ΠTT is defined as follows. Start with the locally optimal policy Π0 = (π0 , π0 , · · · ) and compute the statistic Sn . As long as Sn ≤ B, keep using the Markov policy π0 . If Sn > B, suggesting that we may be in the wrong model, extract more information by using πKL . If Sn goes below B again, switch back to π0 , else we keep using πKL . If Sn > A, switch to the optimal Markov policy for model M1 , that is π1 . In short, use π0 when Sn ∈ [0, B], use πKL when Sn ∈ (B, A], and use π1 when Sn ∈ (A, ∞). Thus, the change detection statistic Sn is used as a belief on the unknown model, and is used for detection between M0 and M1 , depending on whether Sn is small or large, respectively. For moderate values of Sn , the policy πKL is used to improve detection performance. ΠTT = (π0 , · · · , π0 , πKL , · · · , πKL , π0 , · · · , π0 , · · · , | {z } | {z } | {z } Sn ≤B B<Sn ≤A Sn ≤B · · · , πKL , · · · , πKL , π1 , π1 , · · ·). | {z } | {z } B<Sn ≤A until τ−1 (19) τ onward In the non-Bayesian setting, we can replace the Shiryaev statistic Sn by the SR statistic SRn (14) or the CUSUM statistic Wn (11). a) On the choice of thresholds A and B: Note first that setting A = B reduces the two-threshold policy ΠTT to the locally optimum policy Πloc . Also, by setting B = 0 the policy reduces to ΠKL . As discussed earlier, this will lead to good detection performance, but may lead to loss of rewards. Akin to Πloc , the thresholds A and B here are free parameters, even for the non-Bayesian setting. Thus, the thresholds can be optimized for best performance: choosing the optimal thresholds is equivalent to choosing the best detection-reward trade-off. b) Bayesian vs Non-Bayesian: We emphasize that the definition of ΠTT is implicitly different for Bayesian and non-Bayesian cases. In the Bayesian case, we have access to the prior on the change point, and we use that to compute the Shiryaev statistic Sn . However, in the non-Bayesian case, we replace the Shiryaev statistic by the Shiryaev-Roberts statistic SRn or the CUSUM statistic Wn . c) When will ΠTT outperform Πloc ?: The amount of performance gain depends in general on the problem structure: reward function and the transition kernel. However, a condition which must be satisfied is Iπ0  Imax . This condition often leads to better detection performance for ΠTT as compared to Πloc , resulting in efficient detection and more average rewards. Another condition under which performance gains are significant is when under-performing under any of the models is penalized equally. For example, in the Bayesian case (2), if the discount factor β is small, then the rewards lost in delaying a transition to the optimal policy of M1 will not affect the overall cost. As a result, a policy can cause large delays, without significantly loosing rewards, and a good detection performance may not necessarily lead to noticeable gain in rewards. Numerical results are provided in the next section to support these observations. VI. M ULTIPLE M ODELS AND C HANGE P OINTS For a parametrized family of models {Mθ }, if the model changes from Mθ0 to some other unknown model in the family, then the Shiryaev, SR or CUSUM statistic cannot be used for change detection. This is because one needs the exact knowledge of the post-change distribution to compute those statistics. Popular alternatives are to use generalized likelihood ratio (GLR) based tests or mixture based tests. We only discuss the former. A GLR statistic for change detection is defined as n Gn = max sup Tθ (si−1 , ai−1 , si ) ∑ log Tθ (si−1 , ai−1 , si ) , n−m≤k≤n kθ −θ k≥ε i=k 0 0 where ε is the minimum magnitude of change that can occur in the problem. A replacement for Πloc in this setting would be to use locally optimal policy and switch at the time of stopping, where now the stopping rule is τg = min{n ≥ 1 : Gn > A}. Since there is more than one possibility for the post-change model, one can use the maximum likelihood estimate (the θ that achieved the maximum in the expression for Gn at the time of stopping) to choose the model. When the number of models is finite, one can also use the theory of fault isolation to choose the right model [20]. A replacement for ΠTT in this setting is even less obvious because of the difficulty in defining an appropriate version of πKL . We propose the following πKL (s) = arg maxa Tθ (s, a, s0 ) ∑ Tθ (s, a, s0 ) log Tθ (s, a, s0 ) . kθ −θ0 k≥ε 0 min s 0 (20) Thus, maximize the worst case KL divergence. Analytical and numerical performance of these schemes will be reported elsewhere. If there are multiple change points, then as long as the gap between the change points is large enough, we can repeat the two model algorithm for consecutive change points. Specifically, if the GLR based algorithm detects a change and gives θ1 as an estimate for the post-change parameter, then we can reset the algorithm with θ1 as the pre-change parameter, and reapply the GLR based test. As long as there is a significant gap between model parameters, one would expect this technique to be close to optimal. VII. N UMERICAL R ESULTS We now compare the two policies ΠTT and Πloc for an inventory control problem, and show that using ΠTT results in significant gains. We use the inventory control problem to illustrate the ideas because of its simplicity. The understanding developed through this simple problem can be extended to more complex problems. a) Inventory control problem: The state sk is the level of the inventory at time k, and the maximum size of the inventory is N. The action ak is the additional inventory to be ordered based on the state sk , making the total inventory sk + ak . A stochastic demand wk arrives making the residual inventory or the next state sk+1 = max{0, sk + ak − wk }. Let c to be cost of ordering a unit of inventory, h be the holding cost per unit, and p be the cost of loosing a unit of demand. Thus the cost per unit time is given by C(sk , ak ) = Ewk [ cak + h max{0, sk + ak − wk } +p max{0, −(sk + ak − wk )}] . (21) It is assumed that at the change point, the distribution of the demands changes from Poisson(λ ) to Uniform. The demands are assumed to be independent, conditioned on the change point. For clarification, note that the problem formulations (2) and (5) are about maximizing rewards, but the objective in the inventory control problem is to minimize cost. b) Numerical results for Bayesian setting: Under the Bayesian setting (2), it is assumed that the change occurs with a geometric prior ρ = 0.01. The other parameter values used are c = 1, h = 5, β = 0.99, λ = 2, N = 10, 20, and p is chosen to be 100, 200 or 300. This is a classical optimal control problem and the optimal policy under each model, Poisson or Uniform, can be found using value iteration [2]. The performance of various policies discussed are tabulated in Table I. The results are obtained by performing average over 1000 independent runs, each of horizon size 1000. The Oracle policy is the one that knows the change point, and switches from the optimal policy for the Poisson model to the optimal policy for the Uniform model, exactly at the change point. The policy Πloc employs the Shiryaev algorithm (7). Since there is no concept of false alarms, the choice of threshold A is optimized to achieve minimum possible cost. The policy ΠTT also employs the Shiryaev algorithm, and the values of the two thresholds are also chosen to achieve minimum possible cost. For comparison, the costs achieved by performing an MOMDP approximation and a random action strategy is also shown. The performance of the policy ΠTT is comparable to that of the MOMDP solution, and significantly better than that of Πloc . Note that the gain is more significant when Imax is much larger than Iπ0 . Also, since the Poisson arrival rate chosen implies less demand as compared to the Uniform arrival rate, the optimal control is more aggressive for the Uniform arrival model. A delay in detecting the change will result in significant loss of demands. The chosen value of the discount factor β and p ensures that delays in detection, TABLE I: Bayes discounted cost (2) for different policies: c = 1, h = 5, β = 0.99, ρ = 0.01. The values in the table are obtained by averaging costs over 1000 independent runs, each of horizon size 1000. N 20 20 20 10 10 10 p 100 200 300 100 200 300 Oracle 4057 4229 4277 2336 2445 2550 Πloc 4980 5678 5884 2619 2902 2920 ΠTT 4579 5051 5238 2515 2728 2813 MOMDP 4688 5144 5325 2677 2876 3020 RANDOM 16489 27655 38821 7861 13623 19386 Imax 8.45 8.45 8.45 1.72 1.72 1.72 Iπ0 2.56 2.56 3.24 1.17 1.42 1.61 and outperform the state-of-the art QCD method and MOMDP method for solving non-stationary MDP tasks. Future work will include application of ideas developed in this paper to design of reinforcement learning based algorithms for decision making in non-stationary environments. See [21] for a stochastic approximation based approach to this problem. ACKNOWLEDGMENT This research was funded in part by Northrop Grumman and Lincoln Laboratory. R EFERENCES Fig. 1: Performance under M1 subject to constraints on the performance under M0 . The SR algorithm (14) is used while implementing the policies. and hence loss in demands, are sufficiently penalized under both regimes, pre-change and post-change. c) Numerical results for Non-Bayesian setting: An overall discounted criterion like (2) may not be the best or even fair way to compare competing algorithms for a nonstationary environment. One of the primary reasons for using (2) as a criterion was to show that the proposed algorithm can perform comparable to an MOMDP approximation. A more appropriate performance metric is a variational one (5). In this setting, instead of optimizing the threshold used in the policies, the thresholds are selected to satisfy the constraint  kC (s , a ) , in which the change never of α on E∞ ∑∞ β k k k k=0 occurs. of the thresholds, the performance  ∞ Fork these choices  E1 ∑k=0 β Ck (sk , ak ) is evaluated for both ΠTT and Πloc in which the change occurs at time 1. This way, performance under both the regimes or MDPs are equally weighted, and an algorithm that performs well in every setting can be obtained. The performance comparison is plotted in Fig. 1. The parameter used are c = 1, h = 5, β = 0.99, λ = 2, N = 20, and p = 200. We use the Shiryaev-Roberts (14) algorithm to detect changes. Clearly, ΠTT is superior. Finally, note that since we do not have a prior on the change point, a POMDP or MOMDP solution cannot be obtained. VIII. C ONCLUSIONS This paper presents a novel way to combine techniques used for stationary MDPs and quickest change detection to solve non-stationary MDPs by considering the tradeoff between change detection and reward maximization, an important problem that has not been adequate addressed before. Our method uses a two threshold switching strategy to exploit reward-detection trade-off. Our numerical results show that the proposed method can achieve better trade-off, [1] P. Hernandez-Leal, M. E. Taylor, B. Rosman, L. E. Sucar, and E. M. de Cote, “Identifying and tracking switching, non-stationary opponents: a Bayesian approach,” in Workshops at the Thirtieth AAAI Conference on Artificial Intelligence, 2016. [2] D. P. Bertsekas, Dynamic programming and optimal control. Athena Scientific Belmont, MA, 1995, vol. 1, no. 2. [3] E. Hadoux, A. Beynier, and P. Weng, “Solving hidden-semi-Markovmode Markov decision problems,” in Scalable Uncertainty Management. Springer, 2014, pp. 176–189. [4] P. Dayan and T. J. Sejnowski, “Exploration bonuses and dual control,” Machine Learning, vol. 25, no. 1, pp. 5–22, 1996. [5] K. Doya, K. Samejima, K.-i. Katagiri, and M. Kawato, “Multiple model-based reinforcement learning,” Neural computation, vol. 14, no. 6, pp. 1347–1369, 2002. [6] B. C. Da Silva, E. W. Basso, A. L. Bazzan, and P. M. Engel, “Dealing with non-stationary environments using context detection,” in Proceedings of the 23rd international conference on Machine learning. ACM, 2006, pp. 217–224. [7] S. P. Choi, D.-Y. Yeung, and N. L. Zhang, “Hidden-mode Markov decision processes for nonstationary sequential decision making,” in Sequence Learning. Springer, 2000, pp. 264–287. [8] I. Chades, J. Carwardine, T. Martin, S. Nicol, R. Sabbadin, and O. Buffet, “MOMDPs: a solution for modelling adaptive management problems,” in Twenty-Sixth AAAI Conference on Artificial Intelligence (AAAI-12), 2012. [9] V. Borkar and P. Varaiya, “Adaptive control of Markov chains, i: Finite parameter set,” IEEE Transactions on Automatic Control, vol. 24, no. 6, pp. 953–957, 1979. [10] ——, “Identification and adaptive control of Markov chains,” SIAM Journal on Control and Optimization, vol. 20, no. 4, pp. 470–489, 1982. [11] V. V. Veeravalli and T. Banerjee, “Quickest change detection,” Academic press library in signal processing: Array and statistical signal processing, vol. 3, pp. 209–256, 2013. [12] R. Allamaraju, H. Kingravi, A. Axelrod, G. Chowdhary, R. Grande, J. P. How, C. Crick, and W. Sheng, “Human aware UAS path planning in urban environments using nonstationary MDPs,” in Robotics and Automation (ICRA), 2014 IEEE International Conference on. IEEE, 2014, pp. 1161–1167. [13] E. Hadoux, A. Beynier, and P. Weng, “Sequential decision-making under non-stationary environments via sequential change-point detection,” in Learning over Multiple Contexts (LMCE), 2014. [14] A. Wald, Sequential analysis. Courier Corporation, 1973. [15] A. N. Shiryaev, “On optimum methods in quickest detection problems,” Theory of Probability & Its Applications, vol. 8, no. 1, pp. 22–46, 1963. [16] A. G. Tartakovsky and V. V. Veeravalli, “General asymptotic Bayesian theory of quickest change detection,” Theory of Probability & Its Applications, vol. 49, no. 3, pp. 458–497, 2005. [17] T. L. Lai, “Information bounds and quick detection of parameter changes in stochastic systems,” Information Theory, IEEE Transactions on, vol. 44, no. 7, pp. 2917–2929, 1998. [18] H. Chernoff, “Sequential design of experiments,” The Annals of Mathematical Statistics, vol. 30, no. 3, pp. 755–770, 1959. [19] J. Gittins, K. Glazebrook, and R. Weber, Multi-armed bandit allocation indices. John Wiley & Sons, 2011. [20] A. G. Tartakovsky, “Multidecision quickest change-point detection: Previous achievements and open problems,” Sequential Analysis, vol. 27, no. 2, pp. 201–231, 2008. [21] R. Singh and T. Banerjee, “Kiefer wolfowitz algorithm is asymptotically optimal for a class of non-stationary bandit problems,” arXiv preprint arXiv:1702.08000, 2017.
10math.ST
Score estimation in the monotone single index model arXiv:1712.05593v1 [math.ST] 15 Dec 2017 Fadoua Balabdaoui Université Paris-Dauphine, PSL Research University, CNRS, CEREMADE, 75016 Paris, France and Seminar für Statistik, ETH Zürich, 8092, Zürich, Schweiz e-mail: [email protected] Piet Groeneboom Delft University of Technology, Mekelweg 4, 2628 CD Delft, The Netherlands. e-mail: [email protected] Kim Hendrickx Hasselt University, I-BioStat, Agoralaan, B3590 Diepenbeek, Belgium. e-mail: [email protected] Abstract: We consider estimation of the regression parameter in the single index model where the link function ψ is monotone. For this model it has been proposed to estimate the link function nonparametrically by the monotone least square estimate ψ̂nα for a fixed regression P parameter α and to estimate the regression parameter by minimizing the sum of squared deviations i {Yi −ψ̂nα (αT Xi )}2 over α, where Yi are the observations and Xi the corresponding covariates. Although √ it is natural to propose this least squares procedure, it is still unknown whether it will produce n-consistent estimates of α. We show that the latter property will hold if we solve a score equation corresponding to this minimization problem. We also compare our method√with other methods such as Han’s maximum rank correlation estimate, which has been proved to be n-consistent. AMS 2000 subject classifications: 62G05, 62G20, 62H12. Keywords and phrases: monotone link functions, nonparametric least squares estimates, semiparametric model, single index regression model. 1. Introduction Single index models are flexible models used in regression analysis of the type E(Y |X) = ψ0 (αT0 X), where ψ0 is an unknown link function and α0 is an unknown regression parameter. By lowering the dimensionality of the classical linear regression problem, determined by the number of covariates, to a univariate αT0 X index, single index models do not suffer from the “curse of dimensionality”. They also provide an advantage over the generalized linear regression models by overcoming the risk of misspecifying the link function ψ0 . To ensure identifiability of the single index model, one typically assumes that the Euclidean norm kα0 k equals one with the first non-zero element of α0 being positive. Several estimation approaches have been considered in the literature of single index models. These methods can be classified into two groups: M-estimators and direct estimators. In the first approach, one considers a non-parametric regression estimate for the infinite dimensional link function ψ0 and then estimates α0 by minimizing a certain criterion function, where ψ0 is replaced by its estimate. Examples of this type are the semi-parametric least squares estimators of [16] and [13] and the pseudo-maximum likelihood estimator of [8], all using kernel regression estimates for the unknown link functions. An example of an M-estimator that does not depend on an estimate of the link function ψ0 is Han’s maximum rank correlation estimator [12]. Direct estimators, such as the average derivative estimator of [14] or the slicing regression method proposed in [9], avoid solving an optimization problem and are often computationally more attractive than M-estimators. In this paper we focus on estimating the regression parameter α0 under the constraint that ψ0 is monotone. Shape constrained inference arises naturally in a variety of fields. For example in economics where a concavity restriction is assumed in utility theory to indicate the exhibition of risk conversion in economic behavior. Convex optimization problems also appear frequently and often allow for straightforward computation and 1 imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 2 optimization. The single index model with convex link has been studied in [18] where the √ authors consider estimation of a penalized least squares estimator using smoothing splines and prove n-consistency and asymptotic normality of their proposed estimator. A special case of the monotone singe index model is the widely used econometric binary choice model where interest is in estimating a choice probability based on a binary response variable Y and one or more covariates X. Whether or not the outcome is zero or one depends on an underlying utility score, i.e. Y = 1 if αT0 X ≥ ε, where ε is an unobserved disturbance term with unknown distribution function F0 . The binary choice model therefore belongs to the class of monotone single index models since E(Y |X) = F0 (αT0 X). Estimation of the regression parameters in the binary choice model is among others considered in [6], [7] and [17]. [1] considered a global least squares estimator for the pair (α0 , ψ0 ) in the general single index model under monotonicity of the function ψ0 . They derived an n−1/3 convergence rate, but the asymptotic limiting distribution for their estimator of α0 has not been derived. A conjecture is made in [20] that this rate is too slow. In this paper, we will give simulation results on the asymptotic variance of the least squares estimator and investigate its rate of convergence numerically. Recently, [10] developed several score estimators for the current status linear regression model Y = β0T Z + ε, where the distribution function F0 of ε is left unspecified. Instead of observing the response Y a censoring variable T and censoring indicator ∆ = 1Y ≤T are observed. This model is a special case of the monotone single index model and can be formulated as E(∆|T, Z) = F0 (T − β0T Z) = F0 (αT0 X) where α0 = (1, −β0 )T and X = (T, Z)T . Their estimators are obtained by the root of a score function involving √ the maximum likelihood estimator (MLE) of the distribution function for fixed β. The authors prove n-consistency and asymptotic normality of their estimators and show that under certain smoothness assumptions the limiting variance of a score estimator is arbitrarily close to the efficient √ variance. Their result is remarkable since it is the first time in the current status regression model that a n-consistent estimate for β0 is proposed based on the MLE for F0 which only converges at n−1/3 -rate to the true distribution function F0 . We consider extending the estimators of [10] to the more general single index regression problem and propose two different score equations involving the least squares estimator (LSE) ψ̂nα minimizing n o2 1 Xn Yi − ψ(αT Xi ) , n i=1 (1.1) over all monotone increasing functions ψ for fixed α. We establish an n−1/3 log n-rate for the estimator ψ̂nα and propose a single index score estimator of α0 that converges at the parametric rate n−1/2 to the true regression parameter α0 . 2. The single-index model with monotone link Consider the following regression model Y = ψ0 (αT0 X) + ε, (2.1) where Y is a one-dimensional random variable, X = (X1 , . . . , Xd )T is a d-dimensional random vector with distribution G and ε is a one-dimensional random variable such that E[ε|X] = 0 G-almost surely. The function ψ0 is a monotone link function in M, where M is the set of monotone increasing functions defined on R and α0 is a vector of regression parameters belonging to the d−1 dimensional sphere Sd−1 := {α ∈ Rd : kαk = 1}, where k · k denotes the Euclidean norm in Rd . 3. The least squares estimator (LSE) for the link function ψ Let (X1 , Y1 ), . . . , (Xn , Yn ) denote n random variables which are i.i.d. like (X, Y ) in (2.1), i.e. E(Y |X) = ψ0 (αT0 X) G-almost surely and consider the sum of squared errors n Sn (ψ, α) = o2 1 Xn Yi − ψ(αT Xi ) , n i=1 imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 3 which can be computed for any pair (ψ, α) ∈ M × Sd−1 . For a fixed α, order the values αT X1 , . . . , αT Xn in increasing order and arrange Y1 , . . . , Yn accordingly. Then, well-known results from monotone regression theory imply that the functional ψ 7→ Sn (ψ, α) is minimized by the left derivative of the greatest convex minorant of the cumulative sum diagram i n  X  o (0, 0), i, Yiα , i = 1, . . . , n , j=1 where Yiα corresponds to the ith order statistic of the αT Xi . See for example Theorem 1.1 in [4]. By strict convexity of ψ 7→ Sn (ψ, α), the minimizer is unique at the distinct projections. We denote by ψ̂nα the monotone function which takes the values of this minimizer at the distinct projections and is a stepwise and right-continuous function outside the set of those projections. We first list below the assumptions needed to prove the asymptotic results stated in the remainder of the paper. Assumptions A1-A6 A1. The space X is convex, with a nonempty interior. There exists also R > 0 such that X ⊂ B(0, R). A2. There exists K0 > 0 such that the true link function ψ0 satisfies |ψ0 (u)| ≤ K0 for all u in {αT x, x ∈ X , α ∈ Sd−1 }.   A3. There exists δ0 > 0 such that the function u 7→ E ψ0 (αT0 X)|αT X = u is monotone increasing on Iα := {αT x, x ∈ X } for all α ∈ B(α0 , δ0 ) := {α : kα − α0 k ≤ δ0 }.  A4. Let a0 and b0 denote the infimum and supremum of the interval Iα0 = αT0 x, x ∈ X . Then, the true link function ψ0 is continuously differentiable on (a0 − δ0 R, b0 + δ0 R), where R is the same radius of assumption A1 above, and there exists C > 0 such that ψ00 ≥ C on (a0 − δ0 R, b0 + δ0 R). A5. The distribution of X admits a density g, which is differentiable on X . Also, there exist positive constants c0 , c̄0 , c1 and c̄1 such thath c0 ≤ g ≤ c̄0 and i c1 ≤ ∂g/∂xi ≤ c̄1 on X for all i = 1, . . . , d. A6. There exist a0 , M0 > 0 such that E |Y |m |X = x ≤ m!M0m−2 a0 for all integers m ≥ 2 and x ∈ X G-almost surely. Assumption A1 ensures that the support of the linear predictor αT X is an interval for all α ∈ B(α0 , δ0 ). Assumption A3 is made to enable deriving the explicit limit of the LSE ψ̂nα for all α ∈ B(α0 , δ0 ). We will show, in the supplemental material, the plausibility of this Assumption A3 by proving that for α in   a neighborhood of α0 the derivative of the function u 7→ ψα := E ψ0 (αT0 X)|αT X = u is indeed strictly positive if the derivative of the true link function stays away from zero. Assumption A6 is needed to show that max1≤i≤n |Yi | = Op (log n). As noted in [1], such an assumption is satisfied if the conditional distribution of Y |X = x belongs to an exponential family. In Figure 1 we compare the true link function ψ0 with the function ψα for the model E(Y |X) = √ √ i.i.d ψ0 (α01 X1 + α02 X1 ), where X1 , X2 ∼ U [0, 1], ψ0 (x) = x3 and α01 = α02 = 1/ 2 for α1 = 1/2, α2 = 3/2. Figure 1 illustrates the monotonicity of the function ψα introduced in Assumption A3. We have the following results. Proposition 3.1. Suppose that Assumptions A1-A2 hold and let the function ψα be defined by   ψα (u) = E ψ0 (αT X)|αT X = u . (3.1) Then, the functional Lα given by, ψ 7→ Lα (ψ) := Z  2 ψ0 (αT0 x) − ψ(αT x) g(x)dx, (3.2) X admits a minimizer ψ̂ α , over the set of monotone increasing on R, denoted by M, such n functions defined o that ψ̂ α is uniquely given by the function in (3.1) on Iα = αT x : x ∈ X . imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 4 √ Fig 1: The real ψ0 (red, solid) and the function ψα (blue, dashed) for ψ0 (x) = x3 , α01 = α02 = 1/ 2 and √ i.i.d α1 = 1/2, α2 = 3/2, with X1 , X2 ∼ U [0, 1]. Proposition 3.2. Under Assumptions A1-A6, we have, Z n o2   sup ψ̂nα (αT x) − ψα (αT x) dG(x) = Op (log n)2 n−2/3 . α∈B(α0 ,δ0 ) The proofs of Proposition 3.1 and Proposition 3.2 are given in the Appendix. 4. The score estimator on the unit sphere Consider the problem of minimizing n o2 1 Xn Yi − ψ̂nα (αT Xi ) , n i=1 (4.1) over all α ∈ Sd−1 , where ψ̂nα is the LSE of ψα . Let S be a local parametrization mapping Rd−1 to the sphere Sd−1 , i.e., for each α ∈ B(α0 , δ0 ) on the sphere Sd−1 , there exists a unique vector β ∈ Rd−1 such that α = S (β) . The minimization problem given in (4.1) is equivalent to minimizing n o2 1 Xn Yi − ψ̂nα S(β)T Xi , n i=1 (4.2) over all β where ψ̂nα is the LSE of ψα with α = S(β). Analogously to the treatment of the score approach in the current status regression model proposed by [10], we consider the derivative of (4.2) w.r.t. β, where we ignore the non-differentiability of the LSE ψ̂nα . This leads to the set of equations, n n o 1X T (JS (β)) Xi Yi − ψ̂nα S(β)T Xi = 0, n i=1 (4.3) where JS is the Jacobian of the map S and where 0 ∈ Rd−1 is the vector of zeros. Just as in the analogous case of the “simple score equation” in [10], we cannot hope to solve equation (4.3) exactly. Instead, we define the solution in terms of a “zero-crossing” of the above equation. The following definition is taken from [10]. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 5 Definition 4.1 (zero-crossing). We say that β∗ is a crossing of zero of a real-valued function ζ : A 7→ R : β 7→ ζ(β) if each open neighborhood of β∗ contains points β1 , β2 ∈ A such that ζ̄(β1 )ζ̄(β2 ) ≤ 0, where ζ̄ is the closure of the image of the function (so contains its limit points). We say that an m-dimensional function ζ : A 7→ Rm : β 7→ ζ(β) = (ζ1 (β), . . . ζm (β))0 has a crossing of zero at a point β∗ , if β∗ is a crossing of zero of each component ζj : A 7→ R, j = 1 . . . , m. Our index score estimator α̂n is defined by, α̂n := S(β̂n ), (4.4) where β̂n is a zero crossing of the function Z n o T φn (β) := (JS (β)) x y − ψ̂nα S(β)T x dPn (x, y), (4.5) and Pn denotes the empirical probability measure of (X1 , Y1 ), . . . , (Xn , Yn ). The probability measure of (X, Y ) will be denoted by P0 in the remainder of the paper. In addition to Assumptions A1-A6 above, the following assumptions will also be made. Assumptions A7-A9 A7. For all β 6= β0 such that S (β) ∈ B(α0 , δ0 ), the random variable h i  Cov (β0 − β)T JS (β)T X, ψ0 S(β0 ) | S(β)T X , is not equal to 0 almost surely. A8. The functions JSij (β), where JSij (β) denotes the i × j entry of JS (β) for i = 1, . . . , d and j = 1, . . . , d − 1 are d − 1 times continuously differentiable on C := {β ∈ Rd−1 : S (β) ∈ B(α0 , δ0 )} and there exists M > 0 satisfying max sup |Dk JSij (β)| ≤ M (4.6) k.≤d−1 β∈C where k = (k1 , . . . , kd ) with kj an integer ∈ {0, . . . , d − 1}, k. = Dk s(β) ≡ Pd−1 i=1 ki and ∂ k. s(β) . ∂βk1 . . . ∂βkd We also assume that C is a convex andi bounded set in Rd−1 with a nonempty interior. h T A9. (JS (β0 )) E ψ00 (αT0 X) Cov(X|αT0 X) (JS (β0 )) is non-singular. Theorem 4.1. Let Assumptions A1-A9 be satisfied. Let also α̂n be defined by (4.4). Then: (i) [Existence of a root] For all large n, a crossing of zero β̂n of φn (β) exists with probability tending to one. (ii) [Consistency] p α̂n → α0 , n → ∞. (iii) [Asymptotic normality] Define the matrices, h i def A = E ψ00 (αT0 X) Cov(X|αT0 X) , (4.7) and def Σ = E h Y − ψ0 (αT0 X) 2   X − E(X|αT0 X) X − E(X|αT0 X) T i . (4.8) Then √  n(α̂n − α0 ) →d Nd 0, A− ΣA− , where A− is the Moore-Penrose inverse of A. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 6 Remark 4.1. Note that αT0 A = 0 and that the normal distribution Nd (0, A− ΣA− ) is concentrated on the (d−1)-dimensional subspace, orthogonal to α0 and is therefore degenerate, as is also clear from its covariance matrix A− ΣA− , which is a matrix of rank d − 1. 4.1. The asymptotic relation To obtain the asymptotic normality result of the score estimator α̂n given in Theorem 4.1, we shall prove the following asymptotic relationship for β̂n :   Z    T  B β̂n − β0 = (JS (β0 )) x − E(X|S(β0 )T X = S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)   + op n−1/2 + kβ̂n − β0 k . where h i T T B = (JS (β0 )) E ψ00 (S(β0 )T X) Cov(X|S(β0 )T X) (JS (β0 )) = (JS (β0 )) A JS (β0 ), (4.9) in R(d−1)×(d−1) . We assume in Assumption A9 that B is invertible so that  √  n β̂n − β0 Z    √ T  = nB −1 (JS (β0 )) x − E(X|S(β0 )T X = S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)   √ + op 1 + nkβ̂n − β0 k →d N (0, Π), where T Π = B −1 (JS (β0 )) Σ JS (β0 ) B −1 ∈ R(d−1)×(d−1) . (4.10) The limit distribution of the single index score estimator α̂n defined in (4.4) now follows by an application of the delta-method and we conclude that  √   √ √  √ n(α̂n − α0 ) = n S β̂n − S (β0 ) = JS (β0 ) n(β̂n − β0 ) + op n(β̂n − β0 )    T →d Nd 0, JS (β0 )Π (JS (β0 )) = Nd 0, A− ΣA− , where the last equality follows from the following lemma. Lemma 4.1. Let the matrix A be defined by (4.7) and let A− be the Moore-Penrose inverse of A. Then n o−1 T T T A− = JS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) = JS (β0 )B −1 (JS (β0 )) . The proof of Lemma 4.1 is given in Supplement C of [2]. An example of the mapping S and corresponding matrix JS is given in Section 6. Remark 4.2. For each map S and each parameter vector β, we have T (S(β)) S(β) = 1. Taking derivatives w.r.t. β, we get T (S(β)) JS (β) = 0T , so that the columns of JS (β) belong to the space n o  ⊥ T {α}⊥ ≡ {S(β)} ≡ z ∈ Rd : αT z = 0 ≡ z ∈ Rd : (S(β)) z = 0 . imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 7 By Lemma 4.1 it is now easy to see that also αT0 A− = 0. It is shown in Lemma 1 of [18] that it is possible to construct a set of “local parametrization matrices” Hα for each α ∈ B(α0 , δ0 ) with kαk = 1 satisfying α T Hα = 0 T T and (Hα ) Hα = Id−1 . T Their matrix (Hα ) corresponds to the Moore-Penrose pseudo-inverse of the matrix Hα and is the analogue T of our matrix (JS (β)) in the proof of asymptotic normality of their estimator. We however show that the orthonormality assumption is not needed in the proofs. 5. The efficient score estimator In this section we extend the score approach of Section 4 by incorporating an estimate of the derivative of the link function ψ0 to obtain an efficient estimator of α0 . Let ψ̂nα denote again the LSE of ψα defined in 0 Section 3 and define the estimate ψ̃nh,α by 0 ψ̃nh,α (u) 1 = h  Z K u−x h  dψ̂nα (x), where h is a chosen bandwidth. Here dψ̂nα represents the jumps of the discrete function ψ̂nα and K is one of the usual symmetric twice differentiable kernels with compact support [−1, 1], used in density estimation. The estimator α̃n is given by α̃n := S(β̃n ), (5.1) where β̃n is a zero crossing of ξnh (see Definition 4.1) defined by Z n o T 0 ξnh (β) := (JS (β)) x ψ̃nh,α S(β)T x y − ψ̂nα S(β)T x dPn (x, y). (5.2) The function ξnh is inspired by representing the sum of squares n 1 X Yi − ψα (αT Xi ) n i=1 2 , in a local coordinate system with d − 1 unknown parameters β = (β1 , . . . , βd−1 )T followed by differentiation of the re-parametrized sum of squares w.r.t. β where we also consider differentiation of the function ψα . We make the following additional assumptions for establishing the weak convergence of β̃n Assumptions A10-A11 A10. The function differentiable on Iα for all α. h ψα is two times continuously i T 0 T 2 T A11. (JS (β)) E ψ0 (α0 X) Cov(X|α0 X) JS (β) is non-singular. Theorem 5.1. Let Assumptions A1-A8, A10-A11 be satisfied. Let α̃n be defined by (5.1) and suppose h  n−1/7 . Then: (i) [Existence of a root] For all large n, a crossing of zero β̃n of ξnh (β) exists with probability tending to one. (ii) [Consistency] p α̃n → α0 , n → ∞. (iii) [Asymptotic normality] Define the matrices, h i def à = E ψ00 (αT0 X)2 Cov(X|αT0 X) , (5.3) imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 8 and def Σ̃ = E h Y − ψ0 (αT0 X) 2   ψ00 (αT0 X)2 X − E(X|αT0 X) X − E(X|αT0 X) T i . (5.4) Then √   n(α̃n − α0 ) →d Nd 0, Ã− Σ̃Ã− , where Ã− is the Moore-Penrose inverse of Ã. Remark 5.1. The asymptotic variance of the estimator α̃n is similar to that obtained for the “efficient” estimates proposed in [24] and in [18]. The efficient score function for the semi-parametric single index model is ) (   y − ψ αT0 x 0 T  E σ −2 (X)X|αT0 X = αT0 x ˜  . `α0 ,ψ0 (x, y) = ψ α0 x x − σ 2 (x) E σ −2 (X)|αT0 X = αT0 x More details on the efficiency calculations can be found in e.g. [22], chapter 25 for a general description of the efficient score functions and in [8] or [18] for the efficient score in the single index model. In a homoscedastic model with var(Y |X = x) = σ 2 , where σ 2 is independent of covariates x, the asymptotic variance equals σ 2 Ã− which is the same as the inverse of E(`˜α0 ,ψ0 (X, Y )`˜α0 ,ψ0 (X, Y )T ). This indeed shows that our estimate defined in (5.1) is efficient in the homoscedastic model. As also explained in Remark 2 of [18], our estimator has also a high relative efficiency with respect to the optimal semi parametric efficiency bound if the constant variance assumption provides a good approximation to the truth. The asymptotic variance is obtained similarly to the derivations of the asymptotic limiting distribution for the simple score estimator as shown in Section 4.1. First the asymptotic variance is expressed in terms of the parametrization S as in (4.10) and next, similar to Lemma 4.1, equivalence to the expression Ã− Σ̃Ã− given in Theorem 5.1 is proved. 6. Computation In this section we describe how the score estimator α̂n defined in (4.4) can be obtained using a local coordinate system representing the unit sphere in combination with a pattern search numerical optimization algorithm. An example of such a parameterization is the spherical coordinate system S : [0, π](d−2) × [0, 2π] 7→ Sd−1 : (β1 , β2 , . . . , βd−1 ) 7→(cos(β1 ), sin(β1 ) cos(β2 ), sin(β1 ) sin(β2 ) cos(β3 ), . . . , sin(β1 ) . . . sin(βd−2 ) cos(βd−1 ), sin(β1 ) . . . sin(βd−2 ) sin(βd−1 ))T . The map parameterizing the positive half of the sphere S : {(β1 , β2 , . . . , βd−1 ) ∈ [0, 1](d−1) : kβk ≤ 1} 7→ Sd−1 : q  T 2 (β1 , β2 , . . . , βd−1 ) 7→ β1 , β2 , . . . , βd−1 , 1 − β12 − . . . − βd−1 , is another example that can be used provided αd is positive. Prior knowledge about the position of α0 can be derived from an initial estimate such as the LSE proposed in [1]. We illustrate the set of equations corresponding to (4.3) for dimension d = 3 using the simulation model studied in Section 8. We consider the model √ i.i.d X1 , X2 , X3 ∼ U [1, 2], ε ∼ N (0, 1), Y = ψ0 (αT0 X) + ε, , ψ0 (x) = x3 , α01 = α02 = α03 = 1/ 3, where ε is independent of the covariate vector X = (X1 , X2 , X3 )T . For this model, we have      2 −1 −1 2 −1 −1 2 17  1     A= −1 2 −1 , Σ = −1 2 −1 and à = Σ̃ = 11.898545 −1 15 36 −1 −1 2 −1 −1 2 −1 −1 2 −1  −1  −1 , 2 imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 9 where the matrices A, Σ, à and Σ̃ are defined in (4.7), (4.8), (5.3) and (5.4) respectively. Note that the rank of the matrices is equal to d − 1 = 2. We consider the parametrization S3 = {(α1 , α2 , α3 ) = (cos(β1 ) sin(β2 ), sin(β1 ) sin(β2 ), cos(β2 )) : 0 ≤ β1 ≤ 2π, 0 ≤ β2 ≤ π} ⊂ R2 , (6.1) and we solve the problem  n o  s1 (β1 , β2 ) = 1 Pn (− sin(β1 ) sin(β2 )Xi1 + cos(β1 ) sin(β2 )Xi2 ) Yi − ψ̂nα (αT Xi ) = 0, i=1 n n o  s2 (β1 , β2 ) = 1 Pn (cos(β1 ) cos(β2 )Xi1 + sin(β1 ) cos(β2 )Xi2 − sin(β2 )Xi3 ) Yi − ψ̂nα (αT Xi ) = 0. i=1 n (6.2) Note that  √ √ √ T T S(β0 ) = (cos(β01 ) sin(β02 ), sin(β01 ) sin(β02 ), cos(β02 )) = 1/ 3, 1/ 3, 1/ 3 , and where β01   − √1 − sin(β01 ) sin(β02 ) cos(β01 ) cos(β02 ) 3    √1 JS (β0 ) =  cos(β01 ) sin(β02 ) sin(β01 ) cos(β02 )  =  3  0 − sin(β02 ) 0 √ = π/4 and β02 = arctan( 2). We also have, S(β)T JS (β) = (0, 0) , √1 6 √1 q6 −  2 3  ,  (6.3) for all β. This implies that the columns of JS (β) are perpendicular to the vector α = S(β). Note moreover that the columns are linearly independent and hence form a basis for {α}⊥ . The asymptotic variance of α̂n resp. α̃n defined in Theorem 4.1 resp. Theorem 5.1 is equal to,     2 −1 −1 2 −1 −1 25     A− ΣA− = resp. Ã− Σ̃Ã− = Ã− = 0.009338 −1 2 −1 . (6.4) −1 2 −1 2601 −1 −1 2 −1 −1 2 By the discontinuous nature of the functions s1 and s2 in (6.2), it is not possible to solve equations (6.2) exactly, we search the crossing of zero (see Definition 4.1), by minimizing the sum of squares s21 (β) + s22 (β) over all possible values of β = (β1 , β2 )T . Note that the crossing of zero of the score function is equivalent to the minimizer of the sum of squared component scores so that the minimization procedure is justified. We use a derivative free optimization algorithm proposed by [15]. The method is a pattern-search optimization method that does not require the objective function to be continuous. The algorithm starts from an initial estimate of the minimum and looks for a better nearby point using a set of 2d equal step sizes along the coordinate axes in each direction, first making a step in the direction of the previous move. For the object function we take the sum of the squared values of the component functions, which achieve a minimum at a crossing of zero. If in no direction an improvement is found, the step size is halved, and a new search for improvement is done, with the reduced step sizes. This is repeated until the step size has reached a prespecified minimum. A very clear exposition of the method is given in [21], section 4.3. In this paper also convergence proofs for the optimization algorithm are presented. 7. Lagrange approach Instead of tackling the fact that our parameter space is essentially of dimension d − 1 by the parametrization α = S(β) which locally maps Rd−1 into the sphere Sd−1 , one can introduce the restriction kαk = 1 via a Lagrangian term. We then consider the problem of minimizing n o2  1 Xn Yi − ψ̂nα (αT Xi ) + λ kαk2 − 1 , n i=1 (7.1) imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 10 where ψ̂nα is the LSE defined in Section 3 and λ is a Lagrange parameter which we add to the sum of squared errors to deal with the identifiability of the single-index model. We consider a Lagrange penalty for solving the optimization problem under the constraint that kαk = 1. Analogously to the treatment given in Section 4, we consider the derivative of (7.1) w.r.t. α, where we ignore the non-differentiability of the LSE ψ̂nα . This leads to the set of equations, n n o 1X Xij ψ̂nα (αT Xi ) − Yi + λαj = 0, n i=1 j = 1, . . . , d. (7.2) Here λ has to satisfy λ=λ d X j=1 n αj2 = − n o 1X T α Xi Yi − ψ̂nα (αT Xi ) . n i=1 (7.3) Plugging in the above expression for λ in (7.2), we would consider the score equation ! n n n o n o 1X 1X T T T 0= Xi Yi − ψ̂nα (α Xi ) − α Xi Yi − ψ̂nα (α Xi ) α n i=1 n i=1 Z n  o = I − ααT x y − ψ̂nα αT x dPn (x, y), (7.4) where I is the d × d identity matrix. A computer program was implemented to solve (7.4). It has the advantage that we do not have to deal with the parametrization α = S(β), but has the disadvantage that we cannot assume that α̂n has exactly norm 1 because we again have to deal with crossings of zero instead of exact equality to zero. One way to circumvent this problem is to normalize the solution after each iteration by dividing by its norm. This approach seems to provide reasonable solutions, although it is not entirely satisfactory from a theoretical point of view. Also note that if the right-hand side of (7.3) equals zero, so λ = 0, the equation does not force the norm of α to be one; it only does so if λ 6= 0. Indeed, in our computer experiments, λ was never zero, so this problem did actually not occur, but λ will tend to zero with increasing sample sizes, so some numerical instability is to be expected. For reasons of space we do not further describe all details of this approach, but instead restrict ourselves to showing a picture of the simple score estimate of ψ0 for n = 1000 and d = 10 for the simulation where all the Xi variables and √ the random error variable ε are standard normal and independent, ψ0 (x) = x3 √ and α0 = (1/ 10, . . . , 1/ 10)T . It is clear that the estimate of ψ0 will be rather accurate because of the information provided by the 10 covariates Xi (instead of, say, just two covariates X1 , X2 ). 8. Simulations In this section we illustrate the finite sample behavior of the single index score estimators proposed in Section 4 and Section 5. We consider the model 3 Y = ψ0 (αT0 X) + ε = αT0 X + ε, (8.1) √ where α0i = 1/ d, i = 1, . . . , d and ε ∼ N (0, 1), independent of X. We consider two different dimensions i.i.d i.i.d d = 2 and d = 3 and two different distributions for the covariate vector X, Xi ∼ U [1, 2] and Xi ∼ N (0, 1) for i = 1, . . . , d. This yields four different simulation set-ups. For the two dimensional models, we consider the parametrization S(β0 ) = (cos(β0 ), sin(β0 ))T and we use the parametrization given in (6.1) for the three dimensional models. In each simulation setting, we estimate α0 by the simple score estimator (SSE) and the efficient score estimator (ESE) and compare the behavior of our proposed estimates with the least squares estimate (LSE) minimizing (1.1) over all possible (ψ, α) and the maximum rank correlation estimate (MRCE) proposed in [12]. For sample sizes n = 100, 500, 1000, 2000, 5000 and n = 10000 we generate N = 5000 datasets from Model (8.1) and show, in Tables 1-4, the mean and n imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 11 40 20 0 −20 −3 −2 −1 0 1 2 3 √ Fig 2: The real ψ0 (red, solid) and the function ψ̂nα̂n (black, step function) for ψ0 (x) = x3 , α0i = 1/ 10 i.i.d and Xi ∼ N (0, 1), i = 1 . . . 10. times the covariance of the estimates. Tables 1-4 also show the asymptotic values to which the results should converge based on Theorem 4.1 and Theorem 5.1. The limiting distribution of the LSE is still unknown and therefore no asymptotic results are provided for the LSE. For the MRCE, [19] has an expression for the asymptotic covariance matrix in an (implicit) (d − 1)-dimensional representation in his Theorem 4 on p. 133. If, in accordance with the methods of our paper, we turn this into an expression in terms of our d-dimensional representation, we obtain as the asymptotic covariance matrix of the MRCE V − ΣV − where h i  T Σ = E X − E(X|αT0 X) X − E(X|αT0 X) S(Y, αT0 X)2 g0 (αT0 X)2 , and V − is the Moore-Penrose inverse of h  V = E X − E(X|αT0 X) X − E(X|αT0 X) T i S2 (Y, αT0 X)g0 (αT0 X)2 , and g0 is the density of αT0 X and S and S2 are defined by   S(y, u) = E 1{y>Y } − 1{y<Y } αT0 X = u , S2 (y, u) = ∂ S(y, u). ∂u It is clear from our simulations that the factor 2 in front of V in (20) of [19] cannot be correct and indeed [5] have a note on p. 361 of their paper, attributed to Myoung-Jae Lee that this factor 2 should not be there. For all simulation studies, the results shown in Tables 1-4 show convergence of n times the variancecovariance matrices towards its asymptotic values. The performance of the ESE is slightly better than the performance of the SSE; the difference between the asymptotic limiting variances is smaller in the model with uniform[1, 2] covariates Xi than the difference in the model with standard normal covariates Xi . Tables 1-4 also illustrate that n times the variances of the estimates decrease if the dimension d of the model increases in the model with Xi ∼ U [1, 2] but increases in the model with Xi ∼ N (0, 1). Although the model with standard normal covariates violates Assumptions A1, A2 and A4 given in Section 3, our proposed estimates perform reasonably well. The performance of the MRCE is worse than the performances of our proposed score estimates in all simulation settings. In the model with standard normal covariates, the variances of the MRCE are remarkable larger than the variances of the score estimates and the LSE. Also, the asymptotic variances of the MRCE in these models are considerably larger than the variances of the score estimators. This might be caused by the fact that only the indicators 1{y>Yi } and 1{y>Yi } are used in the definition of the MRCE and not the actual values of the Yi ’s. The behavior of the LSE is rather remarkable. Tables 1 and 2 suggest an increase of n times the covariance matrix, whereas Tables 3 and 4 suggest a decrease. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 12 The results presented in Tables 3 and 4 show that the performance of the LSE is better than the performance of the SSE for small sample sizes when Xi ∼ N (0, 1). For the model with uniform covariates, summarized in Tables 1 and 2 our proposed score estimates outperform the LSE. The variances for the LSE presented in Tables 1-4 suggest that the rate of convergence for the LSE is faster than the cube-root n1/3 -rate proved in [1]. The asymptotic distribution of the LSE falls beyond the scope of this paper and needs to be addressed in further research. Table 1 Simulation model (Xi ∼ U [1, 2], d = 2): The mean value (µ̂i = mean(α̂in ), i = 1, 2) and n times the variance-covariance (σ̂ij = n·cov(α̂in , α̂jn ),i, j = 1, 2) of the simple score estimate (SSE), the efficient score estimate (ESE), the least squares estimate (LSE) and the maximum rank correlation estimate (MRCE) for different sample sizes n with N = 5000 and Xi ∼ U [1, 2]. The line, preceded by ∞, gives the asymptotic values. Method SSE n 100 500 1000 2000 5000 10000 ∞ µ̂1 0.707249 0.707224 0.707175 0.707173 0.707134 0.707109 0.707107 µ̂2 0.706389 0.706890 0.706992 0.707016 0.707070 0.707100 0.707107 σ̂11 0.040773 0.035018 0.033262 0.034017 0.034011 0.033344 0.032439 σ̂22 0.040866 0.035057 0.033273 0.034012 0.034012 0.033350 0.032439 σ̂12 -0.040787 -0.035033 -0.033265 -0.034014 -0.034011 -0.033347 -0.032439 ESE 100 500 1000 2000 5000 10000 ∞ 0.707293 0.707230 0.707185 0.707175 0.707130 0.707111 0.707107 0.706359 0.706888 0.706983 0.707015 0.707074 0.707098 0.707107 0.039631 0.033888 0.032302 0.032992 0.032925 0.032278 0.031516 0.039758 0.033922 0.032316 0.032989 0.032924 0.032283 0.031516 -0.039663 -0.033900 -0.032307 -0.032990 -0.032924 -0.032280 -0.031516 LSE 100 500 1000 2000 5000 10000 ∞ 0.706848 0.707060 0.707138 0.707122 0.707118 0.707128 0.707107 0.706624 0.707002 0.707000 0.707053 0.707079 0.707077 0.707107 0.052397 0.053547 0.053513 0.055502 0.059731 0.061843 ? 0.052415 0.053570 0.053573 0.055519 0.059756 0.061868 ? -0.052321 -0.053542 -0.053535 -0.055506 -0.059741 -0.061854 ? MRCE 100 500 1000 2000 5000 10000 ∞ 0.707301 0.707178 0.707107 0.707145 0.707154 0.707125 0.707107 0.706188 0.706910 0.707047 0.707039 0.707048 0.707083 0.707107 0.051226 0.044397 0.041886 0.041231 0.040968 0.040129 0.035535 0.051272 0.044428 0.041904 0.041248 0.040976 0.040141 0.035535 -0.051182 -0.044402 -0.041891 -0.041237 -0.040971 -0.040135 -0.035535 9. Discussion In this paper we propose a method for estimating the regression parameter in the monotone single index model. Our estimators are defined as zero-crossings of an unsmooth score function which contains the LSE of the monotone link function. The estimation approach extends the√results of [10] for the current status linear regression model and as far as we know, it is the first time that n−consistent estimates of the regression parameter are constructed based on the piecewise-constant LSE for the link function. Good performances, both asymptotically and numerically, of our estimation approach are illustrated by the asymptotic normality of our score estimators and by simulation studies that show comparable or even better behavior of our score estimates compared to the maximum rank correlation estimate proposed by [12] and the least squares estimate discussed in [1]. A limitation of our approach might be that we use a local parametrization of the sphere to obtain the estimates. We however showed that the asymptotic properties of the resulting regression parameter estimators is independent of the parametrization used and we moreover developed a computationally interesting imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 13 Table 2 Simulation model (Xi ∼ U [1, 2], d = 3): The mean value (µ̂i = mean(α̂in ), i = 1, 2, 3) and n times the variance-covariance (σ̂ij = n·cov(α̂in , α̂jn ),i, j = 1, 2, 3) of the simple score estimate (SSE), the efficient score estimate (ESE), the least squares estimate (LSE) and the maximum rank correlation estimate (MRCE) for different sample sizes n with N = 5000 and Xi ∼ U [1, 2]. The line, preceded by ∞, gives the asymptotic values. Method SSE n 100 500 1000 2000 5000 10000 ∞ µ̂1 0.577082 0.577066 0.577128 0.577232 0.577286 0.577324 0.577350 µ̂2 0.576760 0.577370 0.577364 0.577281 0.577343 0.577351 0.577350 µ̂3 0.577536 0.577505 0.577505 0.577512 0.577412 0.577370 0.577350 σ̂11 0.026000 0.020865 0.020471 0.020101 0.019549 0.019208 0.019223 σ̂22 0.026531 0.021461 0.020915 0.020454 0.019796 0.019732 0.019223 σ̂33 0.025168 0.020629 0.020576 0.020325 0.019966 0.019746 0.019223 σ̂12 -0.013676 -0.010840 -0.010394 -0.010107 -0.009688 -0.009597 -0.009612 σ̂13 -0.012352 -0.010012 -0.010054 -0.009987 -0.009855 -0.009609 -0.009612 σ̂23 -0.012797 -0.010623 -0.010531 -0.010346 -0.010112 -0.010138 -0.009612 ESE 100 500 1000 2000 5000 10000 ∞ 0.576080 0.576671 0.576861 0.577055 0.577175 0.577251 0.577350 0.577006 0.577423 0.577388 0.577293 0.577351 0.577359 0.577350 0.578298 0.577850 0.577750 0.577677 0.577516 0.577436 0.577350 0.025577 0.020379 0.019936 0.019503 0.019054 0.018714 0.018677 0.026523 0.020804 0.020265 0.019941 0.019269 0.019187 0.018677 0.024775 0.020022 0.019954 0.019749 0.019449 0.019205 0.018677 -0.013601 -0.010557 -0.010099 -0.009830 -0.009431 -0.009344 -0.009338 -0.011903 -0.009793 -0.009803 -0.009657 -0.009612 -0.009364 -0.009338 -0.012910 -0.010250 -0.010174 -0.010108 -0.009843 -0.009845 -0.009338 LSE 100 500 1000 2000 5000 10000 ∞ 0.576900 0.577271 0.577343 0.577440 0.577379 0.577335 0.577350 0.577212 0.577276 0.577285 0.577277 0.577338 0.577356 0.577350 0.576726 0.577256 0.577294 0.577267 0.577305 0.577345 0.577350 0.046654 0.047999 0.049601 0.050351 0.054862 0.058277 ? 0.047393 0.047934 0.050000 0.051728 0.055341 0.057892 ? 0.045991 0.047352 0.049575 0.051742 0.054135 0.058661 ? -0.023955 -0.024291 -0.024999 -0.025168 -0.028024 -0.028773 ? -0.022584 -0.023683 -0.024590 -0.025194 -0.026838 -0.029497 ? -0.023394 -0.023653 -0.024991 -0.026544 -0.027305 -0.029143 ? MRCE 100 500 1000 2000 5000 10000 ∞ 0.576976 0.577285 0.577285 0.577339 0.577381 0.577370 0.577350 0.576965 0.577414 0.577414 0.577325 0.577371 0.577355 0.577350 0.576916 0.577265 0.577265 0.577347 0.577285 0.577319 0.577350 0.046496 0.017158 0.034317 0.030230 0.028795 0.026680 0.021436 0.046523 0.016660 0.033319 0.030323 0.028768 0.027576 0.021436 0.044848 0.016967 0.033935 0.031574 0.029245 0.027700 0.021436 -0.024092 -0.008421 -0.016843 -0.014493 -0.014163 -0.013279 -0.010718 -0.022429 -0.008723 -0.017445 -0.015744 -0.014630 -0.013402 -0.010718 -0.022333 -0.008247 -0.016493 -0.015825 -0.014611 -0.014297 -0.010718 Lagrangian approach that avoids the use of a local parametrization and allows for easy estimation in high dimensions. The theory for the Lagrangian procedure is complicated by the fact that we do no longer work on the sphere, which is rather unusual in the theory on single index models where identifiability assumptions are commonly used. Our simulations however suggest that its asymptotic properties are the same as those presented in this paper. The presence/absence of smoothing procedures involved with the estimation techniques is one of the main difference between our two score estimates. Although the simple score estimator, avoiding any smoothing parameters is not an efficient estimate of the regression parameter, its performance in finite samples is not remarkably worse than the performance of the efficient score estimates. By avoiding the use of a smooth estimate for the derivative of the link function, the simple score approach has the advantage that no bandwidth selection procedures are needed, which makes it computationally more attractive. 10. Appendix In this Section, we give the proofs of the results stated in Sections 3 and 4. The results given in Section 5 together with additional technical lemmas needed for proving our main results are given in the supplementary material [2]. We will write “Lemma X in Supplement Y” when we refer to these results in the remainder of the Appendix. Entropy results are used in our proofs. Before we start the proofs, we first introduce some notations and definitions used in the remainder of the Appendix. We will denote the L2 -norm of a function f defined on X with respect to some probability measure P by imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 14 Table 3 Simulation model (Xi ∼ N (0, 1), d = 2): The mean value (µ̂i = mean(α̂in ), i = 1, 2) and n times the variance-covariance (σ̂ij = n·cov(α̂in , α̂jn ),i, j = 1, 2) of the simple score estimate (SSE), the efficient score estimate (ESE), the least squares estimate (LSE) and the maximum rank correlation estimate (MRCE) for different sample sizes n with N = 5000 and Xi ∼ N (0, 1). The line, preceded by ∞, gives the asymptotic values. Method SSE n 100 500 1000 2000 5000 10000 ∞ µ̂1 0.705202 0.706395 0.706824 0.707100 0.707026 0.707091 0.707107 µ̂2 0.706163 0.707509 0.707259 0.707056 0.707167 0.707113 0.707107 σ̂11 0.201378 0.109547 0.092557 0.080981 0.072021 0.067685 0.055556 σ̂22 0.200975 0.109291 0.092464 0.080966 0.071947 0.067665 0.055556 σ̂12 -0.200327 -0.109371 -0.092494 -0.080967 -0.071982 -0.067674 -0.055556 ESE 100 500 1000 2000 5000 10000 ∞ 0.706800 0.706905 0.706978 0.707061 0.707079 0.707104 0.707107 0.706173 0.707200 0.707190 0.707133 0.707128 0.707106 0.707107 0.087513 0.038450 0.031701 0.027930 0.023914 0.022827 0.018519 0.087878 0.038468 0.031672 0.027924 0.023907 0.022828 0.018519 -0.087480 -0.038453 -0.031685 -0.027926 -0.023911 -0.022827 -0.018519 LSE 100 500 1000 2000 5000 10000 ∞ 0.706748 0.706710 0.706737 0.707009 0.707087 0.707074 0.707107 0.706135 0.707309 0.707389 0.707161 0.707110 0.707131 0.707107 0.093819 0.068561 0.061614 0.061123 0.060759 0.061708 ? 0.094319 0.068260 0.061325 0.061109 0.060722 0.061692 ? -0.093715 -0.068383 -0.061459 -0.061111 -0.060738 -0.061699 ? MRCE 100 500 1000 2000 5000 10000 ∞ 0.701888 0.705470 0.706374 0.707090 0.706895 0.707062 0.707107 0.704656 0.707715 0.707364 0.706892 0.707229 0.707107 0.707107 0.542166 0.364976 0.336674 0.328658 0.317497 0.313625 0.268711 0.539405 0.360968 0.335793 0.328860 0.317000 0.313331 0.268711 -0.530421 -0.362295 -0.335971 -0.328632 -0.317202 -0.313456 -0.268711 k · kP ; i.e., 2 1/2 kf kP = P(f ) Z = 1/2 f (x)dP(x) . 2 (10.1) X Also, we will denote by k · kB,P the Bernstein norm of a function f defined on X × R which is given by  kf kP,B =  1/2 |f | 2P e − |f | − 1 . (10.2) For both norms, P will be taken to be P0 , the true joint probability measure of the (X, Y ). Note that when f is only a function of x ∈ X then Z kf kP0 = X 1/2 Z 1/2 2 f (x)dG(x) = f (x)g(x)dx , 2 X by Assumption A5. For a class of functions F on R equipped with a norm k · k, we let NB (ζ, F, k · k) denote the minimal number N for which there exists pairs of functions {[gjL , gjU ], j = 1, . . . , N } such that kgjU − gjL k ≤ ζ for all j = 1, . . . , N and such that for each g ∈ F there is a j ∈ {1, . . . , N } such that gjL ≤ g ≤ gjU . The ζ−entropy with bracketing of F is defined as HB (ζ, F, k · k) = log(NB (ζ, F, k · k)). Results on entropy calculations used in proving our main results are given in the supplemental material. Our proofs use inequalities for empirical processes described in Lemma 3.4.2 and Lemma 3.4.3 of [23]. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 15 Table 4 Simulation model (Xi ∼ N (0, 1), d = 3): The mean value (µ̂i = mean(α̂in ), i = 1, 2, 3) and n times the variance-covariance (σ̂ij = n·cov(α̂in , α̂jn ),i, j = 1, 2, 3) of the simple score estimate (SSE), the efficient score estimate (ESE), the least squares estimate (LSE) and the maximum rank correlation estimate (MRCE) for different sample sizes n with N = 5000 and Xi ∼ N (0, 1). The line, preceded by ∞, gives the asymptotic values. Method SSE n 100 500 1000 2000 5000 10000 ∞ µ̂1 0.570983 0.575676 0.576424 0.576826 0.577037 0.577107 0.577350 µ̂2 0.575590 0.577118 0.577186 0.577144 0.577330 0.577377 0.577350 µ̂3 0.578029 0.578470 0.578120 0.577945 0.577635 0.577543 0.577350 σ̂11 0.263776 0.141363 0.123481 0.104429 0.093606 0.087822 0.074074 σ̂22 0.309305 0.161205 0.124819 0.104871 0.097177 0.092609 0.074074 σ̂33 0.282773 0.149813 0.121335 0.103671 0.093909 0.089642 0.074074 σ̂12 -0.144522 -0.076137 -0.063075 -0.052625 -0.048362 -0.045356 -0.037037 σ̂13 -0.114110 -0.064089 -0.060038 -0.051672 -0.045185 -0.042420 -0.037037 σ̂23 -0.165663 -0.085601 -0.061653 -0.052170 -0.048793 -0.047258 -0.037037 ESE 100 500 1000 2000 5000 10000 ∞ 0.571762 0.575761 0.576414 0.576780 0.577012 0.577125 0.577350 0.577007 0.577456 0.577396 0.577305 0.577403 0.577401 0.577350 0.579906 0.578542 0.578128 0.577918 0.577620 0.577517 0.577350 0.123299 0.056520 0.043292 0.036568 0.030453 0.029584 0.024691 0.141033 0.059089 0.043200 0.036203 0.032063 0.029680 0.024691 0.121794 0.051253 0.041763 0.036525 0.032005 0.030257 0.024691 -0.070078 -0.032075 -0.022266 -0.018055 -0.015234 -0.014494 -0.012346 -0.049452 -0.023321 -0.020903 -0.018448 -0.015195 -0.015074 -0.012346 -0.071866 -0.027809 -0.020953 -0.018145 -0.016831 -0.015193 -0.012346 LSE 100 500 1000 2000 5000 10000 ∞ 0.575121 0.576833 0.577022 0.577337 0.577311 0.577258 0.577350 0.574814 0.577377 0.577354 0.577418 0.577469 0.577498 0.577350 0.577588 0.577289 0.577415 0.577177 0.577224 0.577272 0.577350 0.173704 0.107186 0.101079 0.092130 0.090412 0.088953 ? 0.174857 0.104621 0.098209 0.091427 0.088701 0.085219 ? 0.173169 0.106974 0.100486 0.089505 0.089865 0.089801 ? -0.085890 -0.052394 -0.049366 -0.047012 -0.044678 -0.042188 ? -0.086918 -0.054652 -0.051622 -0.045113 -0.045745 -0.046740 ? -0.086607 -0.052262 -0.048862 -0.044391 -0.044061 -0.043056 ? MRCE 100 500 1000 2000 5000 10000 ∞ 0.568656 0.576584 0.577444 0.577241 0.577312 0.577239 0.577350 0.570735 0.576612 0.576655 0.576968 0.577253 0.577371 0.577350 0.571815 0.576154 0.576699 0.577275 0.577265 0.577334 0.577350 0.794208 0.513244 0.487464 0.436314 0.416947 0.398551 0.358281 0.796010 0.520888 0.482635 0.434728 0.430323 0.418207 0.358281 0.802239 0.524345 0.475335 0.436539 0.426823 0.410919 0.358281 -0.389900 -0.253712 -0.246720 -0.217338 -0.210246 -0.202886 -0.179141 -0.384086 -0.257288 -0.240780 -0.218922 -0.206836 -0.195591 -0.179141 -0.387755 -0.265869 -0.234323 -0.217178 -0.219833 -0.215307 -0.179141 Lemma 3.4.2 ([23]) Let F be a class of measurable functions such that kf kP ≤ δ and kf k∞ ≤ M for every f in F. Then   h i Jn (δ, F, k · kP ) √ 2 EP kGn kF . Jn (δ, F, k · kP ) 1 + M , nδ where Z Jn (δ, F, k · k) = δ p 1 + HB (, F, k · k)d 0 Lemma 3.4.3 ([23]) Let F be a class of measurable functions such that kf kP,B ≤ δ for every f in F. Then   h i Jn (δ, F, k · kP,B ) √ 2 EP kGn kF . Jn (δ, F, k · kP,B ) 1 + , nδ In the sequel, and whenever the -bracketing entropy of some class F with respect to some norm k · k is bounded above by C−1 for some constant C > 0 (which may depend on n), we will write for all e >  Z e Jn (d) = (1 + C/)1/2 d (10.3) 0 Moreover, we will use the inequality Jn (d) ≤ d + 2C 1/2 e1/2 √ √ √ which is an immediate consequence of the fact that x + y ≤ x + y for all x, y ≥ 0. (10.4) imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 16 10.1. Appendix A: The least squares estimator (LSE) of the link function ψ In this section we first prove Proposition 3.1. We next show in Lemma 10.1 that the LSE ψ̂nα is of order Op (log n) uniformly in B(α0 , δ0 ). This result is used in the proof of Proposition 3.2, given at the end of this section. Proof of Proposition 3.1. Note that with X ∼ g we can write h 2 i Lα (ψ) = E ψ0 (αT0 X) − ψ(αT X) . Thus, h 2 i E ψ0 (αT0 X) − E(ψ0 (αT0 X) | αT X) = min 0 Lα (ψ), ψ∈M with M0 the set of all bounded Borel-measurable function defined on Iα . Therefore, if the minimizing function u 7→ E(ψ0 (αT0 X) | αT X = u) is monotone increasing on Iα , then this implies that it necessarily minimizes Lα over M. Furthermore, such a minimizer is unique by strict convexity of Lα . Lemma 10.1. max sup ψ̂nα (αT x) = Op (log n). α∈B(α0 ,δ0 ) x∈X Proof. The proof of this lemma is similar to that of Lemma 4.4 of [1]. For a fixed α it follows from the min-max formula of an isotonic regression that we have for all x ∈ X Pk Pn α α i=1 Yi i=k Yi min ≤ ψ̂nα (αT x) ≤ max . 1≤k≤n 1≤k≤n n − k + 1 k Hence, min Yi ≤ ψ̂nα (αT x) ≤ max Yi 1≤i≤n 1≤i≤n and this in turn implies that max sup ψ̂nα (αT x) ≤ max |Yi |. α∈B(α0 ,δ0 ) x∈X 1≤i≤n Using similar arguments as in [1], we use Assumption A7 to show that max1≤i≤n |Yi | = Op (log n), which completes the proof. Proof of Proposition 3.2. By the definition of the LSE of the unknown monotone link function, ψ̂nα maximizes the map ψ 7→ Mn over M where, Z   Mn (ψ, α) = 2yψ(αT x) − ψ 2 (αT x) dPn (x, y). (10.5) X ×R Moreover, ψα maximizes the map ψ 7→ M over M, where Z   M(ψ, α) = 2yψ(αT x) − ψ 2 (αT x) dP0 (x, y). (10.6) X ×R Define the function fψ,α by, fψ,α (x, y) = 2yψ(αT x) − ψ 2 (αT x) Note that by definition of the LSE as the maximizer of (10.5), we have Z   fψ̂nα ,α (x, y) − fψα ,α (x, y) dPn (x, y) ≥ 0. X ×R imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 17 Moreover for all α ∈ B(α0 , δ0 ) and ψ ∈ M, we have, Z   fψ,α (x, y) − fψα ,α (x, y) dP0 (x, y) = −d2α (ψ, ψα ), X ×R where, for any α ∈ B(α0 , δ0 ) and for any two elements ψ1 and ψ2 in M, we define the squared distance Z  2 2 dα (ψ1 , ψ2 ) = ψ2 (αT x) − ψ1 (αT x) g(x)dx. X This can be seen as follows: Z   fψ,α (x, y) − fψα ,α (x, y) dP0 (x, y) X ×R Z   2 = 2ψα (αT x)(ψ(αT x) − ψα (αT x)) − ψ 2 (αT x) + ψα (αT x) dP0 (x, y) X ×R Z  2 =− ψ(αT x) − ψα (αT x) g(x)dx = −d2α (ψ, ψα ), X where we use that E{Y |αT X = u} = ψα (u). This implies that, for all α ∈ B(α0 , δ0 ) and ψ ∈ M, we have, Z   fψ,α (x, y) − fψα ,α (x, y) d(Pn − P0 )(x, y) ≥ d2α (ψ, ψα ). X ×R We write, ( ) dα (ψ̂nα , ψα ) ≥  sup P α∈B(α0 ,δ0 ) ( Z ≤P  sup α∈B(α0 ,δ0 ),dα (ψ̂nα ,ψα )≥ X ×R   fψ̂nα ,α (x, y) − fψα ,α (x, y) d(Pn − P0 )(x, y) − d2α (ψ̂nα , ψα ) ≥ 0, ) dα (ψ̂nα , ψα ) ≥  sup α∈B(α0 ,δ0 ) ( Z ≤P  sup α∈B(α0 ,δ0 ),ψ∈MRK ,dα (ψ,ψα )≥ max   fψ,α (x, y) − fψα ,α (x, y) d(Pn − P0 )(x, y) − d2α (ψα , ψ) ≥ 0, X ×R  T sup ψ̂nα (α x) ≤ K α∈B(α0 ,δ0 ) x∈X  +P max T  sup ψ̂nα (α x) > K . α∈B(α0 ,δ0 ) x∈X Fix ν > 0. Since max sup ψ̂nα (αT x) = Op (log n), α∈B(α0 ,δ0 ) x∈X by Lemma 10.1, we can find K1 > 0 large enough such that   T P max sup ψ̂nα (α x) > K1 log n < ν/2. α∈B(α0 ,δ0 ) x∈X Define n o MRK = ψ monotone non-decreasing on [−R, R] and bounded by K , (10.7) and consider the related class    FRK = f (x, y) = 2y ψ(αT x) − ψα (αT x) − ψ(αT x)2 + ψα (αT x)2 ,  (α, ψ) ∈ B(α0 , δ0 ) × MRK and (x, y) ∈ X × R , (10.8) imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 18 and for some v > 0  FRKv : =  f ∈ FRK : dα (ψ, ψα ) ≤ v for all α ∈ B(α0 , δ0 ) . (10.9) Note now that the class FRKv is included in the class HRCδ defined in Lemma 10.5 of Supplement B of [2] with C = 2K 2 and δ = 2Kv. This holds true provided that K0 ≤ K, and K ≥ 1 which we can assume for n large enough since K will be chosen to be of order log n. To see the claimed inclusion, it is enough to show that if m is a nondecreasing function [−R, R] then m2 can be written as the difference of two monotone functions. This is true because m2 = m2 Im≥0 − (−m2 )Im<0 , and m2 and −m2 are nondecreasing on the subsets {m ≥ 0} and {m < 0} respectively. When restricting attention to the event that ψ̂nα is bounded by K for n large enough, we can consider only monotone functions ψ ∈ MRK . Using the expression of ψα the latter is bounded by K0 ≤ K. On the other hand, for any function f ∈ FRKv , there exist nondecreasing 2 monotone functions f1 and f2 such that ψ 2 − ψα = f2 − f1 , such that kf1 k∞ , kf2 k∞ ≤ K 2 + K02 ≤ 2K 2 . Using that K ≥ 1 implies that k2ψk∞ , k2ψα k∞ ≤ 2K ≤ 2K 2 . To finish, note that for any α we have that 2 R ψ(αT x) − ψα (αT x) dG(x) ≤ v 2 we also have that X Z Z 2 2 2 ψ 2 (αT x) − ψα (αT x) dG(x) ≤ (2K)2 ψ(αT x) − ψα (αT x) dG(x) X X 2 2 ≤ 4K v . The calculation above implies that we can take δ = 2Kv. Using the result of Lemma 10.5 in Supplement B of [2], it follows that the related class FeRKv = D̃−1 FRKv with D̃ = 16M0 C = 32M0 K 2 and a given v > 0 satisfies   eRKv , k · kB,P HB , FeRKv , k · kB,P0 ≤ HB , H 0 A ≤  for some constant A > 0 (depending only on d and the other parameters of the problem), and that for all f˜ ∈ FeRKv we have kf˜kB,P0 ≤ D̃−1 δ = (32M0 K 2 )−1 2Kv = (16M0 )−1 K −1 v ≡ A0 K −1 v. It follows from Lemma 3.4.3 of [23] that   h i Jn (A0 K −1 v) E kGn kFeRKv . Jn (A0 K −1 v), 1 + K 2 √ 2 2 , where Jn is defined in (10.3) nA0 v 1/2 ≤ A0 K −1 v + 2A0 K −1/2 v 1/2 A1/2 , using the inequality in (10.4) ≤ B0 K −1/2 (v + v 1/2 ) for some constant B0 > 0, where we used the fact that K −1/2 ≥ K −1 . Therefore,   h i B0 K −1/2 (v + v 1/2 ) √ 2 2 E kGn kFeRKv . B0 K −1/2 (v + v 1/2 ) 1 + K 2 nA0 v   1 + v 1/2 ≤ C0 K −1/2 (v + v 1/2 ) 1 + C0 K 3/2 √ 3/2 . nv Using the definition of the class FeRKv , the preceding display implies that   h i 1/2 3/2 1/2 3/2 1 + v √ 3/2 . E kGn kFRKv . C0 K (v + v ) 1 + C0 K nv (10.10) imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 19 Now with K = K1 log n, we have that ( ) dα (ψ̂nα , ψα ) ≥  sup P α∈B(α0 ,δ0 ) ≤P    Z sup  α∈B(α0 ,δ0 ),ψ∈MRK ,    2 fψ,α (x, y) − fψα ,α (x, y) d(Pn − P0 )(x, y) − dα (ψ, ψα ) ≥ 0, X ×R dα (ψ,ψα )≥ max sup ψ̂nα (αT x) ≤ K  + ν/2 (10.11) α∈B(α0 ,δ0 ) x∈X     Z ∞    X √ √ 2s 2  ≤ P sup n fψ,α (x, y) − fψα ,α (x, y) d(Pn − P0 )(x, y) ≥ n2  , + ν/2   X ×R  s=0 α∈B(α0 ,δ0 ),ψ∈MRK , 2s ≤dα (ψ,ψα )≤2s+1  ≤ ∞ X ( sup P √ Z h(x, y)d(Pn − P0 )(x, y) ≥ n h∈FRK2s+1  s=0 √ ) 2s 2 n2  + ν/2. X ×R We now show that there exists a constant C > 0 such that with  = M (log n)n−1/3 , ) ( Z √ h(x, y)d(Pn − P0 )(x, y) ≤ CM 1/2 (log n)2 n−1/6 2(s+1)/2 n E sup h∈FRK2s+1  X ×R (10.12) An application of Markov’s inequality, together with (10.11), then yields, with  = M (log n)n−1/3 ( ) ∞ X CM 1/2 (log n)2 n−1/6 2(s+1)/2 √ 2s 2 P sup dα (ψ̂nα , ψα ) ≥  ≤ + ν/2 n2  α∈B(α0 ,δ0 ) s=0 = ∞ ∞ X C(log n)2 n−1/6 2(s+1)/2 21/2 C X 1 √ 2s 3/2 + ν/2 = + ν/2 ≤ ν, n2 M (log n)2 n−2/3 M 3/2 s=0 23s/2 s=0 for M sufficiently large. The result of Proposition 3.2 hence follows by showing (10.12). Using the obtained bound in (10.10) with v = 2s+1  and using that 2s+1 ≥ 1, s ≥ 0 and  ≤ 1 for n large enough we get some some constant D0 > 0 ( ) Z √ E sup n h(x, y)d(Pn − P0 )(x, y) h∈FRK2s+1  X ×R   1 + M 1/2 2(s+1)/2 (log n)1/2 n−1/6 . (log n)3/2 M 1/2 2(s+1)/2 (log n)1/2 n−1/6 1 + D0 (log n)3/2 √ nM 3/2 23(s+1)/2 (log n)3/2 n−1/2   1 + M 1/2 2(s+1)/2 (log n)1/2 n−1/6 = (log n)2 n−1/6 M 1/2 2(s+1)/2 1 + D00 , with D00 = D0 M −3/2 23(s+1)/2 ≤ 2(log n)2 n−1/6 M 1/2 2(s+1)/2 , for s ≥ 0 and n large enough. This proves the desired result: sup α∈B(α0 ,δ0 ) d2α (ψ̂nα , ψα ) = sup Z n o2   ψ̂nα (αT x) − ψα (αT x) dG(x) = Op (log n)2 n−2/3 . α∈B(α0 ,δ0 ) imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 20 10.2. Appendix B: Asymptotic behavior of the simple score estimator In this section we prove Theorem 4.1 given in Section 4. The proof is decomposed into three parts: In Section 10.2.1 we first prove the existence of a crossing of zero of φn defined in (4.5). The proof of consistency and asymptotic normality of α̂n are given in Section 10.2.2 and Section 10.2.3. 10.2.1. Proof of existence of a crossing of zero Let φ be the population version of φn defined by Z   T φ(β) := (JS (β)) x y − ψα S(β)T x dP0 (x, y), (10.13) where ψα is defined by       ψα (u) := E ψ0 αT X |αT X = u ≡ E ψ0 S(β)T X |S(β)T X = u . We have the following result: Proposition 10.1. φn (β) = φ(β) + op (1),  uniformly in β ∈ C := β ∈ Rd−1 : S(β) ∈ B(α0 , δ0 ) . Proof. For any β ∈ C, we write, Z   T φn (β) = (JS (β)) x y − ψα S(β)T x dPn (x, y) Z n  o T + (JS (β)) x ψα S(β)T x − ψ̂nα S(β)T x dPn (x, y) Z   T = φ(β) + (JS (β)) x y − ψα S(β)T x d(Pn − P0 )(x, y) Z n  o T + (JS (β)) x ψα S(β)T x − ψ̂nα S(β)T x d(Pn − P0 )(x, y) Z n  o T + (JS (β)) x ψα S(β)T x − ψ̂nα S(β)T x dP0 (x, y) = φ(β) + I + II + III. (10.14) To find the rate of convergence of the term I in (10.14) we will use Lemma 10.6 in Supplement B of T [2]. Note first that for 1 ≤ i ≤ d − 1 the i-th component of the vector (JS (β)) x can be written as s(β)i1 x1 + . . . + s(β)id xd , where by Assumption A8 the functions sij are assumed to be uniformly bounded with partial derivatives that are also uniformly bounded on the bounded convex set C to which β belongs. If B1 is the same constant found in Lemma 10.6 in Supplement B of [2] then the -bracketing entropy is bounded above by B1 K0 /. Applying Lemma 3.4.3 of [23], Markov’s inequality and Lemma 10.6 in Supplement B to each of the empirical processes corresponding to the term s(β)ij xj for 1 ≤ j ≤ d yields (with D = 8M RK0 , and M is a constant bounding the sum of s(β)ij and their partial derivatives) for A > 0     D Jn (B2 ) −1/2 P |I| ≥ An ≤ Jn (B2 ) 1 + √ 2 , where Jn is defined in (10.3) and B2 is the same A nB2 constant of Lemma 10.6 in Supplement B   D B3 1/2 1/2 1/2 ≤ B3 1 + √ 2 , using the inequality in (10.4) with B3 = B2 + 2B1 K0 B2 A nB2 1  . A imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 21 This implies that I = Op (n−1/2 ). For the last term III in (10.14) we get by an application of the CauchySchwarz inequality and by Proposition 3.2 that this term is Op (n−1/3 log n), i.e. Z III ≤ = Op (n 2 T (JS (β)) x −1/3 2 1/2 Z n 1/2  o2 T T ψα S(β) x − ψ̂nα S(β) x dG(x) dG(x) log n), T where we also use that (JS (β)) x is bounded in L2 norm, a straightforward implication of Assumption A1 (boundedness of X and Assumption A8 (uniform boundedness of the components of the matrix JS ). The result now follows by showing that the term II is op (1). Consider the class of functions     GjRKv = g(x, y) = s(β)xj ψα αT x − ψ(αT x , such that (α, β, ψ) ∈ Sd−1 × C × MRK and (x, y) ∈ X × ∈ R,  and sup dα (ψα , ψ) ≤ v α∈B(α0 ,δ0 ) with s a function satisfying (10.43). Then, GjRKv ⊂ QjRK − QjRK , where QjRC is the same class defined in (10.44). Here, we choose K large enough such that K ≥ K0 . If follows from (10.46) in the proof of Lemma 10.6 in Supplement B, that (at the cost of increasing the constant L in (10.46))   LK , HB , G̃jRKv , k · kP0 ≤  where G̃jRKv = (16M0 K)−1 GjRKv . Also, we have for all g ∈ GjRKv kgkP0 ≤ M Rv. Fix ν > 0 and let sij be the i × j entry of JS (β) for 1 ≤ i ≤ d − 1 and 1 ≤ j ≤ d. Also, let Z n  o IIij = sij (β)xj ψα S(β)T x − ψ̂nα S(β)T x d(Pn − P0 )(x, y). X ×R Using Lemma 10.1 and Proposition 3.2 there exists some constant K1 > 0 large enough (and independent of n ) such that with K = K1 log n and v = K1 log n n−1/3 we have that for A > 0   P |IIij | ≥ An−1/2 ! =P |IIij | ≥ An−1/2 , sup sup ψ̂nα (αT x) ≤ K, α∈B(α0 ,δ0 ) x∈X sup dα (ψα , ψ) ≤ v + ν/2 α∈B(α0 ,δ0 )   Jn (M Rv) K + ν/2, where Jn is defined in (10.3) . Jn (M Rv) 1 + √ A nM 2 R2 v 2   K M Rv + 2(M RL)1/2 K 1/2 v 1/2 √ ≤ M Rv + 2(M RL)1/2 K 1/2 v 1/2 1+ + ν/2, using the inequality in (10.4) A nM 2 R2 v 2   1 M̃ (log n)2 n−1/6 1 + ≤ + ν/2, for some constant M̃ > 0 A log nM 2 R2 ≤ν for n large enough. We conclude that IIij = op (n−1/2 ) which in turn implies that II = op (n−1/2 ). imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 22 Proof of Theorem 4.1 (Existence). Using Proposition 10.1 we get, analogously to the development in [10], the relation φn (α) = φ0 (β0 )(β − β0 ) + Rn (β), (10.15) where Rn (α) = op (1) + o(β − β0 ), uniformly in β ∈ C and where φ0 is the derivative of φ defined in (10.13). Using Lemma 10.9 in Supplement C of [2], we get that the derivative of φ at β0 is given by the matrix    T T φ0 (β0 ) = (JS (β0 )) E ψ00 S(β0 )T x Cov(X|S(β0 )T X) JS (β0 ) = (JS (β0 )) AJS (β0 ) = B, where A and B are defined in (4.7) and (4.9) respectively. We now define, for h > 0, the functions Z 1 Kh (u1 − β01 ) . . . Kh (ud−1 − βd−1 ) Rn (u1 , . . . , ud−1 ) du1 . . . dud−1 , R̃n,h (β) = d−1 h where Kh (x) = h−1 K(x/h), x ∈ R, letting K be one of the usual smooth kernels with support [−1, 1]. Furthermore, we define: φ̃n,h (β) = φ0 (β0 )(β − β0 ) + R̃nh (β). Clearly: lim φ̃n,h (β) = φn (β) h↓0 and lim R̃nh (β) = Rn (β), h↓0 for each continuity point β of φn . We now reparametrize, defining γ = φ0 (β0 )β, γ0 = φ0 (β0 )β0 . This gives:  φ0 (β0 )(β − β0 ) + R̃nh (β) = γ − γ0 + R̃nh B −1 γ , By (10.15), the mapping  γ 7→ γ0 − Rn B −1 γ , maps, for each η > 0, the ball Bη (β0 ) = {β : kβ − β0 } ≤ η} into Bη/2 (β0 ) = {β : kβ − β0 } ≤ η/2} for all large n, with probability tending to one, where k · k denotes the Euclidean norm, implying that the continuous map  γ 7→ γ0 − R̃nh B −1 γ , maps Bη (γ0 ) = {γ : kγ − γ0 k2 ≤ η} into itself for all large n and small h. So for large n and small h there is, by Brouwer’s fixed point theorem, a point γnh such that  γnh = γ0 − R̃nh B −1 γnh . Defining βnh = B −1 γnh , we get: φ̃n,h (βnh ) = φ0 (β0 )(βnh − β0 ) + R̃nh (βnh ) = 0. (10.16) By compactness, (βn,1/k )∞ k=1 must have a subsequence (βn,1/ki ) with a limit β̃n , as i → ∞. Suppose that the jth component φnj of φn does not have a crossing of zero at β̃n . Since φnj only has finitely many jump discontinuities, since there can only be discontinuities at a changing of ordering of the values imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 23 αT Xi , there must be a closed ball Bδ (β̃n ) = {β : kβ − β̃n k ≤ δ} of β̃n such that {φ̄nj (β) : β ∈ Bδ (β̃n )} has a constant sign in the closed ball Bδ , say φ̄nj (β) > 0 for β ∈ B̄δ (β̃n ). Again using that φnj only has finitely many jump discontinuities, this means that φ̄n,j (β) ≥ c > 0, for all β ∈ B̄δ (β̃n ). This means that the jth component φ̃n,h,j of φ̃n,h satisfies φ̃n,h,j (β) = [φ0 (β0 )(β − β0 )]j + R̃nh,j (β) Z n o 1 [φ0 (β0 )(β − β0 )]j + Rnj (u1 , . . . , ud−1 ) Kh (u1 − β01 ) . . . Kh (ud−1 − βd−1 ) du1 . . . dud−1 = d−1 h Z n o 1 [φ0 (β0 )(u − β0 )]j + Rnj (u1 , . . . , ud−1 ) Kh (u1 − β1 ) . . . Kh (ud−1 − βd−1 ) du1 . . . dud−1 − c/2 ≥ d−1 h Z 1 ≥ c d−1 Kh (u1 − β1 ) . . . Kh (ud − βd ) du1 . . . dud − c/2 h = c/2, for β ∈ Bδ/2 (β̃n ) and sufficiently small h, contradicting (10.16), since βnh , for h = 1/ki , belongs to Bδ/2 (β̃n ) for large ki . 10.2.2. Proof of consistency of the simple score estimator Proof. Since β̂n is contained in the compact set C, the sequence (β̂n ) has a subsequence (β̂nk = β̂nk (ω)), converging to an element β∗ . Let αnk = S(β̂nk ). If β̂nk = β̂nk (ω) −→ β∗ , we get by continuity of the map S that αnk → α∗ = S(β∗ ). By Proposition 3.2, we also have  ψ̂nk ,α̂nk S(βnk )T x −→ ψα∗ (S(β∗ )T x), where ψα is defined in (3.1). By Proposition 10.1 and the fact that in the limit, the crossing of zero becomes a root of the continuous limiting function, we get, lim φnk (βnk ) = φ(β∗ ) = 0 k→∞ (10.17) where, Z φ(β∗ ) = Z =   JS (β∗ )T x y − ψα∗ S(β∗ )T x dP0 (x, y)    JS (β∗ )T x ψ0 S(β0 )T x − ψα∗ S(β∗ )T x dG(x) Z      JS (β∗ )T x ψ0 S(β0 )T x − E ψ0 S(β0 )T x |S(β∗ )T X = S(β∗ )T x dG(x)     = E Cov JS (β)T X, ψ0 S(β0 )T |S(β∗ )T X = We next conclude that, 0 = (β0 − β∗ )T φ(β∗ )     = E Cov (β0 − β∗ )T JS (β∗ )T X, ψ0 S(β∗ )T X + (S(β0 ) − S(β∗ ))T X |S(β∗ )T X which can only happen if β0 = β∗ where we use the positivity of the random variable Cov((α0 − α)T X, ψ0 (αT X)|αT X) shown in Lemma 10.10 in Supplement C of [2] and Assumption A6 which guarantees that the random variable Cov[(β0 − β∗ )T JS (β)T X, ψ0 (S(β)T X + (S(β0 ) − S(β))T X)|S(β)T X] is not equal to 0 almost surely for all β 6= β0 . Note that,    Cov (β0 − β)T JS (β)T X, ψ0 S(β)T X + (S(β0 ) − S(β))T X |S(β)T X = u    = Cov (S(β0 ) − S(β) + o(β − β0 ))T X, ψ0 S(β)T X + (S(β0 ) − S(β))T X |S(β)T X = u   = Cov (α0 − α)T X, ψ0 (αT X + (α0 − α)T X)|αT X = u + o(β − β0 ) imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 24 where the first term in the expression above is positive for all α ∈ B(α0 , δ0 ) by Lemma 10.10 in Supplement C. 10.2.3. Proof of asymptotic normality of the simple score estimator We define φn at β̂n by putting φn (β̂n ) = 0. (10.18) Note that, with this definition, we use the representation of the components as a convex combination of the left and right limit at β̂n : φn,j (β̂n ) = γj φn,j (β̂n −) + (1 − γj )φn,j (β̂n +) = 0, (10.19) where φn,j denotes the jth component of φn and where we can choose γj ∈ [0, 1] in such a way that (10.19) holds since we have a crossing of zero componentwise. Note that this does not change the location of the crossing of zero. Since the following asymptotic representations are also valid for one-sided limits as used in (10.19) we can use Definition (10.18) and assume φn (β̂n ) = 0. We show Z     φn (β̂n ) = JS (β0 )T x − E(X|S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y) Z    T + JS (β0 ) x − E(X|S(β0 )T x) y − ψα̂n S(βn )T x dP0 (x, y)   + op n−1/2 + kβ̂n − β0 k , (10.20) where from now on we will use the notation E(X|S(β)T x) to denote E(X|S(β)T X = S(β)T x) for all β ∈ C and x ∈ X . T 0 T T Since β̂n →p β0 and since  the function β → ψS(β) (S(β) x) has derivative ψ0 (S(β0 ) x)JS (β0 ) x − T T E(X|S(β0 ) X = S(β0 ) x) at β = β0 for all x ∈ X (See Lemma 10.9 in Supplement C), we get by Definition (10.18) and a Taylor expansion at β = β0 that, Z     JS (β0 )T x − E(X|S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)     = B β̂n − β0 + op n−1/2 + kβ̂n − β0 k , (10.21) where B is defined in (4.9). We conclude that, √ n(β̂n − β0 ) →d Nd (0, Π) , where Π is defined in (4.10). The asymptotic normality of the estimator α̂n then follows by noting that, √    √ √ T n(α̂n − α0 ) = JS (β0 ) n(β̂n − β0 ) + op n(β̂n − β0 ) →d Nd 0, JS (β0 )Π (JS (β0 )) . To prove (10.20) we first define the piecewise constant function Ēn,β    if ψα (u) > ψ̂nα (τi ) for all u ∈ (τi , τi+1 ),  E X|S(β)T X = τi,β  Ēn,β (u) = E X|S(β)T X = s if ψα (s) = ψ̂nα (s) for some s ∈ (τi , τi+1 ),    if ψα (u) < ψ̂nα (τi ) for all u ∈ (τi , τi+1 ), E X|S(β)T X = τi+1,β where the τi,β denote the sequence of jump points of the monotone LSE ψ̂nα = ψ̂nS(β) . We then have Z  n  o Ēn,β̂n S(β̂n )T x y − ψ̂nα̂n S(β̂n )T x dPn (x, y) = 0. (10.22) imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 25 2 R This follows from the fact that ψ̂nα , i.e. the minimizer of the quadratic criterion X ×R y − ψ(αT x) dPn (x, y) over monotone functions of the greatest convex minorant of the cumulative o  Pψ ∈ M, is the left derivative i α sum diagram {(0, 0), i, j=1 Yi , i = 1, . . . , n . (See also [11], p.332). By Lemma 10.14 in Supplement C 0 of [2] we also know that ψα stays away from zero for all α = S(β) in a neighborhood of α0 = S(β0 ). Using the same techniques as in [11], we can find a constant C > 0 such that for all i = 1, . . . , d and u ∈ Iα ,  E Xi |S(β)T X = u − Ēni,β (u) ≤ C ψα (u) − ψ̂nα (u) (10.23) where Ēni,β denotes the ith component of En,β . In the sequel, we will use JS (β̂n ) = Op (1), an immediate consequence of consistency of α̂n and Assumption A8. Now, as a consequence of (10.22), we can write Z n  o n  o φn (β̂n ) = JS (β̂n )T x − E X|S(β̂n )T x y − ψ̂nα̂n S(β̂n )T x dPn (x, y) Z n   o n  o  y − ψ̂nα̂n S(β̂n )T x dPn (x, y) E X|S(β̂n )T x − Ēn,β̂n S(β̂n )T x + JS (β̂n )T  = JS (β̂n )T I + II . (10.24) The term II can be written as Z n    o n  o II = E X|S(β̂n )T x − Ēn,β̂n S(β̂n )T x y − ψ̂nα̂n S(β̂n )T x d(Pn − P0 )(x, y) Z n   o   o n dP0 (x, y) + E X|S(β̂n )T x − Ēn,β̂n S(β̂n )T x y − ψα̂n S(β̂n )T x Z n    o n    o + E X|S(β̂n )T x − Ēn,β̂n S(β̂n )T x ψ̂nα̂n S(β̂n )T x − ψα̂n S(β̂n )T x dP0 (x, y) = IIa + IIb + IIc . (10.25) We first note that by Lemma 10.12 in Supplement C, the functions u 7→ E(Xi |S(β)T X = u) are uniformly bounded by R for all β ∈ C and i ∈ {1, . . . , d}. Also, they admit a bounded variation, with a total variation that is uniformly bounded for all β ∈ C and i ∈ {1, . . . , d}. By definition of Ēn,β its i-th component, Ēni,β is also uniformly bounded by R and has a finite total variation which cannot exceed the total variation of u 7→ E(Xi |S(β)T X = u). Using Lemma 10.13 of Supplement C , we can find two monotone functions f1 and f2 such that u 7→ E X|S(β)T X = u − Ēn,β (u) = f2 (u) − f1 (u) with f1 , f2 ∈ MRC1 for some constant C1 > 0. Also, we know that ψ̂nα̂n ∈ MRK with K = K1 log n with increasing probability as n → ∞ provided that K1 > 0 is chosen large enough. Noting that for any bounded increasing functions f1 , f2 , f3 we have that (f2 − f1 )f3 is again bounded and has a bounded variation, it follows that the class of functions, Fa say, involved in term IIa is included in HRK 0 v defined in Lemma 10.5 in Supplement B . Here, the constant K 0 = K2 log n for some large enough constant K2 > 0, and v = C2 (log n)2 n−1/3 for some constant C2 > 0 using (10.23) and Proposition 3.2. Using Lemma 10.5 in Supplement B, we can show that (when the event ψ̂nα̂n ∈ MRK occurs)  B1 , for some constant B1 > 0, HB , Fea , k · kB,P0 ≤  with Fea = D̃−1 Fa with D̃  K 0 = K2 log n. Also, for any element f˜ = D̃−1 f ∈ Fe we have that kf˜kB,P0 ≤ B2 D̃−1 v = C2 (log n)n−1/3 = δn , for some constant C2 > 0. Let IIa,i be the term corresponding to i-th component of X. Using Markov’s inequality we have for a fixed imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 26 A > 0, ν > 0 and n large enough that   P |IIa,i | ≥ An−1/2 = P ! |IIa,i | ≥ An−1/2 , sup sup ψ̂nα (αT x) ≤ K + ν/2 α∈B(α0 ,δ0 ) x∈X   D̃ Jn (δn ) . Jn (δn ) 1 + √ 2 + ν/2, where Jn is defined in (10.3) A nδn ! log n B2 1/2 . B2 δ n 1 + √ 3/2 + ν/2, for some constant B2 > 0, using the inequality in (10.4) A nδn   1 B3 −3/2 + ν/2, with B3 = B2 C2 . (log n)3/2 n−1/6 1 + A (log n)3/2 ≤ν forn large enough. We conclude that IIa,i = op (n−1/2 ) which in turn implies that IIa = op (n−1/2 ).  We turn now to IIb . Using Lemma 10.9 in Supplement C and a Taylor expansion of β 7→ ψα S(β)T x we get,      ψα S(β)T x = ψ0 S(β0 )T x + (β − β0 )T JS (β0 )T x − E(X|S(β0 )T X = S(β0 )T x) ψ00 S(β0 )T x + o(β − β0 ), (10.26) so that Z n    o n  o  IIb = JS (β̂n )T E X|S(β̂n )T x − Ēn,β̂n S(β̂n )T x ψ0 S(β0 )T x − ψα̂n S(β̂n )T x dP0 (x, y)   = op β̂n − β0 using consistency of β̂n . We next consider the term IIc . Using uniform boundedness of JS on C and the inequality in (10.23) it follows that Z n o2  kIIc k . dG(x) ψα̂n α̂Tn x − ψ̂nα̂n α̂Tn x = Op ((log n)2 n−2/3 ) = op (n−1/2 ) uniformly in β ∈ C. We conclude that (10.24) can be written as Z n  o n  o T φn (β̂n ) = JS (β̂n ) x − E X|S(β̂n )T x y − ψ̂nα̂n S(β̂n )T x dPn (x, y)   + op n−1/2 + (β̂n − β0 ) Z n  o n  o T = JS (β̂n ) x − E X|S(β̂n )T x y − ψα̂n S(β̂n )T x dPn (x, y) Z n  o n    o + JS (β̂n )T x − E X|S(β̂n )T x ψα̂n S(β̂n )T x − ψ̂nα̂n S(β̂n )T x dPn (x, y)   + op n−1/2 + (β̂n − β0 )   = Ia + Ib + op n−1/2 + (β̂n − β0 ) . (10.27)  We show below that Ib = op n−1/2 + (α̂n − α0 ) such that the limiting distribution of the score estimator follows from the analysis of the term Ia which can be rewritten as Z n  o n  o T Ia = JS (β̂n ) x − E X|S(β̂n )T x y − ψα̂n S(β̂n )T x d(Pn − P0 )(x, y) Z n  o n  o dP0 (x, y) (10.28) + JS (β̂n )T x − E X|S(β̂n )T x y − ψα̂n S(β̂n )T x imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 27  where we recall that ψα (u) = E ψ0 (αT X|αT X = u . For the second term on the right-hand side of (10.28) we have by (10.26) Z n  o  o n T dP0 (x, y) x − E X|S(β̂n )T x y − ψα̂n S(β̂n )T x JS (β̂n ) ( Z     T = − JS (β0 )T ψ00 S(β0 )T x x − E X|S(β0 )T x x − E X|S(β0 )T x dP0 (x, y) ) × JS (β0 ) (β̂n − β0 ) + op (β̂n − β0 ). (10.29) For the first term on the right-hand side of (10.28) we have that Z n  o  o n d(Pn − P0 )(x, y) x − E X|S(β̂n )T x y − ψα̂n S(β̂n )T x JS (β̂n )T Z     = JS (β0 )T x − E X|S(β0 )T x y − ψ0 S(β0 )T x d(Pn − P0 )(x, y) + op (n−1/2 ) + op (β̂n − β0 ). (10.30) Indeed, since this amounts to showing that  T Z n  o n  o A = JS (β̂n ) − JS (β0 ) x − E X|S(β̂n )T x y − ψα̂n S(β̂n )T x d(Pn − P0 )(x, y) = op (β̂n − β0 ),  Z     T T B= E X|S(β̂n ) x − E X|S(β0 ) x (y − ψ0 (αT0 x))d(Pn − P0 )(x, y) = op (n−1/2 ) (10.31) (10.32) and Z  C=  T x − E X|S(β̂n ) x   ψ0 (αT0 x)  T − ψα̂n S(β̂n ) x  d(Pn − P0 )(x, y) = op (n−1/2 ). (10.33)   We start by proving (10.31). Using again that u 7→ E Xi |S(β̂n )T X = u is a bounded function with a uniformly bounded total variation, and that xi is a fixed (and deterministic) function, we can show that the class of functions involved in A, FA say, satisfies FA ⊂ xi HRC1 v + HRC1 v with v and C1 are some constants that are independent of n (since ψα , X and u 7→ E[X|αT X = u] are all bounded by constants  eRC v , k · kB,P . 1/ with independent of n). Now it follows by Lemma 10.5 in Supplement B that HB , H 1 0 eRC v = (16M0 C1 )−1 HRC v and kh̃kB,P . C2 for some constant C2 > 0 that is independent of n for all H 1 1 0 eRC v . Hence, using arguments similar to those of the proof of IIa = op (n−1/2 ) we can show that h̃ ∈ H 1 Z n  o n  o x − E X|S(β̂n )T x y − ψα̂n S(β̂n )T x d(Pn − P0 )(x, y) = Op (n−1/2 ). Using a Taylor expansion of JS (β) around β0 gives the desired rate in (10.31). Now we turn to term B in (10.32). Fix ν > 0 and i ∈ {1, . . . , d}. Using consistency of β̂n and Lemma 10.11 in Supplement C, then for all η > 0 there exists n large enough such that    E Xi |S(β̂n )T x − E Xi |S(β0 )T x ≤ η, imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 28 with probability at least 1 − ν/2. Thus, for L > 0 we have that for n large enough P (|Bi | > Ln−1/2 )  Z       T T T −1/2 > Ln =P E Xi |S(β̂n ) x − E Xi |S(β0 ) x (y − ψ0 (α0 x))d(Pn − P0 )(x, y) 1 E[kGn kF 0 ], where F 0 is defined in (10.49) L C1 η for some constant C1 > 0, ≤ ν/2 + L ≤ ν/2 + where Bi denotes the ith component of B defined in (10.32) and where we have used the result of Lemma 10.8. Choosing η such that η ≤ νLC1−1 /2 gives the claimed rate of convergence in (10.32). To establish the convergence rate of C, we first note that, for i ∈ {1, . . . , d}, we have that x 7→ E(Xi |S(β̂n )T X = S(β̂n )T x)ψα̂n (S(β̂n )T x) belongs to the class GRC1 − GRC1 for some constant C1 > 0 where GRK was defined in (10.40). This follows from using again the fact that the function u 7→ E Xi |S(β)T X = u is uniformly bounded and has a uniform total variation for all β ∈ C, that ψα is a bounded monotone function, and the fact that (f1 − f2 )f3 is a bounded function with bounded total variation for any increasing and bounded functions f1 , f2 and f3 , where we again use Lemma 10.13 in Supplement C to write the function u 7→ E Xi |S(β)T X = u as the difference f1 − f2 . Note now that both x 7→ xi and x 7→ ψ0 (S(β0 )T x) are fixed and bounded functions, and that the order bracketing entropy of a class does not get altered after multiplication its members by such functions (similarly for addition). It follows from Lemma 10.3 and Lemma 10.4 in Supplement B, that the -bracketing entropy of the class of functions involved in term C with respect to k · kP0 is bounded above by B/ for some constant B. Furthermore, using consistency of α̂n and Lemma 10.11 of Supplement C, we can find for any fixed ν > 0 an η > 0 such that supx |ψ0 (αT0 x) − ψα̂n (α̂Tn x)| ≤ η with probability at least 1 − ν/2 for n large enough. Hence, at the cost of increasing the constant B, both the k · k∞ and k · kP0 norms of the functions of the class involved in term C are bounded above by Bη. Using Markov’s inequality and Lemma 3.4.2 of [23] it follows that for all L > 0 P (|Ci | > Ln−1/2 )  Z       xi − E Xi |S(β̂n )T x ψ0 (S(β0 )T x) − ψα̂n S(β̂n )T x d(Pn − P0 )(x, y) ≥ Ln−1/2 =P     1 Jn (Bη) 1 B1 1 √ ≤ ν/2 + Jn (Bη) 1 + Bη √ 2 2 ≤ ν/2 + B1 η 1/2 + ≤ν L L B n nB η taking η small enough and n large enough. We conclude that C = op (n−1/2 ). Now we come back to term Ib given by Z n  o n    o T Ib = JS (β̂n ) x − E X|S(β̂n )T x ψα̂n S(β̂n )T x − ψ̂nα̂n S(β̂n )T x dPn (x, y). Note first that Ib = JS (β̂n )T Z n  o n    o x − E X|S(β̂n )T x ψα̂n S(β̂n )T x − ψ̂nα̂n S(β̂n )T x d(Pn − P0 )(x, y) = JS (β̂n )T Ib0 , (10.34) since Z n  o n    o x − E X|S(β̂n )T x ψα̂n S(β̂n )T x − ψ̂nα̂n S(β̂n )T x dP0 (x, y) h       i = E X − E X|S(β̂n )T X ψα̂n S(β̂n )T X − ψ̂nα̂n S(β̂n )T X    i h h   i = E E X − E X|S(β̂n )T X |S(β̂n )T X ψα̂n S(β̂n )T X − ψ̂nα̂n S(β̂n )T X = 0. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 29 Let Fb denote the class of functions involved in term Ib0 defined in (10.34), where in the definition of this class we consider the event where ψ̂nα̂n is bounded. Given the arguments used recurrently above we can directly state that the -bracketing entropy of this class is no larger than A1 log n/ for some constant A1 > 0 with increasing probability. Also, the k · k∞ and k · kP0 norms of the members of the class Fb are respectively bounded above with increasing probability by A1 log n and A1 log n n−1/3 = ηn at the cost of taking a larger A1 . For a fixed ν > 0 and L > 0 we have for i ∈ {1, . . . , d},using Lemma 3.4.2 of [23],  Z n   o n   o xi − E Xi |S(β̂n )T x ψα̂n S(β̂n )T x − ψ̂nα̂n S(β̂n )T x d(Pn − P0 )(x, y) > Ln−1/2 P ! 1/2 A2 A2 (log n)1/2 ηn 1/2 1/2 √ 2 ≤ ν/2 + (log n) , for some constant A2 > 0 (log n) ηn 1+ L nηn ! A2 A2 (log n)3/2 1/2 1/2 ≤ ν/2 + (log n) ηn 1 + √ 3/2 , for some constant A2 > 0 L nηn ! A2 A2 −1/6 (log n)n . ν/2 + 1 + 3/2 ≤ ν, L A 1 for n large enough. This implies that Ib = op (n−1/2 ). We conclude by (10.29), (10.30), (10.31), (10.32), (10.33) and Definition (10.18) that,   Z    T  B β̂n − β0 = (JS (β0 )) x − E(X|S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)   + op n−1/2 + kβ̂n − β0 k , where h i T B = (JS (β0 )) E ψ00 (S(β0 )T X) Cov(X|S(β0 )T X) (JS (β0 )) . We get, Z  √    √  T  n β̂n − β0 = nB −1 (JS (β0 )) x − E(X|S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)   √ + op 1 + nkβ̂n − β0 k →d N (0, Π), where T Π = B −1 (JS (β0 )) Σ JS (β0 ) B −1 ∈ R(d−1)×(d−1) . The asymptotic limiting distribution of the single index score estimator α̂n now follows by an application of the Delta method and we conclude that √    √ √ T n(α̂n − α0 ) = JS (β0 ) n(β̂n − β0 ) + op n(β̂n − β0 ) →d Nd 0, JS (β0 )Π (JS (β0 )) . Finally, the result of Theorem 4.1 follows by Lemma 4.1. This completes the proof. Acknowledgements The research of the third author was supported by the Research Foundation Flanders (FWO) [grant number 11W7315N]. Support from the IAP Research Network P7/06 of the Belgian State (Belgian Science Policy) is gratefully acknowledged. For the simulations we used the infrastructure of the VSC - Flemish Supercomputer Center, funded by the Hercules Foundation and the Flemish Government - department EWI. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 30 References [1] Balabdaoui, F., Durot, C. and Jankowski, H. (2016). Least squares estimation in the monotone single index model. arXiv preprint arXiv:1610.06026. [2] Balabdaoui, F., Groeneboom, P. and Hendrickx, K. (2017a). Score estimation in the monotone single index model: supplement. working paper. [3] Balabdaoui, F., Groeneboom, P. and Hendrickx, K. (2017b). Score estimation in the monotone single index model. working paper. [4] Barlow, R. E., Bartholomew, D. J., Bremner, J. M. and Brunk, H. D. (1972). Statistical inference under order restrictions. The theory and application of isotonic regression. John Wiley & Sons, London-New York-Sydney Wiley Series in Probability and Mathematical Statistics. MR0326887 (48 ##5229) [5] Cavanagh, C. and Sherman, R. P. (1998). Rank estimators for monotonic index models. J. Econometrics 84 351–381. MR1630210 [6] Cosslett, S. R. (1987). Efficiency bounds for distribution-free estimators of the binary choice and the censored regression models. Econometrica 55 559–585. MR890854 (88e:62087) [7] Cosslett, S. R. (2007). Efficient estimation of semiparametric models by smoothed maximum likelihood. Internat. Econom. Rev. 48 1245–1272. MR2375624 [8] Delecroix, M., Härdle, W. and Hristache, M. (2003). Efficient estimation in conditional singleindex regression. Journal of Multivariate Analysis 86 213–226. [9] Duan, N. and Li, K.-C. (1991). Slicing regression: a link-free regression method. The Annals of Statistics 505–530. [10] Groeneboom, P. and Hendrickx, K. (2017). Current status linear regression. To appear in Annals of Statistics, available at https://arxiv.org/abs/1601.00202. [11] Groeneboom, P. and Jongbloed, G. (2014). Nonparametric Estimation under Shape Constraints. Cambridge Univ. Press, Cambridge. [12] Han, A. K. (1987). Non-parametric analysis of a generalized regression model: the maximum rank correlation estimator. Journal of Econometrics 35 303–316. [13] Härdle, W., Hall, P. and Ichimura, H. (1993). Optimal smoothing in single-index models. Ann. Statist. 21 157–178. MR1212171 (94d:62134) [14] Härdle, W. and Stoker, T. M. (1989). Investigating smooth multiple regression by the method of average derivatives. Journal of the American statistical Association 84 986–995. [15] Hooke, R. and Jeeves, T. A. (1961). “Direct Search”Solution of Numerical and Statistical Problems. Journal of the ACM (JACM) 8 212–229. [16] Ichimura, H. (1993). Semiparametric least squares (SLS) and weighted SLS estimation of single-index models. Journal of Econometrics 58 71–120. [17] Klein, R. W. and Spady, R. H. (1993). An efficient semiparametric estimator for binary response models. Econometrica 61 387–421. MR1209737 (93k:62214) [18] Kuchibhotla, A. K. and Patra, R. K. (2016). Efficient Estimation in Single Index Models through Smoothing splines. available at https://arxiv.org/abs/1612.00068. [19] Sherman, R. P. (1993). The limiting distribution of the maximum rank correlation estimator. Econometrica 61 123–137. MR1201705 [20] Tanaka, H. (2008). Semiparametric least squares estimation of monotone single index models and its application to the iterative least squares estimation of binary choice models Technical Report. [21] Torczon, V. (1997). On the convergence of pattern search algorithms. SIAM J. Optim. 7 1–25. MR1430554 [22] van der Vaart, A. W. (1998). Asymptotic statistics. Cambridge Series in Statistical and Probabilistic Mathematics 3. Cambridge University Press, Cambridge. MR1652247 (2000c:62003) [23] van der Vaart, A. W. and Wellner, J. A. (1996). Weak convergence and empirical processes. Springer Series in Statistics. Springer-Verlag, New York. With applications to statistics. MR1385671 (97g:60035) [24] Xia, Y. and Härdle, W. (2006). Semi-parametric estimation of partially linear single-index models. Journal of Multivariate Analysis 97 1162–1184. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 31 Score estimation in the single index model: supplement We give the proofs of the remaining results given in the main manuscript that were not considered in Section 10 of [3] together with additional technical lemmas needed for proving our main results. Supplement A: Asymptotic normality of the efficient score estimator In this section we prove (iii) of Theorem 5.1 on the asymptotic normality of the efficient score estimator α̃n . The proofs of existence and consistency of α̃n , given in (i) and (ii) of Theorem 5.1 follow the same lines as the corresponding proofs for the simple score estimator α̂n given in Sections 10.2.1 and 10.2.1 and are omitted. Proof of asymptotic normality: Let τi denote the sequence of jump points of the monotone LSE ψ̂nα . We introduce the piecewise constant function ρ̄n,β defined for u ∈ [τi , τi+1 ) as  0 (τi ) if ψα (u) > ψ̂nα (τi ) for all u ∈ (τi , τi+1 ),  E[X|S(β)T X = τi ]ψα T 0 ρ̄n,β (u) = E[X|S(β) X = s]ψα (s) if ψα (s) = ψ̂nα (s) for some s ∈ (τi , τi+1 ),  0 E[X|S(β)T X = τi+1 ]ψα (τi+1 ) if ψα (u) < ψ̂nα (τi ) for all u ∈ (τi , τi+1 ). We can write, ξnh (β̃n ) Z n      o n  o 0 0 xψ̃nh,α S(β̃n )T x − E X|S(β̃n )T x ψα̃ S(β̃n )T x y − ψ̂nα̃n S(β̃n )T x dPn (x, y) n Z n      o n  o 0 T T T + JS (β̃n )T E X|S(β̃n )T x ψα̃ S( β̃ ) x − ρ̄ S( β̃ ) x y − ψ̂ S( β̃ ) x dPn (x, y) n n n α̃ n n n,β̃n n = JS (β̃n )T = J + JJ, (10.35) using, Z  n  o ρ̄n,β̃n S(β̃n )T x y − ψ̂nα̃n S(β̃n )T x dPn (x, y) = 0. The term JJ can be written as Z n     o  T T 0 S( β̃ ) x − ρ̄ S( β̃ ) x JJ = JS (β̃n )T E X|S(β̃n )T x ψα̃ n n n,β̃n n n  o · y − ψ̂nα̃n S(β̃n )T x d(Pn − P0 )(x, y) Z n      o 0 T T + JS (β̃n )T E X|S(β̃n )T x ψα̃ S( β̃ ) x − ρ̄ S( β̃ ) x n n n,β̃n n n  o · y − ψα̃n S(β̃n )T x dP0 (x, y) Z n    o   0 T T + JS (β̃n )T E X|S(β̃n )T x ψα̃ S( β̃ ) x − ρ̄ S( β̃ ) x n n n,β̃n n n    o · ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x dP0 (x, y) = JJa + JJb + JJc , (10.36) 0 0 We first note that by Assumption A10, the functions u 7→ ψα (u) := ψS(β) (u) are uniformly bounded and have a total variation that is uniformly bounded for all β ∈ C. This also implies, using Lemma 10.12, that the  0 functions u 7→ E Xi |S(β)T X = u ψα (u) have a bounded variation for all β ∈ C. Using the same arguments as those for term IIa defined in (10.25) in the proof of Theorem 4.1, it easily follows that, JJa = op (n−1/2 ). imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 32 0 We next consider the term JJb . By Lemma 10.14 we know that ψα stays away from zero for all S(β) in a neighborhood of S(β0 ). Using the same techniques as in [11], we can find a constant K > 0 such that for all i = 1, . . . , d and u ∈ Iα ,  0 (10.37) E Xi |S(β)T X = u ψα (u) − ρ̄ni,β (u) ≤ K ψα (u) − ψ̂nα (u) ,  0 where ρ̄ni,β denotes the ith component of ρn,β . This implies that the difference E Xi |S(β)T X = u ψα (u) − ρ̄ni,β (u) converges to zero for all u ∈ Iα . Using Lemma 10.9 and a Taylor expansion of β 7→ ψα S(β)T x we get,      ψα S(β)T x = ψ0 S(β0 )T x + (β − β0 )T JS (β0 )T x − E(X|S(β0 )T X = S(β0 )T x) ψ00 S(β0 )T x + o(β − β0 ), such that Z n     o  0 S(β̃n )T x − ρ̄n,β̃n S(β̃n )T x E X|S(β̃n )T x ψα̃ n n  o  · ψ0 S(β0 )T x − ψα̃n S(β̃n )T x dP0 (x, y)   = op β̃n − β0 . JJb = JS (β̃n )T For the therm JJc , we get by an application of the Cauchy-Schwarz inequality together with the uniform boundedness of JS , Proposition 3.2 and (10.37) that, !1/2 Z n      o2 T T 0 T T JJc ≤ JS (β̃n ) E X|S(β̃n ) x ψα̃n S(β̃n ) x − ρ̄n,β̃n S(β̃n ) x dP0 (x, y) · !1/2 Z n    o2 T T ψα̃n S(β̃n ) x − ψ̂nα̃n S(β̃n ) x dP0 (x, y) Z n    o2 . ψα̃n α̃Tn x − ψ̂nα̃n α̃Tn x dG(x) = Op (log n)2 n−2/3 = op (n−1/2 ). We conclude that (10.35) can be written as ξnh (β̃n ) Z n      o 0 T T 0 T = JS (β̃n ) xψ̃nh, α̃n S(β̃n ) x − E X|S(β̃n ) x ψα̃n S(β̃n ) x n  o · y − ψ̂nα̃n S(β̃n )T x dPn (x, y)   + op n−1/2 + (β̃n − β0 ) T Z n      o 0 T T 0 T xψ̃nh, S( β̃ ) x − E X|S( β̃ ) x ψ S( β̃ ) x n n n α̃n α̃n n  o · y − ψα̃n S(β̃n )T x dPn (x, y) Z n      o 0 T T 0 T + JS (β̃n )T xψ̃nh, α̃n S(β̃n ) x − E X|S(β̃n ) x ψα̃n S(β̃n ) x n    o · ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x d(Pn − P0 )(x, y) Z n      o 0 T T 0 T + JS (β̃n )T xψ̃nh, α̃n S(β̃n ) x − E X|S(β̃n ) x ψα̃n S(β̃n ) x n    o dP0 (x, y) · ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x   + op n−1/2 + (β̃n − β0 )   = Ja + Jb + Jc + op n−1/2 + (β̃n − β0 ) . (10.38) = JS (β̃n )T imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 33 We first consider the term A10, Lemma 10.12 and Lemma 10.15 we get that the functions  0Jb . By Assumption 0 u 7→ E X|S(β)T x = u ψα̃ (u) and u → 7 ψ̃ nh,α̃n (u) have a uniformly bounded total variation for all β ∈ C. n Using similar arguments as for the term Ib defined in (10.27) we get for A > 0 and ν > 0 that P (|Jb | ≥ An−1/2 ) ≤ ν, for n large enough and we conclude that Jb = op (n−1/2 ). For the term Jc we get, Z n   o  T 0 T Jc = JS (β̃n ) x − E X|S(β̃n )T x ψ̃nh, α̃n S(β̃n ) x n    o · ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x dP0 (x, y) Z n  o     T T 0 0 E X|S(β̃n )T x ψ̃nh, + JS (β̃n )T α̃n S(β̃n ) x − ψα̃n S(β̃n ) x n    o · ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x dP0 (x, y) Z n    o   0 T 0 T ψ̃nh, = JS (β̃n )T E X|S(β̃n )T x α̃n S(β̃n ) x − ψα̃n S(β̃n ) x n    o · ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x dP0 (x, y) Furthermore, let Hβ be the distribution function of the random variable S(β)T X and let E(X|u) denote the conditional expectation of X given S(β)T X = u, then Z n o n o 0 0 (u) E (X|u) ψ ψ̃nh, (u) − ψ (u) − ψ̂ (u) dHβ̃n (u) α̃ n α̃ α̃n α̃n n n  Z  Z n o 1 0 (u) E (X|u) ψ (u) − ψ̂ (u) dHβ̃n (u) = K ({u − v}/h) dψ̂nα̃n (v) − ψα̃ α̃ n α̃ n n n h  Z  Z o o n n 1 0 (u) − ψ̂ (u) dHβ̃n (u) = (v) dv E (X|u) ψ K ({u − v}/h) ψ̂ (v) − ψ α̃ n α̃ α̃ n α̃ n n n n h2  Z  Z n o 1 0 0 + K ({u − v}/h) ψα̃ (v) dv − ψ (u) E (X|u) ψ (u) − ψ̂ (u) dHβ̃n (u). α̃ n α̃ α̃ n n n n h   The last term on the right hand side is Op n−2/7−1/3 = op n−1/2 . This follows by an application of the Cauchy-Schwarz inequality since )1/2 (Z  Z 2   1 0 0 K ({u − v}/h) ψα̃n (v) dv − ψα̃n (u) dHβ̃n (u) = Op n−2/7 , h and Z  1/2 2   ψα̃n (u) − ψ̂nα̃n (u) dHβ̃n (u) = Op n−1/3 .   The first term on the right hand side is Op n1/7−2/3 = op n−1/2 using that for small h Z  Z n o  n o 1 0 K ({u − v}/h) ψ̂ (v) − ψ (v) dv E (X|u) ψα̃n (u) − ψ̂nα̃n (u) dHβ̃n (u) nα̃n α̃n 2 h Z 2 1  . ψα̃n (u) − ψ̂nα̃n (u) dHβ̃n (u). h imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 34 We conclude that (10.38) can be written as, Z n  o     T T T 0 0 T xψ̃nh, ξnh (β̃n ) = JS (β̃n ) α̃n S(β̃n ) x − E X|S(β̃n ) x ψα̃n S(β̃n ) x n  o   · y − ψα̃n S(β̃n )T x dPn (x, y) + op n−1/2 + (β̃n − β0 ) Z n    o n  o T 0 T 0 T = JS (β̃n ) x ψ̃nh, y − ψα̃n S(β̃n )T x d(Pn − P0 )(x, y) α̃n S(β̃n ) x − ψα̃n S(β̃n ) x Z n  o n  o   T T 0 0 y − ψα̃n S(β̃n )T x dP0 (x, y) + JS (β̃n )T x ψ̃nh, α̃n S(β̃n ) x − ψα̃n S(β̃n ) x Z n   o n  o 0 T T x − E X|S(β̃n )T x ψα̃ S( β̃ ) + JS (β̃n )T x y − ψ S( β̃ ) x d(Pn − P0 )(x, y) n α̃ n n n Z n  n  o  o 0 S(β̃n )T x y − ψα̃n S(β̃n )T x dP0 (x, y) x − E X|S(β̃n )T x ψα̃ + JS (β̃n )T n   + op n−1/2 + (β̃n − β0 )   = JJJa + JJJb + JJJc + JJJd + op n−1/2 + (β̃n − β0 ) . (10.39) 0 0 and ψ̃nh,α We consider JJJa first and note that by Assumption A10 and Lemma 10.15, the functions ψα have a uniformly bounded total variation. By an application of Lemma 10.13 we can write the difference 0 0 ψ̃nh,α − ψα as the difference of two monotone functions, say f1 , f2 ∈ MRC1 for some constant C1 > 0. This implies that the class of functions ( )    0 T 0 T T F1 = f (x, y) := {ψ̃nh,α S(β) x − ψα S(β) x }{y − ψα S(β) x }, (x, y, β) ∈ X × R × C , is contained in the class HRC1 v where v  h−1 log nn−1/3 (See the proof of Lemma 10.15). By Lemma 10.5 and the fact that the order bracketing entropy of a class does not get altered after multiplication with the fixed and bounded function x 7→ xi we get that the class of functions involved with the term JJJa , say Fa , satisfies  1 HB , Fa , k · kB,P0 .  and kf kB,P0 . v Using again an application of Markov’s inequality, together with Lemma 3.4.3 of [23] we conclude that for A>0 P (|JJJa | > An−1/2 ) . v 1/2 = h−1/2 (log n)1/2 n−1/6 , which can be made arbitrarily small for n large enough and h  n−1/7 . We conclude that JJJa = op (n−1/2 ). Using similar arguments as for the term JJb defined in (10.36) we also get,   JJJb = op β̃n − β0 . The result of Theorem 5.1 follows by noting that, using the same techniques as for the term Ia in (10.30), we get Z     T JJJc = (JS (β0 )) x − E X|S(β0 )T x ψ00 S(β0 )T x y − ψ0 S(β0 )T x d(Pn − P0 )(x, y) + op (n−1/2 ) + op (β̂n − β0 ), imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model  and that by a Taylor expansion of β 7→ ψα S(β)T x we get, ( Z 2     T JJJd = − (JS (β0 )) ψ00 S(β0 )T x · x − E X|S(β0 )T x x − E X|S(β0 )T x 35 T ! dP0 (x, y) ) × JS (β0 ) (β̃n − β0 ) + op (β̃n − β0 ). The rest of the proof follows the same line as the proof of asymptotic normality of the simple score estimator defined in Theorem 4.1 and is omitted. Supplement B: Entropy results Lemma 10.2. Fix  > 0, and consider F1 a class of functions defined on X × R bounded by some constant A > 0 and equipped by the L2 norm k · kP0 with respect to P0 . Also, let F2 be another class of continuous functions defined on a bounded set C ⊂ Rd−1 such that F2 is equipped by the supremum norm k · k∞ , and bounded by some constant B > 0. Moreover assume that HB (, F1 , k · kP0 ) < ∞ and HB (, F2 , k · k∞ ) < ∞. Consider n o F = F1 F2 = f (x) = fβ (x, y) = f1 (x, y)f2 (β) : (x, y, β) ∈ X × R × C . Then there exists some constant B > 0 such that HB (, F, k · kP0 ) ≤ HB (B, F1 , k · kP0 ) + HB (B, F2 , k · k∞ ). Proof. Let f = f1 f2 ∈ F for some pair (f1 , f2 ) ∈ F1 × F2 . For  > 0 consider the (f1L , f1U ) and (f2L , f2U ) -brackets with respect to k · kP0 for f1 and f2 . Note that since F1 and F2 are bounded by M = max(A, B) we can always assume that −M ≤ fiL ≤ fiU ≤ M for i ∈ {1, 2}. As we deal with a product of two functions, construction of a bracket for f requires considering different sign cases for a given pair (x, β): 1. 2. 3. 4. 5. 6. 7. 8. 9. 0 ≤ f1L (x) and 0 ≤ f2L (β), 0 ≤ f1L (x), f2L (β) < 0 and f2U (β) ≥ 0, f1L (x) ≤ 0, f1U (x) ≥ 0 and 0 ≤ f2L (β), f U (x) ≤ 0, f L (β) ≥ 0, f L (x) ≥ 0, f U (β) ≥ 0, f1L (x) ≤ 0, f U (x) ≥ 0, f2L (β) ≤ 0 and f2U (β) ≥ 0, f1L (x) ≤ 0, f U (x) ≥ 0 and f2U (β) ≤ 0, f U (x) ≤ 0, f L (β) ≤ 0 and f U (β) ≥ 0, f1U (x) ≤ 0 and f2U (β) ≤ 0. We can assume without loss of generality that each one these cases occur for all x ∈ X and β ∈ C since the general case can be handled by considering the 9 different subsets of X × C. In the proof, we will restrict ourselves to making the calculations explicit for cases 1 and 2 since the remaining cases can be handled very similarly. Then, f1L f2L ≤ f ≤ f1U f2U . Also, we have that     f1U f2U − f1L f2L = f1U − f1L f2U + f1L f2U − f2L . Recall that M = max(A, B). Then, it follows that Z  2 Z  2  f1U f2U − f1L f2L dP0 ≤ 2M f1U − f1L dP0 (x) + kf2U − f2L k2∞ X X ≤ 4M 2 . imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 36 This in turn implies that HB (, F, k · kP0 ) ≤ HB (C, F1 , k · kP0 ) + HB (C, F2 , k · k∞ ) with C = (2M )−1 . Now we consider case 2. It is not difficult to show that f2L f1U ≤ f ≤ f1U f2U . Hence, Z  f1U f2U − f2L f1U 2 dP0 ≤ A2 kf2U − f2L k2∞ ≤ A2 2 X and we can take C = A−1 . Lemma 10.3. Let F be a class of functions satisfying HB (, F, k · kP0 ) < ∞ for every  ∈ (0, 0 ) for some given 0 > 0. If D = F − F the class of all differences of elements of F, then HB (, D, k · kP0 ) ≤ 2HB (/2, F, k · kP0 ). Proof. Let  ∈ (0, 0 ) and d = f2 − f1 denote an element in D with (f1 , f2 ) ∈ F 2 . Also, let (f1L , f1U ) and (f2L , f2U ) -brackets for f1 and f2 . Define dL = f2L − f1U and dU = f2U − f1L . It is clear that (dL , dU ) is a bracket for d. Furthermore, we have that Z 2 dU (x, y) − dL (x, y) dP0 (x, y) X Z  Z 2 2 ≤2 f1U (x, y) − f1L (x, y) dP0 (x, y) + f2U (x, y) − f2L (x, y) dP0 (x, y) X X ≤ 42 . Thus,    2 exp HB (2, D, k · kP0 ) ≤ exp HB (, F, k · kP0 ) , which is equivalent to the statement of the lemma. Consider the class GRK defined as n o GRK = g : g(x) = gα (x) = ψ(αT x), x ∈ X , (ψ, α) ∈ MRK × B(α0 , δ0 ) . (10.40) where MRK is the same class defined in (10.7). Lemma 10.4. There exists A > 0 such that for  ∈ (0, K) we have that HB (, GRK , k · kP0 ) ≤ AK .  Proof. See the proof of Lemma 4.9 in [1]. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 37 Lemma 10.5. For some constants C > 0 and δ > 0 consider the class of functions n o 2 DRCδ = d : d = f1,α − f2,α , (f1,α , f2,α ) ∈ GRC , kd(αT ·)kP0 ≤ δ for all α ∈ B(α0 , δ0 ) . Let HRCv be a class of functions such that n o 2 HRCv = h : h(x, y) = yd1 (αT x) − d2 (αT x), (x, y, α) ∈ X × R × B(α0 , δ0 ), (d1 , d2 ) ∈ DRCv (10.41) where C ≥ K0 ∨ 1. Then, for all  ∈ (0, C) we have that     e k · kB,P ≤ HB C̃ −1 , HRCv , k · kP ≤ C̃C  1 , HB , H, 0 0   and that kh̃kB,P0 . D̃−1 v, where 0  A = A 2(a0 M0 + 1) −1/2 1 , D̃ = 16M0 C and C̃ = 8M0  −1 1 2a0 + e(2M0 ) 2 1/2 1 , C (10.42) e def with a0 , M0 the same constants from Assumption A6, A the same constant in Lemma 10.4, and H = HRCv D̃−1 . U L U T T Proof. Consider (dL 1 , d1 ) and (d2 , d2 ) to be -brackets of the functions x 7→ d1 (α x) and x 7→ d2 (α x) and some α ∈ B(α0 , δ0 ). It follows from Lemma 4.9 of [1] and Lemma 10.3 that there exists some constant A > 0 such that   AC HB , DRC , k · kP0 ≤ .  Define now ( U ydL 1 (x) − d2 (x), if y ≥ 0 hL (x, y) = U ydU 1 (x) − d2 (x), if y < 0 and ( L ydU 1 (x) − d2 (x), if y ≥ 0 h (x, y) = L ydL 1 (x) − d2 (x), if y < 0. U Note first that (hL , hU ) is a bracket for h(x, y) = yd1 (αT x) − d2 (αT x). Next we compute the size of this bracket with respect to k · kP0 . We have that Z Z   2 nZ  2 2 o L L hU (x, y) − hL (x, y) dP0 (x, y) ≤ 2 y 2 dU (x) − d (x) dP (x, y) + dU 0 1 1 2 (x) − d2 x) dG(x) X ×R X ×R Z  Z  X n 2 2 o U L L = 2 2a0 d1 (x) − d1 (x) dG(x) + dU (x) − d x) dG(x) 2 2 X X  2 ≤ 2 2a0 + 1  , where a0 is the same constant of Assumption A6. It follows that   ÃC HB , H, k · kP0 ≤ ,  imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 38  −1/2 with à = A 2(2a0 + 1) and A is the same constant of Lemma 10.4. Let now D > 0 be some constant to be determined later. For a given h ∈ HRK 2 v , we consider h̃ = D−1 h which admits [D−1 hL , D−1 hU ] as bracket. We will compute the size of this bracket with respect to the Bernstein norm. By definition of the latter we can write for any function h such that hk is P0 integrable that khk2B,P0 = 2 ∞ X 1 k |h| dP0 . k! k=2 Thus, using this and convexity of the function x 7→ |x|k for all k ≥ 2 it follows that Z ∞ X k  1 L U L y dU kD−1 hU − D−1 hL k2B,P0 = 2 1 (x) − d1 (x) + d2 (x) − d2 (x) dP0 (x, y) k k!D X ×R k=2   Z Z ∞ X 2k−1 k k k U L U L ≤2 |y| d (x) − d (x) dP (x, y) + d (x) − d (x) dP (x, y) . 0 0 1 1 2 2 k!Dk X ×R X ×R k=2 2 U Using Assumption A7 and the fact that |dL i | ≤ K and |di | ≤ 2C for i ∈ {1, 2} (an assumption that one can always make in constructing brackets for a bounded class) we can write  k  Z ∞ X 2 1 2 L a0 M0k−2 k!(4C)k−2 dU kD−1 hU − D−1 hL k2B,P0 ≤ 1 (x) − d1 (x) dP0 (x, y) k! D X k=2  Z 2 L +(4C)k−2 dU (x) − d (x) dP (x, y) 0 1 1 X  k−2  ∞ X 1 8C = a0 + 2 D k! D k=2 k=2 k  k   2  X ∞ ∞  X 1 8C 8M0 C 1 2 a0 + 2 , using k! ≥ 2(k − 2)!. ≤ D D 2 k! D  2 D 2  k−2 ∞  X 8M0 C k=0 k=0 Taking D = D̃ = 16M0 C yields kD̃−1 hU − D̃−1 hL k2B,P0 ≤  2 D̃ 2   −1 1 2a0 + e(2M0 ) 2 , 2 which in turn implies that kD̃−1 hU − D̃−1 hL kB,P0 ≤ 1 8M0  1/2 −1 1 1 . 2a0 + e(2M0 ) 2 C e with D̃ defined as above. This completes the proof of the first claim about the entropy bound of the class H e Now for a given element h̃ ∈ H we calculate Z ∞ X 1 1 k 2 kh̃kB,P0 = 2 yd1 (αT x) − d2 (αT x) dP0 (x, y) k k! D̃ X ×R k=2 Z ∞ n o k−1 X2 1 k k k ≤ 2 y d1 (αT x) + d2 (αT x) dP0 (x, y) D̃k k! X ×R k=2   Z Z ∞ X 2k−1 1 2 2 ≤ 2 (2C)k−2 a0 M0k−2 k! d1 (αT x) dP0 (x, y) + d2 (αT x) dP0 (x, y) D̃k k! X ×R X ×R k=2 k−2 X  k−2 )  2 ( X ∞  ∞ 8M0 C 1 8C 2 ≤ a0 + v 2 using the definition of the class k! D̃ D̃ D̃ k=2 k=2  2   −1 2 1 ≤ 2a0 + e(2M0 ) v 2 using arguments as above, 2 D̃ imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 39 implying that  1/2 −1 1 1 kh̃kB,P0 ≤ 2 2a0 + e(2M0 ) v . D̃−1 v, 2 D̃ as claimed. Recall that X is the support of the covariates Xi , i = 1, . . . , n. Let us denote by Xj , j = 1, . . . , d the set of the j-th projection of x ∈ X . Also, consider some function s that d − 1 times continuously differentiable on a convex and bounded set C ∈ Rd−1 with a nonempty interior such that there exists M > 0 satisfying max sup |Dk s(β)| ≤ M (10.43) k.≤d−1 β∈C where k = (k1 , . . . , kd ) with kj an integer ∈ {0, . . . , d − 1}, k. = Dk ≡ Pd−1 i=1 ki and ∂ k. s(β) . ∂βk1 . . . ∂βkd Consider now the class n o QjRC = qj (x, y) = s(β)xj (y − ψ(αT x)), (α, β, ψ) ∈ B(α0 , δ0 ) × C × MRC and (xj , y) ∈ Xj × ∈ R (10.44) . Define n o ejRC = q̃j : q̃j = qj D̃−1 , qj ∈ QRC , Q where D̃ > 0 is some appropriate constant. 1/2 Lemma 10.6. Let  ∈ (0, 1) and C ≥ max(1, 2M0 , M e−1/4 2−1/2 R−1 , 2a0 e−1/2 ). Then, there exist some constant B1 > 0 and B2 depending on a0 , M0 , and R such that   ejRC , k · kB,P ≤ B1 C , kq̃j kB,P ≤ B2 , HB , Q 0 0  if D̃ = 8M RC where a0 and M0 are the same positive constants in Assumption A6, and M is from (10.43). Proof. Fix j ∈ {1, . . . , d}. The proof of this lemma uses similar techniques as in showing Lemma 10.5. Let (g L , g U ) be -brackets for the class GRC . Using the result of Lemma 10.4 we know that there are at most N ≤ exp(AC/) such brackets covering GRC for some constant A > 0. Define       xj (y − g L (x)), xj (y − g U (x)) , if xj ≥ 0   k L (x, y), k U (x, y) = (10.45)  xj (y − g U (x)), xj (y − g L (x)) , if xj < 0 . Then, the collection of all possible pairs (q L , q U ) form brackets for the class of functions n o KjRC ≡ kj (x, y) = xj (y − ψ(αT x)), (α, ψ) ∈ B(α0 , δ0 ) × MRC and (xj , x, y) ∈ Xj × X × R . Furthermore we have that U kk − k L k2P0 Z 2 x2j g U (x) − g L (x) dG(x) X Z 2 g U (x) − g L (x) dG(x) ≤ R2 2 . ≤ kxk22 = X imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 40 This implies that   ARC HB , KjRC , k · kP0 ≤ ,  where A is the same constant of Lemma 10.4. Furthermore, the assumption in (10.43) implies that the d−1 function s belongs to CM̃ as defined in Section 2.7 in [23], with M̃ = 2M . Using now Theorem 2.7.1 of [23] it follows that there exists some constant B > 0 such that  d/(d−1)   B 1 d−1 log N , CM̃ ≤ . , k · k∞ ≤ B   This also implies that     2B d−1 d−1 HB , CM̃ , k · k∞ = log N /2, CM̃ . , k · k∞ ≤   d−1 d−1 Indeed, for an arbitrary s ∈ CM̃ there exists si , i ∈ {1, . . . , N }, with N = N /2, CM̃ , k · k∞ , such that d−1 ks − si k∞ ≤ /2. The claim follows from noting that (si − /2, si + /2) is an -bracket for CM̃ with respect to k · k∞ . Using Lemma 10.2 it follows that there exists some constant L > 0 such that     2LC 1 C + , (10.46) ≤ HB , QjRC , k · kP0 ≤ L    using that C ≥ 1, d − 1 ≥ 1 and  ∈ (0, 1). Consider now a constant D > 0, and (q L , q U ) and -bracket. From the proof of Lemma 10.2 we know that we can restrict attention to the case for example to case 1 assumed to occur for all (x, β) ∈ X × C. In such that we have q L = sL k L and q U = sU k U where (sL , sU ) is an -bracket 1 for CM̃ equipped with k · k∞ , where the expression of (k L , k U ) is given in (10.45). We can now write kD−1 q U − D−1 q L k2B,P0 = ≤ Z ∞ X 1 1 k sU k U − sL k L dP0 k! Dk X ×R k=2   Z ∞ X   2k 1 L U L k U U L k dP0 s k −k | + k s −s k! Dk X ×R 2 k=2 with Z sU k U − k L X ×R  k dP0 ≤ M k (2RC)k−2 Z 2 k U − k L dP0 = M 2 (2M CR)k−2 2 X ×R where we used the fact that |s| ≤ M by assumption of the lemma (implying that we can constructs brackets (sL , sU ) satisfying the same property), and k U − k U = xj (g U − g L ) ≤ 2RC. Also, if we assume without loss of generality that xj ≥ 0 is satisfied for all x ∈ X we have that Z Z  L U L k k−2 k s −s dP0 ≤ (2M ) xj (y − g L (x))|k dP0 (x, y) × 2 X ×R X ×R Z n o k k−2 k k−1 ≤ (2M ) R 2 |y|k + g L (x) dP0 (x, y) × 2 X ×R   ≤ (2M )k−2 Rk 2k−1 a0 M0k−2 k! + C k 2 . Putting these inequalities together and after some algebra we get kD−1 q U − D−1 q L k2B,P0 !  2  2  2 1 2M 2RC 2R 1 4M CR/D 8M CR/D ≤ e + e + 2a0 ) 2 . 2 D D D 1 − 8M M0 R/D imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 41 Now let us choose D̃ = D ≥ max(16M M0 R, 8M RC). In particular, we can assume that C is large enough so that max(16M M0 R, 8M RC) = 8M RC = D̃ (or equivalently C ≥ 2M0 ). Then, 4M CR/D̃ = 1/2, 8M CR/D̃ = 1/4, and 8M M0 R/D̃ = M0 /C ≤ 1/2. Therefore,  2  2  2 ! 2RC 2R 1 2M −1 U −1 L 2 1/2 kD̃ q − D̃ q kB,P0 ≤ e + e + 4a0 2 2 D̃ D̃ D̃  1  2 = 2M 2 e1/2 + 4R2 e C 2 + 16a0 R2 D̃2 ÃC 2 2 à  = 2 , ≤ 2 64M 2 R2 D̃ if C is large enough, where à = 2M 2 e1/2 + 4R2 e + 16a0 R2 . It follows that we can find some constant L̃ > 0 such that kD̃−1 q U − D̃−1 q L kB,P0 ≤ L̃. This in turn implies that   e jRC , k · kB,P ≤ HB , QjRC , k · kP . 2M C , HB L̃, Q 0 0  using (10.46). Hence, we can find a constant B1 > 0 such that  e jRC , k · kB,P ≤ B1 C . HB , Q 0  Now we turn to computing an upper bound for kq̃j kB,P0 . We have kq̃j k2B,P0 = ≤ Z ∞ X k 1 −k D |s(β)|k xj y − ψ(αT x) dP0 (x, y) k! X ×R k=2 Z ∞ n o X 1 k k y + ψ(αT x) dP0 (x, y) 2k D−k (RM )k k! X ×R 2 k=2 ∞ X   1 k −k 2 D (RM )k a0 M0k−2 k! + C k k! k=2  2 ∞  k−2  2 X  k−2 ∞ 1 2M R X 2RM M0 1 2M RC 2RM C ≤ a0 + D D 2 D (k − 2)! D k=2 k=2 2 X        ∞ k 2 ∞ k 1 1 1 1 X 1 1 ≤ a0 + 2C 4 2 2 k! 2 k=0 k=0  2  2 1 3 1 1 ≤ a0 + e1/2 if D = 4M RC and C ≥ max(1, 2M0 ). 2C 4 2 2 ≤ The proof of the lemma is complete if we write B2 = (3a0 /16 + e1/2 /8)1/2 . In the next lemma, we consider a given a class of functions F which admits a bounded bracketing entropy with respect to k · kP0 for  ∈ (0, 1]. Suppose also that there exists D > 0 such that kf k∞ ≤ D and δ > 0 such that kf kP0 ≤ δ for all f ∈ F. Then we can derive an upper bound for the bracketing entropy for the class n   o Fe = f˜ : f˜(x, y) = (4M0 D)−1 f (x) y − λψ0 (αT0 x) , (x, y) ∈ X × R and f ∈ F (10.47) imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 42 with respect to the Bernstein norm. Here, M0 is the same constant from Assumption A6 and D̃ is a positive constant that will be determined below. Lemma 10.7. Let F be a class of functions satisfying the conditions above. Then, e k · kB,P ) ≤ HB (D̃−1 , F, k · kP ), and kf˜kB,P ≤ D̃δ HB (, F, 0 0 0 where  D̃ = λ2 K02 λK0 (2M0 )−1 a0 + e 2 2M0 8M02 1/2 D−1 , (10.48) and a0 , M0 are the same constants from Assumption A6. Proof. Let (L, U ) be an -bracket for F with respect to k · kP0 . Consider the class n   o F 0 = f 0 : f 0 (x, y) = f (x) y − λψ0 (αT0 x) , (x, y) ∈ X × R and f ∈ F . Then for f 0 ∈ F 0 we have L(x)(y − λψ0 (αT0 x)) ≤ f 0 (x, y) ≤ U (x)(y − λψ0 (αT0 x)), if y − λψ0 (αT0 x) ≥ 0 or U (x)(y − λψ0 (αT0 x)) ≤ f 0 (x, y) ≤ L(x)(y − λψ0 (αT0 x)), if y − λψ0 (αT0 x) < 0 . Let (L0 , U 0 ) denote the new bracket. Using the definition of the Bernstein norm, convexity of x 7→ xk , k ≥ 2 and kψ0 k∞ ≤ K0 we have that 2 (U 0 − L0 )(4M0 D)−1 B,P0 Z ∞ X (4M0 D)−k =2 (U (x) − L(x))k |y − λψ0 (αT0 x)|k dP0 (x, y) k! X ×R k=2 ∞   −k Z X (4M0 D) ≤2 (U (x) − L(x))k 2k−1 |y|k + λk |ψ0 (αT0 x)|k dP0 (x, y) k! X ×R k=2 Z ∞ X  1 (U (x) − L(x))k |y|k + λk K0k dP0 (x, y) ≤ k k k 2 D M0 k! X ×R k=2 Z ∞ X 1 ≤ (U (x) − L(x))k (a0 k!M0k−2 + λk K0k )dP0 (x, y) k D k M k k! 2 X ×R 0 k=2 k−2 Z ∞ ∞  X 1 Z a0 λ2 K02 X λK0 1 2 ≤ (U (x) − L(x)) g(x)dx + (U (x) − L(x))2 g(x)dx 2 2 2 k−2 2 4M0 D 2 4D M0 2M0 k! X ×R X ×R k=2 k=2  k−2 ∞ 2 2 X a0 λ K0 1 λK0 ≤ 2 + 2 2M02 D2 8D2 M02 (k − 2)! 2M0 k=2   2 2 a0 λ K0 λK0 (2M0 )−1 2 + e  = D̃2 2 . ≤ 2M02 D2 8D2 M02 This implies that     e k · kB,P ≤ HB , F, k · kP , HB D̃, F, 0 0 or equivalently     HB , F 0 , k · kB,P0 ≤ HB D̃−1 , F, k · kP0 . imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 43 Using similar calculations we can write kf˜k2B,P = ≤ ≤ 2 ∞ X 1 1 k (4M0 D) k! Z 1 1 (2M0 )k k! Z k=2 ∞ X 1 D2 k=2 a0 4M02 D2 ∞ X k=2 |f (x)|k |y − λψ0 (αT0 x)|k dP( x, y) X ×R 1 2k−2 X ×R f (x)2 (a0 k!M0k−2 + λk K0k )g(x)dx k−2 ∞  λ2 K02 X λK0 1 + 2 2 8D M0 2M0 (k − 2)! k=2 !Z f (x)2 g(x)dx X ×R ≤ D̃2 δ 2 , which completes the proof. In the next corollary, we consider the class n o F = x 7→ fα (x) = Ei,α0 (αT0 x) − Ei,α (αT x), x ∈ X , α ∈ B(α0 , δ) ,  where Ei,α (u) = E Xi |αT X = u for i ∈ {1, . . . , d} and δ ∈ (0, δ0 ). Using the same arguments in the proof of Lemma 10.11 with f (x) = xi it follows that for all x ∈ X and α, α0 ∈ B(α0 , δ) |fα0 (x) − fα (x)| ≤ M kα0 − αk, for the same constant M of that lemma. Now, we can apply Theorem 2.7.11 of [23] to conclude that   NB 2, F, k · kP0 ≤ N , B(α0 , δ), k · k ,  where N , B(α0 , δ), k · k is the -covering number for B(α0 , δ) with respect to the norm k · k which is of order (δ/)d for  ∈ (0, δ). Hence, using the inequality log(x) ≤ x for x > 0 we can find a constant M 0 > 0 depending on d such that  M 0δ HB , F, k · kP0 ≤ .  Furthermore, there exists M̃ > 0 such that kf k∞ ≤ M̃ δ and kf kP0 ≤ M̃ δ. Lemma 10.8. Let F be the class of functions as above and consider the related class n   o F 0 = f 0 : f 0 (x, y) = f (x) y − λψ0 (αT0 x) , (x, y) ∈ X × R, f ∈ F . (10.49) Then, E[kGn kF 0 ] . δ. Proof. Note that for any function f 0 ∈ F 0 and constant C > 0 we have that Gn (f 0 C −1 ) = C −1 Gn f 0 implying that kGn kF 0 = 4M0 M̃ δkGn kFe , where n o Fe = f˜ : f˜(x, y) = (4M0 M̃ δ)−1 f 0 (x, y), f 0 ∈ F 0 . Note also that the constant D̃ in Lemma 10.7 is given by D̃  δ −1 , where D̃ depends on M̃ , a0 , M0 and K0 . Also, using the entropy calculations along with Lemma 10.7 we can show easily that e k · kB,P ) . 1 , HB (, F, 0  imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 44 and that kf˜kB,P0 . 1. Using Lemma 3.4.3 of [23] it follows that there exists some constant B > 0 such that   Jn E[kGn kFe ] . Jn 1 + √ 2 , nB RBp with Jn = 0 1 + B/d. Hence, E[kGn kFe ] . 1 and E[kGn kF 0 ] . δ as claimed. Supplement C: Auxiliary results Proof of Lemma 4.1. We have: n o−1 T T T T (JS (β0 )) AJS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) AJS (β0 ) = (JS (β0 )) AJS (β0 ). In the parametrization that we consider, the columns of JS (β0 ) are orthogonal to α0 . We can therefore extend the matrix JS (β0 ) with a last column α0 to a square nonsingular matrix J¯S (β0 ). This leads to the equality n o−1 T T T T J¯S (β0 ) AJS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) AJ¯S (β0 ) = J¯S (β0 ) AJ¯S (β0 ). Multiplying on the left by  T −1 J¯S (β0 ) and on the right by J¯S (β0 )−1 , we get: n o−1 T T (JS (β0 )) A = A. AJS (β0 ) (JS (β0 )) AJS (β0 ) (10.50) n o−1 T T (JS (β0 )) is a generalized inverse of A. This shows that JS (β0 ) (JS (β0 )) AJS (β0 ) To complete the proof and show that it is indeed the Moore-Penrose inverse of A, we first note that n o−1 n o−1 T T T T JS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) n o−1 T T = JS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) . (10.51) Furthermore,  T n o−1 T T AJS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) n o−1 T T = JS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) AT n o−1 T T = JS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) A, where the last equality holds since A is symmetric, being a covariance matrix. We have to show that o−1 n T T JS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) A n o−1 T T = AJS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) . (10.52) Multiplying on the left by (JS (β0 ))T and on the right by JS (β0 ), we get: n o−1 T T (JS (β0 ))T JS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) AJS (β0 ) = (JS (β0 ))T JS (β0 ) n o−1 T T = (JS (β0 ))T AJS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) JS (β0 ), imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 45 and (10.52) follows by the orthogonality relation of the columns of JS (β0 ) with α0 in the same way as before, replacing the matrix JS (β0 ) by J¯S (β0 ) in the outer factors of the equality relation. In a similar way we obtain:  T n o−1 T T JS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) A n o−1 T T = JS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) A. (10.53) n o−1 T T Since the matrix JS (β0 ) (JS (β0 )) AJS (β0 ) (JS (β0 )) satisfies properties (10.50), (10.51),(10.52) and (10.53), the matrix satisfies the four properties which define the Moore-Penrose pseudo-inverse matrix of A. This completes the proof of Lemma 4.1. Remark 10.1. The same proof holds for showing that the Moore-Penrose inverse à is given by n o−1 T T JS (β0 ) (JS (β0 )) ÃJS (β0 ) (JS (β0 )) . Lemma 10.9 (Derivative α 7→ ψα (αT x)). ∂ ψα (αT x) ∂αj α=α0  = xj − E(Xj |αT X = αT0 x) ψ00 (αT0 x), and ∂ ψα (αT x) ∂βj where JS (β0 )T  j ∂ ψS(β) (S(β)T x) ∂βj β=β0    T = JS (β0 ) j x − E(X|S(β)T X = S(β)T x) ψ00 S(β)T x , = α=α0 denotes the jth row of JS (β0 )T . Proof. We assume without loss of generality that the first component α1 of α is not equal to zero. Denote the conditional density of (X2 , . . . , Xd )T given αT X = u by hα (·|u) Using the change of variables t1 = αT x, tj = xj for j = 1, . . . , d, the function ψα can be written as ψα (αT x) = E[ψ0 (αT0 X)|αT X = αT x]   Z d d Y X α 01 T T   dx̃j , = ψ0 α0j x̃j hα (x̃2 , . . . , x̃d |α x) (α x − α2 x̃2 − . . . − αd x̃d ) + α1 j=2 j=2 with partial derivatives w.r.t. αj for j = 2, . . . , d given by, ∂ ∂ ψα (αT x) = E[ψ0 (αT0 X)|αT X = αT x] ∂αj ∂αj   Z d d X Y α01 0  α01 T T  = (xj − x̃j )ψ0 (α x − α2 x̃2 − . . . − αd x̃d ) + α0j x̃j hα (x̃2 , . . . , x̃d |α x) dx̃j α1 α1 j=2 j=2   Z d d X Y α01 T ∂ + ψ0  (α x − α2 x̃2 − . . . − αd x̃d ) + α0j x̃j  hα (x̃2 , . . . , x̃d |αT x) dx̃j , α1 ∂αj j=2 j=2 which is at α = α0 equal to ∂ ψα (αT x) ∂aj Z = α=α0 d Y  (xj − x̃j )ψ0T αT0 x hα0 (x̃2 , . . . , x̃d |αT0 x) dx̃j j=2 = ψ00 (αT0 x)  xj − E(Xj |αT0 X = αT0 x) . imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 46 For the partial derivatives w.r.t. α1 we have, ∂ ψα (αT x) ∂α1    Z  d X α α01 α01 T 01 = x1 − 2 (α x − α2 x̃2 − . . . − αd x̃d ) ψ00  (αT x − α2 x̃2 − . . . − αd x̃d ) + α0j x̃j  α1 α1 α1 j=2 hα (x̃2 , . . . , x̃d |αT x) d Y dx̃j j=2  d d T X Y ∂ α x − α x̃ − . . . − α x̃ 2 2 d d + h(x̃2 , . . . , x̃d |αT x) (α0j − αj )x̃j  dx̃j , ψ0 αT x + (α01 − α1 ) α1 ∂α1 j=2 j=2  Z + and, ∂ ψα (αT x) ∂a1 α=α0  = ψ00 (αT0 x) x1 − E(X1 |αT0 X = αT0 x) . This proves the first result of Lemma 10.9. The proof for the second results follows similarly and is omitted. Lemma 10.10. Let φ̄ be defined by Z Z   φ̄(α) = x y − ψα (αT x) dP0 (x, y) = x ψ0 (αT0 x) − ψα (αT x) dG(x), (10.54) then we have for each α ∈ B(α0 , δ0 ),    φ̄(α) = E Cov X, ψ0 (αT X + (α0 − α)T X)|αT X . Moreover, αT φ̄(α) = 0, and,    (α0 − α)T φ̄(α) = E Cov (α0 − α)T X, ψ0 (αT X + (α0 − α)T X)|αT X ≥ 0, and α0 is the only value such that the above equation holds uniform in α ∈ B(α0 , δ0 ). Proof. We have, Z φ̄(α) =  x y − ψα (αT x) dP0 (x, y) = Z  x ψ0 (αT0 x) − ψα (αT x) dG(x) Z    x ψ0 (αT0 x) − E ψ0 (αT0 X)|αT X = αT x dG(x)    = E Cov X, ψ0 (αT0 X)|αT X , = (10.55) and α T Z       x ψ0 (αT0 x) − E ψ0 (αT0 X)|αT X = αT x dG(x) = E Cov αT X, ψ0 (αT0 X)|αT X = 0. We next note that,    (α0 − α)T φ̄(α) = E Cov (α0 − α)T X, ψ0 (αT0 X)|αT X    = E Cov (α0 − α)T X, ψ0 (αT X + (α0 − α)T X)|αT X , imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 47 which is positive by the monotonicity of ψ0 . This can be seen as follows. Using Fubini’s theorem, one can prove that for any random variables X and Y such that XY, X and Y are integrable, we have Z Cov {X, Y } = EXY − EXEY = {P(X ≥ s, Y ≥ t) − P(X ≥ s)P(Y ≥ t)} ds dt. Denote Z1 = (α0 − α)T X and Z2 = ψ0 (u + (α0 − α)T X) = ψ0 (u + Z1 ), then, using monotonicity of the function ψ0 , we have P(Z1 ≥ z1 , Z2 ≥ z2 ) = P(Z1 ≥ max{z1 , z̃2 }) ≥ P(Z1 ≥ max{z1 , z̃2 })P(Z1 ≥ min{z1 , z̃2 }) = P(Z1 ≥ z1 )P(Z2 ≥ z2 }, where z̃2 = ψ0−1 (z2 ) − u = inf{t ∈ R : ψ0 (t) ≥ z2 } − u. We conclude that,  Cov (α0 − α)T X, ψ0 (αT X + (α0 − α)0 X)|αT X = u Z = {P(Z1 ≥ z1 , Z2 ≥ z2 ) − P(Z1 ≥ z1 )P(Z2 ≥ z2 )} ds dt ≥ 0, and hence the first part of the Lemma follows. We next prove the uniqueness of the parameter α0 . We start by assuming that, on the contrary, there exists α1 6= α0 in B(α0 , δ0 ) such that (α0 − α)T φ̄(α) ≥ 0 and (α1 − α)T φ̄(α) ≥ 0 for all α ∈ B(α0 , δ0 ), and we consider the point α ∈ B(α0 , δ0 ) such that |αj − αj0 | = |αj − αj1 | for j = 1, . . . , d. For this point, we have, (α0 − α)T φ̄(α) = −(α1 − α)T φ̄(α) for all α ∈ B(α0 , δ0 ), which is not possible since both terms should be positive. This completes the proof of Lemma 10.10. Lemma 10.11. Let f : X → Rk , k ≤ d be a differentiable function on X such that there exists a constant M > 0 satisfying kf k∞ ≤ M . Then, under the assumptions A1 and A5 we can find a constant M̃ > 0 such that for all α ∈ B(α0 , δ0 ) we have that sup E[f (X)|αT X = αT x] − E[f (X)|αT0 X = αT0 x] ≤ M kα − α0 k. x∈X Proof. We can assume without loss of generality that α0,1 6= 0 where α0,1 is the first component of α0 . At the cost of taking a smaller δ0 , we can further assume that α̃1 6= 0 for all α ∈ B(α0 , δ0 ). Consider the change of variables t1 = αT X, ti = xi for i = 1, . . . , d. Then, the density of (αT X, X2 , . . . , Xd ) is given by    1 1 g(αT X,X2 ,...,Xd ) (t1 , . . . , td ) = g t1 − α2 t2 − . . . − αd td ), t2 , . . . , td . α1 α1 Then, for i = 2, . . . , d, the conditional density hα (·|u) of the (d − 1)-dimensional vector (X2 , . . . , Xd ) given that αT X = u is equal to   d xd g u−α2 x2 −...−α , x , . . . , x 2 d α1 Q := hα (x2 , . . . , xd |u), (10.56) R  u−α2 t2 −...−αd td d , t , . . . , t g 2 d j=2 dtj α1 imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 48 where the domain of integration in the denominator is the set {(x2 , . . . , xd ) : (x, X )}. Note that X1 = (αT X − α2 X2 − . . . − αd Xd )/α1 . Thus, for (x, X ) we have that E[f (X)|αT X = αT x] = E[f (X1 , X2 , . . . , Xd )|αT X = αT x]   T   α X − α2 X2 − . . . − αd Xd T T =E f , X2 , . . . , Xd | α X = α x α1  Z  T d Y α x − α2 x2 − . . . − αd xd = f , x2 , . . . , xd hα (x2 , . . . , xd |αT x) dxj . α1 j=2 Note now that function g  αT x−α2 x2 −...−αd xd , x2 , . . . , xd α1  Q , α 7→ hα (x2 , . . . , xd |αT x) = R  T d g α x−α2 tα21−...−αd td , t2 , . . . , td j=2 dtj is continuously differentiable on B(α0 , δ0 ). This follows from assumptions A1 and A5 together with Lebesgue dominated convergence theorem which allows us to differentiate the density g under the integral sign. With some notation abuse we write ∂h/∂xi for the i-th partial derivative of α 7→ hα (x2 , . . . , xd |αT x). Straightforward calculations yield  T  ∂hα α x − α2 x2 − . . . − αd xd = g , x2 , . . . , xd ∂α1 α1  Q R Pd d ∂g αT x−α2 t2 −...−αd td , t , . . . , t ) (x − t ) 2 d i i j=2 dtj i=2 ∂x1 α1 , × R  T Q 2 d α12 g α x−α2 tα21−...−αd td , t2 , . . . , td j=2 dtj and for i = 2, . . . , d  αT x − α2 x2 − . . . − αd xd = −g , x2 , . . . , xd α1 Q  R d ∂g αT x−α2 t2 −...−αd td , t , . . . , t ) (xi − ti ) ∂x 2 d j=2 dtj α1 i × R  T Q 2 . d α1 g α x−α2 tα21−...−αd td , t2 , . . . , td j=2 dtj  ∂hα ∂αi Assumptions A1 and A5 allow us to find a constant D > 0 depending on R, c0 , c̄0 and c̄1 such that ∂hα ∂αi ∞ ≤ D, for i = 1, . . . , d. Consider now the function α 7→ E[f (X)|αT X = αT x]. Using the assumptions of the lemma and applying again Lebesgue dominated convergence theorem we conclude for i ∈ {1, . . . , d} that we have ∂E[f (X)|αT X = αT x] ∂αi  Z  T d α x − α2 x2 − . . . − αd xd ∂hα (x2 , . . . , xd |αT x) Y = f , x2 , . . . , xd dxj . α1 ∂αi j=2 Furthermore, we have that sup (x,X ∂E[f (X)|αT X = αT x] ≤ MD ∂αi Z Y d dxj = M 0 , j=2 imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 49 for all i ∈ {1, . . . , d} and (x, X ) and α ∈ B(α0 , δ). The results now follow using a first order Taylor expansion to obtain E[f (X)|αT X = αT x] − E[f (X)|αT0 X = αT0 x] = d X eT X = α e T x] ∂E[f (X)|α (αi − α0,i ) , ∂αi i=1 e ∈ Rd such that kα e − α0 k ≤ kα − α0 k. Bounding the right side of the preceding display by for some α M̃ kα − α0 k with M̃ = dM 0 gives the result. Lemma 10.12. Denote for i ∈ {1, . . . , d} the ith component of the function u 7→ E[X|αT X = u] by Ei,α . Then Ei,α has a total bounded variation. Furthermore, there exists a constant B > 0 such that for all α ∈ B(α0 , δ0 ) Z 0 kEi,α k∞ ≤ B, and |Ei,α (u)|du ≤ B, Iα where Iα = {αT x : x ∈ X }. Proof. Since X ⊂ B(0, R), it is clear that kEi,α k∞ ≤ R. As above let us assume without loss of generality that the first component of α0 is not equal to 0. At the cost of taking a smaller δ0 , we can further assume that α̃1 6= 0 for all α ∈ B(α0 , δ0 ). We known that for i = 2, . . . , d Z Ei,α (u) = xi hα (x2 , . . . , xd |u)dx2 . . . dxd , where integration is done over the set {(x2 , . . . , xd ) : (x, X )} and u ∈ Iα ⊂ (a0 − δ0 R, b0 + δ0 R) and where hα denotes conditional density of (X2 , . . . , Xd )0 given αT X = u, defined in (10.56). Using assumptions A1 and A5 along with the Lebesgue dominated convergence theorem we are allowed to write Z ∂ 0 Ei,α (u) = xi hα (x2 , . . . , xd |u) dx2 . . . dxd . ∂u Straightforward calculations yield that ∂ hα (x2 , . . . , xd |u) ∂u  = ∂g ∂x1 u−α2 x2 −...−αd xd , x2 , . . . , xd α1  R  Q  d d td α1 , t , . . . , t dt g u−α2 t2 −...−α 2 d j j=2 α1   R  Q d ∂g u−α2 t2 −...−αd td 1 g α1 u − α2 x2 − . . . − αd xd ), x2 , . . . , xd , t2 , . . . , td j=2 dtj ∂x1 α1 − . R  2 Q d d td α1 g u−α2 t2 −...−α , t , . . . , t dt 2 d j j=2 α1 Thus, we can find constant C > 0 depending only on |α0,1 |, c0 , c1 , c̄1 and R such that all α ∈ B(α0 , δ0 ). Now B = max(R, C) gives the claimed inequalities. If i = 1, then E1,α (u) = R 0 |Ei,α (u)|du ≤ C for d d   X X 1  1  u − αj Ej,α (u) , and e01,α (u) = 1 − αj e0j,α (u) . α1 α1 j=2 j=2 for u ∈ Iα . We conclude again that the claimed inequalities are true at the cost of increasing the constant B obtained above. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 50 Lemma 10.13. Let f be a function defined on some interval [a, b] such that kf k∞ ≤ M, V (f, [a, b]) := n X sup |f (xj ) − f (xj−1 )| ≤ M, a=x0 <x1 ...<xn =b j=1 for some finite constant M > 0. Then, there exist two non-decreasing functions f1 and f2 on [a, b] such that kf1 k∞ , kf2 k∞ ≤ 2M and f = f2 − f1 . Proof. The fact that f = f2 − f1 with f1 and f2 non-decreasing on [a, b] follows from the well-known Jordan’s decomposition. Furthermore, we can take f1 (x) = V (f, [a, x]) and f2 (x) = f (x) − f1 (x)for (x, [a, b]. By assumption, kf1 k∞ ≤ M ≤ 2M and kf2 k ≤ kf k∞ + kf1 k∞ ≤ 2M . Lemma 10.14. Under Assumptions A4-A5, we can find a constant C > 0 such that for all α close enough to α0 we have that 0 ψα (u) > C, for all u ∈ Iα . Proof. We assume again that a1 6= 0. By calculations similar to the calculations made in the proof of Lemma 10.9, we get   Z d d X Y α01 α 01 ψα (u) = ψ00  α0j x̃j  hα (x̃2 , . . . , x̃d |u) dx̃j (u − α2 x̃2 − . . . − αd x̃d ) + α1 α1 j=2 j=2   Z d d Y X ∂ α 01 dx̃j . α0j x̃j  h(x̃2 , . . . , x̃d |u) + ψ0  (u − α2 x̃2 − . . . − αd x̃d ) + α1 ∂u j=2 j=2 Now, a Taylor expansion of αi in the neighborhood of α0,i and using that α0,1 /α1 = 1 − 1 /α0,1 + o(1 ) yields   α0,1 ψ0 (u − α2 x2 − · · · − αd xd ) + α0,2 x2 + · · · + α0,d xd α1   1 (u − 2 x2 − . . . − d xd ) + o(1 ) = ψ0 u − α0,1 1 = ψ0 (u) − (u − 2 x2 − . . . − d xd )ψ00 (u) + o(1 ) α0,1 1 = ψ0 (u) − uψ 0 (u) + o(kα − α0 k). α0,1 0 Using the Lebesgue dominated convergence theorem and the fact that hα (x̃2 , . . . , x̃d |u) is a conditional density it follows that   Z d d X Y ∂ α 01 (u − α2 x̃2 − . . . − αd x̃d ) + α0j x̃j  h(x̃2 , . . . , x̃d |u) dx̃j , = o(α − α0 ), ψ0  α1 ∂u j=2 j=2 such that 0 ψα (u)  1 ≥C 1− α0,1  + o(α − α0 ) ≥ C > 0, provided that kα − α0 k is small enough. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017 /single index model 51 Lemma 10.15. If h  n−1/7 , then there exists a constant B > 0 such that for all α ∈ B(α0 , δ) Z 0 00 kψnh,α k∞ ≤ B and |ψnh,α (u)|du ≤ B, Iα where Iα = {αT x : x ∈ X } Proof. Using integration by Z 1 0 ψnh,α (u) = h Z 1 = h Z 1 = h parts and Proposition 3.2, we have for all u ∈ Iα   u−x K dψ̂nα (x) h     Z u−x 1 u−x 0 K K0 ψα (x)dx + 2 (ψ̂nα (x) − ψα (x))dx h h h   Z u−x 1 K dψα (x) + K 0 (w) (ψ̂nα (u + hw) − ψα (u + hw))dw h h 0 0 = ψα (u) + O(h2 ) + Op (h−1 log nn−1/3 ) = ψα (u) + op (1). This proves the first part of Lemma 10.15. For the second part, we get by a similar calculation that,   Z Z u−x 1 1 00 00 K ψα (x)dx + 2 K 00 (w) (ψ̂nα (u + hw) − ψα (u + hw))dw ψnh,α (u) = h h h   Z 1 u−x 00 = K ψα (x)dx + Op (h−2 log nn−1/3 ). h h Since h−2 log nn−1/3 = o(1) for h  n−1/7 , the second part follows by Assumption A10. imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
10math.ST
1 Mutually Uncorrelated Primers for DNA-Based Data Storage S. M. Hossein Tabatabaei Yazdi∗ , Han Mao Kiah† , Ryan Gabrys∗ and Olgica Milenkovic∗ arXiv:1709.05214v1 [cs.IT] 13 Sep 2017 ∗ ECE Department, University of Illinois, Urbana-Champaign Abstract—We introduce the notion of weakly mutually uncorrelated (WMU) sequences, motivated by applications in DNAbased data storage systems and for synchronization of communication devices. WMU sequences are characterized by the property that no sufficiently long suffix of one sequence is the prefix of the same or another sequence. WMU sequences used for primer design in DNA-based data storage systems are also required to be at large mutual Hamming distance from each other, have balanced compositions of symbols, and avoid primer-dimer byproducts. We derive bounds on the size of WMU and various constrained WMU codes and present a number of constructions for balanced, error-correcting, primer-dimer free WMU codes using Dyck paths, prefix-synchronized and cyclic codes. 1. I NTRODUCTION Mutually uncorrelated (MU) codes are a class of fixed length block codes in which no proper prefix of one codesequence is a suffix of the same or another codesequence. MU codes have been extensively studied in the coding theory and combinatorics literature under a variety of names. Levenshtein introduced the codes in 1964 under the name ‘strongly regular codes’ [1], and suggested that the codes be used for synchronization. For frame synchronization applications described by van Wijngaarden and Willink in [2], Bajić and Stojanović [3] rediscovered MU codes, and studied them under the name of ‘cross-bifix-free’ codes. Constructions and bounds on the size of MU codes were also reported in a number of recent contributions [4], [5]. In particular, Blackburn [5] analyzed these sequences under the name of ‘non-overlapping codes’, and provided a simple construction for a class of codes with optimal cardinality. MU codes have recently found new applications in DNAbased data storage [6], [7]: In this setting, Yazdi et al. [8], [9] developed a new, random-access and rewritable DNA-based data storage architecture that uses MU address sequences that allow selective access to encoded DNA blocks via Polymerase Chain Reaction (PCR) amplification with primers complementary to the address sequences. In a nutshell, DNA informationbearing sequences are prepended with address sequences used to access strings of interest via PCR amplification. To jump start the amplification process, one needs to ‘inject’ complements of the sequences into the storage system, and those complementary sequences are referred to as DNA primers. Primers attach themselves to the user-selected address strings and initiate the amplification reaction. In order to ensure accurate selection and avoid expensive postprocessing, the information sequences following the address are required to Parts of the work were presented at ISIT 2016, Barcelona, Spain. The research is supported in part by the NSF CCF 16-18366 grant. † SPMS, Nanyang Technological University, Singapore avoid sequences that resemble the addresses, thereby imposing a special coding constraint that may be met through the use of MU addresses. In addition, the addressing scheme based on MU codes may be used in conjunction with other specialized DNA-based data storage codes like the ones outlined in [10]– [12]. Detailed descriptions of implementations of DNA-based data storage systems and their underlying synthetic biology principles are beyond the scope of this paper; the interested reader is referred to [13] for a discussion of system components and constraints. The goal of this work is to generalize the family of MU codes by introducing weakly mutually uncorrelated (WMU) codes. WMU codes are block codes in which no sufficiently long prefix of one codesequence is a suffix of the same or another codesequence. In contrast, MU codes prohibit suffixprefix matches of any length. This relaxation of prefix-suffix constraints was motivated in [8], with the purpose of improving code rates and allowing for increased precision DNA fragment assembly and selective addressing. A discussion of the utility of WMU codes in DNA-based data storage may be found in the overview paper [9], [13] and the paper describing recent practical implementations of portable DNA-based data storage systems which make use of WMU codes [14]. Here, we are concerned with determining bounds on the size of specialized WMU codes and efficient WMU code constructions. Of interest are both binary and quaternary WMU codes, as the former may be used to construct the latter, while the latter class may be adapted for encoding over the four letter DNA alphabet {A, T, C, G}. Our contributions include bounds on the largest size of unconstrained and constrained WMU codes, constructions of WMU codes that meet the derived upper bounds as well as results on several important constrained versions of WMU codes: Error-correcting WMU codes, balanced WMU codes, balanced error-correcting WMU codes, and WMU codes that avoid primer-dimer byproducts. The aforementioned constraints arise due to the following practical considerations. A binary sequence is called balanced if half of its symbols are zero. On the other hand, a DNA sequence is termed balanced if it has a 50% GC content (i.e., if 50% of the symbols in the sequence are either G or C). Balanced DNA sequences are more stable than DNA sequences with lower or higher GC content and they have lower sequencing error-rates. Balanced DNA sequences are also easier to synthesize than unbalanced sequences [15]. In addition, WMU codes at large Hamming distance limit the probability of erroneous codesequence selection dues to address errors. When referring to primer dimer (PD) issues [16], we consider potential problems that may arise during random access when two primers used 2 for selection bond to each other, thereby prohibiting amplification of either of the two corresponding information-bearing sequences. PD byproducts can be eliminated by restricting the WMU codes to avoid simultaneous presence of long substrings and their complements in the codesequences. The paper is organized as follows. Section 2 contains an overview of the topics and results discussed in the paper and some formal definitions needed to follow the material in subsequent sections. In Section 3 we review MU and introduce WMU codes, and derive bounds on the maximum size of the latter family of combinatorial objects. In addition, we outline a construction of WMU codes that meets the derived upper bound. We also describe a construction that uses binary MU component codes and other constrained codes in order to obtain families of WMU codes that obey different combinations of primer constraints. In Section 4 we describe constructions for error-correcting WMU codes, while in Section 5 we discuss balanced WMU codes. Primer-dimer constraints are discussed in Section 6. Our main results are presented in Section 7, where we first propose to use cyclic codes to devise WMU codes that are both balanced and have error correcting capabilities. We then proceed to improve the cyclic code construction in terms of coding rate through decoupled constrained and error-correcting coding for binary strings. In this setting, we use DC-balanced codes [17]. Encoding of information with WMU address codes is described in Section 8. 2. ROADMAP OF A PPROACHES AND R ESULTS Throughout the paper we use the following notation: Fq stands for a finite field of order q ≥ 2. Two cases of special interest are q = 2 and q = 4. In the latter case, we tacitly identify the elements of F4 with the four letters of the DNA code alphabet, {A, T, C, G}. We let a = (a1 , . . . , an ) ∈ Fnq stand for a sequence of length n over Fq , and let aji , 1 ≤ i, j ≤ n, stand for a substring of a starting at position i and ending at position j, i.e., ( (ai , . . . , aj ) i≤j j ai = (ai , ai−1 , . . . , aj ) i > j. Moreover, for two arbitrary sequences a ∈ Fnq , b ∈ Fm q , we use ab = (a1 , . . . , an , b1 , . . . , bm ) to denote a sequence of length n+m generated by appending b to the right of a. Thus, al stands for a sequence of length ln comprising l consecutive copies of the sequence a. We say that a sequence ā = (a¯1 , . . . , a¯n ) ∈ Fnq represents the complement of sequence a ∈ Fnq if: • For q = 2, and 1 ≤ i ≤ n, ( 1 if ai = 0, āi = (1) 0 if ai = 1; • For q = 4, and 1 ≤ i ≤ n,   T if  A if āi = G if    C if ai ai ai ai = A, = T, = C, = G. (2) The notion of complement used for F4 is often referred to as the Watson-Crick (W-C) complement. In this work, we define an (address) code C of length n as a collection of sequences from Fnq , for q ∈ {2, 4}, satisfying a set of specific combinatorial constraints described below. The goal is to describe new constructions for address sequences used for DNA-based data storage. Address sequences should enable reliable access to desired information content. This is accomplished by making the addresses as distinguishable from each other as possible via a simple minimum Hamming distance constraint; recall that the Hamming distance dH between any two sequences of length n, a = (a1 , . . . , an ) and b = (b1 , . . . , bn ), over some finite alphabet A equals dH (a, b) = n X 1(ai 6= bi ), i=1 where 1(·) stands for the indicator function. One may also use the Levenshtein distance instead, as discussed in the context of MU codes in [18]. Access to desired sequences is accomplished by exponentially amplifying them within the pool of all sequences via addition of primer sequences corresponding to the W-C complement of their addresses. As primers have to be synthesized, they need to satisfy constraints that enable simplified synthesis, such as having a balanced GC-content, formally defined for Pn n a sequence a over Fn4 as 1(a i ∈ {G, C}) = 2 . i=1 This constraint directly translates to a balancing property for the address sequences. Furthermore, as one may require simultaneous amplification of multiple sequences, multiple primers need to be added in which case it is undesirable for different pairs of primers to bond to each other via WC complementarity. The PD byproducts of this binding may be significantly reduced if one imposes an additional PD constraint on the primers, and hence on the address sequences, as defined below. Definition 1. A set of sequences C ⊆ Fnq , for q ∈ {2, 4}, is said to avoid primer dimer (APD) byproducts of effective length f if substrings of sequences in C with length ≥ f cannot hybridize with each other in the forward or the reverse direction. More precisely, we say that C is an f -APD code if for any two sequences a, b ∈ C, not necessarily distinct, and 1 ≤ i, j ≤ n + 1 − f, we have āfi +i−1 6= bfj +j−1 , bjf +j−1 . We refer to the sequence bjf +j−1 as the reverse of the sequence bjf +j−1 . For practical reasons, we only focus on the parameter regime f = Θ (n), as only sufficiently long complementary sequences may bond with each other. Furthermore, we defer the study of the related problem of secondary structure formation [19], [20] to future work. In certain DNA-based data storage systems, one may be interested in restricting the address sequences by imposing only one or two of the above constraints. For example, if the addresses are relatively short (≤ 10), one may dispose of the requirement to make the sequences balanced, as short sequences are significantly easier to synthesize than longer ones. If one allows for postprocessing of the readouts, then the 3 Hamming distance constraint may be relaxed or completely removed. It is for this reason that we also consider a more general class of code constructions that accommodate only a subset of the three previously described constraints. By far the most important constraint imposed on the address sequences is that they enable a simple construction of information-bearing sequences (assumed to be of length N >> n) that do not contain any of the address sequences of length n as substrings. It is in this context of forbidden substring coding that MU codes were introduced in [21], [22]. WMU codes may be used in the same setting, but they are less restrictive than MU codes, and therefore allow for larger codebooks. This is why our main results pertain to constructions of WMU codes with various subsets of primer constraints, and we formally define and discuss these codes in the next section. For some related questions pertaining to MU codes, the interested reader is referred to [18]. 3. MU AND WMU C ODES : D EFINITIONS , B OUNDS AND C ONSTRUCTIONS For simplicity of notation, we adopt the following naming convention for codes: If a code C ⊆ Fnq has properties Property1 , Property2 , . . . , Propertys , then we say that C is a Property1 _Property2 _ . . . , Propertys _q_n code, and use the previous designation in the subscript. A. Mutually Uncorrelated Codes Fnq is selfWe say that a sequence a = (a1 , . . . , an ) ∈ uncorrelated if no proper prefix of a matches its suffix, i.e., if (a1 , . . . , ai ) 6= (an−i+1 , . . . , an ), for all 1 ≤ i < n. This definition may be extended to a set of sequences as follows: Two not necessarily distinct sequences a, b ∈ Fnq are said to be mutually uncorrelated if no proper prefix of a appears as a suffix of b and vice versa. We say that C ⊆ Fnq is a mutually uncorrelated (MU) code if any two not necessarily distinct codesequences in C are mutually uncorrelated. The maximum cardinality of MU codes was determined up to a constant factor by Blackburn [5, Theorem 8]. For completeness, we state the modified version of this result for alphabet size q ∈ {2, 4} below Theorem 1. Let AMU_q_n denote the maximum size of a MU_q_n code, with n ≥ 2 and q ∈ {2, 4}. Then cq qn qn ≤ AMU_q_n ≤ n 2n 2 where cq = (q−1)4q(2q−1) , which for q = 2 and q = 4 equal 4 c2 = 0.04688 and c4 = 0.06152, respectively. We also briefly outline two known constructions of MU codes, along with a new and simple construction for errorcorrecting MU codes that will be used in our subsequent derivations. Bilotta et al. [4] described an elegant construction for MU codes based on well-known combinatorial objects termed Dyck sequences. A Dyck sequence of length n is a binary sequence composed of n2 zeros and n2 ones such that no prefix of the sequence has more zeros than ones. By definition, a Dyck sequence is balanced and it necessarily starts with a one and ends with a zero. The number of Dyck word of length n  n 2 is the n2 -th Catalan number, equal to n+2 n . 2 Construction 1. (BAL_MU_2_n Codes) Consider a set D of Dyck sequences of length n − 2 and define the following set of sequences of length n, C = {1a0 : a ∈ D}. It is straightforward to show that C is balanced and MU code. Size of C is also equal to n−2 2 -th Catalan number, or n 1 |C| = 2(n−1) n . 2 An important observation is that MU codes constructed using Dyck sequences are inherently balanced, as they contain n n 2 ones and 2 zeros. The balancing property also carries over to all prefixes of certain subsets of Dyke sequences. To see this, recall that a Dyck sequence has height at most D if for any prefix of the sequence, the difference between the number of ones and the number of zeros is at most D. Hence, the disbalance of any prefix of a Dyck sequence of height D is at most D. Let Dyck(n, D) denote the number of Dyck sequences of length 2n and height at most D. For fixed values of D, de Bruijn et al. [23] proved that     π π 4n 2 2n tan cos . (3) Dyck(n, D) ∼ D+1 D+1 D+1 Here, f (n) ∼ g(n) is used to denote the following asymptotic relation limm→∞ f (n)/g(n) = 1. Bilotta’s construction also produces nearly prefix-balanced MU codes, provided that one restricts his/her attention to subsets of sequences with small disbalance D; equation 3 establishes the existence of large subsets of Dyck sequences with small disbalance. By mapping 0 and 1 to {A, T} and {C, G}, respectively, one may enforce a similar GC balancing constraint on DNA MU codes. The next construction of MU codes was proposed by Levenshtein [1] and Gilbert [21]. Construction 2. (MU_q_n Codes) Let n ≥ 2 and 1 ≤ ` ≤ n−1, be two integers and let C ⊆ Fnq be the set of all sequences a = (a1 , . . . , an ) such that • • • The sequence a starts with ` consecutive zeros, i.e., a`1 = 0` . It holds that a`+1 , an 6= 0. The subsequence an−1 `+2 does not contain ` consecutive zeros as a subsequence. Then, C is an Blackburn [5, Lemma 3] showed  MU code.  that when ` = logq 2n and n ≥ 2`+2 the above construction is optimal. His proof relies on the observation that the number of strings an−1 `+2 that do not contain ` consecutive zeros as a 2 subsequence exceeds (q−1)4nq(2q−1) q n , thereby establishing the 4 lower bound of Theorem 1. The aforementioned result is a simple consequence of the following lemma. Lemma 1. The number of q-ary sequences of length n that avoid t specified sequences in Fnq s as substrings is greater than q n (1 − qnt ns ). 4 Proof: The result obviously holds for n ≤ ns . If n ≥ ns , then the number of bad strings, i.e., q-ary strings of length n that contain at least one of the specified t strings as a substring, is bounded from above by: To maximize nH = t (` − 1) given n = (t + 1) ` + 1 and t, ` ≥ 1, we write p √ nH = n − (` + t + 1) ≤ n − 2 `(t + 1) = n − 2 n − 1. #bad strings ≤ (n − ns + 1)tq n−ns Here, the inequality follows from p the arithmetic and geometric ` (t + 1). On the other hand, ≥ mean inequality, i.e., `+t+1 2 it is √ easy to verify that√this upper bound is achieved by setting ` = n − 1 and t = √n − 1 − 1. Hence, the maximum value of nH is n∗H = n − 2 n − 1. By using a code CH with parameters [n∗H , s, d] as specified n∗ by the GV bound, where d ≤ 2H and s = n∗H (1 − h( nd∗ ) − H o(1)), we obtain an MU code Cparse with q error-correcting p parameters [n∗H + 2 n∗H + 2 n∗H − 1 − 1, n∗H (1 − h( nd∗ ) − H o(1)), d]. ≤ ntq n−ns . Hence, the number of good sequences, i.e., the number of qary sequences of length n that avoid t specified strings in Fnq s as substrings, is bounded from below by #good strings ≥ q n − #bad strings nt ≥ q n (1 − ns ). q It is straightforward to modify Construction 2 so as to incorporate error-correcting redundancy. Our constructive approach to this problem is outlined in what follows. Construction 3. (Error − Correcting_MU_2_n Codes) Fix two positive integers t and ` and consider a binary (nH , s, d) code CH of length nH = t(` − 1), dimension s, and Hamming distance d. For each codesequence b ∈ CH , we map b to a sequence of length n = (t + 1)` + 1 given by 2(`−1) a(b) = 0` 1b`−1 1 1b` t(`−1) 1 · · · b(t−1)(`−1)+1 1. Let Cparse , {a(b) : b ∈ CH }. It is easy to verify that |Cparse | = |CH |, and that the code Cparse has the same minimum Hamming distance as CH , i.e., d(Cparse ) = d(CH ). As nH = t(` − 1), we also n have Cparse ⊆ {0, 1} , where n = (t + 1)` + 1. In addition, the parsing code Cparse is an MU code, since it satisfies all the constraints required by Construction 2. To determine the largest asymptotic size of a parsing code, we recall the GilbertVarshamov bound. Theorem 2. (Asymptotic Gilbert-Varshamov bound [24], [25]) For any two positive integers n and d ≤ n2 , there exists n a block code C ⊆ {0, 1} of minimum Hamming distance d with normalized rate   d R(C) ≥ 1 − h − o(1), n where h(·) is the binary entropy function, i.e., h(x) = 1 x log2 x1 + (1 − x) log2 1−x , for 0 ≤ x ≤ 1. Recall that the parameters s (dimension) and d (minimum Hamming distance) of the codes CH and Cparse are identical. Their lengths, nH and n, respectively, equal nH = t (` − 1) and n = (t + 1) ` + 1, where t, ` are positive integers. We next aim to optimize the parameters of the parsing code for fixed s and fixed n, which amounts to maximizing d. Since d is equal to the corresponding minimum distance of the code CH , and both codes have the same dimension s, in order to maximize d we maximize nH under the constraint that n is fixed. More precisely, we optimize the choice of `, t and then use the resulting parameters in the Gilbert-Varshamov lower bound. B. Weakly Mutually Uncorrelated Codes: Definitions, Bounds and Constructions The notion of mutual uncorrelatedness may be relaxed by requiring that only sufficiently long prefixes of one sequence do not match sufficiently long suffixes of the same or another sequence. A formal definition of this property is given next. Definition 2. Let C ⊆ Fnq and 1 ≤ κ < n. We say that C is a κ-weakly mutually uncorrelated (κ-WMU) code if no proper prefix of length l, for all l ≥ κ, of a codesequence in C appears as a suffix of another codesequence, including itself. Our first result pertains to the size of the largest WMU code. Theorem 3. Let Aκ−WMU_q_n denote the maximum size of a κ-WMU code over Fnq , for 1 ≤ κ < n and q ∈ {2, 4}. Then, qn qn ≤ Aκ−WMU_q_n ≤ , n−κ+1 n−κ+1 where the constant cq is as described in Theorem 1. cq Proof: To prove the upper bound, we use an approach first suggested by Blackburn in [5, Theorem 1], for the purpose of analyzing MU codes. Assume that C ⊆ Fnq is a κ-WMU code. Let L = (n + 1) (n − κ + 1) − 1, and consider the set X of pairs (a, i) , where i ∈ {1, . . . , L}, and where a ∈ FL q is such that the (possibly cyclically wrapped) substrings of a of length n starting at position i belongs to C. Note that our choice of the parameter L is governed by the overlap length κ. Clearly, |X| = L |C| q L−n , since there are L different possibilities for the index i, |C| possibilities for the string starting at position i of a, and q L−n choices for the remaining L − n ≥ 0 symbols in a. Moreover, if (a, i) ∈ X, then (a, j) ∈ / X for j ∈ {i ± 1, . . . , i ± n − κ}mod L due to the weak mutual uncorrelatedness property. Hence, for a fixed j k L L string a ∈ Fq , there are at most n−κ+1 different pairs   (a, i1 ) , . . . , a, ib L c ∈ X. This implies that n−κ+1   L |X| ≤ qL . n−κ+1 Combining the two derived constraints on the size of X, we obtain   L |X| = L |C| q L−n ≤ qL . n−κ+1 5 n q Therefore, |C| ≤ n−κ+1 . To prove the lower bound, we describe a simple WMU code construction, outlined in Construction 4. Construction 4. (κ − WMU_q_n Codes) Let κ, n be two integers such that 1 ≤ κ ≤ n. A κ-WMU code C ∈ Fnq may be constructed using a simple concatenation of the form C = {ab | a ∈ C1 , b ∈ C2 }, where C1 ⊆ Fn−κ+1 is an MU q code, and C2 ⊆ Fκ−1 is unconstrained. q It is easy to verify that C is an κ-WMU code with |C1 | |C2 | codesequences. Let C2 = Fκ−1 and let C1 ⊆ Fn−κ+1 q q be the largest MU code of size AMU_q_n−κ+1 . Then, |C| = q κ−1 AMU_q_n−κ+1 . The claimed lower bound now follows from the lower bound of Theorem 1, establishing that |C| ≥ qn . cq n−κ+1 As described in the Introduction, κ-WMU codes used in DNA-based storage applications are required to satisfy a number of additional combinatorial constraints in order to be used as blocks addresses. These include the error-correcting, balancing and primer dimer constraints. Balancing and errorcorrecting properties of codesequences have been studied in great depth, but not in conjunction with MU or WMU codes. The primer dimer constraint has not been previously considered in the literature. In what follows, we show that all the above constraints can be imposed on κ-WMU codes via a simple decoupled binary code construction. To this end, let us introduce a mapping Ψ as follows. For any two binary sequences a = (a1 , . . . , an ) , b = n n n (b1 , . . . , bn ) ∈ {0, 1} , Ψ (a, b) : {0, 1} × {0, 1} → n {A, T, C, G} is an encoding function that maps the pair a, b n to a DNA string c = (c1 , . . . , cn ) ∈ {A, T, C, G} , according to the following rule:  A if (ai , bi ) = (0, 0)    T if (a , b ) = (0, 1) i i (4) for 1 ≤ i ≤ n, ci =  C if (a , b ) = (1, 0) i i    G if (ai , bi ) = (1, 1) . Clearly, Ψ is a bijection and Ψ(a, b)Ψ(c, d) = Ψ(ac, bd). The next lemma lists a number of useful properties of Ψ. (ii) We prove the result by contradiction. Suppose that C is not a κ-WMU code while C1 is a κ-WMU code. Then, there exist sequences c, c0 ∈ C such that a proper prefix of c of length at least κ appears as a suffix of c0 . Alternatively, there exist sequences p, c0 , c00 such that c = pc0 , c0 = c00 p and the length of p is at least κ. Next, we use the fact Ψ is a bijection and find binary strings a, b, a0 , b0 such that p = Ψ (a, b) , c0 = Ψ (a0 , b0 ) , c00 = Ψ (a00 , b00 ) . Therefore, c = pc0 = Ψ (a, b) Ψ (a0 , b0 ) = Ψ (aa0 , bb0 ) , c0 = c00 p = Ψ (a00 , b00 ) Ψ (a, b) = Ψ (a00 a, b00 b) , where aa0 , a00 a ∈ C1 . This implies that the string a of length at least κ appears both as a proper prefix and suffix of two not necessarily distinct elements of C1 . This contradicts the assumption that C1 is a κ-WMU code. The same argument may be used for the case that C2 is a κWMU code. (iii) For any two distinct sequences c, c0 ∈ C there exist a, a0 ∈ C1 , b, b0 ∈ C2 such that c = Ψ (a, b) , c0 = Ψ (a0 , b0 ). The Hamming distance between c, c0 equals X X 1 (ci 6= c0i ) = 1 (ai 6= a0i ∨ bi 6= b0i ) 1≤i≤n 1≤i≤n ( d1 ≥ d2 if a 6= a0 ≥ min (d1 , d2 ) . if b = 6 b0 This proves the claimed result. (iv) By combining (1), (2) and (4), one can easily verify that Ψ(a, b) = Ψ a, b . We again prove the result by contradiction. Suppose that C is not an f -APD code. Then, there exist c, c0 ∈ C, a, a0 ∈ C1 , b, b0 ∈ C2 such that c = Ψ (a, b) , c0 = Ψ (a0 , b0 ) and cfi +i−1 = (c0 )jf +j−1 or (c0 )jf +j−1 , for some 1 ≤ i, j ≤ n + 1 − f . f +i−1 = (b0 )jf +j−1 or (b0 )jf +j−1 , This implies that bi which contradicts the assumption that C2 is an f -APD code. n Lemma 2. Suppose that C1 , C2 ⊆ {0, 1} are two binary block codes of length n. Encode pairs of codesequences (a, b) ∈ C1 × C2 into a code C = {Ψ (a, b) | a ∈ C1 , b ∈ C2 }. Then: (i) If C1 is balanced, then C is balanced. (ii) If either C1 or C2 are κ-WMU codes, then C is also an κ-WMU code. (iii) If d1 and d2 are the minimum Hamming distances of C1 and C2 , respectively, then the minimum Hamming distance of C is at least min (d1 , d2 ). (iv) If C2 is an f -APD code, then C is also an f -APD code. Proof: (i) Any c ∈ C may be written as c = Ψ (a, b) , where a ∈ C1 , b ∈ C2 . According to (4), the number of G, C symbols in c equals the number of ones in a. Since a is balanced, exactly half of the symbols in c are Gs and Cs. This implies that C has balanced GC content. In the next sections, we devote our attention to establishing bounds on the size of WMU codes with error-correction, balancing and primer dimer constraints, and to devising constructions that use the decoupling principle or more specialized methods that produce larger codebooks. As the codes C1 and C2 in the decoupled construction have to satisfy two or more properties in order to accommodate all required constraints, we first focus on families of binary codes that satisfy one or two primer constraints. 4. E RROR -C ORRECTING WMU C ODES The decoupled binary code construction result outlined in the previous section indicates that in order to construct an error-correcting κ-WMU code over F4 , one needs to combine a binary error-correcting κ-WMU code with a classical errorcorrecting code. To the best of our knowledge, no results are 6 available on error-correcting MU or error-correcting κ-WMU codes. We start by establishing lower bounds on the coding rates for error-correcting WMU codes using the constrained GilbertVarshamov bound [24], [25]. For a ∈ Fnq and an integer r ≥ 0, let BFnq (a, r) denote the Hamming sphere of radius r centered around a, i.e.,  BFnq (a, r) = b ∈ Fnq | dH (a, b) ≤ r , where, as before, dH denotes the Hamming distance. Clearly, the cardinality of BFnq (a, r) equals  r  X n i Vq (n, r) = (q − 1) , i i=0 independent on the choice of the center of the sphere. For the constrained version of Gilbert-Varshamov bound, let X ⊆ Fnq denote an arbitrary subset of Fnq . For a sequence a ∈ X, define the Hamming ball of radius r in X by and L2 = i=0 n−κ−` i  i (q − 2) Vq (κ − 1, d − i − 2) . Proof: Assume that X is a κ-WMU code over Fnq generated according to Construction 4 and such that it has the carqn . Recall that in this dinality at least cq n−κ+1  case, X is the set of sequences a ∈ Fnq that start with ` = logq 2 (n − κ + 1) consecutive zeros (a`1 = 0` ), a`+1 , an−κ+1 6= 0, and no ` consecutive zeros appears as a subsequence in an−κ `+2 . With every a ∈ X, we associate two sets X (a, d − 1) and Y (a, d − 1): The set X (a, d − 1) includes sequences b ∈ Fnq that satisfy the following three conditions: ` ` • Sequence b starts with ` consecutive zeros, i.e., b1 = 0 . • One has b`+1 6= 0.  n n • Sequence b satisfies dH a`+1 , b`+1 ≤ d − 1. The set Y (a, d − 1) ⊆ X (a, d − 1) is the collection of n−κ sequences b that contain 0` as a subsequence in b`+2 , or that satisfy bn−κ+1 = 0. Therefore, BX (a, r) = BFnq (a, r) ∩ X. BX (a, d − 1) = X (a, d − 1) /Y (a, d − 1) , The volumes of the spheres in X may depend on the choice of a ∈ X. Of interest is the maximum volume of the spheres of radius r in X, VX,max (r) = max |BX (a, r)| . and |BX (a, d − 1) | = |X (a, d − 1) | − |Y (a, d − 1) |. Let L0 = |X (a, d − 1)|. Thus, a∈X The constrained version of the GV bound asserts that there exists a code of length n over X, with minimum Hamming distance d that contains |X| M≥ VX,max (d − 1) codesequences. Based on the constrained GV bound, we can establish the following lower bound for error-correcting WMU codes. The key idea is to use a κ-WMU subset as the ground set X ⊆ Fnq . Theorem 4. (Lower bound on the maximum size of errorcorrecting WMU codes.) Let κ and n be two integers such that n − κ − 1 ≥ 2`, for ` = logq 2 (n − κ + 1) , q ∈ {2, 4}. Then there exists a κ-WMU code C ⊆ Fnq with minimum Hamming distance d and cardinality qn |C| ≥ cq , (n − κ + 1) (L0 − L1 − L2 ) (5) where 2 cq = n−κ−` X  (q − 1) (2q − 1) , 4q 4 and L0 , L1 , and L2 , are given by L0 =Vq (n − ` − 1, d − 1) + (q − 2) Vq (n − ` − 1, d − 2) , L0 =Vq (n − ` − 1, d − 1) + (q − 2) Vq (n − ` − 1, d − 2) . (6) The result holds as the first term on the right hand side of the equation counts the number of sequences b ∈ X (a, d − 1) that satisfy b`+1 = a`+1 , while the second term counts those sequences for which b`+1 6= a`+1 . We determine next |Y (a, d − 1) |. For this purpose, we look into two disjoints subsets Y I and Y II in Y (a, d − 1) which allow us to use |Y (a, d − 1)| ≥ Y I + Y II and establish a lower bound on the cardinality sought. The set Y I is defined according to YI = n−κ−`+1 [ Y I (i) , i=`+2 I where Y (i) is the set of sequences b ∈ X (a, d − 1) that satisfy the following constraints: ` • The sequence b contains the substring 0 starting at i+`−1 ` position i, i.e., bi =0 . • It holds that bi−1 6= 0. i−2 ` • The sequence 0 does not appears as a substring in b`+2 .   i−1 i−1 n n • One has dH a`+1 , b`+1 + dH ai+` , bi+` ≤ d − ` − 1. I The cardinality of Y (` + 2) can be found according to Y I (` + 2) =Vq (n − 2` − 1, d − ` − 1) + (q − 2) Vq (n − 2` − 1, d − ` − 2) L1 = (q − 1) n−κ−`+1 X  i−`−2 X   i=`+2 j=0 i−`−2 j ×Vq (n − i − ` + 1, d − ` − j − 2))] ,  j (q − 2) ≥ (q − 1) Vq (n − 2` − 1, d − ` − 2) The first term on the right hand side of the above equality counts the sequences b ∈ Y I (` + 2) for which b`+1 = a`+1 , while the second term counts sequences for which 7 b`+1 6= a`+1 . The inequality follows from the fact that Vq (n − 2` − 1, d − ` − 1) ≥ Vq (n − 2` − 1, d − ` − 2). To evaluate the remaining terms Y I (i)for ` + 3 ≤ i ≤ i−2 n − κ − ` + 1, assume that dH ai−2 `+1 , b`+1 = j. In this case, there are at least   i−`−2 j (q − 2) j possible choices for bi−2 `+1 . This result easily follows from counting the number of ways to select the j positions in ai−2 `+1 on which the sequences agree and the number of choices for the remaining symbols which do not include the corresponding values in a and 0. As no additional symbol 0 is introduced in i−2 i−2 ` bi−2 `+1 , b`+2 does not contain the substring 0 as a`+2 avoids that string; similarly, b`+1 6= 0. On the other hand, there are q − 1 possibilities for bi−1 ∈ Fq \ {0}, and to satisfy the distance property we have to have  dH ani+` , bni+` ≤ d − ` − j − 2. Therefore,  i−`−2 X  Y I (i) ≥ (q − 1)  j=0 i−`−2 j  j (q − 2) ×Vq (n − i − ` + 1, d − ` − j − 2)] . Hence, the cardinality of Y I may be bounded from below as Y I ≥LI , where LI = (q − 1) n−κ−`+1 X  i−`−2 X   j=0 i=`+2 i−`−2 j  (q − 2) ×Vq (n − i − ` + 1, d − ` − j − 2))] . (7) It is easy to verify that Y II ⊆ X (a, d − 1) \ [BX (a, d − 1) ∪ YI ] . Following the same arguments used in establishing the bound on the cardinality of Y II , on can show that Y II ≥L2 , where n−κ−` X  i=0 n−κ−` i  i (q − 2) Vq (κ − 1, d − i − 2) . (8) As a result, for each a ∈ X, we have |BX (a, d − 1)| = |X (a, d − 1)| − |Y (a, d − 1)| ≤L0 − L1 − L2 . VX,max (d − 1) ≤ L0 − L1 − L2 . This inequality, along with the constrained form of the GV bound, establishes the validity of the claimed result. Figure 1 plots the above derived lower bound on the maximum achievable rate for error-correcting κ-WMU codes (5), and for comparison, the best known error-correcting linear codes for binary alphabets. The parameters used are n = 50, κ = 1, q = 2, corresponding to MU codes. To construct q = 4-ary error-correcting κ-WMU codes via the decoupled construction, we need to have at our disposition an error-correcting κ-WMU binary code. In what follows, we use ideas similar to Tavares’ synchronization technique [26] to construct such codes. We start with a simple lemma and a short justification for its validity. Lemma 3. Let C be a cyclic code of dimension κ. Then the run of zeros in any nonzero codesequence is at most κ − 1. Proof: Assume that there exists a non-zero codesequence c(x), represented in polynomial form, with a run of zeroes of length κ. Since the code is cyclic, one may write c(x) = a(x)g(x), where a(x) is the information sequence corresponding to c(x) and g(x) is the generator polynomial of the code. Without loss of generality, one may assume that the P run of zeros appears at positions 0, . . . , κ − 1, so that i+j=s ai gj = 0, for s ∈ {0, . . . , κ − 1}. The solution of the previous system of equations gives a0 = a1 = . . . = aκ−1 = 0, contradicting the assumption that c(x) is non-zero. j The set Y II comprises the set of sequences in b ∈ X (a, d − 1) that have the following properties: n−κ ` • The sequence 0 does not appear as a substring in b`+2 . • It holds bn−κ+1 = 0. • One has   n−κ n n dH an−κ `+1 , b`+1 + dH an−κ+2 , bn−κ+2 ≤ d − 2. L2 = Note that L0 , L1 , L2 are independent from a. Therefore, Construction 5. (d − HD_κ − WMU_q_n Codes) Construct a code C ⊆ Fnq according to C = {a + e | a ∈ C1 , e = (1, 0, . . . , 0)} where C1 is a [n, κ − 1, d] cyclic code. We argue that C is a κ-WMU code, with minimum Hamming distance d. To justify the result, we first demonstrate the property of weakly mutually uncorrelatedness. Suppose that on the contrary the code is C is not κ-WMU. Then there exists a proper prefix p of length at least κ such that both pa and bp belong to C. In other words, the sequences (pa) − e and (bp) − e belong to C1 . Consequently, (pb) − e0 belongs to C1 , where e0 is a cyclic shift of e. Hence, by linearity of C1 , z , 0(a − b) + e0 − e belongs to C1 . Now, observe that the first coordinate of z is one, and hence nonzero. But z has a run of zeros of length at least κ − 1, which is a contradiction. Therefore, C is indeed a κ-WMU code. Since C is a coset of C1 , the minimum Hamming distance property follows immediately. As an example, consider the family of primitive binary terror-correcting BCH codes with parameters [n = 2m − 1, ≥ n − mt, ≥ 2t + 1]. The family is cyclic, and when used in Construction 5, it results in an error-correcting (n − mt + 1)WMU code of minimum distance 2t + 1. The rate of such a ≥ 1 − 2mmt−1 , while according to the Theorem code is n−mt n 3, the cardinality of the optimal-order corresponding κ-WMU 8 Error-correcting linear code Error-correcting MU code 1.0 Relative rate 0.8 0.6 0.4 0.2 0.0 0 10 20 30 Hamming distance 40 50 Figure 1. Comparison of two different lower bounds for binary codes: Error-correcting MU codes (inequality (5) of Theorem 4) and the best known linear error-correcting codes; n = 50, κ = 1, as κ = 1-WMU codes are MU codes. code is at least rate of at least 0.04688×2n , mt n corresponding to an information ) log( 0.04688×2 5 + log (mt) mt >1− . (9) n 2m − 1 As an illustration, we compare the rates of the BCH-based κ-WMU and the optimal κ-WMU codes for different values of m = 10, t = 1, 3, 5: (i) m = 10, t = 1: In this case our BCH code has length 1023, dimension 1013, and minimum Hamming distance 3. This choice of a code results in a binary 1014WMU code with minimum Hamming distance 3, and information rate 0.9902, while the optimal binary 1014WMU code has information rate greater than 0.9919. (ii) m = 10, t = 3: In this case our BCH code has length 1023, dimension 993, and minimum Hamming distance 7. This choice of a code results in a binary 994-WMU code with minimum Hamming distance 7, and information rate 0.9707, while the optimal binary 994-WMU code has information rate greater than 0.9903. (iii) m = 10, t = 5: In this case our BCH code has length 1023, dimension 973, and minimum Hamming distance 11. This choice of a code results in a binary 974WMU code with minimum Hamming distance 11, and information rate 0.9511, while the optimal binary 974WMU code has information rate greater than 0.9896. Next, we present a construction for MU ECC codes of length n, minimum Hamming distance 2t + 1 and of size roughly (t + 1) log n. This construction outperforms the previous approach for codes of large rate, whenever t is a small constant. Assume that one is given a linear code of length n0 and minimum Hamming distance dH = 2t + 1, equipped with 0 a systematic encoder EH (n0 , t) : {0, 1}κ → {0, 1}n −κ which inputs κ information bits and outputs n0 −κ parity bits. We feed into the encoder EH sequences u ∈ {0, 1}κ that do not contain runs of zeros of length ` − 1 or more, where ` = log(4n0 ). Let p = d n0κ−κ e > `. The MU ECC codesequences are of length n = n0 + ` + 2, and obtained according to the constrained information sequence u as: 2p 1 2 (0, 0 . . . , 0, 1, up 1 ,EH (u)1 , up+1 , EH (u)2 , 0 0 n −κ 3 n u3p 2p+1 ,EH (u)3 . . . , u(n0 −κ−1)p+1 , EH (u)n0 −κ , 1). The codesequences start with the 0` 1 substring, and are followed by sequences u interleaved with parity bits, which are inserted every p > ` positions. Notice that the effect of the inserted bits is that they can extend the lengths of existing runs of zeros in u by at most one. Since u has no runs of lengths ` − 1 or more this means that we do not see any runs of zeros of length ≥ ` in the last n − ` − 1 bits of x. This implies that the underlying code is MU, while the ECC properties are inherited from the initial linear code. 5. BALANCED κ-WMU C ODES In what follows, we focus on the analysis of balanced κWMU codes, and start with a review of known bounds on the number of balanced binary sequences. Let Ad−HD_2_n denote the maximum size of a binary code of length n and minimum Hamming distance d, and let Aw−CST_d−HD_2_n denote the maximum cardinality of a binary code with constant weight w, length n and even minimum Hamming distance dH . Clearly,   n n A 2 −CST_2−HD_2_n = n . 2 Gyorfi et al. [27] derived several bounds for the more general function Aw−CST_d−HD_2_n based on Ad−HD_2_n . Theorem 5. For even integer d, 0 ≤ d ≤ n, and every w, 0 ≤ w ≤ n,  n w 2n−1 Ad−HD_2_n ≤ Aw−CST_d−HD_2_n . 9 We present next our first construction of balanced κ-WMU codes. Construction 6. (BAL_κ − WMU_4_n Codes) Form a code C ∈ n {A, T, C, G} using the decoupled construction with component codes C1 and C2 chosen according to the following rules: n • Let C1 ⊆ {0, 1} be a balanced code of size equal to n A 2 −CST_2−HD_2_n . n • Let C2 ⊆ {0, 1} be a κ-WMU code; one may use Construction 4 to generate C2 . n Lemma 4. Let C ∈ {A, T, C, G} denote the code generated by Construction 6. Then, (i) C is a κ-WMU code. (ii) C is balanced. Proof: (i) Since C2 is a κ-WMU code, property ii) of Lemma 2 ensures that C is also a κ-WMU code. (ii) Since C1 is balanced, property i) of Lemma 2 ensures that C is a balanced binary code. This completes the proof. We discuss next the cardinality of the code C generated by Construction 6. According to Theorem 3, one has |C2 | =  2n . In addition, |C1 | = nn . Hence, the size of C is c2 n−κ+1 2 bounded from below by:  n n n 2 2 c2 . n−κ+1 The following Theorem proves that both Construction 1 and 6 are order optimal, in the sense that they produce codes with cardinality within a constant factor away from the maximal achievable value. Theorem 6. Let ABAL_κ−WMU_q_n denote the maximum size of a balanced κ-WMU code over Fnq , for n ≥ 2 and q ∈ {2, 4}. Then, (i)  n  n n n n 2 n 2 2 2 c2 ≤ ABAL_κ−WMU_4_n ≤ . n−κ+1 n−κ+1 k   j n pairs (a, i1 ) , . . . , a, ib n c ∈ X. are at most n−κ+1 n−κ+1 This implies that  n nn ( 2q )n 2 |X| ≤ . n−κ+1 ( nn2 )( q2 )n Therefore, |C| ≤ n−κ+1 . The lower bound in (i) can be achieved through Construction 6, while the lower bound in (iii) can be met using Construction 1. We complete our discussion by briefly pointing out how to use the balanced MU code Construction 1 to derive a balanced n κ-WMU code C ∈ {A, T, C, G} that has the prefix balancing property with parameter D. For this purpose, we generate C according to the balanced WMU Construction 6. We set C2 = n κ−1 {0, 1} and construct C1 by concatenating C10 ⊆ {0, 1} and n−κ+1 00 0 00 C1 ⊆ {0, 1} . Here, C1 is balanced and C1 is a balanced WMU code with parameter D. It is easy to verify that C is a balanced κ-WMU DNA code with prefix-balancing parameter D and of cardinality n−κ κ−1 ) Dyck( , D) 2n |C| =|C10 | |C100 | |C2 | = A(κ − 1, 2, 2 2     π π 4n tan2 D+1 cosn−κ D+1 ∼ . √ 1 2 π (D + 1) (κ − 1) 2 6. APD-MU C ODES Our next goal is to provide constructions for κ-WMU codes that do not form primer dimer byproducts. We first discuss a construction of binary MU codes with the APD property. Construction 7. (f − APD_MU_2_n) Let n, f, `, p be positive integers such that n = pf and ` + 3 ≤ f2 . Let C = {a1 a2 . . . a2p | a ∈ C1 , a2 , . . . , a2p ∈ C2 } f where C1 ⊆ F22 is the set of binary sequences a = (a1 , . . . , a f ) such that: 2 • • (ii) n ABAL_κ−WMU_2_n ≤ n 2 f  n−κ+1 . (iii) n n 2 n  2(n − 1) ≤ ABAL_MU_2_n ≤ The sequence a starts with 0` 1 and ends with 1; f 2 The substring a`+1 does not contain 0` as a substring, n 2 n  . Proof: To prove the upper bounds, we use the same technique as that described in Theorem 3. Assume that C ⊆ Fnq is a balanced κ-WMU code, for q ∈ {2, 4}, and consider the set X of pairs (a, i) where a ∈ Fnq , i ∈ {1, . . . , n}, and the cyclic shift of the sequence a starting at position i belongs to C. One may easily verify that |X| = n |C|. On the other hand, if (a, i) ∈ X, then a is balanced itself and there are nn ( 2q )n 2 balanced sequences to select from. Moreover, (a, j) ∈ / X, for j ∈ / {i ± 1, . . . , i ± (n − κ)}mod n due to the κ-WMU property. Hence, for a fixed balanced sequence a ∈ Fnq , there and where C2 ⊆ F22 is the set of binary sequences a = (a1 , . . . , a f ) such that: 2 • The sequence a ends with 1; ` • The sequence a contains 01 0 as a substring. ` • The sequence a does not contain 0 as a substring. n Lemma 5. Let C ∈ {0, 1} Construction 7. Then, (i) C is an MU code. (ii) C is an f -APD code. denote the code generated by Proof: The proof follows from two observations, namely (i) The code C satisfies the constraints described in Construction 2, and is hence an MU code. (ii) Any substring of length f of any sequence in C contains an element from C2 as a substring. Hence, any substring of length f in C contains 01` 0 as a substring, and so 10 the reverse and forward complement sequence contains 10` 1. Furthermore, no proper substring of length f in C contains 10` 1 as a substring. Hence, C is also an f -APD code. Next, we use Lemma 1 to derive a lower bound on the size of the codes C1 and C2 in Construction 7, and a lower bound on the size of the code C. First, notice that !   f f f 22 f 22 2 −`−2 ≥ `+2 1 − `+1 , |C1 | ≥ `+2 1 − 2 2` 2 2 which follows from Lemma 1, with n = f2 −`−2, ns = `, t = 1. To bound the cardinality of C2 we define an auxiliary code f C3 ⊆ {0, 1} 2 −`−3 such that sequences in C3 avoid 0`−1 , 1`−1 as a substring. One can once more apply Lemma 1 with n = f 2 − ` − 3, ns = ` − 1, t = 2, to obtain ! f f 4( f2 − ` − 3) 22 22 f |C3 | ≥ `+3 1 − ≥ (1 − `−1 ). 2 2` 2`+3 2 Notice that by inserting 01` 0 into sequences in C3 at any of the f2 − ` − 2 allowed positions, and then appending 1 to the newly obtained sequence, we obtain a subset of C2 of size ( f2 − ` − 2)|C3 |. Therefore,  f  22 f f −`−2 (1 − `−1 ). |C2 | ≥ 2 2`+3 2 For ` = dlog2 (3f )e, one can verify that the size of the code C1 f is within a constant factor of 21 f , and the size of C2 is within f 2 a constant factor of 2 . In the last step, we use the fact that |C| = |C1 ||C2 |2p−1 to show that |C| is within a constant factor n of 2n . Therefore, Construction 7 produces an order-optimal f -APD MU binary codes. The result is summarized in the following theorem. Theorem 7. Let Af−APD_MU_2_n denote the maximum size of an f − APD_MU_2_n code, for positive integers n = pf such that p is a constant factor. Then, there exist constants c3 > 0 such that 2n 2n ≤ Af−APD_MU_2_n ≤ . c3 n n Proof: The lower bound is a direct consequence of Construction 7, while the upper bound follows from Theorem 1, and the fact that any f − APD_MU_2_n code is also an MU_2_n code. 7. APD, BALANCED , E RROR -C ORRECTING AND WMU C ODES In what follows, we describe the main results of our work: Constructions of APD, balanced, error-correcting κ-WMU codes. The gist of our approach is to use the decoupling principle along with a pair of binary codes that satisfy one or two of the desired binary primer constraints in order to obtain a large set of proper address/primer sequences. In addition to constructions based on the decoupling procedure, we introduce a number of other constructions that directly produce the desired q-ary codes with large codebooks, or allow for simple encoding and decoding. Recall Construction 5, which we showed results in an errorcorrecting κ-WMU DNA code. Map the elements in F4 to {A, T, C, G} according to: 0 7→ A, 1 7→ C, ω 7→ T, ω + 1 7→ G, where ω is a primitive element of the field F4 . Let a be a sequence of length n. Then it is straightforward to see that the sequence (a, a + 1n ) is balanced, for 1n = (1, . . . , 1). These observations lead to the simple primer construction described next. Construction 8. (V1 : BAL_2d − HD_κ − WMU_4_n Codes) Let C be an [ n2 , κ − 1, d] cyclic code over F4 that contains the all ones vector 1. Then n {(c + e, c + 1 2 + e) : c ∈ C} is a GC balanced, κ-WMU code with minimum Hamming distance 2d. The next construction follows by invoking the decoupling principle with binary error-correcting WMU codes constructed in Section 4 and codes meeting the bound of Theorem 5. Construction 9. (V2 : BAL_d − HD_κ − WMU_4_n Codes) n Construct a code C ∈ {A, T, C, G} via the decoupled construction of Lemma 2 involving two codes: (i) A balanced code C1 of length n, with minimum Hamming distance d and of size A 2n −CST_d−HD_2_n . n (ii) A κ-WMU code C2 ⊆ {0, 1} of length n and minimum Hamming distance d, described in Section 4. n Lemma 6. Let C ∈ {A, T, C, G} denote the code generated by Construction 9. Then, (i) C is a κ-WMU code. (ii) C is balanced. (iii) The minimum Hamming distance of C is at least d. Example 1. The size of the code C obtained from Construction 9 equals |C| =|C1 | |C2 | 2n A 2n −CST_d−HD_2_n (n − κ + 1) (L0 − L1 − L2 )  n n Ad−HD_2_n 2 ≥ 0.09376 . (n − κ + 1) (L0 − L1 − L2 ) ≥ c2 (10) The last two inequalities follow from the lower bounds of Lemma 4 and Theorem 5, respectively. Figure 2 plots the lower bound on the maximum achievable rate for error-correcting κ-WMU codes (5), balanced errorcorrecting κ-WMU codes (10), and for comparison, the best known linear error-correcting codes over quaternary alphabets. The parameters used are n = 50, κ = 25. The next result shows that Construction 7 may be used to devise sequences that are balanced, MU and do not form any PDs. 11 Error-correcting linear code Error-correcting WMU code Balanced error-correcting WMU code 1.0 Relative rate 0.8 0.6 0.4 0.2 0.0 0 10 20 30 Hamming distance 40 50 Figure 2. Comparison of three different lower bounds for quaternary codes: Balanced error-correcting κ-WMU codes (inequality (10) in Example 1), error-correcting κ-WMU codes (inequality (5) in Theorem 4) and the best known linear error-correcting codes; n = 50, κ = 25. Construction 10. (f − APD_BAL_MU_4_n Codes) Using the decoupled code construction in Lemma 2, a balanced, MU code C ∈ Fn4 that avoids PDs may be obtained by choosing C1 ⊆ Fn2 to be an BAL_2_n code, and C2 ⊆ Fn2 to be an f − APD_MU_2_n code.  It is straightforward to see that |C1 | = nn and that |C2 | ≥ 2 ( nn ) 2n 2n c3 n . Therefore, the size of C is at least c3 2 n . Theorem 8. Let Af−APD_BAL_MU_4_n denote the maximum size of a f − APD_BAL_MU_4_n code. Then  n  n n n n 2 n 2 2 2 c3 ≤ Af−APD_BAL_MU_4_n ≤ . n n Proof: The lower bound is the direct consequence of Construction 10. To prove the upper bound, observe that any f − APD_BAL_MU_4_n code is also a valid BAL_MU_4_n code. The upper bound on the cardinality of an BAL_MU_4_n code may be obtained from the upper bound of Theorem 6, pertaining to a BAL_WMU_4_n code, by setting κ = 1. Next, we discuss an iterative construction based on an APD, balanced, error-correcting and κ-WMU seed code. Construction 11. For a given integer s ≥ 1, let C0 be a set of sequences in Fsq . Let (i) (ii) (iii) (iv) C C C C is 2f -APD if C0 is f -APD. is balanced if C0 is balanced. and C0 have the same minimum Hamming distance. is κ-WMU if C0 is κ-WMU. Proof: (i) Any proper substring of length 2f of any codesequence in C contains a proper substring of length f of a codesequence in C0 . Then, C is 2f -APD if C0 is f -APD. (ii) Codesequences in C form by concatenating codesequences in C0 . If C0 is balanced then each codesequences in C is also balanced. (iii) Again, any two distinct codesequences in C differ in at least one of the concatenated codesequences from C0 . Therefore, C and C0 have identical minimum Hamming distance. (iv) For any pair of not necessarily distinct a, b ∈ C and for κ ≤ l < n, we show that al1 and bnn−l+1 cannot be identical. This establishes that the constructed concate  nated code is WMU. Let l = is + j, where i = sl and 0 ≤ j < s. We consider three different scenarios for the index j: • C = {a1 . . . am | ai ∈ Ci for 1 ≤ i ≤ m} , where the subset codes C1 , . . . , Cm ⊆ C0 are chosen according to: • C1 ∩ C m = ∅ and (C1 ∩ Cm−1 = ∅) or (C2 ∩ Cm = ∅) .. . and (C1 ∩ C2 = ∅) or . . . or (Cm−1 ∩ Cm = ∅). Lemma 7. Let C ⊆ Fnq be a code generated according to the Construction 11. Then • j = 0; In this case, 1 ≤ i < m. Therefore, (C1 ∩ Cm−i+1 = ∅) or . . . or (Ci ∩ C1 = ∅) implies that al1 6= bnn−l+1 . 0 < j < κ; Again, one can verify that 1 ≤ i < m. It is easy to show that al−j l−s+1 is a suffix of length s − j of a sequence in C0 and bn−j n−s+1 is a prefix of length s − j of an element in C0 . Since κ < s − j < s, one n−j l n has al−j l−s+1 6= bn−s+1 . Hence, a1 6= bn−l+1 . l κ ≤ j < s; In this case, al−j+1 is a proper prefix of length j of a sequence in C0 , and bnn−j+1 is a proper suffix of length j of an element in C0 . Since κ ≤ j < s, one has all−j+1 6= bnn−j+1 and al1 6= bnn−l+1 . 12 8. I NFORMATION E NCODING WITH WMU ADDRESSES In order to store user data in DNA, one needs to encode the binary information into relatively short sequences of nucleotide, each of which is equipped with a unique address sequence that satisfies the constraints outlined in the previous section. As already described, in order to enable accurate random access via PCR, the information bearing content of the sequences has to avoid the set of address sequences. This leads to the following problem formulation. Given a set of sequences A ⊆ Fnq , let CA (N ) ⊆ FN q denote another collection of sequences that avoid members of A as substrings, i.e., a 6= bn+i−1 for every a ∈ A, b ∈ CA (N ), i 1 ≤ i ≤ N − n + 1. We refer to A as the set of addresses and CA (N ) as the set of address-avoiding information blocks. We discuss next three different schemes for constructing an information codebook CA (N ) of sequences of length N for particular sets of address sequences A. Let C be an κ-WMU code over Fnq , for κ ≤ n2 , and let A ⊂ C. For a given integer s ≥ 1, let N = s n and define N CA (N ) ⊆ FN q as the collection of all sequences b ∈ Fq of the form b = b1 . . . bs , where bi ∈ C − A, for 1 ≤ i ≤ s. This construction is illustrated in Figure 3. We show next that no b ∈ CA (N ) contains any a ∈ A as a substring. The proof follows by contradiction. Assume that a appears as substring in bi bi+1 , for some 1 ≤ i < s. Since a ∈ A and bi , bi+1 ∈ C − A, a may be written as a = sp, where s is a proper suffix of bi and p is a proper prefix of bi+1 . Then one of the two strings p or s has length greater than or equal to n 2 ≥ κ, which contradicts the fact that C is an κ-WMU code. The previously described construction may be easily extended to obtain error-correcting information blocks CA (N ). We start by identifying a bijection M from C − A to a finite field Fpt with appropriate prime parameter p and t ≥ 1; for this purpose, we expurgate codesequences from the set C so that |C| − |A| = pt . The bijection M is used to convert every sequence b = b1 . . . bs in CA (N ) to a sequence v = v1 . . . vs ∈ Fspt , where vi = M(bi ), for 1 ≤ i ≤ s. The sequence v is encoded using an [r, s, r −s+1]pt Reed-Solomon (RS) error correcting code to arrive at a codesequence w = w1 . . . wr ∈ Frpt , where wi ∈ Fpt for 1 ≤ i ≤ r. Since M is a bijection, one can apply M−1 to w to reconstruct c = c1 . . . cr ∈ Fsq r , where ci = M−1 (wi ), for 1 ≤ i ≤ r. Since c is obtained by concatenating elements from C − A, it is easy to verify that c does not contain any element of A as a substring. Moreover, the RS code guarantees that given a sequence c with at most b r−s 2 c errors, one can still fully recover b. For the second scheme, assume that C1 , C2 ⊆ Fn2 are two disjoint collections of binary sequences of length n such that for all a ∈ C1 , the cyclic shifts of a do not belong to C2 , i.e., for all a ∈ C1 , ani ai−1 ∈ / C2 for all 1 ≤ i ≤ n. 1 Now given C1 and C2 , define the set of addresses A ⊆ F2n 4 as  A = Ψ(c, aa) | a ∈ C1 , c ∈ F2n 2 where Ψ was introduced in (4). To construct CA (N ), let s ≥ 1 be an integer such that N = s n. We define CA (N ) ⊆ FN 4 as the collection of all sequences b = b1 . . . bs ∈ FN 4 where bi ∈ Fn4 that can be written as bi = Ψ(fi , gi ), for some gi ∈ C2 , fi ∈ Fn2 and 1 ≤ i ≤ s. We claim that CA (N ) does not contain any element of A a as substring. If Ψ(c, aa) ∈ A appears as a substring in a sequence b ∈ CA (N ), then there exists an index 1 ≤ i ≤ s − 2 such that Ψ(c, aa) is a substring of bi bi+2 bi+3 . Since Ψ is a bijection one can verify that aa appears as a substring in gi gi+1 gi+2 , for a ∈ C1 and gi , gi+1 , gi+2 ∈ C2 . In addition, C1 ∩ C2 = ∅ implies that aa can be written as aa = sgi+1 p, where s is a proper suffix of gi and p is a proper prefix of gi+2 . It is clear that a = sp and gi+1 = ps; hence, gi+1 ∈ C2 is a cyclic shift of a ∈ C1 , which contradicts the fact that C2 contains no cyclic shifts of elements in C1 . The last information block design scheme we present is endowed with a simple encoding and decoding procedure. Let A ⊆ Fnq be a collection of sequences of length n such that e ∈ / A, where e = (0, . . . , 0, 1). For the purpose of information block encoding, we may assume that A is a κWMU code with desired primer properties, constructed using cyclic error-correcting codes of minimum distance at least three, as described in Constructions 8 and 9. Let N > n N −n+1 and define I , {a|an−1 ∈ Fn−1 , aN }, so that q n ∈ Fq−1 1 |I| = q n−1 (q − 1)N −n+1 . There is an efficient encoding scheme that maps elements of I to a set of sequences CA (N ) of length N that avoid all codesequences in A. Let H be a parity-check matrix of A. Hence, a sequence c belongs to A if and only if cH = 0. Also, since e ∈ / A, one has eH 6= 0. To describe the encoding procedure, we define the following × {0, 1, . . . , q − 2} → Fq . Given a ∈ Fn−1 function φ : Fn−1 q q and 0 ≤ i ≤ q − 2, let an = φ(a, i) be the i smallest element in Fq such that (a, an )H 6= 0. For this function to be welldefined, it suffices to demonstrate that there are at least q − 1 elements in Fq such that appending one of them to a yields a decoding syndrome not equal to 0. Suppose otherwise. Then there exist distinct u, u0 such that (a, u)H = (a, u0 )H = 0. The last equality may be rewritten as (0, u − u0 )H = (u − u0 )eH = 0, contradicting the starting assumption. Encoding a sequence a results in a sequence b obtained by concatenating the following sequences: ( ai if 1 ≤ i ≤ n − 1 bi = i−1 φ(bi−n+1 , ai ), otherwise. It is straightforward to see that sequences obtained via this encoding method avoid all elements of the codebook A. 9. C ONCLUSIONS Motivated by emerging code design problems for DNAbased data storage, we introduced the problem of address/primer sequence design. The address design problem reduces to constructing sequences that satisfy a new form of mutual uncorrelatedness and in addition, are balanced, at sufficient Hamming distance from each other and such that they avoid primer dimers which arise if a substring of an 0𝑙 Avoid 0𝑙 ≠0 ≠0 13 WMU Code Partition Part 1 Address Part 2 Sub-block 1 Sub-block 2 … Figure 3. Concatenation construction for information blocks avoiding κ-WMU primer sequences. The gist of the approach is to use a subset of address sequences for actual addressing, and the remaining sequences as blocks to be concatenated. Table I S UMMARY OF THE OPTIMAL CODE CONSTRUCTIONS FOR VARIOUS CONSTRAINED WMU CODES . Construction No. 1 Name BAL_MU_2_n 2 4 MU_q_n WMU_q_n 6 BAL_κ − WMU_4_n 7 f − APD_MU_2_n 10 f − APD_BAL_MU_4_n Rate n 1 2(n−1) n 2 n cq qn qn cq n−κ+1   n n n 2 2 c2 n−κ+1 n c3 2n  n n n 2 c3 2 n  Features Binary, Balanced, MU Comment q-ary, MU q-ary, κ-WMU q ∈ {2, 4}, c2 = 0.04688, c4 = 0.06152 q ∈ {2, 4}, c2 = 0.04688, c4 = 0.06152 4-ary, Balanced, κ-WMU c2 = 0.04688 Binary, f -APD, MU For some constant c3 > 0 4-ary, f -APD, Balanced, MU For some constant c3 > 0 address sequence is also a substring of the reverse complement sequence of the same or another address sequence. Our main results are listed in Table I. Given the constructed address sequences, we also described information encoding methods for sequences endowed with addresses, such that they avoid any address as a proper substring. This address avoidance property allows one to randomly access desired DNA sequences via simple and inexpensive PCR reactions. R EFERENCES [1] V. Levenshtein, “Decoding automata, invariant with respect to the initial state,” Problemy Kibernet, vol. 12, pp. 125–136, 1964. [2] A. J. De Lind Van Wijngaarden and T. J. Willink, “Frame synchronization using distributed sequences,” Communications, IEEE Transactions on, vol. 48, no. 12, pp. 2127–2138, 2000. [3] D. Bajić and J. Stojanović, “Distributed sequences and search process,” in Communications, 2004 IEEE International Conference on, vol. 1. IEEE, 2004, pp. 514–518. [4] S. Bilotta, E. Pergola, and R. Pinzani, “A new approach to cross-bifixfree sets,” IEEE Transactions on Information Theory, vol. 6, no. 58, pp. 4058–4063, 2012. [5] S. R. Blackburn, “Non-overlapping codes,” IEEE Transactions on Information Theory, vol. 61, no. 9, pp. 4890–4894, 2015. [6] G. M. Church, Y. Gao, and S. Kosuri, “Next-generation digital information storage in DNA,” Science, vol. 337, no. 6102, pp. 1628–1628, 2012. [7] N. Goldman, P. Bertone, S. Chen, C. Dessimoz, E. M. LeProust, B. Sipos, and E. Birney, “Towards practical, high-capacity, lowmaintenance information storage in synthesized DNA,” Nature, 2013. [8] S. Yazdi, Y. Yuan, J. Ma, H. Zhao, and O. Milenkovic, “A rewritable, random-access DNA-based storage system,” Scientific Reports, vol. 5, no. 14138, 2015. [9] S. H. T. Yazdi, R. Gabrys, and O. Milenkovic, “Portable and error-free DNA-based data storage,” Scientific Reports, vol. 7, 2017. [10] H. M. Kiah, G. J. Puleo, and O. Milenkovic, “Codes for DNA sequence profiles,” IEEE Transactions on Information Theory, vol. 62, no. 6, pp. 3125–3146, 2016. [11] R. Gabrys, E. Yaakobi, and O. Milenkovic, “Codes in the Damerau distance for DNA storage,” in Information Theory (ISIT), 2016 IEEE International Symposium on. IEEE, 2016, pp. 2644–2648. [12] R. Gabrys, H. M. Kiah, and O. Milenkovic, “Asymmetric Lee distance codes for DNA-based storage,” IEEE Transactions on Information Theory, 2017. [13] S. Yazdi, H. M. Kiah, E. R. Garcia, J. Ma, H. Zhao, and O. Milenkovic, “DNA-based storage: Trends and methods,” Molecular, Biological, and Multi-Scale Communications, IEEE Transactions on, to appear. [14] S. H. T. Yazdi, R. Gabrys, and O. Milenkovic, “Portable and error-free DNA-based data storage,” bioRxiv, p. 079442, 2016. [15] P. Yakovchuk, E. Protozanova, and M. D. Frank-Kamenetskii, “Basestacking and base-pairing contributions into thermal stability of the DNA double helix,” Nucleic acids research, vol. 34, no. 2, pp. 564–574, 2006. [16] P. M. Vallone, J. M. Butler et al., “AutoDimer: a screening tool for primer-dimer and hairpin structures,” Biotechniques, vol. 37, no. 2, pp. 226–231, 2004. [17] K. A. S. Immink, Codes for mass data storage systems. Shannon Foundation Publisher, 2004. [18] M. Levy and E. Yaakobi, “Mutually uncorrelated codes for DNA storage,” in Information Theory (ISIT), 2017 IEEE International Symposium on. IEEE, 2017, pp. 3115–3119. [19] O. Milenkovic and N. Kashyap, “On the design of codes for DNA computing,” in Coding and Cryptography. Springer, 2006, pp. 100–119. [20] ——, “DNA codes that avoid secondary structures,” in Information Theory, 2005. ISIT 2005. Proceedings. International Symposium on. IEEE, 2005, pp. 288–292. [21] E. Gilbert, “Synchronization of binary messages,” Information Theory, IRE Transactions on, vol. 6, no. 4, pp. 470–477, 1960. [22] L. J. Guibas and A. M. Odlyzko, “Maximal prefix-synchronized codes,” SIAM Journal on Applied Mathematics, vol. 35, no. 2, pp. 401–418, 1978. [23] N. de Bruijn, D. Knuth, and S. Rice, “The average height of planted plane trees,” Graph Theory and Computing/Ed. RC Read, p. 15, 1972. 14 [24] E. N. Gilbert, “A comparison of signalling alphabets,” Bell System Technical Journal, vol. 31, no. 3, pp. 504–522, 1952. [25] R. Varshamov, “Estimate of the number of signals in error correcting codes,” in Dokl. Akad. Nauk SSSR, vol. 117, no. 5, 1957, pp. 739–741. [26] S. Tavares, “A study of synchronization techniques for binary cyclic codes,” Ph.D. dissertation, Thesis (Ph. D.)–McGill University, 1968. [27] L. Gyorfi, J. Massey et al., “Constructions of binary constant-weight cyclic codes and cyclically permutable codes,” IEEE Transactions on Information Theory, vol. 38, no. 3, pp. 940–949, 1992.
7cs.IT
A NEW OUTLOOK ON COFINITENESS KAMRAN DIVAANI-AAZAR, HOSSEIN FARIDIAN AND MASSOUD TOUSI Abstract. Let a be an ideal of a commutative noetherian (not necessarily local) ring arXiv:1701.07716v2 [math.AC] 15 Nov 2017 R. In the case cd(a, R) ≤ 1, we show that the subcategory of a-cofinite R-modules is abelian. Using this and the technique of way-out functors, we show that if cd(a, R) ≤ 1, or dim(R/a) ≤ 1, or dim(R) ≤ 2, then the local cohomology module Hai (X) is a-cofinite for every R-complex X with finitely generated homology modules and every i ∈ Z. We further answer Question 1.3 in the three aforementioned cases, and reveal a correlation between Questions 1.1, 1.2, and 1.3. 1. Introduction Throughout this paper, R denotes a commutative noetherian ring with identity and M(R) flags the category of R-modules. In 1969, Hartshorne introduced the notion of cofiniteness for modules and complexes; see [Ha1]. He defined an R-module M to be a-cofinite if SuppR (M ) ⊆ V(a) and ExtiR (R/a, M ) is finitely generated for every i ≥ 0. Moreover, in the case where R is an a-adically complete regular ring of finite Krull dimension, he defined an R-complex X to be a-cofinite if X ≃  R HomR Y, RΓa (R) for some R-complex Y with finitely generated homology modules. He then proceeded to pose three questions in this direction which we paraphrase as follows. Question 1.1. Is the local cohomology module Hai (M ), a-cofinite for every finitely generated R-module M and every i ≥ 0? Question 1.2. Is the category M(R, a)cof consisting of a-cofinite R-modules an abelian subcategory of M(R)? Question 1.3. Is it true that an R-complex X is a-cofinite if and only the homology module Hi (X) is a-cofinite for every i ∈ Z? By providing a counterexample, Hartshorne showed that the answers to these questions are negative in general; see [Ha1, Section 3]. However, he established affirmative answers to these questions in the case where a is a principal ideal generated by a nonzerodivisor and R is an a-adically complete regular ring of finite Krull dimension, and also in the case where a is a prime ideal with dim(R/a) = 1 and R is a complete regular local ring; see [Ha1, Propositions 6.1 and 6.2, Corollary 6.3, Theorem 7.5, Proposition 7.6 and Corollary 7.7]. Since then many papers are devoted to study his first two questions; see for example [HK], 2010 Mathematics Subject Classification. 13D45; 13D07; 13D09. Key words and phrases. Abelian category; cofinite module; cohomological dimension; derived category; dualizing complex; local cohomology module; local homology module. The research of the first author is supported by a grant from IPM (No. 95130212). 1 2 K. DIVAANI-AAZAR, H. FARIDIAN AND M. TOUSI [DM], [Ka1], [Ka2], [Me1], [Me2]. These results were extended in several stages to take the following form: Theorem 1.4. Let a be an ideal of R such that either ara(a) ≤ 1, or dim(R/a) ≤ 1, or dim(R) ≤ 2. Then Hai (M ) is a-cofinite for every finitely generated R-module M and every i ≥ 0, and M(R, a)cof is an abelian subcategory of M(R). For the case ara(a) ≤ 1, refer to [Ka2, Theorem 1] and [Ka1, Theorem 2.1]. For the case dim(R/a) ≤ 1, see [Me1, Theorem 2.6 and Corollary 2.12], [BNS, Corollary 2.8], and [BN, Corollary 2.7]. For the case dim(R) ≤ 2, observe [Me2, Theorem 7.10] and [Me2, Theorem 7.4]. The significance of cofiniteness of the local cohomology modules mainly stems from the fact that if an R-module M is a-cofinite, then its set of associated primes is finite as well as all its Bass numbers and Betti numbers with respect to every prime ideal of R. It is worth mentioning that the investigation of such finiteness properties is a long-sought problem in commutative and homological algebra; see e.g. [HS] and [Ly]. In this paper, we deal with the above three questions. Theorems 2.2, 3.3, 3.5 and 4.3 are our main results. In [PAB, Question 1], the authors asked: Is M(R, a)cof an abelian subcategory of M(R) for every ideal a of R with cd(a, R) ≤ 1? We answer this question affirmatively by deploying the theory of local homology; see Theorem 2.2. Note that there exists an inequality cd(a, R) ≤ ara(a) that can be strict; see Example 2.3. It turns out that to establish the cofiniteness of Hai (X) for any R-complex X with finitely generated homology modules, all we need to know is the cofiniteness of Hai (M ) for any finitely generated R-module M and the abelianness of M(R, a)cof ; see Theorem 3.3. The crucial step to achieve this is to recruit the technique of way-out functors. To be consistent in both module and complex cases, we define an R-complex X to be a-cofinite if SuppR (X) ⊆ V(a) and R HomR (R/a, X) has finitely generated homology modules. Corollary 4.2 indicates that, for homologically bounded R-complexes, this definition coincides with that of Hartshorne. Questions 1.1 and 1.2 have been high-profile among researchers, whereas not much attention has been brought to Question 1.3. The most striking result on this question is [EK, Theorem 1] which confines itself to complete Gorenstein local domains and the case dim(R/a) = 1. We answer Hartshorne’s third question in the cases cd(a, R) ≤ 1, dim(R/a) ≤ 1, and dim(R) ≤ 2 with no extra assumptions on R; see Corollary 3.6 (ii). Having the results thus far obtained at our disposal, we show that the answers to Questions 1.1 and 1.2 are affirmative if and only if the answer to Question 1.3 is affirmative for all homologically bounded R-complexes; see Theorem 4.3. 2. Question 1.2 We need to work in the framework of the derived category D(R). For more information, refer to [AF], [Ha2], [Fo], [Li], and [Sp]. We let D❁ (R) (res. D❂ (R)) denote the full subcategory of D(R) consisting of R-complexes X with Hi (X) = 0 for i ≫ 0 (res. i ≪ 0), and let D (R) := D❁ (R) ∩ D❂ (R). We further A NEW OUTLOOK ON COFINITENESS 3 let Df (R) denote the full subcategory of D(R) consisting of R-complexes X with finitely generated homology modules. We also feel free to use any combination of the subscripts f and the superscript as in D (R), with the obvious meaning of the intersection of the two subcategories involved. Lemma 2.1. Let a be an ideal of R and X ∈ D (R). Then the following conditions are equivalent: f (i) R HomR (R/a, X)  ∈ D (R). ba . (ii) LΛa (X) ∈ Df R  Proof. See [WW, Propositions 7.4].  In this section, we show that given an ideal a of R with cd(a, R) ≤ 1, the subcategory M(R, a)cof of M(R) is abelian. This fact is proved in [PAB, Theorem 2.4], under the extra assumption that R is local. Here we relax this assumption. The tool here is the local homology functors. Recall that the local homology functors are the left derived functors of the completion  ca = functor. More precisely, Hia (−) := Li Λa (−) for every i ≥ 0, where Λa (M ) := M lim(M/an M ) for any R-module M . Further, we remind the cohomological dimension of M ← − n with respect to a as n o cd(a, M ) := sup i ∈ Z Hai (M ) 6= 0 . Theorem 2.2. Let a be an ideal of R. Then the following assertions hold: (i) An R-module M with SuppR (M ) ⊆ V (a) is a-cofinite if and only if Hia (M ) is a ba -module for every 0 ≤ i ≤ cd(a, R). finitely generated R (ii) If cd(a, R) ≤ 1, then M(R, a)cof is an abelian subcategory of M(R). Proof. (i): By [GM, Theorem 2.5 and Corollary 3.2], Hia (M ) = 0 for every i > cd(a, R). Therefore, the assertion follows from Lemma 2.1. (ii): Let M and N be two a-cofinite R-modules and f : M → N an R-homomorphism. The short exact sequence (2.2.1) 0 → ker f → M → im f → 0, gives the exact sequence H0a (M ) → H0a (im f ) → 0, ba -module since H a (M ) is so. The which in turn implies that H0a (im f ) is finitely generated R 0 short exact sequence (2.2.2) 0 → im f → N → coker f → 0, gives the exact sequence (2.2.3) H1a (N ) → H1a (coker f ) → H0a (im f ) → H0a (N ) → H0a (coker f ) → 0. ba -modules, the exact sequence As H0a (N ), H0a (im f ), and H1a (N ) are finitely generated R a a b a -modules, and (2.2.3) shows that H (coker f ) and H (coker f ) are finitely generated R 0 1 thus coker f is a-cofinite by (i). From the short exact sequence (2.2.2), we conclude that 4 K. DIVAANI-AAZAR, H. FARIDIAN AND M. TOUSI im f is a-cofinite, and from the short exact sequence (2.2.1), we infer that ker f is a-cofinite. It follows that M(R, a)cof is an abelian subcategory of M(R).  It is well-known that cd(a, R) ≤ ara(a). On the other hand, the following example shows that an ideal a of R with cd(a, R) = 1 need not have ara(a) = 1. Hence Theorem 2.2 (ii) genuinely generalizes Theorem 1.4. Example 2.3. Let k be a field and S = k[[X, Y, Z, W ]]. Consider the elements f = XW − Y Z, g = Y 3 − X 2 Z, and h = Z 3 − Y 2 W of S. Let R = S/f S, and a = (f, g, h)S/f S. Then R is a noetherian local ring of dimension 3, cd(a, R) = 1, and ara(a) ≥ 2. See [HeSt, Remark 2.1 (ii)]. 3. Question 1.3 In this section, we exploit the technique of way-out functors as the main tool to depart from modules to complexes. Definition 3.1. Let R and S be two rings, and F : D(R) → D(S) a covariant functor. We say that (i) F is way-out left if for every n ∈ Z, there is an m ∈ Z, such that for any R-complex X with sup X ≤ m, we have sup F (X) ≤ n. (ii) F is way-out right if for every n ∈ Z, there is an m ∈ Z, such that for any R-complex X with inf X ≥ m, we have inf F (X) ≥ n. (iii) F is way-out if it is both way-out left and way-out right. The Way-out Lemma appears in [Ha2, Ch. I, Proposition 7.3]. However, we need a refined version which is tailored to our needs. Since the proof of the original result in [Ha2, Ch. I, Proposition 7.3] is left to the reader, we deem it appropriate to include a proof of our refined version for the convenience of the reader as well as bookkeeping. Lemma 3.2. Let R and S be two rings, and F : D(R) → D(S) a triangulated covariant functor. Let A be an additive subcategory of M(R), and B an abelian subcategory of M(S)  which is closed under extensions. Suppose that Hi F (M ) ∈ B for every M ∈ A and every i ∈ Z. Then the following assertions hold:  (i) If X ∈ D (R) with Hi (X) ∈ A for every i ∈ Z, then Hi F (X) ∈ B for every i ∈ Z. (ii) If F is way-out left and X ∈ D❁ (R) with Hi (X) ∈ A for every i ∈ Z, then  Hi F (X) ∈ B for every i ∈ Z. (iii) If F is way-out right and X ∈ D❂ (R) with Hi (X) ∈ A for every i ∈ Z, then  Hi F (X) ∈ B for every i ∈ Z.  (iv) If F is way-out and X ∈ D(R) with Hi (X) ∈ A for every i ∈ Z, then Hi F (X) ∈ B for every i ∈ Z. Proof. (i): Let s = sup(X). Since amp(X) < ∞, we argue by induction on n = amp(X). If n = 0, then X ≃ Σs Hs (X). Therefore,      Hi F (X) ∼ = Hi−s F Hs (X) ∈ B, = Hi F Σs Hs (X) ∼ A NEW OUTLOOK ON COFINITENESS 5 as Hs (X) ∈ A. Now, let n ≥ 1 and assume that the result holds for amplitude less than n. Since X ≃ Xs⊂ , there is a distinguished triangle (3.2.1) Σs Hs (X) → X → Xs−1⊂ → . It is clear that the two R-complexes Σs Hs (X) and Xs−1⊂ have all their homology modules in A are less the induction hypothesis implies that  than n. Therefore,  and their amplitudes   s Hi F Σ Hs (X) ∈ B and Hi F Xs−1⊂ ∈ B for every i ∈ Z. Applying the functor F to the distinguished triangle (3.2.1), we get the distinguished triangle  F Σs Hs (X) → F (X) → F (Xs−1⊂ ) →, which in turn yields the long exact homology sequence     · · · → Hi+1 F (Xs−1⊂ ) → Hi F Σs Hs (X) → Hi F (X) →    Hi F (Xs−1⊂ ) → Hi−1 F Σs Hs (X) → · · · . We break the displayed part of the above exact sequence into the following exact sequences    Hi+1 F (Xs−1⊂ ) → Hi F Σs Hs (X) → K → 0,  0 → K → Hi F (X) → L → 0,    0 → L → Hi F (Xs−1⊂ ) → Hi−1 F Σs Hs (X) . Since the subcategory B is abelian, we conclude from the first and the third exact sequences above that K, L ∈ B. Since B is closed under extensions, the second exact sequence above  implies that Hi F (X) ∈ B for every i ∈ Z. (ii): Let i ∈ Z. Since F is way-out left, we can choose an integer j ∈ Z corresponding to i − 1. Apply the functor F to the distinguished triangle X⊃j+1 → X → Xj⊂ →, to get the distinguished triangle F (X⊃j+1 ) → F (X) → F (Xj⊂ ) → . From the associated long exact homology sequence, we get     0 = Hi+1 F (Xj⊂ ) → Hi F (X⊃j+1 ) → Hi F (X) → Hi F (Xj⊂ ) = 0, where the vanishing is due to the choice of j. Since X⊃j+1 ∈ D (R) with Hi (X⊃j+1 ) ∈ A  for every i ∈ Z, it follows from (i) that Hi F (X⊃j+1 ) ∈ B for every i ∈ Z, and as a  consequence, Hi F (X) ∈ B for every i ∈ Z. (iii): Given i ∈ Z, choose the integer j corresponding to i + 1. The rest of the proof is similar to (ii) using the distinguished triangle X⊃j → X → Xj−1⊂ → . (iv): Apply the functor F to the distinguished triangle X⊃1 → X → X0⊂ →, to get the distinguished triangle F (X⊃1 ) → F (X) → F (X0⊂ ) → . 6 K. DIVAANI-AAZAR, H. FARIDIAN AND M. TOUSI Since X0⊂ ∈ D❁ (R) and X⊃1 ∈ D❂ (R) with Hi (X0⊂ ), Hi (X⊃1 ) ∈ A for every i ∈ Z, we   deduce from (ii) and (iii) that Hi F (X0⊂ ) , Hi F (X⊃1 ) ∈ B for every i ∈ Z. Using the  associated long exact homology sequence, an argument similar to (i) yields that Hi F (X) ∈ B for every i ∈ Z.  The next result provides us with a suitable transition device from modules to complexes when dealing with cofiniteness. Theorem 3.3. If a is an ideal of R, then the functor RΓa (−) : D(R) → D(R) is triangulated and way-out. As a consequence, if Hai (M ) is a-cofinite for every finitely generated R-module M and every i ≥ 0, and M(R, a)cof is an abelian category, then Hai (X) is a-cofinite for every X ∈ Df (R) and every i ∈ Z. Proof. By [Li, Corollary 3.1.4], the functor RΓa (−) : D(R) → D(R) is triangulated and way-out. Now, let A be the subcategory of finitely generated R-modules, and let B := M(R, a)cof . It can be easily seen that B is closed under extensions. It now follows from   Lemma 3.2 that Hai (X) = H−i RΓa (X) ∈ B for every X ∈ Df (R) and every i ∈ Z. Lemma 3.4. Suppose that R admits a dualizing complex D, and a is an ideal of R. Further, f f suppose that Hai (Z) is a-cofinite for every Z ∈ D❁ (R) and every i ∈ Z. Let Y ∈ D❂ (R),  and X := R HomR Y, RΓa (D) . Then Hi (X) is a-cofinite for every i ∈ Z. f Proof. Set Z := R HomR (Y, D). Then clearly, Z ∈ D❁ (R). Let Č(a) denote the Čech complex on a sequence of elements a = a1 , ..., an ∈ R that generates a. For any R-complex W , [Li, Proposition 3.1.2] yields that RΓa (W ) ≃ Č(a) ⊗L R W . Now, by applying the Tensor Evaluation Isomorphism, we get the following display:  X = R HomR Y, RΓa (D) ≃ Č(a) ⊗L R R HomR (Y, D) ≃ Č(a) ⊗L RZ ≃ RΓa (Z). Hence Hi (X) ∼ = Ha−i (Z) for every i ∈ Z, and so and the conclusion follows.  The next result answers Hartshorne’s third question. Theorem 3.5. Let a be an ideal of R and X ∈ D❁ (R). Then the following assertions hold: (i) If Hi (X) is a-cofinite for every i ∈ Z, then X is a-cofinite. (ii) Assume that R admits a dualizing complex D, a is contained in the Jacobson radical f of R, and Hai (Z) is a-cofinite for every Z ∈ D❁ (R) and every i ∈ Z. If X is a-cofinite in the sense of Hartshorne, then Hi (X) is a-cofinite for all i ∈ Z. Proof. (i) Suppose that Hi (X) is a-cofinite for all i ∈ Z. The spectral sequence  2 Ep,q = ExtpR R/a, H−q (X) ⇒ Extp+q R (R/a, X) p 2 from the proof of [Ha1, Proposition 6.2], together with the assumption that Ep,q is finitely generated for every p, q ∈ Z, conspire to imply that Extp+q R (R/a, X) is finitely generated. A NEW OUTLOOK ON COFINITENESS 7 On the other hand, one has SuppR (X) ⊆ [ SuppR (Hi (X)) ⊆ V(a). i∈Z Thus X is a-cofinite. (ii) Suppose that X is a-cofinite in the sense of Hartshorne. Then by definition, there  is Y ∈ Df (R) such that X ≃ R HomR Y, RΓa (D) . Now, the Affine Duality Theorem [Li, Theorem 4.3.1] implies that  ba Y ⊗L R R ≃ R HomR X, RΓa (D) .  Since idR (RΓa (D)) < ∞ and X ∈ D❁ (R), we conclude that R HomR X, RΓa (D) ∈ b a : M(R) −→ M(R) is faithfully flat, it turns out that D❂ (R). As the functor − ⊗R R f Y ∈ D❂ (R). Now, the claim follows by Lemma 3.4.  Corollary 3.6. Let a be an ideal of R such that either cd(a, R) ≤ 1, or dim R/a ≤ 1, or dim(R) ≤ 2. Then the following assertions hold: (i) Hai (X) is a-cofinite for every X ∈ Df (R) and every i ∈ Z. (ii) Assume that R admits a dualizing complex D and a is contained in the Jacobson radical of R. If X ∈ D❁ (R) is a-cofinite in the sense of Hartshorne, then Hi (X) is a-cofinite for all i ∈ Z. Proof. (i) Follows from Theorem 1.4, [Me2, Corollary 3.14], Theorem 2.2 (ii) and Theorem 3.3. (ii) Follows by (i) and Theorem 3.5 (ii).  4. Correlation between Questions 1.1, 1.2 and 1.3 In this section, we probe the connection between Hartshorne’s questions as highlighted in the Introduction. Some special cases of the following result is more or less proved in [PSY, Theorem 3.10 and Proposition 3.13]. However, we include it here with a different and shorter proof due to its pivotal role in the theory of cofiniteness. Lemma 4.1. Let a be an ideal of R and X ∈ D (R). Then the following assertions are equivalent: (i) R HomR (R/a, X) ∈ Df (R).   f ba . (ii) RΓa (X) ≃ RΓa (Z) for some Z ∈ D R    f b a , provided that R ba enjoys (iii) RΓa (X) ≃ R HomRba Y, RΓa (D) for some Y ∈ D R a dualizing complex D.   f ba . Then by [AJL, Corollary Proof. (i) ⇒ (ii): By Lemma 2.1, Z := LΛa (X) ∈ D R after (0.3)∗ ], we have  RΓa (Z) ≃ RΓa LΛa (X) ≃ RΓa (X). (ii) ⇒ (iii): Set Y := R HomRba (Z, D). If idRba (D) = n, then there is a semi-injective ≃ resolution D − → I of D such that Ii = 0 for every i > sup D or i < −n. In particular, I 8 K. DIVAANI-AAZAR, H. FARIDIAN AND M. TOUSI   f ba -complex Z ′ such ba , so there is a bounded R is bounded. On the other hand, Z ∈ D R that Z ≃ Z ′ . Therefore, Y = R HomRba (Z, D) ≃ R HomRba (Z ′ , D) ≃ HomRba (Z ′ , I).   f ba . But it is obvious that HomRba (Z ′ , I) is bounded, so Y ∈ D R Now, let Č(a) denote the Čech complex on a sequence of elements a = a1 , ..., an ∈ R that generates a. We have RΓa (X) ≃ RΓa (Z)    ≃ RΓa R HomRba R HomRba (Z, D), D   ≃ RΓa R HomRba (Y, D) ≃ Č(a) ⊗L ba (Y, D) R R HomR   ≃ R HomRba Y, Č(a) ⊗L D R  ≃ R HomRba Y, RΓa (D) . ba -module, and the fifth The second isomorphism is due to the fact that D is a dualizing R isomorphism follows from the application of the Tensor Evaluation Isomorphism. The other isomorphisms are straightforward. (iii) ⇒ (i): Similarto  the argument of the implication (ii) ⇒ (iii), we conclude that f a b R HomRba (Y, D) ∈ D R . We further have  LΛa (X) ≃ LΛa RΓa (X)   ≃ LΛa R HomRba Y, RΓa (D)    ≃ LΛa RΓa R HomRba (Y, D)   ≃ LΛa R HomRba (Y, D)   f ba . ≃ R HomRba (Y, D) ∈ D R The first and the fourth isomorphisms use [AJL, Corollary after (0.3)∗ ], the third isomorphism follows from the application of the Tensor Evaluation Isomorphism just as in the previous paragraph, and the fifthisomorphism follows from [PSY, Theorem 1.21], noting that f b a -modules. ba , its homology modules are a-adically complete R as R HomRba (Y, D) ∈ D R Now, the results follows from Lemma 2.1.  Corollary 4.2. Let a be an ideal of R for which R is a-adically complete and X ∈ D (R). Then the following assertions are equivalent: (i) X is a-cofinite. f (ii) X ≃ RΓa (Z) for some Z ∈ D (R).  f (R), provided that R enjoys a dualizing (iii) X ≃ R HomR Y, RΓa (D) for some Y ∈ D complex D. A NEW OUTLOOK ON COFINITENESS 9 f Proof. For any two R-complexes V ∈ D (R) and W ∈ D (R), one may easily see that   SuppR R HomR V, RΓa (W ) ⊆ V (a). Also, for any U ∈ D(R), [Li, Corollary 3.2.1] yields that SuppR (U ) ⊆ V (a) if and only if RΓa (U ) ≃ U . Hence the assertions follow from Lemma 4.1.  The next result reveals the correlation between Hartshorne’s questions. Theorem 4.3. Let a be an ideal of R. Consider the following assertions: (i) Hai (M ) is a-cofinite for every finitely generated R-module M and every i ≥ 0, and M(R, a)cof is an abelian subcategory of M(R). (ii) Hai (X) is a-cofinite for every X ∈ Df (R) and every i ∈ Z. (iii) An R-complex X ∈ D (R) is a-cofinite if and only if Hi (X) is a-cofinite for every i ∈ Z. Then the implications (i) ⇒ (ii) and (iii) ⇒ (i) hold. Furthermore, if R is a-adically complete, then all three assertions are equivalent. Proof. (i) ⇒ (ii): Follows from Theorem 3.3. (iii) ⇒ (i): Let M be a finitely generated R-module. Since Hai (M ) = 0 for every i < 0 or i > ara(a), we have RΓa (M ) ∈ D (R). However, [Li, Proposition 3.2.2] implies that  R HomR R/a, RΓa(M ) ≃ R HomR (R/a, M ), showing that RΓa (M ) is a-cofinite. The hypothesis now implies that Hai (M ) =  H−i (RΓa M ) is a-cofinite for every i ≥ 0. Now, let M and N be two a-cofinite R-modules and f : M → N an R-homomorphism. 1M f Let ϕ : M → N be the morphism in D(R) represented by the roof diagram M ←−− M − → N. From the long exact homology sequence associated to the distinguished triangle ϕ (4.3.1) we deduce that SuppR M− → N → Cone(f ) →,  Cone(f ) ⊆ V(a). In addition, applying the functor R HomR (R/a, −) to (4.3.1), gives the distinguished triangle  R HomR (R/a, M ) → R HomR (R/a, N ) → R HomR R/a, Cone(f ) →, whose associated long exact homology sequence shows that  R HomR R/a, Cone(f ) ∈ Df (R). Hence, the R-complex Cone(f ) is a-cofinite. However, we have f Cone(f ) = · · · → 0 → M − → N → 0 → ··· ,  so Cone(f ) ∈ D (R). Thus the hypothesis implies that Hi Cone(f ) is a-cofinite for every i ∈ Z. It follows that ker f and coker f are a-cofinite, and as a consequence M(R, a)cof is an abelian subcategory of M(R). Now, suppose that R is a-adically complete. (ii) ⇒ (iii): Let X ∈ D (R). Suppose that Hi (X) is a-cofinite for every i ∈ Z. Then Theorem 3.5 (i) yields that X is a-cofinite. 10 K. DIVAANI-AAZAR, H. FARIDIAN AND M. TOUSI Conversely, assume that X is a-cofinite. Then by Corollary 4.2, X ≃ RΓa (Z) for some f Z ∈ D (R). Thus the hypothesis implies that is a-cofinite for every i ∈ Z.  Hi (X) ∼ = Hi RΓa (Z) = Ha−i (Z)  In view of Corollary 4.2, the next result answers Hartshorne’s third question for homologically bounded R-complexes. Corollary 4.4. Let a be an ideal of R for which R is a-adically complete. Suppose that either cd(a, R) ≤ 1, or dim(R/a) ≤ 1, or dim(R) ≤ 2. Then an R-complex X ∈ D (R) is a-cofinite if and only if Hi (X) is a-cofinite for every i ∈ Z. Proof. Obvious in light of Corollary 3.4 and Theorem 4.3.  Acknowledgement . The authors are deeply grateful to Professor Robin Hartshorne for his invaluable comments on an earlier draft of this paper. References [AJL] L. Alonso Tarrı́o, A. Jeremı́as López and J. Lipman, Local homology and cohomology on schemes, Ann. Sci. École Norm. Sup., (4), 30(1), (1997), 1-39. [AF] L. Avramov and H-B. Foxby, Homological dimensions of unbounded complexes, J. Pure Appl. Algebra, 71(2-3), (1991), 129-155. [BNS] K. Bahmanpour, R. Naghipour and M. Sedghi, On the category of cofinite modules which is abelian, Proc. Amer. Math. Soc., 142(4), (2014), 1101-1107. [BN] K. Bahmanpour and R. Naghipour, Cofiniteness of local cohomology modules for ideals of small dimension, J. Algebra, 321(7), (2009), 1997-2011. [DM] D. Delfino and T. Marley, Cofinite modules and local cohomology, J. Pure Appl. Algebra, 121(1), (1997), 45-52. [EK] K. Eto and K. Kawasaki, A characterization of cofinite complexes over complete Gorenstein domains, J. Commut. Algebra, 3(4), (2011), 537-550. [Fo] H-B. Foxby, Hyperhomological algebra and commutative rings, notes in preparation. [GM] J. P. C. Greenlees and J. P. May, Derived functors of I-adic completion and local homology, J. Algebra, 149(2), (1992), 438-453. [Ha1] R. Hartshorne, Affine duality and cofiniteness, Invent. Math., 9, (1969/1970), 145-164. [Ha2] R. Hartshorne, Residues and duality, Lecture notes in mathematics, 20, (1966). [HeSt] M. Hellus and J. Strükard, Local cohomology and Matlis duality, Univ. Iagel. Acta Math., 45, (2007), 63-70. [HK] G. Huneke and J. Koh, Cofiniteness and vanishing of local cohomology modules, Math. Proc. Camb. Phil. Soc., 110(3), (1991), 421-429. [HS] G. Huneke and R.Y. Sharp, Bass numbers of local cohomology modules, Trans. Amer. Math. Soc., 339(2), (1993), 765-779. [Ka1] K. Kawasaki, On the category of cofinite modules for principal ideals, Nihonkai Math. J., 22(2), (2011), 67-71. [Ka2] K. Kawasaki, Cofiniteness of local cohomology modules for principal ideals, Bull. London Math. Soc., 30(3), (1998), 241-246. [Li] J. Lipman, Lectures on local cohomology and duality, Local cohomology and its applications, Lecture notes in pure and applied mathematics, 226, (2012), Marcel Dekker, Inc. [Ly] G. Lyubeznik, Finiteness properties of local cohomology modules (an application of D-modules to commutative algebra), Invent. Math., 113(1), (1993), 41-55. A NEW OUTLOOK ON COFINITENESS 11 [Me1] L. Melkersson, Cofiniteness with respect to ideals of dimension one, J. Algebra, 372, (2012), 459-462. [Me2] L. Melkersson, Modules cofinite with respect to an ideal, J. Algebra, 285(2), (2005), 649-668. [PAB] G. Pirmohammadi, K. Ahmadi Amoli and K. Bahmanpour, Some homological properties of ideals with cohomological dimension one, Colloq. Math., to appear. [PSY] M. Porta, L. Shaul and A. Yekutieli, Cohomologically cofinite complexes, Comm. Algebra, 43(2), (2015), 597-615. [Sp] N. Spaltenstein, Resolutions of unbounded complexes, Compositio Math., 65(2), (1988), 121-154. [WW] S. Sather-Wagstaff and R. Wicklein, Support and adic finiteness for complexes, Comm. Algebra, 45(6), (2017), 2569-2592. K. Divaani-Aazar, Department of Mathematics, Alzahra University, Vanak, Post Code 19834, Tehran, Iran-and-School of Mathematics, Institute for Research in Fundamental Sciences (IPM), P.O. Box 19395-5746, Tehran, Iran. E-mail address: [email protected] H. Faridian, Department of Mathematics, Shahid Beheshti University, G.C., Evin, Tehran, Iran, Zip Code 1983963113. E-mail address: [email protected] M. Tousi, Department of Mathematics, Shahid Beheshti University, G.C., Evin, Tehran, Iran, P.O. Box 19395-5746. E-mail address: [email protected]
0math.AC
Sync-DRAW: Automatic Video Generation using Deep Recurrent Attentive Architectures Gaurav Mittal∗ [email protected] Tanya Marwah∗ IIT Hyderabad [email protected] Vineeth N Balasubramanian IIT Hyderabad [email protected] arXiv:1611.10314v4 [cs.CV] 21 Oct 2017 ABSTRACT This paper introduces a novel approach for generating videos called Synchronized Deep Recurrent Attentive Writer (Sync-DRAW). SyncDRAW can also perform text-to-video generation which, to the best of our knowledge, makes it the first approach of its kind. It combines a Variational Autoencoder (VAE) with a Recurrent Attention Mechanism in a novel manner to create a temporally dependent sequence of frames that are gradually formed over time. The recurrent attention mechanism in Sync-DRAW attends to each individual frame of the video in sychronization, while the VAE learns a latent distribution for the entire video at the global level. Our experiments with Bouncing MNIST, KTH and UCF-101 suggest that Sync-DRAW is efficient in learning the spatial and temporal information of the videos and generates frames with high structural integrity, and can generate videos from simple captions on these datasets.1 CCS CONCEPTS •Computing methodologies → Computer vision; Neural networks; KEYWORDS Deep Learning, Video Generation, Text-to-Video Generation 1 INTRODUCTION Over the years, several generative methods have been proposed to capture and model the latent representations of high-dimensional data such as images and documents. In recent years, with the success of deep learning methods, Variational Auto-Encoders (VAEs) [11] and Generative Adversarial Networks (GANs)[4] have emerged to be the most promising deep learning-based generative methods for performing tasks such as image generation [6, 16]. Existing efforts (discussed in Section 2) in the last couple of years have primarily focused on generation of images using the aforementioned methods, by modeling the spatial characteristics of a given training dataset [6, 15, 24], as well as extending these methods to more novel applications such as adding texture/style to images [3]. However, there has been very little effort in the ∗ Equal Contribution in ACM Multimedia 2017 to be held at Mountain View, CA, USA. 1 Accepted Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. MM’17, October 23–27, 2017, Mountain View, CA, USA. © 2017 ACM. ISBN 978-1-4503-4906-2/17/10. . . $15.00 DOI: http://dx.doi.org/10.1145/3123266.3123309 Figure 1: Videos generated automatically by proposed SyncDRAW for Single-Digit Bouncing MNIST, Two-Digit Bouncing MNIST, and KTH Dataset. automated generation of videos. While there have been a few efforts in video prediction [22], the recent work by Vondrick et al. [25] was the first to generate videos in an unsupervised manner using GANs. Despite acceptable performance, the generated videos had several drawbacks, as highlighted later in this work. Our work is an attempt to provide a different perspective to video generation using VAEs, which overcomes a few drawbacks of [25]; and more importantly, provides a methodology to generate videos from captions for the first time. We propose a novel network called Sync-DRAW, which uses a recurrent VAE to automatically generate videos. It utilizes a local attention mechanism which attends to each frame individually in ‘synchronization’ and hence, the name Sync-DRAW (Synchronized Deep Recurrent Attentive Writer). Our experiments show that the proposed attention mechanism in Sync-DRAW plays a significant role in generating videos that maintain the structure of objects to a large extent. Sync-DRAW also takes a step further by learning to associate videos with captions, and thus learning to generate videos from just text captions. To the best of our knowledge, this work is the first effort to generate video sequences from captions, and is also the first to generate videos using VAEs. Figure 1 shows examples of video frames generated by trained Sync-DRAW models on different datasets. The key contributions of this paper lie in: (i) the design of an efficient and effective deep recurrent attentive architecture to generate videos that preserves the structural integrity of objects in each frame; (ii) the adaptation of the proposed architecture to generate videos from just text captions; and (iii) a comprehensive review and experimental study of video generations on datasets of varying complexity. We now discuss earlier efforts related to this work. 2 BACKGROUND AND RELATED WORK In order to effectively generate meaningful structured data such as an image, a learning model should be capable of learning the latent representations for the given data, thus explaining the success of deep architectures [1], which are today synonymous with representation learning, as generative models. Initial efforts in generating such data using deep architectures were based on Deep Belief Networks [7] and Deep Boltzmann Machines [18], which contained many layers of latent variables and millions of parameters. However, their overwhelming dependence on Markov Chain Monte Carlo-based sampling methods made them difficult to scale. Over the last few years, newer deep learning approaches such as Generative Adversarial Networks (GANs) [4] and Variational AutoEncoders (VAEs) [11] have been proven to perform quite effectively on generative tasks, and have been shown to scale to large datasets. The Deep Recurrent Attentive Writer (DRAW) [6] was the earliest work to utilize a Recurrent-VAE (R-VAE) to learn to generate images by progressively refining an image canvas over time using a sequence of samples generated from a learnt distribution. DRAW further combines this R-VAE with an attention mechanism [14], which allows the generated image to focus on certain parts of the image at each timestep. This notion of attention resembles human visual perception, and has been used recently for related applications such as generating captions for images [27] or even generating images from captions [15, 17]. However, spatial attention differs from spatiotemporal attention, and there has been very little effort on using spatio-temporal latent representations to generate image sequences or videos, which we address in this work. Further, to the best of our knowledge, there has been no prior work in text-to-video generation, which is one of the key objectives of this work. The state-of-the-art in the domain of video generation is a recently proposed method called VGAN by Vondrick et al. [25], which attempts to generate videos using a spatio-temporal GAN. This GAN employs a two-stream strategy with one stream focusing on the foreground, and another on the static background. While the method delivers promising results, closer observation shows that its generations are fairly noisy as well as lack ‘objectness’ (the structural integrity of the object), as shown in Section 4.7. In this work, we propose a new and different perspective to video generation based on Recurrent VAEs (instead of GANs), which uses a novel attention mechanism to generate videos. We show in this work that the videos generated by the proposed approach are perceived well by human users, as well as maintain the objects’ structural integrity to a significant extent on visual inspection. Moreover, we extend the R-VAE to perform text-to-video generation, which to the best of our knowledge, is the first effort to do so. Other efforts that can be considered as related to the proposed work include efforts in the unsupervised domain that have attempted the task of video prediction (predict a future frame given a video sequence). One of the first efforts in this regard, [22], seeks to learn unsupervised video representations using Long Short-Term Memory units (LSTMs) [8] to predict future frames in videos. However, such efforts are fundamentally different from the objectives of this work, since they do not attempt to generate complete videos from scratch. We now present the proposed methodology. 3 SYNC-DRAW METHODOLOGY Simply speaking, a video sequence can be perceived as comprising of objects undergoing/performing action(s) across multiple frames over a background. Hence, we primarily require our model to: (i) generate a video sequence; (ii) model individual objects in the video sequence; and (iii) capture the motion of the objects in the sequence. To generate a video as a combination of several objects and to model their motion separately, it seems intuitive to generate the video incrementally with the network focusing and forming objects one at a time. A recurrent visual attention mechanism can prove to be an effective tool to attend to relevant parts of a video sequence, thus allowing the network to learn latent representations of coherent parts of spatio-temporal data (objects). A video comprises of unique artifacts that are not associated with images (such as camera motion, e.g, zoom in/out), which have hitherto not been considered in image generation efforts. We hence propose a new read/write attention mechanism which operates at a frame level, and uses a grid of Gaussian filters with learnable variance and stride in each frame, which allows the network to automatically learn coherent regions of video sequences (inspired from [5, 6]). We also use a Recurrent VAE (R-VAE), which has been used for image generation in [6] (but not video generation), to embed this frame-wise attention mechanism and generate a video over a set of time steps. A trivial approach to extend the way R-VAE is used for image generation in [6] to video generation would be to have a separate R-VAE for generating each frame. However, such an approach ignores the temporal relationship between frames, and the number of parameters to be learnt across the VAEs may explode exponentially with increasing number of frames. Therefore, to learn the video data distribution efficienctly but effectively, the proposed SyncDRAW uses a single R-VAE for the entire video (Figure 2). This global R-VAE, firstly, allows us to model the temporal relationships between the generated video frames. Secondly, it also allows us to condition the generation of the video on captions to effectively perform text-to-video generation (this would not have been easy if we trivially extended the image R-VAE to videos). Moreover, while it is possible to define attention as a spatio-temporal cuboid (3-D grid of Gaussian filters) across frame blocks, we instead define a separate individual attention mechanism for each frame of a video, each of which acts simultaneously across all frames, so as to learn latent spatio-temporal representations of video data. We found this proposed strategy of using a global R-VAE with a local frame-wise attention mechanism to be key in the results that we obtained. This approach introduces smoothness in the characteristics of objects across the frames in comparison to 3-D spatio-temporal approaches [25], which seem to have jitters in the generations, as highlighted in the experiments section (Section 4). 3.1 Sync-DRAW Architecture Let X = {x 1 , x 2 , · · · , x N } be a video comprising of frames x i , i = 1, · · · , N where N is the number of frames in the video. Let the dimensions for every frame be denoted by A × B. We generate X over T timesteps, where at each timestep t, canvases for all frames are generated in synchronization. The Sync-DRAW architecture comprises of: (i) a read mechanism which takes a region of interest (RoI) from each frame of the video; (ii) the R-VAE, which is responsible to learn a latent distribution for the videos from these RoIs; t=1 t=2 t=T (c11, c12,..., c1n) (c21, c22,..., c2n) write, wt ... LSTMdec S Skip-Thought Vectors (Pre-Trained) SKpre "Digit 0 is moving up and down" h1dec z1 Q(Z1|X) S LSTMenc h 1 read, rt ... (x1, x2,..., xN) write, wt ... write, wt ... LSTMdec LSTMdec z2 2|X, Z1) Q(Z dec h1enc (cT1, cT2,..., cTn) ... LSTMenc read, rt read, rt ... (x1, x2,..., xN) X - input GIF (b) P(X|Z1..T) zT Q(ZT|X, Z1..T-1) LSTMenc ... (x1, x2,..., xN) σ(CT) Generated GIF (a) (c) Figure 2: Sync-DRAW architecture. (a) The read-write mechanisms and the R-VAE; (b) Conditioning the R-VAE’s decoder on text features extracted from captions for text-to-video generation; (c) Canvases generated by Sync-DRAW over time (each row is a video at a particular time step, last row is the final generated video). and (iii) a write mechanism which generates a canvas focusing on a RoI (which can be different from the reading RoI) for each frame. During training, at each time step, a RoI from each frame of the original video is extracted using the read mechanism and is fed to the R-VAE to learn the latent distribution, Z , of the video data. Then, a random sample from this distribution, Z , is used to generate the frames of the video using the frame-wise write mechanisms. At test time, the read mechanism and the encoder of the R-VAE are removed; and at each time step, a sample is drawn from the learned Z distribution to generate a new video through the write mechanism. We now describe each of these components. 3.1.1 Read Mechanism. The read attention mechanism in SyncDRAW is responsible for reading a region of interest (RoI) from each frame x i at every timestep t. As mentioned earlier, the RoI is defined by a K × K grid of Gaussian filters, where the grid’s center, grid’s stride and the Gaussian’s variance (which is the same across all grid points) are all learned while training the network. Varying these learned parameters allows us to vary the RoI read at every time step. In particular, due to the separability of the 2-D Gaussian filter, the RoI patch is read by dynamically computing 1-D Gaussian filters Fitp and Fitq , which correspond to a set of size K (a user-defined parameter for the grid size) of 1 × A and 1 × B-dimensional Gaussian filters respectively, for each frame x i at timestep t, with ip and iq being the two spatial dimensions of frame x i . (For convenience, we will refer to Fitp and Fitq as being of sizes K ×A and K ×B respectively.) These filters are evaluated together on a K ×K grid which defines the RoI of the frame to attend to. In order to compute these filters, we learn a set of read attention parameters for each frame: д̃itp , д̃itq , σit , δ˜it , βit where i ∈ {1, · · · , N }. д̃itp and д̃itq correspond to the grid center coordinates along the two frame dimensions respectively; and δ˜it corresponds to the stride between the points in the grid. Evidently, we propose to learn a separate set of these parameters for each frame in the video. In order to ensure that these parameters lie within the frame dimensions, they are slightly modified using: дitp = A+1 t B+1 t (д̃ip + 1); дitq = (д̃i q + 1) 2 2 max(A, B) − 1 ˜t δi N −1 These new parameters дitp and дitq are then used to calculate the centers for the horizontal and vertical filterbanks using: δit = µ itp = дitp + (u − N /2 − 0.5)δit (1) µ itq v (2) u = дitq + (v − N /2 − 0.5)δit for u, v ∈ {1, · · · , K }. σit serves as the standard deviation for all filterbanks at timestep t on x i , the i th frame. Fitp and Fitq are then obtained finally as follows: Fitp [u, a] = Fitq [v, b]  (a − µ it )2  1 pu exp − Zip 2(σit )2  (b − µ it )2  1 qv exp − = Ziq 2(σit )2 (3) (4) where a ∈ {1, · · · , A}, b ∈ {1, · · · , B}, u, v ∈ {1, · · · , K } and Z ip , Z i q are the normalization constants. The last parameter, βit , allows the network to learn the temporal relationships between the patches read from the frames. It lets the model decide the level of importance to be given to each frame for generating the video at any time step. Before feeding to the R-VAE, the patch read from each frame of the input video is scaled by its respective βit , i ∈ {1, · · · , N } as follows: read(x i ) = βit (Fitp )x i (Fitq )T (5) where read(x i ) is of size K × K. This learned set of parameters, β, allows Sync-DRAW to selectively focus on one (or a subset) of frames of the video at a given timestep if required.2 3.1.2 R-VAE. The R-VAE is responsible to generate the video sequence by sampling from the latent distribution learnt by the VAE at each time step. The core components of a standard R-VAE are the encoder LSTM, LST Menc (which outputs henc ), the latent representation, Z , and the decoder LSTM, LST Mdec (which outputs hdec ) [2]. The R-VAE runs for T time steps (user-defined) and generates a set of canvases C t = {c 1t , c 2t , · · · , c tN } at every timestep t, where σ (C t ) is the video generated after t timesteps. Since the R-VAE works at the global video level, the canvases for all the frames in the video are generated in synchronization, which by our observation, preserve the inter-frame temporal relationships. At every t, we define a new quantity, X̂ t , which represents the video-level error, as follows: X̂ t = X − σ (C t −1 ) t hdec is used to compute the write attention mechanism parameters as described below. We note that the read attention parameters t −1 and the input X , at time t are learned as a linear function of hdec whose weights are learned during training in the read block. 3.1.3 Write Mechanism. As part of the write mechanism, we need two things per frame: what to write, and where to write. The former is obtained using an attention window, w t , which is t , whose weights are learnt computed as a linear function of hdec during training. The attention window is, once again, defined by an equivalently similar set of parameters as the read mechanism, t t −1 and X which are now computed using hdec (as against using hdec for the read parameters). Next, similar to the read mechanism, a set of filterbanks Fˆitp and Fˆitq are computed using these write attention parameters, defining the RoI to be attended to while writing into each frame. Finally, the canvas c it corresponding to every frame i at time step t is created as follows: 1 ˆt T t ˆt t (Fip ) w i (Fi q ) write(hdec )= (9) βˆt i = c it −1 t + write(hdec ) (10) The canvasses are accumulated over timesteps T, denoted by cT and the final video generated is computed as σ (cT ). By using 2σ , 3.1.4 Sync-DRAW with captions. To generate videos from captions, we use a pre-trained model of skip-thought vectors, SKpr e [13], and pass the caption, Y , through this model to generate a latent representation for the caption, S. S = SKpr e (Y ) (11) We then condition LST Menc and LST Mdec on S [20] to modify equations 7 and 8, and generate corresponding hidden representations as: (6) where σ is the sigmoid function, and X is the input video. The LSTM-encoder at time t is then processed as follows:   −1  t t −1  htenc = LST Menc htenc , R , hdec (7)   t with r t = [read(x ), read(x̂ t )]. h t where R t = r 1t , r 2t , · · · , r N i enc i i is then used to estimate the parameters of latent variable Z t , which  characterizes the approximate posterior Q Z t |htenc that captures the latent representation. This is done using the reparameterization  technique described in [12]. A sample z t ∼ Q Z t |htenc is then t : obtained and fed to the LSTM-decoder, LST Mdec , producing hdec   t t −1 t hdec = LST Mdec hdec ,z (8) c it sigmoid function over cT , we can consider the output as the emission probabilities making it equivalent to P(X |Z 1 ...T ). In Figure 2, the final arrow is used to represent the connection between the technical implementation of the algorithm and the mathematical interpretation of the underlying model. δ̃ , and β are defined in the logarithm scale to ensure that values are always positive. htenc = t hdec =   −1  t t −1  LST Menc htenc , R , hdec , S   t −1  t  LST Mdec hdec , z ,S (12) (13) At test time, when the R-VAE’s encoder and read mechanisms are removed, a caption Y is provided as input to the R-VAE’s decoder to condition the generation on the given caption, Y . 3.1.5 Loss function. The loss function for Sync-DRAW is composed of two types of losses (similar to a standard VAE [12]), both of which are computed at the video level. The first is the reconstruction loss, L X , computed as the binary pixel-wise cross-entropy loss between the original video X and the generated video, σ (CT ). The second is the KL-divergence loss, L Z , defined between a latent prior P(Z t ) and Q(Z t |htenc ) ∼ N (µ t , (σ t )2 ) and summed over all T timesteps. We assume prior P(Z t ) as a standard normal distribution and thus, L Z is given by: ! T 1 Õ 2 2 2 LZ = µ + σt − log σt − T /2 (14) 2 t =1 t The final loss is the sum of the two losses, L X and L Z . 3.1.6 Testing. During the testing phase, the encoder is removed from Sync-DRAW and due to the reparametrization trick of the VAE [12], z is sampled from N (0, I ), scaled and shifted by the learned µ t and (σ t )2 , to generate the final videos. 4 EXPERIMENTS AND RESULTS We studied the performance of Sync-DRAW on the following datasets with varying complexity: (i) Single-Digit Bouncing MNIST (which has been used in similar earlier efforts [9, 22, 26]), (ii) Two-digit Bouncing MNIST; and (iii) KTH Human Action Dataset [19]. Figure 3 shows sample videos from these datasets. Considering this is the first work in text-to-video and there is no dataset yet for such a work, we chose these datasets since they provide different complexities, and also allow for adding captions3 . We manually created text captions for each of these datasets (described later) to demonstrate Sync-DRAW’s ability to generate videos from captions. We varied the number of timesteps T and K for read and write attention parameters across the experiments based on the size of the 3 The codes, the captioned datasets and other relevant materials are available at https: //github.com/Singularity42/Sync-DRAW Figure 3: A few sample videos from each of the dataset used for evaluation. (a) Single-Digit Bouncing MNIST. (b) TwoDigit Bouncing MNIST. (c) KTH Dataset. frame and complexity of the dataset (grayscale or RGB). Stochastic Gradient Descent with Adam [10] was used for training with initial learning rate as 10−3 , β 1 as 0.5 and β 2 as 0.999. Additionally, to avoid gradient from exploding, a threshold of 10.0 was used. 4.1 Baseline Methodology For performance comparison and to highlight the significance of having a separate set of attention parameters for each frame of the video, we designed another methodology to extend [6] to generate videos, by modeling attention parameters as spatio-temporal cuboids and adding a set of filterbanks F Zt of size K × N to operate over the temporal dimension (in addition to the two filterbanks in the spatial dimensions). We use this methodology as our baseline for comparison. We tried on several settings of parameters and present the best results for the baseline methodology in this paper. Figure 4: Single-Digit Bouncing MNIST results for (a) Baseline method and (b) Sync-DRAW 4.2 Results on Single-Digit Bouncing MNIST As in earlier work [9, 22, 26], we generated the Single-Digit Bouncing MNIST dataset by having the MNIST handwritten digits move over time across the frames of the sequence (Figure 3a). Each video contains 10 frames each of size 64 × 64 with a single 28 × 28 digit either moving left and right or up and down. The initial position Figure 5: Two-Digit Bouncing MNIST results for (a) Baseline method and (b) Sync-DRAW for the digit in each video is chosen randomly in order to increase variation among the samples. The training set contains 12, 000 such videos. The results of Sync-DRAW on Single Digit MNIST are shown in Figures 2(c) and 4(b). The figures illustrate the usefulness of the proposed methodology in gracefully generating the final video as a sequence of canvases. When compared to the baseline methodology results, as shown in Figure 4(a), the quality of the generated digits is clearly superior with the digits having well-defined structure and boundaries. An interesting observation in Figure 2(c) is that while each frame has its own attention mechanism in the proposed framework, it can be seen that the same region of the digit is being attended to at every timestep t, even though they are present at different pixel locations in each frame, thus validating the proposed approach to video generation. 4.3 Results on Two-Digit Bouncing MNIST Extending the Bouncing MNIST dataset, we generated the twodigit Bouncing MNIST dataset where two digits move independent of one another, either up and down or left and right, as shown in Figure 3(b). The dataset consists of a training set of 12, 000 videos, with each video containing 10 frames of size 64 × 64 with two 28 × 28 digits. In order to ensure variability, the initial positions for both the digits were chosen randomly. In case of an overlap, the intensities are added, clipping the sum if it goes beyond 1. The results of applying Sync-DRAW to this two-digit Bouncing MNIST dataset are shown in Figures 5(b) and 6(a). Once again, the baseline method performs rather poorly as shown in Figure 5(a). Figure 6(a) also shows that Sync-DRAW attends to both the digits at every time step simultaneously. In the initial time steps, a single structure is formed which then breaks down to give the two digits in the subsequent time steps. We believe that this is the reason that though the generated digits have a well defined structure and a boundary, they are still not as clear as when compared to results on SingleDigit Bouncing MNIST. We infer that there is a need for a “stimulus” for attention mechanism to know that there are two digits that need to be attended to. This claim is substantiated in subsequent sections where we include alignment with captions in Sync-DRAW, giving the attention mechanism this required stimulus. 4.4 Results on KTH dataset We evaluated the performance of Sync-DRAW on the KTH Human Action Database [19] to benchmark the approach on a more real Figure 6: (a) Sync-DRAW results on Two-Digit Bouncing MNIST; (b) Sync-DRAW results on Two-Digit Bouncing MNIST videos when captions are included. Clearly, captions improve generation of ‘objectness’ of the digits. Figure 7: Videos generated by Sync-DRAW for KTH Human Action Dataset without captions. dataset. We chose KTH dataset over other video datasets such as UCF as the videos from KTH were accompanied with metadata which helped us to create meaningful captions for the videos and experiment Sync-DRAW with captions on this dataset. The KTH dataset consists of over 2000 videos of 25 subjects performing six different actions - walking, running, jogging, hand-clapping, hand-waving and boxing. We resized the frames to 120 × 120 and performed generation for 10 frames. Given the complexity of the scene and increased frame size, we increased K to 12 and T to 32 to obtain videos with better resolution. Figure 7 shows some test videos generated for the KTH dataset. The clarity of the person in the generated scenes suggests that Sync-DRAW is able to perform equally well on a real-world dataset. 4.5 Figure 8: Sync-DRAW generates videos from just captions on the Single-Digit Bouncing MNIST: Results above were automatically generated by the trained model at test time. Sync-DRAW with captions As discussed in Section 3.1.4, the proposed Sync-DRAW methodology can be used to generate videos from captions. 4.5.1 Single-Digit Bouncing MNIST. For every video in the bouncing MNIST dataset, a sentence caption describing the video was included in the dataset. For Single-Digit Bouncing MNIST, the concomitant caption was of the form ’digit 0 is moving left and right’ or ’digit 9 is moving up and down’. Hence, for the single-digit dataset, we have 20 different combinations of captions. In order to challenge Sync-DRAW, we split our dataset in such a way that for all the digits, the training and the test sets contained different motions Figure 9: Sync-DRAW generates videos from just captions on the Two-Digit Bouncing MNIST: Results above were automatically generated by the trained model at test time. for the same digit, i.e. if a digit occurs with the motion involving up and down in the training set, the caption for the same digit with the motion left and right (which is not used for training) is used in the testing phase. Figure 8 shows some of the videos generated from captions present in the test set. It can be observed that even though the caption was not included in the training phase, Sync-DRAW the spatial and temporal relationships to be learned at the global level (called Global in table below). The results are presented in Table 1. From the losses, we can clearly infer that Sync-DRAW performs significantly better than the other two approaches. Figure 10: Sync-DRAW generates videos from just captions on KTH dataset. is able to capture the implicit alignment between the caption, the digit and the movement fairly well. 4.5.2 Two-Digit Bouncing MNIST. We conducted similar experiments for the Two-Digit Bouncing MNIST, where the captions included the respective motion information of both the digits, for example ’digit 0 is moving up and down and digit 1 is moving left and right’. Figure 9 shows the results on this dataset, which are fairly clear and good on visual inspection (we show quantitative results later in Section 4.6). Interestingly, in Figure 6(b), we notice that when Sync-DRAW is conditioned on captions, the quality of the digits is automatically enhanced, as compared to the results in Section 4.3 (Figure 6(a)). These results give the indication that in the absence of captions (or additional stimuli), the attention mechanism in Sync-DRAW focuses on a small patch of a frame at a time, but possibly ignores the presence of different objects in the scene and visualizes the whole frame as one entity. However, by introducing captions, the attention mechanism receives the much needed “stimulus” to differentiate between the different objects and thereby cluster their generation, resulting in videos with better resolution. This is in concurrence with the very idea of an attention mechanism, which when guided by a stimulus, learns the spatio-temporal relationships in the video in a significantly better manner. 4.5.3 KTH Dataset. As mentioned in Section 4.4, we were able to generate descriptive captions for the videos in the KTH dataset by using the metadata which included the person and the corresponding action. We carried out our experiments on videos for walking and running as it further helped to deterministically introduce the notion of direction. Some examples of the captions are ’person 1 is walking right to left’ and ’person 3 is running left to right’. Figure 10 shows some of the videos generated by Sync-DRAW using just the captions for KTH dataset. The generated videos clearly demonstrate Sync-DRAW’s ability to learn the underlying representation of even real-world videos and create high quality videos from text. 4.6 Quantitative analysis 4.6.1 Reconstruction Loss. While quantitative analysis is difficult in image/video generation methods (due to lack of ground truth for the generations), we analyzed the quality of the videos generated by Sync-DRAW by computing the Negative Log Likelihood (NLL) of the generated samples (as recommended by Theis et al. in [23] for evaluating generative models). We compared the NLL values at convergence against the baseline approach, and a setup where, instead of a hierarchical approach, we allowed both Experiments One Digit MNIST One Digit MNIST* Two Digit MNIST Two Digit MNIST* Sync-DRAW Global Baseline 340.39 500.01 3561.23 327.11 512.46 3478.26 639.71 899.06 5240.65 524.41 860.54 5167.94 Table 1: Negative Log Likelihoods at convergence for SyncDRAW, Baseline and Global methods. * = with captions (Lower is better). 4.6.2 Psychophysical Analysis. In order to quantify the visual quality of the generated videos, we further performed a psychophysical analysis where we asked a group of human subjects to rate the videos generated by Sync-DRAW for different datasets. 37 subjects (each ignorant of this work) were given a set of 10 generated videos from each experiment we conducted with Sync-DRAW, and were asked to rate the perceived visual quality of a video on a scale of 1 − 10 (with 10 being the highest score, and also corresponded to the score for original videos from the respective datasets shown to the subjects). The statistics of this analysis are presented in Tables 2 and 3. It can be observed that the average rating for Single-Digit Bouncing MNIST (with and without captions), Two-Digit Bouncing MNIST (with captions) and KTH (with captions) is very high which correlates well with the qualitative results. The scores for Two-Digit Bouncing MNIST and KTH without captions were slightly lower (although not unacceptable) due to the reduction in clarity. Generations on these datasets, however, improved with the availability of a stimulus in the form of captions (as explained before in Figure 6). 4.7 Qualitative comparison with VGAN [25] To compare our results with the recently proposed VGAN method in [25], which is the only earlier effort for video generation from scratch, we ran a comprehensive set of experiments. We first studied the performance of VGAN’s [25] code on the Bouncing MNIST dataset. In order to align with VGAN’s requirements, we modified the Bouncing MNIST dataset to comprise of videos containing 32 Datasets One Digit MNIST Two Digit MNIST KTH Dataset Avg. Video Quality Score 9.37 ± 0.63 7.86 ± 0.75 7.27 ± 0.80 Table 2: Average score ± Standard Deviation given to the videos generated by Sync-DRAW without captions for different datasets. Baseline: low score (2.7 ± 0.53) for all datasets. Datasets One Digit MNIST Two Digit MNIST KTH Dataset Avg. Video Quality Score 9.43 ± 0.60 8.97 ± 0.83 9.10 ± 0.77 Table 3: Average score ± Std Deviation given to videos generated by Sync-DRAW with captions for different datasets. Figure 11: Qualitative comparison of video generation on MNIST dataset between VGAN and Sync-DRAW. First 10 frames generated by both approaches are shown for brevity. Figure 13: Qualitative comparison of video generation on UCF101 dataset between VGAN and Sync-DRAW. The first 10 frames generated by both approaches are shown here for brevity. On the right, a sample frame of each video is shown magnified for better comparison. Figure 12: Qualitative comparison of video generation on dataset in [25] between VGAN and Sync-DRAW. (a) depicts the videos generated by VGAN model we trained. (b) depicts the videos generated by Sync-DRAW. The first 10 frames generated by both approaches are shown here for brevity. frames in RGB, and then trained VGAN on this modified Bouncing MNIST dataset. To ensure an equitable comparison, we ran SyncDRAW on the same dataset as well (note that our earlier results had different settings on this dataset). The results of the experiments are shown in Figure 11. Next, we ran Sync-DRAW on the dataset made available in VGAN’s work [25]. We changed Sync-DRAW’s parameters to support generation of videos containing 32 frames. The results can be seen in Figure 12. Lastly, in order to have a fair comparison, we ran both the codes on a dataset that they were never run on before, the UCF-101 dataset [21]. Each video in the training dataset from UCF-101 contained 32 colored frames. 4 These results can be seen in Figure 13. From our experiments, we notice that there are significant differences between Sync-DRAW and VGAN results. While VGAN gives an overall semblance of sharper generations, on closer look, the generations are noisy with poor objectness. (While [25] reported 4 VGAN [25] uses UCF-101 to show their network’s capability to learn representations for action classification but has shown no generation result on UCF-101 results that look better, we found this to be true on closer observation for many results there too). On the other hand, Sync-DRAW’s generations have a smoothness to them and are fairly noise-free in comparison, although they are a bit blurry. The results of VGAN on Bouncing MNIST highlight this issue of poor objectness further. Similar observations can also be made on the results generated from training on VGAN [25]’s own dataset. The results on UCF-101 serve as a fair comparison between the two methods because of the lack of any bias in the dataset used to train the two models. We also conducted a psychophysical analysis on the videos generated by VGAN, and found the scores on VGAN to be comparable to that of Sync-DRAW. Sharpening the generations of Sync-DRAW on real-world datasets, while maintaining its overall smoothness, is an important direction of our future work. 5 CONCLUSION AND FUTURE WORK This paper presents Sync-DRAW, a new approach to automatically generate videos using a Variational Auto-Encoder and a Recurrent Attention Mechanism combined together. We demonstrate Sync-DRAW’s capability to generate increasingly complex videos starting from Single-Digit Bounding MNIST to more complex videos from KTH and UCF101 datasets. We show that our approach gives adequate focus to the objects via the attention mechanism and generates videos that maintain the structural integrity of objects. We also demonstrated Sync-DRAW’s ability to generate videos using just captions, which is the first of its kind. As evident from the results, our approach is highly promising in the domain of video generation. Our ongoing/future efforts are aimed at improving the quality of the generated videos by reducing blurriness and generating videos from even more complex captions. REFERENCES [1] Yoshua Bengio. 2009. Learning deep architectures for AI. Foundations and trends® in Machine Learning 2, 1 (2009), 1–127. [2] Otto Fabius and Joost R van Amersfoort. 2014. Variational recurrent autoencoders. arXiv preprint arXiv:1412.6581 (2014). [3] Leon A Gatys, Alexander S Ecker, and Matthias Bethge. 2015. A neural algorithm of artistic style. arXiv preprint arXiv:1508.06576 (2015). [4] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in Neural Information Processing Systems. 2672–2680. [5] Alex Graves, Greg Wayne, and Ivo Danihelka. 2014. Neural turing machines. arXiv preprint arXiv:1410.5401 (2014). [6] Karol Gregor, Ivo Danihelka, Alex Graves, Danilo Jimenez Rezende, and Daan Wierstra. 2015. DRAW: A recurrent neural network for image generation. arXiv preprint arXiv:1502.04623 (2015). [7] Geoffrey E Hinton, Simon Osindero, and Yee-Whye Teh. 2006. A fast learning algorithm for deep belief nets. Neural computation 18, 7 (2006), 1527–1554. [8] Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735–1780. [9] Samira Ebrahimi Kahou, Vincent Michalski, and Roland Memisevic. 2015. RATM: Recurrent Attentive Tracking Model. arXiv preprint arXiv:1510.08660 (2015). [10] Diederik Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In International Conference on Learning Representations (ICLR). [11] Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. International Conference on Learning Representations (2013). [12] Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013). [13] Ryan Kiros, Yukun Zhu, Ruslan R Salakhutdinov, Richard Zemel, Raquel Urtasun, Antonio Torralba, and Sanja Fidler. 2015. Skip-thought vectors. In Advances in neural information processing systems. 3294–3302. [14] Hugo Larochelle and Geoffrey E Hinton. 2010. Learning to combine foveal glimpses with a third-order Boltzmann machine. In Advances in neural information processing systems. 1243–1251. [15] Elman Mansimov, Emilio Parisotto, Jimmy Lei Ba, and Ruslan Salakhutdinov. 2016. Generating images from captions with attention. International Conference on Learning Representations (2016). [16] Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. International Conference on Learning Representations (2015). [17] Scott Reed, Zeynep Akata, Xinchen Yan, Lajanugen Logeswaran, Bernt Schiele, and Honglak Lee. 2016. Generative adversarial text to image synthesis. In Proceedings of The 33rd International Conference on Machine Learning, Vol. 3. [18] Ruslan Salakhutdinov and Geoffrey E Hinton. 2009. Deep Boltzmann Machines.. In AISTATS, Vol. 1. 3. [19] Christian Schuldt, Ivan Laptev, and Barbara Caputo. 2004. Recognizing human actions: A local SVM approach. In Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on, Vol. 3. IEEE, 32–36. [20] Kihyuk Sohn, Honglak Lee, and Xinchen Yan. 2015. Learning structured output representation using deep conditional generative models. In Advances in Neural Information Processing Systems. 3483–3491. [21] Khurram Soomro, Amir Roshan Zamir, and Mubarak Shah. 2012. UCF101: A dataset of 101 human actions classes from videos in the wild. arXiv preprint arXiv:1212.0402 (2012). [22] Nitish Srivastava, Elman Mansimov, and Ruslan Salakhutdinov. 2015. Unsupervised learning of video representations using LSTMs. In International Conference on Machine Learning (ICML). [23] Lucas Theis, Aäron van den Oord, and Matthias Bethge. 2015. A note on the evaluation of generative models. arXiv preprint arXiv:1511.01844 (2015). [24] Aaron van den Oord, Nal Kalchbrenner, and Koray Kavukcuoglu. 2016. Pixel Recurrent Neural Networks. arXiv preprint arXiv:1601.06759 (2016). [25] Carl Vondrick, Hamed Pirsiavash, and Antonio Torralba. 2016. Generating videos with scene dynamics. In Advances In Neural Information Processing Systems. 613– 621. [26] SHI Xingjian, Zhourong Chen, Hao Wang, Dit-Yan Yeung, Wai-kin Wong, and Wang-chun Woo. 2015. Convolutional LSTM network: A machine learning approach for precipitation nowcasting. In Advances in Neural Information Processing Systems. 802–810. [27] Kelvin Xu, Jimmy Ba, Ryan Kiros, Kyunghyun Cho, Aaron Courville, Ruslan Salakhudinov, Rich Zemel, and Yoshua Bengio. 2015. Show, Attend and Tell: Neural Image Caption Generation with Visual Attention. In Proceedings of the 32nd International Conference on Machine Learning (ICML-15). 2048–2057.
7cs.IT
Optimal rates of estimation for multi-reference alignment Afonso S. Bandeira∗ , Philippe Rigollet† , and Jonathan Weed‡ arXiv:1702.08546v1 [math.ST] 27 Feb 2017 Courant Institute of Mathematical Sciences, New York University Massachusetts Institute of Technology Massachusetts Institute of Technology Abstract. This paper describes optimal rates of adaptive estimation of a vector in the multi-reference alignment model, a problem with important applications in fields such as signal processing, image processing, and computer vision, among others. We describe how this model can be viewed as a multivariate Gaussian mixture model under the constraint that the centers belong to the orbit of a group. This enables us to derive matching upper and lower bounds that feature an interesting dependence on the signal-to-noise ratio of the model. Both upper and lower bounds are articulated around a tight local control of KullbackLeibler divergences that showcases the central role of moment tensors in this problem. AMS 2000 subject classifications: Primary Statistics; secondary Invariant Theory, Signal Processing. Key words and phrases: Multi-reference alignment, Orbit retrieval, Mixtures of Gaussians. 1. INTRODUCTION The multi-reference alignment problem and its variants arise in various scientific and engineering applications such as structural biology [SVN+ 05, TS12, Sad89], image recognition [Bro92], and signal processing [ZvdHGG03]. A striking feature of this class of problems is that each observation is not only observed in a noisy setting but is also altered by an latent transformation that reflects underlying heterogeneity of the data. The precise nature of this transformation depends on the specific application, but it can often be characterized as the action of the unknown element of a known group. 1.1 The multi-reference alignment problem Consider the multi-reference alignment problem on IRd under cyclic shifts [BCSZ14]. The goal in this problem is to produce an estimate of a vector θ ∈ IRd (of∗ Part of this work was done while A. S. Bandeira was with the Mathematics Department at MIT and supported by NSF Grant DMS-1317308. † This work was supported in part by NSF CAREER DMS-1541099, NSF DMS-1541100, DARPA W911NF-16-1-0551, ONR N00014-17-1-2147 and a grant from the MIT NEC Corporation. ‡ This work was supported in part by NSF Graduate Research Fellowship DGE-1122374. 1 2 BANDEIRA, RIGOLLET AND WEED ten thought of as a signal) from noisy cyclic shifted observations. More concretely, one observes n independent random vectors Y1 , . . . , Yn ∈ IRd given by Yi = R`i θ + σξi , where `i is an unknown parameter (shift) in [d] := {1, . . . , d}; R`i is a latent cyclic shift by `i coordinates: the jth coordinate of R`i θ ∈ IRd is given by R`i θ)j = θj+`i (mod d) ; and ξi ∼ N (0, Id ), i.i.d. Note that R`i is a linear operator from IRd to IRd that can be represented by a matrix. For example when d = 3, we have       0 1 0 0 0 1 1 0 0 R1 =  0 0 1  , R2 =  1 0 0  , and R3 =  0 1 0  1 0 0 0 1 0 0 0 1 However, since cyclic shifts in IRd form a group isomorphic to quotient ring Zd := Z/dZ of integers modulo d, we write R`i ∈ Zd for simplicity. The action of Zd on IRd also has a simple representation in the Fourier domain, where the group acts on the phases of the Fourier coefficients. Denoting by θ̂ the discrete Fourier transform of the vector θ, we obtain that the rotated vector R` θ satisfies (1.1) 2πj`i/d d R θ̂j ` θj = e for −bd/2c ≤ j ≤ dd/2e. In practical applications, the signal θ arises as the discretization of some underlying continuous signal. Therefore, instead of focusing on the group Zd , we consider instead the action of the circle group U (1) of unit-norm complex numbers, where given z ∈ U (1) we define the operator Rz on IRd by its action on the Fourier transform θ̂: (1.2) j d R z θ j = z θ̂j for −bd/2c ≤ j ≤ bd/2c. We define the group of such operators by F and call Rz a fractional cyclic shift. We assume throughout that d is odd, since for real signals not all fractional cyclic shifts are well defined when j = d/2. This group is both slightly easier to analyze and better corresponds to the situation in practice. Moreover, a comparison of Equations 1.1 and 1.2 shows when d is large the groups Zd and F are essentially equivalent. For the sake of exposition, in the sequel, we will focus on F and omit the adjective “fractional” when referring to shifts. Multi-reference alignment is directly used in structural biology [Dia92, TS12]; radar [ZvdHGG03]; crystalline simulations [SSK13]; and image registration in a number of important contexts, such as in geology, medicine, and paleontology [SSK13, FZB02]. As a result, variants of this problem for groups other than F have received some attention, but rarely in statistics. We note parallel research efforts that have investigated a Boolean version of this problem [APS17]. Another important related problem is that of molecule reconstruction in CryoElectron Microscopy (Cryo-EM). Cryo-EM is an important technique used to determine three-dimensional structures of biological macromolecules. (It was considered the Nature method of the year in 2015 [Edi15, Nog15]). As in the multireference alignment problem described above, one of the main difficulties with this imaging technique is that these molecules are imaged at different unknown orientations and each molecule can only be imaged once due to the destructive nature of the process. More precisely, each measurement consists of a tomographic projection of a rotated (by an unknown rotation in SO(3)) copy of OPTIMAL RATES FOR MRA 3 the molecule. The task is then to reconstruct the molecule density from many such measurements. This reconstruction problem has also received significant attention, primarily from computational perspectives, but its statistical properties remain largely unexplored. We present in this paper the first statistical analysis for Euclidean MRA and describe natural classes of signals whose complexity spans the spectrum of statistical rates achievable in this context. Although we focus on F or its subgroups rather than SO(3), the two frameworks share many features. In particular, our results exhibit non-trivial minimax rates that are inherent to this class of problems. 1.2 The Synchronization Approach The difficulty of the multi-reference alignment problem resides in the fact that both the signal θ ∈ IRd and the shifts z1 , . . . , zn ∈ F are unknown and the latter are therefore latent variables. If the shifts were known, one could easily estimate θ by taking the average of Rz−1 Yi , i = 1, . . . , n. In fact, this simple obi servation is the basis of the leading current approach called the “synchronization approach” [BCSZ14, BCS15] to this problem. Specifically, synchronization aims at recovering the latent variables Rzi by solving a problem of the form X 2 −1 (1.3) min Rz−1 . 0 Yi − Rz 0 Yj 0 0 ∈U (1) z1 ,...,zn 1≤i,j≤n i j Denoting by R̂zi the solutions of (1.3), one can then estimate θ by the average of R̂z−1 Yi , i = 1, . . . , n. i Synchronization problems can be formulated as estimation problems on a graph. More precisely, one can associate each observation Yi to a graph node, each of which has a hidden label gi ∈ G for some group G of transformations. (In our case, G ∼ = F.) The pairwise data, which we identify with edges of the graph, reveals information about ratios gi (gj )−1 . In the the context of (1.3), this −1 2 information is simply kR`−1 0 Yi −R`0 Yj k . Despite synchronization problems being i j computationally hard in general, certain theoretical guarantees have been derived under specific noise models that are unfortunately not realistic for the problems of interest in this paper. For example, it is often assumed that the edge observations are independent instead of the more relevant independence of vertices. Among the most prominent methods are spectral methods [Sin11, BSS11], semidefinite relaxations [BCSZ14, BCS15, ABBS14, BBS16, JMRT16, BBV16], and methods based on Approximate Message Passing [PWBM16] and other modified power methods [Bou16, CC16]. Synchronization also enjoyed many interesting connections with geometry (see [GBM16] for an example). When the noise is smaller entrywise than the signal θ, synchronization approach yields acceptable results because macroscopic features underlying signal are still visible. However, in applications, the noise level is often significantly larger than signal, and it is on this regime that we focus our attention. An illustration of the difference between these regimes appears in Figure 1. Unfortunately, for the high noise regimes we are interested here the shifts are impossible to reliably estimate, regardless of the number of samples [ADBS16, WW84]. In fact, it is not difficult to see that even if we had access to θ, one would still not be able to reliably estimate the shifts in a high noise regime. 4 BANDEIRA, RIGOLLET AND WEED 2 1 0 1 2 2 1 0 1 2 2 1 0 1 2 15 10 5 0 5 10 15 15 10 5 0 5 10 15 15 10 5 0 5 10 15 Figure 1: Instances of the multi-reference alignment problem, at low (left column) and high (right column) noise levels. The true underlying signal appears in gray, and the noised version appears in red. When the noise level is low, large features of the signal are still visible despite the noise; in the presence of large noise, however, the signals cannot reliably be synchronized. 1.3 Notation Denote by W ∈ C d×d the discrete Fourier transform matrix, with entries given by 1 Wjk = √ exp(2πijk/d) , 1 ≤ j, k ≤ d . d √ The normalization factor 1/ d is chosen so that the resulting matrix W is unitary. Given θ ∈ IRd , let θ̂ = W θ be its Fourier transform. We will index θ̂ from −bd/2c to bd/2c. The symbol k · k denotes the `2 norm on IRd . For any positive integer d, we write [d] = {1, . . . , d}. Given a vector t, let t⊗k denote the order-k tensor formed by taking the kfold tensor product of t with itself. Denote by kAk the Hilbert-Schmidt norm of a tensor A, defined by kAk2 = hA, Ai, where h·, ·i denotes the entrywise inner product. A tensor A is symmetric if Ai1 ...ik = Aiπ(1) ...iπ(k) for any permutation π of [k]. For such tensors, the value Ai1 ...ik depends only on the multiset {i1 , . . . , ik }. We define a cyclic shift of θ ∈ IRd by a unit-norm complex number z by OPTIMAL RATES FOR MRA 5 specifying its action on the Fourier transform of θ: k \ R z (θ)k = z θ̂k for k = −bd/2c, . . . , bd/2c. The group of cyclic shifts is known as the circle group and we denote it by F. Note that it is isomorphic to several well known groups such as SO(2) and IR/Z. Recall that the Kullback-Leibler (KL) divergence between two distributions P and Q such that P  Q is given by Z dP  D(P k Q) = log dP . dQ It is well known that D(P k Q) ≥ 0, with equality holding iff P = Q almost surely. 1.4 Organization of the paper In Section 2, we propose a new approach to MRA using Gaussian mixture models. Then, in Section 3 we present our main result, Theorem 1, providing minimax rates for the multi-reference alignment problem under cyclic shifts. In Section 4 we draw precise connections between the Kullback-Leibler (KL) divergence of sampled distributions from two different signals and the distance between their invariant moment tensors. This relation does not depend on the precise nature of the cyclic shifts and holds for any compact subgroup of the orthogonal group. In Section 5 we give guarantees for the maximum likelihood estimator (MLE): Theorem 4 gives a general guarantee for the MLE under conditions on the KL divergence that were obtained in Section 4 and in Section 5.2 a modified MLE is developed for the specific problems of shifts. This modified MLE provides the upper bounds in Theorem 1. Section 6 concludes by establishing the lower bound in Theorem 1; the proof involves finding pairs of different signals with several matching invariant moment tensors. 2. GAUSSIAN MIXTURE MODEL We propose an alternative to the synchronization approach discussed above that completely bypasses the estimation of the shifts `1 , . . . , `n in favor of estimating θ directly. To do so, we recast our model as a continuous mixture of Gaussians whose centers are algebraically constrained. Since the Gaussian distribution is invariant under cyclic shift, we can without loss of generality assume that the shifts R`i are independent and uniformly distributed over F. Indeed, to achieve this setup, we transform the observations Yi into RUi Yi , where Ui is uniformly distributed over U (1) and independent of all other random variables. Since Ui + `i is also uniformly distributed over U (1), these new observations are drawn from a mixture of Gaussians with uniform mixing weights and centers given by R` θ, ` ∈ U (1). In particular, these centers are linked together by a rigid algebraic structure: they are the orbit of θ ∈ IRd under the action of F. We summarize this observation into our basic model. Let Y1 , . . . , Yn ∈ IRd be n independent copies of Y ∈ IRd where (2.1) Y = Rθ + σξ, where θ ∈ IRd is the unknown parameter of interest, R is drawn uniformly (i.e., according to the Haar probability measure) from F and ξ ∼ N (0, Id ) is independent Gaussian noise. Denote by Pθ the distribution of a random variable Y that satisfies (2.1). 6 BANDEIRA, RIGOLLET AND WEED Define the maximum likelihood estimator (MLE) θ̃n by (2.2) θ̃n = argmax θ∈IRd n X i=1   1 log IER exp − 2 kYi − Rθk2 . 2σ We postpone the discussion of computational efficiency to a companion paper [PWB+ 17] and focus here on the statistical properties of this estimator. In particular, we show that a small modification of it optimally solves the multireference alignment problem in a certain sense. Although the goal of this problem is to recover the unknown parameter θ, it is not hard to see that we can only hope to identify θ up to a global cyclic shift. We therefore define a (pseudo-)metric on IRd that deems two vectors θ, φ ∈ IRd to be close if they are close up to some element of F. To this end, define ρ(θ, φ) = min kθ − Rφk . R∈F We assume throughout that the noise variance σ 2 is known. This assumption is realistic in many applications such as imaging or signal processing. In other circumstances, it may be calibrated using cross-validation, for example. Throughout this paper, we assume that c ≤ kθk ≤ 1, where c > 0 is a universal constant so that σ captures entirely the (inverse) signal-to-noise ratio. We note that, comparatively, IEkσξi k2 = σ 2 d. Gaussian mixture models have been extensively studied in the statistical literature since their introduction by Pearson [Pea94] in the nineteenth century (see e.g. [MP00] for an overview). As illustrated by the extant literature, mixture models are quite rich and broadly applicable to a variety of statistical problems ranging from clustering to density estimation. As a result, various statistical perspectives may apply when studying the performance of estimators. In the context of multi-reference alignment, we are naturally interested in estimating θ or, equivalently, the centers. It has been established that in general, the rate of estimation of the centers may scale like n−C/d for d centers that can be arbitrarily close (see for example [MV10] and more recently [HK15] for an interesting explanation from the point of view of model misspecification). This curse of dimensionality arises from the minimax point of view where centers may be arbitrarily close, with a distance that may depend on the number of observations, thus leading to nonparametric rates of estimation. Instead, when the centers are well separated, the general conditions of [Wal49] are satisfied so that the MLE converges at the √ parametric rate 1/ n . In our case, when the mixture is continuous, Assumption 1, below, plays an analogous role in ensuring convergence at the parametric rate. When such conditions are met, the Fisher information determines how the statistical performance of the MLE scales with the noise level σ. This question is central to signal processing problems such as multi-reference alignment, where σ is quite large, since it determines the order of magnitude of the sample size n required to achieve a certain accuracy. Exact computation of the Fisher information matrix in this model is out of √ reach and instead, we focus on the scaling of the quantity nρ(θ̃n , θ) with the signal-to-noise ratio of the problem, where θ̃n is the MLE (2.2). OPTIMAL RATES FOR MRA 7 3. MAIN RESULTS √ As mentioned above, nρ(θ̃, θ) depends asymptotically on the Fisher information of the model, which can be related to the curvature of the KullbackLeibler divergence around its minimum. Conversely, (lack of) curvature of the Kullback-Leibler divergence around its minimum is what controls minimax lower bounds. To address both problems at once, we follow an idea originally introduced in [LNS99] in the context of functional estimation and further developed by [CL11, WY16]. In the multi-reference alignment model, this approach allows us to relate Kullback-Leibler divergence to moment tensors, which can in turn be controlled using Fourier-theoretic arguments. It will follow from this analysis that the difficulty of estimating a particular signal θ depends on the support of the Fourier transform θ̂ of θ. In particular, define the positive support psupp(θ̂) of θ̂ by psupp(θ̂) = {j | j ∈ {1, . . . , d/2}, θ̂j 6= 0} . We make the following assumption, which guarantees that the MLE converges at a parametric rate. Assumption 1. There exists an absolute constant c > 1, not depending on n, such that c−1 ≤ |θ̂j | ≤ c for all j ∈ psupp(θ̂). We denote by T the set of such vectors. We emphasize that this is the situation of most interest to practitioners: the existence of very small, but non-zero, coordinates whose values approaches 0 with n should rightly be considered pathological. In a way, Assumption 1 rules out certain artificial difficult situations analogous to classical difficulties arising in estimating mixtures of Gaussians, such as distinguishing the mixture .5N (+ε, 1)+ .5N (−ε, 1) from the single Gaussian N (0, 1) for very small ε. Moreover, it enables us to restrict our attention to a compact set of parameters and bypass some technical complications. The following theorem reveals a surprising phenomenon: even under Assumption 1, the multi-reference alignment problem suffers from the curse of dimensionality. Theorem 1. Let 2 ≤ s ≤ bd/2c. Let Ts be the set of vectors θ ∈ T satisfying Assumption 1 and psupp(θ̂) ⊂ [s]. Then, (3.1) σ 2s−1 inf sup IEθ [ρ(Tn , θ)]  √ (1 + on (1)) , Tn θ∈Ts n where the infimum is taken over all estimators Tn of θ and where the symbol  hides constants depending on d but on no other parameter. A modified MLE θ̌n defined in (5.11) achieves this rate. A few remarks are in order. Note first that the curse of dimensionality is inherent to the minimax paradigm. Indeed, our proof of the lower bound describes a class of signals that satisfy Assumption 1 but have a very specific Fourier spec√ trum. Such signals drive the worst case bound of order σ 2s−1 / n. This limitation is overcome in a companion paper [PWB+ 17], where we show that even Fourier dense signals θ may be estimated as the same rate as signals in T2 as long as they 8 BANDEIRA, RIGOLLET AND WEED are generic enough. Second, our proof techniques do not allow us to remove the σ dependence of the term on (1). In particular, for small values of n, this term may actually dominate the upper bound. We conjecture that this issue is an artifact of the proof technique and note that preliminary numerical results in [PWB+ 17] support this claim. The rest of this paper is devoted to the proof of the main results in Theorem 1. 4. INFORMATION GEOMETRY In this section, we develop several new tools to obtain precise bounds on the divergence D(Pθ k Pφ ) for pairs of signals θ and φ. On the one hand, it is well known that upper bounds on the divergence translate into minimax lower bounds using LeCam’s method [LeC73]. On the other hand, we also show how to transform lower bounds on D(Pθ k Pφ ) into uniform upper bounds on the performance of the MLE. Note that this analysis departs from the classical pointwise rate of convergence for MLE that guarantees a rate of convergence n−1/2 for each fixed choice of parameter as n → ∞. Our tools strengthen this result considerably. Indeed, we show that for reasonable choices of θ, the MLE achieves a rate of n1/2 uniformly over all choices of θ. We refer the reader to [HK15] for examples of other Gaussian mixture problems where the pointwise and uniform rates of estimation differ. For convenience, we abbreviate D(Pθ k Pφ ) by D(θ k φ). The following Lemma collects several useful facts about the function D(θ k φ). A proof appears in Appendix A. Lemma 2. Let R have uniform distribution over any subgroup G of the orthogonal group in d dimensions. Fix θ, φ ∈ IRd . The following holds (i) If ϑ = θ − IERθ and ϕ = φ − IERφ, then D(θ k φ) = D(ϑ k ϕ) + 1 kIE[Rθ] − IE[Rφ]k2 . 2σ 2 (ii) If ρ(θ, φ) = ε and kθk, kφk ≤ 1, then D(θ k φ) = 1 1 O(ε2 ) 2 ⊗2 ⊗2 2 kIE[Rθ] − IE[Rφ]k + kIE[(Rθ) ] − IE[(Rφ) ]k + , 2σ 2 4σ 4 σ6 where O(ε2 ) hides a constant, which may depend on d but is otherwise independent of θ, φ, and σ. The following Theorem provides a tight bound on the quantity D(θ k φ) in terms of Hilbert-Schmidt distance between the moment tensors IE[(Rθ)⊗k ] and IE[(Rφ)⊗k ]. Specifically, we show that the divergence D(θ k φ) is of order σ −2k ε2 where k is the smallest natural number such that the moment tensors IE[(Rθ)⊗k ] and IE[(Rφ)⊗k ] differ significantly. This theorem is not specific to cyclic shifts and holds for any compact subgroup of the orthogonal group. Theorem 3. Let θ be a fixed vector in IRd such that kθk ≤ 1. Let φ ∈ IRd be such that ρ(θ, φ) = ε ≤ kθk. Let R be a random element drawn according to the Haar probability measure on any compact subgroup G of the orthogonal group 9 OPTIMAL RATES FOR MRA in d dimensions. For all m ≥ 1, let ∆m = IE[(Rθ)⊗m − (Rφ)⊗m ]. If there exists k ≥ 1 such that, as ε → 0, k∆m k = o(ε) for m = 1, . . . , k − 1, k∆k k = Ω(ε) , and then k∆k k = Θ(ε). Moreover, for σ ≥ 1 there exist universal constants c and C̄ and constant C d that depends only on d, all positive and such that ck σ 2k k! k∆k k2 − C d ε2 σ 2k+2 ≤ D(θ k φ) ≤ 2 σ 2k k! k∆k k2 + C̄ ε2 σ 2k+2 . In particular, there exists positive σ0 , ε0 that depend on d such that for all σ ≥ σ0 , and θ, φ such that kθk ≤ 1, ρ(θ, φ) ≤ ε0 , it holds D(θ k φ)  σ −2k ρ2 (θ, φ) , where the symbol  hides constants depending on d but on no other parameters. Proof. The divergence D(θ k φ) and the tensors IE[(Rφ)⊗m ] are unaffected if we replace φ by Rφ for any R ∈ G. Hence without loss of generality, we can assume that kθ − φk = ρ(θ, φ) = ε. We first establish that for any m ≥ 1, the quantities k∆m k are indeed of order at most ε. Specifically, we prove that (4.1) kIE[(Rθ)⊗m − (Rφ)⊗m ]k2 ≤ m2 2m−1 ε2 for all m ≥ 1 and ε ∈ (0, 1). This implies that k∆k k = Θ(ε). To prove (4.1), note that by Jensen’s inequality, kIE[(Rθ)⊗m − (Rφ)⊗m ]k2 ≤ IEk(Rθ)⊗m − (Rφ)⊗m k2 = kθ⊗m − φ⊗m k2 . Expanding the norm yields kθ⊗m − φ⊗m k2 = kθk2m − 2hθ, φim + kφk2m = kθk2m (1 − 2(1 + γ)m + (1 + 2γ + δ 2 )m ) , where δ = ε/kθk and γ = hθ, φ − θi/kθk2 is such that |γ| ≤ δ by Cauchy-Schwarz. Using Lemma B.1 in the Supplementary Materials, we conclude that kθk2m − 2hθ, φim + kφk2m ≤ kθk2m m2 2m−1 δ 2 ≤ m2 2m−1 ε2 , as desired. If k < 3, then the claim follows directly from Lemma 2 (ii). We therefore assume k ≥ 3. Then kIE[Rθ−Rφ]k = o(ε), so Lemma 2 (i) implies D(θ k φ) = o(ε2 ) + D(ϑ k ϕ) , where ϑ = θ − IERθ and ϕ = φ − IERφ. Hence we can replace θ and φ by ϑ and ϕ without affecting D(θ k φ) by more than o(ε2 ). We therefore assume without loss of generality that IERθ = IERφ = 0. 10 BANDEIRA, RIGOLLET AND WEED We first show the upper bound. Denote by g the density of a standard ddimensional Gaussian random variable. For all ζ ∈ IRd , let fζ denote the density of Pζ . Then kζk2 y > Rζ 1 1 fζ (y) = IER g(σ −1 (y − Rζ)) = g(σ −1 y)e− 2σ2 IER e σ2 . σ σ Let χ2 (θ, φ) denote the χ2 -divergence between Pθ and Pφ , defined by Z 2 χ (θ, φ) = (fθ (y) − fφ (y))2 dy . fθ (y) Since IERθ = 0 by assumption, Jensen’s inequality implies fθ (y) ≥ kθk2 kθk2 y > Rθ 1 1 g(σ −1 y)e− 2σ2 eIER σ2 = g(σ −1 y)e− 2σ2 . σ σ Hence kθk2 kθk2 kφk2 y > Rθ y > Rφ 2 1  (fθ (y) − fφ (y))2 ≤ e 2σ2 e− 2σ2 IER e σ2 − e− 2σ2 IER e σ2 g(σ −1 y) . fθ (y) σ Integrating this quantity with respect to y yields a bound on the χ2 divergence. Let ξ ∼ N (0, Id ) and observe that i h kθk2 kθk2 kφk2 σξ> Rθ σξ> Rφ 2 χ2 (θ, φ) ≤ IEξ e 2σ2 e− 2σ2 IER e σ2 − e− 2σ2 IER e σ2 h kθk2 kθk2 ξ> (R+R0 )θ kθk2 +kφk2 ξ> (Rθ+R0 φ) σ σ = IEξ,R,R0 e 2σ2 e− σ2 e − 2e− 2σ2 e kφk2 ξ> (R+R0 )φ i σ + e− σ2 e , where R and R0 are independent elements selected uniformly from G. Taking expectations with respect to ξ yields θ > Rφ φ> Rφ   θ> Rθ χ2 (θ, φ) ≤ 2IER e σ2 − 2e σ2 + e σ2 , 2 2 Where we used that ekθk /(2σ ) ≤ 2 for σ ≥ 1 and kθk2 ≤ 1. The random variables Rθ and Rφ have moment generating functions that converge in a neighborhood of the origin, hence h i X 2 > m > m > m χ2 (θ, φ) ≤ IE (θ Rθ) − 2(θ Rφ) + (φ Rφ) R σ 2m m! m≥0 X 2 k∆m k2 = σ 2m m! m≥0 ≤ ≤ 2 σ 2k k! k∆k k2 + ε2 X m≥k+1 ε2 2m2 + o(ε2 ) σ 2m m! 2 k∆k k2 + C̄ 2k+2 . σ 2k k! σ The upper bound then follows from the inequality D(θ k φ) ≤ χ2 (θ, φ) [Tsy09]. OPTIMAL RATES FOR MRA 11 We now turn to the lower bound. As before, we assume that k ≥ 3 and define Z d1 (θ, φ) = |fθ (y) − fφ (y)| dy . Recall that by Pinsker’s Inequality, we have D(θ k φ) ≥ 12 d21 (θ, φ). Moreover, Z ky−Rθk2 ky−Rφk2 1 − − 2σ 2 2σ 2 d1 (θ, φ) = IEe − IEe dy (2π)d/2 σ  2σξ> Rφ−kφk2   2σξ> Rθ−kθk2  2σ 2 2σ 2 ξ ∼ N (0, Id ) ξ − IER e ξ , = IEξ IER e 2 2 2 kφk  ξ> Rθ  kφk −kθk  ξ> Rφ  = e− 2σ2 IEξ IER e σ ξ e 2σ2 − IER e σ ξ . We now show that |kθk2 − kφk2 | = o(ε). Indeed kθk2 − kφk2 = IE d X  (Rθ)2i − (Rφ)2i  i=1 ≤ ≤ d X i=1 d X IE[(Rθ)2i ] − IE[(Rφ)2i ] IE[(Rθ)i (Rθ)j ] − IE[(Rφ)i (Rφ)j ] i,j=1 ≤ dkIE(Rθ)⊗2 − (Rφ)⊗2 k = dk∆2 k = o(ε) , where we applied Cauchy-Schwarz to get the second inequality and last equality follows from the assumption of the theorem when k ≥ 3. Since kθk ≤ 1 and σ ≥ 1, we have kφk2 −kθk2 kφk2 = 1 + o(ε) and ≤1 e 2σ2 2σ 2 for ε small enough. It yields   ξ> Rθ   ξ> Rφ  d1 (θ, φ) ≥ e−1 IEξ IER e σ ξ 1 + o(ε) − IER e σ ξ kθk2  ξ> Rθ   ξ> Rφ  ≥ e−1 IEξ IER e σ ξ − IER e σ ξ − e 2σ2 −1 o(ε) X 1 = e−1 IEξ h∆m , ξ ⊗m i − o(ε) σ m m! m≥1 X 1 1 ≥ e−1 IEξ k h∆k , ξ ⊗k i − e−1 IEξ m h∆m , ξ ⊗m i − o(ε) σ m! σ k! m6=k p X (d + m)m ck ≥ √ k∆k k − e−1 k∆m k − o(ε) σ m m! σ k k! m6=k ≥ ck σk ε √ k∆k k − Cd k+1 σ k! where in the penultimate inequality, we employ a Khinchine-type inequality due to [Bob00], details of which appear as Lemma B.2 in the Supplementary Materials. Together with Pinsker’s inequality and the fact that k∆k k = Θ(ε) where ε = ρ(θ, φ), this completes the proof of the lower bound. 12 BANDEIRA, RIGOLLET AND WEED 5. MAXIMUM LIKELIHOOD ESTIMATION Let Y1 , . . . , Yn be i.i.d observations from the model (2.1) and consider the MLE θ̃n that was defined in (2.2). In this section, we prove our main statistical result, that is a uniform upper bound on the rate of convergence of the MLE. Our proof technique extends beyond the framework of the MRA model and can be broadly applied to derive uniform rates of convergence for the MLE from tight bounds on the KL divergence like Theorem 3. While similar ideas are often employed to obtain pointwise rates of convergence, extension to uniform rates requires novel elements. From here on, positive constants may depend on d unless noted otherwise. We first establish an upper bound for the MLE under a general lower bound for the KL divergence. Then we specialize this result to obtain the minimax upper bounds over Ts that are presented in Theorem 1. 5.1 A general upper bound Theorem 4. Let R be a random element drawn according to the Haar probability measure on any compact subgroup G of the orthogonal group in d dimensions. Assume that there exist k ≥ 1 and positive σ0 , ε0 , c0 that depend on d such that the following hold: for all σ ≥ σ0 , and θ, φ such that θ ∈ T , (5.1) D(θ k φ) ≥ Cσ −2k ρ2 (θ, φ) ∀ φ ∈ IRd ρ(θ, φ) ∈ [0, ε0 ) , (5.2) D(θ k φ) ≥ Cσ −` ∀ φ ∈ IRd ρ(θ, φ) ∈ [ε0 , c0 σ) , (5.3) D(θ k φ) ≥ Cσ −2k ρ2 (θ, φ) ∀ φ ∈ IRd ρ(θ, φ) ∈ [c0 σ, ∞) . Then the MLE θ̃n satisfies uniformly over such θ, log n σk , IEθ [ρ(θ̃n , θ)] ≤ C √ + Cσ n n (5.4) where Cσ ≤ Cσ 2`+10k . Proof. The symbols c and C denote constants whose value may change from line to line. In the rest of this proof, we write θ̃ = θ̃n to denote the MLE. The main goal of the proof is to combine control of the curvature of the function D with control of the deviations of the log-likelihood function. Define the event E = {ρ(θ̃, θ) ≤ ε} where ε ≤ ε0 . Since D is invariant under the action of G, we can assume without loss of generality that ρ(θ̃, θ) = kθ̃ − θk. We first establish that on this event kθ̃ − θk can be controlled in terms of the metric induced by the Hessian of D at θ. Fix θ ∈ IRd and denote by H the Hessian of √ the function φ 7→ D(θ k φ) evalud ated at φ = θ. For any u ∈ IR , define kukH = u> Hu. On E, D(θ k θ̃) ≥ Cσ −2k ρ2 (θ, θ̃) and ρ(θ, θ̃) = kθ̃ − θk so using a third order Taylor expansion, we get 1 kθ̃ − θk3 D(θ k θ̃) − kθ̃ − θk2H ≤ C ≤ Cεσ 2k−3 kθ̃ − θk2H . 2 σ3 Therefore, there exists a C such that if ε < Cσ 3−2k , we get (5.5) 1 D(θ k θ̃) ≥ kθ̃ − θk2H ≥ Cσ −2k kθ̃ − θk2 . 4 OPTIMAL RATES FOR MRA 13 We now control the geometry of the log-likelihood function near θ. Define n Dn (θ k φ) = fθ 1X log (Yi ) , n fφ i=1 where Yi are i.i.d from Pθ and we recall that fζ is the density of Pζ , ζ ∈ IRd . Note that Dn (θ k θ) = 0, so Dn (θ k θ̃) ≤ 0. Since θ is held fixed throughout the proof, we abbreviate D(θ k φ) and Dn (θ k φ) as D(φ) and Dn (φ), respectively. Using a second order Taylor expansion, we get 1 D(θ̃) − Dn (θ̃) = −∇Dn (θ)> h + h> ∇2 (D − Dn )(θ̄)h , 2 where h = θ̃ − θ and θ̄ lies on a segment between θ̃ and θ. For all ζ ∈ T , write Hn (ζ) for the Hessian of Dn (φ) evaluated at φ = ζ, and similarly let H(ζ) be the Hessian of D(φ) evaluated at φ = ζ. We obtain (5.6) 1 1 khk2H ≤ D(θ̃) − Dn (θ̃) ≤ −∇Dn (θ)> h + h> (H(θ̄) − Hn (θ̄))h . 4 2 For the first term, we note that if H were invertible (and hence k · kH a genuine metric), then it is well known (see, e.g. [HUL01]) that sup −∇Dn (θ)> u = k∇Dn (θ)k∗H = k∇Dn (θ)kH −1 , u:kukH =1 where k · k∗H , the dual norm to k · kH , is such that k · k∗H = k · kH −1 . In general, H is not invertible, but we still have k · k∗H = k · kH † , where H † denotes the Moore-Penrose pseudo-inverse of the matrix H. To control the second, note first that by (5.5), it holds khk ≤ Cσ k khkH . Therefore, h> (H(θ̄) − Hn (θ̄))h ≤ Cσ k khkH khk sup kH(φ) − Hn (φ)kop , φ∈Bε IRd where Bε := {φ ∈ : ρ(φ, θ) ≤ ε}. Combining the above three bounds and dividing by khkH , we get that on E, 1 khkH ≤ kDn (θ)kH † + Cσ 2k sup kH(φ) − Hn (φ)k2op + khk2 , 4 φ∈Bε where we applied Young’s inequality. On the other hand, using (5.5), we have khkH ≥ Cσ −k ρ(θ̃, θ). Therefore, applying the Cauchy-Schwarz inequality and Chebyshev’s inequality, we get IE[ρ(θ̃, θ)] = IE[ρ(θ̃, θ)1IE ] + IE[ρ(θ̃, θ)1IE c ] 1/2 1/2 ≤ Cσ k IE[khkH 1IE ] + IE[ρ2 (θ̃, θ)] IP(E c ) ≤ Cσ k IE[khkH 1IE ] + ε−1 IE[ρ2 (θ̃, θ)] . Thus, (5.7)   IE[ρ(θ̃, θ)] ≤ C σ k IEkDn (θ)kH † +σ 3k IE sup kH(φ)−Hn (φ)k2op +(σ k +ε−1 )IE[ρ2 (θ̃, θ)] φ∈Bε 14 BANDEIRA, RIGOLLET AND WEED It suffices to control the right side of the above inequality. The main term is the first one: Jensen’s inequality and the second Bartlett identity imply r r q 1 d † > † tr(H H) ≤ . (5.8) IEkDn (θ)kH † ≤ tr(H IE[Dn (θ)Dn (θ) ]) = n n Standard matrix concentration bounds can be applied to show IE sup kH(φ) − Hn (φ)k2op ≤ C (5.9) φ∈Bε log n . nσ 4 A proof of (5.9) appears as Lemma B.4 in the Supplementary Materials. Likewise, a standard slicing argument, Lemma B.5 in the Supplementary Materials, implies IE[ρ2 (θ̃, θ)] ≤ C (5.10) σ (8k−4)∧(2`+2) . n Plugging (5.8), (5.9), and (5.10) into (5.7), we get  σk σ 5k−4 log n σ (9k−4)∧(2`+k+2)  IE[ρ(θ̃, θ)] ≤ C √ + + , n nε n as desired. 5.2 A modified MLE The MLE itself may not achieve the optimal rate of convergence because the lower bound (5.1) may not be satisfied with the optimal choice of k when φ is a specific perturbation of θ. Namely, in the specific case of cyclic shifts, the divergence D(φ) is not curved enough in directions that perturb a null Fourier coefficient of θ. To overcome this limitation, we split the sample Y1 , . . . , Yn into two parts: with the first part we estimate the support of θ̂ under Assumption 1 and with the second part, we compute a maximum likelihood estimator constrained to have the estimated support. Specifically, assume for simplicity that we have a sample Y1 , . . . , Y2n of size 2n and split it into two samples Y1 = {Y1 , . . . , Yn } and Y2 = {Yn+1 , . . . , Y2n } of equal size. 5.2.1 Fourier support estimation We use the first subsample Y1 to construct a set S̃ that coincides with psupp(θ̂) with high probability. For any j = −bd/2c, . . . , bd/2c, define, n 1X d 2 Mj = |(Yi )j | − σ 2 . n i=1 Define the set S̃ by r n log n o 2 S̃ = j ∈ {−bd/2c, . . . , bd/2c} : Mj ≥ Cσ n The following proposition shows that S̃ = psupp(θ̂) with high probability. OPTIMAL RATES FOR MRA Proposition 5. 15 Fix θ ∈ IRd . Assume that n/(log n) ≥ Cσ 4 . Then IP[S̃ 6= psupp(θ̂)] ≤ C σ4 . n Proof. This follows from standard concentration arguments. A full proof appears in the Supplementary Materials. 5.2.2 Constrained MLE We use the second sample to construct a constrained MLE. To that end, for any S ⊂ {1, . . . , bd/2c}, define the projection PS by   φ̂j if j ∈ S ∪ −S \ P (φ) = φ̂ if j = 0 S j  0 0 otherwise. The image of PS is a (2|S| + 1)-dimensional real vector space. For convenience, write φS = PS φ for any vector φ ∈ IRd . Recall that Y2 = {Yn+1 , . . . , Y2n } denotes the second subsample and define Y1S , . . . , YnS by YiS = PS Yn+i + σ(I − PS )ξi i = 1, . . . , n . where the ξi ∼ N (0, Id ) are i.i.d, independent from Y2 . Define the modified MLE θ̌n by n 1X θ̌n = argmax log fφ (YiS̃ ) . φ∈Im(PS̃ ) n (5.11) i=1 Proposition 6. Fix 2 ≤ s ≤ bd/2c, θ ∈ Ts and let S = psupp(θ̂). Then, there exist positive σ0 , ε0 , c0 that depend on d such that the following hold: for all σ ≥ σ0 , (5.12) D(θ k φ) ≥ Cσ −4s+2 ρ2 (θ, φ) −4s+2 (5.13) D(θ k φ) ≥ Cσ (5.14) D(θ k φ) ≥ Cσ −2 ρ2 (θ, φ) ∀ φ ∈ Im(PS ) ρ(θ, φ) ∈ [0, ε0 ) , ∀ φ ∈ Im(PS ) ρ(θ, φ) ∈ [ε0 , c0 σ) , ∀ φ ∈ Im(PS ) ρ(θ, φ) ∈ [c0 , ∞) . A proof appears in Appendix A. 5.3 Proof of upper bound in Theorem 1 Define R = {S̃ = psupp(θ̂)} and observe that IE[ρ(θ̌n , θ)] ≤ IE[ρ(θ̌n , θ)1IR ] + IE[ρ(θ̌n , θ)1IRc ] . The first term is controlled by combining Proposition 6 and Theorem 4 to get σ 2s−1 log n IE[ρ(θ̌n , θ)1IR ] ≤ C √ + Cσ , n n where Cσ ≤ Cσ 28s−14 . 16 BANDEIRA, RIGOLLET AND WEED To bound the second term, we use the Cauchy-Schwarz inequality and Proposition 5 to get q σ2 IE[ρ(θ̌n , θ)1IRc ] ≤ C √ IE[ρ(θ̌n , θ)2 ] n We now show that IE[ρ(θ̌n , θ)2 ] is bounded uniformly over all choices of S̃ by a constant multiple of σ 2 using a similar slicing argument as the one employed in the proof of Lemma B.5 in the Supplementary Materials. By the triangle inequality, ρ(θ̌n , θ) ≤ ρ(θ̌n , θS̃ ) + ρ(θS̃ , θ) ≤ ρ(θ̌n , θS̃ ) + 1 . In view of (5.14), we have ρ(θ̌n , θS̃ )2 ≤ (c0 σ)2 + Cσ 2 D(θS̃ k θ̌n ) ≤ (C ◦ σ)2 (1 + Gn (θS̃ k θ̌n )) , for some constant C ◦ , where Gn (θS̃ k θ̌n ) = D(θS̃ k θ̌n ) − Dn (θS̃ k θ̌n ) . For j ≥ 0, define Sj = {φ ∈ IRd : 2j σ ≤ ρ(φ, θS̃ ) ≤ 2j+1 σ} and let J be such that C ◦ ≤ 2J ≤ 2C ◦ . Observe that X IE[ρ(θ̌n , θS̃ )2 ] ≤ 4(C ◦ σ)2 + IE[ρ(θ̌n , θS̃ )2 1I(θ̌n ∈ Sj )] j≥J ≤ 4(C ◦ σ)2 + σ 2 X 22j+2 IP[ sup Gn (θS̃ k φ) > C j>J ≤ 4(C ◦ σ)2 + Cσ 2 X φ∈Sj 22j ] n 22j exp(−C22j ) ≤ Cσ 2 , j≥0 where we used (B.7) from the Supplementary Materials in the third inequality. We obtain IE[ρ(θ̌n , θ)2 ] ≤ 2IE[ρ(θ̌n , θS̃ )2 ] + 2 ≤ Cσ 2 . We have established that IE[ρ(θ̌n , θ)] ≤ C  σ 2s−1 log n σ 3  √ + σ 26s−13 + , n n n which completes the proof of Theorem 1. 6. MINIMAX LOWER BOUNDS Our minimax lower bounds rely ultimately on Le Cam’s classical two-point testing method [LeC73]. In particular, the version that we use requires an upper bound on the KL divergence, which can be obtained using Theorem 3 and a moment matching argument. 17 OPTIMAL RATES FOR MRA 6.1 Moment matching The lower bound of Theorem 1 follows from Proposition 7. Proposition 7. Fix 2 ≤ s ≤ bd/2c and let θ, φ ∈ IRd satisfy θ̂m = φ̂m = 0 for m ∈ / {±(s − 1), ±s} and |θ̂m | = |φ̂m | for m ∈ {±(s − 1), ±s}. If R is drawn uniformly from F, then for any m = 1, . . . , 2s − 2, it holds IER [(Rθ)⊗m ] = IER [(Rφ)⊗m ] Proof. Fix m ≤ 2s − 2. Since IER [(Rθ)⊗m ] and IER [(Rφ)⊗m ] are symmetric tensors, to show that they are equal it suffices to show that hIER [(Rθ)⊗m ], u⊗m i = hIER [(Rφ)⊗m ], u⊗m i ∀ u ∈ IRd or equivalently, that (6.1) IER [(u> Rθ)m ] = IER [(u> Rφ)m ] ∀ u ∈ IRd . Consider the set P = {ζ : |ζ̂j | = |θ̂j | , ∀ j} and note that θ, φ ∈ P. We show that the function ζ 7→ IER [(u> Rζ)m ] is constant on P, which readily yields (6.1). For a fixed shift Rz ∈ F, we obtain bd/2c X d u> Rz ζ = hû, R z ζi = û−j ζ̂j z j , j=−bd/2c so bd/2c X (u> Rz ζ)m = z j1 +···+jm m Y û−jn ζ̂jn . n=1 j1 ,...,jm =−bd/2c Taking expectations with respect to a uniform choice of z yields (6.2) IER [(u> Rζ)m ] = X m Y û−jn ζ̂jn , j1 +···+jm =0 n=1 where the sums are over all choices of coordinates j1 , . . . , jm ∈ {−bd/2c, . . . , bd/2c} whose sum is 0. The Fourier transform of ζ is supported only on coordinates ±(s − 1) and ±s, so we may restrict our attention to sums involving only those coordinates. Suppose j1 + · · · + jm = 0. Define α = |{i : ji = s − 1}| β = |{i : ji = −(s − 1)}| γ = |{i : ji = s}| δ = |{i : ji = −s}| By assumption j1 + · · · + jm = 0, so the tuple (α, β, γ, δ) is a solution to α(s − 1) + β(−(s − 1)) + γ(s) + δ(−s) = 0 18 BANDEIRA, RIGOLLET AND WEED or, equivalently, (α − β)(s − 1) + (γ − δ)s = 0 Since s − 1 and s are coprime, (α − β) and (γ − δ) must be multiples of s and s − 1, respectively. Since |α − β| + |γ − δ| ≤ m < 2s − 1, in fact α − β = γ − δ = 0. Therefore the only m-tuples (j1 , . . . , jm ) that appear in the sum on the righthand side of (6.2) are those in which +(s − 1) and −(s − 1) occur an equal number of times and Q +s and −s occur an equal number of times. For such mtuples, the product m n=1 û−jn ζ̂jn can be reduced to a product of terms of the form û−(s−1) ûs−1 ζ̂s−1 ζ̂−(s−1) and û−s ûs ζ̂s ζ̂−s . Since u and ζ are real vectors, ûj û−j = |uj |2 and ζ̂j ζ̂−j = |ζ̂j |2 for all j = −bd/2c, . . . , bd/2c, so m Y û−jn ζ̂jn = (|ûs−1 |2 |ζ̂s−1 |2 )a (|ûs |2 |ζ̂s |2 )b , n=1 where a and b are the number of occurrences of the pairs ±(s − 1) and ±s, respectively. This quantity depends only on the moduli |ζ̂s | and |ζ̂s−1 |, hence it is the same for all ζ ∈ P. This completes the proof of (6.1) and therefore the proof of the proposition. 6.2 Proof of lower bound in Theorem 1 √ Fix z = eiδ for δ = c1 σ 2s−1 / n for some constant c1 > 0. Let τ be given by  1/2 if |j| = s − 1 or s, τ̂j = 0 otherwise. Let φn be given by  1/2 if |j| = s − 1,    z/2 if j = s, cn = φ j ∗ z /2 if j = −s,    0 otherwise. cn and τ̂ lies in [−s, s] and that kφn − τ k and ρ(φn , τ ) Note that the support of φ √ are both bounded by c2 σ 2s−1 / n, where c2 can be made arbitrarily small by taking c1 small enough. Theorem 3 and Proposition 7 imply that D(Pnτ k Pnφn ) ≤ Cnσ −4s+2 ρ2 (φn , τ ) ≤ c3 , for a positive constant c3 that can be made arbitrarily small by taking c1 small enough. Using standard minimax lower bounds techniques [Tsy09], we get the desired result. APPENDIX A: OMITTED PROOFS Proof of Lemma 2. We first prove the following simple expression: 1 > 1 IE[e σ2 (θ+σξ) Rθ | ξ] 2 2 , D(Pθ k Pφ ) = D(θ k φ) = 2 (kφk − kθk ) + IE log 1 > 2σ IE[e σ2 (θ+σξ) Rφ | ξ] 19 OPTIMAL RATES FOR MRA where ξ ∼ N (0, Id ). This claim follows directly from the definition of divergence. Denoting by g(y) the density of a standard Gaussian random variable with respect to the Lebesgue measure on IRd , we can write dPθ IE[g((y − Rθ)/σ)] (y) = dPφ IE[g((y − Rφ)/σ)]   IE exp − 2σ1 2 (kyk2 − 2y > Rθ + kRθk2 )  =  IE exp − 2σ1 2 (kyk2 − 2y > R0 φ + kR0 φk2 )     IE exp σ12 y > Rθ 1 2 2   , = exp (kφk − kθk ) 2σ 2 IE exp σ12 y > R0 φ since R is orthogonal. Hence D(θ k φ) = IEY ∼Pθ log dPθ (Y ) dPφ 1 > IE[e σ2 Y Rθ | Y ] 1 . = 2 (kφk2 − kθk2 ) + IEY ∼Pθ log 1 > 2σ IE[e σ2 Y Rφ | Y ] When Y ∼ Pθ , we can write Y = R0 θ + σξ for a standard Gaussian vector ξ and rotation R0 independent of R. Since R0 is orthogonal, this has the same distribution as R0 (θ +σξ). If R and R0 are independent and uniform, then (R0 )> R has the same distribution as R, so Y > Rθ =d (θ + σξ)> Rθ . Therefore 1 (A.1) > 1 IE[e σ2 (θ+σξ) Rθ | ξ] 2 2 D(θ k φ) = 2 (kφk − kθk ) + IEξ log . 1 > 2σ IE[e σ2 (θ+σξ) Rφ | ξ] We now prove both parts of the Lemma (i) For convenience write θ̄ = IERθ and φ̄ = IERφ. These vectors satisfy Rθ̄ = θ̄ and Rφ̄ = φ̄ for all R. Hence (θ + σξ)> Rθ = (θ̄ + ϑ + σξ)> R(θ̄ + ϑ) = (ϑ + σξ)> Rϑ + (θ̄ + σξ)> θ̄ , and similarly (θ + σξ)> Rφ = (ϑ + σξ)> Rϕ + (θ̄ + σξ)> φ̄ . Plugging these quantities into the expression for D(θ k φ) yields 1 > > 1 IE[e σ2 (ϑ+σξ) Rϑ+(θ̄+σξ) θ̄ | ξ] D(θ k φ) = 2 (kφk2 − kθk2 ) + IEξ log 1 > > 2σ IE[e σ2 (ϑ+σξ) Rϕ+(θ̄+σξ) φ̄ | ξ] 1 > 1 1 IE[e σ2 (ϑ+σξ) Rϑ | ξ] = 2 (kφk2 − kθk2 ) + 2 IEξ (θ̄ + σξ)> (θ̄ − φ̄) + IEξ log 1 > 2σ σ IE[e σ2 (ϑ+σξ) Rϕ | ξ] 1 1 = 2 (kφ̄k2 − kθ̄k2 ) + 2 (kθ̄k2 − θ̄> φ̄) + D(ϑ k ϕ) 2σ σ 1 = 2 kIE[Rθ − Rφ]k2 + D(ϑ k ϕ) . 2σ 20 BANDEIRA, RIGOLLET AND WEED (ii) The previous claim implies that it suffices to show 1 kIE[(Rθ)⊗2 − (Rφ)⊗2 ]k2 + σ −6 O(ε2 ) 4σ 4 for θ and φ satisfying IERθ = IERφ = 0. We accomplish this by expanding the expression for D(θ k φ) given above as a power series in σ −1 . Recall D(θ k φ) = 1 > 1 IE[e σ2 (θ+σξ) Rθ | ξ] D(θ k φ) = 2 (kφk2 − kθk2 ) + IEξ log . 1 > 2σ IE[e σ2 (θ+σξ) Rφ | ξ] Given a random variable X, write KX (t) = log IE exp(t> X) for the cumulant generating function of X. Then 1 >     IE[e σ2 (θ+σξ) Rθ | ξ] 1 1 log = KRθ (θ − σξ) − KRφ (θ − σξ) . 1 > σ2 σ2 IE[e σ2 (θ+σξ) Rφ | ξ] Denote by κm and λm the mth cumulant tensors of Rθ and Rφ respectively. Then X 1 1 D(θ k φ) = 2 (kφk2 − kθk2 ) + IE hκm − λm , (θ − σξ)⊗m i . 2m 2σ σ m! m≥1 Since κ1 = IERθ and λ1 = IERφ, κ1 − λ1 = IERθ − IERφ = 0 , so the first term in the sum vanishes. Moreover, since ξ is a standard Gaussian, IE[ξ ⊗m ] = 0 for all odd m. Rearranging to collect powers of σ −1 yields D(θ k φ) = 1 1 T2 + 4 T4 + o(σ −4 ) , σ2 σ where 1 T2 = (kφk2 − kθk2 + IEhκ2 − λ2 , ξ ⊗2 i) 2 1 1 1 T4 = hκ2 − λ2 , θ⊗2 i + IEhκ3 − λ3 , θ ⊗ ξ ⊗2 i + IEhκ4 − λ4 , ξ ⊗4 i . 2 2 4! Straightforward calculation yields IEhκ2 − λ2 , ξ ⊗2 i = kθk2 − kφk2 hκ2 − λ2 , θ⊗2 i = IE[(θ> Rθ)2 − (φ> Rθ)2 ] IEhκ3 − λ3 , θ ⊗ ξ ⊗2 i = 0 IEhκ4 − λ4 , ξ ⊗4 i = 6IE[(φ> Rφ)2 − 6(θ> Rθ)2 ] . Combining the above two displays, we conclude T2 = 0 1 1 T4 = IE[(θ> Rθ)2 − 2(φ> Rθ)2 + (φ> Rφ)] = kIE[(Rθ)⊗2 − (Rφ)⊗2 ]k2 , 4 4 and the claim follows. OPTIMAL RATES FOR MRA 21 Proof of Proposition 6. We first suppose ρ(θ, φ) ≤ ε0 . For any φ ∈ IRd , we have IE[Rφ] = d−1/2 φ̂0 1, where 1 is the all-ones vector of IRd and φ̂0 is known as the DC component of φ. Therefore ϕ = φ − IE[Rφ] has Fourier transform ϕ b = φ̂ − φ̂0 d−1/2 W 1 = φ̂ − φ̂0 e0 , where e0 is the vector of d IR indexed over {−bd/2c, . . . , bd/2c} with 1 on the 0 coordinate and 0 on other coordinates. In other words, the Fourier transform of ϕ is the same as that of φ except that its DC component ϕ b0 is set to 0. Similarly, the Fourier transform of ϑS is the same as that of θ except that its DC component ϑb0 is set to 0. By Part (i) of Lemma 2, (A.2) D(φ) = 1 kIE[Rθ − Rφ]k2 + D(ϑ k ϕ) , 2σ 2 Write ρ(θ, φ) = ε and suppose first that |θ̂0 − φ̂0 | ≥ 21 ε. Then (A.2) implies D(φ) ≥ 1 ε2 1 kIE[Rθ − Rφ]k2 = 2 (θ̂0 − φ̂0 )2 ≥ ≥ Cσ −4s+2 ε2 . 2 2σ 2σ 8dσ 2 Next, if |θ̂0 − φ̂0 | < 21 ε, then ρ(ϑS , ϕ)2 = ρ(θS , φ)2 − |θ̂0 − φ̂0 |2 ≥ 3ε2 /4 . Thus, it suffices to show that D(ϑ k ϕ) ≥ Cσ −4s+2 ρ(ϑ, ϕ)2 . There are two cases: either ϑS and ϕ have essentially the same power spectrum (i.e., |ϑ̂k | ≈ |ϕ̂k | for all k) or their power spectra are very different. We will treat these two cases separately. Recall that for each j ∈ S, by assumption c−1 ≤ |ϑ̂j | ≤ c. Consider the polar form ϕ̂j /ϑ̂j = mj eiδj , where mj ≥ 0. Since D(ϕ) = D(Rϕ) for all cyclic shifts, we may assume that kϑ − ϕk = ε, so that |1 − mj | ≤ Cε for all j. Suppose first that |1 − mj | ≥ Cε for some j ∈ S. Lemma 2 (ii) yields 1 ε2 ⊗2 ⊗2 2 kIE[(Rϑ) − (Rϕ) ]k + C 4σ 4 σ6 2 1 ε ≥ 4 (|ϑ̂j |2 − |ϕj |2 )2 + C 6 4σ σ 2 ε c−2 ≥ 4 |ϑ̂j |2 (1 − mj )2 + C 6 4σ σ 2 c−4 ε ≥ 4 (1 − mj )2 − C 6 ≥ Cσ −4 ε2 . 4σ σ D(ϕ) = Hence D(ϕ) ≥ Cσ −4s+2 ε2 . Next, suppose on the contrary that |1−mj | = o(ε) for all j ∈ S. Since kϑ−ϕk = ε, we can take the relative phase δj in the polar form to be such that δj ≤ Cε for all j. By Theorem 3, it is enough to show that there exists an m ≤ 2s − 1 such that kIE[(Rϑ)⊗m − (Rϕ)⊗m ]k2 = Ω(ε2 ) . 22 BANDEIRA, RIGOLLET AND WEED Denote by p the smallest integer in S and observe that bd/2c X ε2 = ρ(ϑ, ϕ)2 = min z:|z|=1 |1 − mj z j eiδj |2 |ϑ̂j |2 ≤ C X |1 − mj e−jδp /p eiδj |2 . j∈S j=−bd/2c Therefore, there exists a coordinate ` ∈ S \ {p} such that |1 − ei(pδ` −`δp )/p |2 = |1 − m` ei(pδ` −`δp )/p |2 + o(ε2 ) ≥ Cε2 . (A.3) Choose m = ` + p. Since `, p ∈ S ⊆ [s] and ` 6= p, the bound m ≤ 2s − 1 holds. As in the proof of Proposition 7, we have that kIE[(RϑS ) ⊗m ⊗m − (Rϕ) m Y X 2 ]k = ϑ̂jn − j1 +···+jm =0 n=1 X = 2 ϕ̂jn n=1 m Y 1− j1 +···+jm =0 m Y mjn e i Pm n=1 δjn 2 m Y |ϑ̂jn |2 . n=1 n=1 Each term in the above sum is positive. One valid solution to the equation j1 + · · · + jm = 0 is j1 = · · · = j` = −p and j`+1 = · · · = jm = `. We obtain ⊗m kIE[(RϑS ) ⊗m − (Rϕ) 2 ]k ≥ C 1 − = |1 − e m Y 2 i(pδ` −`δp ) mjn e n=1 i(pδ` −`δp ) 2 | + o(ε2 ) . Observe that for δ` and δp small enough, it holds |1 − ei(pδ` −`δp ) |2 ≥ |1 − ei(pδ` −`δp )/p |2 ≥ Cε2 where the last inequality follows from (A.3). Combining the above two displays proves (5.12). Now suppose ρ(θ, φ) ≥ ε0 . To show that D(θ k φ) ≥ Cσ −4s+2 , it suffices to show by the chain rule for divergence that D(PθN k PφN ) ≥ c for some N ≤ Cσ 4s−2 , where c and C are positive constants. We will show the existence of a test which correctly distinguishes PθN from PφN with probability at least 2/3; the claim will then follow from the Neyman-Pearson lemma and Pinsker’s inequality. We first show the existence of such a test when kφk2 ≥ 2. Let N = γσ 4 ≤ γσ 4s−2 for s ≥ 2, with γ > 0 to be chosen later. Let {Yi }N i=1 be samples from N N d×N either Pθ or Pφ , and define a test ψ : R → {θ, φ} by  P 2 2 θ if N1 N i=1 kYi k ≤ σ + 1.5 ψ(Y1 , . . . , YN ) = φ otherwise. An easy computation shows that N 1 X IEθ [ kYi k2 ] = σ 2 + kθk2 ≤ σ 2 + 1 N varθ [ 1 N i=1 N X i=1 kYi k2 ] ≤ 4σ 2 + N 2σ 4 ≤ C γ N 1 X IEφ [ kYi k2 ] = σ 2 + kφk2 N varφ [ 1 N i=1 N X i=1 kYi k2 ] ≤ C −2 (σ kφk2 + 1) . γ OPTIMAL RATES FOR MRA 23 Together with Chebyshev’s inequality, we get that that for kφk2 ≥ 2, Pθ (ψ = φ) + Pφ (ψ = θ) ≤ C ≤ 1/3 , γ For γ large enough, as desired. Next, suppose that kφk2 ≤ 2. For positive integers j, k, denote by (j, k) their greatest common divisor. Given a vector ζ ∈ Rd , denote by P the following set of polynomials in the entries of ζ̂: p0 (ζ) = ζ̂0 , pj (ζ) = kζ̂j k2 for 1 ≤ j ≤ bd/2c, j/(j,k) k/(j,k) ζ̂j for pjk (ζ) = ζ̂−k 1 ≤ j, k ≤ bsc. If ρ(θ, φ) > 0, then by [KI93, Corollary 2], there exists at least one polynomial p ∈ P such that p(θ) 6= p(φ) . It is easy to see that all the polynomials in P are invariant under the group action; that is, p(ζ) = p(Rζ) for any R ∈ F and p ∈ P. This implies that, given a p ∈ P, the value p(ζ) can be computed from the moment tensors IE[(Rζ + σξ)⊗k ] for 1 ≤ k ≤ 2s − 1. Indeed, the entries of IE[(Rζ + σξ)⊗k ] for 1 ≤ k ≤ 2s − 1 generate the ring of invariant polynomials in the entries of ζ̂ of degree at most 2s − 1, which includes the set P. Given samples Y1 , . . . , Yn from Pζ , the tensor IE[(Rζ + σξ)⊗k ] can be consistently estimated by computing the empirical moment tensors. We obtain that there exists a constant M , depending on s but not on σ, such that for any p ∈ P there exists an unbiased estimator p̃(ζ) for p(ζ) with variance at most M σ 4s−2 /N for any ζ ∈ {θ, φ}. For all θ ∈ Rd , define Bθ,ε0 = {φ : ρ(θ, φ) ≤ ε0 , kφk2 ≤ 2}. It is clear that Bθ,ε0 is compact so that δ= inf inf min θ:kθk2 ≤1 φ∈Bθ,ε0 p∈P:p(φ)6=p(θ) |p(φ) − p(θ)| > 0 . Note that δ does not depend on θ or φ. Set N = γδ −2 M σ 4s−2 , where γ is to be chosen later. Since ρ(θ, φ) ≥ ε0 by assumption, there exists a p ∈ P such that |p(φ) − p(θ)| ≥ δ. Let ψ : Rd×N → {θ, φ} be the test ψ(Y1 , . . . , Yn ) = argmin |p̃(ζ) − p(ζ)| . ζ∈{θ,φ} By Chebyshev’s inequality, we have Pθ (ψ = φ) + Pφ (ψ = θ) ≤ for γ sufficiently large. C ≤ 1/3 , γ 24 BANDEIRA, RIGOLLET AND WEED To conclude the proof, observe that by the chain rule, Pinsker’s inequality, and the Neyman-Pearson lemma respectively, we get D(θ k φ) = 1 C D(PθN k PφN ) ≥ ≥ Cσ −4s+2 . N N The desired result (5.13) follows. √ Finally, let ρ(θ, φ) ≥ c0 σ where c0 = 32 2d. By (A.1), since kθk ≤ 1, we have 1 > 1 IE[e σ2 (θ+σξ) Rθ | ξ] D(φ) ≥ 2 (kφk2 − 1) + IEξ log , 1 > 2σ IE[e σ2 (θ+σξ) Rφ | ξ] where ξ ∼ N (0, Id ). Next, using the Cauchy-Schwarz inequality and Jensen’s inequality, we get 1 IEξ log > Rθ IE[e σ2 (θ+σξ) IE[e 1 (θ+σξ)> Rφ σ2 | ξ] | ξ] ≥− 1 + kφk 1 + kφk p IEkθ + σξk ≥ − 1 + dσ 2 2 σ σ2 √ Hence, for kφk ≥ 16σ 2d, we get D(φ) ≥ kφk2 /(8σ 2 ). Moreover, by the triangle inequality, kφk/2 ≤ ρ(φ, θ) ≤ 2kφk for all such φ. We obtainthat for all φ ∈ IRd such that ρ(φ, θ) ≥ c0 σ, it holds D(φ) ≥ kφ − θk2 /(32σ 2 ), which implies the desired result (5.14). APPENDIX B: SUPPLEMENTARY MATERIALS Lemma B.1. For any δ ∈ (0, 1), γ ∈ [−δ, δ], it holds 1 − 2(1 + γ)m + (1 + 2γ + δ 2 )m ≤ m2 2m−1 δ 2 Proof. Fix δ ∈ (0, 1) and consider the function γ 7→ f (γ, δ) = 1 − 2(1 + γ)m + (1+2γ +δ 2 )m . Computing the derivative of f , it is easy to see that f is decreasing on (−δ, −δ 2 ) and increasing on (−δ 2 , δ) so that it achieves its maximum either at −δ or at δ. Consider the function δ 7→ g(δ) = f (δ, δ) = 1 − 2(1 + δ)m + (1 + δ)2m and observe that g(−δ) = f (−δ, δ). Since g(0) = g 0 (0) = 0, and g 00 (δ) = 2m(1 + δ)m−2 [(2m − 1)(1 + δ)m − (m − 1)] ≤ m2 2m ∀ δ ∈ [−1, 1] , it follows from a second order Taylor expansion that g(δ) ≤ m2 2m−1 δ 2 Lemma B.2. Let ξ ∼ N (0, Id ) be a standard d-dimensional Gaussian. Then m for any symmetric order-m tensor and A ∈ IRd there exists constant c = c(A), independent of m and d, such that p √ cm m!kAk ≤ IE|hA, ξ ⊗m i| ≤ (d + m)m kAk . OPTIMAL RATES FOR MRA 25 Proof. Assume without loss of generality that kAk = 1. The upper bound follows readily from the Cauchy-Schwarz inequality and the fact that kξk2 ∼ χ2d , IEξ |hA, ξ ⊗m i| ≤ IEξ kξ ⊗m k = IEξ kξkm ≤ (d + m)m/2 . To prove the lower bound, we first show that IEξ [hA, ξ ⊗m i2 ] ≥ m! . (B.1) We do so by expressing the left side in terms of multivariate Hermite polynomials. Recall that the Hermite polynomials {hk (x)}k≥0 can be normalized to satisfy the following two properties: √ 1. The function hk (x) is a polynomial with leading term xk / k!, 2. The functions {hk }k≥0 form an orthonormal basis of of L2 (µ), where µ denotes the standard Gaussian measure on IR. Given a multi-index α ∈ INd , define the multivariate Hermite polynomial hα by hα (x1 , . . . , xd ) = d Y hαi (xi ) . i=1 The multivariate Hermite polynomials form an orthonormal basis for the space IR[x1 , . . . , xd ] of d-variate polynomial functions with respect to the inner product over L2 (µ⊗d ). Multivariate Hermite polynomials satisfy the following useful property: Given two multi-indices α, β ∈ INd such that |α| = |β|, we now show that √ (B.2) hxβ , hα i = α!δαβ , where δ denotes the Kronecker symbol. Indeed, on the one hand if α 6= β, then since |α| = |β| there exists an index i such that αi > βi . By the definition of the univariate Hermite polynomials, xβi ∈ span(h1 (x), . . . , hβi (x)), hence orthogonality of the polynomials hαi and hj for 1 ≤ j ≤ βi implies hxβ , hα i = d Y hxβi , hαi i = 0 . i=1 On the other hand, if α = β, then hxα , hα i = d d p Y Y √ hxαi , hαi i = αi ! = α! . i=1 i=1 The order-m tensor A can be identified with a multilinear—thus polynomial— map from IRd to IR: X X m! A(x1 , . . . , xd ) = Ai1 ...im xi1 . . . xim = Aα x α , α! d i1 ,...,im α∈IN :|α|=m where in the second equality, we used the fact that A is symmetric. Together with (B.2), it yields that for any |α| = m, m! hA, hα i = √ Aα . α! 26 BANDEIRA, RIGOLLET AND WEED Moreover, since kAk = 1, we also have X α∈INd :|α|=m m! 2 A = 1, α! α so that X hA, hα i2 = m! . α∈INd :|α|=m Therefore, using Plancherel’s formula, we get that for any m ≥ 0, X X hA, hα i2 = m! , hA, hα i2 ≥ IEξ [hA, ξ ⊗m i2 ] = hA, Ai = α∈INd :|α|=m α∈INd as claimed. To prove the claimed lower bound on IEξ |hA, ξ ⊗m i|, we employ the following Khinchine-type inequality: Theorem B.3 ([Bob00, Theorem 2]). Let f = f (x1 , . . . , xm ) be a degree m polynomial and let X ∼ N (0, Im ) be a standard Gaussian vector in IRm . Then there exists a universal constant c such that p IE[f (X)2 ] ≤ cm IE[|f (X1 , . . . , Xm )|] . Applying Theorem B.3 to (B.1) yields the claim. Lemma B.4. Let H(ζ) and Hn (ζ) be the Hessians of D(φ) and Dn (φ), respectively, evaluated at φ = ζ. If Bε := {φ ∈ IRd : ρ(φ, θ) ≤ ε}, then IE sup kH(φ) − Hn (φ)k2op ≤ C φ∈Bε log n . nσ 4 Proof. The matrix Hn (φ) can be written as a sum of independent random matrices: n pθ 1X Hn (φ) = Hi (φ) , Hi (φ) = ∇2φ log (Yi ) . n pφ i=1 Using symmetrization, we get (B.3) IE sup kH(φ) − Hn (φ)k2op ≤ φ∈Bε n X 4 IE sup εi Hi (φ) n2 φ∈Bε 2 , op i=1 where ε1 , . . . , εn are i.i.d Rademacher random variables that are independent of the observations Y1 , . . . , Y1 and IEHn (φ) = H(φ). Using a third order derivative calculation, we find that φ 7→ Hi (φ) satisfies the following Lipschitz property. For any u, φ, η ∈ IRd , such that kuk = 1 and φ, η ∈ Bε , we have |u> Hi (φ)u − u> Hi (η)u| ≤ C where ξi is the noise in (2.1). 1 + |ξi |3 kφ − ηk σ3 27 OPTIMAL RATES FOR MRA Fix γ ∈ (0, ε) and le Z be a γ-net of Bε . In other words, we require that max min kη − φk ≤ γ . φ∈Bε η∈Z We can always choose Z to have cardinality |Z| ≤ (Cε/γ)d for some universal constant C > 0. Then, by Young’s inequality, we get (B.4) sup φ∈Bε n X 2 op εi Hi (φ) ≤C i=1 n n X γ 2 X 3 2 |ξ | + C max εi Hi (φ) i φ∈Z σ6 i=1 2 op i=1 The expectation of the first term is controlled using the fact that (B.5) IE n X |ξi |3 2 i=1 = n X IE[|ξi ξj |3 ] ≤ Cn2 . i,j=1 For second term, we employ a standard matrix concentration bound [Tro15, Theorem 4.6.1] to get that n n X     t2 X k Hi (φ)2 kop . IE exp tk εi Hi (φ)k2op Y1 , . . . , Yn ≤ d exp 2 i=1 i=1 Using standard arguments (see, e.g., [BLM13]), this implies n X  IE max εi Hi (φ) φ∈Z 2  op  ≤ C(log |Z|)IE max φ∈Z i=1 n X Hi (φ)2  op i=1   ≤ C(log |Z|)nIE max kH1 (φ)2 kop φ∈Z As before, computing a second order derivative, we can show that kH1 (φ)2 op 2 op ≤ kH1 (φ) ≤ C(1 + |ξ|4 )/σ 4 . The above two displays yield n X  IE max εi Hi (φ) φ∈Z 2  op ≤C i=1 log(ε/γ) n σ4 Combining the last display with (B.3), (B.4), and (B.5), we get (B.6) IE sup kH(φ) − Hn (φ)k2op ≤ C φ∈Bε  γ2 σ6 + log(ε/γ)  log n ≤C , 4 nσ nσ 4 for γ = n−1/2 . Lemma B.5. satisfies Assume the conditions of Theorem 4 hold. Then the MLE θ̃n IE[ρ(θ̃, θ)2 ] ≤ C σ (8k−4)∧(2`+2) . n 28 BANDEIRA, RIGOLLET AND WEED Proof. As in the proof of Theorem 4, since θ is fixed, we simply write D(φ) = D(θ k φ) and define n fθ 1X log (Yi ) , Dn (φ) = n fφ i=1 where Yi are i.i.d from model (2.1) and we recall that fζ is the density of Pζ , ζ ∈ IRd . We first establish using Lemma B.7 that the process {Gn (φ)}φ∈IRd defined by Gn (φ) = D(φ) − Dn (φ) is a subgaussian process with respect to the Euclidean distance with variance proxy cσ 2 /n for some constant c > 0, i.e., that for any λ ∈ IR, we have IE[exp(λ(Gn (φ) − Gn (ζ)))] ≤ exp c  λ2 σ 2 kφ − ζk2 . n We then apply the following standard tail bound. Proposition B.6 ([Ver17, Theorem 8.5.4]). If {Xφ }φ is a (standard) subgaussian process on IRd with respect to the Euclidean metric and Bδ (θ) is a ball of radius δ around θ, then 2 /δ 2 IP[ sup (Xφ − Xθ ) ≥ Cδ + x] ≤ Ce−Cx . φ∈Bδ (θ) √ The rescaled process σ nGn is standard subgaussian process with respect to the Euclidean metric, so applying Proposition B.6 and noting that Dn (θ) = 0 yields " # δ nσ 2 x2  (B.7) IP sup Gn (φ) ≥ C √ + x ≤ C exp − C . δ2 σ n φ∈Bδ (θ) √ For convenience, write vn = n(θ̃ − θ), where θ̃ is a MLE satisfying kθ̃ − θk = ρ(θ̃, θ). We wish to show that IE[kvn k2 ] is bounded by a constant that depends on σ but not on n. Define E to be the compact subset of IRd defined by  E = φ ∈ IRd : ε0 ≤ ρ(θ, φ) ≤ c0 σ , where c0 and ε0 are defined in Theorem 4. In particular, for any φ ∈ / E, it holds −2k 2 D(φ) ≥ Cσ ρ(θ, φ) . We employ the so-called slicing (a.k.a peeling) method. Define the sequence {αj }j≥0 where α0 = 0 and αj = Cσ j(2k−1) for j ≥ 1 for some large enough √ constant C > 0. For any j ≥ 0, define Sj = {φ ∈ IRd : αj ≤ nρ(φ, θ) ≤ αj+1 } \ E and observe that X IE[kvn k2 ] = IE[kvn k2 | θ̃ ∈ E]IP[θ̃ ∈ E] + IE[kvn k2 | θ̃ ∈ Sj ]IP[θ̃ ∈ Sj ] j≥0 (B.8) ≤ c20 σ 2 IP[θ̃ ∈ E] + Cσ 8k−4 + X 2 αj+1 IP[θ̃ ∈ Sj ] . j≥2 We now show that if θ̃ ∈ Sj , j ≥ 2, then Gn (θ̃) = D(θ̃) − Dn (θ̃) is large. To that end, observe that on the one hand, by definition of the MLE, we have OPTIMAL RATES FOR MRA 29 Dn (θ̃) ≤ Dn (θ) = 0. On the other hand, D(θ̃) ≥ Cσ −2k ρ(θ̃, θ)2 . Hence, if θ̃ ∈ Sj , then Gn (θ̃) ≥ Cσ −2k ρ(θ̃, θ)2 ≥ Cσ −2k αj2 /n. It yields αj2  αj2    ≤ IP sup Gn (φ) ≥ Cσ −2k . IP[θ̃ ∈ Sj ] ≤ IP sup Gn (φ) ≥ Cσ −2k n n φ∈Sj φ∈B αj+1 (θ) √ n Recall αj = Cσ j(2k−1) so that σ −2k αj2 ≥ Cαj+1 /σ, j ≥ 2 and apply (B.7) with √ δ = αj+1 / n and x = Cσ −2k αj2 /n to get  IP Gn (φ) ≥ Cσ sup −2k φ∈B αj+1 (θ) √ αj2  αj4  ≤ C exp − C 2 n αj+1 σ 4k−2 n  ≤ C exp − Cσ 2j(2k−1) . It yields (B.9) X 2 αj+1 IP[θ̃ ∈ Sj ] ≤ C j≥2 X  σ 4j(2k−1) exp − Cσ 2j(2k−1) ≤ C . j≥2 When θ̃ ∈ E, we use (5.2) to conclude that if n ≥ σ 2` then    IP[θ̃ ∈ E] ≤ IP sup Gn (φ) ≥ Cσ −` ≤ C exp − Cnσ −2` , φ∈E where in the last inequality, we used (B.7). Together with (B.8) and (B.9), it implies the desired result. Lemma B.7. The process {Gn (φ)}φ∈IRd defined by Gn (φ) = D(φ) − Dn (φ) is a subgaussian process with respect to the `2 distance on IRd with variance proxy c/(nσ 2 ) for some constant c > 0, i.e., that for any λ ∈ IR, we have IE[exp(λ(Gn (φ) − Gn (ζ)))] ≤ exp λ2  c kφ − ζk2 . 2 nσ Proof. By definition of Gn and the densities fζ and fφ , we have Gn (φ)−Gn (ζ) = D(φ) − D(ζ) − Dn (φ) + Dn (ζ) n 1X = IE[log fζ (Y ) − log fφ (Y )] − [log fζ (Yi ) − log fφ (Yi )] n h = IE log h = IE log i=1 kY −Rζk2 i −Rζk2 n IER exp(− 2σ2 ) IER exp(− kYi 2σ ) 1X 2 − log 2 kY −Rφk2 kY −Rφk i n IER exp(− 2σ2 ) IER exp(− 2σ2 ) i=1 n IER exp(Y > Rζ/σ 2 ) i 1 X IER exp(Yi> Rζ/σ 2 ) log − n IER exp(Y > Rφ/σ 2 ) IER exp(Yi> Rφ/σ 2 ) i=1 n = IE[∆(Y )] − 1X ∆(Yi ) , n i=1 where ∆(Y ) = log IER exp(Y > Rζ/σ 2 ) . IER exp(Y > Rφ/σ 2 ) 30 BANDEIRA, RIGOLLET AND WEED Next, using a standard symmetrization argument, we get (B.10) IE[exp(λ(Gn (φ) − Gn (ζ)))] ≤ n Y IE[exp( i=1 2λ εi ∆(Yi ))] , n where ε1 , . . . , εn are i.i.d Rademacher random variables that are independent of the sample Y1 , . . . , Yn . Next, observe that using the Cauchy-Schwarz inequality, we get that the function ζ 7→ log IER exp(Yi> Rζ/σ 2 ) is kYi k/σ 2 -Lipschitz with respect to the Euclidean distance. Hence |∆(Yi )| ≤ kYi kkφ − ζk/σ 2 . Moreover, it follows from (2.1) that conditionally on R`i , the random variable kYi k2 /σ 2 ∼ χ2d (1/σ 2 ) follows a noncentral χ2 distribution with d degrees of freedom and noncentrality parameter kθk2 /σ 2 = 1/σ 2 ≤ 1. In particular kYi k2 /σ 2 has a finite moment generating function in the neighborhood of the origin, and we obtain for some constant c small enough that   σ 2 (εi ∆(Yi ))2  kYi k2  IE exp c ≤ IE exp c ≤ e. kφ − ζk2 σ2 It implies (see, e.g., [Ver17] proposition 2.5.2) that   c 2λ IE exp( εi ∆(Yi )) ≤ exp(λ2 2 2 kφ − ζk2 ) n n σ for all λ ∈ IR. Together with (B.10), this yields the desired result. Lemma B.8. Fix θ ∈ IRd . Assume that n/(log n) ≥ Cσ 4 . For any j = −bd/2c, . . . , bd/2c, define, n 1X d 2 |(Yi )j | − σ 2 . Mj = n i=1 Define the set S̃ by r n log n o S̃ = j ∈ {−bd/2c, . . . , bd/2c} : Mj ≥ Cσ 2 n Then IP[S̃ 6= psupp(θ̂)] ≤ C σ4 . n Proof. It is straightforward to check that IE[Mj ] = |θ̂k |2 . To calculate the variance, we note that 2 2 2 2 d 2 d \ d |(Y i )k | − |θ̂k | − σ = 2σ<((Ri θ)k (ξi )k ) + σ (|(ξi )k | − 1) . 2 2 4 4 d Hence var[|(Y i )k | − σ ] ≤ Cσ , and var[Mj ] ≤ Cσ /n. 2 2 2 d Moreover, the random variable |(Y i )k | − σ is a σ -subexponential random variable. Indeed, 2 2 2 2 d 2 2 d 2 2 d d |(Y i )k | − |θ̂k | − σ ≤ 2σ|(ξi )k | + σ (|(ξi )k | − 1) ≤ 2σ (|(ξi )k | − 1) + σ + 1 . 31 OPTIMAL RATES FOR MRA d d The variable (ξ i )0 is a standard Gaussian, and for k 6= 0 the variable (ξi )k is a 2 2 d standard complex Gaussian, hence |(ξ i )k | is a rescaled χ random variable with 2 d at most 2 degrees of freedom. Hence |(ξ i )k | is sub-exponential with constant 2 2 2 d variance proxy, so that |(Y i )k | − σ is σ -subexponential. If j ∈ psupp(θ̂), then by Chebyshev’s inequality r  σ4 log n  σ4 2 q ≤C . ≤ C IP[j ∈ / S̃] = IP Mj ≤ Cσ 2 n n n |θ̂ |2 − Cσ 2 log n j n On the other hand, if j ∈ / psupp(θ̂), then IE[Mj ] = 0 and by Bernstein’s inequality r log n C 2 IP[j ∈ S̃] = IP[Mj ≥ Cσ ]≤ . n n The proof follows using a union bound. REFERENCES [ABBS14] [ADBS16] [APS17] [BBS16] [BBV16] [BCS15] [BCSZ14] [BLM13] [Bob00] E. Abbe, A. S. Bandeira, A. Bracher, and A. Singer. Decoding binary node labels from censored edge measurements: Phase transition and efficient recovery. Network Science and Engineering, IEEE Transactions on, 1(1):10–22, Jan 2014. Cecilia Aguerrebere, Mauricio Delbracio, Alberto Bartesaghi, and Guillermo Sapiro. Fundamental limits in multi-image alignment. Available online at arXiv:1602.01541 [cs.CV], 2016. Emmanuel Abbe, Joao Pereira, and Amit Singer. Sample complexity of the boolean multireference alignment problem. Available online at arXiv:1701.07540 [cs.IT], 2017. Afonso S. Bandeira, Nicolas Boumal, and Amit Singer. Tightness of the maximum likelihood semidefinite relaxation for angular synchronization. Mathematical Programming, pages 1–23, 2016. A. S. Bandeira, N. Boumal, and V. Voroninski. On the low-rank approach for semidefinite programs arising in synchronization and community detection. COLT, 2016. A. S. Bandeira, Y. Chen, and A. Singer. Non-unique games over compact groups and orientation estimation in cryo-em. Available online at arXiv:1505.03840 [cs.CV], 2015. Afonso S. Bandeira, Moses Charikar, Amit Singer, and Andy Zhu. Multireference alignment using semidefinite programming. In ITCS’14—Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science, pages 459–470. ACM, New York, 2014. S. Boucheron, G. Lugosi, and P. Massart. Concentration inequalities. Oxford University Press, Oxford, 2013. A nonasymptotic theory of independence, with a foreword by Michel Ledoux. S. G. Bobkov. Remarks on the growth of Lp -norms of polynomials. In Geometric aspects of functional analysis, volume 1745 of Lecture Notes in Math., pages 27–35. Springer, Berlin, 2000. 32 [Bou16] [Bro92] [BSS11] [CC16] [CL11] [Dia92] [Edi15] [FZB02] [GBM16] [HK15] [HUL01] [JMRT16] [KI93] [LeC73] [LNS99] [MP00] [MV10] [Nog15] BANDEIRA, RIGOLLET AND WEED Nicolas Boumal. Nonconvex phase synchronization. SIAM Journal of Optimization, to appear, 2016. Lisa Gottesfeld Brown. A survey of image registration techniques. ACM computing surveys (CSUR), 24(4):325–376, 1992. A. S. Bandeira, A. Singer, and D. Spielman. The so(3) cheeger inequality. Unpublished Draft, 2011. Yuxin Chen and Emmanuel Candes. The projected power method: An efficient algorithm for joint alignment from pairwise differences. Available online at arXiv:1609.05820 [cs.IT], 2016. T. Tony Cai and Mark G. Low. Testing composite hypotheses, hermite polynomials and optimal estimation of a nonsmooth functional. Ann. Statist., 39(2):1012–1041, 04 2011. R. Diamond. On the multiple simultaneous superposition of molecular structures by rigid body transformations. Protein Science, 1(10):1279–1287, October 1992. Editorial. Method of the year 2015. Nature Methods, 13:1, 2015. H. Foroosh, J. B. Zerubia, and M. Berthod. Extension of phase correlation to subpixel registration. IEEE Transactions on Image Processing, 11(3):188–200, 2002. Tingran Gao, Jacek Brodzki, and Sayan Mukherjee. The geometry of synchronization problems and learning group actions. Available online at arXiv:1610.09051 [math.ST], 2016. Philippe Heinrich and Jonas Kahn. Optimal rates for finite mixture estimation. arXiv:1507.04313, 2015. Jean-Baptiste Hiriart-Urruty and Claude Lemaréchal. Fundamentals of convex analysis. Grundlehren Text Editions. SpringerVerlag, Berlin, 2001. Abridged version of ıt Convex analysis and minimization algorithms. I [Springer, Berlin, 1993; MR1261420 (95m:90001)] and ıt II [ibid.; MR1295240 (95m:90002)]. A. Javanmard, A. Montanari, and F. Ricci-Tersenghi. Phase transitions in semidefinite relaxations. Proceedings of the National Academy of Sciences of the United States of America (PNAS), 2016. R. Kakarala and G. J. Iverson. Uniqueness of results for multiple correlations of periodic functions. Oct. Soc. Am. A, 10:1517–1528, 1993. L. LeCam. Convergence of estimates under dimensionality restrictions. Ann. Statist., 1:38–53, 1973. O. Lepski, A. Nemirovski, and V. Spokoiny. On estimation of the l r norm of a regression function. Probability Theory and Related Fields, 113(2):221–253, 1999. Geoffrey McLachlan and David Peel. Finite mixture models. Wiley Series in Probability and Statistics: Applied Probability and Statistics. Wiley-Interscience, New York, 2000. Ankur Moitra and Gregory Valiant. Settling the polynomial learnability of mixtures of gaussians. Arxiv:1004.4223v1, 2010. Eva Nogales. The development of cryo-em into a mainstream structural biology technique. Nature Methods, 13:24–27, 2015. OPTIMAL RATES FOR MRA [Pea94] 33 Karl Pearson. Contributions to the mathematical theory of evolution. Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 185:71–110, 1894. [PWB+ 17] A. Perry, J. Weed, A. S. Bandeira, P. Rigollet, and A. Singer. The sample complexity of multi-reference alignment. Manuscript, 2017. [PWBM16] A. Perry, A. S. Wein, A. S. Bandeira, and A. Moitra. Messagepassing algorithms for synchronization problems over compact groups. arXiv:1610.04583, 2016. [Sad89] B. M. Sadler. Shift and rotation invariant object reconstruction using the bispectrum. In Workshop on Higher-Order Spectral Analysis, pages 106–111, Jun 1989. [Sin11] A. Singer. Angular synchronization by eigenvectors and semidefinite programming. Appl. Comput. Harmon. Anal., 30(1):20–36, 2011. [SSK13] B. Sonday, A. Singer, and I. G. Kevrekidis. Noisy dynamic simulations in the presence of symmetry: Data alignment and model reduction. Computers & Mathematics with Applications, 65(10):1535 – 1557, 2013. + [SVN 05] Sjors H.W. Scheres, Mikel Valle, Rafael Nuñez, Carlos O.S. Sorzano, Roberto Marabini, Gabor T. Herman, and Jose-Maria Carazo. Maximum-likelihood multi-reference refinement for electron microscopy images. Journal of Molecular Biology, 348(1):139 – 149, 2005. [Tro15] Joel A. Tropp. An introduction to matrix concentration inequalities. Foundations and Trends R in Machine Learning, 8(1-2):1–230, 2015. [TS12] D. L. Theobald and P. A. Steindel. Optimal simultaneous superpositioning of multiple structures with missing data. Bioinformatics, 28(15):1972–1979, 2012. [Tsy09] Alexandre B. Tsybakov. Introduction to nonparametric estimation. Springer Series in Statistics. Springer, New York, 2009. Revised and extended from the 2004 French original, Translated by Vladimir Zaiats. [Ver17] Roman Vershynin. High-Dimensional Probability. Cambridge University Press (to appear), 2017. [Wal49] Abraham Wald. Note on the consistency of the maximum likelihood estimate. Ann. Math. Statistics, 20:595–601, 1949. [WW84] E. Weinstein and A. J. Weiss. Fundamental limitations in passive timedelay estimationpart ii: Wide-band systems. IEEE Trans. Acoust., Speech, Signal Process., 32(5):1064–1078, 1984. [WY16] Y. Wu and P. Yang. Minimax rates of entropy estimation on large alphabets via best polynomial approximation. IEEE Transactions on Information Theory, 62(6):3702–3720, June 2016. [ZvdHGG03] J. P. Zwart, R. van der Heiden, S. Gelsema, and F. Groen. Fast translation invariant classification of hrr range profiles in a zero phase representation. Radar, Sonar and Navigation, IEE Proceedings, 150(6):411–418, 2003. 34 BANDEIRA, RIGOLLET AND WEED Afonso S. Bandeira Department of Mathematics Courant Institute of Mathematical Sciences Center for Data Science New York Univeristy, New York, NY 10012, USA ([email protected]) Philippe Rigollet Department of Mathematics Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA 02139-4307, USA ([email protected]) Jonathan Weed Department of Mathematics Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA 02139-4307, USA ([email protected])
10math.ST
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Online Tool Condition Monitoring Based on Parsimonious Ensemble+ Mahardhika Pratama, Member, IEEE, Eric Dimla, Member, IEEE, Edwin Lughofer, Witold Pedrycz, Fellow, IEEE, Tegoeh Tjahjowidodo  Abstract— Tool condition monitoring plays a vital role to reduce maintenance cost in manufacturing industry. It generates information about possible unsafe states of machining process before they occur such that faults of component can be predicted early to support management of its life-cycle. The faults could be isolated to minimize catastrophic effects leading to a complete shutdown of overall production process. Accurate diagnosis of tool wear in metal turning process remains an open challenge for both scientists and industrial practitioners because of inhomogeneities in work-piece material, non-stationary machining settings to suit production requirements, and non-linear relations between measured variables and tool wear. Common methodologies for tool condition monitoring still rely on batch approaches which cannot cope with a fast sampling rate of metal cutting process. Furthermore they require a retraining process to be completed from scratch when dealing with a new set of machining parameters. This paper presents an online tool condition monitoring approach based on Parsimonious Ensemble+ (pENsemble+). The unique feature of pENsemble+ lies in its highly flexible principle where both ensemble structure and baseclassifier structure can automatically grow and shrink on the fly based on the characteristics of data streams. Moreover, the online feature selection scenario is integrated to actively sample relevant input attributes. The paper presents advancement of a newly developed ensemble learning algorithm, pENsemble, where online active learning scenario is incorporated to reduce operator’s labelling effort. The ensemble merging scenario is proposed which allows reduction of ensemble complexity while retaining its diversity. Experimental studies utilising real-world manufacturing data streams and comparisons with well-known algorithms were carried out. Furthermore, the efficacy of pENsemble+ was examined using benchmark concept drift data streams. It has been found that pENsemble+ incurs low structural complexity and results in a significant reduction of operator’s labelling effort. Index Terms— Prognostic Health Management, Online Learning, Ensemble Classifier, Lifelong Learning, Nonstationary Environments, Concept Drifts I. INTRODUCTION T OOL condition monitoring (TCM) aims to feed real-time information of tool condition for the so-called maintenance The first author acknowledges the support of NTU start-up grant. The third author acknowledges the support of the Austrian COMET-K2 programme of the Linz Center of Mechatronics (LCM), funded by the Austrian federal government and the federal state of Upper Austria. The fourth author acknowledges the support of the Natural Sciences and Engineering Research Council of Canada (NSERC) and Canada Research Chair (CRC) in Computational Intelligence. Mahardhika Pratama is with School of Computer Science and Engineering, Nanyang Technological University (e-mail: [email protected]). Eric Dimla is with the Mechanical Engineering on-demand framework where tool is replaced at the right time only [1]. This paradigm brings significant cost saving to the industry because replacing sharp tools too early and too often incurs frequent shutdown of the machining process and leads to a dramatic increase of tool costs whereas worn tool potentially damages the surface finishing and dimensional integrity of work piece [2] and intensifies vibration level of the cutting process. When the tool is no longer at desired functionality or blunt, it entails high cutting force resulting in expensive energy cost [3]. In a nutshell, the success of TCM allows advanced scheduling of maintenance activities, proactive allocation of replacement parts and enhanced fleet deployment decisions based on the estimated progression of component life consumption. The TCM usually involves two tasks, namely sensing and monitoring [5]. Sensing is a phase used to capture cutting signals from a set of sensors in the TCM. Sensing itself can be further classified into two types of modes, namely direct and indirect. Indirect sensing is committed after completing the cutting process through optical measurement, surface-finishing measurement, and chip-size measurement, etc. The indirect sensing is, nevertheless, not compatible with the online tool condition monitoring which must take place while engaging the cutting process without intermittent stoppage only because it imposes unavoidable time loss for the sake of measurement and does not prevent production waste [6]. The direct sensing, on the other hand, relies on correlated process variables such as: vibration, spindle current, acoustic emission, and force to determine tool wear. All of which can be collected directly through sensor and data acquisition unit installation at the correct position [5]. Among the other three, the force signal is well-known to be the most-correlated variable to the tool wear because a higher cutting force is required when the tool is blunt. The second phase, namely monitoring, aims to perform predictive analytics from the measured signals. Existing monitoring approaches are categorized into three groups [4], namely first principle, data-driven and hybrid. The first Department, Faculty of Engineering, Boulder, University Teknologi Brunei, Brunei Darussalam (e-mail: [email protected]). Edwin Lughofer is with the Department of Knowledge-Based and Mathematical Systems, Johanes Kepler University (email: [email protected]). Witold Pedrycz is with the Department of Electrical and Computer Engineering, University of Alberta, Canada (email: [email protected]). Tegoeh Tjahjowidodo is with School of Mechanical and Aerospace Engineering, Nanyang Technological University, Singapore (email: [email protected]). > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < principle approach usually derives the exact mathematical model of a degrading system including its component. This approach is, however, problem-specific and sometimes it is too hard to be applied due to intricate and inter-related nature of a manufacturing system. This approach is impractical because of the fact that machining process is highly influenced by a number of dynamic factors: temperature, cutting fluids, chip formation, workpiece and tool materials, etc. [1]. Data-driven approach offers an alternative of the former one where predictive analytics is purely done using input/output data recorded by a number of sensors and a set of data acquisition unit. This approach makes use of intelligent techniques which emulate dynamics of tool condition through a “learning” process of manufacturing data. Tool wear progression is measured by considering the plane-faced tool geometry approach with flank wear as the underlying variable of the tool life. The intelligent approaches feature generalization capability where it can be deployed to monitor tool condition in the realtime mode while engaging the cutting process once a model has been created from the learning process. The hybrid approach combines both the first-principle and data-driven approaches where the two are executed in parallel to take advantages of the strength of both approaches. The downside of this approach is obvious because of its expensive computational cost [6]. Recent progress in the TCM research has reported that the data-driven approach has gained increasing popularity in the community [12]-[15] because it can be deployed with a verylittle capital expenditure [12]. It is done using exclusively sensory data and does not require complicated pre-setting requirements or assumption and/or simplification which is inherent in the first principle approach. The data-driven TCM method still requires more advanced data analytics because of at least three reasons: 1) existing approaches rely on a batch learning approach which is not fully compatible for online realtime processing. It requires a complete dataset covering all possible situations in the monitoring process and a complete retraining from scratch when observing a new pattern in the monitoring process; 2) existing approaches are constructed under a static structure predetermined before process runs. Such approaches are not self-adaptive, thereby being unable to adapt to variations of machining parameters. It is also evident that the machining process is often affected by external disturbances which lead to previously learned concept to be invalid; 3) existing approaches are mostly designed under crisp and certain hidden nodes which do not cope with imprecision, uncertainty and a noisy nature of machining processes. As more and more industries have integrated the so-called Internet-of-Things (IoT) in the current trend of automation and data exchange in the so called Industry 4.0 (4 th industrial revolution), this calls for advancements of existing predictive maintenance to cope with online and dynamic characteristics of machining process [12]. The concept of Evolving Intelligent Systems (EIS) [42], [43] provides promising approach for online predictive maintenance because it features two important properties: online learning, dynamic and evolving structure. This trait is appealing because it is suitable for real-time deployment under modest computational resources. The 2 dynamic and evolving structure of EIS is capable of tracking any variation of data streams, which prevents loss of generalization capabilities in the presence of shift or drift in data streams. The EIS research area has grown rapidly as manifested by extensions and variations of EISs encountered in the literature [44]-[50]. Vast majority of existing EISs are constructed under a single base-model where the evolving nature is generated from automatic partitioning of input and output space with fuzzy rule, neuron, etc [44]-[50]. It is understood that the ensemble paradigm is capable of improving model’s generalization because the classification decision is drawn from a collection of local experts. The ensemble method handles the bias-variance dilemma better than its single model counterpart provided that local experts exhibit good diversity. This advantage is normally achieved when incorporating weak local experts. Despite being already mature as reported in the literature [51]-[53], most works in the ensemble learning scenario utilize non-evolving or even batched base classifier. This results in costly computational overhead and memory burdens. The use of evolving base-classifier helps the ensemble classifier to be more robust to deal with the local concept drift because it offers better exploration in the local region than those static classifiers. The local concept drift refers to a situation where drift only occurs in some local regions only with different intensities and speeds. Few works in the literature [47]-[50] have incorporated evolving base classifiers under different ensemble configurations: bagging, boosting and stacking. These works are, however, crafted under a static ensemble structure which cannot adapt to the concept drift. Moreover, they suffer from the absence of drift detection scenario which identifies the presence of concept drift. It is worth noting that drift detection becomes vital in practice because not only the algorithm has to adapt to the drift but also it has to inform when the change occurs to allow in-depth analysis of system’s behavior. This paper presents a novel data-driven tool condition monitoring methodology benefiting from recent progress in the area of data stream analytics. An evolving ensemble classifier, namely Parsimonious Classifier+ (pENsemble+) is put forward. pENsemble+ handles aforementioned limitations because of the fact that it works fully in the single-pass fashion where data are directly discarded once learned without the requirement of secondary memory or archival storage. Furthermore, it adopts a fully evolving working scenario where both ensemble structure and base-classifier structure can be automatically generated and pruned from data streams. Moreover, the underlying innovation of pENsemble+ compared to its root, pENsemble [9] is implied by two facts: 1) pENsemble+ is equipped by the online active learning scenario which actively selects the training samples for model updates. This trait is vital for online tool condition monitoring because it relieves operator’s annotation effort; 2) pENsemble+ introduces the notion of “ensemble merging scenario” which aims to maintain ensemble complexity in the low level while improving diversity of the ensemble classifier. This strategy enhances the significance-based pruning technique existing in the literature [10] which often compromises the model’s diversity. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < pENsemble+ is constructed with a generalized version of Dynamic Weighted Majority [11] which puts forward an open ensemble structure. Unlike the original DWM [11] and its extension in [41], pENsemble+ is equipped by an online active learning scenario which automatically selects training samples for model updates based on the Bayesian conflict measure which analyses conflict level in both feature space and target space. The online active learning scenario utilizes a dynamic threshold mechanism which copes with rapidly changing environments. In realm of tool condition monitoring problem, the online active learning scenario resolves the major bottleneck of supervised learner which happens to be overdependent on operator’s feedback. pENsemble+’s structure is automatically generated using the drift detection method devised with the concept of Hoeffding bound [16]. pENsemble+ adopts the penalty and reward scenario where the base-classifier is punished when making misclassification, whereas a reward is granted provided it returns correct prediction. The reward scenario is an additional phase in respect to the original DWM which is meant to retain diversity of ensemble classifier. It is worth-noting that the strength of ensemble classifier compared to the single classifier lies in the diversity aspect which addresses the bias and variance dilemma better than the single classifier and is more robust against various forms of uncertainty such as noise, etc. This case, however, must be interpreted with care in the data stream context which happens to be non-stationary because outdated or irrelevant classifier undermines final predictive decision. Complexity reduction scenario is incorporated with the ensemble merging scenario which focuses on the redundancy issue. The redundancy issue is analyzed by inspecting the mutual information of base-classifiers. Two classifiers having significant amount of mutual information are merged. The ensemble merging scenario offers plausible tradeoff between diversity and simplicity since it does not scan through poor classifiers rather focus on those redundant classifiers. Another unique feature of pENsemble+ is shown in its online feature selection scenario [17] which dynamically samples relevant input attributed during the training process. This mechanism assigns numeric weight (0 or 1) for every input attribute in every training observation and allows to arrive at different subsets of input attributes in the training process. pENsemble+ deploys an evolving fuzzy classifier, namely pClass as a local expert [18] which adopts an open structure. This provides additional flexibility in the base-classifier level. Furthermore, pENsemble+ will be implemented under the two variants of pClass, namely axis-parallel and multivariate. The difference between the two lies in the rule premise where the axis-parallel rule only exploits the Gaussian rule with diagonal inverse covariance matrix, while the multivariate rule features more advanced version than the former one with a non-diagonal inverse covariance matrix. The major contributions of this paper are outlined as follows: 1) the paper puts forward a new perspective for online tool condition monitoring approach based on a novel evolving ensemble classifier. The unique features of our approach are seen in its capabilities in handling the three bottlenecks of 3 existing data-driven TCM, time and space complexity, concept drifts, and data uncertainty; 2) A novel ensemble classifier, namely pENsemble+, is proposed. This algorithm goes one step ahead when compared to existing ensemble classifier where an evolving classifier is deployed as a base-classifier. Two variants of pClass, namely axis-parallel and multivariate, are used as the base-classifier; 3) pENsemble+ also features online feature selection which is capable of extracting relevant input attributes on demand; 4) Another unique feature of pENsemble+ is shown in the online active learning scenario automatically sampling relevant samples for model updates and the ensemble merging scenario offering complexity reduction without compromising diversity of the ensemble classifier; 5) A real-world experiment in the metal-turning process was carried out where real-world manufacturing data were collected and preprocessed. It turns out that the flank-wear is not the only factor affecting tool life [5] and the use of chip-breaker geometry inserts greatly affects the mechanics of machining. Our experiment was done with two types of tool inserts with chip breaker geometry, coated and uncoated grades. These tools were utilized in cutting EN24T steel while predictive analytics of tool condition were undertaken with three sensory variables, cutting force, dynamic cutting force and vibration. The underlying goal was to identify cutter condition on the fly. Our experiment used a fresh insert and continued until the worn state without artificial actions to wear the tool. The efficacy of pENsemble+ was experimentally validated in the online tool condition monitoring of the metal cutting process and was compared with a number of recently published algorithms: Learn++.NSE [19], Learn++.CDS [20], pENsemble [9] and pClass [18]. Additional numerical results were also served using popular concept drift problems in the literature. The advantage of pENsemble+ was evident in our experimental study where it attained significant improvement in time, space and sample complexity even compared to a single classifier without substantial compromise on accuracy. The paper is structured as follows: Section 2 encompasses learning policy of pENsemble+ and learning procedure of its base classifier, pClass; Section 3 outlines experimental procedure and machining setup; Section 4 elaborates on numerical results; and some concluding remarks are drawn in the last section of the paper. II. LEARNING POLICY OF PENSEMBLE+ This section elaborates on fundamental working principle of pENsemble+ including ensemble learning mechanism and learning scenario of the base-classifier. An Overview of pENsemble+ learning mechanism is depicted in Fig. 1. pENsemble+ executes data streams on a chunk by chunk basis where each data chunk is fed to the online active learning scenario which is meant to shrink data chunk size and to relieve operator’s labelling effort. The learning process continues with the online feature selection scenario which assigns numeric feature weights (0 or 1) for every input attributes. The performance of base classifier is evaluated based on its > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < predictive performance reported on a new observation where misclassification triggers a penalty reducing its voting’s weight while reward augments it. The complexity reduction scenario is 4 implemented through the ensemble merging scenario. The drift detection scenario determines the learning stage which governs the stability and plasticity of the ensemble classifier, Fig. 1 Learning Policy of pENsemble+ A. Parsimonious Classifier (pClass) pENsemble+ deploys a newly developed evolving classifier, namely pClass as a base-classifier in order to attains greater flexibility in handling concept drift in individual local regions. This phenomenon is known as the local concept drift in the literature. It is evident that concept change applies to particular input regions only with different rates and severities.  Fuzzy Rule of pClass: pClass is a class of first-order evolving fuzzy classifiers constructed with Takagi Sugeno Kang (TSK) fuzzy system where the rule consequent implements a firstorder linear function while the rule premise is built upon the multivariate Gaussian function generating non-axis-parallel ellipsoidal clusters. Although the original pClass utilizes the multivariate Gaussian function with a non-diagonal inverse covariance matrix, the simplified version of pClass is also realized in pENsemble+ where a diagonal covariance matrix is used. This comparison aims to provide an overview of ensemble performance under two different base-classifiers.  Rule Growing Strategy of pClass: pClass makes use of three rule growing modules, namely Datum Significance (DS), Data Quality (DQ), volume measure. The datum significance (DS) method is derived from the theory of statistical contribution presented in [21], [22]. This method aims to estimate the potential contribution of a rule or a data point during its lifespan. This method assumes that data samples are uniformly distributed and the statistical contribution is estimated using the Gaussian function as the kernel function. Because the DS method utilizes the uniform distribution assumption, it loses spatial information of data streams. This drawback is addressed in [23] by introducing the sliding-window-based approach where it calculates the accumulated firing strengths across data points in the sliding window. The size of sliding window is often problem-dependent. The DQ method is introduced to answer this bottleneck where it aims to extract density information of data samples. This strategy is inspired by the notion of recursive density estimation (RDE) in [24]. pClass extends this method for the multivariate Gaussian function and integrates the weighting function to cope with the outlier drawback [25]. Furthermore, the third rule growing module checks the volume of winning rule. It aims to limit the size of the fuzzy rules because the over-sized rules risks on the socalled cluster delamination problem. That is, one cluster may cover one or more distinct data distributions [26]. It must be noted that, as with pENsemble+, pClass is also implemented under the axis-parallel ellipsoidal rule in pENsemble+ to analyze the effect of two different base-classifiers. The same formulas as in the original pClass can be used except that the diagonal covariance matrix is deployed instead of the nondiagonal version.  Rule Pruning and Recall Strategy of pClass: pClass is equipped by two rule pruning scenarios, namely Extended Rule Significance (ERS) and Potential+ (P+) methods. The ERS approach shares the same principle as the DQ method except the statistical contribution of a fuzzy rule is estimated instead of a data point. This component aims to scan through inconsequential rules which do not play significant role during its lifespan. Such rules can be pruned without compromising generalization performance. The P+ method, on the other hand, > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < functions to capture outdated rules which are no longer relevant to represent current data distribution. This trait is made possible by inspecting the density evolution of fuzzy rules. The P+ method presents a modification of potential method in [27]. The potential method is used for the rule pruning scenario in [28] but the P+ method differs from this approach because it is based on the inverse multi-quadratic function in lieu of the Cauchy function. In addition, pClass incorporates the so-called rule 5 recall scenario. This scenario allows previously pruned rules to be reactivated again in the future. This scenario refers to a case where old concept reappears again in the future. One can consider to introduce a new rule to overcome this situation but this strategy catastrophically erases past learning history. This situation is undesired because learning a local region must be restarted from scratch again. Algorithm 1. Pseudocode of pENsemble+ Algorithm 1: Parsimonious Ensemble+ (pENsemble+) Given a data chunk D factor  ( X Pn , T PO ) where P, n, O are chunk size, the number of input dimension, the number of output dimension; set the adjustment pi , the pruning threshold  ; C ,  ,  1O are global and local predictions, sum of weighted predictions for each class D ( nO) is received For t  1,...,  // loops over all examples in the data chunk a data chunk IF the ensemble network is empty M  1 // create the first local expert, i  1 // initialize the weight of a local expert End  0 Execute the online active learning (1)-(4) IF P( y0 X )input   OR P( y0 X )output   Discard the data sample ELSE Accept and label the data sample for model update Execute the feature selection mechanism (7)-(9)  1,..., M // loop over local experts   max ( yi , j ) // elicits the local prediction For i j 1,...,O IF (   Ct ) yi   i yi // decreases the weight of a local expert when it predicts incorrectly i  i p Else  i  min(  i (2  p ),1) End       yi End C  max(  ) // Produces the global prediction, i   1,...,O For i  1,..., M i // normalizes the weight M  i 1 i Undertake the ensemble merging procedure based on the maximum correlation index IF (12) Discard i-th local expert End End Undertakes the drift detection method (13),(14) IF Drift Introduces a new base classifier ElseIF Warning Do nothing and prepare for possible drift in the next observation ElseIF Stable Train the winning Classifier End End  Parameter Learning Scenario: pClass utilizes the fuzzily weighted generalized recursive least square (FWGRLS) > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < method which presents a weight decay term to retain small and bounded weight vector. This strategy is inspired by the concept of Generalized Recursive Least Square [29] which incorporates the weight decay term in the cost function of RLS [30]. The FWGRLS can be also seen as a variation of the fuzzily weighted recursive least square method [31] with addition of the weight decay term. The advantage of weight decay term is to safeguard the weight vector to keep its values small. It is worth noting that we adopt the simplified form of GRLS method where the second term is ignored. This leads to similar formulas of FWRLS method except the presence of weight decay term. This strategy is meant to improve the model’s generalization and compactness of the rule base since a rule with a very small weight vector can be easily detected by the ERS method. There exist several types of weight decay term, say quadratic, quartic, multimodal, etc. The quadratic weight decay term is selected in the pClass since the weight vector proportionally decreases to their initial values. B. Ensemble Learning Scenario pENsemble+ is developed with a generalized version of DWM which adopts an open structure paradigm. This learning scenario clearly differs from original DWM at least in 4 facets:1) the voting weight is given a chance to increase and this strategy aims to retain diversity of ensemble classifier; 2) the drift detection strategy is deployed to introduce a new baseclassifier whereas, in the original DWM, a new base-classifier is added when the global prediction returns misclassification; 3) the ensemble merging scenario based on the maximum information compression and the online feature selection scenario are absent from the original DWM. Algorithm 1 illustrates the fundamental working principle of pENsemble+. pENsemble+ works on a chunk-by-chunk basis and if no base classifier exists, the first classifier is created using the first data chunk. The learning procedure starts with the online active learning scenario evaluating sample’s contribution whether it deserves a learning process. The Bayesian conflict measure is deployed to measure conflicts in the input and output space. A sample is accepted for model updates provided that it satisfies dynamic sampling criteria. If a data sample meets the dynamic sampling criteria, the learning process continues with the labelling process followed by the online feature selection scenario. The online feature selection selects relevant input features by assigning crisp weights (0 or 1) and makes possible to arrive at different combinations of feature subsets in every training episode. The predictive performance of each base classifier is examined afterward where a classifier returning misclassification is penalized by decreasing its voting weight whereas a reward is given by increasing the voting weight when correct prediction is made The decreasing and reward factor, p, is selected at 0.5. The global prediction of ensemble classifier is inferred from a weighted sum of each class. The voting weight of each base classifier is normalized to allow proportional voting weights among each local experts. A class with the maximum weight is chosen as the predicted class. This procedure is followed by the ensemble merging procedure which is meant to capture redundant classifiers. Two classifiers with high mutual information are coalesced. The last phase of the training procedure is the drift detection scenario 6 categorizing dynamic of data streams into three conditions, stable, warning and drift. When a drift is signaled, a new baseclassifier is introduced. No action is performed during the warning condition since this phase depicts a transition period before a drift is confirmed. Such situation usually occurs in the presence of gradual drift. The winning classifier is updated using the newest data chunk during the stable phase to keep upto-date with the most recent concept and to prevent over-fitting. The winning classifier is selected from that having the lowest predictive error – MSE. The learning components of pENsemble+ are detailed as follows:  Online Active Learning Strategy: online active learning scenario is urgently required in the complex manufacturing process because of the cost in obtaining the true class label. This usually requires a complete shutdown in the machining process since the flank wear has to be evaluated through visual inspection or at least some delay is expected to receive the true class label. pENsemble+ features an online active learning scenario based on the extended conflict ignorance (ECI) paradigm [32] which evaluates conflict in both feature and target domain. This strategy was derived from the conflict and ignorance method for the conventional TSK fuzzy classifier [33] where the underlying difference lies in the use of a dynamic sampling paradigm [34] and Bayesian posterior probability estimation in both input and output space. None of these works, however, investigate the ECI method within the context of ensemble classifier. As a matter of fact, the ensemble learning scenario requires an innovation for sample evaluation strategy since it consists of a collection of local experts evolved from different data space. One must start from the fact that a data sample may incur different conflict degrees in different local experts. Although the sample evaluation strategy should take place at the local level, a centralistic sample evaluation strategy where all base classifiers are put together under one roof to produce the predicted class label is formed. This strategy is chosen to suit the online feature selection module of pENsemble+ which also adopts the centralistic feature selection scenario. Moreover, it is found that this does not make substantial difference since the maximum operator has to be ultimately committed when performing local sample evaluation to analyze the confidence of ensemble classifier. The Bayesian conflict measure in both input and target space is utilized to evaluate conflict level for each local expert. The Bayesian approach is preferred over a standard distance or firing strength measure because it encompasses the prior probability and the joint –category and class probability. A sample is conflicting not only because it is out of scope of a current fuzzy rule but also if it occupies “unclean” region shared different class samples. Moreover, the prior probability is required to take into account the cluster’s population since a highly populated cluster tends to be “frozen”. That is, it is no longer responsive to accept new training stimuli due to the characteristic of rule premise update affected by the cluster’s support. The conflict in the output space, on the other hand, is measured from the classifier’s truncated output. The classifier’s output here is taken from the preference degree [32] determined with respect to the two most dominant classes since it intuitively informs about the degree of closeness to the decision boundary. A sample is conflicting if it falls near two-decision > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < boundary and results in the preference degree with the value around 0.5. The Bayesian conflict measure formed in the input space is expressed as follows: R P( yo X )   P( y o j Ri ) P ( X Ri ) P ( Ri ) i 1 R  P( y (1) j Ri ) P ( X Ri ) P ( Ri ) j 1 i 1 where P( y o X ), P( X R i ), P( X R i ), P( Ri ) respectively stand for the joint-class and category probability, the upper likelihood function, the lower likelihood function and the prior probability. The joint-class and category probability and the prior probability are defined as follows: Ni , j N P ( Ri )  R i , P( yo Ri )  o (2) N i 1 i N i, j j 1 where N i , N i , j stand for the support of i-th rule and the support of the j-th class of the i-th cluster. (2), (3) can be softened by adding the log operation. This approach is useful in the category choice phase because it provides higher likelihood for a newly created cluster to be selected as the winning rule. The joint-class and category probability is estimated by the number of j-th class of the i-th rule which signifies the purity degree of a fuzzy rule [18]. The class overlapping condition is most likely to be found in the case of unpurified cluster. The likelihood function can be defined in the similar way as their crisp version using the Mahalanobis distance as follows: 1 P( X Ri )  exp(( X  Ci )i1 ( X  Ci )T ) (3) 1/2 (2 Vi ) 1 where Ci ,  i denote the Center and inverse covariance matrix of the i-th rule while Vi stands for the volume of i-th rule. The advantage of Bayesian approach is also clear when fuzzy rules occupy in almost similar proximity to a data sample because of its prior probability. The volume of fuzzy rules can be obtained with ease with the determinant operator. If a precise estimation is required, it can be calculated as shown in [18] where the Gamma function and the eigenvalue are utilised. Note that the determinant may return negative volumes as per its definition as the signed volume. The conflict in the output space is evaluated from the classifier’s truncated output to guarantee that it lies in in the interval [0,1] as follows: y1 P( yo X )  min(max(conf , 0),1), conf  (4) y1  y2 where y1 , y2 stand for the most and second most dominant classes which can be obtained from the highest and second highest outputs of pClass. It is worth mentioning that pClass characterizes the regression-based classifier constructed under the MIMO architecture which scatters rule consequent for each output. It is evident that this formula portrays the classifier’s confusion perfectly because a significant conflict is indicated when a classifier does not produce a conclusive prediction – 7 two outputs have about the same values. This situation may occur when a data sample is geometrically close to the decision boundary separating the two classes. Suppose that P( y0 X ) input , P( y0 X ) output are the estimate of posterior probability in input space and output space, the condition of sample acceptance is formalized as follows: ( P( y 0 X ) input   or P( y0 X ) output   ) (5) where  is the conflict threshold. The higher the value of this parameter the higher the number of training samples are accepted for model updates, whereas the lower the value of this parameter the fewer the number of training samples are discarded for model updates. A sample is supposed to be a good candidate for model updates, if it results in significant conflict for all base classifiers. This strategy aims to enhance the diversity of the ensemble classifier by preventing redundant samples to be learned. Furthermore, a budget [34] controlling the maximum labelling cost can be inserted in (5)-(7). This approach is useful when the true class label is too expensive to be obtained such as in the bioinformatics applications. The online active learning can also function to address the class imbalance issue. First, the imbalance factor is estimated to find the minority and majority classes. The online active learning is set loose for minority class samples up to a point where a balanced proportion of target classes has been achieved. That is, minority class samples are always sampled to attain equal class distribution. Since the true class label is unknown in realm of online active learning scenario, it is estimated with the posterior probability in the input and output space (1), (4). Both class imbalanced and budget scenarios are already actualized in [12]. It is omitted here to keep the presentation concise.  Online Feature Selection Scenario: the online feature selection scenario is based on the OFS method in [17]. The OFS method is generalized here to be well suited to the ensemble working scenario since the original version only covers its implementation to the single linear regression. The unique feature of this approach lies in the fact that it makes possible to arrive at different subsets of input attributes by assigning binary weights (0 or 1). In other words, it removes the risk of discontinuity because it provides likelihood for every input feature to be selected in every observation. The OFS method cannot be directly implemented in the ensemble learning scenario because sensitivity of input attributes should be analyzed with respect to all base classifiers. This issue leads to carry out this scenario in a centralistic manner. That is, all fuzzy rules of base-classifiers are put together to perform the OFS procedure. Note that this mechanism is made possible by the fact that pClass adopts a local learning scenario where every rule is loosely coupled and has its own output covariance matrix. Let’s recall the fuzzy rule of pClass comes as follows: 1 o o (6) Ri : IF X n is N ( X ; Ci , i ) THEN yi  xeWi where Ci   is the numeric center of the multivariate Gaussian function and u is the number of input variables. u i1  u u is the interval-valued inverse covariance matrix, xe  (u 1) is the extended input vector, Wio  (u 1) is the interval-valued output weight vector. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < The OFS procedure starts by examining the prediction of a single pClass created by all rules of ensemble classifiers – all fuzzy rules are put together to construct a single classifier. The OFS method only takes place when a model returns misclassification C  Cˆ to save computational cost because the OFS method is meant to recover predictive quality of the model by getting rid of the influence of poor features. The output o weight vector Wi is adjusted using the stochastic gradient descent approach as follows: Wi  Wi  Wi   where  ,  are learning E Wi rate and (7) regularization factor, E can be derived with ease W for upper and lower output weight vector by applying the standard MSE as the cost function. The stochastic gradient descent is utilized to adjust the output weight rather than the FWGRLS method as pClass, since the OFS method is undertaken in the centralistic manner having different optimization objective from that of the base-classifier level. Moreover, the stochastic gradient descent is much easier to be executed than that of the FWGRLS method because no output covariance matrix has to be assigned when performing the OFS scenario. To guarantee a bounded norm, the output weight vector is projected to the L2 ball as follows: respectively. The gradient term 1 Wi  min(1, Wi  )Wi (8) 2 This strategy is also required to examine whether values of the output weight vector is concentrated within the L2 ball and thus pruning small values, being remote from the L2 ball center, does not compromise the model’s generalization. The contribution of input attribute is informed from its dominance in the output weight vector. In realm of the TSK fuzzy system, the rule consequent or the output weight vector steers the direction or the tendency of a rule in the output space. In addition, the output weight vector is more stable than the gradient information (changing in each observation) during the sensitivity analysis. The contribution of input attribute is expressed in the form: R Ij  W j ,i i 1 u R W (9) j ,i j 1 i 1 where I j is the sensitivity of j-th input feature and R is a total number of fuzzy rules across all base-classifiers. Note that the data standardization must be performed in this context because different input ranges obscure the true contribution of input attributes. Suppose that B is the desired input dimensionality and B is smaller than the original input dimension u, the input attributes with the B largest input contributions I j are picked up in every observation and the remainder of input attributes are ruled out from the training process by assigning 0 weights. 8 Input attributes are not permanently forgotten and are reactivated in the future whenever they are called for the current data distribution – cyclic drift. The OFS method also covers the case of partial input information required when the cost of feature extraction is too costly. Because the partial input information is similar to that of full input version, it is not recounted in this paper. The sensitivity measure (9) is also used in eTS+ [55]. Nonetheless, eTS+ adopts the hard input pruning mechanism where superfluous features are permanently discarded without any opportunity to be picked up again.  Ensemble Pruning Scenario: The main bottleneck of ensemble classifier for data stream application is found in the issue of computational and space complexity because it incurs considerable complexity if it consists of a large collection of base classifiers. Nonetheless, the ensemble pruning scenario is often counterproductive for classifier’s accuracy since it limits the diversity of the ensemble classifier [35] – the underlying strength of the ensemble classifier. The ensemble pruning scenario discards superfluous classifiers – either poor classifier or outdated classifier. Although such classifiers play little during their lifespan, they remain important to generate diverse output space. In realm of dynamic and evolving learning environments, significance of base classifiers usually changes rapidly in accordance to the context. When using the ensemble pruning scenario, it is necessary to integrate the recall capability because already pruned classifiers may turn out to be useful again to cover future data distribution. The most plausible approach to complexity reduction of ensemble classifier is by putting forward the ensemble merging scenario. That is, it analyses mutual information of base classifiers and base classifiers featuring strong mutual information are merged to be a single classifier. The mutual information is quantified by comparing the classification output of two classifiers. The mutual information is relatively more stable than the significance-based criterion because it measures correlation between two base classifiers. An Analysis of mutual information can be performed using any correlation measure provided that they satisfy the online learning requirements. Nonlinear correlation measure is often more accurate than linear correlation measure but it is not scalable for online real-time processing and requires simplified assumptions such as training samples follow normal distribution [36]. pENsemble+ utilizes the maximal compression index (MCI) to measure correlation of two base classifiers. This approach is more robust than conventional Pearson correlation index since it is insensitive to rotation and translation [37]. It calculates the amount of information loss when ignoring one of the base classifier and if no significant difference exists or MCI is small, the information of ignored base classifier is already covered by its pair. The MCI is expressed as follows: 1  ( y1 , y 2 )  (var( y1 )  var( y 2 ) 2  (var( y1 )  var( y 2 )) 2  4 var( y1 ) var( y 2 )(1   ( y1 , y 2 ) 2 ) (10)  ( y1 , y 2 )  cov( y1 , y 2 ) var( y1 ) var( y 2 ) (11) > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < where cov( y1 , y 2 ), var( y1 ), var( y 2 ) ,  ( y1 , y 2 ) denote the covariance of classifier’s outputs y1 , y 2 , variance of classifier’s output y1 , variance of classifier’s output y 2 , and the Pearson correlation index, respectively. The variance and covariance can be calculated recursively with ease. It is worth mentioning that the MCI satisfies the following properties: 1) 0   ( y1 , y 2 )  0.5(var( y1 )  var( y 2 )) ; 2) the maximum correlation is attained when  ( y1 , y 2 )  0 ; 3)  ( y1 , y 2 )   ( y 2 , y1 ) ; 4) it is insensitive against the translation because mean expression is nowhere in (6); 5) it is insensitive to rotation because a perpendicular distance of a point to a line is not dependent on rotation. The ensemble merging condition is set as follows:  ( y1 , y 2 )   where  is a merging (12) threshold. The lower the value of this threshold implies less merging process to be performed in the training process, whereas the higher the value of this threshold induces more aggressive merging process is committed during the training process. Once a merging decision is taken, one of the two classifiers is discarded. The classifier with a lower accuracy is selected for the pruning process while another one is retained.  Drift Detection Scenario: the dynamic of pENsemble+ is controlled by a drift detection scenario, which aims to discover abnormal patterns leading to possible change of data stream dynamics. The drift detection is based on the Hoeffding’s inequalities [16] which classifies dynamics of data streams into three categories, namely normal, warning and drift. The normal phase means no variation in data streams is found, while change still needs for further investigation in the warning phase. The drift phase means that change is certain in data streams. The advantage of this method lies in assumption-free for the probability density function. It assumes data streams as independent and bounded random variables. The drift detection scenario is carried out by inspecting statistics of data streams – moving average - without any weight. Although its weighted moving average variant does also exist in [16], the standard moving average is deployed here since it is more sensitive to abrupt change than the weighted version and also is easy-to-use because it does not call for specific tuning scenario for weight adjustment. The statistics of data streams is computed as  X t   t X t , t  1 , X  X . Note that its recursive t 1 version can be derived with ease. The drift detection strategy adopts similar concept as the statistical process control except the assumption of normal distribution is removed. The standard deviation in the confidence interval  is replaced with the significance level  . Two significance levels are implemented to determine the conflict level in data streams. They correspond to two levels of the drift detection scenario, namely the warning level ( W ) and to the drift level (  D ). 9 This strategy partitions a data chunk into three groups, u namely X  [ x1 , x2 ,..., x ]   , Y  [ xcut 1 , xcut  2 ,..., x ]   cut 1u , Z  [ x1 , x2 ,..., xcut ]  cut u where X , Y , Z are statistics computed from these three data groups. Each group is assigned with a Hoeffding’s error bound  X ,  Y ,  Z to set proper conflict levels which signify the status of data streams. The error bounds are allocated as follows: (m) 1 (13)   (b  a) ln( ) 2cut (m  cut )  where [a, b] are the minimum and maximum values of input attributes and  is the significance level. Note that the significance level has a clear statistical interpretation which corresponds to the confidence level of the Hoeffding’s bounds 1 . The drift detection starts by finding the cutting point which pinpoints a switch point of two data distributions and in turn partitions the data chunk into the three groups. The switch point does not signal directly drift condition to prevent the outlier’s effects rather in-depth investigations must be performed to ascertain the status of data distribution – whether a drift really presents. It is in line with the fact of gradual drift where three exists a transition period that depicts a mix between two distributions. A data point is said to be a cut point given that the following condition is met. Zt   Z  X t   X (14) t t The next step is to determine the status of data streams by formulating a hypothesis test. If null hypothesis is rejected with size  D , a drift’s status is returned, whereas a warning status is indicated, if null hypothesis is rejected with size  D , W . In other words,  D , W correspond to the confidence level of Hoeffding’s inequality for warning different stages: (warning), 1  W 1   D (drift). The lower the value of  D ,W the lower the confidence level of Hoeffding’s bound is – more examples are considered to be a drift. This implies to more baseclassifiers to be added during the training process and vice versa. The null hypothesis is formed as H 0 : E ( X )  while its alternative is defined as H1 : E ( X )  E (Y ) , E (Y ) . Since the weight is excluded here, this hypothesis is analyzed as X  Y    where   is found from (10) by applying a specific significance levels  D , W which correspond to either drift or warning. This hypothesis inspects the dynamic of data streams after a switching point. This is meant to substantiate the presence of drift in data streams. If the null hypothesis happens to be maintained, the stable condition is signaled. III. EXPERIMENTAL SET-UP & DATA COLLECTION The set-up consisted of a Lang Swing J6 centre-lathe, onto which a Kistler tool-post dynamometer platform (type 9263A) was mounted to measure three mutually perpendicular components of cutting force. A Kistler tri-axial accelerometer (type 8730A) was used to measure three mutually perpendicular > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < components of vibration from the underside of the tool holder. A Kistler charge amplifier (type 5006) and a Kistler power supply/coupler (type 5134) were used to amplify and decouple the cutting force and acceleration signals. Dry cutting was carried out on EN24T BS 970 817M40 alloy steel work-piece of Brinell hardness 255 of composition: 0.4% C, 0.28% Si, 0.27% Mo, 1.18% Cr, 0.5 % Mn and 1.4% Ni. The tool holder was Sandvik SSBCR 2020 K12 and the throwaway inserts were Sandvik Coromant of type SCMT 12 04 08 UM and material P25 4025 and P15 4015. Three cutting speeds (m/min) and feed-rates (mm/rev) of 275, 300, 350 and 0.1, 0.2 & 0.3 respectively were used at a constant depth of cut of 2 mm. Six signals were recorded using an Amplicon PC-30 data acquisition card mounted in a personal computer, at 4096 (N) samples per channel, a sampling rate of 30 kHz, and recorded on computer for analysis. 10 The flank wear values are determined from its effect to the surface quality and other equipment. It is well-known that blunt tool imposes higher cutting force which leads to costly scrap and even damages made to the machine. The cutting conditions were incorporated to the input vector sets to assure that the underlying process parameters would be less sensitive to changes in the cutting conditions (cutting speed, feed rate and depth of cut). In total, 12 input time-domain and frequency-domain attributes are collected to identify the five conditions of the tool. IV. DATA PROCESSING AND SENSOR FUSION Any typical sensor is used to measure one desired parameter and any other parameters influencing the measurement are considered to be interfering with the measurement. For example, a dynamometer is often used in measuring cutting forces (or thereof moments) which are then correlated to the process of interest. Because of the complex and non-linear nature of the cutting process, sensor co-operation is not only desired but also necessary. Essentially, sensor fusion relies on the fact that the fusion of different source signals of probable mediocre quality, yields better results than when only one such a signal is used [1] [2]. A comprehensive review of the synergistic integration of multi-sensor information can be found in [3] with typical application scenarios in TCM found in [4-6] [7]. Sensor fusion traditionally has been performed through application of statistical methods such as PCS or regression analyses [8] or a set of heuristic rules, but machine learning approach has recently gained popularity for TCM. Fig. 1 evolution of ensemble structure In most metal turning processes, flank and crater wear are usually the more prevalent forms of tool wear when cutting with plane-faced geometry inserts, and their occurrence are unavoidable. A judicious choice of cutting conditions can remedy other forms of wear such as frittering, notch and nose. In this investigation, coated (P15) and un-coated (P25) carbide inserts with chip breaker geometry to reduce chip/tool contact were utilized in order to minimize crater wear. The process was interrupted occasionally to record the flank/nose wear lengths measured with the aid of a Tool Maker’s Microscope. The ISO 3685 wear criterion was used as a guide but not strictly applied. The decision for percentage wear on the cutting tool used as the classification benchmark as either worn or sharp was rather subjective. This was because each test cut began with a fresh tool insert and cutting continued until either the tool failed or flank/ nose wear had accumulated excessively. The following guideline was employed in determining the tool class: i. fresh (sharp), flank wear < 0.1 mm; ii. nominally sharp, 0.1 mm  flanks wear < 0.1 mm; iii. partly worn, , 0.12 mm  flanks wear < 0.15; iv. worn, 0.15 mm  flanks wear < 0.17mm; v. severely worn, flanks wear  0.17 mm. Fig. 2 Fuzzy Rule Evolution The instrumentation set-up did not allow simultaneous recording of the static and dynamic cutting forces. The parameters were mathematically extracted from the recorded cutting force signals. The dynamic forces were found by calculating the oscillatory part of the sampled force signals, meanwhile the arithmetic mean of the sampled cutting force signals were taken to represent the static cutting force components. The obtained dynamic data (dynamic force and vibration) were passed through a forward FFT, and the DC component of the dynamic force eliminated. The sum total power contained in the FFT spectrum (N/2) was taken for each cut and the values from this calculation together with the static forces formed the input data samples. In total, there were 157 data samples of which less than 10% could be said to represent > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < the worn tool – partly worn, worn, severely word, while the rest were for a nominally sharp tool – fresh and nominally sharp. The obtained data were normalized such that the distribution for Algorithms pENsemble+ (axis-parallel) pENsemble+ (multivariate) pENsemble pENsemble+ (axis-parallel) pENsemble+ (multivariate) pENsemble Case Binary Multiclass 1) each signal was positioned within the 0.1-0.9 range, had zero mean with an equal variance distribution for similar learning rates and weight convergence. CR 0.61±0.18 Table 1. Numerical Results FR BC NP 2.8±1 1.1±0.3 28±10.3 IA 2 TS 46.4±1.8 RT 0.01±0.004 0.65±0.12 1.2±0.63 1.1±0.3 14.4±7.6 2 44.7±1.6 0.02±0.004 0.52±0.12 0.81±0.15 3.2±1.7 1 1.1±3 1 32±18.8 16 2 2 63 92±3.97 0.01±0.005 0.01±0.002 0.77±0.12 1 1 18 2 91.8±3.9 0.04±0.009 0.85±0.11 1 1 16 2 107 0.01±0.002 V. PREDICTION PHASE Two cases, namely binary and multi-class, were simulated in the prediction phase. The binary case was formed by grouping fresh and nominally sharp as one group, while the other three were assigned as another group. The multi-class case consists of 4 classes which represents the following toolcondition.  Flank wear mark value ≤ 0.15mm, tool insert nominally sharp  Flank wear mark value > 0.15mm, tool insert worn (high flank)  Nose wear length ≤ 0.2mm, nominally sharp  Nose wear length > 0.2mm, tool worn (nose fractured / chipped) The experimental procedure follows the 10-fold cross validation (CV). The CV procedure, on the other hand, is meant to avoid the data order dependency problem and utilizes 10-fold process where all data are distributed into 10 mutually exclusive bins. The first bin is used to test the generalization power of the model, while the remainder bins were exploited to evolve the model. This process moves to the next bin as the testing samples while others are used as the training samples. It is repeated until all bins have been used to examine the accuracy of the model. Data stream environment is created by presenting the data in small batches during the training process. Table 3 summarizes details of our numerical study including characteristics of datasets and the experimental procedure. pENsemble+ was benchmarked against pENsemble which happens to be predecessor of our proposed algorithm to exhibit to what extent the proposed methodologies in this paper are capable of improving numerical results of pENsemble. pENsemble characterizes a fully evolving fuzzy classifier using pClass [18] as a base classifier. It, however, suffers from the absence of online active learning scenario and still utilizes the generalization-based ensemble pruning scenarios. pENsemble+ is implemented with two types of pClass, axis-parallel and multivariate, to perceive the effect of base-classifier to the overall learning performance. The difference between the two is seen in the rule premise from which two different ellipsoidal clusters are generated automatically. Our simulation is carried out in MATLAB under a laptop with Intel Core i7-6500U CPU and 16 GB of RAM. The MATLAB codes of pENsemble+ are provided in1). Two benchmarked algorithms are evaluated in 5 criteria: classification rate (CR), Fuzzy Rule (FR), base classifier (BC), network parameters (NP), input attribute (IA), https://www.dropbox.com/s/ve11dbgz87ydn08/pENsembleplus.zip?dl=0 11 training samples (TS), and runtime (RT). Numerical results are tabulated in Table 1. It is seen from Table 1 that pENsemble+ is capable of delivering competitive accuracy with less training samples than that pENsemble. In the context of binary classification problem, pENsemble+ even beats pENsemble in almost all criteria. It is also confirmed that pENsemble+ saves around 30% of total training samples. The multivariate Gaussian function contributes to the lowering of the fuzzy rule requirement. VI. NUMERICAL STUDY WITH BENCHMARK PROBLEMS This section elaborates on numerical study using three popular concept drift problems, namely hyperplane, SEA and SUSY. pENsemble+ is compared with the same set of algorithms and is evaluated with the same performance metrics. The experimental procedure follows the periodic hold-out process where the training process is carried out using the odd data streams, while the testing phase utilizes the even data stream. This procedure simulates real data stream environments where past samples are discarded once seen. Table 2 shows numerical results of the consolidated algorithms. A) Hyperplane Problem: this problem is obtained from the data stream generator of massive online analysis (MOA) [38]. It features a binary classification problem where the main task is to classify a data point into two classes with respect to the random hyperplane in the d-dimensional feature space. A class d is classified as the positive class if w x  w i i 0 , whereas the i 1 d negative class is resulted from w x  w i i 0 . The unique i 1 property of this problem lies in the gradual concept drift where at first data are drawn from one distribution with probability one. This concept gradually shifts to another data distribution up to the point where the second concept completely replaces the first concept. This problem consists of 120 K data samples and the concept drift occurs after 40K-th samples. This problem is simulated using the periodic hold-out scenario with 1,000 time stamps. Each time stamp involves 1,200 samples where 1,000 samples are used to train the model and the remainder 200 samples serve as the validation samples. The numerical results are presented as the average of 1,000 time stamps. pENsemble+ delivered encouraging numerical results where it characterizes low sample consumption while producing comparable accuracy. The online active learning scenario is capable of significantly reducing the number of > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < training samples where pENsemble+ only attracts 30% of the total training samples for training process. Moreover, the ensemble merging strategy relieves computational and space complexity by getting rid of redundant classifiers. That is, a classifier sharing strong mutual information with other classifiers can be discarded without substantial loss of generalization power. It is also observed that pENsemble+ with Numerical Example SEA Hyperplane SUSY Evaluation Criteria Classification Rate Fuzzy Rule Input Attribute Network Parameters Execution Time Training Samples Ensemble Size Classification Rate Fuzzy Rule Input Attribute Network Parameters Training Samples Execution Time Ensemble Size Classification Rate Fuzzy Rule Input Attribute Network Parameters Training Samples Execution Time Ensemble Size the multivariate Gaussian rule achieves comparable numerical result as that the axis-parallel Gaussian rule. The advantage is seen in terms of the fuzzy rule where the multivariate Gaussian function leads to a more compact and parsimonious rule base than the axis-parallel rule. Nonetheless, the use of multivariate Gaussian function causes slightly higher network parameters to be stored in the memory. Table 2. Numerical Results of Consolidated Algorithms pENsemble Learn++.NSE Learn++.cde pClass 0.97±0.02 4.1±1.8 2 65.2±24.7 1.14±0.2 500 2.03±0.9 0.92±0.02 3.74±0.7 2 44.8±8.2 1000 1.5±0.45 1.87±0.34 0.77±0.04 3.8±1.5 1 22.9±9.1 400 0.29±0.08 1.9±0.7 0.93±0.02 N/A 3 N/A 1804.2 500 200 0.91±0.02 N/A 4 N/A 1000 926.04 100 B)SEA problem: The SEA problem was developed by Street and Kim [39] and is a popular benchmark problem for concept drift. This problem presents a sudden drift and consists of two input attributes x1 , x 2 . If the sum of the two attributes fall below the threshold, a sample is classified to class 2, whereas a class 1 is assigned to those higher than the threshold. The concept drift is induced by dramatically changing the thresholds three times during the experiment ( 4  7  4  7 ) and data samples are uniformly drawn from the range of [0,10]. In our experiment, we use the imbalanced version of this problem introduced by Ditzler and Polikar [17] where the minority class is around 25% of the total data samples. The experiment was carried out in the chunk by chunk mode where each chunk comprises 1000 data samples. The number of chunk is 200 and the drift is applied in every 50 chunk. The dynamic behavior of ensemble structure is depicted in Fig. 1, while Fig. 2 portrays the trace of fuzzy rules. Fig. 3 visualizes the dynamic feature selection mechanism of pENsemble+ while Fig. 4 exhibits the trace of training samples. SEA problem illustrates that although pENsemble+’s accuracy is slightly more inferior than pENsemble, it attains much lower sample consumption and comparable structural complexity. Moreover, pENsemble+ is unlike pENsemble which fully operates in the fully supervised manner which demands high operator labelling efforts. pENsemble+ produces similar performance with two different base-classifiers. It is observed from Fig. 1 where pENsemble+ features a fully open structure where its ensemble structure grows and shrinks dynamically from data streams. The local expert can be automatically generated on the fly when a concept drift is detected in data streams. Fig. 1 also confirms that pENsemble+ 12 0.93±0.02 N/A 3 N/A 2261.1 500 200 0.9 N/A 4 N/A 1000 2125.5 100 Terminated 0.89±0.1 6.6±4.2 3 157.3±101.9 0.42±0.3 500 N/A 0.91±0.02 3.8±1.7 4 114.9±52.6 1000 2.7±1.4 N/A 0.73±0.06 1.96±0.26 18 748±33.3 400 0.79±0.3 N/A pENsemble+ (axis-parallel) 0.97±0.03 3.4±1.3 2 20.3±7.5 0.26±0.04 104.1±21.03 1.7±0.6 0.94±0.02 2 2 12 241.9±129.6 0.22±0.09 1 0.76±0.04 6.6±2.4 1 39.5±14.5 236.5±18.8 0.49±23.4 3.2±1.2 pENsemble+ (multivariate) 0.97±0.03 2.96±1.1 2 35.2±12.7 0.27±0.09 113.6±26.01 1.48±0.5 0.94±0.02 1 2 12 248.9±125.7 0.24±0.1 1 0.76±0.04 1.95±0.46 1 214.6±50.6 248.6±25.7 0.33±0.13 1.0±0.05 provides timely response to the concept drifts. It is understood that the SEA problem characterizes three shifts ( 4  7  4  7 ) and these drifts can be properly identified by the drift detection scenario of pENsemble+ by integrating new local experts. The efficacy of ensemble merging scenario is also evident from Fig. 1 where a classifier with strong redundancy are gotten rid of without compromise to the classifier’s generalization. Unlike existing variants of ensemble learners, pENsemble+ deploys a fully evolving local expert, pClass. This facet is substantiated by Fig. 2 where fuzzy rules are added and pruned on demand. This trait helps to handle concept drift better than a static classifier since its network structure can be expanded when a data point carries significant novelty to the training process. Moreover, inactive rules are pruned and this aspect is a key to alleviate the issue of overfitting. Another unique property of pENsemble+ is found in its dynamic feature selection scenario where different subsets of input attributes can be fed to pENsemble+. This salient characteristic is visualized by Fig. 3 which exhibits the number of times input attributes have been activated. Fig. 3 also implies that input features are activated and deactivated on demand during the training process. The efficacy of online active learning scenario is shown in Fig. 4. It contributes to dramatically lower the number of training samples for model updates. At first, pENsemble+ calls for more samples to be labelled and learned during the training process. This figure gradually decreases when pENsemble+ gets more mature by seeing past training samples. Note that sample significance is examined with the absence of true class labels. C)Susy problem: Susy problem is a popular big dataset. It presents a binary classification problem which aims to classify > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < a signal process that produces supersymmetric particles [40] and a background process which does not. This problem has 18 input features in which the first 8 input features are the kinematic properties and the last 10 features are simply the function of the first 10 attributes. It consists of 5-millions data samples where 4.5-millions samples are reserved for the training samples, while the last 500 K samples are used for the testing samples. To simulate data stream environments, data come in batches with 10000 timestamps. This case study demonstrates the scalability of pENsemble+ for large-scale applications. It exhibits significant improvement over its predecessor, pENsemble, in terms of runtime. It is attributed by the online active learning scenario which brings down the sample consumption to a low level. Local experts can be added and removed on demand and on the fly. Although pENsemble+ works on the chunk by chunk basis, it does not revisit previously acquired data chunk. The memory demand hence remains independent from the total number of data chunks. Furthermore, the ensemble merging scenario reduces the memory complexity and from our numerical examples one can perceive that pENsemble+ has parsimonious and compact network structure. The use of multivariate Gaussian function Data stream SEA Hyperplane Susy TCM(binary) TCM(multi-class) IA 3 4 18 12 12 13 brings positive effect to alleviate computational and structural burdens of pENsemble+. This result, however, comes at the cost of a slight deterioration of the predictive performance. Fig. 3 Dynamic Feature Selection Table 3 Experimental Procedure C DP TS TRS 2 100000 200 250 2 120 K 100 1000 2 5M 10000 400 2 69 5 63 4 119 4 107 TES 250 250 100 6 12 Scenario Holdout Holdout Holdout 10-fold CV 10-fold CV IA: Input Attributes, C: Classes, DP: Data Points, TS: Time Stamps, TRS: Training Samples, TES: Testing Samples attaining tradeoff between accuracy and complexity. Future work will be directed to study a stacking ensemble architecture for regression problems. REFERENCES 1. Fig. 4 Evolution of Training Samples VII. CONCLUSION This paper proposes the novel tool condition monitoring methodology taking advantage of an evolving ensemble fuzzy classifier, pENsemble+. pENsemble+ offers an extension of pENsemble by integrating online active learning scenario and ensemble merging scenario. These two learning components improve the viability of pENsemble for real-world deployment because it can reduce sample consumption, labelling effort and ensemble complexity to modest level. Real-world experiments were carried out where real-world manufacturing data from metal turning process were collected. In addition, numerical examples using well-known data streams are provided. It is shown that pENsemble+ delivers encouraging performance in Dornfeld D. A. (1990), "Neural network sensor fusion for tool condition monitoring" Annals of the CIRP, Vol. 39/1, pp. 101-105 2. Holmbom P., pedersen O. Sandell B. and Lauber A. (1989), “Fusing sensor systems: promises and problems”, Sensor Review, Vol. 9, No. 3, pp 143152 3. Luo R. C. and Kay M. G. (1989), “ Multisensor Integration and Fusion in Intelligent Systems”, IEEE Trans. Systems, Man and Cybernatics, Vol. 19, No. 5, pp 901-931 4. Balakrishnan P., Kannatey-Asibu, Jr. E., Trabelsi H. and Emel E, (1989), “A sensor fusion approach to cutting tool monitoring”, Proc. 15th NSF Conf. on Production Research & Technology, ASME Publication, Univ. California at Berkely, USA, pp. 101-109 5. Dimla, Jnr. D. E., Lister P. M. and Leighton N. J., “A Multi-sensor integration method of signals in a metal cutting operation via application of multi-layer perceptron neural networks” 5th IEE International Conference on Artificial Neural Networks, July 1997 Cambridge, UK, 6. Dimla, Jnr. D. E., Lister P. M. and Leighton N. J., “Sensor fusion for cutting tool state identification in metal turning through application of perceptron neural networks” IFAC’s SAFEPROCESS ‘97 August, Hull UK 7. Kim J-D. and Choi I-H., (1996), "Development of a tool failure detection system using multi-sensors", Int. J. Mach. Tools Manufact., Vol. 36, No. 8, pp. 861-870 8. Beale R and Jackson, T. (1990), "Neural Computing: An Introduction" IOP Publishing Ltd., Bristol, UK 9. M. Pratama, W. Pedrycz, E. Lughofer, “ Evolving Ensemble Fuzzy Classifier”, arXiv preprint arXiv:1705.06460, 2017 10. G. D. C. Cavalcanti, L. S. Oliviera, T. J. M. Moura, G. V. Calvarho, “ Combining diversity measures for ensemble pruning”, Pattern Recognition Letters, Vol. 74, pp. 38-45, 2016 11. J. Kolter and M. Maloof. Dynamic weighted majority: An ensemble method for drifting concepts. Journal of Machine Learning Research, Vol. 8, pp. 2755–2790, 2007 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 12. M. Pratama, E. Dimla, CY. Lai, E. Lughofer, “ Metacognitive Learning Approach for Online Tool Condition Monitoring”, Journal of Intelligent Manufacturing, 2017 13. S. Silva, P. Costa, M. Gouvea, A. Lacerda, F. Alves, D. Leite, “ High impedance fault detection in power distribution systems usingwavelet transform and evolving neural network”, Electric Power Systems Research, Vol. 154, pp. 474-483, 2018 14. B. S. J. Costa, P. P. Angelov, L. A. Guedes, “ Fully unsupervised fault detection and identification based on recursive density estimation and selfevolving cloud-based classifier”, Neurocomputing, Vol. 150, pp. 289-303, 2015 15. A. Lemos, W. Caminhas, F. Gomide, “ Adaptive fault detection and diagnosis using an evolving fuzzy classifier”, Information Sciences, Vol. 220, pp. 64-85, 2013 16. I. Frias-Blanco, J. D. Campo-Avilla, G. Ramos-Jimenes, R. MoralesBueno, A. Ortiz-Diaz, Y. Caballero-Mota, “Online and Non-Parametric Drift Detection Methods Based on Hoeffding’s Bounds”, IEEE Transactions on Knowledge and Data Engineering, Vol. 27(3), pp. 810823, 2015 17. J. Wang, P. Zhao, S. Hoi, R. Jin, “ Online Feature Selection and Its Applications”, IEEE Transactions on Knowledge and Data Engineering, Vol. 26(3), pp. 698-710, 2014 18. M. Pratama, S.G. Anavatti, M.J. Er and E. Lughofer, pClass: An Effective Classifier for Streaming Examples, IEEE Transactions on Fuzzy Systems, vol. 23 (2), pp. 369--386, 2015 19. R. Elwell and R. Polikar. Incremental learning of concept drift in nonstationary environments. IEEE Transactions on Neural Networks, Vol. 22(10), pp. 1517–1531, 2011 20. G. Ditzler and R. Polikar,“Incremental learning of concept drift from streaming imbalanced data,” in IEEE Transactions on Knowledge & Data Engineering, vol. 25(10), pp. 2283–2301, 2013 21. H. J. Rong, N. Sundararajan, G. B. Huang, and P. Saratchandran, “Sequential adaptive fuzzy inference system (SAFIS) for nonlinear system identification and time series prediction,” Fuzzy Sets and Systems, vol. 157(9), pp. 1260–1275, 2006 22. G.-B. Huang, P. Saratchandran, and N. Sundararajan, “A generalized growing and pruning RBF (GGAP-RBF) neural network for function approximation,” IEEE Transactions on Neural Networks, vol. 16(1), pp. 57–67, 2005 23. H.-J. Rong, N. Sundarajan, G.-B. Huang, and G.-S. Zhao, “Extended sequential adaptive fuzzy inference system for classification problems,” Evolving Systems, vol. 2(2), pp. 71–82, 2011 24. P. Angelov, “ Autonomous Learning Systems: From Data Streams to Knowledge in Real-time”, John Wiley and Sons Ltd., 2012 25. L. Wang, H.-B. Ji, and Y. Jin, “Fuzzy passive-aggressive classification: A robust and efficient algorithm for online classification problems,” Information Sciences, vol. 220, pp. 46–63, 2013 26. E. Lughofer, “A dynamic split-and-merge approach for evolving cluster models,” Evolving Syst., vol. 3, no. 3, pp. 135–151, 2012 27. P.Angelov and D. Filev, "An approach to online identification of TakagiSugeno fuzzy models," IEEE Transactions on Systems, Man, and Cybernetics, Part B. vol. 34, pp. 484-498. 2004 28. J.-C. de Barros and A. L. Dexter, “On-line identification of computationally undemanding evolving fuzzy models,” Fuzzy Sets and Systems, vol. 158, pp. 1997–2012, 2007 29. Y. Xu, K. W. Wong, and C. S. Leung, “Generalized recursive least square to the training of neural network,” IEEE Transactions on Neural Networks, vol. 17(1), pp. 19–34, 2006 30. L. Ljung, System Identification: Theory for the User. Upper Saddle River, NJ: Prentice-Hall, 1999 31. P.Angelov et al, “Evolving fuzzy rule-based classifiers from data streams,” IEEE Transactions on Fuzzy Systems, vol. 16(6), pp. 1462–1475, 2008 32. E. Lughofer, Single-Pass Active Learning with Conflict and Ignorance, Evolving Systems, vol. 3,no.4, pp. 251-271, 2012 33. M.Pratama, S.Anavatti, J.Lu, Recurrent Classifier Based on an Incremental Meta-cognitive-based Scaffolding Algorithm, IEEE Transactions on Fuzzy Systems, Vol.23(6), pp. 2048-2066, 2015 34. I.Zliobaite, A.Bifet, B.Pfahringer, G.Holmes, ― Active Learning with Drifting Streaming Data‖, IEEE Transactions on Neural Networks and Learning Systems, Vol.25,no.1, pp.27-39, 2014 35. G. D. C. Cavalcanti, L. S. Oliviera, T. J. M. Moura, G. V. Calvarho, “ Combining diversity measures for ensemble pruning”, Pattern Recognition Letters, Vol. 74, pp. 38-45, 2016 14 36. A. V. Lazo and P. Rathie, “On the entropy of continuous probability distributions,” IEEE Trans. Inf. Theory, vol. 24, no. 1, pp. 120–122, Jan. 1978 37. P. Mitra, C. A. Murthy, and S. K. Pal, “Unsupervised feature selection using feature similarity,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 3, pp. 301–312, Mar. 2002 38. A. Bifet, G. Holmes, R. Kirkby, and B. P. Fahringer, “MOA: Massive online analysis,” Journal of Machine Learning Research, vol. 11, pp. 1601– 1604, May 2010 39. W. N. Street and Y. Kim, “A streaming ensemble algorithm (SEA) for large-scale classification,” in Proceeding of 7th ACM SIGKDD, San Francisco, CA, USA, 2001, pp. 377–38 40. P. Baldi, P. Sadowski, and D. Whiteson. “Searching for Exotic Particles in High-energy Physics with Deep Learning.” Nature Communications, 5, 2014 41. A. Bouchachia, et al, DELA: A Dynamic Online Ensemble Learning Algortihm, in European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, pp. 491- 496, 2014 42. P. Angelov, R. Buswell, “ Identification of Evolving Fuzzy Rule-Based Models”, IEEE Transactions on Fuzzy Systems, Vol. 10(5), pp. 667-677, 2002 43. N. Kasabov, and Q. Song, DENFIS: dynamic evolving neural-fuzzy inference system and its application for time series prediction, IEEE Transactions on Fuzzy Systems .vol10 (2).pp. 144–154. (2002) 44. P. Angelov, N. Kasabov, “Evolving Intelligent Systems, eIS”, IEEE SMC eNewsletter, Vol.15, pp. 1-13, 2006 45. M.Pratama, S.Anavatti, E.Lughofer, GENEFIS: Towards an Effective Localist Network, IEEE Transactions on Fuzzy Systems, Vol.2(3), pp.547562, (2014) 46. A. Lemos, W. Caminhas and F. Gomide, Multivariable Gaussian Evolving Fuzzy Modeling System, IEEE Transactions on Fuzzy Systems, vol. 19 (1), pp. 91--104, 2011 47. D. Dovzan, V. Logar and I. Skrjanc, Implementation of an Evolving Fuzzy Model (eFuMo) in a Monitoring System for a Waste-Water Treatment Process, IEEE Transactions on Fuzzy Systems, vol. 23 (5), pp. 1761--1776, 2015 48. J. A. Iglesias, A. Ledezma, A. Sanchis, “An ensemble method based on evolving classifiers: eStacking ”, in IEEE Symposium on Evolving and Autonomous Learning System, pp. 124-131, 2014 49. J.A Iglesias, A. Ledezma, A. Sanchiz, “Ensemble Method Based on Individual Evolving Classifiers”, in 2013 Evolving and Adaptive Intelligent Systems, pp. 78-83, 2013 50. L. Bueno, P. Costa, I. Mendes, E. Cruz, D. Leite, “Evolving ensemble of fuzzy models for multivariate time series prediction”, FUZZ-IEEE 2015: 1-6 51. A. Bifet, G. Holmes, B. Pfahringer, R. Kirkby, R. Gavalda, “New ensemble methods for evolving data streams”, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, 2009 52. A. Fern, R. Givan, “Online Ensemble Learning: An Empirical Study”, Machine Learning, Vol. 23(1)-(3), pp. 71-109, 2003 53. E. Ikomomovska, J. Gama, S. Dzeroski, “Online tree-based ensembles and option trees for regression on evolving data streams”, Neurocomputing, Vol. 150, pp. 458-470, 2015
2cs.AI
arXiv:1710.01612v2 [math.ST] 6 Jan 2018 Sensitivity of the Hermite rank Shuyang Bai Murad S. Taqqu University of Georgia Boston University January 9, 2018 Abstract The Hermite rank appears in limit theorems involving long memory. We show that an Hermite rank higher than one is unstable when the data is slightly perturbed by transformations such as shift and scaling. We carry out a “near higher order rank analysis” to illustrate how the limit theorems are affected by a shift perturbation that is decreasing in size. We also consider the case where the deterministic shift is replaced by centering with respect to the sample mean. The paper is a companion of Bai and Taqqu [2] which discusses the instability of the Hermite rank in the statistical context. 1 Introduction A stationary sequence {X(n)} with finite variance is said to have long memory or long-range dependence, if Cov[X(n), X(0)] ≈ n2H−2 (1) as n → ∞, where ≈ means asymptotic equivalence up to a positive constant1 , the parameter H ∈ (1/2, 1) is called the Hurst index. See, e.g., the recent monographs Giraitis et al. [9], Beran et al. [3], Samorodnitsky [22] and Pipiras and Taqqu [19] for more information on the notion long memory. The study of the asymptotic behavior of partial sums of long-memory sequences has been of great interest in probability and statistics. In particular, complete results have been obtained for the following class of models called Gaussian subordination. Let {Y (n)} be a stationary Gaussian process with long memory in the sense of (1), which we suppose to have mean 0 and variance 1 without loss of generality. Now consider Key words: Long-range dependence; Long memory; Hermite rank; power rank; limit theorem; instability; 2010 AMS Classification: 62M10, 60F05 1 In general, we can allow inserting a slowly varying factor (Bingham et al. [4]), e.g., a logarithmic function, in the asymptotic relation (1), but we shall not do that for simplicity. 1 the transformed process X(n) = G(Y (n)), (2) where G(·) : R → R is a function such that EX(n)2 = EG(Y (n))2 < ∞. The goal is to establish limit theorems for the normalized sums of X(n), the transformed stationary process. To develop the limit theorems, one has to use the notion of Hermite rank, which is an integer attached to the function G(·). It is defined as follows. Let Z denote a standard Gaussian random variable and let γ(dx) = φ(x)dx := (2π)−1/2 e−x 2 /2 dx denote its distribution. The Hermite rank is associated with the orthogonal decomposition of G(·) in the space   Z 2 G(z) φ(z)dz < ∞ L (γ) = L (φ) = {G(·) : EG(Z) < ∞} = G(·) : 2 2 2 R into Hermite polynomials, which are defined as H0 (x) = 1, H1 (x) = x, H2 (x) = x2 − 1, and more generally, Hm (x) = (−1)m ex 2 /2 d −x2 /2 e dxm for m ≥ 1. (3) Then { √1m! Hm (·), m ≥ 0} forms an orthonormal basis of L2 (γ) (see Pipiras and Taqqu [19], Proposition 5.1.3). Definition 1.1. The Hermite rank k of G(·) ∈ L2 (γ) is defined as   Z k = inf m ≥ 1 : EG(Z)Hm (Z) = G(x)Hm (x)γ(dx) 6= 0 , (4) R where Hm (·) is the m-th order Hermite polynomial. Equivalently, k is the order of the first nonzero coefficient in the L2 (γ)-expansion: G(·) − EG(Z) = that is, cm = 0 for m < k and ck 6= 0 where cm = ∞ X cm Hm (·), m=k E[G(Z)Hm (Z)] m! k ≥ 1, (5) for m ≥ 0. (6) The following celebrated results due to Dobrushin and Major [7], Taqqu [24] and Breuer and Major [5] have been established involving the Hermite rank. Theorem 1.2. Suppose that G(·) ∈ L2 (γ) has Hermite rank k ≥ 1. Then the following conclusions hold. • Central limit case: suppose that 1/2 < H < 1 − memory in the sense that 2 σ := ∞ X 1 2k (this implies k ≥ 2). Then {G(X(n))} has short Cov[G(X(n)), G(X(0))] n=−∞ converges absolutely and 1 N 1/2 [N t]  X n=1  f.d.d. G(X(n)) − EG(X(n)) −→ σB(t), 2 t ≥ 0, (7) f.d.d. where −→ denotes convergence of the finite-dimensional distributions and B(t) is the standard Brownian motion. • Non-central limit case: suppose that 1 − 1 2k < H < 1. {G(X(n))} has long memory with Hurst index:   1 ,1 . (8) HG = (H − 1)k + 1 ∈ 2 Furthermore, as N → ∞, we have2 1 N HG [N t]  X n=1 for some c 6= 0, and ZH,k (t) = Z ′ Rk  f.d.d. G(X(n)) − EG(X(n)) −→ cZH,k (t),  Z  k tY 0 j=1 H−3/2 (s − xj )+ is the so-called k-th order Hermite process, where R′ Rk  ds B(dx1 ) . . . B(dxk ), (9) (10) · B(dx1 ) . . . B(dxk ) denotes the k-tuple Wiener-Itô integral with respect to the standard Brownian motion B(·) (Major [15]). Bai and Taqqu [2] point out that despite the probabilistic interest of Theorem 1.2, its straightforward application to large-sample statistical theories can be problematic. This is due to a strong instability feature in the notion Hermite rank. This paper can be viewed as a technical companion to Bai and Taqqu [2] containing some mathematical characterization of such instability and related problems. In particular, the paper contains the following results: 1. The instability of the Hermite rank with respect to transformations including shift, scaling, etc. 2. A “near higher order rank” analysis of Theorem 1.2 perturbed by a diminishing shift. 3. Coincidence of Hermite rank and power rank (Ho and Hsing [11]) in the Gaussian case. The third result is not closely related to the first two, but it is obtained as a direct byproduct of the analysis of the instability problems. The paper is organized as follows: the results described above are stated in Sections 2, 3 and 4. Section 5 contain some auxiliary results involving analytic function theory. The theorems are proved in Section 6. Throughout the paper, aN ≪ bN means as N → ∞, aN /bN → 0, and aN ≈ bN means aN /bN → c for some positive constant c > 0. 2 How a transformation affects the Hermite rank First we state the results regarding the instability of the Hermite rank under transformation. Their relevance is explained in Remark 2.4 which follows. The proofs are given in Section 6. 2 In fact, we have weak convergence in the space D[0, 1] with uniform metric. 3 Recall that x is an accumulation point or limit point of a set E ⊂ Rp , if every neighborhood of x contains an infinite number of elements of E. The so-called derived set E ′ consists of all the accumulation points of E. For example, if E = {0} ∪ [1, 2), then E ′ = [1, 2]. Theorem 2.1 (Instability with respect to shift). Suppose that the measurable function G(·) : R → R is not a.e. constant and G(· ± M ) ∈ L2 (γ) for some M > 0. Then G(· + x) ∈ L2 for all x ∈ [−M, M ], and the interval (−M, M ) contains no accumulation point of the set E = {x ∈ (−M, M ) : G(· + x) has Hermite rank ≥ 2}, namely, E ′ ∩ (−M, M ) = ∅. Theorem 2.2 (Instability with respect to scaling). Suppose that the measurable function G : R → R is not a.e. symmetric and G(· × M ) ∈ L2 (γ) for some M > 1. Then G(· × y) ∈ L2 for all y ∈ (0, M ], and the interval (0, M ) contains no accumulation point of the set E = {y ∈ (0, M ) : G(· × y) has Hermite rank ≥ 2}, namely, E ′ ∩ (0, M ) = ∅. Remark 2.3. The requirement of G being non-symmetric in Theorem 2.2 is essential because any non-zero symmetric function f ∈ L2 (γ) has Hermite rank 2 since due to the symmetry of the measure γ Z Z f (z)zγ(dz) = 0, f (z)H1 (z)γ(dz) = R R while Z R due to symmetry of γ. 2 f (z)(z − 1)γ(dz) = Z f (z)H2 (z)γ(dz) = 2 Z ∞ f (z)z 2 γ(dz) > 0 0 R Remark 2.4. The preceding two theorems point to the instability of the Hermite rank. They imply, for example, that the particular values x = 0 in Theorem 2.1 or y = 1 in Theorem 2.2 cannot be an accumulation point of the set E with Hermite rank greater or equal to 2. Hence some neighborhood of x = 0 or y = 1 contains at most one point (x = 0 or y = 1) with Hermite rank k ≥ 2. This means that a slight level shift or scale change (when the original transformation is non-symmetric) will force the rank to change from perhaps being ≥ 2 to being 1. In the case of shift, this is stated as Theorem 2.14 in Bai and Taqqu [2]. Note that the rank 2 of a non-constant symmetric function in Remark 2.3 is still unstable with respect to a level shift by Theorem 2.1. In addition, one can consider the shift and scaling joint together, namely, deal with an affine transformation. Theorem 2.5 (Instability with respect to affine transformation). Suppose that the measurable G(·) is not constant a.e. and G(±M1 + · × M2 ) ∈ L2 (γ). Then the set E = {(x, y) ∈ (−M1 , M1 ) × (0, M2 ) : G(x + · × y) has Hermite rank ≥ 2} 4 has Hausdorff dimension (see Falconer [8], Section 2.2) not exceeding 1. So in particular, E has 0 twodimensional Lebesgue measure. To illustrate Theorem 2.5, consider the function G(z) = z 2 = 1 + H2 (z) which has Hermite rank 2. Suppose that it is perturbed by an affine transformation involving a shift x and a scale y and becomes (x + zy)2 = x2 + 2xyz + y 2 z 2 = x2 + y 2 + (2xy)z + y 2 (z 2 − 1) = x2 + y 2 + (2xy)H1 (z) + y 2 H2 (z). After centering, the centered function in z becomes (2xy)H1 (z) + y 2 H2 (z), which has Hermite rank 1 if and only if x 6= 0 (it no longer has Hermite rank 2 as G(z) does) . The set E in Theorem 2.5 corresponds to the one-dimensional line {(x, y) : x = 0} which has Lebesgue measure zero. Finally, we can formulate an abstract result about the instability with respect to general nonlinear transformations. Theorem 2.6. Suppose that G ∈ L2 (γ) and let Fθ be a family of transformations parameterized by θ ∈ D ⊂ Rp , where D is an open region containing the origin 0 = (0, . . . , 0) and let F0 be the identity transformation. Suppose that G is perturbed and becomes G ◦ Fθ . Assume that G ◦ Fθ ∈ L2 (φ) for all θ ∈ D, Z is a standard normal random variable, and let U (θ) := E[(G ◦ Fθ )(Z) × H1 (Z)] = E[(G ◦ Fθ )(Z) × Z]. be the first coefficient of the Hermite expansion of G ◦ Fθ , and assume that the following properties hold: (a) U (θ) is real analytic in θ ∈ D; (b) If U (θ) = 0 holds for all θ ∈ D, then G is constant a.e.. Then either G is constant a.e., or if not, then the set E = {θ ∈ D : G ◦ Fθ has Hermite rank ≥ 2} = {θ ∈ D : U (θ) = 0} has Hausdorff dimension not exceeding p − 1. In particular, E has zero p-dimensional Lebesgue measure. Remark 2.7. Here is a more informative description of the set E in Theorem 2.5 and 2.6 above. First, E is called the zero set of U if it consists of all θ ∈ D such that U (θ) = 0. Second, the zero set E = {θ ∈ D : U (θ) = 0} of a (multivariate) real analytic function U is called a real analytic variety. According to Lojasiewicz’s Structure Theorem (Theorem 6.3.3 of Krantz and Parks [13]), E ⊂ Rp can be expressed as a union of submanifolds of dimensions 0, 1, . . . , p − 1. We state here the results in terms of the Hausdorff dimension for simplicity. 3 Being near a higher order Hermite rank In the so-called near integration analysis of unit root (e.g., Phillips [18]), one studies the asymptotic behavior of an autoregressive model when the autoregression coefficient tends to 1 (unit root) as the sample size 5 increases. Such analysis sheds lights on the situation where the coefficient is close to but not exactly 1. Here in a similar spirit, we carry out a “near higher order rank” analysis for Theorem 2.1 regarding the limit PN theorem for the sum n=1 G(Y (n) + xN ), where the shift xN → 0 as the number of summands N → ∞. The result is given in the following theorem, where c, ci ’s denote constants whose value can change from line to line. Theorem 3.1. Let {Y (n)} be a standardized stationary Gaussian process whose covariance satisfies (1) with Hurst index H ∈ (1/2, 1). Suppose that the function G(·) is not constant a.e., G(· ± M ) ∈ L2 (γ) for some M > 0, and has an Hermite rank k ≥ 1. Set SN (xN ) = N h X n=1 i G(Y (n) + xN ) − EG(Y (n) + xN ) , where xN → 0. • Central limit case: suppose that 1/2 < H < 1 − 1 2k N (1/2−H)/(k−1) → 0 and (if k = 1 this case does not exist). Then as N → ∞, (a) if xN ≪ N (1/2−H)/(k−1) : N −1/2 S[N t] (xN ) (b) if xN ≈ N N (1/2−H)/(k−1) : (c) if N (1/2−H)/(k−1) ≪ xN → 0: (11) −1/2 S[N t] (xN ) f.d.d. −→ cB(t); f.d.d. −→ c1 ZH,1 (t) + c2 B(t); f.d.d. N −H x1−k N S[N t] (xN ) −→ cZH,1 (t); where the fractional Brownian motion ZH,1 (t) and the Brownian motion B(t) are independent. • Non-central limit case: suppose that 1 − 1 2k < H < 1. Let HG be as in (8). Then as N → ∞, N H−1 → 0, and (a) if 0 < xN ≪ N H−1 : N −HG S[N t] (xN ) (b) if xN ≈ N N H−1 : (c) if N H−1 ≪ xN → 0: −HG S[N t] (xN ) f.d.d. −→ cZH,k (t); Pk −→ m=1 cm ZH,m (t); f.d.d. f.d.d. N −H x1−k N S[N t] (xN ) −→ cZH,1 (t); where the Hermite processes ZH,m (t)’s are defined through the same Brownian motion in (10). The terms ”central limit case” and ”non-central limit case” in the preceding theorem refer to the terminology used in Theorem 1.2 and thus to the type of limits one obtains when there is no shift, that is when xN = 0. Remark 3.2. Theorem 3.1 has some interesting implications. In the central limit case, the critical order N (1/2−H)/(k−1) depends negatively on H. The larger H, the smaller the critical order. Thus the larger H (but below 1 − 1/(2k)) is, the more easily the effect of a higher-order rank in the limit theorem gets surpassed by a shift perturbation. In the non-central limit case, however, the relation is reversed since the critical order N H−1 depends positively on H. Note that in the non-central limit case, the order N H−1 determining the border of the regimes does not depend on the rank k 6 In Theorem 3.3 below, we provide a result on the non-centered sum PN n=1 G(Y (n) + xN ), assuming that EG(Y (n)) = 0. It is expected that if xN tends to 0 too slowly, then a deterministic trend will appear in the limit. Theorem 3.3. Under the assumptions of Theorem 3.1, if in addition EG(Y (n)) = 0 and SN is replaced by then the following conclusions hold: SeN (xN ) = • Central limit case: suppose that H < 1 − 1 2k . (b) if xN ≈ N G(Y (n) + xN ), N −1/2 Se[N t] (xN ) : (c) if N 1−1/(2k) ≪ xN → 0: where ZH,k (t) and B(t) are independent. • Non-central limit case: suppose that H > 1 − N −1/2 Se[N t] (xN ) 1 2k . −→ cB(t) f.d.d. −→ c1 t + c2 B(t); ct; Let HG be as in (8). Then as N → ∞: N −HG Se[N t] (xN ) (b) if xN ≈ N H−1 : f.d.d. f.d.d. e N −1 x−k N S[N t] (xN ) −→ N −HG Se[N t] (xN ) (a) if 0 < xN ≪ N H−1 : (12) n=1 Then as N → ∞: (a) if xN ≪ N −1/(2k) : 1−1/(2k) N X f.d.d. −→ cZH,k (t); Pk −→ c0 t + m=1 cm ZH,m (t); f.d.d. f.d.d. e N −1 x−k N S[N t] (xN ) −→ ct; (c) if N H−1 ≪ xN → 0: where the Hermite processes ZH,m (t)’s are defined through the same Brownian motion in (10). In the next theorem the argument xN in Theorem 3.3 is replaced by a subtracted sample mean. Theorem 3.4. Under the assumptions of Theorem 3.3, assume in addition that G(·) is a polynomial. Let PN ȲN = N −1 n=1 Y (n). Then the following conclusions hold: • Central limit case: suppose that H < 1 − 1 2k . Then as N → ∞, f.d.d. N −1/2 Se[N t] (−ȲN ) −→ cB(t) • Non-central limit case: suppose that H > 1 − N −HG 1 2k . Let HG be as in (8). Then as N → ∞, f.d.d. Se[N t] (−ȲN ) −→ k X cm ZH,m (t) m=1 where the Hermite processes ZH,m (t) ’s are defined through the same Brownian motion in (10). Remark 3.5. As an example, one may take G(z) = z 2 in (12), which leads to the sample variance as considered in Hosking [12] and Dehling and Taqqu [6]. See also Section 3.1 of Bai and Taqqu [2]. Comparing Theorem 3.4 with Theorem 1.2, centering {Y (n)} by subtracting the sample mean may not affect the fluctuation order of the sum, but can change the limit distribution. The proofs of Theorem 2.1, 2.2, 2.5 and Theorems 3.1, 3.3 and 3.4 can be found in Section 6, and are all based on the analysis of analytic functions. 7 4 On the coincidence of Hermite and power ranks The Hermite rank has been defined in (4). We now define the power rank which is used in the approach of Ho and Hsing [11] for limit theorems for transformations of long-memory moving-average processes. Given a function G(·) and a random variable Y satisfying EG(Y )2 < ∞, let G∞ (y) = EG(Y + y) (13) given that the expectation exists and suppose that G∞ (·) has derivatives of order sufficiently high. The power rank of G(·) with respect to Y is defined as inf{m ≥ 1 : G(m) ∞ (0) 6= 0}, (14) (m) where G∞ (y) denotes the m-th derivative of G∞ (y). The following fact was stated in Ho and Hsing [11] without a detailed proof. It was proved by Lévy-Leduc and Taqqu [14] in the case where G(·) is a polynomial. Proposition 4.1. Suppose that G(·) ∈ L2 (γ). Then the power rank in (14) coincides with the Hermite rank (4) if Y is Gaussian. Proof. Proposition 4.1 is a direct consequence of (17) below, namely, ∞ ∞ (m) X X G∞ (0) m E[G(Z)Hm (Z)] m x = x , m! m! m=0 m=0 5 Auxiliary results We prove here some auxiliary results involving the Weierstrass transform and analytic function theory. Let Z denote throughout a standard Gaussian random variable and let φ = dγ/dx = (2π)−1/2 e−x 2 /2 denote its density. Define the function G∞ (x) = EG(Z + x) = Z G(z + x)φ(z)dz = Z R R G(z)φ(z − x)dz, (15) whenever the integrability holds. The function G may not be smooth, but the function G∞ is smooth due to the convolution with the smooth φ(z). G∞ is called the Weierstrass transform of G (see Hirschman and Widder [10], Chapter VIII). First we state some preliminary facts. Recall that a function f : Rp → R is real analytic over an open domain D ⊂ Rp , if at every point y = (y1 , . . . , yp ) ∈ D, there exists a neighborhood B ⊂ D of y, such that f (x1 , . . . , xp ) = ∞ X i1 ,...,ip =1 ai1 ,...,ip (x1 − y1 )i1 . . . (xp − yp )ip for some coefficient a(i1 , . . . , ik ), where the series converges absolutely in B. It is well-known that f is infinitely differentiable, and common elementary operations including composition, affine transform, multiplication preserve analyticity. See, e.g., Krantz and Parks [13], Chapter 1. 8 Lemma 5.1. (a) If g(· + a), g(· + b) ∈ L1 (φ), a < b, then (a1) g(· + x) ∈ L1 (φ) for any a < x < b; (a2) the Weierstrass transform Eg(Z + x) is a real analytic function in x ∈ (a, b). (b) If g(· × c) ∈ L1 (φ), then g(· × y) ∈ L1 (φ) for any 0 < y < c. Proof. (a) The first statement (a1) follows from the fact that φ(z − x) ≤ Aφ(z − a) + Bφ(z − b) for some sufficiently large constants A, B > 0 by exploring the shape of φ. To obtain statement (a2), first as in item 2.2 of Hirschman and Widder [10] Chapter VIII, the Weierstrass transform (Wg)(x) := Eg(Z +x) = (g ∗φ)(x) R can be expressed by a bilateral Laplace transform (Lg)(x) := R e−zx g(z)dz as 1 (Wg)(x) = √ 2π Z where g(z) = f (z)e−z 2 f (z)e−(x−z) R 2 /2 2 /2 e−x /2 dz = √ 2π . Note that e−x 2 /2 Z 2 e(−x)(−z) [f (z)e−z 2 /2 R e−x /2 (Lg)(−x), ]dz = √ 2π (16) is analytic. Then the analyticity of Wg follows from the analyticity of the bilateral Laplace transform Lg. See Widder [25] Chapter VI, p.140. The statement (b) R follows from φ(x/y) ≤ Cφ(x/c) for some sufficiently large constant C > 0, because R |g(xc)|φ(x)dx = R c−1 R |g(x)|φ(x/c)dx < ∞ Lemma 5.2. Suppose G ∈ L2 (φ). Then E|G(Z + x)| < ∞, namely, G(x + ·) ∈ L1 (φ), for all x ∈ R. Furthermore, G∞ (x) in (15) admits the analytic expansion G∞ (x) = ∞ ∞ (m) X X G∞ (0) m x = cm xm , m! m=0 m=0 (17) (m) where G∞ is the m-th derivative of G∞ and cm = E[G(Z)Hm (Z)] m! are the coefficients of the Hermite expansion in (6). If in addition, G(· ± M ) ∈ L2 (φ), M > 0, then G(m) ∞ (x) = E[G(Z + x)Hm (Z)], |x| < M, m = 0, 1, 2, . . . . (18) Proof. Let Hm (x)’s be the Hermite polynomials defined in (3). Then by the Cauchy-Schwartz inequality and Corollary 5.1.2 of Pipiras and Taqqu [19], one has for any x ∈ R that Z ∞ ∞ ∞ X X X |x|m |x|m |x|m √ kGkL2 (φ) kHm kL2 (φ) = kGkL2 (φ) |G(z)Hm (z)|φ(z)dz ≤ <∞ m! R m! m! m=1 m=1 m=1 since kHm kL2 (φ) = √ m!. By Proposition 1.4.2 of Nourdin and Peccati [17], one has ∞ X xm Hm (z) = exp(−(z − x)2 /2 + z 2 /2). m! m=0 9 (19) So Z Z Z ∞ X xm −(z−x)2 /2+z 2 /2 G(z)φ(z − x)dz = G∞ (x), G(z)e φ(z)dz = G(z)Hm (z)φ(z)dz = m! R R R m=0 where the change of the order between the sum and the integral in the first equality can be justified by (19) and Fubini’s Theorem. This shows that G∞ has the desired expansion (17). Note that the same computation R as above with G replaced by |G| shows that E|G(Z + x)| = R |G(z)|φ(z − x)dz < ∞ by (19). The formula (18) follows from Z Z Z d d (m) G∞ (x) = m G(z) m φ(z − x)dz = G(z)Hm (z − x)φ(z − x)dx G(z)φ(z − x)dz = dx dx R R by (3), where the differentiation under the integral can be justified by the Dominated Convergence Theorem and the Mean Value Theorem as in the proof of Lemma 5.5 below. Lemma 5.3 (Uniqueness of Weierstrass transform). If f ∈ L1 (φ) and the convolution f ∗ φ = 0 a.e., then f = 0 a.e.. Proof. First, express as in (16) the Weierstrass transform by a bilateral Laplace transform. Then the conclusion follows from the uniqueness of the bilateral Laplace transform. See Widder [25] Chapter VI, Theorem 6b. Lemma 5.4. Suppose that G(· × M ) ∈ L2 (φ) for some M ∈ (1, +∞). Then E|G(yZ)Z| < ∞ and F (y) := EG(yZ)Z is an analytic function in y ∈ (0, M ). Proof. Since φ(t/y) ≤ cφ(t/M ) for some constant c > 0, Z Z Z 1 E|G(yZ)Z| = |G(yz)z|φ(z)dz = 2 |G(t)t|φ(t/y)dt ≤ C |G(M z)z|φ(z)dz, y R R R and hence by Cauchy-Schwartz, E|G(yZ)Z| ≤ CkG(· × M )kL2 (φ) < ∞ for some constant C > 0 depending only on y. Next applying the change of variable u = (yz)2 on z ≥ 0 and on z < 0, we have F (y) = EG(yZ)Z = Z 2 1 e−z /2 √ dz = zG(yz) √ 2π 2y 2 2π R Z 0 ∞  [G(u1/2 ) − G(−u1/2 )] exp[−u(2y 2 )−1 ]du . (20) The integral in (20) is a Laplace transform evaluated at (2y 2 )−1 . The Laplace transform is real analytic over the the open half interval where the integrability holds (Widder [25] Chapter II, Theorem 5a). The function y −2 is also analytic in y ∈ (0, M ). The conclusion then follows since elementary operations preserve analyticity. 10 Lemma 5.5. Let D = (−M1 , M1 ) × (0, M2 ), M1 > 0, M2 > 1. Suppose that g is a measurable function such that g(±M1 + · × M2 ) ∈ L2 (φ). Then the function   Z (u − x)2 g(u) exp − f (x, y) := du 2y 2 R is real analytic over (x, y) ∈ D. Proof. The assumption implies that g(x + · × y) ∈ L2 (φ) (21) for all (x, y) ∈ D by Lemma 5.1. By Theorem 1 of Siciak [23], one needs to show that (1) f is C ∞ (infinitely smooth); (2) f is univariately analytic along any direction at an arbitrary point (x0 , y0 ) ∈ D. For part (1), we need to check that the partial derivatives of all orders of f (x, y) exist and are continuous. First, the derivatives with respect to x and y can be taken under the integral sign by applying the Dominated Convergence Theorem and the Mean Value Theorem with the help of the following facts which are justified afterwards: 1. For any integers i, j ≥ 0, (u − x)2 (u − x)2 ∂ i+j −1 exp(− ) = Q(u, x, y ) exp(− ) ∂xi ∂y j 2y 2 2y 2 for some trivariate polynomial Q(x1 , x2 , x2 ). 2. For any x0 ∈ R and small δ > 0, there exists a polynomial Q∗ with non-negative coefficient such that sup |x−x0 |≤δ |Q(u, x, y −1 )| ≤ Q∗ (|u|, |y|−1 ); A similar bound holds for sup|y−y0 |≤δ |Q(u, x, y −1 )|. 2 3. If δ is chosen sufficiently small so that exp(− 4δ y 2 ) ≥ 1/2, then sup |x−x0 |≤δ exp(− (u − x0 + δ)2 (u − x0 − δ)2 (u − x)2 ) ≤ exp(− ) + exp(− ), 2y 2 2y 2 2y 2 and for any δ > 0, sup |y−y0 |≤δ exp(− (u − x + δ)2 (u − x + δ)2 ) = exp(− ). 2y 2 2(y0 + δ)2 4. For any integer n ≥ 0 and polynomial Q, Z (u − x)2 |g(u)|Q(|u|) exp(− )du < ∞ 2y 2 for all (x, y) ∈ D. 11 Item 1 can be verified easily by induction and the elementary differentiation rules. To see Item 2, write the polynomial as Q(u, x, v) = a0 (x) + a1 (x)u + a2 (x)v + . . .. So |Q(u, x, v)| ≤ |a0 (x)| + |a1 (x)u| + |a2 (x)v| + . . .. Note that each coefficient |ai (x)| is a continuous function. Over a compact interval [x0 − δ, x0 + δ], each |ai (x)| is bounded by a positive constant. Replacing |ai (x)|’s by these constants yields the conclusion. 2 For Item 3, the maximum of the function exp(− (u−x) 2y 2 ) in x over the interval [x0 − δ, x0 + δ] can be either 2 1 if u ∈ [x0 − δ, x0 + δ], or exp(− (u−x2y02±δ) ) otherwise. In the case where u ∈ [x0 − δ, x0 + δ], by the choice of δ described in Item 3 and |u − x0 ± δ| ≤ 2δ, we have exp(− (u − x0 + δ)2 (u − x0 − δ)2 ) + exp(− ) ≥ 1/2 + 1/2 ≥ 1; 2 2y 2y 2 2 2 (u−x0 +δ) 0) in the case where u ∈ / [x0 − δ, x0 + δ], e.g., if u < x0 − δ, then one has exp(− (u−x ) by 2y 2 ) ≤ exp(− 2y 2 monotonicity. The second inequality follows easily from monotonicity. To obtain Item 4, by Cauchy-Schwartz and (21), we have Z (u − x)2 )du ≤ y(2π)1/2 [Eg(x + yZ)2 ]1/2 [EQ(|x + yZ|)2 ]1/2 < ∞ |g(u)|Q(|u|) exp(− 2y 2 Continuity of f (x, y) can as well be verified using Dominated Convergence and the facts 2∼4 above. To check claim (2), set x(t) = x0 + at, y = y0 + bt where (a, b) ∈ R2 satisfying a2 + b2 = 1. Suppose that (x(t), y(t)) ∈ D when |t| < δ , where δ > 0 will be adjusted smaller if necessary later. We want to check the real analyticity of   (u − x0 − at)2 f (t) := f (x(t), y(t)) = g(u) exp − du. 2(y0 + bt)2 R Z (22) at t = 0. Note that the function  (u − x0 − az)2 h(u, z) := exp(A(u, z)) := exp − 2(y0 + bz)2  is complex analytic in z ∈ Bδ := {z ∈ C : |z| < δ} for each fixed u ∈ R since y0 + bz 6= 0. Next, by choosing δ small enough, one can ensure that for some constant c, µ > 0 sufficiently large and σ ∈ (0, M2 ), such that Re[A(u, z)] = − −y02 u2 + Re[. . .] −u2 + Re[. . .] Re[(u − x0 − az)2 (y0 + bz̄)2 ] = = . 1/2 1/2 2|y0 + bz|4 2|y0 + bz|4 2|y0 + bz/y0 |4 (23) Since y0 ∈ (0, M2 ) and |z| < δ where δ is sufficiently small, there exists σ ∈ (0, M2 ), so that 1/2 |y0 1/2 + bz/y0 |4 ≥ σ 2 (24) for all |z| < δ. On the other hand, the bracket [. . .] in (23) is of the form c1 (z, z̄, x0 )u + c0 (z, z̄, x0 ), where c1 and c0 are polynomials. For all |z| < δ, one has for some large µ, c > 0 that Re[. . .] ≤ |c1 (z, z̄, x0 )||u| + |c0 (z, z̄, x0 )| ≤ 2µ|u| − µ2 + 2σ 2 c 12 (25) Combining (23), (24) and (25), one has Re[A(u, z)] ≤ −u2 + 2µ|u| − µ2 +c 2σ 2 Hence for some constant C > 0, In R   |h(u, z)| = exp(Re[A(u, z)]) ≤ C[exp −(u2 + µ)2 /(2σ 2 ) + exp −(u2 − µ)2 /(2σ 2 ) ], R z ∈ Bδ . (26) |g(u)h(u, z)|du, replace |h(u, z)| by the preceding bound (26), and note that g(±µ + · × σ) ∈ L1 (φ) for any µ ∈ R and σ ∈ (0, M ) by Lemma 5.1 (b) and Lemma 5.2. Then one deduces that Z sup |g(u)h(u, z)|du < ∞. z∈Bδ R This fact with Fubini’s Theorem justifies the following order change of integrals: I I Z Z I f (z)dz = dz g(u)h(u, z)du = g(u)du h(u, z)dz = 0, ∆ ∆ R R ∆ where ∆ is a closed triangle within Bδ , and the last equality is due to Cauchy’s theorem since h(u, z) is complex analytic in z ∈ Bδ . Then the complex analyticity of f (z) over Bδ follows from Morera’s Theorem (Theorem 10.17 of Rudin [21]). Restricting Bδ to Im(z) = 0 yields the real analyticity. 6 Proof of the theorems We prove here Theorems 2.1, 2.2, 2.5 involving the instability of the Hermite rank and and Theorems 3.1, 3.3 and 3.4 involving ”near higher order rank”. Proof of Theorem 2.1. Suppose that the function G is not a.e. constant. Define E = {x ∈ (−M, M ) : G(· + x) has Hermite rank ≥ 2}. Note first that we have E = {x ∈ (−M, M ) : (1) G∞ (x) = 0} in view of Lemma 5.2 applied to G(· + x). Indeed, since the Hermite rank of G(· + x) is greater than 1, we have (1) G∞ (x) = EG(Z + x)H1 (Z) = 0. Now suppose by contradiction that E has an accumulation point in (1) (−M, M ). Since G∞ is analytic by Lemma 5.2, so is the derivative G∞ (x). By Rudin [20] Theorem 8.5, (1) G∞ is identically zero on (−M, M ) and hence G∞ is a constant on (−M, M ). But by (15), G∞ = G ∗ φ. By Lemma 5.3 and linearity, G is a.e. a constant as well which contradicts the theorem assumption. Proof of Theorem 2.2. Suppose that the function G is not a.e. symmetric. Now the set with Hermite rank ≥ 2 is E = {y ∈ (0, M ) : F (y) := EG(yZ)Z = 0}. The proof is similar to that of Theorem 2.1 above. Suppose by contradiction that E has an accumulation point in (0, M ). Since F is analytic on (0, M ) by Lemma 5.4, so F (y) is identically zero on (0, M ). Then we apply the uniqueness of the Laplace transform (Widder [25] Chapter II, Theorem 6.3) to relation (20) to conclude that G(z) = G(−z) a.e., which contradicts the assumption. 13 Proof of Theorem 2.5. Define F (x, y) = E[ZG(x + yZ)]. As before E = {(x, y) ∈ D : F (x, y) = 0}. By a change of variable z = (u − x)/y we can write   Z 1 (u − x)2 F (x, y) = √ (u − x)G(u) exp − du. 2y 2 y 2 2π R (27) Then F (x, y) is a bivariate real analytic function by Lemma 5.5 since (±M1 + M2 u)G(±M1 + M2 u) ∈ L2 (φ) by Cauchy-Schwartz. If F (x, y) ≡ 0, which implies F (x, 1) ≡ 0, then the Hermite rank of G(· + x) is greater than 1 for all x ∈ (−M1 , M1 ), which contradicts Theorem 2.1. So F (x, y) is not identically zero. The claimed properties of E, the zero set of the analytic F , then follow from Mityagin [16] (see also Krantz and Parks [13], Section 4.1). Proof of Theorem 2.6. If G is not a constant a.e., by assumption (b), the analytic U (θ) is not identically zero on D. So taking into account assumption (a), the zero set E has the claimed properties by Mityagin [16]. Proof of Theorem 3.1. First by the Hermite expansion (5) we can write: ∞ X G(Z + xN ) = cm (xN )Hm (Z), (28) m=0 We set as in (15) that G∞ (xN ) = EG(Z + xN ), where Z ∼ N (0, 1). In view of Lemma 5.2, we have cm (xN ) = 1 1 (m) EG(Z + xN )Hm (Z) = G (xN ). m! m! ∞ and F∞ (xN ) := EG(Z + xN )2 = ∞ X cm (xN )2 EHm (Z)2 = m=0 ∞ X cm (xN )2 m!. (29) m=0 (1) k−1 Since G has Hermite rank k, in view of Lemma 5.2 we have G∞ (0) = . . . = G∞ (0) = 0 6= Gk∞ (0). By the analytic expansion, (k) G∞ (xN ) = and G(m) ∞ (xN ) = where G∞ (0) k xN + O(xk+1 N ) k! dm G 1 k−m (xN ) = gk xN + O(xk−m+1 ), N m dx (k − m)! m = 1, . . . , k, gk = G(k) ∞ (0). Then S[N t] (xN ) = [N t] h X n=1 i G(Y (n) + xN ) − EG(Y (n) + xN ) = AN (t) + BN (t) + CN (t) + DN (t) + H.O.T. = AN (t) + BN (t) + RN (t) + H.O.T. 14 (30) In (30),    [N t] k−1 X X X gk gk k−1 H k−m H[m]  1  1 AN (t) = (xN N ) Hk (Y (n)) Y (n) , BN (t) = (xN N ) (k − 1)! N H n=1 (k − m)! N H[m] n=1 m=2   [N t] [N t] ∞ X X X 1 gk CN (t) = N H[k]  H[k] Hk (Y (n)) , DN (t) = cm (xN ) Hm (Y (n)), RN (t) = CN (t) + DN (t), k! N n=1 n=1 m=k+1  [N t] (31) where Pb m=a   H[m] = max (H − 1)m + 1, 1/2 , (32) . . . is understood as zero if a > b, and H.O.T. stands for a higher-order term that will be asymptotically negligible as N → ∞ after suitable normalization. In (31), the expressions within a bracket [ · ] converge in distribution and their variances also converge. See, e.g., Pipiras and Taqqu [19], Chapter 5. The term AN (t) involves the first Hermite polynomial since H1 (Y ) = Y ; the term BN (t) involves the second up to the (k − 1)th Hermite polynomial; the term CN (t) involves the kth Hermite polynomial; the term DN (t) involves all the Hermite polynomials of orders higher than k. RN (t) involves the terms m ≥ k in (28). We assume for simplicity that H 6= 1/(2m), m = 1, . . . , k. Otherwise the proof undergoes a slight P[N t] modification involving an logarithmic factor. We have to consider the behavior of n=1 Hm (Y (n)) for all m ≥ 1. Let k0 = sup{m ∈ Z+ : H > 1 − 1/(2m)}. (33) In view of (33), when m > k0 the central limit theorem in Theorem 1.2 holds and when m < k0 it is the non-central limit theorem that holds. Alternatively, the central limit theorem holds when H < 1 − 1/(2k) and the non-central limit theorem holds when H > 1 − 1/(2k). • Consider first the central limit case where H < 1 − 1/(2k). k−1 H In this case, AN (t) is associated with the order xN N and RN (t) is associated with the order N 1/2 . We now focus on BN (t) and claim that it is asymptotically negligible compared with either AN (t) or RN (t), namely, k−m H[m] k−1 H xN N ≪ max(xN N , N 1/2 ), m = 2, . . . , k − 1. (34) Indeed, when m > k0 , this is obvious since H[m] = 1/2; Suppose now m ≤ k0 . In this case, H[m] = k−m H[m] (H − 1)m + 1. However, in cases (a) and (b), where xN ≪ or ≈ N (1/2−H)/(k−1) , the factor xN N has an exponent bounded by (m − 1)k k + m − 2km 1 (1/2 − H)(k − m) + (H − 1)m + 1 = H+ +1< , k−1 k−1 2(k − 1) 2 (35) where the last inequality can be obtained by plugging in the inequality H < 1 − 1/(2k) and some elementary computation. Hence in cases (a) and (b), the relation (34) is proved. In the case (c) where xN ≫ 15 k−m (H−1)m+1 k−1 H N (1/2−H)/(k−1) , it can be checked that xN N ≪ xN N using the inequality 1/2−H k−1 > H − 1, and the latter inequality follows from H < 1 − 1/(2k). We have thus proved (34) and hence BN (t) is asymptotically negligible. We are left with AN (t) and RN (t). The different asymptotic regimes in the central limit case in Theorem 3.1 come about when comparing k−1 H the order xN N of AN (t) with the order N 1/2 of RN (t) = CN (t) + DN (t). But we also have to deal with the convergence of the processes. By Bai and Taqqu [1], we have the joint convergence   [N t] [N t] ∞ X X X gm 1 1 f.d.d.  Y (n), 1/2 Hm (Y (n)) −→ (c1 ZH,1 (t), c2 B(t)) H N n=1 m! N n=1 (36) m=k where the fractional Brownian motion ZH,1 (t) and the Brownian motion B(t) are independent. From (36) we set ′ RN (t) = [N t] ∞ XX n=1 m=k gm Hm (Y (n)), m! which is RN (t) with xN = 0. ′ We cannot use (36) directly because we have RN (t) instead of RN (t). We thus need to compare them first. Since Y (n) is standardized, we have |γY (n)|m ≤ |γY (n)|k if m ≥ k, where γY (n) = Cov[Y (n), Y (0)]. Thus by a computation similar to those on p.299 of Pipiras and Taqqu [19] using the orthogonality of the Hermite polynomials, ′ E|RN (t) − RN (t)|2 = X m>K ≤ (N t) m!(cm (xN ) − cm (0))2 ∞ X n=−∞ |γY (n)|k ! X ([N t] − |n|)γY (n)m |n|<[N t] ∞ X m=k m!(cm (xN ) − cm (0))2 . (37) Note that for a K > k, ∞ X m=k m!(cm (xN ) − cm (0))2 ≤ Recall F∞ (x) = P∞ m=0 K X m=k m!(cm (xN ) − cm (0))2 + 2 X m!(cm (xN )2 + cm (0)2 ). (38) m>K m!cm (x)2 in (29), which is analytic in view of Lemma 5.1. Hence X m>K 2 m!cm (xN ) = F∞ (xN ) − F∞ (0) + F∞ (0) − K X m!cm (xN )2 . m=0 (m) As N → ∞, by the continuity of F∞ and cm (x) = G∞ (x)/m!, we have X m>K m!cm (xN )2 → X m!cm (0)2 . (39) m>K Take the limit N → ∞ in (38) using (39) and the continuity of cm , the right-hand side of (38) is only left P with the term 2 m>K m!cm (0)2 , which tends to 0 as K → ∞. Combining this with (37), we have ′ lim N −1 E|RN (t) − RN (t)|2 = 0. N →∞ 16 (40) It thus follows from (36) that   [N t] [N t] X X 1 1 f.d.d.  Y (n), 1/2 RN (t) −→ (c1 ZH,1 (t), c2 B(t)) . N H n=1 N n=1 k−1 H In case (a), we have xN N ≪ N 1/2 and thus as N → ∞, AN (t) is negligible compared to RN (t) and f.d.d. k−1 H thus we get N −1/2 RN (t) −→ c2 B(t). In case (c), xN N ≫ N 1/2 and the limit is c1 ZH,1 (t). In case (b), k−1 H where xN N ≈ N 1/2 , both limits appear. Finally, note that N −H x1−k N AN (t) is proportional to the first component on the left-hand side of (36), while by (40), the term N −1/2 RN (t) can be asymptotically replaced ′ by N −1/2 RN (t), which is the second component on the left-hand side of (36). The rest of the proof in the central limit case can be carried out easily. 1 2k . • Now we consider the non-central limit case where H > 1 − P[N t] of n=1 Hm (Y (n)) for all m ≥ 1. We have to study, as before, the behavior We first consider the terms AN (t), BN (t) and CN (t) which involve m ≤ k. In this case, we have the following relation: any n, m ∈ Z+ , k−m (H−1)m+1 k−n (H−1)n+1 xN N ≪ xN N ⇐⇒ xN ≪ N H−1 , which holds with ≪ replaced by ≈ or ≫ as well. Hence in case (a), the term AN (t) in (30) contributes; in case (b), the terms AN (t), BN (t) and CN (t) all contribute; in case (c), the term CN (t) contributes. We shall show below that the term DN (t), which involves m > k, is negligible. Set γY (n) = Cov(Y (n), Y (0)) ≈ n2H−2 . By a similar computation as in (37), EDN (t)2 = X m!cm (xN )2 m>k X ([N t] − |n|)γY (n)m . (41) X n(2H−2)(k+1) ≤ c2 (N t)2H[k+1] , (42) |n|<[N t] For an arbitrarily small ǫ > 0, we have for m > k that X ([N t] − |n|)γY (n)m ≤ c1 (N t) |n|<[N t] |n|<[N t] for some constants c1 , c2 > 0. where H[m] is as in (32). Since H[k + 1] < H[k] when H > 1 − 1/(2k), in view of (41), (42) and (29), EDN (t)2 ≤ c2 (N t)2H[k+1] F∞ (xN ) ≪ N 2H[k] ≈ ECN (t)2 . So the order of DN (t) is always dominated by that of CN (t). So we only need to focus on AN (t), BN (t) and CN (t). Then the rest of the proof can be carried out using the following consequence of Bai and Taqqu [1]:   [N t]   X 1 f.d.d.   H (Y (n)), m = 1, . . . , k −→ c Z (t), m = 1, . . . , k (43) m m H,m N (H−1)m+1 n=1 where the Hermite processes ZH,m (t)’s are defined through the same Brownian motion in (10). 17 Proof of Theorem 3.3. The proof is done as the proof of Theorem 3.1 based on (36) and (43), and we thus only provide an outline. By Taylor expansion of G∞ in (17), and since EG(Y (n)) = g0 = G∞ (0) = 0 and the Hermite rank is k, we have EG(Y (n) + xN ) = G∞ (xN ) = gk k x + O(xk+1 N ). k! N Adding the leading term above to (30), we have Se[N t] (xN ) = ZN (t) + AN (t) + BN (t) + CN (t) + DN (t) + H.O.T. = ZN (t) + AN (t) + BN (t) + RN (t) + H.O.T. (44) where ZN (t) = gk k (x [N t]) + H.O.T. k! N In the central limit case where H < 1 − 1/(2k), the term BN (t) is negligible compared to AN (t) and k−1 H RN (t) as in the proof of Theorem 3.1 above. We thus compare the orders xkN N of ZN (t), xN N of AN (t) k−1 H and N 1/2 of RN (t). Indeed, if xN ≪ N −1/(2k) , then xkN N ≪ N 1/2 and xN N ≪ N 1/2 , so only RN (t) contributes; if xN ≈ N −1/(2k) , then xkN N ≈ N 1/2 and xkN N ≪ N 1/2 , so ZN (t) and RN (t) contribute; if k−1 H xN ≫ N −1/(2k) , then xkN N ≫ N 1/2 and xkN N ≫ xN N , so only ZN (t) contributes. A similar analysis can be carried out in the non-central limit case. As in the proof of Theorem 3.1, the term BN (t) only contributes in the case xN ≈ N H−1 . The asymptotic regimes in the other cases are k−1 H determined by comparing the orders xkN N of ZN (t), xN N of AN (t) and N (H−1)k+1 of CN (t). Proof of Theorem 3.4. The proof is again similar to those of Theorem 3.1 and 3.3, and we thus only provide an outline. Since G(·) is a polynomial, in (31) the ∞ in the sum defining DN (t) is replaced by a finite integer. This is important since the arguments leading to (40) can no longer be applied. The key is to note that −ȲN is associated with the order N H−1 , which replaces xN in all the terms in (44). More precisely, in the central limit case where H < 1 − 1/(2k), comparing the order N k(H−1) of ZN (t), the order N (k−m)(H−1)+H[m] of AN (t) and BN (t), 0 < m < k, and the order N 1/2 of RN (t), where H[m] is as in (32), one can find that RN (t) is the contributing term. The conclusion then follows from (36) and the Slutsky Lemma using the continuity of the coefficients cm (·). In the non-central limit case where H > 1 − 1/(2k), we compare the order N k(H−1) of ZN (t), the order N k(H−1)+1 of AN (t), BN (t), CN (t), 0 < m ≤ k, and the order N H[k+1] of DN (t). In this case, the terms AN (t) and BN (t) contribute. Acknowledgment. This work was partially supported by the NSF grant DMS-1309009 at Boston University. 18 References [1] S. Bai and M.S. Taqqu. Multivariate limit theorems in the context of longrange dependence. Journal of Time Series Analysis, 34(6):717–743, 2013. [2] S. Bai and M.S. Taqqu. How the instability of ranks under long memory affects large-sample inference. To appear in Statistical Science, 2017. [3] J. Beran, Y. Feng, S. Ghosh, and R. Kulik. Long-Memory Processes: Probabilistic Properties and Statistical Methods. Springer, 2013. [4] N.H. Bingham, C.M. Goldie, and J.L. Teugels. Regular Variation. Encyclopedia of Mathematics and Its Applications. Cambridge University Press, 1989. [5] P. Breuer and P. Major. Central limit theorems for non-linear functionals of Gaussian fields. Journal of Multivariate Analysis, 13(3):425–441, 1983. [6] H. Dehling and M.S. Taqqu. Bivariate symmetric statistics of long-range dependent observations. Journal of Statistical Planning and Inference, 28(2):153–165, 1991. [7] R.L. Dobrushin and P. Major. Non-central limit theorems for non-linear functional of Gaussian fields. Probability Theory and Related Fields, 50(1):27–52, 1979. [8] K. Falconer. Fractal geometry: mathematical foundations and applications. John Wiley & Sons, 2004. [9] L. Giraitis, H.L. Koul, and D. Surgailis. Large Sample Inference for Long Memory Processes. World Scientific Publishing Company Incorporated, 2012. [10] I.I. Hirschman and D.V. Widder. The Convolution Transform. Dover Books on Mathematics. Dover Publications, 2005. [11] H. Ho and T. Hsing. Limit theorems for functionals of moving averages. The Annals of Probability, 25 (4):1636–1669, 1997. [12] J.R.M. Hosking. Asymptotic distributions of the sample mean, autocovariances, and autocorrelations of long-memory time series. Journal of Econometrics, 73(1):261–284, 1996. [13] S.G. Krantz and H.R. Parks. A Primer of Real Analytic Functions. Birkhäuser Boston, 2nd edition, 2002. [14] C. Lévy-Leduc and M.S. Taqqu. Long-range dependence and the rank of decompositions. Fractal Geometry and Dynamical Systems in Pure and Applied Mathematics II: Fractals in Applied Mathematics, 601:289, 2013. 19 [15] P. Major. Multiple Wiener-Itô Integrals: With Applications to Limit Theorems. Lecture Notes in Mathematics. Springer, 2 edition, 2014. [16] B. Mityagin. The zero set of a real analytic function. arXiv preprint arXiv:1512.07276, 2015. [17] I. Nourdin and G. Peccati. Normal Approximations With Malliavin Calculus: From Stein’s Method to Universality. Cambridge Tracts in Mathematics. Cambridge University Press, 2012. [18] P.C.B. Phillips. Towards a unified asymptotic theory for autoregression. Biometrika, pages 535–547, 1987. [19] V. Pipiras and M.S. Taqqu. Long-range dependence and self-similarity, volume 45. Cambridge University Press, 2017. [20] W. Rudin. Principles of Mathematical Analysis. International series in pure and applied mathematics. McGraw-Hill, 3 edition, 1976. [21] W. Rudin. Real and complex analysis. Tata McGraw-Hill Education, 1987. [22] G. Samorodnitsky. Stochastic Processes and Long Range Dependence. Springer, 2016. [23] J. Siciak. A characterization of analytic functions of n real variables. Studia Mathematica, 3(35):293–297, 1970. [24] M.S. Taqqu. Convergence of integrated processes of arbitrary Hermite rank. Probability Theory and Related Fields, 50(1):53–83, 1979. [25] D.V. Widder. The Laplace Transform. Dover books on mathematics. Dover Publications, 2010. Shuyang Bai Department of Statistics University of Georgia Athens, GA 30606 [email protected] Murad S. Taqqu Department of Mathematics and Statistics Boston University Boston, MA 02215 [email protected] 20
10math.ST
Submitted to the Annals of Statistics arXiv: 1607.01434 arXiv:1607.01434v3 [math.ST] 26 Jul 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE FUNCTION COMBINATIONS INCLUDING NEURAL NETWORKS By Jason M. Klusowski and Andrew R. Barron Yale University Let f ⋆ be a function on Rd satisfying a spectral norm condition. 1/4 For various noise settings, we show that Ekfˆ − f ⋆ k2 ≤ vf ⋆ logn d , where n is the sample size and fˆ is either a penalized least squares estimator or a greedily obtained version of such using linear combinations of ramp, sinusoidal, sigmoidal or other bounded Lipschitz ridge functions. Our risk bound is effective even when the dimension d is much larger than the available sample size. For settings where the dimension is larger than the square root of the sample size this quantity  1/2 is seen to improve the more familiar risk bound of vf ⋆ d log(n/d) , n also investigated here. 1. Introduction. Functions f ⋆ in Rd are approximated using linear combinations of ridge functions with one layer of nonlinearities. These approximations are employed via functions of the form (1.1) fm (x) = fm (x, ζ) = m X k=1 ck φ(ak · x + bk ), which is parameterized by the vector ζ, consisting of ak in Rd , and bk , ck in R for k = 1, . . . , m, where m ≥ 1 is the number of nonlinear terms. The functions φ are allowed to be quite general. For example, they can be bounded and Lipschitz, polynomials with certain controls on their degrees, or bounded with jump discontinuities. It is useful to view the representation (1.1) as X (1.2) βh h(x), h∈H Primary 62J02, 62G08; secondary 68T05 Keywords and phrases: Nonparametric regression; nonlinear regression; neural networks; penalization; machine learning; high dimensional data analysis; learning theory; generalization error; supervised learning; greedy algorithms; big data 1 imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 2 where H is a library of candidate basis or activation functions of the form h(x) = φ(θh · x) and the βh are non-negative, where all but finitely many are zero. We can reduce (1.1) to (1.2) as follows. Suppose the library is symmetric H = −H and contains the zero function. Without loss of generality, we may assume that the ck are non-negative by replacing the associated φ with φ sgnck , that by assumption also belongs to H. One can assume the internal parameters ak · x + bk take the form θk · x by appending a one to x and bk to ak . Note that now x and θk are (d + 1)-dimensional. Suppose P is an arbitrary probability measure on [−1, 1]d . Let R k · k be the L2 (P ) norm induced by the inner product h·, ·i. Define vf ⋆ ,s = Rd kωks1 f˜(ω)dω, for s ≥ 0.R If f ⋆ has a bounded domain in [−1, 1]d and a Fourier representation f ⋆ (x) = Rd eiω·x f˜(ω)dω with vf ⋆ ,1 < +∞, it is possible to use approximating functions of the form (1.1) with a single activation function φ. Such activation functions φ can be be general bounded monotone functions. The following result from [2] provides a useful starting point for approximating general functions f ⋆ by linear combinations of such objects. Suppose vf ⋆ ,1 is finite. Then by [2], there exists an artificial neural network of the form (1.1) with φ(x) = sgn(x) with kak k1 = 1 and |bk | ≤ 1 such that kf ⋆ − fm k2 ≤ 4vf2 ⋆ ,1 m . If φ has right at left limits −1 and +1, respectively, the fact that φ(τ x) → sgn(x) as τ → +∞ allows one to use somewhat arbitrary activation functions as basis elements. It is natural to impose a restriction on the size of the internal parameters and to also enjoy a certain degree of smoothness not offered by step functions. Thus we consider the result in [10], which allows one to approximate f ⋆ by linear combinations of ramp ridge functions (also known as first order ridge splines or hinging hyper-planes) (x · α − t)+ = max{0, x · α − t}, with kαk1 = 1, |t| ≤ 1. These functions are continuous and Lipschitz. In the supplementary material Supplement A we refine a result from [10]. For an arbitrary target function f ⋆ with vf ⋆ ,2 finite, there exists an approximation of the form (1.1) activated by ridge ramp functions with kak k = 1 and |bk | ≤ 1 such that ⋆ 2 kf − fm k ≤ 16vf2 ⋆ ,2 m . The supplement also discusses refinements of these approximation bounds and how one can reach similar conclusions with second order splines having imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 3 bounded internal parameters. The Lipschitz property of the ramp functions yields smaller covering numbers and thus improved rates over that which can be obtained using step functions. We define the set Hramp = {x 7→ ±(α · x − t)+ : kαk1 = 1, |t| ≤ 1}. We then set Framp to be the linear span of Hramp . In general, for a symmetric collection of dictionary elements H = −H containing the zero function, we let F = FH be the linear span of H. The variation vf = kf kH of f with respect to H (or the atomic norm of f with respect to H) is defined by ( ) X + lim inf kβk1 : fδ = , βh h and kfδ − f k ≤ δ, βh ∈ R δ↓0 fδ ∈F h∈H P where kβk1 = h∈H βh . For functions in F PH , this variation picks out the smallest kβk1 among representations f = h∈H βh h. For functions in the L2 (P ) closure of the linear span of H, the variation is the smallest limit of such ℓ1 norms among functions approaching the target. The subspace of functions with kf kH finite is denoted L1,H . R Note that the condition Rd kωk21 |f˜(ω)|dω < +∞ ensures that f ⋆ belongs to L1,Hramp and kf ⋆ kHramp ≤ vf ⋆ ,2 . Functions with moderate variation are particularly closely approximated. Nevertheless, even when kf ⋆ kH is infinite, we express the trade-offs in approximation accuracy for consistently estimating functions in the closure of the linear span of H. In what follows, we assume h has L∞ norm at most one, h is Lipschitz with Lipschitz constant at most one, and the internal parameters have ℓ1 norm at most Λ. This control on the size of the internal parameters will be featured prominently throughout. In the case of ramp activation functions, we are content with the assumption Λ = 2. Note that if one restricts the size of the domain and internal parameters (say, to handle polynomials), the functions h are still bounded and Lipschitz but with possibly considerably worse constants. Suppose data {(Xi , Yi )}ni=1 are independently drawn from the distribution of (X, Y ). To produce predictions of the real-valued response Y from its input X, the target regression function f ⋆ (x) = E[Y |X = x] is to be estimated. The function f ⋆ is assumed to be bounded in magnitude by a positive constant B. We assume the noise ǫ = Y − f ⋆ (X) has moments (conditioned on X) that satisfy a Bernstein condition with parameter η > 0. That is, we assume 1 k = 3, 4, . . . , E(|ǫ|k |X) ≤ k!η k−2 V(ǫ|X), 2 imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 4 where V(ǫ|X) ≤ σ 2 . This assumption is equivalent to requiring that E(e|ǫ|/ν |X) is uniformly bounded in X for some ν > 0. A stricter assumption is that 2 E(e|ǫ| /ν |X) is uniformly bounded in X, which corresponds to an error distribution with sub-Gaussian tails. These two noise settings will give rise to different risk bounds, as we will see. The input design X is assumed to be a d-dimensional vector with subGaussian coordinates. This condition implies that kXk2∞ is on average bounded by a constant multiple of log d. We will see that in our framework, estimators of f ⋆ are functions of training and test data. If one seeks to describe the error of an estimator for f ⋆ evaluated at a new set of random points distributed according to P , the estimator is allowed to depend on the test data and the sub-Gaussian coordinates can be shown to affect the rates below only by a logarithmic factor in d. This paper will focus only on the ability of an estimator to generalize to a new data set. For ease of analysis, we assume that X is contained in the hyper-cube [−1, 1]d , i.e. the supremum norm of X is at most one. No assumption is made about whether the coordinates of X are independent. Because f ⋆ is bounded in magnitude by B, it is useful to truncate an estimator fˆ at a level Bn at least B. Depending on the nature of the√noise ǫ, we will see that Bn will need to be at least B plus a term of order log n or log n. We define the truncation operator T that acts on function f in F by T f = min{|f |, Bn }sgnf . Associated with the truncation operator is a tail quantity n X (|Yi |2 − Bn2 )I{|Yi | > Bn } Tn = 2 i=1 that appears in the following analysis. Lemma 9 describes the finite sample behavior of ETn . The empirical mean squared error of a function f as a candidate fit to the P observed data is (1/n) ni=1 (Yi − f (Xi ))2 . Given the collection of functions F, a penalty penn (f ), f ∈ F, and data, a penalized least squares estimator fˆ arises by optimizing or approximately optimizing (1/n) n X i=1 (Yi − f (Xi ))2 + penn (f )/n. Our method of risk analysis proceeds as follows. Given a collection F of candidate functions, we show that there is a countable approximating set F̃ of representations f˜, variable-distortion, variable-complexity cover of F, and imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 5 a complexity function Ln (f˜), with the property that for each f in F, there is an f˜ in F̃ such that penn (f ) is not less than a constant multiple of γn Ln (f˜)+ ∆n (f, f˜), where γn is a constant (depending on B, Bn , σ 2 , and η) and ∆n (f, f˜) is given as a suitable empirical measure of distortion (based on sums of squared errors). The variable-distortion, variable-complexity terminology has its origins in [6], [7], and [12]. The task is to determine penalties such that an estimator fˆ approximately achieving the minimum of kY − f k2n + penn (f )/n satisfies (1.3) EkT fˆ − f ⋆ k2 ≤ c inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }, f ∈F for some universal c > 1 and positive quantity Af that decays as n grows. The quantity inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }. f ∈F is an index of resolvability of f ⋆ by functions F with sample size n. We shall take particular advantage of such risk bounds in the case that penn (f ) does not depend on X. Our restriction of X to [−1, 1]d is one way to allow the construction of such penalties. The following table expresses the heart of our results, expressing valid penalties providing such risk bounds for moderate and high-dimensional situations. Noise ǫ λn & sub-Gaussian / sub-exponential  2 γn log(d+1) penn (f )/n & 1/4 n 1/3 γn log(d+1) n 1/2+1/(2(d+3))  dγn log(n/d+1) n  zero sub-Gaussian / sub-exponential vf λn (vf )4/3 λn vf λn Table 1: Penalties for Theorem 2 The results we wish to highlight are contained in the first two rows of Table 1. The penalties as stated are valid up to modest universal constants and negligible terms that do not depend on the candidate fit. The quantity γn is of order log2 n in the sub-exponential noise case, order log n in the subGaussian noise case and of constant order in the zero noise case. This γn (as defined in Lemma 9) depends on the variance bound σ 2 , Bernstein parameter η, the upper bound B of kf ⋆ kH , and the noise tail level Bn of the indicated order. imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 6 When f ⋆ belongs to L1,H , a resulting valid risk bound is a constant multiple 4/3 of kf ⋆ kH λn or kf ⋆ kH λn , according to the indicated cases. In this way the λn expression provides a rate of convergence. The classical risk bounds for mean squared error, involving d/n to some power, are only useful when the sample size is much larger than the dimension. Here, in contrast, in the first two lines of Table 1, we see the dependence on dimension is logarithmic, permitting much smaller sample sizes. The price we pay for the smaller dependence on dimension is a deteriorated rate with exponent 1/4 in general and 1/3 under a no noise assumption. The rates in last row improve upon the familiar exponent of 1/2 to 1/2 + 1/(2(d + 3)). Note that when d is large, this enhancement in the exponent is negligible. √ The rate in the first row is better than the third approximately for d > n, the second is better than the third row approximately for d > n1/3 , and both of these first two rows have risk tending to zero as long as d < eo(n) . For functions in L1,Hramp , an upper bound of ((d/n) log(n/d))1/2 for the squared error loss is obtained in [3]. Using the truncated penalized ℓ1 least squares estimator (1.3), we obtain an improved rate of order ((dγn /n) log(n/d))1/2+1/(2(d+3)) , where γn is logarithmic in n, using techniques that originate in [15] and [14], with some corrections here. A slightly better rate with the d + 3 replaced by d + 1 in the denominator of the exponent can be achieved through more technical means, that we choose not to put in the present paper to keep the length under control. In an upcoming paper, the authors intend to show that this rate is almost optimal in the Gaussian noise, uniform design setting, since we provide minimax rates between (1/n)1/2+1/(d+2) and (d/n)1/2+1/2(d+1) for functions in L1,Hramp . Compare this with [20], where the mini-max L2 risk for functions in L1,Hstep (i.e. function approximated by linear combinations of step ridge functions) is determined to be between (1/n)1/2+1/(2(d+1)) (log n)−(1+1/d)(1+2/d)(1+2/d)(2+1/d) and (log n/n)1/2+1/(2(2d+1)) . These quantities have the attractive feature that the rate does not deteriorate as the dimension grows. However, they are only useful provided d/n is small. In high dimensional settings, the available sample size might not be large enough to ensure this condition. These results are all based on obtaining covering numbers for the library {x 7→ φ(θ · x) : kθk1 ≤ Λ}. If φ satisfies a Lipschitz condition, these numbers are equivalent to ℓ1 covering numbers of the internal parameters or of the Euclidean inner product of the data and the internal parameters. The factor of d multiplying the reciprocal of the sample size is produced from the order d log(Λ/ǫ) log cardinality of imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 7 the standard covering of the library {θ : kθk1 ≤ Λ}. What enables us to circumvent this polynomial dependence on d is to use an alternative cover of {x 7→ x·θ : kθk1 ≤ Λ} that has log cardinality of order (Λ/ǫ)2 log(d+1). Misclassification errors for neural networks with bounded internal parameters have been analyzed in [9] and [18]. In this paper we bound the mean squared error of function estimation, extending the results of [3], [4], [20], [15], [8], [7], [18], [11], [1], [21], [17]. 2. Greedy Algorithm. The main difficulty with constructing an estimator that satisfies (1.3) is that it involves a dm-dimensional optimization. Here, we outline a greedy approach that reduces the problem to performing m d-dimensional optimizations. This construction is based on the ℓ1 penalized greedy pursuit (LPGP) in [15], with the modification that the penalty can be a convex function of the candidate function complexity. Greedy strategies for approximating functions in the closure of the linear span of a subset of a Hilbert space has its origins in [16] and and many of its statistical implications were studied in [8] and [15]. Let f ⋆ be a function, not necessarily in F. Initialize f0 = 0. For m = 1, 2, . . . , iteratively, given the terms of fm−1 as h1 , . . . , hm−1 and the coefficients of it as β1,m−1 P Pm, . . . , βm−1,m−1 , we proceed as follows. Let fm (x) = m β h (x) = j,m j j=1 j=1 βj,m φ(θhj · x), with the term hm in H chosen to come within a constant factor c ≥ 1 of the maximum inner product with the residual f ⋆ − fm−1 ; that is hhm , f ⋆ − fm−1 i ≥ 1 sup hh, f ⋆ − fm−1 i. c h∈H Define fm (x) = (1 − αm )fm−1 (x) + βm,m hm (x). Associated P with this repm resentation of fm is the ℓ1 norm of its coefficients vm = j=1 |βj,m | = (1 − αm )vm−1 + βm,m . The coefficients αm and βm,m are chosen so that ≤ inf kf ⋆ − (1 − αm )fm−1 − βm,m hm k2 + w(vm ) α∈[0,1], β∈R+ [kf ⋆ − (1 − α)fm−1 − βhm k2 + w((1 − α)vm−1 + β)], where w : R → R is a real-valued non-negative convex function. In the empirical setting, with Ri = Yi − fm−1 (Xi ), the high-dimensional optimization task is to find θm such that n n i=1 i=1 1X 1 1X Ri φ(θm · Xi ) ≥ sup Ri φ(θ · Xi ) n c kθk1 ≤Λ n imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 8 One appealing aspect of the slight sub-optimality of θm is that it permits the use of adaptive annealing techniques developed by the authors in a forthcomingPpaper [5]. The algorithm samples from a distribution proportional n 1 to et( n i=1 Ri φ(θ·Xi )) p0P (θ) which has, for t sufficiently large, a mean that is 1 1 at least c supkθk1 ≤Λ n ni=1 Ri φ(θ · Xi ). Theorem 1. If fm is chosen according to the greedy scheme described previously, then   4bf ⋆ 2 ⋆ 2 kf − fm k + w(vm ) ≤ inf kf − f k + w(cvf ) + , f ∈F m where bf = c2 vf2 + 2vf kf ⋆ k(c + 1) − kf k2 . Furthermore, inf inf f ∈F δ>0 kf ⋆ − fm k2 + w(vm ) ≤ ) −1 (c + 1)2 v 2 4(1 + δ)δ f , (1 + δ)kf ⋆ − f k2 + w(cvf ) + m ( and hence with δ = 2(c+1)vf √ , kf ⋆ −f k m kf ⋆ − fm k2 + w(vm ) ≤ inf f ∈F ( 2(c + 1)vf √ kf ⋆ − f k + m 2 Proof. Fix any f in the linear span F, with the form non-negative βh . ) + w(cvf ) . P h∈H βh h, with em = kf ⋆ − fm k2 − kf ⋆ − f k2 + w(vm ). Then from the definition of αm and βm,m , em = kf ⋆ − (1 − αm )fm−1 − βm,m hm k2 − kf ⋆ − f k2 + w((1 − αm )vm−1 + βm,m ) ≤ kf ⋆ − (1 − αm )fm−1 − αm cvf hm k2 − kf ⋆ − f k2 + ⋆ w((1 − αm )vm−1 + αm cvf ) ≤ kf − (1 − αm )fm−1 − αm cvf hm k2 − kf ⋆ − f k2 + (1 − αm )w(vm−1 ) + αm w(cvf ), where the last line follows from the convexity of w. Now kf ⋆ −(1−αm )fm−1 − αm cvf hm k2 is equal to k(1−αm )(f ⋆ −fm−1 )+αm(f ⋆ −chm vf )k2 . Expanding imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 9 this quantity leads to kf ⋆ − (1 − αm )fm−1 − αm cvf hm k2 = (1 − αm )2 kf ⋆ − fm−1 k2 − 2αm (1 − αm )hf ⋆ − fm−1 , chm vf − f ⋆ i + α2m kf ⋆ − chm vf k2 . Next we add (1 − αm )w(vm−1 ) + αm w(cvf ) − kf ⋆ − f k2 to this expression to obtain em ≤ (1 − αm )em−1 + α2m [kf ⋆ − chm vf k2 − kf ⋆ − f k2 ] + αm w(cvf ) − 2αm (1 − αm )hf ⋆ − fm−1 , chm vf − f i + αm (1 − αm )[2hf ⋆ − fm−1 , f ⋆ − f i − kf ⋆ − fm−1 k2 − kf ⋆ − f k2 ], which is further upper bounded by em ≤ (1 − αm )em−1 + α2m [kf ⋆ − chm vf k2 − kf ⋆ − f k2 ] + αm w(cvf ) − 2αm (1 − αm )hf ⋆ − fm−1 , chm vf − f i − αm (1 − αm )(kf ⋆ − fm−1 k − kf ⋆ − f k)2 , Consider a random variable that equals h with probability βh /vf having mean f . Since a maximum is at least an average, the choice of hm implies that hf ⋆ − fm−1 , chm vf i is at least hf ⋆ − fm−1 , f i. This shows that em is no less than (1 − αm )em−1 + α2m [kf ⋆ − chm vf k2 − kf ⋆ − f k2 ] + αm w(cvf ). Expanding the squares in kf ⋆ − chm vf k2 − kf ⋆ − f k2 and using the CauchySchwarz inequality yields the bound kchm vf k2 + 2kf ⋆ k(kf − chm vf k)− kf k2 . Since khm k ≤ 1 and kf k ≤ vf , we find that kf ⋆ − chm vf k2 − kf ⋆ − f k2 is at most bf = c2 vf2 + 2vf kf ⋆ k(c + 1) − kf k2 . Hence we have shown that e1 ≤ bf + w(cvf ) and em ≤ (1 − αm )em−1 + α2m bf + αm w(cvf ). Choose αm = 2/(m + 1), m ≥ 2 and use an inductive argument to establish the claim. The second statement in the theorem follows from similar arguments upon consideration of em = kf ⋆ − fm k2 − (1 + δ)kf ⋆ − f k2 + w(vm ), together with the inequality a2 − (1 + δ)b2 ≤ (1 + δ)δ−1 (a − b)2 . imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 10 3. Risk bounds. Here we state our main theorem. Theorem 2. Let f ⋆ be a real-valued function on [−1, 1]d with finite variation vf ⋆ with respect to the library H = {h(x) = φ(θh · x)}. We further assume that φ is Lipschitz function with kφk∞ ≤ 1 and kθh k ≤ Λ. In the case that f ⋆ belongs to L1,Hramp , φ is a ramp function with Λ = 2. If fˆ is chosen to satisfy ) ( n n X 1 1X (Yi − fˆ(Xi ))2 + penn (fˆ)/n ≤ inf (Yi − f (Xi ))2 + penn (f )/n , f ∈F n n i=1 i=1 then for the truncated estimator T fˆ and for penn (f ) depending on vf as specified below, the risk has the resolvability bound EkT fˆ − f ⋆ k2 ≤ 2(τ + 1) inf {kf − f ⋆ k2 + Epenn (f )/n}, f ∈F The penalty divided by sample size penn (f )/n is at least 16vf  γn Bn2 Λ2 log(d + 1) n 1/4 +8  γn Bn2 Λ2 log(d + 1) n 1/2 + Tn n and 60vf Λ     1 dγn log(n/d + 1) 1/2+1/2(d+3) dγn log(n/d + 1) 1/2+1/2(d+3) + 2 n Λ n  1/2+3/2(d+3) dγn log(n/d + 1) dγn log(n/d + 1) Tn + + + , n n n when d is small compared to n. In the no noise setting, penn (f )/n is at least 4/3 16vf  γn Λ2 log(d + 1) n 1/3 4/3 + 4(vf + 1)  γn Λ2 log(d + 1) n 2/3 , Here γn = (2τ )−1 (1 + δ1 /2)(1 + 2/δ1 )(B + Bn )2 + 2(1 + 1/δ2 )σ 2 + 2(B + Bn )η and τ = (1 + δ1 )(1 + δ2 ) for some δ1 > 0 and δ2 > 0. Accordingly, if f ⋆ belongs to L1,H , EkT fˆ − f ⋆ k2 is not more than a constant multiple of the above penalties with vf replaced by kf ⋆ kH . If fˆm is the LPGP estimator from the previous section, then by Theorem 1, ) ( n n X 4b 1 1X f , (Yi − fˆm(Xi ))2 +w(vfˆm ) ≤ inf (Yi − f (Xi ))2 + w(cvf ) + f ∈F n n m i=1 i=1 imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 11 where bf is the empirical version of the same quantity in Theorem 1 and hence the risk has the resolvability bound EkT fˆ − f ⋆ k2 ≤ 2(τ + 1) inf {kf − f ⋆ k2 + Epenn (cf )/n + 4Ebf /m}, f ∈F for a penalty, convex in vf , penn (f ) = nw(vf ) as before. If m is chosen √ to be of order between n and n so as to make the computational effects negligible, the previously described L2 (P ) rates for estimating f ⋆ in L1,H via the truncated estimator T fˆm are attainable under the appropriate penalties. As we have said, where we have d + 3 in the denominator in the exponent, it is possible to improve it to a d + 1. Such improvements are due to improved covers for the complexity evaluation. These refinements also hold for the LPGP estimator, although the number of iterations m needs to be of slightly higher order than before. One can also extend these results to include penalties that depend on the number of terms m in an m-term greedy approximation fˆm to f ⋆ . We take fˆm to be an m term fit from an LPGP algorithm and choose m̂ among all m ∈ M (i.e. M = {1, . . . , n}) to minimize n 1X (Yi − fˆm (Xi ))2 + penn (fˆm , m)/n. n i=1 This approach enables the use of a data-based stopping criterion for the greedy algorithm. For more details on these adaptive methods, we refer the reader to [15]. The resolvability risk bound allows also for interpolation rates between L2 and L1,H refining the results of [8] and in accordance with the best balance between error of approximation and penalty. The target f ⋆ is not necessarily in F. To each f in F, there corresponds a function ρ, which assigns to (X, Y ) the relative loss ρ(X, Y ) = ρf (X, Y ) = (Y − f (X))2 − (Y − f ⋆ (X))2 . Let X ′ be an independent copy of the training data X used for testing the efficacy of a fit fˆ based on X, Y . The relative empirical loss with respect to 1 Pn ⋆ the training data is denoted by Pn (f ||f ) = n i=1 Pρ(Xi , Yi ) and that with respect to the independent copy is Pn′ (f ||f ⋆ ) = n1 ni=1 ρ(Xi′ , Yi ). We define the empirical squared error by on the training and test data by Dn (f, f˜) = P n 1 Pn 1 2 ′ ′ ˜ ˜ ˜ ′ 2 i=1 (f (Xi ) − f (Xi )) and Dn (f, f ) = n i=1 (f (Xi ) − f (Xi )) for all n f, f˜ in F. Using the relationship Y = f ⋆ (X) + ǫ, we note that ρ(X, Y ) can imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 12 also be written as (f (X) − f ⋆ (X))2 − 2ǫ(f (X) − f ⋆ (X)) = g 2 (X) − 2ǫg(X), where g(x) = P f (x) − f ⋆ (x). Hence we have the relationship Pn (f ||f ⋆ ) = 2 ⋆ Dn (f, f ) − n ni=1 ǫi g(Xi ). The relative empirical loss Pn′ (f ||f ⋆ ) is an unbiased estimate of the risk Ekfˆ−f ⋆ k2 . Since ǫi has mean zero conditioned on Xi , the mean of Pn′ (f ||f ⋆ ) with respect to X ′ and Y is Ekfˆ−f ⋆ k2 . Such a quantity captures how well the fit fˆ based on the training data generalizes to a new set of observations. The goal is to control the empirical discrepancy Pn′ (f ||f ⋆ ) − cPn (f ||f ⋆ ) between the loss on the future data and the loss on the training data for a constant τ > 1. Toward this end, we seek a positive quantity penn (f ) to satisfy  E sup Pn′ (f ||f ⋆ ) − τ Pn (f ||f ⋆ ) − τ penn (f )/n ≤ 0, f ∈F Once such an inequality holds, the data-based choice fˆ in F yields EPn′ (fˆ||f ⋆ ) ≤ τ E[Pn (fˆ||f ⋆ ) + penn (f )/n]. If fˆ satisfies (3.1) ) ( n n ˆ) X pen ( f pen (f ) 1 1X n n ≤ inf + Af , (Yi −fˆ(Xi ))2 + (Yi − f (Xi ))2 + f ∈F n n n n i=1 i=1 for some positive quantity Af that decays to zero as the sample size grows, we see that EPn′ (fˆ||f ⋆ ) ≤ τ inf E[Pn (f ||f ⋆ ) + penn (f )/n + Af ]. f ∈F Using EPn′ (fˆ||f ⋆ ) = Ekfˆ − f ⋆ k2 and EPn (f ||f ⋆ ) = kf − f ⋆ k2 , the above expression is seen to be Ekfˆ − f ⋆ k2 ≤ τ inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }. f ∈F For the purposes of proving results in the case when F is uncountable, it is useful to consider complexities Ln (f˜) for f˜ in a countable subset F̃ of F P ˜ satisfying f˜∈F̃ e−γn Ln (f ) ≤ 1 for some γn > 0 and such that  sup Pn′ (f ||f ⋆ ) − τ Pn (f ||f ⋆ ) − τ penn (f )/n f ∈F (3.2) n o ≤ sup Pn′ (f˜||f ⋆ ) − τ Pn (f˜||f ⋆ ) − τ γn Ln (f˜)/n , f˜∈F̃ imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 13 with n o E sup Pn′ (f˜||f ⋆ ) − τ Pn (f˜||f ⋆ ) − τ γn Ln (f˜)/n ≤ 0. f˜∈F̃ The condition in (3.2) is equivalent to requiring that sup inf {∆n (f, f˜) + γn Ln (f˜) − penn (f )} ≤ 0, f ∈F f˜∈F̃ where ∆n (f, f˜) = n[Pn (f˜||f ⋆ ) − Pn (f ||f ⋆ )] − (n/τ )[Pn′ (f˜||f ⋆ ) − Pn′ (f ||f ⋆ )]. If we truncate the penalized least squares estimator fˆ at a certain level Bn , for EkT fˆ − f ⋆ k2 to maintain the resolvability bound τ inf f ∈F {kf − f ⋆ k2 + Epenn (f )/n + EAf }, we require that sup inf {∆n (f, f˜) + γn Ln (f˜) − penn (f )} ≤ 0, f ∈F f˜∈F̃ where ∆n (f, f˜) = n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ )] − (n/τ )[Pn′ (T f˜||f ⋆ ) − Pn′ (T f ||f ⋆ )]. Rather than working with the relative empirical loss Pn′ (T f ||f ⋆ ), we prefer to work with Dn′ (T f, f ⋆ ). These two quantities are related to each other, 1 Pn provided n i=1 ǫi g(Xi′ ) is small and they are exactly equal in the no noise case. Hence we would like to determine penalties that ensure  E sup Dn′ (T f, f ⋆ ) − τ Pn (f ||f ⋆ ) − τ penn (f )/n ≤ 0. f ∈F Suppose we require that E sup {τ1−1 Dn′ (T f, f ⋆ ) − τ τ2 Pn (f ||f ⋆ )− f ∈F τ τ2 penn (f )/n} ≤ 0, for some τ1 , τ2 ≥ 1. This further inflates the resulting risk bound by (1 + τ1 )(1 + τ2 ) so that the factor τ is replaced with τ τ1 τ2 in (3). However, it enables us to create countable covers F̃ with smaller errors in approximating functions from F. To see this, suppose the countable cover F̃ satisfies  sup τ1−1 Dn′ (T f, f ⋆ ) − τ τ2 Pn (f ||f ⋆ ) − τ τ2 penn (f )/n f ∈F n o ≤ sup Dn′ (T f˜, f ⋆ ) − τ Pn (T f˜||f ⋆ ) − τ γn Ln (f˜)/n , f˜∈F̃ imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 14 or equivalently that sup inf f ∈F f˜∈F̃   γn ˜ ˜ ∆n (f, f ) + Ln (f ) − penn (f ) ≤ 0, τ2 where ∆n (f, f˜) = n[τ2−1 Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ )]+ nτ −1 τ2−1 [τ1−1 Dn′ (T f, f ⋆ ) − Dn′ (T f˜, f ⋆ )]. There are two cases to consider for bounding ∆n (f, f˜). In the noise case, we 1 (b − a)2 set τ2 = 1 and τ1 = 1/τ + 1. Using the inequality, τ −1 a2 − b2 ≤ τ −1 √ √ 2 that can be derived from (a/ τ − b τ ) ≥ 0, we can upper bound the difference τ1−1 Dn′ (T f, f ⋆ ) − Dn′ (T f˜, f ⋆ ) by ˜ (τ1 − 1)−1 Dn′ (T f, T f). This quantity does not involve f ⋆ , which is desirable for the proceeding analysis. Hence ∆n (f, f˜) is not greater than n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜)]. and thus we seek a penalty penn (f ) that is at least γn Ln (f˜) + n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜)]. An estimator fˆ satisfying (3.1) with penality penn (f ) that is at least γn Ln (f˜) + n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜)]. satisfies the risk bound EkT fˆ − f ⋆ k2 ≤ (τ + 1) inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }. f ∈F In the no noise case, we set both τ1 and τ2 to be strictly greater than one. We can bound the difference τ2−1 Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) = τ2−1 Dn (T f˜, f ⋆ ) − Dn (f, f ⋆ ) ≤ τ −1 Dn (f˜, f ⋆ ) − Dn (f, f ⋆ ) 2 by (τ2 − 1)−1 Dn (f˜, f ) so that ∆n (f, f˜) has the bound n(τ2 − 1)−1 Dn (f˜, f ) + nτ −1 τ2−1 (τ1 − 1)−1 Dn′ (f, f˜). imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 15 If we set τ2 = 2 and τ1 = 1/τ + 1, we find that ∆n (f, f˜) is no less than n[Dn (f˜, f ) + Dn′ (f, f˜)]. An estimator fˆ satisfying (3.1) with penality penn (f ) that is at least γn Ln (f˜) + n[Dn (f˜, f ) + Dn′ (f, f˜)]. satisfies the risk bound EkT fˆ − f ⋆ k2 ≤ 2(τ + 1) inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }. f ∈F By bounding the distortion in this way, we eliminate some error in approximating f by f˜ that arises from analyzing Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) and Dn (T f˜, f ⋆ ) − Dn (T f, f ⋆ ). Suppose F̃ is a countable collection of functions that satisfies n o E sup Dn′ (T f˜, f ⋆ ) − τ Pn (f˜||f ⋆ ) − τ γn Ln (f˜) ≤ 0. Theorem 3. f˜∈F̃ If penn (f ) is at least γn Ln (f˜) + n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜)]. or γn Ln (f˜) + n[Dn (f˜, f ) + Dn′ (f, f˜)] corresponding to the noise or no noise setting, then the truncated estimator T fˆ with fˆ satisfying (3.1) has the resolvability bound EkT fˆ − f ⋆ k2 ≤ 2(τ + 1) inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }. f ∈F Recall that g is equal to f − f ⋆ . In this way, there is a one to one correspondence between f and g. To simplify notation, we sometimes write Dn (f, f ⋆ ) as Dn (g) and Dn′ (f, f ⋆ ) as Dn′ (g). Moreover, assume an analogous notation holds for the relative loss functions Pn (f ||f ⋆ ) and P ′ (f ||f ⋆ ) and complexities Ln (f ). Theorem 4. If F is a countable collection of functions in magP bounded −Ln (f ) ≤ 1, nitude by Bn and Ln (f ) satisfies the Kraft inequality e f ∈F then  E sup Dn′ (f ||f ⋆ ) − τ Pn (f ||f ⋆ ) − τ γn Ln (f )/n ≤ 0, f ∈F where τ = (1 + δ1 )(1 + δ2 ) and γn = (2τ )−1 (1 + δ1 /2)(1 + 2/δ1 )(B + Bn )2 + 2(1 + 1/δ2 )σ 2 + 2(B + Bn )η. imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 16 Proof. Let s2 (g) be as in Lemma 1. Since g2 is non-negative, s2 (g) ≤ Dn′ (g2 ) + Dn (g2 ). Moreover, since |f | ≤ Bn and |f ⋆ | ≤ B, it follows that s2 (g) ≤ (B + Bn )2 (Dn′ (g) + Dn (g)). Let γ1 = A1 (B + Bn )2 /2 with A1 to be specified later. By Lemma 1, we have n o γ1 E sup (1 − 1/A1 )Dn′ (g) − (1 + 1/A1 )Dn (g) − L(g) (3.3) n g∈G   1 2 γ1 ′ ≤ E sup Dn (g) − Dn (g) − L(g) − (3.4) s (g) ≤ 0 n 2γ1 g∈G By Lemma 2, we also know that ( n ) γ2 1 1X ǫi g(Xi ) − L(g) − Dn (g) ≤ 0, (3.5) E sup n n A2 n g∈G i=1 where γ2 = A2 σ 2 /2 + (B + Bn )η. Adding the expression in (3.3) to 2a > 0 times the expression in (3.5) and collecting terms, we find P that 1 + 1/A1 + 2a/A2 should be equal to a in order for Dn (g) and n1 ni=1 ǫi g(Xi ) to be added together to produce Pn (g). Thus we find that n o γn E sup (1 − 1/A1 )Dn′ (g) − a(Pn (g) + L(g)) ≤ 0, n g∈G where γn = γ1 /a + 2γ2 . Choosing A1 = 1 + 2/δ1 , A2 = 2(1 + 1/δ2 ), and τ = (1 + δ1 )(1 + δ2 ), we find that a = τ (1 − 1/A1 ). Dividing the resulting expression by 1 − 1/A1 produces  E sup Dn′ (g) − τ Pn (g) − τ γn L(g)/n ≤ 0. g∈G In general, the penalty should not depend on the unknown test data X ′ . However if one seeks to describe the error of a fit fˆ trained with the data (X, Y ) at new data points X ′ , a penalty that depends on X ′ is natural and fits in with the standard trans-inductive setting in machine learning [13]. Since we have been assuming that the input design X is contained in a cube with side length at most one, the dependence on X ′ of the penalties as shown in the following lemmata can be ignored. When we speak of empirical L2 covers of H, we mean with respect to the empirical measure of X ∪ X ′ on both the training and test data. That is, empirical L2 covers of H are with respect to the squared norm [D(h, h̃) + D ′ (h, h̃)]/2. imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 17 P Theorem 5. Let f = h βh h. Let H̃1 be an empirical L2 ǫ1 -net for H of cardinality M1 . Let H̃2 be an empirical L2 ǫ2 -net for H of cardinality M2 . Suppose these empirical covers do not depend on the underlying data. There M2 +M1 +m0  such that for exists a subset F̃ of F with cardinality at most M1 +m0 v ≥ vf and ṽ = v(1 + M1 /m0 ) Tn 2ṽ 2 ǫ21 ṽ 2 M1 + , + 8Bn ṽǫ2 + Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜) ≤ 2 m0 n 2m0 for some f˜ in F̃. Alternatively, there exists a subset F̃ of F with cardinality 0 at most M2m+m such that 0 2vvf Tn + 8Bn vǫ2 + , Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜) ≤ m0 n and in the case of no noise with Bn ≥ B 4vvf Dn (f˜, f ) + Dn′ (f, f˜) ≤ + 4v 2 ǫ22 m0 for some f˜ in F̃ . Proof. The proof is an immediate consequence of Lemma 4. According to Theorems 3 and 4, a valid penalty is at least γn Ln (f˜) + n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜)], P −Ln (f˜) ≤ 1. The where f˜ belongs to a countable set F̃ satisfying f˜∈F̃ e constant γn is as prescribed in Theorem 4. By Theorem 5, there is a set F̃ M2 +M1 +m0  such that for all f with vf ≤ v, there with cardinality at most M1 +m0 ⋆ ˜ ˜ is a f in F̃ such that Pn (T f ||f ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜) is bounded by 2ṽ 2 ǫ21 ṽ 2 M1 Tn . + + 8Bn ṽǫ2 + 2 m0 n 2m0  1 +m0 is bounded by (M1 + Using the fact that the logarithm of M2M+M +m 1 0 m0 ) log(e(M2 /M1 + 1)), a valid penalty divided by sample size is at least (3.6) Tn γn 2ṽ 2 ǫ21 ṽ 2 M1 + 8Bn ṽǫ2 + (M1 + m0 ) log(e(M2 /M1 + 1)) + + . 2 n m0 n 2m0 imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 18  0 such that Alternatively, there is a set F̃ with cardinality at most M2m+m 0 ⋆ ˜ ˜ for all f with vf ≤ v, there is a f in F̃ such that Pn (T f ||f ) − Pn (f ||f ⋆ ) + ˜ is bounded by Dn′ (T f, T f) 2vvf Tn + 8Bn vǫ2 + m0 n and hence a valid penalty divided by sample size is at least (3.7) γn m0 log M2 2vvf Tn + + 8Bn vǫ2 + . n m0 n In the no noise case, a valid penalty divided by sample size is at least (3.8) γn m0 log M2 4vvf + + 4v 2 ǫ22 . n m0 We now discuss how m0 , ǫ1 , and ǫ2 should be chosen to produce penalties that yield optimal risk properties for T fˆ. 4. Risk bounds in high dimensions. 4.1. Noise case. By Lemma 6, an empirical L2 ǫ2 -cover of H has cardi2  2  2) ⌉ 2) ⌉ is bounded by . The logarithm of 2d+⌈(Λ/ǫ nality less than 2d+⌈(Λ/ǫ ⌈(Λ/ǫ2 )2 ⌉ ⌈(Λ/ǫ2 )2 ⌉ 2 4(Λ/ǫ2 ) log(d + 1). Continuing from the expression (3.7), we find that penn (f )/n is at least 4γn m0 (Λ/ǫ2 )2 log(d + 1) 2vvf Tn + + 8Bn vǫ2 + . n m0 n 1/2  vv nǫ22 , we see that penn (f )/n Choosing m0 to be the ceiling of 2γn Λ2 flog(d+1) must be at least  1/2 vvf γn Λ2 log(d + 1) Tn 8γn Λ2 log(d + 1) + 8Bn vǫ2 + +8 . 2 2 n nǫ2 nǫ2   2 log(d+1) 1/4 so that penn (f )/n must Finally, we set v = vf and ǫ2 = γn Λ nB 2 n be at least   1/4 1/2 γn Bn2 Λ2 log(d + 1) γn Bn2 Λ2 log(d + 1) Tn 16vf . +8 + n n n imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 19 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS We see that the main term in the penalty divided by sample size is 1/4  γn Bn2 Λ2 log(d + 1) . 16vf n 4.2. No noise case. Continuing from the expression (3.8), we find that penn (f )/n is at least 4γn m0 (Λ/ǫ2 )2 log(d + 1) 4vvf + + 4v 2 ǫ22 . n m0 1/2 Choosing m0 to be the ceiling of must be at least  vvf nǫ22 (τ +1)2 γn Λ2 log(d+1)(τ +2) 4γn Λ2 log(d + 1) +8 nǫ22  vvf γn Λ2 log(d + 1) nǫ22 Finally, we set v = vf and ǫ2 = penn (f )/n must be at least 4/3 16vf  γn Λ2 log(d + 1) n 1/3 +  , we see that penn (f )/n 1/2 + 4v 2 ǫ22 .  4(τ +2)/(τ +1)2 γn Λ2 log(d+1) 1/6 2 nv 4/3 4(vf + 1)  γn Λ2 log(d + 1) n so that 2/3 , where we used the fact that v 2/3 ≤ v 4/3 + 1. We see that the main term in the penalty divided by sample size is 1/3  2 4/3 γn Λ log(d + 1) . 16vf n 4.3. Combining the noise and no noise cases. As the previous sections show, there are differences in the risk bounds depending on the nature of the noise. These bounds only incorporate information about the presence of noise, without regard to the degree of variability. Ideally one would prefer to have a bound that interpolates between these two situations and recovers the no noise case exactly when the variability is zero. We can establish the validity of a penalty divided by sample size that is at least a constant multiple of !1/3 !1/4 vf4 Λ2 γn log(d + 1) vf4 Λ2 γn log(d + 1) √ + σ . (4.1) n n imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 20 plus negligible terms that do not depend on the candidate fit. Note that this penalty is a convex function of vf and hence the setting of Theorem 1 applies. For a proof of the above form of the penalty, we refer the reader to the supplement Supplement A. 5. Risk bounds with improved exponents for moderate dimensions. Continuing from the expression (3.6), we find that penn (f )/n is at least γn Tn 2ṽ 2 ǫ21 ṽ 2 M1 + 8Bn ṽǫ2 + (M1 + m0 ) log(e(M2 /M1 + 1)) + + . 2 n m0 n 2m0 Note that we can bound Bn2 by γn by choosing δ1 and δ2 appropriately. For the precise definition of γn , see Theorem 4. The strategy for optimization is to first consider the terms 2ṽ 2 ǫ21 √ γn m0 log(e(M2 /M1 + 1)) + + 8 γn ṽǫ2 . n m0 (5.1) After m0 , M1 , and M2 have been selected, we then check that ṽ 2 M1 γn M1 log(e(M2 /M1 + 1)) + n 2m20 (5.2) is relatively negligible. Choosing m0 to be the ceiling of we see that (5.1) is at most γn log(e(M2 /M1 + 1)) + 4 n   1/2 2ṽ2 nǫ21 , γn log(e(M2 /M1 +1)) ṽ 2 γn ǫ21 log(e(M2 /M1 + 1)) n 1/2 √ + 8 γn ṽǫ2 . Note that an empirical L2 ǫ-cover of H has cardinality between (Λ/ǫ)d and (2Λ/ǫ + 1)d ≤ (3Λ/ǫ)d whenever ǫ ≤ Λ. Thus M2 /M1 ≤ (3ǫ1 /ǫ2 )d whenever ǫ2 ≤ Λ and hence log(e(M2 /M1 + 1)) ≤ 1 + (d/2) log(9ǫ21 /ǫ22 + 1) ≤ d log(9ǫ21 /ǫ22 + 1), whenever ǫ21 ≥ ǫ22 (e − 1)/9. These inequalities imply that (5.1) is at most dγn log(9ǫ21 /ǫ22 + 1) +4 n  ṽ 2 ǫ21 dγn log(9ǫ21 /ǫ22 + 1) n Next, set ǫ22 = 1/2 √ + 8 γn ṽǫ2 . 9dǫ21 . n imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 21 This means that the assumption ǫ21 ≥ ǫ22 (e − 1)/9 is valid provided d ≤ n/(e − 1). Thus (5.1) is at most r dγn log(n/d + 1) dγn log(n/d + 1) + 20ǫ1 ṽ . n n Next, we add in the terms from (5.2). The selections of m0 and ǫ1 make (5.2) at most M1 dγn log(n/d + 1) M1 dγn log(n/d + 1) + n nǫ21 Since M1 ≤ (3Λ/ǫ1 )d whenever ǫ1 ≤ Λ, we find that (5.2) is at most (3Λ)d dγn log(n/d + 1) (3Λ)d dγn log(n/d + 1) + nǫd1 nǫd+2 1 1/2(d+3)  . Choosing ṽ = vf , we see that a valid Let ǫ1 = 3Λ dγn log(n/d+1) n penalty divided by sample size is at least 60vf Λ     1 dγn log(n/d + 1) 1/2+1/2(d+3) dγn log(n/d + 1) 1/2+1/2(d+3) + 2 n Λ n 1/2+3/2(d+3)  dγn log(n/d + 1) Tn dγn log(n/d + 1) + + . + n n n Note that for the form of the above penalty to be valid, we need dγn log(n/d) n to be small enough to ensure that ǫ1 and ǫ2 are both less than Λ. v 2 M1 4m20 from the bound in Lemma P 5 at the expense of a larger set F̃ . For example, let (1/m0 ) m k=1 bk hk , kbk ≥ vf be as in the first part of Lemma 4. Note that the vector (b1 , . . . , bm )′ /kbk1 belongs to the ℓ1 unit ball. This space has an ǫ-covering number of order (1/ǫ)m0 +M1 and thus the collection of representors F̃ is of order   m0 +M1 M2 + M1 + m0 (1/ǫ2 ) . M1 + m0 Remark. It is possible to remove the term This new cover can be used to yield even tighter bounds than those presented in Table 1. However, the analysis is more technical and we omit it here. We imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 22 will however say that slightly improved rates of order vf ⋆ are possible. d n log  n 1/2+1/(2(d+1)) d 6. Proofs of the lemmata. An important aspect of the above covers F̃ is that they P only depend on the data (X, X ′ ) through kXk2∞ +kX ′ k2∞ , where 1 2 kXk∞ = n ni=1 kXi k2∞ . Since the coordinates of X and X ′ are restricted to belong to [−1, 1]d , the penalties and quantities satisfying Kraft’s inequality do not depend on X and X ′ . This is an important implication for the following empirical process theory. On the other hand, using the fact that kXk2∞ +kX ′ k2∞ is symmetric in the coordinates of X and X ′ and has a mean that is at most logarithmic in d, the following bounds can be adapted to handle covers F̃ that depend on the training and test data without imposing sup-norm controls. Lemma 1. Let (X, X ′ ) = (X1 , . . . , Xn , X1′ , . . . , Xn′ ), where X ′ is an independent copy of the data X and where (X1 , . . . , Xn ) are component-wise independent but not necessarily identicallyPdistributed. A countable function class G and complexities L(g) satisfying g∈G e−L(g) ≤ 1 are given. Then for arbitrary positive γ,   1 2 γ s (g) ≤ 0, (6.1) E sup Dn′ (g) − Dn (g) − L(g) − n 2γ g∈G where s2 (g) = 1 n Pn i=1 (g 2 (X ) i − g2 (Xi′ ))2 . Proof. Let Z = (Z1 , . . . , Zn ) be a sequence of independent centered Bernoulli random variables with success probability 1/2. Since Xi and Xi′ are identically distributed, g2 (Xi ) − g2 (Xi′ ) is a symmetric random variable and hence sign changes do not affect the expectation in (6.1). Thus the right hand side of the inequality in (6.1) is equal to ( n ) 1X γ 1 EZ,X,X ′ sup Zi (g2 (Xi ) − g2 (Xi′ )) − L(g) − s2 (g) . n n 2γ g∈G i=1 Using the identity x = λ log(x/λ) with λ = γ/n, conditioning on X and X ′ , and applying Jensen’s inequality to move EZ inside the logarithm, we have imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 23 that ) n γ 1 1X Zi (g 2 (Xi ) − g 2 (Xi′ )) − L(g) − s2 (g) EZ sup n n 2γ g∈G i=1 ( n ) X 1 γ n ≤ log EZ sup exp Zi (g 2 (Xi ) − g 2 (Xi′ )) − L(g) − 2 s2 (g) . n γ 2γ g∈G ( i=1 Replacing the supremum with the sum and using the linearity of expectation, the above expression is not more than ( n ) X 1X γ n 2 2 2 ′ log EZ exp Zi (g (Xi ) − g (Xi )) − L(g) − 2 s (g) n γ 2γ i=1 g∈G ( n )   X 1X n 2 γ 2 2 ′ exp −L(g) − 2 s (g) EZ exp Zi (g (Xi ) − g (Xi )) . = log n 2γ γ i=1 g∈G Next, note that by the independence of Z1 , . . . , Zn , ( n )   n Y 1X 1 2 2 ′ 2 2 ′ EZi exp Zi (g (Xi ) − g (Xi )) . Zi (g (Xi ) − g (Xi )) = EZ exp γ γ i=1 i=1 n o 2 Using the inequality ex +e−x ≤ 2ex /2 , each EZi exp γ1 Zi (g 2 (Xi ) − g 2 (Xi′ )) o n is not more than exp 2γ1 2 (g2 (Xi ) − g 2 (Xi′ ))2 . Whence ( n )   1X n 2 2 2 ′ EZ exp Zi (g (Xi ) − g (Xi )) ≤ exp s (g) . γ 2γ 2 i=1 The claim follows from the fact that γ n log P g∈G e−L(g) ≤ 0. Lemma 2. Let ǫ = (ǫ1 , . . . , ǫn ) be conditionally independent random variables given {Xi }ni=1 , with conditional mean zero, satisfying Bernstein’s moment condition with parameter η > 0. A countable class G and complexities L(g) satisfying X e−L(g) ≤ 1 g∈G are given. Assume a bound K, such that |g(x)| ≤ K for all g in G. Then ) ( n n γ 1 X 2 1X ǫi g(Xi ) − L(g) − g (Xi ) ≤ 0. E sup n n An g∈G i=1 i=1 where A is an arbitrary constant and γ = Aσ 2 /2 + Kh. imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 24 Proof. Using the identity x = λ log(x/λ) with λ = γ/n, conditioning on X, and applying Jensen’s inequality to move Eǫ inside the logarithm, we have that ( n ) n 1X γ 1 X 2 Eǫ|X sup ǫi g(Xi ) − L(g) − g (Xi ) n n An g∈G i=1 i=1 ( n ) n 1X γ 1 X 2 ≤ log Eǫ|X sup exp ǫi g(Xi ) − L(g) − g (Xi ) . n γ γA g∈G i=1 i=1 Replacing the supremum with the sum and using the linearity of expectation, the above expression is not more than ( n ) n X 1X γ 1 X 2 ǫi g(Xi ) − L(g) − g (Xi ) log Eǫ|X exp n γ γA i=1 i=1 g∈G ( n ) ) ( n X 1X γ 1 X 2 = log exp −L(g) − g (Xi ) Eǫ|X exp ǫi g(Xi ) . n γA γ i=1 g∈G i=1 Next, note that by the independence of ǫ1 , . . . , ǫn conditional on X, ( n )   n Y 1X 1 Eǫi |Xi exp ǫi g(Xi ) = ǫi g(Xi ) . Eǫ|X exp γ γ i=1 i=1 o o n 2 2 g (Xi ) . By Lemma 7, each Eǫi |Xi exp γ1 ǫi g(Xi ) is not more than exp 2γσ2 (1−ηK/γ) Whence ( n )  2 Pn  2 σ 1X i=1 g (Xi ) Eǫ|X exp ǫi g(Xi ) ≤ exp γ 2γ 2 (1 − ηK/γ) i=1 ) ( n 1 X 2 g (Xi ) , = exp γA n i=1 where the last line followsPfrom the definition of γ. The proof is finished after observing that nγ log g∈G e−L(g) ≤ 0. P Lemma 3. For f = Ph βh h and f0 in F, there is a choice of h1 , . . . , hm in H with fm = (v/m) m k=1 hk , v ≥ vf such that kfm − f0 k2 − kf0 − f k2 ≤ vvf . m Moreover, the same bound holds for any convex combination of kfm − f0 k2 − kf0 − f k2 and ρ2 (fm , f ), where ρ is a possibly different Hilbert space norm. imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 25 Proof. Let H be a random variable that equals hv with probability βh /v and zero with probability 1 − vf /v. Let H1 , . . . ,P Hm be a random sample m 1 from the distribution defining H. Then H = m j=1 Hj has mean f and 2 2 furthermore the mean of kfm − f0 k − kf0 − f k is the mean is kf − Hk2 . This quantity is seen to be bounded by vvf /m. As a consequence of the bound holding P on average, there exists a2 realization 2of fm of H (having form (v/m) m k=1 hk ) such that kfm − f0 k − kf0 − f k is also bounded by V vf /m. The next lemma is an extension of a technique used in [19] to improve the L2 error of an m-term approximation of a function in L1,H . The idea is essentially stratified sampling with proportional allocation used in survey sampling as a means of variance reduction. In the following, we use the notation k · k to denote a generic Hilbert space norm. Lemma 4. Let H̃ be an L2 ǫ1 -net of H with cardinality M1 . For f = P and f0 in F, there is a choice of h1 , . . . , hm in H with fm = h βh hP (1/m0 ) m k=1 bk hk , m ≤ m0 + M1 and kbk1 ≥ vf such that kf0 − fm k2 − kf0 − f k2 ≤ vvf ǫ21 . m0 Moreover, there is an equally weighted linear combination fm = (v/m0 ) v ≥ vf , m ≤ m0 + M1 such that kf0 − fm k2 − kf0 − f k2 ≤ Pm k=1 hk , v 2 ǫ21 (1 + M1 /m0 ) v 2 M1 + . m0 4m20 The same bound holds for any convex combination of kfm − f0 k2 − kf0 − f k2 and ρ2 (fm , f ), where ρ is a possibly different Hilbert space norm. Proof. Suppose the elements of H̃ are h̃1 , . . . , h̃M1 . Consider the M1 sets H̃j = {h ∈ H : kh − h̃j k2 ≤ ǫ21 }, S j = 1, . . . , M1 . By working instead with disjoint sets H̃j \ 1≤i≤j−1 H̃i (H̃0 = ∅) that are contained in H̃j and whose union is H, we may assume that the P H̃j form a partition of H. Let M = m0 + M1 and vj = h∈H̃j βh . To obtain the first conclusion, define a random variable Hj to equal hvj with probability βh /vj for all h ∈ H̃j . let H1,j , . . . , Hnj ,j be a random sample imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 26 m l vj M , where V = vM of size Nj = V m0 and v ≥ vf , from the distribution P defining Hj . Note that the Nj sum to at most M . Define gj = h∈H̃j βh h P 1 1 P Nj and f = M j=1 Nj k=1 Hk,j . Note that the mean of f is f . This means the expectation kf0 − f k2 − kf0 − f k2 is the expectation of kf − f k2 , which is PMof 1 equal to j=1 EkHj − gj k2 /Nj . Now EkHj − gj k2 /Nj is further bounded by (V /M ) X h∈H̃j βh inf kh − hj k2 ≤ (V /M ) hj X h∈H̃j βh kh − h̃j k2 ≤ vj vǫ21 . m0 The above fact was established by noting that the mean of a real-valued random variable minimizes its average squared distance from any point hj . Summing over 1 ≤ j ≤ M1 produces the claim. Since this bound Pholds on average, there exists a realization fm of f (having form (1/m0 ) m k=1 bk hk with kbk1 ≥ vf ) such that kf0 − fm k2 − kf0 − f k2 is also bounded by vvf ǫ21 m0 . For the second conclusion, we inj a similar fashion. Suppose nj is a m k l proceed vj M vj M and V with respective probabilities random variable that equals V v M chosen to make its average equal to jV . Furthermore, assume n1 , . . . , nM1 V V nj . Since Vj ≤ vj + M , the Vj sum to are independent. Define Vj = M at most V . Let Hj be a random variable that equals hvj with probability βh /vj for all h ∈ H̃j . For each j and conditional on nj , let H1,j , . . . , Hnj ,j be a random sample of size Nj = nj + I{nj = 0} from the distribution P defining Hj . Note that the Nj sum to at most M . Define gj = h∈H̃j βh h P 1 1 P Nj and f = M j=1 Nj k=1 Hk,j . Note that the conditional mean of H given PM 1 N1 , . . . , NM1 is g = j=1 (Vj /vj )gj and hence the mean of f is f . This 2 2 of kf −f k2 , means the expectation PM1of kf0 −fk −kf0 −f2k is the expectation 2 which is equal to j=1 EkHj − (Vj /vj )gj k /Nj + Ekf − gk by the law of total variance. Now EkHj − (Vj /vj )gj k2 /Nj is further bounded by (V /M )2 (nj /vj ) X h∈H̃j βh inf kh − hj k2 ≤ hj v 2 M ǫ21 . m20 The above fact was established by noting that the mean of a real-valued random variable minimizes its average squared distance from any point hj . Next, note that by the independence of the coordinates of v1 , . . . , vM1 and imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 27 the fact that Vj has mean vj , M1 M1 X X 2 2 (kgj k2 /vj2 )V(nj ). (vj /vj − 1)gj k = (V /M ) Ekf − gk = Ek 2 j=1 j=1 Finally, observe that kgj k2 ≤ vj2 and V(nj ) ≤ 1/4 (a random variable whose range is contained in an interval of length one has variance bounded by 2M 1 1/4). This shows that Ekf − gk2 ≤ v4m 2 . Since this bound holds on average, 0 P there exists a realization fm of f (having form (v/m0 ) m k=1 hk ) such that kf0 − fm k2 − kf0 − f k2 is also bounded by v2 ǫ21 (1+M1 /m0 ) m0 + v 2 M1 . 4m20 Lemma 5. Let y = {yi }ni=1 be a sequence of real numbers and let x = {xi }ni=1 and x′ = {x′i }ni=1 be sequences d-dimensional vectors. Let H̃1 be an 2 empirical L2 ǫ1 -net for H with cardinality M P1 and H̃2 be an empirical L ǫ2 -net for H with cardinality M2 . For P f = h βh h in F, there is a choice of h̃1 , . . . , h̃m in H̃2 with f˜m = (v/m0 ) m k=1 h̃k , v ≥ vf , and m ≤ m0 + M1 , such that n n 1X 1X (yi − T f˜m (xi ))2 − (yi − f (xi ))2 + n n i=1 i=1 1 n n X i=1 (T f˜m (x′i ))2 − T f (x′i ))2 ≤ 2v 2 ǫ21 (1 + M1 /m0 ) v 2 M1 + m0 2m20 + 8Bn v (1 + M1 /m0 ) ǫ2 Tn + . n If F̃ denotes the collection of functions of the form f˜m , then F̃ has cardi1 +m0 . nality at most M2M+M 1 +m0 P 0 Moreover, there is a choice of h̃1 , . . . , h̃m0 in H̃2 with f˜m0 = (v/m0 ) m k=1 h̃k , imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 28 v ≥ vf such that n n 1X 1X (yi − T f˜m0 (xi ))2 − (yi − f (xi ))2 + n n i=1 i=1 1 n n X i=1 (T f˜m0 (x′i ) − T f (x′i ))2 ≤ (6.2) 2vvf Tn . + 8Bn vǫ2 + m0 n and n n i=1 i=1 1X ˜ 1X ˜ (fm0 (xi ) − f (xi ))2 + (fm0 (x′i ) − f (x′i ))2 n n ≤ (6.3) 4vvf + 4v 2 ǫ22 . m0 If F̃ denotes the collection of functions of the form f˜m0 , then F̃ has cardiM2 +m0  nality at most . m0 Proof. We only prove the first claim of the lemma. Inequalities (6.2) P and (6.3) follow from similar arguments and Lemma 3. Let fm = (v/m0 ) m k=1 hk be as in the second part of Lemma 4. Since H̃2 is an empirical L2 ǫ2 -net for H, for each hk there is an h̃k in H̃2 such that n n i=1 i=1 1 X 1 X |hk (xi ) − h̃k (xi )|2 + |hk (x′i ) − h̃k (x′i )|2 ≤ ǫ22 . 2n 2n imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 29 P Let f˜m = (v/m0 ) m k=1 h̃k . By Lemma 8 (I) and (II), (y − T f˜m (x))2 − (y − f (x))2 = [(y − fm (x))2 − (y − f (x))2 ]+ [(y − T f˜m(x))2 − (y − T fm (x))2 ]+ [(y − T fm (x))2 − (y − fm (x))2 ] ≤ [(y − fm (x))2 − (y − f (x))2 ]+ 4Bn |fm (x) − f˜m (x)|+ 4Bn (|y| − Bn )I{|y| > Bn }+ 2(|y| − Bn )2 I{|y| > Bn } = [(y − fm (x))2 − (y − f (x))2 ]+ 4Bn |fm (x) − f˜m (x)|+ 2(|y|2 − Bn2 )I{|y| > Bn }. By Lemma 8 (III), (T f˜m (x′ ) − T f (x′ ))2 ≤ (f (x′ ) − fm (x′ ))2 + 4Bn |f˜m (x′ ) − fm (x′ )|. Thus we find that (y − T f˜m (x))2 − (y − f (x))2 + (T f˜m (x′ ) − T f (x′ ))2 is not greater than [(y − fm (x))2 − (y − f (x))2 ] + (f (x′ ) − fm (x′ ))2 + 4Bn [|fm (x) − f˜m (x)| + |f˜m (x′ ) − fm (x′ )|] + 2(|y|2 − B 2 )I{|y| > Bn } n By the second conclusion in Lemma 4, n n i=1 i=1 1X 1X (yi − fm (xi ))2 − (yi − f (xi ))2 + n n n 2v 2 ǫ21 (1 + M1 /m0 ) v 2 M1 1X (fm (x′i ) − f (x′i ))2 ≤ + . n m0 2m20 i=1 By the concavity of the square root function, n n i=1 i=1 1 X 1 X |hk (xi ) − h̃k (xi )| + |hk (x′i ) − h̃k (x′i )| 2n 2n is also no greater than ǫ2 . Using this, we have that n n i=1 i=1 1X 1X |fm (xi ) − f˜m (xi )| + |fm (x′i ) − f˜m (x′i )| ≤ 2v (1 + M1 /m0 ) ǫ2 . n n imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 30 The last conclusion about the cardinality of F̃ follows from Lemma 10. Lemma 6. Let xP = {xi }ni=1 , where each xi is a d-dimensional vector in Rd . 1 2 Define kxk∞ = n ni=1 kxi k2∞ . There is a subset H̃ of H with cardinality at  most 2d+m such that for each h(x) = φ(x · θ) with kθk1 ≤ Λ in H, there is m P h̃(x) = φ(x · θ̃) in H̃ such that n1 ni=1 |h(xi ) − h̃(xi )|2 ≤ Λkθk1 kxk2∞ /m. Proof. By the Lipschitz condition on φ, it is enough to prove the bound for 1 Pn |θ · xi − θ̃ · xi |2 . Let v be a random vector that equals ej sgn(θj )Λ with i=1 n probability |θj |/Λ, j = 1, 2, . . . , d and equals the zero vector with probability 1 − kθk1 /Λ. Let v1 , v2 , . . . , vm be a random sample from the distribution 1 Pm v defining v. Note that the average of θ = m j=1 j is θ and hence the 2 average of each |θ · xi − θ · xi | is the variance of v · xi divided by m. Taking the expectation of the desired quantity, we have n E n 1X 1X |θ · xi − θ · xi |2 = E|θ · xi − θ · xi |2 n n i=1 i=1 n 1 X E(v · xi )2 ≤ n m i=1 n 1 X kxi k2∞ Λkθk1 ≤ n m i=1 = Λkθk1 kxk2∞ /m. Since this bound holds on average, there must exist a realization θ̃ of θ for which the inequality is also satisfied. Consider the collection of all vectors of the form m X uj , (Λ/m) j=1 where uj is any of the 2d + 1 signed standard basis vectors including the zero vector. This collection has cardinality bounded by the number of nonnegative integer solutions q1 , q2 , . . . , q2d+1 to q1 + q2 + · · · + q2d+1 = m.  This number is 2d+m with its logarithm is bounded by m log(e(2d/m + 1)) m or 2m log(d + 1). An important aspect of the log cardinality of this empirical cover is that it is logarithmic (and not linear) in the dimension d. This imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 31 small dependence on d is what produces desirable risk bounds when d is significantly greater than the available sample size n. Lemma 7. Let Z have mean zero and variance σ 2 . Moreover, suppose Z satisfies Bernstein’s moment condition with parameter η > 0. Then  2 2  t σ /2 (6.4) E(etZ ) ≤ exp , |t| < 1/η. 1 − η|t| Lemma 8. Define T f = min{Bn , |f |}sgnf . Then (I) (y − T f )2 ≤ (y − f )2 + 2(|y| − Bn )2 I{|y| > Bn }, (II) (y − T f )2 ≤ (y − T f˜)2 + 4Bn |f − f˜| + 4Bn (|y| − Bn )I{|y| > Bn }, and (III) (T f˜ − T f )2 ≤ (f − f1 )2 + 4Bn |f1 − f˜|. Proof. (I) Since (y − T f )2 = (y − f )2 + 2(f − T f )(2y − f − T f ), the proof will be complete if we can show that (f − T f )(2y − f − T f ) ≤ (|y| − Bn )2 I{|y| > Bn }. Note that if |f | ≤ Bn , the left hand size of the above expression is zero. Thus we may assume that |f | > Bn , in which case f − T f = sgnf (|f | − Bn ). Thus (f − T f )(2y − f − T f ) = 2ysgnf (|f | − Bn ) − (|f | − Bn )(|f | + Bn ) ≤ 2|y|(|f | − Bn ) − (|f | − Bn )(|f | + Bn ). If |y| ≤ Bn , the above expression is less than −(|f | − Bn )2 ≤ 0. Otherwise, it is a quadratic in |f | that attains its global maximum at |f | = |y|. This yields a maximum value of (|y| − Bn )2 . (II) For the second claim, note that (y − T f )2 = (y − T f˜)2 + (T f˜ − T f )(2y − T f˜ − T f ). Hence, we are done if we can show that (T f˜ − T f )(2y − T f˜ − T f ) ≤ 4Bn |f − f˜| + 4Bn (|y| − Bn )I{|y| > Bn }. If |y| ≤ Bn , then (T f˜ − T f )(2y − T f˜ − T f ) ≤ 4Bn |T f˜ − T f | ≤ 4Bn |f˜ − f |. imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 32 If |y| > Bn , then (T f˜ − T f )(2y − T f˜ − T f ) ≤ 2|T f˜ − T f ||y| + 2Bn |T f˜ − T f | = 2|T f˜ − T f |(|y| − Bn ) + 4Bn |T f˜ − T f | ≤ 4Bn (|y| − Bn ) + 4Bn |f˜ − f |. (III) For the last claim, note that (T f˜ − T f )2 = (T f˜ − T f1 )2 + [2T f˜ − T f1 − T f ](T f1 − T f ) ≤ (T f˜ − T f1 )2 + 4Bn |T f1 − T f | ≤ (f˜ − f1 )2 + 4Bn |f1 − f | Lemma 9. Let Y = f ⋆ (X) + ǫ with |f ⋆ (X)| ≤ B. Suppose (I) Ee|ǫ|/ν < +∞ or (II) Ee|ǫ| 2 /ν < +∞ for some ν > 0. Then E[(Y 2 − Bn2 )I{|Y | > Bn }] is at most √ (I) (4ν 2 /n)Ee|ǫ|/ν provided Bn > 2(B + ν log n) or √ √ 2 (II) (2ν/n)Ee|ǫ| /ν provided Bn > 2(B + ν log n). Proof. Under assumption (I), p P(Y 2 − Bn2 > t) = P(|Y | > t + Bn2 ) p ≤ P(|ǫ| > t + Bn2 − B) √ √ ≤ P(|ǫ| > (1/ 2)( t + Bn ) − B) √ t 1 B√n 1 − ( −B) ≤ e− ν 2 e ν 2 Ee|ǫ|/ν . The last inequality follows from a simple application of Markov’s inequality after exponentiation. Integrating the previous expression from t = 0 to t = R ∞ −1√t +∞ ( 0 e ν 2 dt = 4ν 2 ) yields an upper bound on E[(Y 2 − Bn2 )I{|Y | > √ Bn }] that is at most (4ν 2 /n)Ee|ǫ|/ν provided Bn > 2(B + ν log n). Under assumption (II), P(Y 2 − Bn2 > t) = P(|Y |2 > t + Bn2 ) ≤ P(|ǫ|2 > (1/2)(t + Bn2 ) − B 2 ) t 2 1 Bn −B 2 ) 2 ≤ e− 2ν e− v ( Ee|ǫ| 2 /ν . imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 33 The last inequality follows from a simple application of Markov’s inequality after exponentiation. Integrating the previous expression from t = 0 to R∞ t t = +∞ ( 0 e− 2ν dt = 2ν) yields an upper bound on E[(Y 2 − Bn2 )I{|Y | > √ √ |ǫ|2 /ν provided B > 2(B + ν log n) ≥ B n pn }] that is at most (2ν/n)Ee 2(B 2 + ν log n). v Lemma 10. The number of functions having the form m  hk belong to a library of size M is at most M −1+m ≤ m logarithm bounded by m log(e(M/m + 1)). Pm k=1 hk , where M +m with its m Proof. Suppose the elements Pm in the library are indexed from 1 to M . Let qi be the number of terms in k=1 hk of type i. Hence the number of function of v Pm the form m k=1 hk is at most the number of non-negative integer solutions  q1 , q2 , . . . , qM to q1 + q2 + · · · + qM = m. This number is M −1+m with m its logarithm bounded by the minimum of m log(e((M − 1)/m + 1)) and m log M . Acknowledgements. The risk bound framework of this paper is selfcontained, yet borrows heavily from the unpublished manuscript [15] written with Cong Huang and Gerald Cheang, which was judged to be too long for the Annals of Statistics. We are very indebted to their contributions. The present paper with Jason Klusowski manages a compression of much of that work, corrected determination of improved exponents of the rate, and new improved rates for the high dimensional setting. The authors would also like to thank William D. Brinda for useful discussions. SUPPLEMENTARY MATERIAL Supplement A: Proof of an approximation result and justification of (4.1). (doi: COMPLETED BY THE TYPESETTER; .pdf). We prove that a function satisfying a certain spectral condition belongs to the closure of the linear span of ridge ramp functions. We also give a justification for the penalty divided by sample size as stated in (4.1). References. [1] Anthony, M. and Bartlett, P. L. (1999). Neural network learning: theoretical foundations. Cambridge University Press, Cambridge. MR1741038 imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 34 [2] Barron, A. R. (1993). Universal approximation bounds for superpositions of a sigmoidal function. IEEE Trans. Inform. Theory 39 930–945. MR1237720 [3] Barron, A. R. (1994). Approximation and estimation bounds for artificial neural networks. Machine Learning 14 115-133. [4] Barron, A., Birgé, L. and Massart, P. (1999). Risk bounds for model selection via penalization. Probab. Theory Related Fields 113 301–413. MR1679028 [5] Barron, A. R. and Klusowski, J. M. (2016). Training artificial neural nets by adaptive annealing. Preprint. [6] Barron, A. R., Huang, C., Li, J. and Luo, X. (2008a). The MDL principle, penalized likelihoods, and statistical risk. Workshop on Information Theory Methods in Science and Engineering, Tampere, Finland. [7] Barron, A. R., Huang, C., Li, J. and Luo, X. (2008b). The MDL principle, penalized likelihoods, and statistical risk. Festschrift in Honor of Jorma Rissanen on the Occasion of his 75th Birthday Tampere University Press, Tampere, Finland. Editor Ioan Tabus. [8] Barron, A. R., Cohen, A., Dahmen, W. and DeVore, R. A. (2008c). Approximation and learning by greedy algorithms. Ann. Statist. 36 64–94. MR2387964 [9] Bartlett, P. L. (1998). The sample complexity of pattern classification with neural networks: the size of the weights is more important than the size of the network. IEEE Trans. Inform. Theory 44 525–536. MR1607706 [10] Breiman, L. (1993). Hinging hyperplanes for regression, classification, and function approximation. IEEE Trans. Inform. Theory 39 999–1013. MR1237723 [11] Bunea, F., Tsybakov, A. B. and Wegkamp, M. H. (2007). Aggregation for Gaussian regression. Ann. Statist. 35 1674–1697. MR2351101 [12] Cheang, G. L. H. (1998). Neural network approximation and estimation of functions. Yale University, Department of Statistics PhD thesis. [13] Gammerman, A., Vovk, V. and Vapnik, V. (1998). Learning by transduction. Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence 148– 155. [14] Huang, C. (2008). Risk of penalized least squares, greedy selection and ℓ1 penalization for flexible function libraries. Yale University, Department of Statistics PhD thesis. [15] Huang, C., Cheang, G. L. and Barron, A. R. (2008). Risk of penalized least squares, greedy selection and ℓ1 penalization for flexible function libraries. Yale University, Department of Statistics technical report. http://www.stat.yale.edu/~ arb4/publications_files/RiskGreedySelectionAndL1penalization.pdf. [16] Jones, L. K. (1992). A simple lemma on greedy approximation in Hilbert space and convergence rates for projection pursuit regression and neural network training. Ann. Statist. 20 608–613. MR1150368 [17] Juditsky, A. and Nemirovski, A. (2000). Functional aggregation for nonparametric regression. Ann. Statist. 28 681–712. MR1792783 [18] Lee, W. S., Bartlett, P. L. and Williamson, R. C. (1996). Efficient agnostic learning of neural networks with bounded fan-in. IEEE Trans. Inform. Theory 42 2118–2132. MR1447518 [19] Makovoz, Y. (1996). Random approximants and neural networks. J. Approx. Theory 85 98–109. MR1382053 [20] Yang, Y. and Barron, A. (1999). Information-theoretic determination of minimax rates of convergence. Ann. Statist. 27 1564–1599. MR1742500 [21] Zhang, T. (2009). Some sharp performance bounds for least squares regression with imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 35 L1 regularization. Ann. Statist. 37 2109–2144. MR2543687 imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 Submitted to the Annals of Statistics arXiv: 1607.01434 SUPPLEMENT TO ”RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE FUNCTION COMBINATIONS INCLUDING NEURAL NETWORKS” By Jason M. Klusowski and Andrew R. Barron Yale University We prove that a function satisfying a certain spectral condition belongs to the closure of the linear span of ridge ramp functions. We also give a justification for the penalty divided by sample size as stated in (4.1). R Theorem. For an arbitrary target function f ⋆ (x) = Rd eix·ω f˜(ω)dω with R vf ⋆ ,2 = Rd kωk21 |f˜(ω)|dω finite, there exists a linear combination of ridge ramp functions with kak k = 1 and |bk | ≤ 1 such that kf ⋆ − fm k2 ≤ 16vf2 ⋆ ,2 m . Proof. If f ⋆ can be extended to a function on L2 (Rd ) with Fourier transform f˜, the function f ⋆ (x) − x · ∇f ⋆ (0) − f ⋆ (0) can be written as the real part of Z (eiω·x − iω · x − 1)f˜(ω)dω. (6.5) Rd If |z| ≤ c, we note the identity Z c [(z − u)+ eiu + (−z − u)+ e−iu ]du = eiz − iz − 1. − 0 If c = kωk1 , z = ω · x, α = α(ω) = ω/kωk1 , and u = kωk1 t, 0 ≤ t ≤ 1, we find that Z 1 2 −kωk1 [(α · x − t)+ eikωk1 t + (−α · x − t)+ e−ikωk1 t ]dt = 0 eiω·x − iω · x − 1. 36 imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS 37 Multiplying the above by f˜(ω) = eib(ω) |f˜(ω)|, integrating over Rd , and applying Fubini’s theorem yields Z Z 1 ⋆ ⋆ ⋆ g(t, ω)dtdω, f (x) − x · ∇f (0) − f (0) = Rd 0 where g(t, ω) = −[(α · x − t)+ cos(kωk1 t + b(ω))+ (−α · x − t)+ cos(kωk1 t − b(ω))]kωk21 |f˜(ω)|. Consider a density on {−1, 1} × [0, 1] × Rd defined by p(z, t, ω) = | cos(zkωk1 t + b(ω))|kωk21 |f˜(ω)|/v where Z Z 1 v= [| cos(kωk1 t+b(ω))|+| cos(kωk1 t−b(ω))|]kωk21 |f˜(ω)|dtdω ≤ 2vf ⋆ ,2 . Rd 0 Consider a random variable h(z, t, α)(x) that equals (zα · x − t)+ s(zt, ω), where s(t, ω) = −sgn cos(kωk1 t + b(ω)). Note that h(z, t, α)(x) has the form ±(α · x − t)+ . We see that v Z f ⋆ (x) − x · ∇f ⋆ (0) − f ⋆ (0) = {−1,1}×[0,1]×Rd h(z, t, α)(x)dp(z × t × ω). One can obtain the final result by sampling (z1 , t1 , ω1P ), . . . , (zm , tm , ωm ) ranm v domly from p(z, t, ω) and considering the average m k=1 h(zk , tk , ωk ). Note ⋆ that since x = (x)+ − (−x)+ , we can regard x · ∇f (0) as belonging to the linear span of {x 7→ z(α · x − t)+ : kαk1 = 1, 0 ≤ t ≤ 1, z ∈ {−1, 1}}. An easy argument shows that its variance is bounded by 16vf2 ⋆ ,2 /m. This simple argument can be extended to higher order expansions of f ⋆ . The function f ⋆ (x) − xT Hf ⋆ (0)x/2 − x · ∇f ⋆ (0) − f ⋆ (0) (Hf ⋆ (0) is the Hessian of f ⋆ at the point zero) can be written as the real part of Z (eiω·x + (ω · x)2 /2 − iω · x − 1)f˜(ω)dω. (6.6) Rd imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 38 As before, the integrand in (6.6) admits an integral representation by (i/2)kωk31 Z 1 0 [(−α · x − t)2+ e−ikωk1 t − (α · x − t)2+ eikωk1 t ]dt. Employing a sampling argument from an appropriately defined density, we are able to approximate f ⋆ (x) − xT Hf ⋆ (0)x/2 − x · ∇f ⋆ (0) by a linear combinations of m second order spline functions (having bounded internal parameters) (α · x − t)2+ with a squared error bounded by 16vf2 ⋆ ,3 /m. In the next part of the supplement, we justify the form of the penalty divided by sample size as stated in (4.1). For this, we first need a lemma. P Lemma. Let f = h βh h and let H̃ be an empirical L2 ǫ-net P of H of size M . There is a choice of h̃1 , . . . , h̃m in H̃ with f˜m = (v/m) m k=1 h̃k , v ≥ vf such that Pn (T f˜||f ⋆ ) − 2Pn (f ||f ⋆ ) + Dn′ (f˜, f ) ≤ Pn 4vvf + 6v 2 ǫ2 + 4σvǫ + Tn + Rn , m √ Pn 4 √3ησ 2 2 i=1 (ǫi −σ ) > 0}. Moreover, ERn ≤ n ˜ and if F̃ denotes the collection of functions of the form fm , then F̃ has +m cardinality at most Mm . where Rn = 1 n 1 2 2 i=1 (ǫi −σ )I{ n Pm ˜ ˜ Proof. Let f = (v/m) m k=1 hk be as in Lemma 3 and f = fm = Pm (v/m) k=1 h̃k be as in Lemma 5. Furthermore, define q τn = min{1, Dn (f˜m , fm )/σ 2 }. By Lemma 8 (I), Pn (T f˜m ||f ⋆ ) ≤ Pn (f˜m ||f ⋆ ) + Tn , and hence Pn (T f˜m ||f ⋆ ) − (1 + τn )Pn (f ||f ⋆ ) ≤ Pn (f˜m ||f ⋆ ) − (1 + τn )Pn (f ||f ⋆ ) + Tn . Also observe that Pn (f˜m ||f ⋆ ) − (1 + τn )Pn (f ||f ⋆ ) = [Pn (f˜m ||f ⋆ ) − (1 + τn )Pn (fm ||f ⋆ )]+ (1 + τn )[Pn (fm ||f ⋆ ) − Pn (f ||f ⋆ )], imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS and 39 Dn′ (f˜m , f ) ≤ 2Dn′ (f˜m , fm ) + 2Dn′ (f, fm ). By Lemma 3, Pn (fm ||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (f˜, f ) ≤ Using the inequality a2 − (1 + τ )b2 ≤ 1+τ τ (a 2vvf . m − b)2 , we have 1 + τn Dn (f˜m , fm ) + τn ǫ2n Pn (f˜m ||f ⋆ ) − (1 + τn )Pn (fm ||f ⋆ ) ≤ τn 1 + τn ≤ Dn (f˜m , fm ) + τn σ 2 + Rn τn q ≤ 3Dn (f˜m , fm ) + 2σ Dn (f˜m , fm ) + Rn , P where the last inequality follows from the definition of τn and ǫ2n = n1 ni=1 ǫ2i . The first conclusion is proved after observing that Dn (f˜m , fm ) ≤ 2v 2 ǫ2 . The statement about the cardinality of F̃ follows immediately from the form of f˜ and Lemma 10. We are also able to comment on how Rn behaves on average. To see this, note that Rn ≤ s + Rn I{Rn > s} for all s > 0. Now, Rn I{Rn > s} = 1 Pn 1 Pn 2 2 2 2 i=1 (ǫi − σ )I{ n i=1 (ǫi − σ ) > s}. By Chebychev’s inequality and the n 2 2 fact that V(ǫ) ≤ σ and V(ǫ ) ≤ 12η 2 σ 2 (as per the Bernstein moment P V(ǫ2 ) condition on the noise), P( n1 ni=1 (ǫ2i − σ 2 ) > s + t) ≤ n(t+s) 2 . Integrating this inequality from t = 0 to t = +∞ yields Rn I{Rn > s} ≤ √ √ p 2 V(ǫ2 ) 2 . s = V(ǫ )/n produces ERn ≤ √n ≤ 4 √3ησ n V(ǫ2 ) ns . Choosing By the above lemma and similar arguments leading to the conclusion of Theorem 3, we see that a valid penalty divided by sample size is at least 4vvf γn m log M + + 6v 2 ǫ2 + 2σvǫ + Tn + Rn n m 2 ⌉ By Lemma 6, an empirical L2 ǫ-cover of H has cardinality less than 2d+⌈(Λ/ǫ) . ⌈(Λ/ǫ)2 ⌉ 2d+⌈(Λ/ǫ)2 ⌉ 2 The logarithm of ⌈(Λ/ǫ)2 ⌉ is bounded by 4(Λ/ǫ) log(d + 1). Thus we see that a valid penalty divided by sample size is at least (6.7) 4γn m(Λ/ǫ)2 log(d + 1) 4vvf + + 6v 2 ǫ2 + 4σvǫ + Tn + Rn n m imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016 40 1/2  nvvf ǫ2 . Plugging this back into Choose m to be the ceiling of γn Γ2 log(d+1) (6.7), we find that a valid penalty divided by sample size is at least 8  vvf γn Λ2 log(d + 1) nǫ2 1/2 + 4γn Λ2 log(d + 1) + 6v 2 ǫ2 + 4σvǫ + Tn + Rn . nǫ2 Choose v = vf and ǫ=  1 v2 n γn Λ2 log(d+1) 1/6 +  σ2 n γn Λ2 log(d+1) 1/4 . With this choice of ǫ, a valid penalty divided by sample size is seen to be at least a modest constant multiple of vf4 Λ2 γn log(d + 1) n !1/3 + √ σ σ !2/3 vf4 Λ2 γn log(d + 1) n !1/4 + 2/3 Λ2 γn log(d + 1) + + n !3/4 Λ4/3 γn log(d + 1) + Tn + Rn . n vf2 Λ2 γn log(d + 1) n √  2 Thus when Λ γn log(d+1) is small, we see that the penalty divided by sample n size has the form (4.1) plus negligible terms that do not depend on the candidate fit. Yale University Department of Statistics 24 Hillhouse Avenue New Haven, Connecticut E-mail: [email protected] [email protected] imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
10math.ST
Федеральное государственное автономное образовательное учреждение высшего профессионального образования «СИБИРСКИЙ ФЕДЕРАЛЬНЫЙ УНИВЕРСИТЕТ» arXiv:1601.07224v1 [cs.AI] 26 Jan 2016 Институт математики и фундаментальной информатики Базовая кафедра математического моделирования и процессов управления БАКАЛАВРСКАЯ РАБОТА Направление 010101.62 Математика ПОРОЖДАЮЩЕЕ ВЕРОЯТНОСТНОЕ ПРОГРАММИРОВАНИЕ Выпускник – Юрий Перов1. Научный руководитель в СФУ – Татьяна Валерьевна Крупкина. Кембридж-Оксфорд-Красноярск 2012–2014 1 Адрес для корреспонденции: [email protected] РЕФЕРАТ Выпускная квалификационная бакалаврская работа по теме «Порождающее вероятностное программирование» содержит 48 страниц текста, 50 использованных источников, 12 рисунков. Ключевые слова: ВЕРОЯТНОСТНОЕ ПРОГРАММИРОВАНИЕ, МАШИННОЕ ОБУЧЕНИЕ, ИСКУССТВЕННЫЙ ИНТЕЛЛЕКТ, ВЕРОЯТНОСТНЫЕ МОДЕЛИ, АВТОМАТИЧЕСКОЕ МОДЕЛИРОВАНИЕ. Работа посвящена новому направлению в области машинного обучения и компьютерных наук — вероятностному программированию. В работе дается краткое реферативное введение в языки вероятностного программирования Church/Venture/Anglican, а также описываются результаты первых экспериментов по автоматической генерации вероятностных программ. СОДЕРЖАНИЕ Введение 4 1 Краткое введение в языки вероятностного программирования Church, Venture и Anglican 8 1.1 Первое знакомство с Church, Venture, Anglican . . . . . . . . . . . . . . . . . 8 1.2 Статистический вывод в вероятностных языках программирования с помощью алгоритма Метрополиса-Гастингса . . . . . . . . . . . . . . . . . . . . . 11 1.2.1 Метод «выборки с отклонением» . . . . . . . . . . . . . . . . . . . . . 11 1.2.2 Пространство историй выполнений вероятностных программ . . . . . 12 1.2.3 Апостериорное распределение историй выполнений программ . . . . . 14 1.2.4 Использование методов Монте-Карло по схеме Марковских цепей . . 15 1.2.5 Программная реализация статистического вывода . . . . . . . . . . . 19 1.3 Эффективность вывода . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 1.4 Порождающее вероятностное программирование в распознавании образов . 24 1.5 О различиях между Church, Venture, Anglican . . . . . . . . . . . . . . . . . . 26 2 Автоматическая генерация вероятностных программ 27 2.1 Обзор литературы . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.2 Описание подхода . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.3 Грамматика и порождающие правила . . . . . . . . . . . . . . . . . . . . . . . 33 2.4 Вероятности использования порождающих правил . . . . . . . . . . . . . . . 35 2.5 Эксперименты . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 2.5.1 Выборки из сгенерированных вероятностных программ . . . . . . . . 36 2.5.2 Вывод вероятностных программ, определяющих распределения, совпадающие или приближающие классические одномерные распределения . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 2 2.5.3 Обобщение произвольных эмпирических данных с помощью порождающего вероятностного программирования . . . . . . . . . . . . . . . 37 2.5.4 2.6 «Компиляция» вероятностных программ . . . . . . . . . . . . . . . . . 39 Обобщение порождающего вероятностного программирования . . . . . . . . 41 Заключение 44 Список использованных источников 45 3 Моей любимой Маше и всем другим моим любимым родным ВВЕДЕНИЕ Данная бакалаврская работа посвящена вероятностному программированию [1], новому направлению в областях машинного обучения, искусственного интеллекта и компьютерных наук, а именно реферативному краткому введению в вероятностное программирование, описанию языков вероятностного программирования Church [2], Venture [3] и Anglican [4], описанию подхода порождающего вероятностного программирования для решения задач распознавания образов [5], а также представлению полученных предварительных результатов по автоматизации вывода вероятностных моделей для вероятностного программирования [6]. Описание структуры работы Первая часть данной работы начинается с общих сведений о вероятностном программировании, а затем в ней кратко описываются результаты, полученные коллегами автора и им самим в работе над научными проектами на протяжении двух лет в Массачусетском технологическом инситуте под руководством профессора Джошуа Тененбаума и доктора Викаша Мансингхи (Кембридж, штат Массачусетс, США) и Оксфордском университете под руководством профессора Френка Вуда (Великобритания, Оксфорд). Эта часть работы, являясь по сути переводом, представляет собой реферативную выдержку о вероятностном программировании и его приложениях на русском языке. Насколько автору известно, литературы о вероятностном программировании на русском языке практически нет, поэтому он надеется, что данная чисто реферативная часть работы принесет существенную пользу русскоговорящему научному сообществу, а особенно заинтересованным студентам и школьникам, которые впервые захотят познакомиться с развивающимся направлением вероятностного программирования. Во второй части данной работы автор описывает новые результаты в области вероятностного программирования, связанные с автоматизированным или полуавтоматизированным выводом вероятностных моделей для вероятностного программирования, полученные во время стажировки автора в Департаменте технических наук Оксфордского 4 университета в научной лаборатории профессора Френка Вуда и под его руководством. Вторая часть завершается рассуждениями автора об обобщении автоматизированного изучения и вывода компьютером вероятностных моделей в виде вероятностных программ, то есть о возможностях порождающего вероятностного программирования. Вероятностное программирование Вероятностное программирование можно определить как компактный, композиционный способ представления порождающих вероятностных моделей и проведения статистического вывода в них с учетом данных с помощью обобщенных алгоритмов. Вероятностная модель является важным понятием машинного обучения, одного из основных направлений искусственного интеллекта на сегодняшний день. В общем случае в рамках теории машинного обучения перед компьютером ставится задача произвести какое-то действие yi на основе входных данных xi , априорных знаний и возможности взаимодействовать со средой. Без ограничений общности целевым действием для компьютера можно считать производство ответа в виде выходных данных, представленных в виде информации. Например, в робототехнике эта информация может являться инструкциями для моторов и механических устройств для выполнения тех или иных физических действий роботом. При использовании различных подходов в рамках машинного обучения используются модели, которые являются формальным «описанием компонентов и функций, отображающих существенные свойства моделируемого объема или процесса» [7]. В рамках машинного обучения используются вероятностные модели, так как свойства, элементы и связи между ними являются не фиксированными, а стохастическими. Классическим примером одного из подходов в машинном обучении является способ «обучение с учителем», когда существует N прецедентов, то есть пар входных и выходных данных обучающей выборки X = {xi }, Y = {yi }, i = 1, N , и необходимо найти алгоритм описывающий зависимость между xi и yi , то есть алгоритм F , который позволяет на основе каждого элемента входных данных xi получать абсолютно или достаточно точный элемент выходных данных yi , то есть F (xi ) → yi . С помощью данного алгоритма затем для M известных элементов входных данных {xi }, j = N + 1, N + M находятся значения M неизвестных элементов выходных данных {yi }, j = N + 1, N + M . В рамках машинного обучения эта проблема, в том числе, решается с помощью методов регрессионного 5 анализа. В только что приведенной как пример модели неизвестными (скрытыми) параметрами T = {tj }, j = 1, K будет информация о характеристиках модели F , которые подлежат выводу при данной обучающей выборке в виде пар (xi , yi ). Приведем простой пример: в линейной регрессии (при L независимых переменных) значениями независимых переменных будут xi,j , значениями зависимой переменной будут yi , параметрами модели будут t1 , t2 , . . . , tL+1 , а алгоритмом F будет yi = Ft1 ,...,tL+1 (xi ) = t1 + t2 · xi,1 + . . . + tL+1 · xi,L . Для простоты без ограничений общности будем считать, что мы можем всегда получить yi детерминированно, зная T и xi . В порождающих вероятностных моделях задается совместное распределение вероятностей P (T, X), обычно сначала путем задания априорного распределения P (T ), а затем задания условного распределения P (X | T ). Это и называется моделью. При заданной модели и известных X задачей будет являться поиск апостериорного распределения на T , таким образом P (T | X). Одним из способов поиска данного апостериорного распределения является применение теоремы Байеса: P (T | X) = где P (X) теоретически можно найти как R P (T )P (X | T ) , P (X) P (T )P (X | T ) dT , но при решении практиче- ских задач это часто невозможно, так как перебор всего пространства T не поддается аналитическому решению или решению с помощью численных методов за разумное время. Поэтому чаще всего при решении задач в рамках Байесовского подхода стоит задача поиска ненормированного значения P (T | X): P (T | X) ∝ P (T )P (X | T ), где символ ∝, часто встречающийся в зарубежной литературе, но очень редко встречающийся у нас, означает «пропорционально». Нормировочную константу затем можно найти приближенно, но иногда ее значение даже не вычисляют, так как бывает достаточно найти и работать дальше с наиболее вероятными элементами T̂ из апостериорного распределения 6 P (T | X). Обычно, особенно при решении практических задач с большим объемом данных и в рамках сложных моделей, апостериорное распределение P (T | X) находят не точно, а с помощью приближенных методов, в том числе с помощью методов Монте-Карло [8], которые позволяют сгенерировать выборку из интересующего нас распределения. Как отмечалось в самом начале данного подраздела, вероятностное программирование позволяет: 1. Композиционно и компактно записывать порождающую вероятностную модель с помощью задания априорных вероятностей P (T ) и P (X | T ) в виде алгоритма (вероятностной программы) с использованием стохастических функций (например, стохастическая функция Normal(µ, σ)) и вспомогательных детерминированных функций (например, + или ∗). 2. Снабжать модель данными X̂, таким образом теоретически определяя условное распределение P (T | X̂). 3. Производить статистический вывод для генерации выборки из условного распределения с помощью обобщенных алгоритмов статистического вывода, подходящих для всех или большого множества моделей. Для ознакомления с машинным обучением и искусственным интеллектом автор рекомендует следующие источники: [9, 10, 11]. Информацию о вероятностных моделях и Байесовских методах на русском языке можно найти в [12]. 7 1 Краткое введение в языки вероятностного программирования Church, Venture и Anglican Существует более 15 языков вероятностного программирования, перечень с кратким описанием каждого из них можно найти на [13]. В данной работе реферативно будут рассмотрены три языка вероятностного программирования: Church [2], Venture [3] и Anglican [4]. Языки Venture и Anglican являются продолжениями языка Church. Church в свою очередь основан на языке «обычного» программирования Lisp и Scheme. Заинтересованному читателю крайне рекомендуется ознакомиться с книгой [14], являющейся одним из лучших способов начать знакомство с языком «обычного» программирования Scheme. 1.1 Первое знакомство с Church, Venture, Anglican На текущий момент любой язык вероятностного программирования напрямую связан с методами статистического вывода, которые используются в нем, поэтому часто язык ассоциируется с платформой вероятностного программирования, то есть с его технической реализацией в виде компьютерной программы. Рассмотрим задание простой вероятностной модели Байесовской линейной регрессии [10] на языке вероятностного программирования Venture/Anglican [15] в виде вероятностной программы: 1 [ASSUME t 1 ( normal 0 1 ) ] 2 [ASSUME t 2 ( normal 0 1 ) ] 3 [ASSUME n o i s e 0 . 0 1 ] 4 [ASSUME noisy_x ( lambda ( time ) ( normal (+ t 1 (∗ t 2 time ) ) n o i s e ) ) ] 5 [OBSERVE ( noisy_x 1 . 0 ) 1 0 . 3 ] 6 [OBSERVE ( noisy_x 2 . 0 ) 1 1 . 1 ] 7 [OBSERVE ( noisy_x 3 . 0 ) 1 1 . 9 ] 8 [ PREDICT t 1 ] 9 [ PREDICT t 2 ] 10 [ PREDICT ( noisy_x 4 . 0 ) ] Скрытые искомые параметры — значения коэффициентов t1 и t2 линейной функции x (time) = t1 + t2 · time. У нас есть априорные предположения о данных коэффициентах, 8 а именно мы предполагаем, что они распределены по закону нормального распределения Normal(0, 1) со средним 0 и стандартным отклонением 1. Таким образом, мы определили в первых двух строках вероятностной программы вероятность P (T ), описанную в предыдущем раздел. Инструкцию [ASSUME name expression] можно рассматривать как определение случайной величины с именем name, принимающей значение вычисляемого выражение (программного кода) expression, которое содержит в себе неопределенность. Вероятностные языки программирования (здесь и далее будут иметься в виду конкретно Church, Venture, Anglican, если не указано иное), как и Lisp/Scheme, являются функциональными языками программирования, и используют польскую нотацию1 при записи выражений для вычисления. Это означает, что в выражении вызова функции сначала располагается оператор, а уже только потом аргументы: (+ 1 2), и вызов функции обрамляется круглыми скобками. На других языках программирования, таких как C++ или Python, это будет эквивалентно коду 1 + 2. В вероятностных языках программирования выражение вызова функции принято разделять на три разных вида: 1. Вызов детерминированных процедур (primitive-procedure arg1 ...argN), которые при одних и тех же аргументах всегда возвращают одно и то же значение. К таким процедурам, например, относятся арифметические операции. 2. Вызов вероятностных (стохастических) процедур (stochastic-procedure arg1 ...argN), которые при каждом вызове генерируют случайным образом элемент из соответствующего распределения. Такой вызов определяет новую случайную величину. Например, вызов вероятностной процедуры (normal 1 10) определяет случайную величину, распределенную по закону нормального распределения √ Normal(1, 10), и результатом выполнения каждый раз будет какое-то вещественное число. 3. Вызов составных процедур (compound-procedure arg1 ...argN), где compound-procedure — введенная пользователем процедура с помощью специального выражения lambda: (lambda (arg1 ...argN) body), где body — тело процедуры, состоящее из выражений. В общем случае составная процедура является стохастической (недетерминированной) составной процедурой, так как 1 Venture имеет отдельный дополнительный вид синтаксиса VentureScript, использующий инфиксную нотацию и не требующий обрамления вызова функций скобками, то есть схожий по своей сути с привычными большинству людей языками программирования C, C++, Python и т.д. 9 ее тело может содержать вызовы вероятностных процедур. После этого мы хотим задать условную вероятность P (X | T ) наблюдаемых переменных x1 , x2 , x3 при заданных значениях скрытых переменных t1 , t2 и параметра time. Перед вводом непосредственно самих наблюдений с помощью выражения [OBSERVE ...] мы определяем общий закон для наблюдаемых переменных {xi } в рамках нашей модели, а именно мы предполагаем, что данные наблюдаемые случайные величины при заданных t1 , t2 и заданном уровне шума noise распределены по закону нормального рас√ пределения Normal(t1 +t2 ·time, noise) со средним t1 +t2 ·time и стандартным отклонением noise. Данная условная вероятность определена на строках 3 и 4 данной вероятностной программы. noisy_x определена как функция, принимающая параметр time и возвращающая случайное значение, определенное с помощью вычисления выражение (normal (+ t1 (* t2 time)) noise) и обусловленное значениями случайных величин t1 и t2 и переменной noise. Отметим, что выражение (normal (+ t1 (* t2 time)) noise) содержит в себе неопределенность, поэтому каждый раз при его вычислении мы будем получать в общем случае разное значение. На строках 5—7 мы непосредственно вводим известные значения xˆ1 = 10.3, xˆ2 = 11.1, xˆ3 = 11.9. Инструкция вида [OBSERVE expression value] фиксирует наблюдение о том, что случайная величина, принимающая значение согласно выполнению выражения expression, приняла значение value. Повторим на данном этапе всё, что мы сделали. На строках 1—4 с помощью инструкций вида [ASSUME ...] мы задали непосредственно саму вероятностную модель: P (T ) и P (X | T ). На строках 5—7 мы непосредственно задали известные нам значения наблюдаемых случайных величин X с помощью инструкций вида [OBSERVE ...]. На строках 8—9 мы запрашиваем у системы вероятностного программирования апостериорное распределение P (T | X) скрытых случайных величин t1 и t2 . Как уже было сказано, при большом объеме данных и достаточно сложных моделях получить точное аналитическое представление невозможно, поэтому инструкции вида [PREDICT ...] генерируют выборку значений случайных величин из апостериорного распределения P (T | X) или его приближения. Инструкция вида [PREDICT expression] в общем случае генерирует один элемент выборки из значений случайной величины, принимающей значение 10 согласно выполнению выражения expression. Если перед инструкциями вида [PREDICT ...] расположены инструкции вида [OBSERVE ...], то выборка будет из апостериорного распределения2 , обусловленного перечисленными ранее введенными наблюдениями. Отметим, что в завершении мы можем также предсказать значение функции x(time) в другой точке, например, при time = 4.0. Под предсказанием в данном случае понимается генерация выборки из апостериорного распределения новой случайной величины при значениях скрытых случайных величин t1 , t2 и параметре time = 4.0. Для генерации выборки из апостериорного распределения P (T | X) в языке программирования Church в качестве основного используется алгоритм МетрополисаГастингса, который относится к методам Монте-Карло по схеме Марковских цепей. В следующем подразделе будет произведено подробное описание применения данного алгоритма для обобщенного статистического вывода в вероятностных языках. Под «обобщенным» выводом в данном случае понимается то, что алгоритм может быть применен к любым вероятностным программам, написанным на данном вероятностном языке программирования. 1.2 Статистический вывод в вероятностных языках программирования с помощью алгоритма Метрополиса-Гастингса Описание алгоритма Метрополиса-Гастингса в применении к «семейству» вероятностных языков Church впервые опубликовано в [2] и более подробно описано в [16]. Получить выборку из N элементов из априорного распределения скрытых параметров P (T ), наблюдаемых величин P (X | T ) или их совместного распределение P (T, X) какой-либо порождающей вероятностной модели, записанной в виде вероятностной программы, не составляет труда. Для этого достаточно выполнить вероятностную программу N раз. Отметим очевидный факт, что в данном случае вероятностная программа будет содержать лишь инструкции вида [ASSUME ...] (задание вероятностной модели) и [PREDICT ...] (перечисление случайных величин, выборку которых мы генерируем). 1.2.1 Метод «выборки с отклонением» При заданных наблюдениях с помощью инструкций вида [OBSERVE expression value] наиболее простым способом получения апостериорного распределения является метод 2 Говоря точнее, конечно, из приближения апостериорного распределения. 11 «выборки с отклонением» [17]. Для понимания рассмотрим следующую вероятностную программу: 1 [ASSUME a ( uniform−d i s c r e t e 1 6 ) ] 2 [ASSUME b ( uniform−d i s c r e t e 1 6 ) ] 3 [OBSERVE (+ a b ) 5 ] 4 [ PREDICT (∗ a b ) ] Отметим, что стохастическая процедура (uniform-continuous a b) возвращает значение случайной величины, распределенной по равномерному дискретному закону распределения с носителем {a, . . . , b}. Текстом задачу, записанную выше с помощью вероятностной программы, можно сформулировать следующим образом: подбрасываются два шестигранных игральных кубика, в сумме выпало 5; каково распределение произведения очков на этих двух кубиках? Метод «выборки с отклонением» заключается в том, чтобы генерировать значения очков на первом и втором кубиках из их априорного распределения (таким образом, два независимых дискретных равномерных распределения) и проверять, равна ли их сумма 5. Если нет, данная попытка отвергается и не учитывается. Если да, то произведение очков на кубиках добавляется во множество элементов выборки. Данная выборка и будет аппроксимацией апостериорного распределения значений произведения очков на двух кубиках, если известно, что сумма очков равна 5. Данный метод является неэффективным, и при решении более сложных задач просто вычислительно неосуществимым. Также отметим, что он хорошо подходит только для дискретных значений случайных и промежуточных переменных. 1.2.2 Пространство историй выполнений вероятностных программ При выполнении вероятностной программы каждая случайная величина принимает определенное значение. Например, следующая вероятностная программа содержит три случайных величины, каждая из которых распределена по закону нормального распределения: 1 [ASSUME a ( normal 0 1 ) ] 2 [ASSUME b ( normal 0 1 ) ] 12 3 [ASSUME c ( normal (+ a b ) 1 ) ] 4 [ PREDICT c ] При выполнении данной вероятностной программы каждая из трех случайных величин примет свое случайное значение. Назовем историей выполнения вероятностной программы отображение, сопоставляющее каждой случайной величине ее значение. Мощность истории выполнения совпадает с количеством случайных величин, которые были созданы при ее выполнении. Для каждой программы можно определить соответствующее вероятностное пространство, элементарными событиями которого будут являться все истории ее выполнения. Вероятностью каждого элементарного события будет являться произведение вероятностей принятие того или иного значения каждой случайные величины при данной истории выполнения. Очевидно, что история выполнения однозначным образом определяет выполнение вероятностной программы и принимаемые значения, как случайных, так и зависящих от них детерминированных выражений. Для примера рассмотрим еще более простую вероятностную программу. 1 [ASSUME a ( b e r n o u l l i 0 . 7 ) ] 2 [ASSUME b ( b e r n o u l l i 0 . 7 ) ] 3 [ PREDICT a ] 4 [ PREDICT b ] В ней обе случайных величины имеют свое название, что облегчает запись историй выполнений (иначе необходимо вводить адресную схему для наименования случайных величин, чтобы однозначно идентифицировать их). Данная вероятностная программа имеет четыре различных возможных историй выполнений, а именно {a : 0, b : 0}, {a : 0, b : 1}, {a : 1, b : 0} и {a : 1, b : 1} с вероятностями 0.09, 0.21, 0.21 и 0.49 соответственно. Отметим также, что количество «активных» случайных величин при выполнении одной и той же вероятностной программы может меняться, как, например, в следующей программе: [ASSUME g e o m e t r i c 13 ( lambda ( p ) ( i f (= ( b e r n o u l l i p ) 1 ) 0 (+ ( g e o m e t r i c p ) 1 ) ) ) ] [ PREDICT ( g e o m e t r i c 0 . 5 ) ] Данная программа генерирует элемент (т.е. одноэлементную выборку) из геометрического распределения с параметром 0.5 с помощью составной процедуры geometric, параметризованной параметром p. При выполнении данной вероятностной программы в истории ее выполнения количество «активных» случайных величин может быть любым. 1.2.3 Апостериорное распределение историй выполнений программ При добавлении наблюдений, то есть фиксации значения определенных случайных величин, можно считать, что рассматривается подмножество множества элементарных событий, а именно те элементы, в историях выполнений которых наблюдаемые случайные величины принимают желаемое значение. Можно описать другое вероятностное пространство, множеством элементарных событий которого будет являться только что описанное подмножество. Вероятностная мера в новом вероятностном пространстве может быть «индуцирована» вероятностной мерой из первоначального вероятностного пространства с учетом нормировочной константы. Только что описанный переход полностью сочетается с теоремой Байеса, которая в нашем случае записывается следующим образом: P (T | X = x̂) = P (T )P (X = x̂ | T ) , P (X = x̂) где X — множество случайных величин, для которых мы знаем фиксированные наблюдаемые значения; T — множество случайных величин, ассоциируемых со скрытыми параметрами, апостериорное распределение которых мы заинтересованы получить (грубо говоря, это всё остальные случайные величины); x̂ — наблюдаемые значения случайных величин. Отметим, что часто мы заинтересованы не в апостериорном распределении P (T | X = x̂), а в апостериорном распределении лишь части скрытых параметров P (T 0 ⊂ T | X = x̂) или даже функции f от них P (f (T ) | X = x̂), в общем случае не являющейся биекцией. С другой стороны, так как мы не ставим задачу получить аналитическое представление данных апостериорных распределений, а лишь выборку из них, то 14 это не играет большой роли в нашем случае при решении задач методами Монте-Карло: мы можем генерировать элементы выборки из P (T | X = x̂), и затем использовать только значения нужных нам скрытых случайных величин и/или действовать функцией f на них. 1.2.4 Использование методов Монте-Карло по схеме Марковских цепей Математическо-статистический аппарат методов Монте-Карло по схеме Марковских цепей кратко и «современно» изложен в [8]. Интуитивно опишем, что мы собираемся делать. У нас есть вероятностная программа g, определяющая множество скрытых T и наблюдаемых X случайных величин. Вероятностная программа своей записью задает априорное распределение P (T ), P (X | T ), а значит и совместное распределение P (T, X). Каждый раз путем выполнения данной программы мы получаем одну из возможных реализаций данной программы, которая биективно описывается соответствующей историей выполнения hi ∈ H, где множество H — множество всех возможных историй выполнений данной вероятностной программы, которое можно рассматривать как множество элементарных событий. Для каждой истории выполнения определена ее вероятностная мера P (hi ) = P (T = t̃, X = x̃) = P (T = t̃)P (X = x̃ | T = t̃). У нас также есть «экспериментальное» значение каждой наблюдаемой случайной величины x̂i , то есть множество {x̂i } = x̂. Существует подмножество историй выполнений H 0 ⊂ H, в котором наблюдаемые случайные величины принимают желаемое значение. Данное подмножество можно рассматривать как множество элементарных событий другого вероятностного пространства, вероятностную меру на котором можно «индуцировать» из предыдущего путем деления на нормирующую постоянную P (X = x̂): P (h0 ) = P (T = t̃)P (X = x̂ | T = t̃) . P (X = x̂) Будем обозначать ненормированную вероятностную меру ˜ 0 ) = P (T = t̃)P (X = x̂ | T = t̃). P (h 15 Рассмотрим цепь Маркова, исходами которой являются истории выполнений h0 ∈ H 0 . В качестве начального распределения можно выбрать априорное распределение P (T )P (X | T ), при котором значения наблюдаемых случайных величин не выбираются случайным образом согласно их распределению, а устанавливаются согласно их значениям. Например, в вероятностной программе 1 [ASSUME a (gamma 1 1 ) ] 2 [ASSUME b ( lambda ( ) ( normal a 1 ) ) ] 3 [OBSERVE ( b ) 5 . 3 ] первая случайная величина a, распределенная по закону Гамма-распределения Gamma(1, 1), будет являться скрытой, и будет сгенерирована согласно данному закону распределения. Наблюдаемая же случайная величина, распределенная по нормальному закону Normal(a, 1), не будет сгенерирована, а будет установлена в соответствии с ее наблюдаемым значением. Мы хотим установить такие правила перехода по схеме Метрополиса-Гастингса из одного состояния (исхода) цепи Маркова в другое, чтобы стационарное распределение данной цепи Маркова совпадало с распределением P (h0 ). В таком случае для получения аппроксимации искомого апостериорного распределения в виде выборки нам будет достаточно имитировать данную цепь Маркова [8, 18]. В алгоритме Метрополиса-Гастингса вероятностная мера может быть известна с точностью до нормировочной константы, что и происходит в нашем случае. На каждом шаге алгоритма дано текущее состояние h0t и в соответствии с заданным заранее условным распределение предлагается новое состояние h0∗ ∼ Q( · | h0t ). Таким образом, Q можно назвать распределением предлагаемых переходов. После этого подсчитывается коэффициент «принятия» нового состояния: P̃ (h0∗ ) Q(h0t | h0∗ ) α = min 1, P̃ (h0t ) Q(h0∗ | h0t ) ! . Состояние h0∗ принимается в качестве следующего состояния h0t+1 с вероятностью α, в противном случае h0t+1 := h0t . Новое состояние предлагается следующим образом: 1. Случайным образом (равномерно) выбирается одна «активная» скрытая случайная величина r ∈ dom h0t для «вариации». 16 2. Предлагается новое значение данной случайной величины r∗ ∼ κ( · | r = r̂, h0t ). Условная вероятность κ в данном случае будет локальным для r распределением предлагаемых переходов. 3. Если случайная величина r влияет на поток выполнения вероятностной программы, и в результате ее нового значения должны быть исполнены другие ветви выполнения вероятностной программы, они исполняются и в общем случае происходит генерация новых случайных величин, которые прежде были неактивны. Для примера рассмотрим следующую вероятностную программу: 1 [ASSUME a ( b e r n o u l l i 0 . 3 ) ] 2 [ASSUME b ( i f (= a 1 ) ( normal 0 1 ) (gamma 1 1 ) ) ] 3 [ PREDICT c ] В данной вероятностной программе три случайных величины, первая ξ1 распределена по закону Бернулли, вторая ξ2 по закону нормального распределения, третья ξ3 по закону Гамма-распределения. ξ1 можно также называть «a» (по имени переменной), хотя переменная «b» не является сама по себе случайной величиной, а зависит от значения ξ1 , определяющей поток выполнения вероятностной программы, и от значения либо ξ2 , либо ξ3 . Отметим также, что при каждом выполнении данной вероятностной программы будет существовать только две активных случайных величины. Предположим, что текущим состоянием вероятностной программы в момент времени t была история выполнения h0t = {ξ1 = 1, ξ2 = 3.2}. Это означает, что случайная величина ξ приняла значение 1, и поэтому для задания переменной b был сгенерирован элемент из нормального распределения, то есть была «реализована» случайная величина ξ2 ∼ Normal(0, 1). Очевидно, что P (h0t ) = P (ξ1 = 1) · P (ξ2 = 3.2 | ξ1 = 1) = 0.3 · fNormal(0,1) (3.2) ≈ 0.0007152264603. Предложим новое состояние h0∗ : 1. Выберем случайным образом одну из двух «активных» случайных величин, пусть это будет ξ1 . 2. Предложим случайным образом новое значение данной случайной величины согласно ее априорному распределению (то есть Bernoulli(0.3)), пусть это будет 0. 3. Так как случайная величина ξ1 действительно влияет на поток выполнения ве17 роятностной программы и при изменении ее значения в данном случае должна быть выполнена другая ветвь, выполним данную ветвь, генерируя значения «активирующихся» случайных величин (в нашем случае только ξ3 ). Предположим, что ξ3 стало равным 12.3. Тогда Q(h0∗ | h0t ) = 1 · 0.7 · fGamma(1,1) (12.3). 2 В общем случае Q(h0∗ | h0t ) = 1 · κ(r∗ | r = r̂, h0t ) · Rnew , 0 |ht | где |h0t | — количество активных случайных величин в текущей истории выполнения, κ(r∗ | r = r̂, h0t ) — вероятность нового значения варьируемой случайной величины r, Rnew — совместная вероятность выбора своих значений «активирующихся» случайных величин. При уже фиксированном h0∗ обратное Q(h0t | h0∗ ) для коэффициента принятия алгоритма Метрополиса-Гастингса в общем случае может быть посчитано аналогичным образом: Q(h0t | h0∗ ) = 1 · κ(r̂ | r = r∗ , h0∗ ) · Rold , |h0∗ | где Rold — совместная вероятность выбора своих значений случайных величин, активных в h0t , но не являющихся активными в h0∗ . В только что рассмотренном примере Q(h0t | h0∗ ) = 1 · 0.3 · fNormal(0,1) (3.2). 2 И тогда с учетом того, что P (h0∗ ) = 0.7 · fGamma(1,1) (12.3) ≈ 0.000003186221124, мы получаем, что   0.7 · fGamma(1,1) (12.3) · 12 · 0.3 · fNormal(0,1) (3.2) α = min 1, = 1. 0.3 · fNormal(0,1) (3.2) · 21 · 0.7 · fGamma(1,1) (12.3) Поэтому в данном конкретном примере h0t+1 = h0∗ в любом случае, то есть с вероятностью один. Выбор локального для r распределения предлагаемых переходов может быть раз- 18 ным. В простейшем случае, если r — независимая случайная величина, данное распределение выбирается идентичным априорному распределению для r. Если же r — перестановочная случайная величина [19], а такие случайные величины поддерживаются рассматриваемыми языками вероятностного программирования, то ее распределение может быть выбрано с учетом уже накопленных значений. Таким образом, мы описали алгоритм для предложения нового состояния h0∗ при текущем состоянии h0t и описали его в рамках метода Метрополиса-Гастингса. Чтобы получить выборку {h0j }N j=1 из N элементов желаемого апостериорного распределения, нам необходимо имитировать данную цепь Маркова согласно описанному выше алгоритму и +N ·K получить {h0j }M элементов данной цепи. Затем необходимо отсеять первые M элеменl=j тов и из оставшихся выбрать каждый N -й элемент. Полученное множество будет являться 0 аппроксимацией искомой выборки {h0j }N j=1 [8], а так как любая история выполнений h од- нозначно определяет значение всех случайных величин в вероятностной программе, то и аппроксимацией выборки из P (T | X = x̂). K выбирается больше единицы, чтобы исключить автокорреляцию h0i , которая естественным образом возникает в цепи Маркова. M выбирается достаточно больши́м, чтобы независимо от выбора начальной точки h01 цепь успела «забыть» данный первоначальный выбор; это особенно важно, когда начальное априорное распределение P (T, X) очень сильно отличается от апостериорного P (T | X = x̂). Какого-то общего правила для выбора данных величин нет, и обычно они выбираются эмпирически. 1.2.5 Программная реализация статистического вывода В предыдущем подпункте теоретически был описан алгоритм для обобщенного статистического вывода в вероятностных языках программирования. Простая программная реализация впервые достаточно подробно была описана в [16]: 1. Для инициализации h01 выбирается случайным образом путем выполнения вероятностной программы и фиксации наблюдаемых случайных величин в соответствии с имеющимися данными. При этом в памяти компьютера сохраняется база данных активных случайных величин вместе с их значениями, а также сохраняется P (h01 ), которое подсчитывается во время первоначального выполнения программы с учетом вероятности наблюдаемых случайных величин принять то 19 значение, которое они приняли. В [16] описывается схема адресации, которая позволяет различать случайные величины между собой. 2. Затем для выбора последующего h0t+1 каждый раз из базы данных случайным равномерным образом выбирается случайная величина r и она случайным образом варьируется в соответствии со своим локальным распределением предлагаемых переходов κ( · | r = r̂, h0t ), которое предварительно задается для всех используемых примитивных (несоставных) случайных величин. Создается копия базы данных, в которой значение случайной величины r заменяется на новое. 3. Вероятностная программа выполняется еще один раз, при этом случайные величины, для которых уже в базе данных имеется запись (согласно схеме адресации), принимают соответствующие старые значения, а r принимает свое новое полученное значение. 4. В общем случае, если r влияет на поток выполнения программы, генерируются значения для новых случайных величин, которые становятся активными. Для этих случайных величин прежде в базе данных не было записей. 5. Также если r влияет на поток выполнения программы, то некоторые случайные величины могут перестать быть активными. В данном случае соответствующие им записи в базе данных будут невостребованы. 6. После выполнения программы второй раз можно считать, что мы получили h0∗ . Также отметим, что при выполнении программы h0∗ мы получили и использовали всё необходимые компоненты для подсчета P (h0∗ ) и Q(h0∗ | h0t ). 7. Вероятность обратного перехода Q(h0t | h0∗ ) может быть получена разными способами. Если в вероятностной программе есть только независимые случайные величины (и нет перестановочных), то первые две компоненты Q(h0t | h0∗ ) могут быть найдены тривиально, так как мы знаем количество случайных величин в h0∗ и можем посчитать κ(r̂ | r = r∗ , h0∗ ). Для третьей компоненты нам нужно посчитать произведение вероятностей случайных величин, которые перестали быть активными в h0∗ , то есть все невостребованные случайные величины в базе данных. В случае наличия и использования перестановочных случайных величин мы можем имитировать ситуацию, что h0∗ является нашим старым состоянием, а новое состояние мы получаем в точном соответствии с h0t [3]. 20 8. Имея P (h0t ), P (h0∗ ), Q(h0∗ | h0t ) и Q(h0t | h0∗ ), мы подсчитываем коэффициент принятия α для алгоритма Метрополиса-Гастингса, и либо принимаем h0∗ с вероятностью α, что означает, что в следующий раз мы будем использовать уже новую базу данных случайных величин со значением, соответствующими h0∗ , либо отклоняем с вероятностью (1 − α), что означает, что на следующем шаге h0t+1 мы снова будем использовать старую базы данную от h0t . 9. Алгоритм повторяется с шага № 2. 1.3 Эффективность вывода При использовании вероятностных языков программирования встает вопрос об эффективности статистического вывода, другими словами о том, как быстро мы генерируем выборку желаемой точности из апостериорного распределения. Описанная в секции 1.2.5 программная реализация статистического вывода является неэффективной, так как происходит перевыполнение всей вероятностной программы, хотя вариация случайной величины r обычно имеет только локальный эффект. Рассмотрим более подробно данную проблему на примере следующей вероятностной программы: 1 [ASSUME r a i n y −s e a s o n ( b e r n o u l l i 0 . 2 ) ] 2 [ASSUME c l o u d y 3 ( b e r n o u l l i ( i f r a i n y −s e a s o n 0 . 8 0 . 3 ) ) ] 4 [ASSUME r a i n 5 ( b e r n o u l l i ( i f cloudy 0.8 0 . 2 ) ) ] 6 [ASSUME s p r i n k l e r 7 ( b e r n o u l l i ( i f cloudy 0.1 0 . 5 ) ) ] 8 [ASSUME wet−g r a s s 9 10 11 ( bernoulli ( i f sprinkler ( i f rain 0.99 0.9) ( i f rain 0.9 0 . 0 1 ) ) ) ] Данная вероятностная программа описывает статистически простую упрощенную модель зависимости между сезоном, облачностью, дождем, работой разбрызгивателя и состоянием травы (мокрая или нет) в какой-то день. Значение переменных следующее: 21 Рисунок 1 — Пример Байесовской сети. Из [20]. rainy-season: входит ли тот день в сезон дождей или нет?, cloudy: облачно в тот день или нет?; rain: был ли дождь в тот день?; sprinkler: работал ли разбрызгиватель в тот день или нет?; wet-grass: была ли трава мокрой в тот день? Данная модель может быть представлена с помощью Байесовской сети доверия (см. рис. 1) и таблицами условных вероятностей. Отметим, что любая Байесовская сеть доверия может быть представлена в виде вероятностной программы на языке Church/Venture/Anglican, но не любая вероятностная программа может быть представлена Байесовской сетью. В случае, если во время очередной итерации алгоритма Метрополиса-Гастингса в качестве варьируемой случайной величины выбрана случайная величина rain (соответствующий узел на рис. 1 выделен самым темным цветом), для подсчета коэффициента принятия достаточно лишь рассмотреть значения и вероятности при данных значениях узлов «Дождь» и «Трава мокрая». Все остальные значения и их вероятности останутся прежними. Иллюстрацию распространения возмущений в связи с вариацией случайной величины «Дождь» см. на рис. 2. В подобном простом примере этот факт не играет большой роли, так как отношение случайных величин, требующих «переучета», к общему количеству активных случайных величин невелико, однако при большом объеме данных это играет решающую роль при выполнении статистического вывода во многих моделях при помощи программных реализаций вероятностных языков программирования. Например, в скрытых марковских моделях [17, 2, 4] или в латентном размещении Дирихле [21, 20]. Например, в простой скрытой Марковской модели есть N скрытых и N наблюдаемых величин. При реализации статистического вывода алгоритмом, описанным в сек22 Рисунок 2 — Байесовская сеть в виде «отпечатка» выполнения вероятностной программы. Из [20]. ции 1.2.5, одна итерация алгоритма Метрополиса-Гастингса имеет сложность (по времени) O(N ), хотя желаемая и возможная сложность O(1) или по крайней мере O(log N ). Для достижения желаемой сложности в каждой истории выполнений необходимо отслеживать зависимости между случайными величинами. Следует отметить, что эти зависимости в общем случае могут изменяться в вероятностных программах. Например, в следующей программе 1 [ASSUME a ( b e r n o u l l i 0 . 5 ) ] 2 [ASSUME b (gamma 1 1 ) ] 3 [ASSUME c ( normal ( i f a b 3 . 0 ) 1 ) ] случайная величина c, т.о. (normal ...), зависит от случайной величины b, т.о. (gamma ...), не всегда, а только если случайная величина a принимает значение «ИСТИНА». Описание структур данных и алгоритмов, необходимых для отслеживания зависимостей в режиме реального времени, были предварительно приведено в [20] и [22], а затем более обширно и подробно в [3]. При использовании данных структур данных и алгоритмов временная сложность одной итерации алгоритма Метрополиса-Гастингса в простой скрытой Марковской модели равна O(log N ), при этом если использовать упорядоченный 23 перебор случайных величин, то временная сложность снизиться до O(1), так как логарифмический фактор появляется в связи с необходимостью выбирать случайным образом следующий узел (т.е. случайную величину) для вариации. В простой скрытой Марковской модели количество «активных» случайных величин постоянно и вид зависимости тривиален (от каждой скрытой случайной величины напрямую зависит только одна наблюдаемая случайная величина и только следующая скрытая случайная величина). В более сложных моделях виды зависимостей более изощрены и количество случайных величин меняется от одной истории выполнений к другой. С другой стороны, для большого количества порождающих моделей, используемых в настоящее время в машинном обучении, необходимо, чтобы время на одну итерацию оставалось постоянным или росло хотя бы логарифмически вместе с линейным ростом количества наблюдений, иначе статистический вывод будет невозможен за разумное время. На рис. 3 показаны результаты применения алгоритмов и структур данных, описанных в [20, 22, 3]. При использовании старого подхода, описанного в [16] (см. секцию 1.2.5) время на N итераций алгоритма Метрополиса-Гастингса росло квадратично с линейным ростом размерности модели (N скрытых и N наблюдаемых случайных величин), а при использовании предлагаемого подхода время растет квазилинейно. На этом же рисунке видно, что благодаря локализации выполнения одной итерации Метрополиса-Гастингса стало возможным проводить приближенный статистический вывод параллельно. Следует отметить, что пространственная сложность алгоритма (объем памяти, необходимый для его применения) равна, грубо говоря, O(N + K), где O(K) — стоимость хранения в памяти зависимостей между случайными величинами. В общем случае эта величина может быть достаточно большой, и в работе [22] описаны возможности более эффективного расходования памяти. 1.4 Порождающее вероятностное программирование в распознавании образов Как было отмечено в начале, цель вероятностного программирования — облегчить задачу моделирования порождающих вероятностных моделей и проведения вывода в них. Примером иллюстрации успешного предварительного применения вероятностного программирования может служить работа [5], в которой вероятностное программирование использует24 Среднее время на N итераций алгоритма Метрополиса-Гастингса 160 140 120 Статистический вывод без оптимизации (красный) Предложенные алгоритмы и структуры данных (зел.) —//—, 2 потока (син.) —//—, 4 потока (гол.) 100 80 60 40 20 0 50 100 150 200 250 Количество наблюдений N в скрытой модели Маркова Рисунок 3 — Эффективность статистической вывода при его различных реализациях: красный график соответствует простейшему алгоритму, описанному в 1.2.5, при котором каждый раз происходит перевыполнение всей вероятностной программы. Зеленый график соответствует использованию новых алгоритмов и структур данных, что позволяет производить статистический вывод асимптотически более эффективно. Синий и голубой график показывают, что применение предлагаемого подхода также позволяет производить статистический вывод параллельно, по крайней мере приближенно. Рис. из [20]. ся для моделирования вероятностной модели находящихся на изображении объектов и их взаимодействия между собой. Байесовский подход к интерпретации изображений путем задания априорного распределения на расположение объектов и на связи между ними был предложен задолго до появления рассматриваемых языков программирования, однако именно с их появлением исследование и осуществление данного подхода стало проще, так как вероятностные языки программирования позволяют композиционно и компактно представлять вероятностные порождающие модели и проводить статистический вывод в них. В работе рассматриваются два примера: проблема графической CAPTCHA [23] — «компьютерного теста, используемого для определения, кем является пользователь системы: человеком или компьютером», знакомого почти что каждому пользователю интернета; и проблема нахождения на изображении с камеры автомобиля дороги, разделительной полосы, и левого и правого оврагов. Полученные результаты по своей эффективности на рассматриваемых простых примерах не уступают другим современным подходам к решению этих задач, однако представление, моделирование и вывод проще осуществляется с 25 помощью вероятностного программирования. 1.5 О различиях между Church, Venture, Anglican Целью данной главы, очевидно, не было подробное описание этих вероятностных языков, а только краткое введение в них. Заинтересованному читателю мы можем порекомендовать продолжить свое знакомство с вероятностным языком Church с [2, 24, 25, 16], Venture — [3], Anglican — [26, 4, 27]. Хотя многое объединяет эти вероятностные языки, в некоторых принципиальных вещах они различаются. Например, Venture на данный момент больше позиционируется как универсальная платформа, включающая в себя разные виды алгоритмов и методов статистического вывода с запроектированной возможностью добавлять новые с помощью использования базовых компонент и методов. В рамках работы над Anglican развиваются методы обобщенного вывода с использованием методов фильтрации частиц. Church, с другой стороны, позволяет производить статистический запрос внутри другого статистического запроса, что Venture и Anglican пока делать не могут. 26 2 Автоматическая генерация вероятностных программ При использовании полных по Тьюрингу вероятностных языков программирования, включающих в себя функции высших порядков3 , которыми в том числе являются языки Church, Venture и Anglican, вероятностная программа одновременно является и порождающей моделью, и записанной процедурой для генерации элементов выборки из этой модели путем выполнения исходного кода данной процедуры. Любая процедура в вероятностном программировании является формально программным кодом, который описывает процесс генерации элемента выборки при заданных аргументах данной функции. Таким образом, процедуры вероятностных программ являются конструктивным способом описания условных распределений. Полные по Тьюрингу и допускающие функции высших порядков вероятностные языки программирования открывают возможность проведения вывода исходного текста самих вероятностных программ, если задано априорное распределение на множестве исходного текста, с помощью операторов eval и apply. Грубо говоря, необходимо представить вероятностную порождающую мета-модель, которая будет генерировать вероятностные модели в виде исходного кода вероятностных программ. Данная глава основана на работе [6], которая включает в себя первые предварительные результаты по этой амбициозной задаче вывода самих порождающих вероятностных моделей при наличии какой-либо информации об искомом распределении, которое определяется искомой вероятностной программой. Отметим, что статистический вывод в пространстве исходного кода сложен и нет какого-то простого подхода как к построению вероятностных порождающих моделей исходного кода [28], так и выводу в них [29]. В рамках нашей предварительной работы мы поставили задачу найти с помощью статистического вывода и предлагаемой нами порождающей вероятностной мета-модели такие вероятностные программы, которые будут генерировать выборку элементов, схожую по своим статистическим характеристикам с каким-то заранее заданным распределением. Эта задача интересна сама по себе, так как нахождение эффективных алгоритмов генерации (моделирования) случайных величин — нетривиальная задача и для людей3 Функциями (процедурами) высших порядков называются функции, аргументами или значениями которых могут быть другие функции. 27 ученых, которой они занимаются на протяжении десятков лет [30, 31, 32]. Наши предварительные результаты показывают, что подобный автоматизированный вывод порождающих вероятностных моделей в виде вероятностных программ действительно возможен. В частности, мы приводим результаты успешного эксперимента, в рамках которого мы автоматически нашли обобщенную вероятностную программу, которая подлинно (не приближенно) генерирует случайные величины, распределенные по закону Бернулли с произвольным параметром p. 2.1 Обзор литературы Рассматриваемые нами идеи относятся к разным областям, в том числе к автоматизации процесса программирования [33, 34], индуктивному программированию [33, 35, 36, 37, 38, 39], автоматическому моделированию [40, 41], компьютерному определению и представлению плотности распределений. Подходы к решению проблемы включают статистический вывод, поиск и оптимизацию, в том числе эволюционные алгоритмы и в особенности генетическое программирование. Идеи и методы использования вероятностного программирования для изучения и автоматизированного представления вероятностных моделей предлагались и ранее [2, 42, 43, 3]. Насколько автору известно, описываемый подход к порождению вероятностных программам мета-вероятностной программой ранее не рассматривался в качестве отдельной проблемы достаточно подробно, хотя первые шаги в исследовании и формулировке проблемы были сделаны в работах [42, 3]. 2.2 Описание подхода Наш подход может быть описан в рамках приближенных Байесовских вычислений [44] с использованием метода Монте-Карло по схеме цепей Маркова с выбором в качестве искомого апостериорного распределения π(X |X̂ )p(X̂ |T )p(T ), (1) где π(X |X̂ ) — вероятностная мера, измеряющая расстояние между значения статистик, вычисленных соответственно на выборке X из искомого распределения и выборке X̂ , по28 [ASSUME program−text ( p r o d u c t i o n s ‘ ( ) ‘ r e a l ) ] [ASSUME program ( eval ( l i s t ‘ lambda ‘ ( ) program−text ) ) ] [ASSUME samples ( apply−n−times program 10000 ’ ( ) ) ] [OBSERVE ( normal ( mean samples ) n o i s e − l e v e l ) 0 . 0 ] [OBSERVE ( normal ( v a r i a n c e samples ) n o i s e − l e v e l ) 1 . 0 ] [OBSERVE ( normal ( sk ewn ess samples ) n o i s e − l e v e l ) 0 . 0 ] [OBSERVE ( normal ( k u r t o s i s samples ) n o i s e − l e v e l ) 0 . 0 ] [ PREDICT program−text ] [ PREDICT ( apply−n−times . . . ( program ) ) ] Рисунок 4 — Вероятностная программа для вывода исходного кода вероятностной программы для генерации случайных чисел, распределенных по закону стандартного нормального распределения Normal(0, 1). лученной путем выполнения исходного кода вероятностной программы-кандидата. Пусть существует распределение F с параметрами θ, вероятностную программу для генерации элементов выборки из которого мы хотим вывести. Пусть X = {xi }Ii=1 , xi ∼ F (·|θ) будет выборкой из I элементов из распределения F при каком-то фиксированном значении параметров θ. Рассмотрим задачу вывода исходного кода вероятностной программы T , которая при ее неоднократном выполнении J раз сгенерирует выборку элементов X̂ = {xˆj }Jj=1 , xˆj ∼ T (·), статистически близких к распределению F при заданных параметрах θ. Пусть s будет статистикой выборки, и тогда s(X ) и s(X̂ ) — значение этой статистики на элементах выборки из F и из T (·) соответственно. Пусть вероятностная мера d(s(X ), s(X̂ )) = π(X |X̂ ), для простоты ненормированная, принимает бо́льшие значения, когда s(X ) ≈ s(X̂ ). d можно интерпретировать как расстояние или штраф. Мы используем вероятностное программирование для представления мета-модели, порождающей другие вероятностные программы в виде исходного текста, и для проведения статистического вывода в пространстве искомых вероятностных моделей. Для статистического вывода мы использовали программную реализацию вероятностного языка программирования Anglican, которая поддерживает [4] статистический вывод методом частиц и методом Метрополиса-Гастингса по методу Монте-Карло по схеме цепей Маркова. Вероятностная мета-модель представлена на рис. 4, где на первой строке мы устанавливаем соответствие между T и переменной program-text, которая будет содержать один сгенерированный элемент из распределения на исходный код P (T ), определенное априорно через порождающую процедуру production с помощью адаптивной грамматики по типу [45] (см. подробнее в разделе 2.3). 29 Мы не указываем здесь θ, так как задача вывода в данном случае найти вероятностную программу, генерирующую элементы из стандартного нормального распределения. Переменная samples на второй строке представляет описанную выше выборку X̂ из вероятностной программы-кандидата, и в этом примере J = 10000. s и d вычисляются на следующих четырех строках вероятностной программы, где статистика s определяется как четырехмерный вектор, включающий в себя соответственно выборочные среднее, дисперсию, коэффициент асимметрии и коэффициент эксцесса выборки элементов из распределения, определенного вероятностной программой, полученной из распределения T . Мера расстояния d определяется через плотность многомерного нормального распределения со средними [0.0, 1.0, 0.0, 0.0]T и диагональной ковариационной матрицей σ 2 I. Отметим, что это означает, что мы ищем вероятностные программы, результат выполнения которых определяет распределение со средним равным 0, дисперсией — 1, коэффициентами асимметрии и эксцесса равными 0, и мы «штрафуем» отклонения от этих значений с помощью квадратичной экспоненциальной функции потерь с коэффициентом 1 , σ2 где σ определена как noise-level. Эта функция потерь представляет собой функцию плотности нормального распределения. Данный пример служит хорошей иллюстрацией основных особенностей нашего подхода. Для поиска в виде вероятностной программы генератора случайных чисел из стандартного нормального распределения мы используем аналитическую информацию s(F ) о стандартном нормальном распределении при вычислении расстояния между статистиками d(s(F ), s(X̂ )). Существует по крайней мере три различных ситуации, включая данную, в которых s и d могут вычисляться различными способами: 1. В рамках первой ситуации мы ищем вероятностную программу, которая эффективно генерирует элементы из аналитически известных распределений. Под эффективностью в данном случае можно понимать вычислительную временную сложность и среднее количество использованной энтропии для генерации элемента выборки в среднем. Практически всегда в этой ситуации и при подобной постановке задачи статистики распределения F известны аналитически. 2. Вторая ситуация возникает, когда мы можем генерировать только элементы выборки из F . Например, подобная ситуация возникает, когда мы генерируем элементы из апостериорного распределения с помощью «дорогостоящего» (вычис- 30 [ASSUME program−text ( p r o d u c t i o n s ‘ ( r e a l ) ‘ b o o l ) ] [ASSUME program ( eval ( l i s t ‘ lambda ‘ ( ) program−text ) ) ] [ASSUME J 1 0 0 ] [ASSUME samples−1 ( apply−n−times program J ’ ( 0 . 5 ) ) ] [OBSERVE ( f l i p ( G−test−p−value samples−1 ‘ B e r n o u l l i ( l i s t 0 . 5 ) ) ) t r u e ] ... [ASSUME samples−N ( apply−n−times program J ’ ( 0 . 7 ) ) ] [OBSERVE ( f l i p ( G−test−p−value samples−N ‘ B e r n o u l l i ( l i s t 0 . 7 ) ) ) t r u e ] [ PREDICT program−text ] [ PREDICT ( apply−n−times program J ’ ( 0 . 3 ) ) ] Рисунок 5 — Вероятностная программа для вывода исходного кода вероятностной программы, генерирующей случайные числа, распределенные по закону Бернулли Bernoulli(θ). На предпоследней строчке выводится текст вероятностной программыкандидата. На последней строчке вероятностная программа-кандидат выполняется J раз для генерации выборки из J элементов при параметризации p = 0.3, причем предыдущие θn (т.о. тренировочные значения параметров) не содержали p = 0.3. лительно) метода Монте-Карло по схеме Марковских цепей, и мы заинтересованы получить другое представление апостериорного распределения в виде вероятностной программы, чье априорное распределение будет точно или хотя бы приблизительно совпадать с искомым апостериорным. 3. При третьей ситуации нам заранее дана фиксированного размера выборка из F , и мы хотим найти вероятностную программу, которая позволит генерировать выборку произвольного размера из F в дальнейшем. Мы начали этот раздел с постановки задачи именно в рамках третьей ситуации. Следует отметить, что возможная польза представления генератора случайных чисел потенциально не только в том, чтобы эффективно и быстро генерировать выборку из желаемого распределения, но и чтобы получить формальное представление желаемого распределения или его приближения в виде исходного кода вероятностной программы, то есть в виде формальной сущности, дальнейшие действия с которой можно производить; в том числе проводить анализ над выведенным исходным кодом и использовать найденные блоки исходного кода для решения других задач. Рис. 5 иллюстрирует другое важное обобщение решение задачи, сформулированной в самом начале с апостериорным распределением (1). При постановке задачи на вывод генератора случайных чисел, распределенных согласно стандартному нормальному распределению, мы не параметризовали искомое рас- 31 [ASSUME box−muller−normal ( lambda ( mean s t d ) (+ mean ( ∗ s t d ( ∗ ( cos ( ∗ 2 ( ∗ 3 . 1 4 1 5 9 ( uniform−continuous 0 . 0 1 . 0 ) ) ) ) ( sqrt ( ∗ −2 ( log ( u n i f o r m − c o n t i n u o u s 0 . 0 1 . 0 ) )))))))] [ASSUME p o i s s o n ( lambda ( r a t e ) ( b e g i n ( d e f i n e L ( exp ( ∗ −1 r a t e ) ) ) ( d e f i n e i n n e r − l o o p ( lambda ( k p ) ( i f (< p L) ( dec k ) ( begin ( d e f i n e u ( uniform−continuous 0 1 ) ) ( inner−loop ( inc k ) (∗ p u ) ) ) ) ) ) ( inner−loop 1 ( uniform−continuous 0 1 ) ) ) ) ] Рисунок 6 — Найденные и записанные людьми исходные коды вероятностных программ для (слева) общего нормального распределения Normal(µ, σ) [31] и (справа) распределения Пуассона Poisson(λ) [46]. Эти исходные коды входят в собранный нами корпус, с помощью которого мы определяем априорные вероятности для наших порождающих правил путем подсчета количества встречающихся констант, процедур разных видов и т.д. пределение никаким образом, так как у стандартного нормального распределения нет параметров, т.е. θ = ∅. В общем случае распределения, которые мы хотим представить в виде вероятностных программ, имеют нетривиальную параметризацию, и представляют собой по сути семейство распределений. Мы хотим найти вероятностную программу, входные аргументы которой как раз бы и являлись параметрами искомого распределения, таким образом, эта вероятностная программа позволяла бы генерировать случайные величины из всего семейства. Для наглядности рассмотрим алгоритм генерации случайных чисел, распределенных по закону нормального распределения, с помощью преобразования Бокса-Мюллера, представленный в виде вероятностной программы на рис. 6. Эта вероятностная процедура параметризована двумя параметрами: средним и стандартным отклонением. Для постановки обобщенной задачи вывода параметризованных вероятностных программам нам необходимо изменить наше искомое апостериорное распределение, включив в него параметр θ, параметризующий искомое распределение F: π(X |X̂ , θ)p(X̂ |T , θ)p(T |θ)p(θ). Нам бы хотелось вывести вероятностную программу, которая смогла бы обобщить все возможные значения параметра θ. С допущением, что если мы выберем конечное число N различных параметризаций θ̂i , мы получим обобщение всего семейства распределений в виде вероятностной программы, мы формулируем нашу задачу в виде следующего приближения с использованием приближенных Байесовских вычислений в рамках метода 32 Монте-Карло по схеме цепей Маркова: Z N 1 X π(Xn |X̂n , θn )p(X̂n |T , θn )p(T |θn ) ≈ π(X |X̂ , θ)p(X̂ |T , θ)p(T |θ)p(θ)dθ. N n=1 Вероятностная программа для поиска параметризованной вероятностной программы, генерирующей случайные числа, распределенных по закону Бернулли Bernoulli(θ), представлена на рис. 5, и наглядным образом иллюстрирует применение данного допущения и приближения. При выбранных N различных параметризациях параметра p распределения Бернулли мы каждый раз генерируем J элементов из вероятностной программыкандидата, аккумулируя расстояние (штраф) между искомым распределением и полученным распределением, представляющим вероятностную программу-кандидата. В каждом конкретном случае для θi мы высчитываем: 1) расстояние с использованием статистики G-теста (более «современный» аналог критерия согласия Пирсона и соответствующей статистики) в виде Gn = 2 X i∈0,1 #[X̂n = i] #[X̂n = i]ln θni (1 − θn )(1−i) · |X̂n | ! , где #[X̂n = i] — количество элементов выборки из X̂n , принимающих значение i; 2) а также соответствующее p-значение с нулевой гипотезой, утверждающей, что элементы выборки X̂n являются и элементами выборки из распределения Bernoulli(θn ). Так как распределение статистики G-теста приблизительно распределено по закону распределения хи-квадрат, т.е. G ∼ χ2 (1) в нашем примере, мы можем представить и находить расстояние d в данном случае путем вычисления вероятности ложного отклонения нулевой гипотезы H0 : X̂n ∼ Bernoulli(θn ). Ложное отклонение нулевой гипотезы эквивалентно успеху в проведении испытания Бернулли с вероятностью успеха равной p-значению. 2.3 Грамматика и порождающие правила С учетом наличия в нашем распоряжении выразительного вероятностного языка программирования, допускающего функции высших порядков и полного по Тьюрингу, наше априорное распределение об исходном коде искомых вероятностных программ также достаточно выразительно. В общих чертах оно схоже с адаптивными грамматиками [45], используемыми в [29], но имеет отличия, в частности связанные с созданием сред с ло- 33 кальными переменными. В виде псевдокода наше априорное распределение может быть представлено следующим образом (символ → означает «может перейти в»): 1. Выражение exprtype |env → в имя переменной, случайно выбираемой из среды переменных env с типом type. 2. Выражение exprtype |env → в случайную константу типа type. Константы различных типов (целочисленные, вещественные и т.д.) генерируются из отдельного для каждого типа type процесса Дирихле4 DPtype (Htype , α), где базовое распределение Htype само по себе в общем случае являются смесью нескольких распределений. Например, для констант вещественного типа мы используем смесь нормального распределения (normal 0 10), равномерного непрерывного распределения (uniform-continuous -100 100) и равномерного дискретного распределения из множества {−1, 0, 1, . . .}. 3. Выражение exprtype |env → (proceduretype exprarg_1_type ... exprarg_N _type ), где процедура procedure является случайно выбираемой примитивной детерминированной или стохастической (не составной) процедурой, определенной заранее в глобальной среде, с типом возвращаемого значения type. 4. Выражение exprtype |env → (compound_proceduretype exprarg_1_type ... exprarg_N _type ), где compound_proceduretype является составной процедурой, также генерируемой в соответствии с процессом Дирихле DPtype (Gtype , β), где базовое распределение Gtype случайным образом генерирует составную процедуру с типом возвращаемого значения type и количеством входных аргументов, распределенным по закону Пуассона, где каждый входной аргумент имеет свой произвольный тип. Тело body составной процедуры генерируется также случайным образом согласно этим же порождающим правилам и грамматике, но с учетом введение локальной среды, включающей в себя входные аргументы процедуры. 5. Выражение exprtype |env → (let [(gensym) exprreal ] exprtype |env ∪ gensym)), где env ∪ gensym означает среду, дополненную переменной с именем (gensym) и со значением, вычисляемым в соответствии с генерируемым случайным образом выражением согласно этих же порождающих правил. 6. Выражение exprtype |env → (if (exprbool ) exprtype exprtype ). 7. Выражение exprtype |env → (recur exprarg_1_type ... exprarg_M _type ), таким образом 4 Не нужно путать с распределением Дирихле. 34 рекурсивный вызов текущей составной процедуры. Во избежание вычислительных ошибок во время выполнения сгенерированных процедур мы заменяем примитивные функции их «защищенными» аналогами, например log(a) заменяется на safe-log(a), причем последний возвращает 0 если a < 0; или например uniform-continuous заменяется safe-uc(a, b), которая в случае если a > b меняет аргументы местами, а также возвращает просто a если аргументы равны: a = b. Множество типов, которые мы использовали в рамках наших экспериментов, включало вещественные и булевы типы, а общее множество примитивных процедур, включенных нами в глобальную среду, включало в себя такие функции как +, −, *, safe-div, safe-uc, safe-normal. 2.4 Вероятности использования порождающих правил Для задания априорных вероятностей порождающих правил, то есть вероятностей, с которой каждое из правил будет применяться в случае возможности его применения, мы вручную составили небольшой корпус вероятностных программ, которые повторяют найденные учеными [32] алгоритмы генераторов случайных чисел. Примеры таких программ представлены на рис. 6. Заметим, что все они требуют наличия только одной стохастической процедуры, а именно uniform-continuous, так что мы включили только ее в глобальную среду с положительной вероятностью для экспериментов, описанных в 2.5.2. Используя данный корпус, мы вычислили априорные вероятности каждого порождающего правила, при этом при выводе вероятностной программы для генерации случайных величин из искомого распределения F (например, распределения Бернулли), мы исключали из корпуса все элементы, которые генерируют случайные величины согласно закону распределения F . После этого вероятности использования порождающих правил были «смягчены» с помощью распределения Дирихле. В будущем можно использовать более обширные корпусы вероятностных программ, примером зарождающегося подобного корпуса может служить [25]. 2.5 Эксперименты Эксперименты были разработаны таким образом, чтобы проиллюстрировать все три вида возможных ситуаций, описанных ранее. Но в начале мы проиллюстрируем выразительность нашего априорного распределения исходного кода вероятностных программ. После 35 −4 Y −3 −2 0.6 0.5 P̂ (Y ) P̂ (Y ) −5 0.40 0.35 0.30 0.25 0.20 0.15 0.10 0.05 0.00 −2.5 −2.0 −1.5 Y −1.0 −0.5 0.0 0.0 1.0 0.8 0.6 0.4 0.2 −0.5 0.0 Y 0.5 1.0 0.0 0.3 0.1 −3.0 1.2 −1.0 0.4 0.2 P̂ (Y ) 1.8 1.6 1.4 1.2 1.0 0.8 0.6 0.4 0.2 0.0 −6 P̂ (Y ) P̂ (Y ) P̂ (Y ) 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 −14.56636 Y −7.28318 1.4 1.2 1.0 0.8 0.6 0.4 0.2 0.0 −4 −2 0 Y 2 4 −2.0 −1.5 −1.0 Y −0.5 0.0 Рисунок 7 — Гистограммы выборок из некоторых порожденных вероятностных программ из их априорного распределения. По форме распределений видно, что наши порождающие правила достаточно обширны, чтобы соответствующие порождающим вероятностным программам распределения были нетривиальны. этого мы опишем постановку и результаты экспериментов в рамках использования нашего подхода во всех трех различных ситуациях возможности вычисления расстояния d. 2.5.1 Выборки из сгенерированных вероятностных программ Для иллюстрации выразительности нашего априорного распределения исходных кодов вероятностных программ мы приводим выборки из случайным образом сгенерированных вероятностных программ из их априорного распределения. Эти шесть выборок в виде гистограмм из шести различных автоматически сгенерированных вероятностных программам расположены на рис. 7. Из рисунка видно, что разные случайным образом сгенерированные вероятностные программы определяют в общем случае достаточно различные структурно распределения. В частности, можно заметить разнообразие в носителе, дисперсии и количестве «режимов» (т.е. островков носителя с высокой вероятностью по отношению к очень низковероятностным пространствам между островками). 2.5.2 Вывод вероятностных программ, определяющих распределения, совпадающие или приближающие классические одномерные распределения Как уже было отмечено, для всех классических одномерных распределений существуют алгоритмы, позволяющие и точно, и приближенно генерировать любое количество элементов из данных параметризованных распределений, и они были аналитически выведены учеными. Эти алгоритмы в том числе, очевидно, могут быть записаны как вероятностные программы в виде их исходного кода. 36 Мы провели серию экспериментов, чтобы проверить возможность автоматического вывода вероятностных программ, генерирующих выборки из классических одномерных распределений, а именно из распределения Бернулли Bernoulli(p), распределения Пуассона Poisson(λ), Гамма-распределения Gamma(a, 1.0), Бета-распределения Beta(a, 1), стандартного нормального распределения Normal(0, 1), и «общего» нормального распределения Normal(µ, σ). Для каждого семейства распределений мы проводили статистический вывод, выбирая в качестве целевого апостериорного распределения частное распределение π(X |X̂ )p(X̂ |T )p(T ), маргинализированное по параметру θ. Для приближения в каждом случае мы выбирали малое множество значений параметров {θ1 , . . . , θN } и определяли апостериорное распределение ограничениями по p−значению (для распределения Бернулли) и по близости моментам к ожидаемым (для всех других рассматриваемых распределений). Еще раз отметим, что при задании априорного распределения на порождающие правила в каждом конкретном случае из корпуса исключались все вероятностные программы, относящиеся к искомому распределению. Образцы гистограмм выборок из лучших найденных в результате вывода вероятностных программ представлены на рис. 8, где под лучшими мы понимаем вероятностные программы с наименьшим расстоянием d на тренировочных значениях параметров и соответствующих значениях моментов или максимального p-значения. Стоит особенно отметить результат эксперимента с распределением Бернулли, в рамках которого был найден исходный код вероятностной программы, статистически подлинно (точно) генерирующей выборку из всего семейства распределения Бернулли с параметром p. Найденная вероятностная программа представлена на рис. 9. На рис. 10 представлен выведенный исходный текст вероятностной программы для генерации элементов из Гамма-распределения Gamma(a, 1), параметризованного параметром a. 2.5.3 Обобщение произвольных эмпирических данных с помощью порождающего вероятностного программирования Мы также проверили наш метод на выводе порождающих моделей в виде вероятностных программ для объяснения настоящих, не синтетических, данных, аналитическое распределение которых неизвестно. 37 1.2 0.05 0.04 0.6 0.03 0.4 0.02 0.2 0.01 0.0 0 0.00 1 P̂ (Y ) 0.8 P̂ (Y ) P̂ (Y ) 1.0 40 50 60 70 0 2 4 6 Y 90 100 110 8 10 12 14 0.40 0.35 0.30 0.25 0.20 0.15 0.10 0.05 0.00 -2 -1 0 1 2 3 4 5 6 7 8 9 10 11 Y 2.0 1.5 P̂ (Y ) 0.40 0.35 0.30 0.25 0.20 0.15 0.10 0.05 0.00 80 Y P̂ (Y ) P̂ (Y ) Y 0.45 0.40 0.35 0.30 0.25 0.20 0.15 0.10 0.05 0.00 1.0 0.5 −4 −2 0 Y 2 4 0.0 0.0 0.5 1.0 1.5 Y Рисунок 8 — (Зеленые сплошные линии) Гистограммы выборок из распределений, соответствующих вероятностным программам, имеющим «высокую» вероятность в апостериорном распределении при поиске порождающих моделей, соответствующих распределениям (слева направо, сверху вниз): Bernoulli(p), Normal(µ, σ), Poisson(λ), Gamma(a, 1.0), Normal(0, 1), Beta(a, 1.0). (Синие пунктирные линии) Гистограммы выборок из «настоящих» распределений. Параметризация семейства распределений в каждом случае производилась другими значениями параметров, которые не входили в обучающее множество значений {θn }. Отметим, что для семейства распределений Бернулли Bernoulli(p) была выведена вероятностная программа, статистически точно генерирующая элементы выборки при любой параметризации (см. рис. 9). С другой стороны, не все распределения получили хорошее приближение найденными вероятностными программами за то время, что мы проводили вывод, как, например, в случае Бета-распределение Beta(a, 1.0). ( lambda ( par s t a c k − i d ) ( i f (< ( uniform−continuous 0 . 0 1 . 0 ) par ) 1 . 0 0 . 0 ) ) ( lambda ( par ( i f (< 1 . 0 ( lambda ( par ( i f (< 1 . 0 stack−id ) ( s a f e − s q r t ( s a f e − d i v par ( safe−uc par ( dec par ) ) ) ) ) 1 . 0 0 . 0 ) ) stack−id ) ( safe−uc ( s a f e − s q r t par ) (+ par ( cos par ) ) ) ) 1 . 0 0 . 0 ) ) Рисунок 9 — (сверху) Написанный человеком исходный код генератора случайных чисел, распределенных по закону Бернулли Bernoulli(p). (внизу, две программы) Выведенные исходные коды. Первая из двух выведенных вероятностных программ определяет настоящее семейство распределений Бернулли Bernoulli(p), параметризованное p. Вторая программа генерирует распределение, приближенное к распределению Бернулли, параметризованное p. 38 ( lambda ( par s t a c k − i d ) ( ∗ ( b e g i n ( d e f i n e sym0 0 . 0 ) ( exp ( s a f e − u c −1.0 ( s a f e − s q r t ( s a f e − u c ( safe−div ( safe−uc 0 . 0 ( safe−uc 0 . 0 3 . 1 4 1 5 9 ) ) par ) (+ 1 . 0 ( s a f e − u c ( b e g i n ( d e f i n e sym2 ( lambda ( v a r 1 v a r 2 s t a c k − i d ) ( dec v a r 2 ) ) ) ( sym2 ( s a f e − u c −2.0 ( ∗ ( s a f e − u c 0 . 0 ( b e g i n ( d e f i n e sym4 ( s a f e − u c sym0 ( ∗ (+ ( b e g i n ( d e f i n e sym5 ( lambda ( v a r 1 v a r 2 s t a c k − i d ) ( s a f e − d i v (+ ( s a f e − l o g ( dec 0 . 0 ) ) −1.0) v a r 1 ) ) ) ( sym5 ( exp par ) 1 . 0 0 ) ) 1 . 0 ) 1 . 0 ) ) ) ( i f (< ( s a f e − u c par sym4 ) 1 . 0 ) sym0 ( s a f e − u c 0 . 0 − 1 . 0 ) ) ) ) sym0 ) ) ( s a f e − d i v sym0 ( exp 1 . 0 ) ) 0 ) ) 0 . 0 ) ) ) ) ) ) ) par ) ) ( lambda ( s t a c k − i d ) (∗ 2.0 (∗ (∗ ( ∗ −1.0 ( s a f e − u c 0 . 0 2 . 0 ) ) ( safe−uc ( safe−uc 4 . 0 (+ ( s a f e − l o g 2 . 0 ) − 1 . 0 ) ) (∗ ( safe−div 2.0 −55.61617747203855) ( i f (< ( s a f e − u c ( safe−uc 27.396810474207317 ( s a f e − u c −1.0 2 . 0 ) ) 2.0) 2.0) 4.0 −1.0)))) −1.0))) 0.20 0.25 0.04 0.15 0.20 0.03 0.02 0.10 0.05 0.01 0.00 P̂ (Y ) 0.05 P̂ (Y ) P̂ (Y ) Рисунок 10 — Исходный код выведенных вероятностных программ для (слева) Гаммараспределения Gamma(a, 1) и (справа) для третьей эмпирической выборки индикаторов, используемых для рассмотрения заявок на выдачу кредита. Выборки, сгенерированные с помощью выполнения этих программ, расположены соответственно на рис. 8 и на рис. 11 (последняя гистограмма из трех). Для экономии места исходный код был сокращен, где возможно; например, путем замены (* 1.0 0.0) на 0.0. 10 20 30 40 50 60 70 80 90 0.00 0.15 0.10 0.05 0 5 10 Y 15 Y 20 25 30 0.00 −5 0 5 10 15 Y 20 25 30 Рисунок 11 — Гистограммы (зеленые сплошные линии) выборок из распределений, определяемых найденными в процессе статистического вывода вероятностными программами для аппроксимации эмпирических данных (синие пунктирные линии) трех вещественных показателей из базы данных, используемой для анализа заявок на выдачу кредита. Для данного эксперимента мы выбрали три набора данных признаков обращающихся в банк клиентов для получения кредита [47, 48], и производили вывод вероятностной программы, используя для сравнения p-значения двухвыборочного теста КолмогороваСмирнова аналогично тому, как мы использовали G-тест для дискретных распределений. Гистограммы выборок из лучших найденных вероятностных программ в сравнении с гистограммами истинных эмпирическими данными признаков клиентов приведены на рис. 11. Пример выведенной вероятностной программы показан на рис. 10 (справа). 2.5.4 «Компиляция» вероятностных программ Генерация выборок из апостериорного распределения методом Монте-Карло по схеме Марковских цепей, особенно в случае Байесовского вывода, обычно достаточно дорогостояща. Под «компиляцией» вероятностных программ мы имеем в виду поиск вероятностных программ, априорное распределение которых согласовывалось бы точно или приблизительно с искомым апостериорным распределением. В вероятностном программировании, где в общем случае генерация выборки из же39 [ASSUME t h e t a ( b e t a 1 . 0 1 . 0 ) ] [OBSERVE ( f l i p t h e t a ) True ] [OBSERVE ( f l i p t h e t a ) True ] [OBSERVE ( f l i p t h e t a ) True ] [OBSERVE ( f l i p t h e t a ) True ] [ PREDICT t h e t a ] [ PREDICT ( f l i p t h e t a ) ] [ASSUME t h e t a ( s a f e − b e t a 4 . 4 4 0 1 . 0 ) ] [ASSUME t h e t a ( s a f e − s q r t ( safe−beta ( safe−log 11.602) 1 . 0 ) ) ] [ASSUME t h e t a ( s a f e − b e t a ( s a f e − s q r t 2 7 . 8 1 0 ) 1 . 0 ) ] [ASSUME t h e t a ( b e t a 5 . 0 1 . 0 ) ] [ PREDICT t h e t a ] Рисунок 12 — (слева) Вероятностная модель бета-биномиального распределения (в несжатой форме) в виде вероятностной программы. В рамках эксперимента была поставлена задача найти формализацию апостериорного распределения скрытого параметра θ в виде другой вероятностной программы, чье априорное распределение будет совпадать или приближать данное апостериорное. (справа, сверху) Найденные вероятностные программы (т.е., результат «компиляции» вероятностных программ), априорное распределение которых приближает заданное апостериорное распределение. (справа, внизу) Записанный человеком исходный код вероятностной программы, чье априорное распределение совпадает с априорным распределением. В данном конкретном случае данная вероятностная программа может быть просто выведена аналитически, так как Бета-распределение является сопряженным к биномиальному, но в общем случае это нетривиальная задача. лаемого апостериорного распределения путем использования методом Монте-Карло или аналогичным им является единственным доступным средством за разумное время, эта проблема стоит еще острее. В качестве самых предварительных результатов мы провели эксперимент, в рамках которого наша априорная модель была моделью бета-биномиального распределения (в несжатой форме) с априорным распределением на скрытый параметр θ ∼ Beta(1.0, 1.0), и использовали алгоритм Метрополиса-Гастингса для получения выборки X̂ из апостериорного распределения скрытого параметра θ с учетом проведения четырех успешных испытаний по схеме Бернулли Bernoulli(θ). Соответствующая вероятностная программа представлена на рис. 12. Затем мы использовали наш подход к выводу вероятностных программ, априорное распределение которых будет статистически схожим с полученной выборкой из желаемого апостериорного распределения. Примеры найденных вероятностных программ даны на рис. 12. В данном конкретном случае мы можем аналитически найти и записать в виде вероятностной программы апостериорное распределение, равное Beta(5.0, 1.0). Таким образом, полученные результаты показывают, что мы нашли хорошее приближение апостериорного распределения. 40 2.6 Обобщение порождающего вероятностного программирования Как было отмечено ранее, порождающие вероятностные модели определяют совместное распределение (T, X), часто задаваемое сначала с помощью распределения (T ), а затем с помощью условного распределения (X | T ). Порождающие вероятностные модели могут использоваться либо для генерации выборок напрямую из (T, X), либо в качестве промежуточного этапа для нахождения условного распределения скрытых параметров (T | X = x̂), обычно с помощью приближенных методов статистического вывода или оптимизации. В рамках наших экспериментов, описанных выше, мы решали задачу вывода вероятностной программы, которая определяет вероятностную модель (в общем случае параметризованную), априорное распределение которой соответствует или приближает искомое распределение, заданное аналитически, или в виде выборки, или в виде дорогостоящего генератора элементов выборки. На языке вероятностного программирования Church, поддерживающего проведение статистического запроса внутри другого статистического запроса, данная задача может быть сформулирована следующим образом (подобно тому, как мы ее формулировали в Anglican/Venture, см. 4 и 5): 1 ( query 2 ( d e f i n e program−text ( p r o d u c t i o n s INPUT−TYPES OUTPUT−TYPE) ) 3 ( d e f i n e program 4 ( eval ( l i s t ‘ lambda ‘ ( arg1 . . . ar g N) program−text ) ) ) 5 program−text 6 (and 7 8 ( noisy−distance−equal ( get−statistics 9 ( multiple−query 10 ; No d e f i n e s . 11 ( program arg1_1 . . . arg1_N ) 12 true )) 13 14 expected−statistics1 ) ... 41 ( noisy−distance−equal 15 ( get−statistics 16 17 ( multiple−query 18 ; No d e f i n e s . 19 ( program argM_1 . . . argM_N) 20 true )) expected−statisticsM ))) 21 где (query defines expression predicate) — задание запроса в Church (см. [2]), INPUT-TYPES — перечисление типов входных аргументов, OUTPUT-TYPE — тип выходного значения процедуры, noisy-distance-equal — функция сравнения статистик, get-statistics — функция извлечения статистик из распределения, multiple-query — аналог query, возвращающий несколько элементов из распределения вместо одного элемента, expected-statistics... — M значений статистик искомого распределения. Автор считает, что более общо, для нахождения вероятностной модели, служащей вспомогательным инструментом в нахождении условного апостериорного распределения P (T | X = x̂), мы можем быть заинтересованы в постановке задачи следующим образом: 1 ( query 2 ( d e f i n e l a t e n t − v a r i a b l e s − c r e a t o r ( l a t e n t − p r o d u c t i o n s LATENT−TYPES) ) 3 ( d e f i n e program−text 4 5 6 ( p r o d u c t i o n s LATENT−TYPES INPUT−TYPES OUTPUT−TYPE) ) ( d e f i n e program ( eval ( l i s t ‘ lambda ‘ ( arg1 . . . argN ) program−text ) ) ) 7 ( l i s t l a t e n t − v a r i a b l e s − c r e a t o r program−text ) 8 (and 9 ( noisy−latents−equal 10 ( multiple−query 11 ( define latent−variables ( latent−variables−creator )) 12 latent−variables 13 ( noisy−outputs−equal 14 ( program l a t e n t − v a r i a b l e s arg1_1 . . . arg1_N ) output1 ) ) 42 15 expected−latents1 ) 16 ... 17 ( noisy−latents−equal 18 ( multiple−query 19 ( define latent−variables ( latent−variables−creator )) 20 latent−variables 21 ( noisy−outputs−equal ( program l a t e n t − v a r i a b l e s argM_1 . . . argM_N) outputM ) ) 22 23 expected−latentsM ) ) ) где latent-productions — правила порождения объекта, представляющего скрытые параметры типов LATENT-TYPES, «лениво» создаваемые с помощью процедуры mem (см. [2]); latent-variables — объект, представляющий скрытые параметры; arg..._... — M значений аргументов, output... — M значений наблюдаемых данных; expected-latents... — M значений ожидаемых скрытых параметров. Таким образом, в рамках данной формулировки мы ищем вероятностную программу, содержащую: скрытые переменные, определяемые latent-variables; наблюдаемые переменные, определяемые выполнением program; и вывод производится с учетом M тренировочных троек {ai , t̂i , x̂i }, где ai — дополнительная параметризация, x̂i — значения наблюдаемых переменных, t̂i — ожидаемые значения скрытых переменных. Следует отметить, что так как в настоящее время обобщенный статистический вывод с использованием вероятностных языков программирования производится достаточно медленно, то решение практических задач таким образом пока не имеет смысла. С другой стороны, с дальнейшим развитием [4, 3] обобщенных методов статистического вывода и других решений (например, оптимизации или поиска), с использовании более продуманных алгоритмов программной реализации и структур данных [3, 27], со специализированным аппаратным обеспечением [49, 50], автоматизированная генерация и использование порождающих вероятностных моделей может успешно и продуктивно применяться на практике. 43 ЗАКЛЮЧЕНИЕ В первой части данной работы очень кратко и реферативно представлено введение в вероятностное программирование на примере языков Church/Venture/Anglican, первое подобное введение на русском языке, насколько известно автору. Во второй части данной работы представлен подход к порождению вероятностных программ, обобщающих распределения, представленные либо в виде выборки, либо в виде аналитического представления (например, в виде значения статистик), причем метавероятностная модель вероятностных моделей также записывается в виде вероятностной программы. Используя данный подход, были получены предварительные положительные результаты статистического вывода из апостериорного распределения искомых вероятностных программ методами Монте-Карло по схеме цепей Маркова, в том числе была автоматически выведена вероятностная программа, генерирующая элементы выборки всего семейства распределений Бернулли. 44 СПИСОК ИСПОЛЬЗОВАННЫХ ИСТОЧНИКОВ [1] Goodman Noah D. The principles and practice of probabilistic programming // ACM SIGPLAN Notices / ACM. — Vol. 48. — 2013. — P. 399–402. [2] Church: A language for generative models / Noah D. Goodman, Vikash K. Mansinghka, Daniel M. Roy et al. — 2008. — P. 220–229. [3] Mansinghka Vikash, Selsam Daniel, Perov Yura. Venture: a higher-order probabilistic programming platform with programmable inference // arXiv preprint arXiv:1404.0099. — 2014. [4] Wood Frank, van de Meent Jan Willem, Mansinghka Vikash. A new approach to probabilistic programming inference // Proceedings of the 17th International conference on Artificial Intelligence and Statistics. — 2014. [5] Approximate Bayesian image interpretation using generative probabilistic graphics programs / Vikash Mansinghka, Tejas D Kulkarni, Yura N Perov, Josh Tenenbaum // Advances in Neural Information Processing Systems. — 2013. — P. 1520–1528. [6] Perov Yura N, Wood Frank D. Learning probabilistic programs (статья отправлена на конференцию). — 2014. [7] Лопатников Леонид Исидорович. Экономико-математический словарь. — 5-е изд., перераб. и доп. — М.: Дело, 2003. [8] Ветров Дмитрий Петрович, Кропотов Дмитрий Александрович. Байесовские методы машинного обучения (курс лекций). Методы Монте-Карло по схеме Марковских цепей. — 2011. — URL: http://www.machinelearning.ru/wiki/images/6/6b/BMMO11_ 10.pdf. [9] Рассел Стюарт, Норвиг Питер. Искусственный интеллект: современный подход (2-е издание). — «Вильямс», 2007. [10] Bishop Christopher. Pattern Recognition and Machine Learning. — Springer, New York, 2006. [11] Murphy Kevin P. Machine learning: a probabilistic perspective. — MIT Press, 2012. [12] Ветров Дмитрий Петрович, Кропотов Дмитрий Александрович. Байесовские методы 45 машинного обучения (курс лекций). — 2013. — URL: http://www.machinelearning. ru/. [13] Сайт о вероятностном программировании. — 2014. — URL: http:// probabilistic-programming.org/. [14] Абельсон Харольд, Сассман Джеральд Джей. Структура и интерпретация компьютерных программ. — Добросвет, КДУ, 2010. [15] Freer Cameron, Mansinghka Vikash, Roy Daniel. When are probabilistic programs probably computationally tractable? // NIPS 2010 Workshop on Monte Carlo Methods in Modern Applications. — 2010. [16] Wingate David, Stuhlmueller Andreas, Goodman Noah D. Lightweight implementations of probabilistic programming languages via transformational compilation. — 2011. — P. 131. [17] Николенко Сергей Игоревич. Вероятностное обучение (курс лекций). — 2007. — URL: http://logic.pdmi.ras.ru/~sergey/index.php?page=mlbayes. [18] Chib Siddhartha, Greenberg Edward. Understanding the metropolis-hastings algorithm // The American Statistician. — 1995. — Vol. 49, no. 4. — P. 327–335. [19] Зубков А. М., Шуваев Д. В. Вычисление моментов комбинаторных статистик от перестановочных случайных величин // Дискретная математика. — 2005. [20] Perov Yura, Mansinghka Vikash. Exploiting Conditional Independence for Efficient, Automatic Multicore Inference for Church. — 2012. [21] Blei David M, Ng Andrew Y, Jordan Michael I. Latent dirichlet allocation // the Journal of machine Learning research. — 2003. — Vol. 3. — P. 993–1022. [22] Wu Jeff. Reduced traces and JITing in Church : Ph. D. thesis / Jeff Wu ; Massachusetts Institute of Technology. — 2013. [23] CAPTCHA: Using hard AI problems for security / Luis Von Ahn, Manuel Blum, Nicholas J Hopper, John Langford // Advances in Cryptology—EUROCRYPT 2003. — Springer, 2003. — P. 294–311. [24] Goodman N. D., Tenenbaum J. B. Probabilistic Models of Cognition. — 2014. — URL: https://probmods.org/. 46 [25] A Repository for Generative Models (composite authors, edited by Andreas Stuhlmüller). — 2014. — URL: http://forestdb.org/. [26] Wood Frank et al. Probabilistic Programming Tutorial (Machine Learning Summer School, Iceland). — 2014. — URL: http://www.robots.ox.ac.uk/~fwood/anglican/teaching/ mlss2014/. [27] Paige Brooks, Wood Frank. A Compilation Target for Probabilistic Programming Languages. — 2014. [28] Maddison Chris J, Tarlow Daniel. Structured Generative Models of Natural Source Code. — 2014. [29] Liang Percy, Jordan Michael I, Klein Dan. Learning programs: A hierarchical Bayesian approach. — 2010. — P. 639–646. [30] Marsaglia George, Bray Thomas A. A convenient method for generating normal variables. — 1964. — Vol. 6, no. 3. — P. 260–264. [31] Box George EP, Muller Mervin E et al. A note on the generation of random normal deviates. — 1958. — Vol. 29, no. 2. — P. 610–611. [32] Devroye Luc. Non-Uniform Random Variate Generation. — 1986. [33] Gulwani Sumit, Kitzelmann Emanuel, Schmid Ute. Approaches and Applications of Inductive Programming (Dagstuhl Seminar 13502). — 2014. — Vol. 3, no. 12. — P. 43– 66. — URL: http://drops.dagstuhl.de/opus/volltexte/2014/4507. [34] Looks Moshe. Program evolution for general intelligence // FRONTIERS IN ARTIFICIAL INTELLIGENCE AND APPLICATIONS. — 2007. — Vol. 157. — P. 125. [35] Muggleton Stephen, De Raedt Luc. Inductive logic programming: Theory and methods. — 1994. — Vol. 19. — P. 629–679. [36] Muggleton Stephen, Feng Cao. Efficient induction of logic programs. — 1992. — Vol. 38. — P. 281–298. [37] De Raedt Luc, Kersting Kristian. Probabilistic inductive logic programming. — Springer, 2008. [38] Kersting Kristian. An inductive logic programming approach to statistical relational 47 learning / IOS Press. — 2005. — P. 1–228. — URL: http://people.csail.mit.edu/ kersting/FAIAilpsrl/. [39] Muggleton Stephen. Stochastic logic programs. — 1996. — Vol. 32. — P. 254–264. [40] Exploiting compositionality to explore a large space of model structures / Roger Grosse, Ruslan R Salakhutdinov, William T Freeman, Joshua B Tenenbaum. — 2012. [41] Structure discovery in nonparametric regression through compositional kernel search / David Duvenaud, James Robert Lloyd, Roger Grosse et al. — 2013. [42] Hwang Irvin, Stuhlmüller Andreas, Goodman Noah D. Inducing probabilistic programs by Bayesian program merging. — 2011. [43] Gordon Andrew D. An Agenda for Probabilistic Programming: Usable, Portable, and Ubiquitous // Workshop on Probabilistic Programming: Democratizing Machine Learning. — 2013. [44] Markov chain Monte Carlo without likelihoods / Paul Marjoram, John Molitor, Vincent Plagnol, Simon Tavaré. — 2003. — Vol. 100, no. 26. — P. 15324–15328. [45] Johnson Mark, Griffiths Thomas L, Goldwater Sharon. Adaptor grammars: A framework for specifying compositional nonparametric Bayesian models. — 2007. — Vol. 19. — P. 641. [46] Knuth Donald E. The Art of Computer Programming, 3rd edn., vol. 2. — 1998. [47] Quinlan J. Ross. Simplifying decision trees. — 1987. — Vol. 27, no. 3. — P. 221–234. [48] Bache K., Lichman M. UCI Machine Learning Repository. — 2013. — URL: http: //archive.ics.uci.edu/ml. [49] Tenenbaum Joshua B, Jonas Eric M, Mansinghka Vikash K. Stochastic Digital Circuits for Probabilistic Inference. — 2008. [50] Jonas Eric Michael. Stochastic architectures for probabilistic computation : Ph. D. thesis / Eric Michael Jonas ; Massachusetts Institute of Technology. — 2014. 48
6cs.PL
A modal Logic for Termgraph Rewriting ⋆ Ph. Balbiani1 , R. Echahed2 , and A. Herzig1 arXiv:1003.4369v1 [cs.LO] 23 Mar 2010 1 Université de Toulouse, CNRS Institut de Recherche en Informatique de Toulouse (IRIT) 118 route de Narbonne, 31062 Toulouse Cedex 9, France {balbiani,herzig}@irit.fr 2 Laboratoire LIG Bât IMAG C BP 53 38041 Grenoble Cedex, France [email protected] Abstract. We propose a modal logic tailored to describe graph transformations and discuss some of its properties. We focus on a particular class of graphs called termgraphs. They are first-order terms augmented with sharing and cycles. Termgraphs allow one to describe classical datastructures (possibly with pointers) such as doubly-linked lists, circular lists etc. We show how the proposed logic can faithfully describe (i) termgraphs as well as (ii) the application of a termgraph rewrite rule (i.e. matching and replacement) and (iii) the computation of normal forms with respect to a given rewrite system. We also show how the proposed logic, which is more expressive than propositional dynamic logic, can be used to specify shapes of classical data-structures (e.g. binary trees, circular lists etc.). 1 Introduction Graphs are common structures widely used in several areas in computer science and discrete mathematics. Their transformation constitute a domain of research per se with a large number of potential applications [11, 8, 9]. There are many different ways to define graphs and graph transformation. We consider in this paper structures known as termgraphs and their transformation via rewrite rules [5, 10]. Roughly speaking, a termgraph is a first-order term with possible sharing (of sub-terms) and cycles. Below we depict three examples of termgraphs : G0 is a classical first-order term. G1 represents the same expression as G0 but argument x is shared. G1 is often used to define the function double double(x) = G1 . The second termgraph G2 represents a circular list of two “records” (represented here by operator cons) sharing the same content G1 . ⋆ This work has been partly funded by the project ARROWS of the French Agence Nationale de la Recherche. x {{ }{ { +C CC C! + x   x s consI II II $ + / cons uu u uz u   x G0 G1 G3 Termgraphs allow to represent real-world data structures (with pointers) such as circular lists, doubly-linked lists etc [7], and rewriting allows to efficiently process such graphs. They are thus a suitable framework for declarative languages dealing with such complex data structures. However, while there exist rewriting-based proof methods for first-order terms, there is a lack of appropriate termgraph rewriting proof methods, diminishing thus their operational benefits. Indeed, equational logic provides a logical setting for first-order term rewriting [4], and many theorem provers use rewrite techniques in order to efficiently achieve equational reasoning. In [6] an extension of first-order (clausal) logic dealing with termgraphs has been proposed to give a logic counterpart of termgraph rewriting. In such a logic operations are interpreted as continuous functions [12, 13] and bisimilar graphs cannot be distinguished (two termgraphs are bisimilar if and only if they represent the same rational term). Due to that, reasoning on termgraphs is unfortunately much trickier than in first-order classical logic. For example, equational theories on termgraphs are not recursively enumerable whereas equational theories on terms are r.e.). In this paper, we investigate a modal logic with possible worlds semantics which better fits the operational features of termgraph rewriting systems. Termgraphs can easily be interpreted within the framework of possible worlds semantics, where nodes are considered as worlds and edges as modalities. Based on this observation, we investigate a new modal logic which has been tailored to fit termgraph rewriting. We show how termgraphs as well as rewrite rules can be specified by means of modal formulae. In particular we show how a rewrite step can be defined by means of a modal formula which encodes termgraph matching (graph homomorphism) and termgraph replacement (graph construction and modification). We show also how to define properties on such structures, such as being a list, a circular list, a tree, a binary tree. The computation of termgraph normal form is formulated in this new logic. In addition, we formulate invariant preservation by rewriting rules and discuss subclasses for which validity is decidable. The next two sections introduce respectively the considered class of termgraph rewrite systems and the proposed modal logic. In section 4 we discuss briefly the expressive power of the modal logic and show particularly how graph homomorphisms can be encoded. In section 5 we show how elementary graph transformations can be expressed as modal logic formulae whareas section 6 shows how termgraph rewriting can be specified as modal formulae. Section 7 gives some concluding remarks. 2 Termgraph Rewriting This section defines the framework of graph rewrite systems that we consider in the paper. There are different approaches in the literature to define graph transformations. We follow here an algorithmic approach to termgraph rewriting [5]. Our definitions are consistent with [7]. Definition 21 (Graph) A termgraph, or simply a graph is a tuple G = (N , E, Ln , Le , S, T ) which consists of a finite set of nodes N , a finite set of edges E, a (partial) node labelling function Ln : N → Ω which associates labels in Ω to nodes in N , a (total) edge labelling function Le : E → F which associates, to every edge in E, a label (or feature) in F , a source function S : E → N and a target function T : E → N which specify respectively, for every edge e, its source S(e) and its target T (e). Note that G is a first-order term if and only if G is a tree. We assume that the labelling of edges Le fulfills the following additional determinism condition: ∀e1 , e2 ∈ E, (S(e1 ) = S(e2 ) and Le (e1 ) = Le (e2 )) implies e1 = e2 . This last condition expresses the fact that for every node n there exists at most one edge e of label a such that the source of e is n. We denote such an edge by the tuple (n, a, m) where m is the target of edge e. Notation: For each labelled node n the fact that ω = Ln (n) is written n : ω, and each unlabelled node n is written as n : •. This ‘unlabelled’ symbol • is used in termgraphs to represent anonymous variables. n : ω(a1 ⇒ n1 , . . . , ak ⇒ nk ) describes a node n labelled by symbol ω with k outgoing edges, e1 , . . . , ek , such that for every edge ei , Le (ei ) = ai , S(ei ) = n and T (ei ) = ni . In the sequel we will use the linear notation of termgraphs [5] defined by the following grammar. The variable A (resp. F and n) ranges over the set Ω (resp. F and N ) : TermGraph ::= Node | Node + TermGraph Node ::= n:A(F ⇒ Node,. . . ,F ⇒ Node) | n:• | n the operator + stands for the disjoint union of termgraph definitions. We assume that every node is labelled at most once. The expression n : ω(n1 , . . . , nk ) stands for n : ω(1 ⇒ n1 , . . . , k ⇒ nk ). A graph homomorphism, h : G → G1 , where G = (N , E, Ln , Le , S, T ) and G1 = (N1 , E1 , Ln1 , Le1 , S1 , T1 ) is a pair of functions h = (hn , he ) with hn : N → N1 and he : E → E1 which preserves the labelling of nodes and edges as well as the source and target functions. This means that for each labelled node m in G, Ln1 (hn (m)) = Ln (m) and for each edge f in G, Le1 (he (f )) = Le (f ), S1 (he (f )) = hn (S(f )) and T1 (he (f )) = hn (T (f )). Notice that the image by hn of an unlabelled node may be any node. Remark: Because of the determinism condition, a homomorphism h : G → G1 is completely defined by the function hn : N → N1 which should satisfy the following conditions : for each labelled node m in G, Ln1 (hn (m)) = Ln (m) and for every outgoing edge from m, say (m, a, w), for some feature a and node w, the edge (hn (m), a, hn (w)) belongs to E1 . Example 22 Let B1 , B2 and B3 be the following termgraphs. B1 : n 0 : h 1  n1 : gM MMaM M& b n2 : • n3 : • B2 : B n 0 : h B3 : n 0 : h 1  n1 : gL LLLa LL% b n3 : • n2 : 0 1 n1 : g b  a n2 : 0 and h and h′ be two functions on nodes defined as follows: h(ni ) = ni for i in {0, 1, 2, 3} and h′ (ni ) = ni for i in {0, 1, 2} and h′ (n3 ) = n2 . h defines a homomorphism from B1 to B2 . h′ defines a homomorphism from B1 to B3 and from B2 to B3 . There is no homomorphism from B3 to B2 or to B1 , nor from B2 to B1 . The following definition introduces a notion of actions. Each action specifies an elementary transformation of graphs. These elementary actions are used later on to define graph transformations by means of rewrite rules. Definition 23 (Actions) An action has one of the following forms. – a node definition or node labelling n : f (a1 ⇒ n1 , . . . , ak ⇒ nk ) where n, n1 , . . . , nk are nodes and f is a label of node n. For i ∈ {1, . . . , k}, ai is the label of an edge, ei , such that (Le (ei ) = ai ) and whose source is n (S(ei ) = n) and target is node ni (T (ei ) = ni ). This action, first creates a new node n if n does not already exist in the context of application of the action. Then node n is defined by its label and its outgoing edges. – an edge redirection or local redirection n ≫a m where n, m are nodes and a is the feature of an edge e outgoing node n (S(e) = n and Le (e) = a). This action is an edge redirection and means that the target of edge e is redirected to point to the node m (i.e., T (e) = m after performing the action n ≫a m). – a global redirection n ≫ m where n and m are nodes. This means that all edges e pointing to n (T (e) = n) are redirected to point to the node m (T (e) = m). The result of applying an action α to a termgraph G = (N , E, Ln , Le , S, T ) is denoted by α[G] and is defined as the following termgraph G1 = (N1 , E1 , Ln1 , Le1 , S1 , T1 ) such that : – If α = n : f (a1 ⇒ n1 , . . . , ak ⇒ nk ) then • N1 = N ∪ {n, n1 , . . . , nk }, • Ln1 (n) = f and Ln1 (m) = Ln (m) if m 6= n, • Let E = {ei | 1 ≤ i ≤ k, ei is an edge such that S(ei ) = n, T (ei ) = e ni and L (ei ) = ai }. E1 = E ∪ E, ai if e = ei ∈ E e • L1 (e) = Le (e) if e 6∈ E  n if e = ei ∈ E S(e) if e 6∈ E  ni if e = ei ∈ E • T1 (e) = T (e) if e 6∈ E ∪ denotes classical union. This means that the nodes in {n, n1 , . . . , nk } which already belong to G are reused whereas the others are new. – If α = n ≫a m then • N1 = N , Ln1 = Ln , Le1 = Le , S1 = S and • Let e be the edge of label a outgoing n. T1 (e) = m and T1 (e′ ) = T (e′ ) if e′ 6= e. – If α = n ≫ m then N1 = N , Ln1 = Ln , Le1 = Le , S1 = S and  m if T (e) = n T1 (e) = T (e) otherwise • S1 (e) = A rooted termgraph is a termgraph G with a distinguished node n called its root. We write G = (N , E, Ln , Le , S, T , n). The application of an action α to a rooted termgraph G = (N , E, Ln , Le , S, T , n) is a rooted termgraph G1 = (N1 , E1 , Ln1 , Le1 , S1 , T1 , n1 ) such that G1 = α[G] and root n1 is defined as follows : – n1 = n if α is not of the form n ≫ p. – n1 = p if α is of the form n ≫ p. The application of a sequence of actions ∆ to a (rooted) termgraph G is defined inductively as follows : ∆[G] = G if ∆ is the empty sequence and ∆[G] = ∆′ [α[G]] if ∆ = α; ∆′ where “;” is the concatenation (or sequential) operation. Let h be a homomorphism. We denote by h(∆) the sequence of actions obtained from ∆ by substituting every node m occurring in ∆ by h(m). Example 24 This example illustrates the application of actions. Let H1 , H2 , H3 , H4 and H5 be the following termgraphs. H2 : n1 : gL LLLa LL% b n3 : • n2 : 0 H1 : n 1 : f a  n2 : 0 1 n1 : gL LLLa LL% b n3 : • n2 : 0 H5 : H4 : n 0 : h 1 b  n1 : g b  a n2 : 0 H3 : n 0 : h n3 : • nB 0 : h\ a 1 n1 : g n2 : 0 n3 : • H2 is obtained from H1 by applying the action n1 : g(b ⇒ n2 , a ⇒ n3 ). n1 is relabelled whereas n3 is a new unlabelled node. H3 is obtained from H2 by applying the action α = n0 : h(n1 ). n0 is a new node labelled by h. h has one argument n1 . H4 is obtained from H3 by applying the action n1 ≫a n2 . The effect of this action is to change the target n3 of the edge (n1 , a, n3 ) by n2 . H5 is obtained from H4 by applying the action n2 ≫ n0 . This action redirects the incoming edges of node n2 to target node n0 . Definition 25 (Rule, system, rewrite step) A rewrite rule is an expression of the form l → r where l is a termgraph and r is a sequence of actions. A rule is written l → (a1 , . . . , an ) or l → a1 ; . . . ; an where the a′i s are elementary actions. A termgraph rewrite system is a set of rewrite rules. We say that the term-graph G rewrites to G1 using the rule l → r iff there exists a homomorphism h : l → G and G1 = h(r)[G]. We write G →l→r G1 , or simply G → G1 . Example 26 We give here an example of a rewrite step. Consider the following rewrite rule: n1 : g(a ⇒ n2 : •, b ⇒ n3 : •) → n0 : h(1 ⇒ n1 ); n1 ≫a n2 ; n2 ≫ n0 The reader may easily verify that the graph H2 of Example 24 can be rewritten by the considered rule into the graph H5 of Example 24. Example 27 We give here somme illustrating examples of the considered class of rewrite systems. We first define an operation, insert, which inserts an element in a circular list. r : insert(m : •, p1 : cons(m1 : •, p1 )) → p2 : cons(m, p1 ); p1 ≫2 p2 ; r ≫ p2 r : insert(m : •, p1 : cons(m1 : •, p2 ))+p3 : cons(m2 , p1 ) → p4 : cons(m, p1 ); p3 ≫2 p4 ; r ≫ p4 As a second example, we define below the operation length which computes the number of elements of any, possibly circular, list. r : length(p : •) → r′ : length′(p, p); r ≫ r′ r : length′ (p1 : nil, p2 : •) → r′ : 0; r ≫ r′ r : length′ (p1 : cons(n : •, p2 : •), p2 ) → r′ : succ(0); r ≫ r′ r : length′ (p1 : cons(n : •, p2 : •), p3 : •) → r′ : s(q : •); q : length′ (p2 , p3 ); r ≫ r′ Pointers help very often to enhance the efficiency of algorithms. In the following, we define the operation reverse which performs the so-called “in-situ list reversal”. o : reverse(p : •) → o′ : reverse′ (p, q : nil); o ≫ o′ o : reverse′ (p1 : cons(n : •, q : nil), p2 : •) → p1 ≫2 p2 ; o ≫ p1 o : reverse′ (p1 : cons(n : •, p2 : cons(m : •, p3 : •), p4 : •) → p1 ≫2 p4 ; o ≫1 p2 ; o ≫2 p1 The last example illustrates the encoding of classical term rewrite systems. We define the addition on naturals as well as the function double with their usual meanings. r : +(n : 0, m : •) → r ≫ m r : +(n : succ(p : •), m : •) → q : succ(k : +(p, m)); r ≫ q r : double(n : •) → q : +(n, n); r ≫ q 3 Modal logic It is now time to define the syntax and the semantics of the logic of graph modifiers that will be used as a tool to talk about rooted termgraphs. 3.1 Syntax Like the language of propositional dynamic logic, the language of the logic of graph modifiers is based on the idea of associating with each action α of an action language a modal connective [α]. The formula [α]φ is read “after every terminating execution of α, φ is true”. Consider, as in section 2, a countable set F (with typical members denoted a, b, etc) of edge labels and a countable set Ω (with typical members denoted ω, π, etc) of node labels. These labels are formulas defined below. A node labeled by π is called a π node. Formally we define the set of all actions (with typical members denoted α, β, etc) and the set of all formulas (with typical members denoted φ, ψ, etc) as follows: – α ::= a | U | n | n | φ? | (ω :=g φ) | (ω :=l φ) | (a + (φ, ψ)) | (a − (φ, ψ)) | (α; β) | (α ∪ β) | α⋆ , – φ :: ω | ⊥ | ¬φ | (φ ∨ ψ) | [α]φ. We adopt the standard abbreviations for the other Boolean connectives. Moreover, for all actions α and for all formulas φ, let hαiφ be ¬[α]¬φ. As usual, we follow the standard rules for omission of the parentheses. An atomic action is either an edge label a in F , the universal action U , a test φ? or an update action n, n, ω :=g φ, ω :=l φ, a + (φ, ψ) or a − (φ, ψ). U reads “go anywhere”, n reads “add some new node”, n reads “add some new node and go there”, ω :=g φ reads “assign to ω nodes the truth value of φ everywhere (globally)”, ω :=l φ reads “assign to ω the truth value of φ here (locally)”, a + (φ, ψ) reads “add a edges from all φ nodes to all ψ nodes”, and a − (φ, ψ) reads “deletea edges from all φ nodes to all ψ nodes”. Complex actions are built by means of the regular operators “;”, “∪” and “⋆ ”. An update action is an action without edge labels and without U . An update action is :=l -free if no local assignment ω :=l φ occurs in it. 3.2 Semantics Like the truth-conditions of the formulas of ordinary modal logics, the truthconditions of the formulas of the logic of graph modifiers is based on the idea of interpreting, within a rooted termgraph G = (N , E, Ln , Le , S, T , n0 ), edge labels in F by sets of edges and node labels in Ω by sets of nodes. In this section, we consider a more general notion of node labeling functions Ln of termgraphs such that nodes can have several labels (propositions). In this case the labeling function has the following profile Ln : N → P(Ω). Node labeling functions considered in section 2 where a node can have at most one label is obviously a particular case. Let IG be the interpretation function in G of labels defined as follows: – IG (a) = {e ∈ E: Le (e) = a}, – IG (ω) = {n ∈ N : ω ∈ Ln (n)}. For all abstract actions a, let RG (a) = {(n1 , n2 ): there exists an edge e ∈ IG (a) such that S(e) = n1 and T (e) = n2 } be the binary relation interpreting the abstract action a in G. The truth-conditions of the formulas of the logic of graph modifiers are defined by induction as follows: – – – – – G |= ω iff n0 ∈ IG (ω), G 6|= ⊥, G |= ¬φ iff G 6|= φ, G |= φ ∨ ψ iff G |= φ or G |= ψ, G |= [α]φ iff for all rooted termgraphs G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), if G −→α G′ then G′ |= φ where the binary relations −→α are defined by induction as follows: – G −→a G′ iff N ′ = N , E ′ = E, Ln ′ = Ln , Le ′ = Le , S ′ = S, T ′ = T and (n0 , n′0 ) ∈ RG (a), – G −→φ? G′ iff N ′ = N , E ′ = E, Ln ′ = Ln , Le ′ = Le , S ′ = S, T ′ = T , n′0 = n0 and G′ |= φ, – G −→U G′ iff N ′ = N , E ′ = E, Ln ′ = Ln , Le ′ = Le , S ′ = S and T ′ = T , – G −→n G′ iff N ′ = N ∪ {n1 } where n1 is a new node, E ′ = E, Ln ′ (m) = Ln (m) if m 6= n1 , Ln ′ (n1 ) = ∅, Le ′ = Le , S ′ = S, T ′ = T and n′0 = n0 , – G −→n G′ iff N ′ = N ∪ {n1 } where n1 is a new node, E ′ = E, Ln ′ (m) = Ln (m) if m 6= n1 , Ln ′ (n1 ) = ∅, Le ′ = Le , S ′ = S, T ′ = T and n′0 = n1 , – G −→ω:=g φ G′ iff N ′ = N , E ′ = E, Ln ′ (m) = if (N , E, Ln , Le , S, T , m) |= φ} then Ln (m) ∪ {ω} else Ln (m) \ {ω}, Le ′ = Le , S ′ = S, T ′ = T and n′0 = n0 , – G −→ω:=l φ G′ iff N ′ = N , E ′ = E, Ln ′ (n0 ) = if (N , E, Ln , Le , S, T , n0 ) |= φ then Ln (n0 ) ∪ {ω} else Ln (n0 ) \ {ω}, Ln ′ (m) = Ln (m) if m 6= n0 , Le ′ = Le , S ′ = S, T ′ = T and n′0 = n0 , – G −→a+(φ,ψ) G′ iff N ′ = N , E ′ = E ∪ {(n1 , a, n2 ) : (N , E, Ln , Le , S, T , n1 ) |= φ and (N , E, Ln , Le , S, T , n2 ) |= ψ}, Ln ′ = Ln , Le ′ (e) = if e ∈ E then Le (e) else a, S ′ (e) = if e ∈ E then S(e) else e is of the form (n1 , a, n2 ) and S ′ (e) = n1 , T ′ = if e ∈ E then T (e) else e is of the form (n1 , a, n2 ) and T ′ (e) = n2 and n′0 = n0 , – G −→a−(φ,ψ) G′ iff N ′ = N , E ′ = E\{(n1 , a, n2 ) : (N , E, Ln , Le , S, T , n1 ) |= φ and (N , E, Ln , Le , S, T , n2 ) |= ψ}, Ln ′ = Ln , Le ′ (e) = Le (e), S ′ = S, T ′ = T and n′0 = n0 , – G −→α;β G′ iff there exists a rooted termgraph G′′ = (N ′′ , E ′′ , Ln ′′ , Le ′′ , S ′′ , T ′′ , n′′0 ) such that G −→α G′′ and G′′ −→β G′ , – G −→α∪β G′ iff G −→α G′ or G −→β G′ , (0) – G −→α⋆ G′ iff there exists a sequence G(0) = (N (0) , E (0) , Ln (0) , Le (0) , S (0) , T (0) , n0 ), (k) . . ., G(k) = (N (k) , E (k) , Ln (k) , Le (k) , S (k) , T (k) , n0 ) of rooted termgraphs (0) (k) ′ such that G = G, G = G and for all non-negative integers i, if i < k then G(i) −→α G(i+1) . The above definitions of formulas reflect our intuitive understanding of the actions of the language of the logic of graph modifiers. Obviously, G |= hαiφ iff there exists a rooted termgraph G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ) such that G −→α G′ and G′ |= φ. The formula φ is said to be valid in class C of rooted termgraphs, in symbols C |= φ, iff G |= φ for each rooted termgraph G = (N , E, Ln , Le , S, T , n0 ) in C. The class of all rooted termgraphs will be denoted more briefly as Call . 3.3 Validities Obviously, as in propositional dynamic logic, we have – – – – Call Call Call Call |= |= |= |= [φ?]ψ ↔ (φ → ψ), [α; β]φ ↔ [α][β]φ, [α ∪ β]φ ↔ [α]φ ∧ [β]φ, [α⋆ ]φ ↔ φ ∧ [α][α⋆ ]φ. If α is a :=l -free update action then – Call |= [α]⊥ ↔ ⊥, – Call |= [α]¬φ ↔ ¬[α]φ, – Call |= [α](φ ∨ ψ) ↔ [α]φ ∨ [α]ψ. The next series of equivalences guarantees that each of our :=l -free update actions can be moved across the abstract actions of the form a or U : Call |= [n][a]φ ↔ [a][n]φ, Call |= [n][U ]φ ↔ [n]φ ∧ [U ][n]φ, Call |= [n][a]φ ↔ ⊤, Call |= [n][U ]φ ↔ [n]φ ∧ [U ][n]φ, Call |= [ω :=g φ][a]ψ ↔ [a][ω :=g φ]φ, Call |= [ω :=g φ][U ]ψ ↔ [U ][ω :=g φ]ψ, Call |= [a + (φ, ψ)][b]χ ↔ [b][a + (φ, ψ)]χ if a 6= b and Call |= [a + (φ, ψ)][b]χ ↔ [b][a + (φ, ψ)]χ ∧ (φ → [U ](ψ → [a + (φ, ψ)]χ)) if a = b, – Call |= [a + (φ, ψ)][U ]χ ↔ [U ][a + (φ, ψ)]χ, – Call |= [a − (φ, ψ)][b]χ ↔ [b][a − (φ, ψ)]χ if a 6= b and Call |= [a − (φ, ψ)][b]χ ↔ (¬φ ∧ [b][a − (φ, ψ)]χ) ∨ (φ ∧ [b](¬ψ → [a − (φ, ψ)]χ)) if a = b, – Call |= [a − (φ, ψ)][U ]χ ↔ [U ][a − (φ, ψ)]χ. – – – – – – – Finally, once we have moved each of our :=l -free update actions across the abstract actions of the form a or U , these update actions can be eliminated by means of the following equivalences: – – – – – Call Call Call Call Call |= |= |= |= |= [n]ω ↔ ω, [n]ω ↔ ⊥, [ω :=g φ]π ↔ π if ω 6= π and Call |= [ω :=g φ]π ↔ φ if ω = π, [a + (φ, ψ)]ω ↔ ω, [a − (φ, ψ)]ω ↔ ω. Proposition 31 For all :=l -free ⋆ -free formulas φ, there exists a :=l -free ⋆ -free formula ψ without update actions such that Call |= φ ↔ ψ. Proof. See the above discussion. Just as for :=l -free update actions, we have the following equivalences for the update actions of the form ω :=l φ: – – – – Call Call Call Call |= |= |= |= [ω [ω [ω [ω :=l :=l :=l :=l φ]⊥ ↔ ⊥, φ]¬ψ ↔ ¬[ω :=l φ]ψ, φ](ψ ∨ χ) ↔ [ω :=l φ]ψ ∨ [ω :=l φ]χ, φ]π ↔ π if ω 6= π and Call |= [ω :=g φ]π ↔ φ if ω = π. But it is not possible to formulate reduction axioms for the cases [ω :=l φ][a]ψ and [ω :=l φ][U ]ψ. More precisely, Proposition 32 There exists a ⋆ -free formula φ such that for all ⋆ -free formulas ψ without update actions, Call 6|= φ ↔ ψ. Proof. Take the ⋆ -free formula φ = [ω :=g ⊥][U ][ω :=l ⊤][a]¬ω. The reader may easily verify that for all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ), G |= φ iff RG (a) is irreflexive. Seeing that the fact that the binary relation interpreting an abstract action of the form a is irreflexive cannot be modally defined in propositional dynamic logic, then for all formulas ψ without update actions, Call 6|= φ ↔ ψ. 3.4 Decidability, axiomatization and a link with hybrid logics Firstly, let us consider the set L of all :=l -free ⋆ -free formulas φ such that Call |= φ. Together with a procedure for deciding membership in ⋆ -free propositional dynamic logic, the equivalences preceding proposition 31 provide a procedure for deciding membership in L. Hence, membership in L is decidable. Secondly, let us consider the set L(:=l ) of all ⋆ -free formulas φ such that Call |= φ. Aucher et al. [3] have defined a recursive translation from the language of hybrid logic [2] into the set of all our ⋆ -free formulas that preserves satisfiability. It is known that the problem of deciding satisfiability of hybrid logic formulas is undecidable [1, Section 4.4]. The language of hybrid logic has formulas of the form @i φ (“φ is true at i”), @x φ (“φ is true at x”) and ↓x.φ (“φ holds after x is bound to the current state”), where NOM = {i1 , . . .} is a set of nominals, and SVAR = {x1 , . . .} is a set of state variables. The (slightly adapted) translation of a given hybrid formula φ0 is recursively defined as follows. τ (ω) =ω τ (i) = ωi where ωi does not occur in φ0 τ (x) = ωx where ωx does not occur in φ0 τ (¬φ) = ¬τ (φ) τ (φ ∨ ψ) = τ (φ) ∨ τ (ψ) τ ([a]φ) = [a]τ (φ) τ ([U ]φ) = [U ]τ (φ) τ (@i φ) = hU i(ωi ∧ τ (φ)) τ (@x φ) = hU i(ωx ∧ τ (φ)) τ (↓x.φ) = [ωx :=g ⊥][ωx :=l ⊤]τ (φ) As the satisfiability problem is undecidable in hybrid logic, membership in L(:=l ) is undecidable, too. Thirdly, let us consider the set L(⋆ ) of all :=l -free formulas φ such that Call |= φ. It is still an open problem whether membership in L(⋆ ) is decidable or not: while the update actions can be eliminated from :=l -free formulas, it is not clear whether this can be done for formulas in which e.g. iterations of assignments occur. As for the axiomatization issue, the equivalences preceding proposition 31 provide a sound and complete axiom system of L, whereas no axiom system of L(:=l ) and L(⋆ ) is known to be sound and complete. 4 Definability of classes of termgraphs For all abstract actions a, by means of the update actions of the form ω :=l φ, we can express the fact that the binary relation interpreting an abstract action of the form a is deterministic, irreflexive or locally reflexive. More precisely, for all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ), – G |= [ω :=g ⊥][π :=g ⊥][U ][ω :=l ⊤][a][π :=l ⊤][U ](ω → [a]π) iff RG (a) is deterministic, – G |= [ω :=g ⊥][U ][ω :=l ⊤][a]¬ω iff RG (a) is irreflexive, – G |= [ω :=g ⊥][ω :=l ⊤]haiω iff RG (a) is locally reflexive in n0 . Together with the update actions of the form ω :=l φ, the regular operation “⋆ ” enables us to define non-elementary classes of rooted termgraphs. As a first example, the class of all infinite rooted termgraphs cannot be modally defined in propositional dynamic logic but the following formula pins it down: – [ω :=g ⊤][(U ; ω?; ω :=l ⊥)⋆ ]hU iω. As a second example, take the class of all a-cycle-free rooted termgraphs. It cannot be modally defined in propositional dynamic logic but the following formula pins it down: – [ω :=g ⊤][U ][ω :=l ⊥][a+ ]ω. As a third example, within the class of all a-deterministic rooted termgraphs, the class of all a-circular rooted termgraphs3 cannot be modally defined in propositional dynamic logic but the following formula pins it down: – [ω :=g ⊥][U ][ω :=l ⊤]ha+ iω. Now, within the class of all rooted termgraphs that are both a- and b-deterministic, the class of all (a ≤ b) rooted termgraphs 4 cannot be modally defined in propositional dynamic logic but the following formula pins it down: – [ω :=g ⊥][ω :=l ⊤][π :=g ⊥][π :=l ⊤][((U ; ω?; a; ¬ω?; ω :=l ⊤); (U ; π?; b; ¬π?; π :=l ⊤))⋆ ](hU i(π ∧ [b]⊥) → hU i(ω ∧ [a]⊥)). Finally, within the class of all finite (a ∪ b)-cycle-free (a, b)-deterministic rooted termgraphs, the class of all (a, b)-binary rooted termgraphs cannot be modally defined in propositional dynamic logic but the following formula pins it down: – [ω :=g ⊥][U ][ω :=l ⊤][a][π :=g ⊤][(a ∪ b)⋆ ][π :=l ⊥][U ](ω → [b][(a ∪ b)⋆ ]π). Most important of all is the ability of the language of the logic of graph modifiers to characterize finite graph homomorphisms. Proposition 41 Let G = (N , E, Ln , Le , S, T , n0 ) be a finite rooted termgraph. There exists a ⋆ -free action αG and a ⋆ -free formula φG such that for all finite rooted termgraphs G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G′ |= hαG iφG iff there exists a graph homomorphism from G into G′ . Proof. Let G = (N , E, Ln , Le , S, T , n0 ) be a finite rooted termgraph. Suppose that N = {0, . . . , N − 1} and consider a sequence (π0 , . . . , πN −1 ) of pairwise distinct elements of Ω. Each πi will identify exactly one node of N , and π0 will identify the root. We define the action αG and the formula φG as follows: – βG = (π0 :=g ⊥); . . . ; (πN −1 :=g ⊥), i – for all non-negative integers i, if i < N then γG = (¬π0 ∧. . .∧¬πi−1 )?; (πi :=l ⊤); U , N −1 0 – αG = βG ; γG ; . . . ; γG , 3 4 In an a-circular rooted termgraph for every node n there is an i and there are a1 , . . . an such that a = a1 = an and nk is related to nk+1 by an edge labelled a, for all k ≤ i. Rooted termgraphs are termgraphs where the path obtained by following feature b is longer than or equal to the path obtained by following feature a. i – for all non-negative integers i, if i < N then ψG = if Ln (i) is defined then n hU i(πi ∧ L (i)) else ⊤, – for all non-negative integers i, j, if i, j < N then χi,j G = if there exists an edge e ∈ E such that S(e) = i and T (e) = j then hU i(πi ∧ hLe (e)iπj ) else ⊤, N −1,N −1 N −1 0 – φG = ψG ∧ . . . ∧ ψG ∧ χ0,0 . G ∧ . . . ∧ χG The reader may easily verify that for all finite rooted termgraphs G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G′ |= hαG iφG iff there exists a graph homomorphism from G to G′ . 5 Definability of transformations of termgraphs In this section we show how elementary actions over termgraphs as defined in Section 2 can be encoded by means of formulas of the proposed modal logic. Let αa be the action defined as follows: – αa = (ω :=g ⊥); (ω :=l ⊤); (π :=g ⊥); (π :=g haiω); (a − (⊤, ω)); n; (ω :=g ⊥); (ω :=l ⊤); (a + (π, ω)). The reader may easily verify that for all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ) and G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G −→αa G′ iff G′ is obtained from G by redirecting every a-edge pointing to the current root towards a freshly created new root. Hence, together with the update actions n, n, ω :=g φ, ω :=l φ, a+ (φ, ψ) and a− (φ, ψ), the regular operations “;”, “∪” and “⋆ ” enable us to define the elementary actions of node labelling, local redirection and global redirection of Section 2. Let us firstly consider the elementary action of node labelling: n : f (a1 ⇒ n1 , . . . , ak ⇒ nk ). Applying this elementary action consists in redirecting towards nodes n1 , . . ., nk the targets of a1 -, . . ., ak - edges starting from node n. It corresponds to the action nl(n : f (a1 ⇒ n1 , . . . , ak ⇒ nk )) defined as follows: – nl(n : f (a1 ⇒ n1 , . . . , ak ⇒ nk )) = U ; πn ?; (f :=l ⊤); (a1 +(πn , πn1 )); . . . ; (ak + (πn , πnk )). where the πi ’s are as in the proof of Proposition 41. The reader may easily verify that for all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ), G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G −→nl(n:f (a1 ⇒n1 ,...,ak ⇒nk )) G′ iff G′ is obtained from G by redirecting towards nodes n1 , . . ., nk the targets of a1 -, . . ., ak - edges starting from node n. Let us secondly consider the elementary action of local redirection: n ≫la m. Applying this elementary action consists in redirecting towards node m the target of an a-edge starting from node n. It corresponds to the action lr(n, a, m) defined as follows: – lr(n, a, m) = (a − (πn , ⊤)); (a + (πn , πm )). The reader may easily verify that for all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ), G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G −→lr(n,a,m) G′ iff G′ is obtained from G by redirecting towards node m the target of an a-edge starting from node n. Let us thirdly consider the elementary action of global redirection: n ≫ga m. Applying this elementary action consists in redirecting towards node n the target of every a-edge pointing towards node m. It corresponds to the action gr(n, a, m) defined as follows: – gr(n, a, m) = (λa :=g ⊥); (λa :=g haiπn ); (a − (⊤, πn )); (a + (λa , πm )). The reader may easily verify that for all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ), G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G −→gr(n,a,m) G′ iff G′ is obtained from G by redirecting towards node n the target of every a-edge pointing towards node m. To redirect towards n the target of all edges pointing towards m, the action V gr(n, a, m). gr(n, a, m) can be performed for all a ∈ F . We get gr(n, m) = a∈F 6 Translating rewrite rules in modal logic Now we are ready to show how termgraph rewriting can be specified by means of formulas of the proposed modal logic. Let G → (a1 , . . . , an ) be a rewrite rule as defined in Section 2, i.e., G = (N , E, Ln , Le , S, T , n0 ) is a finite rooted termgraph and (a1 , . . . , an ) is a finite sequence of elementary actions. We have seen how to associate to G a ⋆ -free action αG and a ⋆ -free formula φG such that for all finite rooted termgraphs G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G′ |= hαG iφG iff there exists a graph homomorphism from G into G′ . We have also seen how to associate to the elementary actions a1 , . . ., an actions α1 , . . ., αn . In the following proposition we show how to formulate the fact that a normal form with respect to a rewrite rule (generalization to a set of rules is obvious) satisfies a given formula ϕ. A termgraph t is in normal form with respect to a rule R iff t cannot be rewritten by means of R. Such formulation may help to express proof obligations of programs specified as termgraph rewrite rules. Let n1 , . . ., nk be the list of all nodes occurring in a1 , . . ., an but not occurring in G. The truth of the matter is that Proposition 61 Let ϕ be a modal formula. For all finite rooted termgraphs G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), every normal form of G′ with respect to G → (a1 , . . . , an ) satisfies ϕ iff G′ |= [(αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g ⊥); (πnk :=l ⊤); α1 ; . . . ; αn )⋆ ]([αG ; φG ?]⊥ → ϕ). Proof. ⇐: Suppose that G′ |= [(αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g ⊥); (πnk :=l ⊤); α1 ; . . . ; αn )⋆ ]([αG ; φG ?]⊥ → ϕ). Consider a normal form Gnf of G′ with respect to G → (a1 , . . . , an ). Then there exists a non-negative integer k and there exist finite rooted termgraphs G0 , . . ., Gk such that: – G0 = G′ , – Gk = Gnf , – for all non-negative integers i, if i < k then Gi →G→(a1 ,...,an ) Gi+1 . Hence, for all non-negative integers i, if i < k then Gi −→αG ;φG ?;n;(πn1 :=g ⊥);(πn1 :=l ⊤);...;n;(πnk :=g ⊥);(πnk :=l ⊤);α1 ;...;αn Gi+1 . Moreover, seeing that Gnf is a normal form with respect to G → (a1 , . . . , an ), Gnf |= [αG ; φG ?]⊥. Since G′ |= [(αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g ⊥); (πnk :=l ⊤); α1 ; . . . ; αn )⋆ ]([αG ; φG ?]⊥ → ϕ), then Gnf |= ϕ. Thus, every normal form of G′ with respect to G → (a1 , . . . , an ) satisfies ϕ. ⇒: Suppose that every normal form of G′ with respect to G → (a1 , . . . , an ) satisfies ϕ. Let Gnf be a finite rooted termgraph such that G′ −→(αG ;φG ?;n;(πn1 :=g ⊥);(πn1 :=l ⊤);...;n;(πnk :=g ⊥);(πnk :=l ⊤);α1 ;...;αn )⋆ Gnf and Gnf |= [αG ; φG ?]⊥. Then Gnf is a normal form of G′ with respect to G → (a1 , . . . , an ). Hence, Gnf satisfies ϕ. Thus, G′ |= [(αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g ⊥); (πnk :=l ⊤); α1 ; . . . ; αn )⋆ ]([αG ; φG ?]⊥ → ϕ). In other respects, the following proposition shows how an invariant ϕ of a rewrite rule can be expressed in the proposed logic. Proposition 62 Let ϕ be a modal formula. The rewrite rule G → (a1 , . . . , an ) strongly preserves ϕ iff |= ϕ → [αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g ⊥); (πnk :=l ⊤); α1 ; . . . ; αn ]ϕ. Proof. ⇐: Suppose that |= ϕ → [αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g ⊥); (πnk :=l ⊤); α1 ; . . . ; αn ]ϕ. Let G′ , G′′ be finite rooted termgraphs such that G′ |= ϕ and G′ →G→(a1 ,...,an ) G′′ . Then G′ |= [αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g ⊥); (πnk :=l ⊤); α1 ; . . . ; αn ]ϕ and G′ −→αG ;φG ?;n;(πn1 :=g ⊥);(πn1 :=l ⊤);...;n;(πnk :=g ⊥);(πnk :=l ⊤);α1 ;...;αn G′′ . Hence, G′′ |= ϕ. Thus, the rewrite rule G → (a1 , . . . , an ) strongly preserves ϕ. ⇒: Suppose that the rewrite rule G → (a1 , . . . , an ) strongly preserves ϕ. Let G′ , G′′ be finite rooted termgraphs such that G′ |= ϕ and G′ −→αG ;φG ?;n;(πn1 :=g ⊥);(πn1 :=l ⊤);...;n;(πnk :=g ⊥);(πnk :=l ⊤);α1 ;...;αn G′′ . Then G′ →G→(a1 ,...,an ) G′′ and G′′ |= ϕ. Thus, |= ϕ → [αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g ⊥); (πnk :=l ⊤); α1 ; . . . ; αn ]ϕ. 7 Conclusion We have defined a modal logic which can be used either (i) to describe datastructures which are possibly defined by means of pointers and considered as termgraphs in this paper, (ii) to specify programs defined as rewrite rules which process these data-structures or (iii) to reason about data-structures themselves and about the behavior of the considered programs. The features of the proposed logic are very appealing. They contribute to define a logic which captures faithfully the behavior of termgraph rewrite systems. They also open new perspectives for the verification of programs manipulating pointers. Our logic is undecidable in general. This is not surprising at all with respect to its expressive power. However, this logic is very promising in developing new proof procedure regarding properties of termgraph rewrite systems. For instance, we have discussed a first fragment of the logic, consisting of formulas without relabelling actions, where validity is decidable. Future work include mainly the investigation of new decidable fragments of our logic and their application to program verification. References 1. C. Areces, P. Blackburn, and M. Marx. A road-map on complexity for hybrid logics. In J. Flum and M. Rodrı́guez-Artalejo, editors, Computer Science Logic, number 1683 in LNCS, pages 307–321, Madrid, Spain, 1999. Springer. Proceedings of the 8th Annual Conference of the EACSL, Madrid, September 1999. 2. C. Areces and B. ten Cate. Hybrid logics. In P. Blackburn, J. van Benthem, and F. Wolter, editors, Handbook of Modal Logic, volume 3. Elsevier Science, 2006. 3. G. Aucher, P. Balbiani, L. Fariñas Del Cerro, and A. Herzig. Global and local graph modifiers. Electronic Notes in Theoretical Computer Science (ENTCS), Special issue “Proceedings of the 5th Workshop on Methods for Modalities (M4M5 2007)” , 231:293–307, 2009. 4. F. Baader and T. Nipkow. Term Rewriting and All That. Cambridge University Press, 1998. 5. H. Barendregt, M. van Eekelen, J. Glauert, R. Kenneway, M. J. Plasmeijer, and M. Sleep. Term graph rewriting. In PARLE’87, pages 141–158. Springer Verlag LNCS 259, 1987. 6. R. Caferra, R. Echahed, and N. Peltier. A term-graph clausal logic: Completeness and incompleteness results. Journal of Applied Non-classical Logics, 18:373–411, 2008. 7. R. Echahed. Inductively sequential term-graph rewrite systems. In 4th International Conference on Graph Transformations (ICGT), volume 5214 of Lecture Notes in Computer Science, pages 84–98. Springer, 2008. 8. H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, editors. Handbook of Graph Grammars and Computing by Graph Transformations, Volume 2: Applications, Languages and Tools. World Scientific, 1999. 9. H. Ehrig, H.-J. Kreowski, U. Montanari, and G. Rozenberg, editors. Handbook of Graph Grammars and Computing by Graph Transformations, Volume 3: Concurrency, Parallelism and Distribution. World Scientific, 1999. 10. D. Plump. Term graph rewriting. In H. Ehrig, G. Engels, H. J. Kreowski, and G. Rozenberg, editors, Handbook of Graph Grammars and Computing by Graph Transformation, volume 2, pages 3–61. World Scientific, 1999. 11. G. Rozenberg, editor. Handbook of Graph Grammars and Computing by Graph Transformations, Volume 1: Foundations. World Scientific, 1997. 12. J. Tiuryn. Fixed-points and algebras with infinitely long expression, part 1, regular algebras. Fundamenta Informaticae, 2:103–127, 1978. 13. J. Tiuryn. Fixed-points and algebras with infinitely long expression, part 2, µclones of regular algebras. Fundamenta Informaticae, 2(3):317–335, 1979.
6cs.PL
A lattice in a residually non-Desarguesian Ã2-building Nicolas Radu∗ arXiv:1602.00588v3 [math.GR] 12 Oct 2016 October 12, 2016 Abstract We build a building of type Ã2 and a discrete group of automorphisms acting simply transitively on its set of vertices. The characteristic feature of this building is that its rank 2 residues are isomorphic to the Hughes projective plane of order 9, which is non-Desarguesian. This solves a problem asked by W. Kantor in 1986, as well as a question asked by J. Howie in 1989. Contents 1 Introduction 2 2 Previous work on the subject 2.1 Point-line correspondences and triangle presentations . . . . . . . . . . . . . 2.2 Building associated to a triangle presentation . . . . . . . . . . . . . . . . . 3 3 5 3 The 3.1 3.2 3.3 3.4 3.5 3.6 strategy The graph associated to a point-line correspondence . . The score of a point-line correspondence . . . . . . . . . Scores of correlations . . . . . . . . . . . . . . . . . . . . Estimated score for a general point-line correspondence Scores in the Hughes plane of order 9 . . . . . . . . . . . Improving a point-line correspondence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 6 7 8 10 11 12 4 The 4.1 4.2 4.3 4.4 4.5 building and its lattice Description . . . . . . . . . . . . . Torsion in ΓT . . . . . . . . . . . . A perfect subgroup of ΓT . . . . . Partition of ∆T into sub-buildings Automorphism group of ∆T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 14 15 15 15 16 ∗ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2010 Mathematics Subject Classification: 51E24 (primary), 20F65, 22E40, 51A35 (secondary) F.R.S.-FNRS Research Fellow. 1 A The Hughes plane of order 9 18 B The triangle presentation 19 1 Introduction An Ã2 -building can be characterized as a simply connected simplicial complex of dimension 2 such that all simplicial spheres of radius 1 around vertices are isomorphic to the incidence graph of a projective plane. Given an Ã2 -building, we will call these projective planes the residue planes of the building. The residue planes of an Ã2 -building associated to an algebraic group are always Desarguesian. On the other hand, the existence of locally finite Ã2 -buildings with nonDesarguesian residue planes has been known since 1986. M. Ronan indeed gave in [Ron86] a general construction affording all possible Ã2 -buildings and from which it is clear that any projective plane can appear in an Ã2 -building. However, this point of view does not provide any information on the automorphism groups of the buildings. A natural problem which was asked by W. Kantor in [Kan86, Page 124] is therefore the following.1 Problem (Kantor, 1986). Construct an Ã2 -building ∆ with finite non-Desarguesian residue planes and admitting a cocompact lattice, i.e. a group Γ ≤ Aut(∆) with finite vertex stabilizers and such that Γ\∆ is compact. Independently, J. Howie also asked the next more specific question [How89, Question 6.12].2 Question (Howie, 1989). Does there exist a group acting simply transitively and by typerotating automorphisms (as defined in Theorem 1.1 (3) below) on the vertices of an Ã2 building whose residue planes are non-Desarguesian? Some constructions in [VM87] and [BP07] yield Ã2 -buildings with exotic residues, but without any lattice (or, as the case may be, without information on its possible existence). In this paper, we solve the above problem and question by proving the following. Theorem 1.1. There exist an Ã2 -building ∆ and a group Γ ≤ Aut(∆) satisfying the following properties: (1) All residue planes of ∆ are isomorphic to the Hughes plane of order 9.3 1 The original statement is “Construct finite Ã2 -SCABs with non-Desarguesian residues” and is equivalent to ours. See §2.2 for the definition of Ã2 -SCABs. 2 The original question is “Is there a special presentation with star graph isomorphic to the incidence graph of a finite non-Desarguesian projective plane?”. As mentioned in [EV10], the notion of a special presentation from [How89] is equivalent to the notion of a triangle presentation from [CMSZ93a] (see §2 below for the definition of a triangle presentation). The latter is in turn related to Ã2 -buildings, as explained in §2. 3 The Hughes plane of order 9 was actually first constructed by O. Veblen and J. Wedderburn in 1907, see [VW07]. This was the first discovered finite non-Desarguesian projective plane, and the role of D. Hughes in [Hug57] has been to generalize their construction to get an infinite family of finite nonDesarguesian planes (with order p2n for p an odd prime). 2 (2) The group Γ acts simply transitively on the set of vertices of ∆. (3) Each element of Γ is type-rotating, i.e. its induced action σ on the set of types of vertices {0, 1, 2} satisfies σ(i) = i + c mod 3 for some c. (4) The index 3 subgroup Γ0 of Γ consisting of the type-preserving automorphisms is torsion-free. . (5) The derived subgroup [Γ, Γ] of Γ is perfect and Γ [Γ, Γ] ∼ = C2 × C3 . (6) There exists an infinite family {∆n0 }n of disjoint isomorphic sub-buildings of ∆ whose residue planes are isomorphic to PG(2, 3) and such that each vertex of ∆ is contained in (exactly) one sub-building ∆n0 . (7) The stabilizer of a vertex in Aut(∆) has order 96, i.e. [Aut(∆) : Γ] = 96. In particular, Aut(∆) equipped with the topology of pointwise convergence is discrete. Moreover, as any unimodular locally compact group acting continuously, properly and cocompactly on an Ã2 -building, Γ satisfies Kazhdan’s Property (T) (see [BdlHV08, Theorem 5.7.7]). Groups with Property (T) are deeply studied in [BdlHV08]. Acknowledgements I thank Pierre-Emmanuel Caprace for suggesting me this problem and for all his precious advice during the writing of this paper. I am also very grateful to Tim Steger for his interest in this work and for sharing some of his unpublished codes that helped in describing the full automorphism group of the discovered building. I finally want to thank Donald Cartwright and William Kantor for their comments on a previous version of this text, and Alina Vdovina for making me realize that I had answered a question of Howie. 2 Previous work on the subject In [CMSZ93a], Cartwright, Mantero, Steger and Zappa were interested in groups acting simply transitively on the vertices of an Ã2 -building. We will make great use of their work and give in this section the essential definitions and results. 2.1 Point-line correspondences and triangle presentations For our needs, the most important definition from [CMSZ93a] is the following. Definition 2.1. Let P and L be the sets of points and lines respectively in a projective plane Π. A bijection λ : P → L is called a point-line correspondence in Π. A subset T ⊆ P 3 is then called a triangle presentation compatible with λ if the two following conditions hold: 3 1. For all x, y ∈ P , there exists z ∈ P such that (x, y, z) ∈ T if and only if y ∈ λ(x) in Π. In this case, z is unique. 2. If (x, y, z) ∈ T , then (y, z, x) ∈ T . Example 2.2. The projective plane PG(2, 2) can be defined by P = L = Z /7 Z with line x ∈ L being adjacent to the points x + 1, x + 2 and x + 4 in P . Consider the point-line correspondence λ : P → L : x ∈ P 7→ x ∈ L in Π. Then T := {(x, x + 1, x + 3), (x + 1, x + 3, x), (x + 3, x, x + 1) | x ∈ P } is a triangle presentation compatible with λ. Indeed, (ii) is obviously satisfied and, for x, y ∈ P , it is apparent that there exists (a unique) z ∈ P such that (x, y, z) ∈ T if and only if y ∈ {x + 1, x + 2, x + 4}, which is exactly the set of points on the line λ(x). Now suppose we have an Ã2 -building ∆ and a group Γ ≤ Aut(∆) acting simply transitively on V (∆), where V (∆) is the set of vertices of ∆. We make the further assumption that Γ only contains type-rotating automorphisms, as defined in Theorem 1.1 (3). In this context, the following theorem shows how one can associate to Γ a point-line correspondence and a triangle presentation compatible with it. Theorem 2.3 (Cartwright–Mantero–Steger–Zappa). Let Γ ≤ Aut(∆) be a group of typerotating automorphisms of an Ã2 -building which acts simply transitively on V (∆). Let P (resp. L) be the set of neighbors of type 1 (resp. 2) of a fixed vertex v0 of type 0, and denote by Π the residue plane at v (with P and L as sets of points and lines). For each x ∈ P , let gx be the unique element of Γ such that gx (v0 ) = x. Then there exist a point-line correspondence λ : P → L in Π and a triangle presentation T compatible with λ such that Γ has the following presentation: Γ = h{gx }x∈P | gx gy gz = 1 for each (x, y, z) ∈ T i. Proof. See [CMSZ93a, Theorem 3.1]. What makes triangle presentations really interesting is the fact that a reciprocal result exists. Given a projective plane Π, a point-line correspondence λ : P → L in Π and a triangle presentation compatible with λ, one can construct an Ã2 -building ∆ locally isomorphic to Π and a group acting simply transitively on V (∆). Theorem 2.4 (Cartwright–Mantero–Steger–Zappa). Let P and L be the sets of points and lines in a projective plane Π, let λ : P → L be a point-line correspondence in Π and let T be a triangle presentation compatible with λ. Define ΓT := h{ax }x∈P | ax ay az = 1 for each (x, y, z) ∈ T i, where {ax }x∈P are distinct letters. Then there exists an Ã2 -building ∆T whose residue planes are isomorphic to Π and such that ΓT acts simply transitively on V (∆T ), by typerotating automorphisms. 4 Proof. See [CMSZ93a, Theorem 3.4], or §2.2 below. Example 2.5. From Example 2.2 and Theorem 2.4, we get an Ã2 -building ∆ whose residue planes are isomorphic to PG(2, 2) and a group acting simply transitively on the set of vertices of ∆. The building ∆ is actually the Bruhat-Tits building associated to PGL(3, F2 ((X))) (see [CMSZ93b, Section 4] and [CMSZ93a, Theorem 4.1]). 2.2 Building associated to a triangle presentation In [CMSZ93a, Theorem 3.4], the authors gave an explicit construction of the Ã2 -building ∆T associated to a triangle presentation T (see Theorem 2.4 above). In this section we show a geometric way to construct ∆T and ΓT . The following discussion can also be seen as an alternative proof of Theorem 2.4. Following [Kan86], an Ã2 -SCAB is a connected chamber system of rank 3 whose residues of rank 2 are generalized 3-gons (i.e. incidence graphs of projective planes). We will always think of an Ã2 -SCAB as a set of triangles, representing the chambers, glued together so that two chambers are adjacent if and only if they share an edge. Suppose we are given a point-line correspondence λ : P → L in a projective plane Π and a triangle presentation T compatible with λ. Let us first define a finite Ã2 -SCAB CT as follows. Consider three vertices v1 , v2 , v3 : those will be the only vertices of CT . Then, for each x ∈ P , put an edge ex between v1 and v2 , an edge e′x between v2 and v3 and an edge e′′x between v3 and v1 . Finally, for each (x, y, z) ∈ T , attach a triangle to the three edges ex , e′y and e′′z . One readily checks that the definition of a triangle presentation ensures that the three rank 2 residues of CT are incidence graphs of the projective plane Π, and hence that CT is indeed an Ã2 -SCAB. Note that CT is not a simplicial complex in the usual sense as all simplices of dimension 2 have the same three vertices. We then consider the universal covering Ã2 -SCAB C˜T of CT , as defined in [Kan86, Definition B.3.3, Proposition B.3.4]. This universal covering C˜T is a simply connected simplicial complex of dimension 2 whose simplicial spheres of radius 1 are isomorphic to the incidence graph of Π, so it is an Ã2 -building (see [Kan86, Theorem B.3.8] for a more rigorous proof of this fact). We therefore set ∆T := C˜T . Moreover, because of (2) in Definition 2.1, there is an automorphism α ∈ Aut(CT ) sending ex to e′x , e′x to e′′x and e′′x to ex for each x ∈ P . In other words, there is a natural action of the group C3 of order 3 on CT . This automorphism group C3 then lifts to an automorphism group C̃3 of ∆T (see [Kan86, Corollary B.3.7]), and C̃3 acts simply transitively on the set of vertices of ∆T (and by type-rotating automorphisms). The group ΓT can thus be taken to be C̃3 . The presentation of ΓT given in Theorem 2.4 can finally be found by applying Theorem 2.3 to ΓT ≤ Aut(∆T ). 3 The strategy A way to construct an Ã2 -building with non-Desarguesian residues and admitting a lattice is, in view of Theorem 2.4, to consider a non-Desarguesian projective plane Π and to find a point-line correspondence in Π and a triangle presentation compatible with it. The 5 smallest non-Desarguesian projective planes are the Hughes plane of order 9, the Hall plane of order 9 and the dual of the Hall plane. The Hughes plane is self-dual, so there exist some natural point-line correspondences in it: the correlations (also called dualities). For this reason, we decided to work on the Hughes plane of order 9. It will appear later that the correlations do not actually admit a triangle presentation, but they will still be helpful in our search for a suitable point-line correspondence. For each Desarguesian projective plane, Cartwright-Mantero-Steger-Zappa gave in [CMSZ93a, §4] an explicit formula for one point-line correspondence admitting a triangle presentation. Of course, they use the finite field from which the projective plane is constructed, and it is not clear how to find a similar formula for a particular non-Desarguesian projective plane. Since we are searching for purely combinatorial objects, the use of a computer could be considered. In [CMSZ93b], the authors used a computer to find all triangle presentations in the projective planes of order 2 and 3. The number of points in these projective planes being not too large (i.e. 7 and 13), they could do a brute-force computation. However, already for order 3 they needed to use some symmetries of the problem so as to reduce the search space. Even if computers are now more powerful than in the 1990s, such a method would still be far too slow for a projective plane of order 9. The key point is that we are not searching for all triangle presentations in the Hughes plane: we only want to find one. In this section, we describe our strategy in order to do so. 3.1 The graph associated to a point-line correspondence In the context of triangle presentations, it is natural to associate a particular graph to each point-line correspondence λ : P → L of a projective plane Π. Definition 3.1. Let λ : P → L be a point-line correspondence in a projective plane Π. The graph Gλ associated to λ is the directed graph with vertex set V (Gλ ) := P and edge set E(Gλ ) := {(x, y) ∈ P 2 | y ∈ λ(x)}. For λ, admitting a triangle presentation can now be rephrased as a condition on its associated graph Gλ . In order to state this reformulation, we first define what we will call a triangle in a directed graph. Definition 3.2. Let G be a directed graph. A set {e1 , e2 , e3 } of edges in G such that the destination vertex of e1 (resp. e2 and e3 ) is the origin vertex of e2 (resp. e3 and e1 ) is called a triangle. If two of the three edges e1 , e2 and e3 are equal, then they are all equal. In this case, the triangle contains only one edge and is also called a loop. The next definition will also be convenient. Definition 3.3. Let λ : P → L be a point-line correspondence in a projective plane Π. A triple (x, y, z) ∈ P 3 is called λ-admissible if y ∈ λ(x), z ∈ λ(y) and x ∈ λ(z). By definition, a triangle presentation compatible with λ only contains λ-admissible triples. Thanks to these definitions, there is now an obvious bijection between triangles 6 of Gλ and (triples of) λ-admissible triples. Indeed, for x, y, z ∈ P , (x, y, z) is λ-admissible if and only if there is a triangle {e1 , e2 , e3 } in Gλ with x, y and z being the origins of e1 , e2 and e3 respectively. Note that the triangle {e1 , e2 , e3 } then corresponds to the three λ-admissible triples (x, y, z), (y, z, x) and (z, x, y) (which are equal when x = y = z, i.e. when e1 = e2 = e3 or equivalently when the triangle is a loop). This observation directly gives us the next result. Lemma 3.4. Let λ : P → L be a point-line correspondence in a projective plane Π. There exists a triangle presentation compatible with λ if and only if there exists a partition of the set of edges E(Gλ ) of Gλ into triangles. Proof. Via the above bijection, a partition of E(Gλ ) into triangles exactly corresponds to a triangle presentation compatible with λ. 3.2 The score of a point-line correspondence Most point-line correspondences λ in a projective plane do not admit a triangle presentation, i.e. the set of edges E(Gλ ) of the graph Gλ can generally not be partitioned into triangles. We would still like to measure if a correspondence λ is “far from admitting” a triangle presentation or not. We therefore introduce the notion of a triangle partial presentation compatible with λ. Definition 3.5. Let λ : P → L be a point-line correspondence in a projective plane Π. A subset T ⊆ P 3 is called a triangle partial presentation compatible with λ if the two following conditions hold: (1) For all x, y ∈ P , if there exists z ∈ P such that (x, y, z) ∈ T then y ∈ λ(x) and z is unique. (2) If (x, y, z) ∈ T , then (y, z, x) ∈ T . We directly have the following. Lemma 3.6. Let λ : P → L be a point-line correspondence in a projective plane Π of order q. A subset T ⊆ P 3 is a triangle presentation compatible with λ if and only if it is a triangle partial presentation compatible with λ and |T | = (q + 1)(q 2 + q + 1). Proof. This is clear from the definitions, since there are exactly (q + 1)(q 2 + q + 1) pairs (x, y) ∈ P 2 with y ∈ λ(x). We now define the score of a point-line correspondence as follows. Definition 3.7. Let λ : P → L be a point-line correspondence in a projective plane Π of order q. The score S(λ) of λ is the greatest possible size of a triangle partial presentation compatible with λ. Thanks to the bijection between triangles of Gλ and (triples of) λ-admissible triples (see §3.1), we can restate this definition in the following terms. 7 Definition 3.8. Let λ : P → L be a point-line correspondence in a projective plane Π of order q. The score S(λ) of λ is the maximal number of edges of Gλ that can be covered with disjoint triangles. A point-line correspondence then admits a triangle presentation if and only if its score reaches the maximal theoretical value (q + 1)(q 2 + q + 1). Lemma 3.9. Let λ : P → L be a point-line correspondence in a projective plane Π of order q. There exists a triangle presentation compatible with λ if and only if S(λ) = (q + 1)(q 2 + q + 1). Proof. This follows from Lemma 3.6. 3.3 Scores of correlations When λ : P → L, L → P is a correlation of a (self-dual) projective plane Π of order q, i.e. a map such that λ(p) ∋ λ(ℓ) if and only if p ∈ ℓ, there is an explicit formula for the score of the point-line correspondence λ : P → L. Proposition 3.10. Let λ : P → L, L → P be a correlation in a projective plane Π of order q. Let a(λ) be the number of points p ∈ P such that λ3 (p) ∋ p and let b(λ) be the number of points p ∈ P such that λ3 (p) ∋ p and λ6 (p) = p. Then S(λ) = (q + 1)(q 2 + q + 1) − (2q − 3) · a(λ) − b(λ). Proof. For fixed x, y ∈ P with y ∈ λ(x) (i.e. (x, y) is an edge of Gλ ), a point z ∈ P is such that (x, y, z) is λ-admissible if and only if z ∈ λ(y) ∩ λ−1 (x). We call the edge (x, y) unpopular if λ(y) 6= λ−1 (x) and popular if λ(y) = λ−1 (x). This means that an unpopular edge of Gλ is contained in exactly one triangle while a popular edge is contained in exactly (q + 1) triangles. (i) There are exactly a(λ) popular edges in Gλ . Proof: By definition, (x, y) is popular if y = λ−2 (x), so a vertex x ∈ P is the origin of a (unique) popular edge if and only if λ−2 (x) ∈ λ(x), i.e. x ∈ λ3 (x). There are exactly a(λ) such x and hence a(λ) popular edges. (ii) There are exactly (q + 1)(q 2 + q + 1) + q · a(λ) λ-admissible triples. Proof: By (i), there are (q + 1)(q 2 + q + 1) − a(λ) unpopular edges and a(λ) popular edges in Gλ . As each unpopular edge (resp. popular edge) is the beginning of one (resp. (q + 1)) λ-admissible triple(s), we get [(q + 1)(q 2 + q + 1) − a(λ)] · 1 + a(λ) · (q + 1) λ-admissible triples. (iii) There are exactly (q + 1) · a(λ) λ-admissible triples (x, y, z) with (x, y) popular (resp. (y, z) popular, (z, x) popular). Proof: There are a(λ) popular edges by (i), each one being the beginning of (q + 1) λ-admissible triples. 8 (iv) There are exactly a(λ) λ-admissible triples (x, y, z) with (x, y) and (y, z) popular (resp. (y, z) and (z, x) popular, (z, x) and (x, y) popular). Proof: If (x, y, z) is λ-admissible with (x, y) and (y, z) popular, then y = λ−2 (x), z = λ−2 (y) and x ∈ λ3 (x). Moreover, these conditions are sufficient to be λ-admissible with (x, y) and (y, z) popular. Since there are a(λ) points x such that x ∈ λ3 (x), there are exactly a(λ) such triples. (v) There are exactly b(λ) λ-admissible triples (x, y, z) with (x, y), (y, z) and (z, x) popular. Proof: Such triples satisfy x ∈ λ3 (x), y = λ−2 (x), z = λ−2 (y) and x = λ−2 (z), so in particular x = λ6 (x). Moreover, if x ∈ λ3 (x) and x = λ6 (x), then (x, λ−2 (x), λ−4 (x)) is λ-admissible with three popular edges, so there are exactly b(λ) such triples. (vi) There are exactly (q + 1)(q 2 + q + 1) − 2q · a(λ) − b(λ) λ-admissible triples (x, y, z) with (x, y), (y, z) and (z, x) unpopular. Proof: By the inclusion-exclusion principle, the number of such triples is [(q + 1)(q 2 + q + 1) + q · a(λ)] − 3(q + 1) · a(λ) + 3 · a(λ) − b(λ). We now prove that S(λ) ≤ (q + 1)(q 2 + q + 1) − (2q − 3) · a(λ) − b(λ). Let T be a triangle partial presentation with |T | = S(λ), i.e. a set of disjoint triangles of Gλ covering S(λ) edges. By maximality, all λ-admissible triples (i.e. triangles) (x, y, z) with (x, y), (y, z) and (z, x) unpopular are in T (because each of these 3 edges is only covered by this particular triangle). By (vi), this means we already have (q + 1)(q 2 + q + 1) − 2q · a(λ) − b(λ) triples in T . The other triangles in T all contain at least one popular edge. There are a(λ) popular edges (by (i)), so we obtain S(λ) ≤ (q + 1)(q 2 + q + 1) − 2q · a(λ) − b(λ) + 3 · a(λ). Let us now show that S(λ) ≥ (q + 1)(q 2 + q + 1) − (2q − 3) · a(λ) − b(λ), by covering that number of edges of Gλ with disjoint triangles. We first cover exactly (q + 1)(q 2 + q + 1) − 2q · a(λ) − b(λ) edges of Gλ thanks to the triangles only containing unpopular edges. By definition of an unpopular edge, these triangles are all disjoint. Now, for each popular edge (x, y), there are (q + 1) values of z such that (x, y, z) is λ-admissible. Among these (q + 1) ≥ 3 values of z, choose z0 different from λ−2 (y) and λ2 (x). In this way, (y, z0 ) and (z0 , x) are unpopular. We then add the triangle (x, y, z0 ) to our covering. This triangle is not a loop since (x, y) is popular and (y, z) is unpopular, so it covers three new edges. Doing so for each popular edge (x, y), we cover 3 · a(λ) new edges and get S(λ) ≥ (q + 1)(q 2 + q + 1) − 2q · a(λ) − b(λ) + 3 · a(λ). It follows from Proposition 3.10 that a correlation λ admits a triangle presentation if and only if λ3 sends no point to an adjacent line. However, the following nice result of Devillers, Parkinson and Van Maldeghem shows that this never happens. Theorem 3.11 (Devillers–Parkinson–Van Maldeghem). Let λ : P → L, L → P be a correlation in a finite projective plane Π. Then there exists p ∈ P such that p ∈ λ(p). 9 Proof. See [DPVM13, Proposition 5.4]. The case of polarities (i.e. correlations which are involutions) goes back to [Bae46]. Corollary 3.12. Let λ : P → L, L → P be a correlation in a finite projective plane Π. Then there is no triangle presentation compatible with λ. Proof. Applying Theorem 3.11 to the correlation λ3 , we get a(λ) > 0 and hence S(λ) < (q + 1)(q 2 + q + 1) by Proposition 3.10. The conclusion then follows from Lemma 3.9. Remark 3.13. In the semifield plane of order 16 and with kernel GF(4), we could observe a correlation λ such that a(λ) = b(λ) = 1. This means that there is exactly one point p of the plane such that p ∈ λ3 (p). The score of this correlation λ is thus S(λ) = 4611, the maximal theoretical score being (16 + 1)(162 + 16 + 1) = 4641. 3.4 Estimated score for a general point-line correspondence It does not seem possible to get a general formula for the score of all point-line correspondences. One can however obtain (good) lower bounds for the score, simply by trying to cover the most possible edges of Gλ with triangles. There are different algorithms that could be used. Our principal goal being to know whether E(Gλ ) admits a partition into triangles, we should design an algorithm that will find such a partition when it exists. The idea is simple: if an edge of Gλ is not yet covered and if there is only one triangle containing this edge and disjoint from the already chosen ones, then this triangle must be part of the (possible) partition. Our algorithm to cover as many edges as we can in Gλ is thus the following: While there exists e ∈ E(Gλ ) such that there is a unique triangle t in Gλ containing e, choose this triangle t, remove the edge(s) of t from Gλ and start again this procedure. If, at the end, there is no more triangles in Gλ , then we say that the score-algorithm succeeds and that the estimated score s(λ) of λ is the number of edges that are covered by the chosen triangles. Otherwise, there still are triangles in Gλ but all edges are contained in 0 or at least 2 triangles. In this case, we say that the score-algorithm fails. For a pseudo-code, see Algorithm 1. One should note that the value of s(λ) (and whether the score-algorithm succeeds or not) may depend on the choice made for e ∈ E(Gλ ) at each step. We will still talk about the estimated score s(λ) of λ, assuming that an order is fixed once and for all on the set E(Gλ ) for each λ. Lemma 3.14. Let λ : P → L be a point-line correspondence in a projective plane Π of order q. Assume that the score-algorithm succeeds. Then s(λ) ≤ S(λ) and, if S(λ) = (q + 1)(q 2 + q + 1), then s(λ) = (q + 1)(q 2 + q + 1). Proof. This follows from the discussion in the description of the algorithm. 10 Algorithm 1: Computing the estimated score s(λ) of λ 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 score ← 0; edgesInOneTriangle ← true; while edgesInOneTriangle = true do edgesInOneTriangle ← f alse; for e in E(Gλ ) do if e is contained in exactly one triangle t of Gλ then edgesInOneTriangle ← true; remove the edge(s) of t from E(Gλ ); if t is a loop then score ← score + 1; else score ← score + 3; if there still are triangles in Gλ then return FAIL else return score When the score-algorithm fails, it cannot conclude whether there exists a partition of E(Gλ ) into triangles. Actually, we never encountered a point-line correspondence for which the algorithm fails for the Hughes plane of order 9. We therefore did not need to treat this particular case. Note however that, for a Desarguesian plane, we are aware of some point-line correspondences for which the algorithm fails and which indeed admit a triangle presentation, so this case should not in general be forgotten. 3.5 Scores in the Hughes plane of order 9 By Corollary 3.12, we know that a correlation never reaches the score of (q + 1)(q 2 + q + 1). A naive approach to find a point-line correspondence of the Hughes plane of order 9 with a score of (9 + 1)(92 + 9 + 1) = 910 is to simply evaluate s(λ) for a lot of random correspondences λ and to cross one’s fingers. This idea is however not successful at all. Indeed, we computed the estimated score of 100000 random point-line correspondences and got, on average, an estimated score of 486.6 (with a standard deviation of 17.3). The best estimated score we could observe was only 561, very far from 910. Compared with these pretty low values, the formula given by Proposition 3.10 for correlations seems to give better scores. In the Hughes plane of order 9, there are 33696 correlations. Their scores, computed thanks to Proposition 3.10, are given in Table 3.1. Note that, as soon as two correlations λ and λ′ are conjugate (in the sense that λ = αλ′ α−1 for some automorphism α of the plane), we have a(λ) = a(λ′ ), b(λ) = b(λ′ ) and S(λ) = S(λ′ ). (Actually, Gλ and Gλ′ are isomorphic.) We also computed the estimated scores of all these correlations: they are also given 11 # of concerned λ 6318 4212 6318 4212 6318 6318 a(λ) 4 10 10 16 16 22 b(λ) 4 2 10 0 16 22 S(λ) 846 758 750 670 654 558 s(λ) (mean) 846.00 757.97 750.00 669.92 654.00 558.00 Table 3.1: Scores of the correlations of the Hughes plane of order 9. in Table 3.1. They show that, at least for correlations, the estimated score is almost always equal to the real score. As expected, correlations have higher estimated scores than random point-line correspondences: they reach 846. This fact will be helpful for our final strategy to find a correspondence with score 910, described in the next subsection. 3.6 Improving a point-line correspondence In order to find a point-line correspondence with a score greater than what we already obtained, it is natural to try to slightly modify a point-line correspondence with a high score. The smallest change we can make is to swap the images of two points. The next lemma shows that the score function is somewhat continuous. Lemma 3.15. Let λ : P → L be a point-line correspondence in a projective plane Π of order q and let a, b ∈ P . Define λa,b : P → L by λa,b (x) := λ(x) for all x ∈ P \ {a, b}, λa,b (a) := λ(b) and λa,b (b) := λ(a). Then |S(λa,b ) − S(λ)| ≤ 6(q + 1). Proof. The graph Gλa,b can be obtained from Gλ by deleting the edges having a or b as origin and replacing them by other edges. In total, 2(q + 1) edges are deleted and 2(q + 1) edges are added. Since a triangle contains at most 3 edges, we directly deduce that |S(λa,b ) − S(λ)| ≤ 6(q + 1). In Lemma 3.15, it is even reasonable to think that |S(λa,b ) − S(λ)| will often be much smaller than 6(q + 1). In other words, the score should not vary too much when replacing λ by λa,b , and we can in general hope to have S(λa,b ) > S(λ) for some a, b ∈ P . Based on this observation, our idea is simple. Start with a correlation λ, whose score is known to be higher than for a random correspondence (see §3.5). For all distinct a, b ∈ P , consider λa,b (as defined above) and compute its estimated score s(λa,b ). Then choose ã, b̃ ∈ P such that s(λã,b̃ ) = max{s(λa,b ) | a, b ∈ P }. Now replace λ by λã,b̃ and start this procedure again! We just need to keep track of the correspondences we already tried so as to avoid being blocked in a local maximum of the score function. This idea is explained in Algorithm 2. If after some time the algorithm does not seem able to produce a score of 910, then we stop it and start it again from another correlation. This procedure is pretty slow: with our implementation, one step (i.e. computing s(λa,b ) for all a, b ∈ P so as to find ã and b̃) takes ∼1.25 seconds. For this reason and because we could still not reach 910, we have decided not to try all possible pairs a, b ∈ P . 12 Algorithm 2: Finding a point-line correspondence λ with s(λ) = 910 1 2 3 4 5 6 7 8 9 10 11 12 λ ← some correlation of the Hughes plane; while s(λ) < 910 do visited[λ] ← true; bestA ← −1; bestB ← −1; bestScore ← −1; for a in P and b in P do if visited[λa,b ] = false and s(λa,b ) > bestScore then bestScore ← s(λa,b ); bestA ← a; bestB ← b; λ ← λbestA,bestB ; return λ; Instead, we can observe which points seem to be the worst, where the badness of p ∈ P is the number of edges containing p in Gλ which were not covered by a triangle in Algorithm 1. Then, it is natural to only try the pairs a, b ∈ P where a is one of the worst points (for instance the 5 worst points) and b is arbitrary. Obviously, with this change Algorithm 2 does not visit the same correspondences as before, but it has the advantage that a step only takes ∼0.13 seconds. After three weeks of slight changes in the algorithm (e.g. the definition of a bad point, the number of worst points we consider, the condition under which we stop and start with another correlation, etc), the computer eventually shouted (at least wrote) victory. The starting correlation had a score equal to 750, and the evolution of the estimated score until 910 is shown in Figure 1. Remark 3.16. The last change we made to the algorithm before it could solve the problem was actually mistaken! Whereas we wanted to speed up the computation of the five worst points, we made an error in the implementation of that idea resulting in the fact that the five computed points were actually not the worst ones. This mistake still led us to the discovery of a (valid) point-line correspondence λ with a score of 910. The funny part of the story is that if we correct this implementation error and start the algorithm with the same correlation, then it misses the correspondence λ. 4 The building and its lattice In this section, we first give the description of the building and the lattice that we discovered (see Section 3 for the methods we used). We then give various properties of these objects (i.e. we prove (4), (5), (6) and (7) in Theorem 1.1). 13 910 Estimated score 865 820 775 730 0 50 Step 100 150 Figure 1: Evolution of the estimated score with Algorithm 2. 4.1 Description The structure of the Hughes plane of order 9 is given in Table A.1 and comes from [GEM]. Points and lines are numbered from 0 to 90 (let us call them p0 , . . . , p90 and ℓ0 , . . . , ℓ90 ), and the nth row (with 0 ≤ n ≤ 90) gives the indices of the 10 points incident to ℓn . The reader may be skeptical that the structure of incidence Π defined by these point-line incidences is indeed the Hughes plane, but this is not so hard to verify by analyzing its properties. It is at least really easy to implement a program checking that Π satisfies the axioms of a projective plane. Moreover, we can see by hand that Π is not Desarguesian. For instance, consider the triangle T1 with points {p1 , p10 , p34 } and the triangle T2 with points {p2 , p11 , p35 }. The lines of T1 are {ℓ10 , ℓ20 , ℓ11 } and the lines of T2 are {ℓ27 , ℓ35 , ℓ19 }. Now the line passing through the points {p1 , p2 } (resp. {p10 , p11 } and {p34 , p35 }) is ℓ0 (resp. ℓ1 and ℓ2 ), and these three lines intersect in p0 . On the other hand, the common point of the lines {ℓ10 , ℓ27 } (resp. {ℓ20 , ℓ35 } and {ℓ11 , ℓ19 }) is p19 (resp. p66 and p42 ), and these three points do not lie on a common line (the line through {p19 , p66 } is ℓ48 , which does not contain p42 ). This shows that Desargues’ theorem is not satisfied in Π. Moreover, our computations show that Π is self-dual (since there are correlations), so it can only be the Hughes plane (see, for instance, [LKT91]). Relative to this numbering of points and lines, the point-line correspondence λ : P → L which we have found is given in Table B.1. For the image of p10x+y by λ, one should look at the intersection of rows x and y. The triangle presentation T compatible with λ is then given in Table B.2. In this table, the appearance of (x, y, z) means that (x, y, z), (y, z, x) and (z, x, y) all belong to T . There are, in Table B.2, 298 triples (x, y, z) with 14 x, y, z not all equal and 16 triples (x, x, x), which means that T contains 298 · 3 + 16 = 910 elements as required. While a computer helped to find T , it can once again be checked by hand (or with a trivial program) that T is indeed a triangle presentation compatible with λ. Indeed, one only needs to check that for each (x, y, z) ∈ T , the line λ(x) contains y and there exists no z ′ 6= z such that (x, y, z ′ ) ∈ T . This suffices to show that T is a triangle presentation compatible with λ, since |T | = 910. It follows from Theorem 2.4 that the building ∆T and the group ΓT ≤ Aut(∆T ) satisfy (1), (2) and (3) in Theorem 1.1. In the next four subsections we prove (4), (5), (6) and (7). 4.2 Torsion in ΓT The group ΓT has elements of order 3: when (x, x, x) ∈ T for some x ∈ P , we have the relation a3x = 1 in the presentation of ΓT . However, the subgroup Γ0T of ΓT consisting of the type-preserving automorphisms is torsion-free. Indeed, let γ be a torsion element of Γ0T , say of order n. If v0 is a fixed vertex of ∆T , then γ stabilizes the set {v0 , γ(v0 ), γ 2 (v0 ), . . . , γ n−1 (v0 )}. By [BT72, Proposition 3.2.4], γ must fix a point of ∆T , i.e. it stabilizes a simplex of ∆T . Since γ preserves the types, it fixes this simplex pointwise and thus fixes its vertices. But Γ0T acts freely on the set of vertices of ∆T , so γ must be the identity element. 4.3 A perfect subgroup of ΓT Clearly, Γ0T is a normal subgroup of index 3 of ΓT . We find that ΓT also has a subgroup of index 2. Indeed, if we define A ⊂ P by A = ℓ3 ∪ ℓ11 ∪ ℓ62 ∪ ℓ64 ∪ ℓ87 , then one can check that for each (x, y, z) ∈ T , either one or three of the points x, y, z belong to A. Equivalently, either none or two of the points x, y, z belong to P \ A. Hence, there is a well-defined group homomorphism f : ΓT → C2 defined on the generators {ax }x∈P by f (ax ) := 0 if x ∈ A and f (ax ) := 1 if x 6∈ A. The kernel ker(f ) of f is then a subgroup of index 2 of ΓT . The intersection Γ0T . ∩ ker(f ) of these two subgroups is thus a normal subgroup of ∼ C2 × C3 ). We checked using the GAP system index 6 of ΓT (with ΓT Γ0 ∩ ker(f ) = T that Γ0T ∩ ker(f ) is a perfect group, so that [ΓT , ΓT ] = Γ0T ∩ ker(f ). 4.4 Partition of ∆T into sub-buildings A Baer subplane of a projective plane Π is a proper projective subplane Π0 of Π with the property that every point of Π is incident to at least one line of Π0 and every line of Π is incident to at least one point of Π0 . Let us take for Π the Hughes plane of order 9. Then Π has a (Desarguesian) Baer subplane Π0 of order 3, which has the property that all automorphisms and all correlations of Π preserve Π0 (see [Dem68, 5.4.1]). With respect to our numbering of the points and lines of the Hughes plane (see Table A.1), the sets of points and lines of Π0 are P0 := {pn | n ∈ {9, 17, 20, 33, 38, 42, 43, 46, 47, 56, 59, 64, 70}} 15 and L0 := {ℓn | n ∈ {3, 11, 22, 34, 46, 53, 62, 64, 70, 79, 84, 87, 89}} (see the red-colored numbers in Table A.1). What is surprising is that our point-line correspondence λ also preserves Π0 . This is indeed clear from Table B.1. Even better, if we call λ0 the restriction of λ to P0 , then the triangle presentation T can be restricted to a triangle presentation T0 compatible with λ0 . In other terms, for each (x, y, z) ∈ T , if x ∈ P0 and y ∈ P0 then z ∈ P0 . This can also be simply observed by inspecting Table B.2. The author does not know any theoretical reason why these properties are true (and whether they must be true for any point-line correspondence admitting a triangle presentation). This observation has different consequences. First, we have a point-line correspondence λ0 in the Desarguesian projective plane Π0 of order 3, and a triangle presentation T0 compatible with it. Theorem 2.4 thus gives an Ã2 -building ∆T0 whose projective plane at each vertex is isomorphic to Π0 and a group ΓT0 acting simply transitively on V (∆T0 ). The triangle presentations in the projective plane of order 3 have all been given by CartwrightMantero-Steger-Zappa in [CMSZ93b], so T0 must be one of their list. It turns out that T0 is equivalent (as defined in [CMSZ93b, Section 2]) to their triangle presentation numbered 14.1 (see [CMSZ93b, Appendix B] ; one such equivalence takes the pn , in the order listed in the definition of P0 , to 12, 2, 5, 0, 8, 11, 10, 3, 1, 9, 6, 4 and 7, respectively). In particular, this means by [CMSZ93b, Section 8] that ∆T0 is a non-linear building, i.e. is not the building of PGL(3, K) for some local field K. The group ΓT0 and the building ∆T0 also appear as subgroups and sub-buildings of ΓT and ∆T , respectively. With the notation of §2.2, there is a clear embedding e : CT0 ֒→ CT . Now ∆T0 and ∆T are the universal coverings of CT0 and CT respectively, so by fixing some vertices v0 ∈ V (∆T0 ) and v ∈ V (∆T ) such that p(v) = e(p0 (v0 )) (where p : ∆T → CT and p0 : ∆T0 → CT0 are the natural projections), we get an embedding ẽ : ∆T0 ֒→ ∆T with ẽ(v0 ) = v. We can then see ΓT0 as the subgroup of ΓT such that ΓT0 (v) is exactly the set of vertices of ẽ(∆T0 ). Moreover, for each g ∈ ΓT the set gΓT0 (v) ⊂ V (∆T ) is also the 0-skeleton of a building isomorphic to ∆T0 . This means that the vertices of ∆T are partitioned into sub-buildings isomorphic to ∆T0 (where each sub-building corresponds to a left coset of ΓT0 in ΓT ). One should note that these sub-buildings isomorphic to ∆T0 cover all the vertices of ∆T , but this is not true for edges and chambers: some edges (and chambers) of ∆T do not belong to any of the sub-buildings. 4.5 Automorphism group of ∆T The automorphism group Aut(∆T ) of ∆T contains ΓT , which acts simply transitively on the vertices of the building. In order to know whether Aut(∆T ) is substantially larger than ΓT , we should try to see what the stabilizer of a vertex in Aut(∆T ) looks like. This can be done by making use of the GAP system. I am very thankful to Tim Steger, who had done the same work for triangle presentations in the projective plane of order 3, and who gave me all his source codes and a great deal of advice. 16 Let v be a vertex of ∆T . In the next discussion, XT will denote the sub-building of ∆T containing v and isomorphic to ∆T0 (see §4.4). We have the following facts. (i) Any automorphism of ∆T fixing v must preserve the sub-building XT . Explanation: For a vertex x contained in XT , there are 2 · 91 = 182 vertices adjacent to x in ∆T , and exactly 2 · 13 = 26 of them belong to XT . Those 26 vertices are characterized by the fact that, in the local Hughes plane Π associated to x, they correspond to the 13 points and 13 lines of the Baer subplane Π0 of Π. Hence, if α ∈ Aut(∆T ) is such that α(x) = y with x, y belonging to XT , then α must send the 26 neighbors of x in XT on the 26 neighbors of y in XT because all automorphisms and correlations of Π preserve Π0 . Starting with x = v, we obtain step by step that any automorphism of ∆T fixing v must stabilize XT . (ii) There are exactly 16 automorphisms of XT stabilizing v. Explanation: This was previously done by Steger with the help of GAP. (iii) For each x ∈ V (∆T ), the only automorphism of the ball of radius 2 centered at x which pointwise stabilizes the ball of radius 1 is the trivial automorphism. Explanation: This was proved with GAP. Point (iii) implies that the pointwise stabilizer of a ball of radius 1 in Aut(∆T ) is trivial, and hence that an automorphism of ∆T is completely determined by its action on the ball of radius 1 centered at v. In particular, the stabilizer of v in Aut(∆T ) is finite and Aut(∆T ) is discrete (for the topology of pointwise convergence). (iv) There are exactly 6 automorphisms of Π that pointwise stabilize Π0 . Explanation: This can be checked with a computer, but one can also see [Lün76, Corollary 5] or [Ros58] for a more theoretical approach. The four first points imply that there are at most 16 · 6 = 96 automorphisms of ∆T stabilizing v. Denote by G1 the set of the 96 automorphisms of the ball of radius 1 centered at v which could maybe be extended to automorphisms of the whole building. (v) Each automorphism in G1 can be extended to an automorphism of the ball of radius 2 centered at v. Explanation: This was proved with GAP. Now denote by G2 the set of these extended automorphisms. (vi) Each automorphism in G2 can be extended to an automorphism of ∆T . Explanation: This could be checked with a clever GAP program written by Steger. These steps actually gave us the explicit description of the 96 automorphisms of ∆T fixing v. Six of them pointwise stabilize the sub-building XT . The file describing these automorphisms is pretty big so we do not append it to this text. 17 A The Hughes plane of order 9 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 2 3 4 5 6 7 8 9 2 2 2 2 2 2 2 2 4 5 3 6 9 8 7 5 4 3 9 1 10 19 20 21 22 23 24 25 26 10 11 12 13 14 15 16 17 18 10 10 10 10 10 10 10 10 11 13 14 12 18 16 15 17 11 11 11 11 11 11 11 14 13 16 12 2 11 34 27 33 30 28 29 31 32 19 34 28 31 33 29 27 32 30 35 29 31 33 28 27 30 32 19 21 22 24 20 26 25 23 22 21 26 20 23 24 25 19 19 19 19 3 12 35 42 48 43 44 45 46 47 20 42 35 41 36 37 38 39 40 42 34 38 40 41 37 39 36 27 34 37 39 41 40 36 38 35 39 36 40 37 38 41 42 47 43 45 4 13 36 55 54 49 50 51 52 53 21 43 55 54 50 52 51 49 53 49 56 48 47 43 45 46 44 28 57 48 47 45 44 43 46 58 50 52 51 54 49 53 63 51 54 53 5 14 37 56 61 63 69 64 62 65 22 44 61 56 58 59 66 57 60 50 61 57 59 58 65 55 60 29 62 60 58 61 56 55 59 66 56 57 62 55 60 59 67 55 60 57 6 15 38 57 76 68 70 73 67 66 23 45 62 74 68 71 72 69 67 51 66 63 64 71 70 73 62 30 70 64 67 75 63 66 65 70 65 64 68 67 61 63 71 69 65 68 7 16 39 58 78 72 77 74 75 71 24 46 63 80 73 76 77 75 70 52 67 81 72 83 78 76 74 31 71 69 80 77 76 78 68 74 79 77 78 72 71 69 74 79 73 76 8 17 40 59 89 79 81 83 85 87 25 47 64 82 85 79 86 78 84 53 68 84 75 86 80 77 79 32 72 86 81 79 83 82 74 75 84 80 81 83 82 73 77 85 75 82 9 18 41 60 90 80 82 84 86 88 26 48 65 88 87 81 89 83 90 54 69 87 82 90 85 88 89 33 73 88 89 87 85 84 90 76 86 90 88 87 85 89 78 90 81 86 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 6 7 8 5 3 8 7 9 6 4 5 6 9 8 7 4 3 8 9 7 6 4 4 4 4 5 5 5 5 3 3 3 3 7 9 6 6 7 9 8 7 9 8 8 6 15 17 18 18 13 14 15 16 17 14 17 12 15 16 18 15 12 13 17 16 18 12 16 18 17 13 12 15 16 14 18 17 15 13 13 13 14 14 14 12 12 18 15 17 16 19 19 19 23 24 25 21 20 26 20 25 22 24 23 26 23 25 26 21 22 24 26 21 25 24 22 20 26 24 23 21 22 20 20 25 23 21 24 26 21 23 22 22 20 25 46 44 48 29 30 32 31 33 27 30 28 32 27 31 33 32 33 28 30 29 31 29 28 27 33 27 31 30 32 27 32 31 28 32 29 33 29 28 31 27 30 28 33 29 30 49 52 50 35 35 35 35 35 35 34 34 34 34 34 34 40 38 37 41 39 36 41 36 39 37 36 37 38 41 41 37 40 39 38 40 39 38 40 39 40 36 38 41 36 37 56 58 59 43 44 45 47 46 48 52 51 54 50 53 49 42 42 42 42 42 42 46 45 44 43 46 44 45 48 47 46 45 48 43 48 45 44 46 43 43 48 47 44 47 47 64 61 62 57 59 56 60 69 67 65 60 59 63 58 55 61 70 68 64 62 65 50 49 54 53 53 49 54 52 49 51 50 53 50 49 52 53 54 51 52 51 52 51 54 50 70 72 66 85 78 72 68 71 73 82 76 77 75 64 74 73 79 75 66 82 69 60 59 64 56 61 66 58 55 62 58 55 72 64 58 60 55 57 59 69 56 56 57 63 57 87 84 80 88 86 81 77 80 79 83 80 84 88 78 81 80 83 84 81 87 72 72 67 68 62 81 73 62 68 76 63 71 74 67 65 63 75 66 61 74 71 73 65 70 61 89 88 83 89 87 90 83 84 82 89 87 85 90 79 86 86 88 89 85 90 76 78 88 71 77 83 90 69 70 84 82 89 85 76 77 66 80 79 70 87 75 78 67 86 74 Table A.1: Incidence relation of the Hughes plane of order 9, from [GEM]. 18 B The triangle presentation λ 0 1 2 3 4 5 6 7 8 9 0 20 54 70 73 56 25 36 89 6 49 1 0 39 82 4 2 14 27 35 21 2 44 30 42 83 87 63 31 17 1 3 75 8 23 22 84 72 29 19 52 4 78 88 38 58 26 7 79 5 74 5 77 68 90 28 45 32 33 47 40 6 50 18 81 59 53 62 16 67 12 7 76 34 13 55 11 86 71 10 48 8 37 65 61 64 80 51 85 66 9 9 3 57 69 60 41 46 24 43 15 Table B.1: Point-line correspondence λ. (0,3,41) (0,69,80) (1,9,27) (2,81,63) (4,20,37) (5,31,33) (6,35,21) (7,46,69) (8,64,50) (9,59,46) (10,79,69) (12,12,12) (13,31,48) (14,22,63) (15,36,34) (16,60,84) (17,68,40) (19,32,79) (20,53,37) (21,80,77) (23,86,28) (25,47,48) (26,66,77) (28,42,52) (30,54,74) (32,54,64) (34,50,39) (36,53,44) (38,66,66) (43,43,43) (45,68,69) (49,53,73) (51,87,66) (58,72,75) (70,70,70) (0,10,82) (1,1,1) (2,3,62) (3,3,3) (4,28,15) (5,40,60) (6,44,10) (7,58,32) (8,80,70) (9,60,11) (11,11,11) (12,24,68) (13,46,35) (14,33,82) (15,45,82) (16,67,46) (17,74,72) (19,34,75) (20,56,70) (22,71,74) (23,90,57) (25,50,77) (27,31,61) (28,61,32) (30,62,61) (32,66,72) (34,63,37) (36,64,67) (38,81,81) (43,51,68) (45,86,62) (49,69,85) (52,75,84) (60,79,85) (71,75,88) (0,29,54) (1,2,16) (2,19,12) (3,14,8) (4,39,81) (5,45,53) (6,59,19) (7,63,64) (8,90,85) (10,17,23) (11,23,71) (12,39,86) (13,52,26) (14,41,37) (15,49,59) (16,70,36) (18,22,42) (19,54,45) (20,62,77) (22,74,63) (24,40,34) (25,57,56) (27,41,34) (28,73,42) (30,69,37) (33,33,33) (34,88,47) (36,78,65) (38,85,85) (43,59,64) (46,46,46) (49,73,53) (52,84,68) (60,86,63) (72,78,76) (0,34,9) (1,3,47) (2,43,61) (3,23,6) (4,48,29) (5,50,30) (6,78,24) (7,82,18) (9,20,43) (10,26,33) (11,37,82) (12,47,45) (13,62,79) (14,44,32) (15,59,89) (16,84,55) (18,29,39) (19,59,87) (20,77,24) (22,78,42) (24,51,85) (25,61,29) (27,54,29) (28,86,61) (31,54,83) (33,40,51) (34,90,35) (36,79,51) (39,49,41) (43,70,47) (46,71,76) (49,89,59) (53,90,88) (63,69,70) (79,79,79) (0,56,88) (1,4,72) (2,54,73) (3,27,56) (4,53,20) (5,55,40) (6,87,59) (8,11,87) (9,42,38) (10,27,82) (11,54,24) (12,58,56) (13,67,27) (14,51,58) (15,67,83) (16,90,18) (18,42,78) (19,77,22) (21,21,38) (23,28,80) (24,81,84) (25,74,49) (27,74,68) (29,44,89) (31,76,78) (33,47,46) (35,57,71) (37,52,89) (39,74,43) (44,44,44) (46,80,50) (50,55,76) (54,84,70) (65,66,86) (79,90,89) (0,61,31) (1,5,89) (2,60,65) (3,49,7) (4,74,79) (5,71,22) (7,18,39) (8,26,52) (9,55,44) (10,35,73) (11,55,85) (12,67,53) (13,75,52) (14,57,51) (15,88,65) (17,17,38) (18,62,87) (19,84,41) (21,29,68) (23,41,36) (24,88,32) (26,39,55) (27,80,69) (29,64,76) (31,78,36) (33,59,56) (35,62,41) (37,89,52) (40,76,41) (44,62,75) (48,48,48) (50,73,51) (55,56,79) (65,78,69) (80,81,87) (0,66,1) (1,6,86) (2,65,55) (3,76,4) (4,85,71) (6,13,25) (7,21,75) (8,36,58) (9,56,42) (10,48,77) (11,67,61) (12,80,82) (13,85,82) (14,65,43) (16,18,82) (17,46,20) (18,87,62) (19,85,61) (21,44,60) (23,43,26) (25,25,25) (26,45,76) (27,88,66) (29,71,70) (31,89,81) (33,72,39) (35,70,86) (38,41,41) (40,87,48) (44,74,80) (48,49,63) (50,76,60) (55,63,86) (66,89,71) (83,83,83) (0,67,13) (1,7,51) (2,73,35) (3,84,5) (5,17,90) (6,24,78) (7,32,57) (8,52,68) (9,57,48) (10,67,81) (11,72,49) (12,81,57) (13,86,64) (14,67,22) (16,40,25) (17,59,70) (18,90,29) (20,24,62) (21,53,31) (23,58,90) (25,30,58) (26,60,39) (28,32,40) (30,30,38) (31,90,43) (33,75,61) (35,71,58) (38,42,56) (42,47,47) (44,79,47) (48,58,81) (50,88,87) (56,83,60) (68,87,83) (88,88,88) Table B.2: Triangle presentation T compatible with λ. 19 (0,68,74) (1,8,77) (2,75,17) (4,15,28) (5,22,67) (6,30,26) (7,37,83) (8,57,36) (9,58,45) (10,73,50) (11,83,47) (12,89,76) (14,15,21) (15,16,30) (16,53,66) (17,65,82) (19,22,77) (20,33,64) (21,55,83) (23,83,77) (25,37,65) (26,63,88) (28,40,80) (30,45,57) (32,46,84) (34,34,34) (35,72,83) (38,64,64) (42,73,52) (45,45,45) (48,65,84) (51,73,54) (57,75,72) (69,78,72) References [Bae46] Reinhold Baer, Polarities in finite projective planes, Bull. Amer. Math. Soc. 52 (1946), 77–93. [BP07] Sylvain Barré and Mikaël Pichot, Sur les immeubles triangulaires et leurs automorphismes, Geom. Dedicata 130 (2007), 71–91. [BdlHV08] Bachir Bekka, Pierre de la Harpe, and Alain Valette, Kazhdan’s Property (T), New Mathematical Monographs, vol. 11, Cambridge Univ. Press, 2008. [BT72] François Bruhat and Jacques Tits, Groupes réductifs sur un corps local, I. Données radicielles valuées, Inst. Hautes Études Sci. Publ. Math. 41 (1972), 5–251. [CMSZ93a] Donald I. Cartwright, Anna M. Mantero, Tim Steger, and Anna Zappa, Groups acting simply transitively on the vertices of a building of type Ã2 , I, Geom. Dedicata 47 (1993), 143–166. [CMSZ93b] Donald I. Cartwright, Anna M Mantero, Tim Steger, and Anna Zappa, Groups acting simply transitively on the vertices of a building of type Ã2 , II, Geom. Dedicata 47 (1993), 167–223. [Dem68] Peter Dembowski, Finite Geometries, Ergebnisse der Mathematik und ihrer Grenzgebiete, vol. 44, Springer-Verlag, Berlin, 1968. [DPVM13] Alice Devillers, James Parkinson, and Hendrik Van Maldeghem, Automorphisms and opposition in twin buildings, J. Aust. Math. Soc. 94 (2013), 189–201. [EV10] Martin Edjvet and Alina Vdovina, On the SQ-universality of Groups with Special Presentations, J. Group Theory 13 (2010), 923–931. [How89] James Howie, On the SQ-universality of T (6)-groups, Forum Math. 1 (1989), 251–272. [Hug57] Daniel R. Hughes, A class of non-Desarguesian projective planes, Canad. J. Math. 9 (1957), 378–388. [Kan86] William M. Kantor, Generalized polygons, SCABs and GABs, Buildings and the Geometry of Diagrams (Proc. C.I.M.E. Session, Como 1984; L. A. Rosati ed.), Lecture Notes in Math., vol. 1181, Springer-Verlag, 1986, pp. 79–158. [LKT91] Clement W. H. Lam, Galina Kolesova, and Larry H. Thiel, A computer search for finite projective planes of order 9, Discrete Math. 92 (1991), 187–195. [Lün76] Heinz Lüneburg, Characterizations of the generalized Hughes planes, Canad. J. Math. 28 (1976), no. 2, 376–402. [GEM] G. Eric Moorhouse, Projective Planes of Small Order, consulted on October 30, 2015. [Ron86] Mark A. Ronan, A construction of Buildings with no rank 3 residues of spherical type, Buildings and the Geometry of Diagrams (Proc. C.I.M.E. Session, Como 1984; L. A. Rosati ed.), Lecture Notes in Math., vol. 1181, Springer-Verlag, 1986, pp. 242–248. [Ros58] Luigi Antonio Rosati, I gruppi di collineazioni dei piani di Hughes, Boll. Unione Mat. Ital. 13 (1958), no. 4, 505–513. [VM87] Hendrik Van Maldeghem, Non-classical triangle buildings, Geom. Dedicata 24 (1987), 123–206. [VW07] Oswald Veblen and Joseph H. M. Wedderburn, Non-Desarguesian and non-Pascalian geometries, Trans. Amer. Math. Soc. 8 (1907), 379–388. 20
4math.GR
1 Interactive Communication for Data Exchange arXiv:1601.03617v3 [cs.IT] 11 Nov 2017 Himanshu Tyagi, Member, IEEE, Pramod Viswanath, Fellow, IEEE, and Shun Watanabe, Member, IEEE Abstract—Two parties observing correlated data seek to exchange their data using interactive communication. How many bits must they communicate? We propose a new interactive protocol for data exchange which increases the communication size in steps until the task is done. We also derive a lower bound on the minimum number of bits that is based on relating the data exchange problem to the secret key agreement problem. Our single-shot analysis applies to all discrete random variables and yields upper and lower bounds of a similar form. In fact, the bounds are asymptotically tight and lead to a characterization of the optimal rate of communication needed for data exchange for a general source sequence such as a mixture of IID random variables as well as the optimal second-order asymptotic term in the length of communication needed for data exchange for IID random variables, when the probability of error is fixed. This gives a precise characterization of the asymptotic reduction in the length of optimal communication due to interaction; in particular, two-sided Slepian-Wolf compression is strictly suboptimal. I. I NTRODUCTION Random correlated data (X, Y ) is distributed between two parties with the first observing X and the second Y . What is the optimal communication protocol for the two parties to exchange their data? We allow (randomized) interactive communication protocols and a nonzero probability of error. This basic problem was introduced by El Gamal and Orlitsky in [23] where they presented bounds on the average number of bits of communication needed by deterministic protocols for data exchange without error1 . When interaction is not allowed, a simple solution is to apply Slepian-Wolf compression [29] for each of the two one-sided data transfer problems. The resulting protocol was shown to be of optimal rate, even in comparison with interactive protocols, when the underlying observations are independent and identically distributed (IID) by Csiszár and Narayan in [8]. They considered a multiterminal version of this problem, namely the problem of attaining omniscience, and established a lower bound on the rate of communication to show that interaction does not help in improving the asymptotic rate of communication if the probability of error vanishes to 0. However, interaction is known to be beneficial in one-sided data transfer (cf. [24], [38], [39], [9]). Can interaction help to reduce the communication needed for data exchange, and if so, what is H. Tyagi is with the Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India. Email: [email protected] P. Viswanath is with the Department of Electrical and Computer Engineering, University of Illinois, Urbana-Champaign, IL 61801, USA. Email: {pramodv}@illinois.edu S. Watanabe is with the Department of Computer and Information Sciences, Tokyo University of Agriculture and Technology, Tokyo 184-8588, Japan. Email: [email protected] 1 They also illustrated the advantage of using randomized protocols when error is allowed the minimum length of interactive communication needed for data exchange? We address the data exchange problem, illustrated in Figure 1, and provide answers to the questions raised above. We provide a new approach for establishing converse bounds for problems with interactive communication that relates efficient communication to secret key agreement and uses the recently established conditional independence testing bound for the length of a secret key [35]. Furthermore, we propose an interactive protocol for data exchange which matches the performance of our lower bound in several asymptotic regimes. As a consequence of the resulting single-shot bounds, we obtain a characterization of the optimal rate of communication needed for data exchange for a general sequence (Xn , Yn ) such as a mixture of IID random variables as well as the optimal second-order asymptotic term in the length of communication needed for data exchange for the IID random variables (X n , Y n ), first instance of such a result in source coding with interactive communication2 . This in turn leads to a precise characterization of the gain in asymptotic length of communication due to interaction. Related work: The role of interaction in multiparty data compression has been long recognized. For the data exchange problem, this was first studied in [23] where interaction was used to facilitate data exchange by communicating optimally few bits in a single-shot setup with zero error. In a different direction, [9], [38], [39] showed that interaction enables a universal variable-length coding for the Slepian-Wolf problem (see, also, [10] for a related work on universal encoding). Furthermore, it was shown in [38] that the redundancy in variablelength Slepian-Wolf coding with known distribution can be improved by interaction. In fact, the first part of our protocol is essentially the same as the one in [38] (see, also, [4]) wherein the length of the communication is increased in steps until the second√party can decode. In [38], the step size was chosen to be O( n) for the universal scheme and roughly O(n1/4 ) for the known distribution case. We recast this protocol in an information spectrum framework (in the spirit of [16]) and allow for a flexible choice of the step size. By choosing this step size appropriately, we obtain exact asymptotic results in various regimes. Specifically, the optimal choice of this step size ∆ is given by the square root √ of the essential length of the spectrum of PX|Y , i.e., ∆ = λmax − λmin where λmax and λmin are large probability upper and lower bounds, respectively, for√the random variable h(X|Y ) = − log PX|Y (X|Y ). The O( n) choice for the universal case of [38] follows as a special case since for the universal setup with IID source h(X n |Y n ) can vary over an interval of length O(n). Similarly, for a given 2 In a different context, recently [2] showed that the second-order asymptotic term in the size of good channel codes can be improved using feedback. 2 Y X 1 ⇧ Ŷ 1 X̂ Fig. 1: The data exchange problem. n n IID source, h(X √ |Y ) can essentially vary over an interval of length O( n) for which the choice of ∆ = O(n1/4 ) in [38] is appropriate by our general principle. While the optimal choice of ∆ (upto the order) was identified in [38] for special cases, the optimality of this choice was not shown there. Our main contribution is a converse which shows that our achieved length of communication is optimal in several asymptotic regimes. As a by-product, we obtain a precise characterization of gain due to interaction, one of the few such instances available in the literature. Drawing on the techniques introduced in this paper, the much more involved problem of simulation of interactive protocols was addressed in [33], [34]. Organization: The remainder of this paper is organized as follows: We formally describe the data exchange problem in Section II. Our results are summarized in Section III. Section IV contains our single-shot achievability scheme, along with the necessary prerequisites to describe it, and Section V contains our single-shot converse bound. The strong converse and second-order asymptotics for the communication length and the optimal rate of communication for general sources are obtained as a consequence of single-shot bounds in Section VI and VII, respectively. The final section contains a discussion of our results and extensions to the error exponent regime. II. P ROBLEM FORMULATION Let the first and the second party, respectively, observe discrete random variables X and Y taking values in finite sets X and Y. The two parties wish to know each other’s observation using interactive communication over a noiseless (error-free) channel. The parties have access to local randomness (private coins) UX and UY and shared randomness (public coins) U such that the random variables UX , UY , U are finite-valued and mutually independent and independent jointly of (X, Y ). For simplicity, we resrict to tree-protocols (cf. [20]). A treeprotocol π consists of a binary tree, termed the protocol-tree, with the vertices labeled by 1 or 2. The protocol starts at the root and proceeds towards the leaves. When the protocol is at vertex v with label iv ∈ {1, 2}, party iv communicates a bit bv based on its local observations (X, UX , U ) for iv = 1 or (Y, UY , U ) for iv = 2. The protocol proceeds to the leftor right-child of v, respectively, if bv is 0 or 1. The protocol terminates when it reaches a leaf, at which point each party produces an output based on its local observations and the bits communicated during the protocol, namely the transcript Π = π(X, Y, UX , UY , U ). Figure 2 shows an example of a protocol tree. The length of a protocol π, denoted |π|, is the maximum accumulated number of bits transmitted in any realization of the protocol, namely the depth of the protocol tree. Definition 1. For 0 ≤ ε < 1, a protocol π attains εdata exchange (ε-DE) if there exist functions Ŷ and X̂ of 2 2 1 2 Fig. 2: A two-party protocol tree. (X, Π, UX , U ) and (Y, Π, UX , U ), respectively, such that P(X̂ = X, Ŷ = Y ) ≥ 1 − ε. (1) The minimum communication for ε-DE Lε (X, Y ) is the infimum of lengths of protocols3 that attain ε-DE, i.e., Lε (X, Y ) is the minimum number of bits that must be communicated by the two parties in order to exchange their observed data with probability of error less than ε. Protocols with 2 rounds of communication Π1 and Π2 which are functions of only X and Y , respectively, are termed simple protocols. We denote by Lsε (X, Y ) the minimum communication for ε-DE by a simple protocol. III. S UMMARY OF RESULTS To describe our results, denote by h(X) = − log PX (X) and h(X|Y ) = − log PX|Y (X|Y ), respectively, the entropy density of X and the conditional entropy density of X given Y . Also, pivotal in our results is a quantity we call the sum conditional entropy density of X and Y defined as h(X4Y ) := h(X|Y ) + h(Y |X). An interactive data exchange protocol. Our data exchange protocol is based on an interactive version of the Slepian-Wolf protocol where the length of the communication is increased in steps until the second party decodes the data of the first. Similar protocols have been proposed earlier for distributed data compression in [10], [38], for protocol simulation in [4], and for secret key agreement in [17], [16]. In order to send X to an observer of Y , a single-shot version of the Slepian-Wolf protocol was proposed in [22] (see, also, [13, Lemma 7.2.1]). Roughly speaking, this protocol simply hashes X to as many bits as the right most point in the spectrum4 of PX|Y . The main shortcoming of this protocol for our purpose is that it sends the same number of bits for every realization of (X, Y ). However, we would like to use as few bits as possible for sending X to party 2 so that the remaining bits can be used for sending Y to party 1. Note that once X is recovered by party 2 correctly, it can send Y to Party 1 without error using, say, Shannon-Fano-Elias coding (eg. see [5, Section 5]); the length of this second communication is 3 By derandomizing (1), it is easy to see that local and shared randomness does not help, and deterministic protocols attain Lε (X, Y ). 4 Spectrum of a distribution P X refers, loosely, to the distribution of the random variable − log PX (X). 3 dh(Y |X)e bits. Our protocol accomplishes the first part above using roughly h(X|Y ) bits of communication. Specifically, in order to send X to Y we use a spectrum slicing technique introduced in [13] (see, also, [17], [16]). We divide the support [λmin , λmax ] of spectrum of PX|Y into N slices size ∆ each; see Figure 3 for an illustration. Specifically, the “excess” randomness generated when the parties observing X and Y share a communication Π can be extracted as a secret key independent of Π using the leftover hash lemma [19], [28]. Thus, denoting by Sε (X, Y ) the maximum length of secret key and by H the length of the common randomness (cf. [1]) generated by the two parties during the protocol, we get Bits used by Protocol 1 H − Lε (X, Y ) ≤ Sε (X, Y ). Bits used by Slepian-Wolf min i h(X | Y ) max Fig. 3: Spectrum slicing in Protocol 1. The protocol begins with the left most slice and party 1 sends λmin + ∆ hash bits to party 2. If party 2 can find a unique x that is compatible with the received hash bits and h(x|Y ) is within the current slice of conditional information spectrum, it sends back an ACK and the protocol stops. Else, party 2 sends back a NACK and the protocol now moves to the next round, in which Party 1 sends additional ∆ hash bits. The parties keep on moving to the next slice until either party 2 sends an ACK or all slices are covered. We will show that this protocol is reliable and uses no more than h(X|Y ) + ∆ + N bits of communication for each realization of (X, Y ). As mentioned above, once party 2 gets X, it sends back Y using h(Y |X)+1 bits, thereby resulting in an overall communication of h(X4Y ) + ∆ + N + 1 bits. In our applications, we shall choose N and ∆ to be of negligible order in comparison with the tail bounds for h(X4Y ). Thus, we have the following upper bound on Lε (X, Y ). (The statement here is rough; see Theorem 2 below for a precise version.) Result 1 (Rough statement of the single-shot upper bound). For every 0 < ε < 1, Lε (X, Y ) . inf{γ : P (h(X4Y ) > γ) ≤ ε}. A converse bound. Our next result, which is perhaps the main contribution of this paper, is a lower bound on Lε (X, Y ). This bound is derived by connecting the data exchange problem to the two-party secret key agreement problem. For an illustration of our approach in the case of IID random variables X n and Y n , note that the optimal rate of a secret key that can be generated is given by I(X ∧ Y ), the mutual information between X and Y [21], [1]. Also, using a privacy amplification argument (cf. [3], [27]), it can be shown that a data exchange protocol using nR bits can yield roughly n(H(XY ) − R) bits of secret key. Therefore, I(X ∧Y ) exceeds H(XY )−R, which further gives R ≥ H(X|Y ) + H(Y |X). This connection between secret key agreement and data exchange was noted first in [8] where it was used for designing an optimal rate secret key agreement protocol. Our converse proof is, in effect, a single-shot version of this argument. Next, we apply the recently established conditional independence testing upper bound for Sε (X, Y ) [35], [36], which follows by reducing a binary hypothesis testing problem to secret key agreement. However, the resulting lower bound on Lε (X, Y ) is good only when the spectrum of PXY is concentrated. Heuristically, this slack in the lower bound arises since we are lower bounding the worst-case communication complexity of the protocol for data exchange – the resulting lower bound need not apply for every (X, Y ) but only for a few realizations of (X, Y ) with probability greater than ε. To remedy this shortcoming, we once again take recourse to spectrum slicing and show that there exists a slice of the spectrum of PXY where the protocol requires sufficiently large number of bits; Figure 4 illustrates this approach. The resulting lower bound on Lε (X, Y ) is stated below roughly, and a precise statement is given in Theorem 4. Lower bound without slicing min L✏ min Upper bound with slicing H✏ i+ with slicing i L✏ i h(XY ) without slicing max H✏ max Fig. 4: Bounds on secret key length leading to the converse. Here Lε abbreviates Lε (X, Y ) and Hε denotes the ε-tail of h(X4Y ). Result 2 (Rough statement of the single-shot lower bound). For every 0 < ε < 1, Lε (X, Y ) & inf{γ : P (h(X4Y ) > γ) ≤ ε}. Note that the upper and the lower bounds for Lε (X, Y ) in the two results above appear to be of the same form (upon ignoring a few error terms). In fact, the displayed term dominates asymptotically and leads to tight bounds in several asympotitic regimes. Thus, the imprecise forms above capture the spirit of our bounds. Asymptotic optimality. The single-shot bounds stated above are asymptotically tight up to the first order term for any sequence of random variables (Xn , Yn ), and up to the second order term for a sequence of IID random variables (X n , Y n ). Specifically, consider a general source sequence (X, Y) = {(Xn , Yn )}∞ n=1 . We are interested in characterizing the minimum asymptotic rate of communication for asymptotically error-free data exchange, and seek its comparison with the minimum rate possible using simple protocols. 4 Definition 2. The minimum rate of communication for data exchange R∗ is defined as 1 R (X, Y) = inf lim sup Lεn (Xn , Yn ), εn n→∞ n ∗ where the infimum is over all εn → 0 as n → ∞. The corresponding minimum rate for simple protocols is denoted by Rs∗ . Denote by H(X4Y), H(X|Y), and H(Y|X), respectively, the lim sup in probability of random variables h(Xn 4Yn ), h(Xn |Yn ), and h(Yn |Xn ). The quantity H(X|Y) is standard in information spectrum method [14], [13] and corresponds to the asymptotically minimum rate of communication needed to send Xn to an observer of Yn [22] (see, also, [13, Lemma 7.2.1]). Thus, a simple communication protocol of rate H(X|Y) + H(Y|X) can be used to accomplish data exchange. In fact, a standard converse argument can be used to show the optimality of this rate for simple communication. Therefore, when we restrict ourselves to simple protocols, the asymptotically minimum rate of communication needed is Rs∗ (X, Y) = H(X|Y) + H(Y|X). As an illustration, consider the case when (Xn , Yn ) are gener(1) ated by a mixture of two n-fold IID distributions PX n Y n and (2) PX n Y n . For this case, the right-side above equals (cf. [13]) max{H(X (1) | Y (1) ), H(X (2) | Y (2) )} + max{H(Y (1) | X (1) ), H(Y (2) | X (2) )}. Can we improve this rate by using interactive communication? Using our single-shot bounds for Lε (X, Y ), we answer this question in the affirmative. Result 3 (Min rate of communication for data exchange). For a sequence of sources (X, Y) = {(Xn , Yn )}∞ n=1 , R∗ (X, Y) = H(X4Y). For the mixture of IID example above, H(X4Y) = max{H(X (1) | Y (1) ) + H(Y (1) | X (1) ), H(X (2) | Y (2) ) + H(Y (2) | X (2) )}, and therefore, simple protocols are strictly suboptimal in general. Note that while the standard information spectrum techniques suffice to prove the converse when we restrict to simple protocols, their extension to interactive protocols is unclear and our single-shot converse above is needed. Turning now to the case of IID random variables, i.e. when Xn = X n = (X1 , ..., Xn ) and Yn = Y n = (Y1 , ..., Yn ) are n-IID repetitions of random variables (X, Y ). For brevity, denote by R∗ (X, Y ) the corresponding minimum rate of communication for data exchange, and by H(X4Y ) and V , respectively, the mean and the variance of h(X4Y ). Earlier, Csiszár and Narayan [8] showed that R∗ (X, Y ) = H(X4Y ). We are interested in a finer asymptotic analysis than this first order characterization. In particular, we are interested in characterizing the asymptotic behavior of Lε (X n , Y n ) up to the second-order term, for every fixed ε in (0,1). We need the following notation: 1 Lε (X n , Y n ), 0 < ε < 1. n Note that R∗ (X, Y ) = supε∈(0,1) Rε∗ (X, Y ). Our next result shows that Rε∗ (X, Y ) does not depend on ε and constitutes a strong converse for the result in [8]. Rε∗ (X, Y ) = lim n→∞ Result 4 (Strong converse). For every 0 < ε < 1, Rε∗ (X, Y ) = H(X4Y ). In fact, this result follows from a general result characterizing the second-order asymptotic term5 . Result 5 (Second-order asymptotic behavior). For every 0 < ε < 1, √ √ Lε (X n , Y n ) = nH(X4Y ) + nV Q−1 (ε) + o( n), where Q(a) is the tail probability of the standard Gaussian distribution and V is the variance of the sum conditional entropy density h(X4Y ). While simple protocols are optimal for the first-order term for IID observations, Example 1 in Section VII exhibits the strict suboptimality of simple protocols for the second-order term. IV. A SINGLE - SHOT DATA EXCHANGE PROTOCOL We present a single-shot scheme for two parties to exchange random observations X and Y . As a preparation for our protocol, we consider the restricted problem where only the second party observing Y seeks to know the observation X of the first party. This basic problem was introduced in the seminal work of Slepian and Wolf [29] for the case where the underlying data is IID where a scheme with optimal rate was given. A single-shot version of the Slepian-Wolf scheme was given in [22] (see, also, [13, Lemma 7.2.1]). which we describe below. Using the standard “random binning” and “typical set” decoding argument, it follows that there exists an l-bit communication Π1 = Π1 (X) and a function X̂ of (Π1 , Y ) such that   P X 6= X̂ ≤ P (h(X|Y ) > l − η) + 2−η . (2) In essence, the result of [22] shows that we can send X to Party 2 with a probability of error less than ε using roughly as many bits as the ε-tail of h(X|Y ). However, the proposed scheme uses the same number of bits for every realization of (X, Y ). In contrast, we present an interactive scheme that achieves the same goal and uses roughly h(X|Y ) bits when the underlying observations are (X, Y ) While the bound in (2) can be used to establish the asymptotic rate optimality of the Slepian-Wolf scheme even for general sources, the number of bits communicated can be reduced for specific realizations of X, Y . This improvement is achieved using an interactive protocol with an ACK − NACK 5 Following the pioneering work of Strassen [30], study of these secondorder terms in coding theorems has been revived recently by Hayashi [15], [18] and Polyanskiy, Poor, and Verdú [26]. 5 feedback which halts as soon as the second party decodes first’s observation; this protocol is described in the next subsection. A similar scheme was introduced by Feder and Shulman in [10], a variant of which was shown to be of least average-case complexity for stationary sources by Yang and He in [38], requiring H(X | Y ) bits on average. Another variant of this scheme has been used recently in [16] to generate secret keys of optimal asymptotic length upto the second-order term. A. Interactive Slepian-Wolf Compression Protocol We begin with an interactive scheme for sending X to an observer of Y , which hashes (bins) X into a few values as in the scheme of [22], but unlike that scheme, increases the hash-size gradually, starting with λ1 = λmin and increasing the size ∆-bits at a time until either X is recovered or λmax bits have been sent. After each transmission, Party 2 sends either an ACK-NACK feedback signal; the protocol stops when an ACK symbol is received. As mentioned in the introduction, we rely on spectrum slicing. Our protocol focuses on the “essential spectrum” of h(X|Y ), i.e., those values of (X, Y ) for which h(X|Y ) ∈ (λmin , λmax ). For λmin , λmax , ∆ > 0 with λmax > λmin , let N= λmax − λmin , ∆ (3) and λi = λmin + (i − 1)∆, 1 ≤ i ≤ N. (4) Further, let n o T0 = (x, y) : hPX|Y (x|y) ≥ λmax or hPX|Y (x|y) < λmin , (5) and for 1 ≤ i ≤ N , let Ti denote the ith slice of the spectrum given by n o Ti = (x, y) : λi ≤ hPX|Y (x|y) < λi + ∆ . (6) Note that T0 corresponds to the complement of the “typical set.” Finally, let Hl (X ) denote the set of all mappings h : X → {0, 1}l . Our protocol for transmitting X to an observer of Y is described in Protocol 1. The lemma below bounds the probability of error for Protocol 1 when (x, y) ∈ Ti , 1 ≤ i ≤ N . Theorem 1 (Interactive Slepian-Wolf). Protocol 1 with l = λmin + ∆ + η sends at most (h (X|Y ) + ∆ + N + η) bits when the observations are (X, Y ) ∈ / T0 and has probability of error less than   P X̂ 6= X ≤ PXY (T0 ) + N 2−η . Note that when T0 is chosen to be of small probability, Protocol 1 sends essentially the same number of bits in the worst-case as the Slepian-Wolf protocol. B. Interactive protocol for data exchange Returning to the data exchange problem, our protocol for data exchange builds upon Protocol 1 and uses it to first Protocol 1: Interactive Slepian-Wolf compression Input: Observations X and Y , uniform public randomness U , and parameters l, ∆ Output: Estimate X̂ of X at party 2 Both parties use U to select h1 uniformly from Hl (X ) Party 1 sends Π1 = h1 (X) if Party 2 finds a unique x ∈ T1 with hash value h1 (x) = Π1 then set X̂ = x send back Π2 = ACK else send back Π2 = NACK while 2 ≤ i ≤ N and party 2 did not send an ACK do Both parties use U to select hi uniformly from H∆ (X ), independent of h1 , ..., hi−1 Party 1 sends Π2i−1 = hi (X) if Party 2 finds a unique x ∈ Ti with hash value hj (x) = Π2j−1 , ∀ 1 ≤ j ≤ i then set X̂ = x send back Π2i = ACK else if More than one such x found then protocol declares an error else send back Π2i = NACK Reset i → i + 1 if No X̂ found at party 2 then Protocol declares an error transmit X to the second party (observing Y ). Once Party 2 has recovered X correctly, it sends Y to Party 1 without error using, say, Shannon-Fano-Elias coding (eg. see [5, Section 5]); the length of this second communication is dh(Y |X)e bits. When the accumulated number of bits communicated in the protocol exceeds a prescribed length lmax , the parties abort the protocol and declare an error.6 Using Theorem 1, the probability of error of the combined protocol is bounded above as follows. Theorem 2 (Interactive data exchange protocol). Given λmin , λmax , ∆, η > 0 and for N in (3), there exists a protocol for data exchange of length lmax such that   P X 6= X̂ or Y 6= Ŷ ≤ P (h(X4Y ) + ∆ + N + η + 1 > lmax ) + PXY (T0 ) + N 2−η . Thus, we attain ε-DE using a protocol of length lmax = λε + ∆ + N + η + 1, where λε is the ε-tail of h(X4Y ). Note that using the noninteractive Slepian-Wolf protocol on both sides will require roughly as many bits of communication as the sum of ε-tails of h(X|Y ) and h(Y |X), which, in general, is more than the 6 Alternatively, we can use the (noninteractive) Slepian-Wolf coding by setting the size of hash as lmax − (h(X|Y ) + ∆ + N + η). 6 ε-tail of h(X|Y ) + h(Y |X). C. Proof of Theorem 1 The theorem follows as a corollary of the following observation. Lemma 3 (Performance of Protocol 1). For (x, y) ∈ Ti , 1 ≤ i ≤ N , denoting by X̂ = X̂(x, y) the estimate of x at Party 2 at the end of the protocol (with the convention that X̂ = ∅ if an error is declared), Protocol 1 sends at most (l + (i − 1)∆ + i) bits and has probability of error bounded above as follows:   P X̂ 6= x | X = x, Y = y ≤ i2λmin +∆−l . Proof. Since (x, y) ∈ Ti , an error occurs if there exists a x̂ 6= x such that (x̂, y) ∈ Tj and Π2k−1 = h2k−1 (x̂) for 1 ≤ k ≤ j for some j ≤ i. Therefore, the probability of error is bounded above as   P X̂ 6= x | X = x, Y = y ≤ i X X j=1 x̂6=x P (h2k−1 (x) = h2k−1 (x̂), ∀ 1 ≤ k ≤ j) × 1 (x̂, y) ∈ Tj ≤ =  i X X  1 1 (x̂, y) ∈ Tj l+(j−1)∆ 2 j=1 x̂6=x i X X 1 |{x̂ | (x̂, y) ∈ Tj }| l+(j−1)∆ 2 j=1 x̂6=x ≤ i2λmin −l+∆ , where we have used the fact that log |{x̂ | (x̂, y) ∈ Tj }| ≤ λj + ∆. Note that the protocol sends l bits in the first transmission, and ∆ bits and 1-bit feedback in every subsequent transmission. Therefore, no more than (l + (i − 1)∆ + i) bits are sent. V. C ONVERSE BOUND Our converse bound, while heuristically simple, is technically involved. We first state the formal statement and provide the high level ideas underlying the proof; the formal proof will be provided later. Our converse proof, too, relies on spectrum slicing to find the part of the spectrum of PXY where the protocol communicates large number of bits. As in the achievability part, we shall focus on the “essential spectrum” of h(XY ). Given λmax , λmin , and ∆ > 0, let N be as in (3) and the set T0 be as in (5), with hPX|Y (x|y) replaced by hPXY (xy) in those definitions. Theorem 4. For 0 ≤ ε < 1, 0 < η < 1 − ε, and parameters ∆, N as above, the following lower bound on Lε (X, Y ) holds for every γ > 0:   1 Lε (X, Y ) ≥ γ + 3 log Pγ − ε − PXY (T0 ) − N + 1 + log(1 − 2η) − ∆ − 6 log N − 4 log − 1, η where Pγ := PXY (h(X4Y ) > γ). Thus, a protocol attaining ε-DE must communicate roughly as many bits as ε-tail of h(X4Y ). The main idea is to relate data exchange to secret key agreement, which is done in the following two steps: 1) Given a protocol π for ε-DE of length l, use the leftover hash lemma to extract an ε-secret key of length roughly λmin − l. 2) The length of the secret key that has been generated is bounded above by Sε (X, Y ), the maximum possible length of an ε-secret key. Use the conditional independence testing bound in [35], [36] to further upper bound Sε (X, Y ), thereby obtaining a lower bound for l. This approach leads to a loss of λmax − λmin , the length of the spectrum of PXY . However, since we are lower bounding the worse-case communication complexity, we can divide the spectrum into small slices of length ∆, and show that there is a slice where the communication is high enough by applying the steps above to the conditional distribution given that (X, Y ) lie in a given slice. This reduces the loss from λmax − λmin to ∆. A. Review of two party secret key agreement Consider two parties with the first and the second party, respectively, observing the random variable X and Y . Using an interactive protocol Π and their local observations, the parties agree on a secret key. A random variable K constitutes a secret key if the two parties form estimates that agree with K with probability close to 1 and K is concealed, in effect, from an eavesdropper with access to communication Π. Formally, let Kx and Ky , respectively, be randomized functions of (X, Π) and (Y, Π). Such random variables Kx and Ky with common range K constitute an ε-secret key (εSK) if the following condition is satisfied: 1 (2) PKx Ky Π − Punif × PΠ 2 ≤ ε, where (2) Punif (kx , ky ) = 1(kx = ky ) |K| , and k·k is the variational distance. The condition above ensures both reliable recovery, requiring P (Kx 6= Ky ) to be small, and information theoretic secrecy, requiring the distribution of Kx (or Ky ) to be almost independent of the communication Π and to be almost uniform. See [35] for a discussion on connections between the combined condition above and the usual separate conditions for recovery and secrecy. Definition 3. Given 0 ≤ ε < 1, the supremum over lengths log |K| of an ε-SK is denoted by Sε (X, Y ). A key tool for generating secret keys is the leftover hash lemma [19], [28] which, given a random variable X and an lbit eavesdropper’s observation Z, allows us to extract roughly Hmin (PX ) − l bits of uniform bits, independent of Z. Here Hmin denotes the min-entropy and is given by Hmin (PX ) = sup log x 1 . PX (x) 7 Formally, let F be a 2-universal family of mappings f : X → K, i.e., for each x0 6= x, the family F satisfies 1 1 X 1(f (x) = f (x0 )) ≤ . |F| |K| f ∈F Lemma 5 (Leftover Hash). Consider random variables X and Z taking values in a countable set X and a finite set Z, respectively. Let S be a random seed such that fS is uniformly distributed over a 2-universal family F. Then, for K = fS (X) q kPKZS − Punif PZS k ≤ |K||Z|2−Hmin (PX ) , where Punif is the uniform distribution on K. The version above is a straightforward modification of the leftover hash lemma in, for instance, [27] and can be derived in a similar manner (see Appendix B of [16]). Next, we recall the conditional independence testing upper bound on Sε (X, Y ), which was established in [35], [36]. In fact, the general upper bound in [35], [36] is a singleshot upper bound on the secret key length for a multiparty secret key agreement problem with side information at the eavesdropper. Below, we recall a specialization of the general result for the two party case with no side information at the eavesdropper. In order to state the result, we need the following concept from binary hypothesis testing. Consider a binary hypothesis testing problem with null hypothesis P and alternative hypothesis Q, where P and Q are distributions on the same alphabet V. Upon observing a value v ∈ V, the observer needs to decide if the value was generated by the distribution P or the distribution Q. To this end, the observer applies a stochastic test T, which is a conditional distribution on {0, 1} given an observation v ∈ V. When v ∈ V is observed, the test T chooses the null hypothesis with probability T(0|v) and the alternative hypothesis with probability T (1|v) = 1 − T (0|v). For 0 ≤ ε < 1, denote by βε (P, Q) the infimum of the probability of error of type II given that the probability of error of type I is less than ε, i.e., βε (P, Q) := inf T : P[T]≥1−ε Q[T], (7) where P[T] = X P(v)T(0|v), v Q[T] = X Q(v)T(0|v). v The following upper bound for Sε (X, Y ) was established in [35], [36]. Theorem 6 (Conditional independence testing bound). Given 0 ≤ ε < 1, 0 < η < 1 − ε, the following bound holds:  Sε (X, Y ) ≤ − log βε+η PXY , QX QY + 2 log(1/η), for all distributions QX and QY on on X and Y, respectively. We close by noting a further upper bound for βε (P, Q), which is easy to derive (cf. [25]). Lemma 7. For every 0 ≤ ε ≤ 1 and λ,     P (X) <λ −ε , − log βε (P, Q) ≤ λ − log P log Q (X) + where (x)+ = max{0, x}. B. Converse bound for almost uniform distribution First, we consider a converse bound under the almost uniformity assumption. Suppose that there exist λmin and λmax such that λmin ≤ − log PXY (x, y) ≤ λmax , ∀(x, y) ∈ supp(PXY ), (8) where supp(PXY ) denotes the support of PXY . We call such a distribution PXY an almost uniform distribution with margin ∆ = (λmax − λmin ). Theorem 8. Let PXY be almost uniform with margin ∆. Given 0 ≤ ε < 1, for every 0 < η < 1−ε, and all distributions QX and QY , it holds that Lε (X, Y ) 2 PXY (X, Y ) ≥γ ≥ γ + log P − log QX (X) QY (Y ) ! ! − ε − 2η + 1 − ∆ − 4 log − 1. η Remark 1. If ∆ ≈ 0 (the almost uniform case), the bound above yields Result 2 upon choosing QX = PX and QY = PY . Proof. Given a protocol π of length l that attains ε-DE, using Lemma 5 we can generate an (ε + η)-SK that is almost independent of Π and takes values in K with log |K| ≥ λmin − l − 2 log(1/η) − 1. Also, by Theorem 6 log |K| ≤ − log βε+2η (PXY , QX QY ) + 2 log(1/η), which along with the inequality above and Lemma 7 yields     PXY (X, Y ) l ≥ λmin + log P log < λ − ε − 2η QX (X) QY (Y ) + − λ − 4 log(1/η) − 1. The claimed bound follows upon choosing λ = λmax − γ and using assumption (8). C. Converse bound for all distributions The shortcoming of Theorem 8 is the ∆-loss, which is negligible only if λmax ≈ λmin . To circumvent this loss, we divide the spectrum of PXY into slices such that, conditioned on any slice, the distribution is almost uniform with a small margin ∆. To lower bound the worst-case communication complexity of a given protocol, we identify a particular slice where appropriately many bits are communicated; the required slice is selected using Lemma 9 below. 8 Given λmax , λmin , and ∆ > 0, let N be as in (3), T0 be as in (5), and λi and Ti , too, be as defined there, with hPX|Y (x|y) replaced by hPXY (xy) in those definitions. Let random variable J take the value j when {(X, Y ) ∈ Tj }. For a protocol Π attaining ε-DE, denote Ecorrect := {X = X̂, Y = Ŷ }, Eγ := {h(X4Y ) ≥ γ}, (9) Ej := Ecorrect ∩ T0c ∩ Eγ ∩ {J = j}, Pγ := PXY (Eγ ) . 1 ≤ j ≤ N, Lemma 9. There exists an index 1 ≤ j ≤ N such that PJ (j) > 1/N 2 and   1 . PXY |J (Ej | j) ≥ Pγ − ε − PXY (T0 ) − N Proof. Let J1 be the set of indices 1 ≤ j ≤ N such that PJ (j) > 1/N 2 , and let J2 = {1, ..., N } \ J1 . Note that PJ (J2 ) ≤ 1/N . Therefore, T0c Pγ − ε − PXY (T0 ) ≤ P (Ecorrect ∩ ∩ Eγ ) X ≤ PJ (j) PXY |J (Ej | j) + PJ (J2 ) j∈J1 ≤ max PXY |J (Ej | j) + j∈J1 1 . N Thus, the maximizing j ∈ J1 on the right satisfies the claimed properties. We now state our main converse bound. Theorem 10 (Single-shot converse). For 0 ≤ ε < 1, 0 < η < 1 − ε, and parameters ∆, N as above, the following lower bound on Lε (X, Y ) holds:   1 Lε (X, Y ) ≥ γ + 3 log Pγ − ε − PXY (T0 ) − N + 1 + log(1 − 2η) − ∆ − 6 log N − 4 log − 1. η Proof. Let j satisfy the properties stated in Lemma 9. The basic idea is to apply Theorem 8 to PXY |Ej , where PXY |Ej denotes the conditional distributions on X, Y given the event Ej . First, we have PXY |Ej (x, y) ≥ PXY (x, y) . (10) Furthermore, denoting α = Pγ − ε − PXY (T0 ) − 1/N and noting PJ (j) > 1/N 2 , we have for all (x, y) ∈ Ej that 1 PXY |Ej (x, y) ≤ PXY |J=j (x, y) (11) α 2 N ≤ PXY (x, y) , (12) α where PXY |J=j denotes the conditional distributions on X, Y given {J = j}. Thus, (10) and (12) together imply, for all (x, y) ∈ Ej , λj + log α − 2 log N ≤ − log PXY |Ej (x, y) ≤ λj + ∆, i.e., PXY |Ej is almost uniform with margin ∆−log α+2 log N (cf. (8)). Also, note that (12) implies   PXY |Ei (X, Y )2 PXY |Ej − log ≥ γ + 2 log α − 4 log N PX (X) PY (Y ) ! 2 PXY (X, Y ) ≥ PXY |Ej − log ≥γ PX (X) PY (Y ) = PXY |Ei (Eγ ) = 1, where the final equality holds by the definition of Eγ in (9). Moreover,   PXY |Ej X = X̂, Y = Ŷ = 1. Thus, the proof is completed by applying Theorem 8 to PXY |Ej with QX = PX and QY = PY , and ∆ − log α + 2 log N in place of ∆. D. Converse bound for simple communication protocol We close by noting a lower bound for the length of communication when we restrict to simple communication. For simplicity assume that the joint distribution PXY is indecomposable, i.e., the maximum common function of X and Y is a constant (see [12]) and the parties can’t agree on even a single bit without communicating (cf. [37]). The following bound holds by a standard converse argument using the information spectral method (cf. [13, Lemma 7.2.2]). Proposition 11. For 0 ≤ ε < 1, we have Lsε (X, Y )  ≥ inf l1 + l2 : ∀δ > 0,    P h(X|Y ) > l1 + δ or h(Y |X) > l2 + δ ≤ ε + 2 · 2−δ . Proof: Since randomization (local or shared) does not help in improving the length of communication (cf. [20, Chapter 3]) we can restrict to deterministic protocols. Then, since PXY is indecomposible, both parties have to predetermine the lengths of messages they send; let l1 and l2 , respectively, be the length of message sent by the first and the second party. For δ > 0, let n o T1 := (x, y) : − log PX|Y (x|y) ≤ l1 + δ , n o T2 := (x, y) : − log PY |X (y|x) ≤ l2 + δ , and T := T1 ∩ T2 . Let A1 and A2 be the set of all (x, y) such that party 2 and party 1 correctly recover x and y, respectively, and let A := A1 ∩ A2 . Then, for any simple communication protocol that attains ε-DE, we have PXY (T c ) = PXY (T c ∩ Ac ) + PXY (T c ∩ A) ≤ PXY (Ac ) + PXY (T1c ∩ A) + PXY (T2c ∩ A) ≤ ε + PXY (T1c ∩ A1 ) + PXY (T2c ∩ A2 ) ≤ ε + 2 · 2−δ , where the last inequality follows by a standard argument 9 ∆= (cf. [13, Lemma 7.2.2]) as follows: X PXY (T1c ∩ A1 ) ≤ PY (y) PX|Y (T1c ∩ A1 |y) =N η = ∆, y ≤ X ≤ X ≤ X y y PY (y) |{x : (x, y) ∈ A1 }|2−l1 −δ lmax = n(H(X4Y) + δ) + 3∆ + 1 √ = n(H(X4Y) + δ) + O( n), PY (y) |{x : (x, y) ∈ A1 }|2−l1 −δ PY (y) 2−δ y = 2−δ , and similarly for PXY (T2c ∩ A2 ); the desired bound follows. While the best rate of communication required for two parties to exchange their data is known [8], and it can be attained by simple (noninteractive) Slepian-Wolf compression on both sides, the problem remains unexplored for general sources. In fact, the answer is completely different in general and simple Slepian-Wolf compression is suboptimal. Formally, let (Xn , Yn ) with joint distribution7 PXn Yn be a sequence of sources. We need the following concepts from the information spectrum method; see [13] for a detailed account. For random variables (X, Y) = {(Xn , Yn )}∞ n=1 , the the inf entropy rate H(XY) and the sup entropy rate H(XY) are defined as follows:     1 H(XY) = sup α | lim P h(Xn Yn ) < α = 0 , n→∞ n     1 h(Xn Yn ) > α = 0 ; H(XY) = inf α | lim P n→∞ n the sup-conditional entropy rate H(X|Y) is defined analogously by replacing h(Xn Yn ) with h(Xn |Yn ). To state our result, we also need another quantity defined by a limit-superior in probability, namely the sup sum conditional entropy rate, given by H(X4Y)     1 h(Xn 4Yn ) > α = 0 . = inf α | lim P n→∞ n = R∗ (X, Y) = H(X4Y). Proof. The claim follows from Theorems 2 and 10 on choosing the spectrum slicing parameters λmin , λmax , and ∆ appropriately. Specifically, using Theorem 2 with λmax = n(H(X, Y) + δ), 7 The distributions PXn Yn need not satisfy the consistency conditions. λmin = n(H(X, Y) − ∆), λmax = n(H(X, Y) + ∆), γ = n(H(X4Y) − δ) for arbitrarily fixed δ > 0, we get for n sufficiently large that Lεn (Xn , Yn ) ≥ n(H(X4Y) − δ) + o(n). Since δ > 0 is arbitrary, the proof is complete. VII. S TRONG CONVERSE AND SECOND - ORDER ASYMPTOTICS We now turn to the case of IID observations (X n , Y n ) and establish the second-order asymptotic term in Lε (X n , Y n ). Theorem 13. For every 0 < ε < 1, √ √ Lε (X n , Y n ) = nH(X4Y ) + nV Q−1 (ε) + o( n). Proof. As before, we only need to choose appropriate parameters in Theorems 2 and 10. Let T denote the third central moment of the random variable h(X4Y ). For the achievability part, note that for IID random √ variables (X n , Y n ) the spectrum of PX n Y n has width O( n). Therefore, the parameters ∆ and N can be O(n1/4 ). Specifically, by standard measure concentration bounds (for bounded random variables), for every δ > 0 √ there exists a constant c such √ that with λmax = nH(XY ) + c n and λmin = nH(XY ) − c n, P ((X n , Y n ) ∈ T0 ) ≤ δ. The result below characterizes R∗ (X, Y) (see Definition 2). λmin = n(H(X, Y) − δ), where δ > 0 is arbitrary, we get a communication protocol of rate H(X4Y) + δ + O(n−1/2 ) attaining εn -DE with εn → 0. Since δ > 0 is arbitrary, R∗ (X, Y) ≤ H(X4Y). For the other direction, given a sequence of protocols attaining εn -DE with εn → 0. Let and so, N = O(n). Using Theorem 10 with VI. G ENERAL SOURCES Theorem 12. For a sequence of sources (X, Y) {(Xn , Yn )}∞ n=1 , p λmax − λmin For λn = nH(X4Y ) + √ nV Q −1  ε − 2δ − T3 √ 2V 3/2 n  , √ choosing ∆ = N = η = 2cn1/4 , and lmax = λn + 3∆ + 1 in Theorem 2, we get a protocol of length lmax satisfying ! n   X P X 6= X̂, or Y 6= Ŷ ≤ P h(Xi 4Yi ) > λn + 2δ, i=1 for n sufficiently large. Thus, the Berry-Esséen theorem (cf. [11]) and the observation above gives a protocol of length lmax attaining ε-DE. Therefore, using the Taylor approximation of Q(·) yields the achievability of the claimed protocol length; we skip the details of this by-now-standard argument (see, for instance, [26]). 10 Similarly, the converse follows by Theorem 10 and the Berry-Esséen theorem upon choosing λmax , λmin , and N as in the proof of converse part of Theorem 12 when λn is chosen to be   √ T3 1 √ λn = nH(X4Y ) + nV Q−1 ε − 2 − N 2V 3/2 n √ = nH(X4Y ) + nV Q−1 (ε) + O(log n), where the final equality is by the Taylor approximation of Q(·). In the previous section, we saw that interaction is necessary to attain the optimal first order asymptotic term in Lε (Xn , Yn ) for a mixture of IID random variables. In fact, even for IID random variables interaction is needed to attain the correct second order asymptotic term in Lε (X n , Y n ), as shown by the following example. Example 1. Consider random variables X and Y with an indecomposable joint distribution PXY such that the matrix V = Cov([− log PX|Y (X|Y ) , − log PY |X (Y |X)]) V is nonsingular. For IID random variables (X n , Y n ) with common distribution PXY , using Proposition 11 and a multidimensional Berry-Esséen theorem (cf. [31]), we get that the second-order asymptotic term for the minimum length of simple communication for ε-DE is given by8 √ √ Lsε (X n , Y n ) = nH(X4Y ) + nDε + o( n), where n o Dε := inf r1 + r2 : P (Z1 ≤ r1 , Z2 ≤ r2 ) ≥ 1 − ε , for Gaussian vector Z = [Z1 , Z2 ] with mean [0, 0] and covariance matrix V. Since V is nonsingular,9 we have n   o √ V Q−1 (ε) = inf r : P Z1 + Z2 ≤ r ≥ 1 − ε < Dε . Therefore, Lε (X n , Y n ) has strictly smaller second order term than Lsε (X n , Y n ), and interaction is necessary for attaining the optimal second order term in Lε (X n , Y n ). VIII. D ISCUSSION We have presented an interactive data exchange protocol and a converse bound which shows that, in a single-shot setup, the parties can exchange data using roughly h(X∆Y ) bits when the parties observe X and Y . Our analysis is based on the information spectrum approach. In particular, we extend this approach to enable handling of interactive communication. A key step is the spectrum slicing technique which allows us to split a nonuniform distribution into almost uniform “spectrum slices”. Another distinguishing feature of this work is our converse technique which is based on extracting a secret key from the exchanged data and using an upper bound for the 8 The achievability part can be derived by a slight modification of the arguments in [22],[13, Lemma 7.2.1]. 9 For instance, when X is uniform random variable on {0, 1} and Y is connected to X via a binary symmetric channel, the covariance matrix V is singular and interaction does not help. rate of this secret key. In effect, this falls under the broader umbrella of common randomness decomposition methodology presented in [32] that studies a distributed computing problem by dividing the resulting common randomness into different independent components with operational significance. As a consequence, we obtain both the optimal rate for data exchange for general sources as well as the precise second-order asymptotic term for IID observations (which in turn implies a strong converse). Interestingly, none of these optimal results can be obtained by simple communication and interaction is necessary, in general. Note that our proposed scheme uses O(n1/4 ) rounds of interaction; it remains open if fewer rounds of interaction will suffice. Another asymptotic regime, which was not considered in this paper, is the error exponent regime where we seek to characterize the largest possible rate of exponential decay of error probability with blocklength for IID observations. Specifically, denoting by Perr (l|X, Y ) the least probability of error ε that can be attained for data exchange by communicating less than l bits, i.e., Perr (l|X, Y ) := inf{ε : Lε (X, Y ) ≤ l}, we seek to characterize the limit of  1 − log Perr 2nR |X n , Y n . n The following result is obtained using a slight modification of our single-shot protocol for data exchange where the slices of the spectrum Ti in (6) are replaced with type classes and the decoder is replaced by a special case of the α-decoder introduced in [6]. For a fixed rate R ≥ 0, our modified protocol enables data exchange, with large probability, for every (x, y) with joint type PX Y such that (roughly) R > H(X4Y ). The converse part follows from the strong converse of Result 4, together with a standard measure change argument (cf. [7]). The formal proof is given in Appendix A. Result 6 (Error Exponent Behaviour). For a given rate R > H(X4Y ), define   Er (R) := min D(QX Y kPXY ) + |R − H(X4Y )|+ QX Y and Esp (R) := inf QX Y ∈Q(R) D(QX Y kPXY ), where |a|+ = max{a, 0} and  Q(R) := QX Y : R < H(X4Y ) . Then, it holds that  1 lim inf − log Perr 2nR |X n , Y n ≥ Er (R) n→∞ n and that  1 lim sup − log Perr 2nR |X n , Y n ≤ Esp (R). n n→∞ Er (R) and Esp (R), termed the random coding exponent and the sphere-packing exponent, may not match in general. 11 However, when R is sufficiently close to H(X4Y ), the two bounds can be shown to coincide. In fact, in Appendix B we exhibit an example where the optimal error exponent attained by interactive protocols is strictly larger than that attained by simple communication. Thus, in the error exponent regime, too, interaction is strictly necessary. following bound holds: n o Nh (X X̂ Y ) ≤ exp −n(R − H( X̂|X Y ) − δ ) , n φ(P ) X̂ Y |TXn Y | (13) where δn = |X |2 |Y| A PPENDIX A. Achievability Proof of Result 6 In this appendix, we consider the error exponent and prove Result 6. We use the method of types. The type of a sequence x is denoted by Px . For a given type PX , the set of all sequences of type PX is denoted by TXn . The set of all types on alphabet X is denoted by Pn (X ). We use similar notations for joint types and conditional types. For a pair (x, y) with joint type PX Y , we denote H(x4y) = H(X4Y ). We refer the reader to [7] for basic results on the method of type. Fix R > 0 as the rate of communication exchanged (by both the parties), but without adding the rate contributed by ACK-NACK messages exchanged. We consider r rounds R protocol, where r = d ∆ e for a fixed ∆ > 0. Let Ri = i∆ for i = 1, . . . , r. Basic idea of the protocol is the same as our single-shot protocol, i.e., we increment the hash size in steps. However, when we consider the error exponent regime, to reduce the contribution of “binning error” to the error exponent, we need a more carefully designed protocol. For a given joint type PX Y , the key modification we make is to delay the start of communication by Party 2 (which started once Ri > H(X|Y ) was satisfied). Heurisitcally, once Party 2 can decode x correctly, he can send y to Party 1 without error by using roughly10 nH(Y |X) bits, where PX Y = Pxy . Thus, the budget Party 1 can use is R−H(Y |X), which is larger than H(X|Y ) when R > H(X4Y ). Therefore, allowing Party 1 to communicate more before Party 2 starts may reduce the binning error probability. Motivated by this reason, we assign the timing of decoding to each joint type as follows:  φ(PX Y ) := min i : 1 ≤ i ≤ r, Ri ≥ R − H(Y |X) − ∆  = max i : 1 ≤ i ≤ r, Ri < R − H(Y |X) if R − H(Y |X) − ∆ > 0, and φ(PX Y ) = 0 is R − H(Y |X) − ∆ ≤ 0. For given hash functions h = (h1 , . . . , hr ) with hi : X n → {1, . . . , 2dn∆e }, let Nh (X X̂ Y ) denote, for each joint type PX X̂ Y , the number of pairs (x, y) ∈ TXn Y such that for some x̂ 6= x with Pxx̂y = PX X̂ Y , the relations hi (x) = hi (x̂), i = 1, . . . , φ(PX̂ Y ) hold. The next result is a slight modification of a lemma in [6, Section 3]; the proof is almost the same and is omitted. Lemma 14. There exist hash functions h = (h1 , . . . , hr ) such that for every joint type PX X̂ Y such that φ(PX̂ Y ) 6= 0, the 10 Since Party 2 has to send the joint type P X Y to Party 1, additional |X ||Y| log(n + 1) bits are needed. log(n + 1) . n For the decoder, we use the minimum sum conditional entropy decoder, which is a kind of α-decoder introduced in [6]. Our protocol is described in Protocol 2. Protocol 2: Type-based interactive data exchange protocol Input: Observations X n and Y n , parameter ∆, and rate R Output: Estimate X̂ n of X n at Party 2 and Ŷ n of Y n at Party 1 while 1 ≤ i ≤ N and Party 2 did not send an ACK do Party 1 sends Π2i−1 = hi (X n ) if for Y n = y, Party 2 finds a unique x such that φ(Pxy ) = i, hj (x) = Π2j−1 , ∀ 1 ≤ j ≤ i, and H(x4y) ≤ H(x̂4y) for every x̂ 6= x satisfying hj (x̂) = Π2j−1 , ∀ 1 ≤ j ≤ i then set X̂ n = x send back Π2i = ACK else if More than one such x found then protocol declares an error else send back Π2i = NACK Reset i → i + 1 if No X̂ n found at Party 2 then Protocol declares an error Party 2 send the joint type PX Y of (X̂ n , Y n ) = (x, y), and send the index of y among TYn|X (x). The achievability part of Result 6 can be seen as follows. Fix a joint type PX Y . If φ(PX Y ) = 0, then an error occurs whenever (x, y) ∈ TXn Y . We also note that R − H(Y |X) − ∆ ≤ 0 implies |R − H(X4Y ) − ∆|+ = 0. Thus, the probability of this kind of error is upper bounded by X exp{−n[D(PX Y kPXY ) P ∈Pn (X ×Y) XY φ(P )=0 XY + |R − H(X4Y ) − ∆|+ ]}. (14) Next, consider the case when φ(PX Y ) ≥ 1. For given conditional type PX̂|X Y , a sequence x̂ with (x, x̂, y) ∈ TXn X̂ Y causes an error when 1) φ(PX̂ Y ) ≤ φ(PX Y ), 2) hi (x̂) = hi (x), i = 1, . . . , φ(PX̂ Y ) 12 3) B. An Example Such That Interaction Improves Error Exponent H(X̂4Y ) ≤ H(X4Y ). Consider the following source: X and Y are both binary, and PXY is given by Also note that φ(PX Y ) = i implies H(Y |X) < R − Ri , i.e., once x is recovered correctly, y can be sent without an error. Thus, the error probability of this kind is upper bounded by X exp{−nD(PX Y kPXY )} ∈Pn (X ×Y) P XY φ(P )≥1 XY X P X̂|X Y H(X̂4Y )≤H(X4Y ) ≤ X P ∈Pn (X ×Y) XY φ(P )≥1 XY 1 , 3 that is, X and Y are connected by a Z-channel. To evaluate Esp (R), without loss of generality, we can assume that QX Y (0, 1) = 0 (since otherwise D(QX Y kPXY ) = ∞). Let us consider the following parametrization: PXY (0, 0) = PXY (1, 0) = PXY (1, 1) = QX Y (0, 0) = u, QX Y (1, 0) = 1 − u − v, QX Y (1, 1) = v, Nh (X X̂ Y ) |TXn Y | where 0 ≤ u, v ≤ 1. Then, we have D(QX Y kPXY ) = log 3 − H({u, 1 − u − v, v}) X exp{−nD(PX Y kPXY )} and P H(X|Y ) + H(Y |X) X̂|X Y H(X̂4Y )≤H(X4Y ) = κ(u, v) + exp{−n|Rφ(PX̂Y ) − H(X̂|X Y ) − δn | } X ≤ exp{−nD(PX Y kPXY )} ∈Pn (X ×Y) P XY φ(P )≥1 XY P X̂|X Y H(X̂4Y )≤H(X4Y ) exp{−n|R − H(Y |X̂) − H(X̂|Y ) − ∆ − δn |+ } X X = exp{−nD(PX Y kPXY )} P X̂|X Y H(X̂4Y )≤H(X4Y ) exp{−n|R − H(X̂4Y ) − ∆ − δn |+ } X ≤ exp{−nD(PX Y kPXY )} P ∈Pn (X ×Y) XY )≥1 φ(P XY X P X̂|X Y H(X̂4Y )≤H(X4Y ) exp{−n|R − H(X4Y ) − ∆ − δn |+ } X 2 ≤ exp{−nD(PX Y kPXY )}(n + 1)|X | |Y| P ∈Pn (X ×Y) XY φ(P )≥1 XY + exp{−n|R − H(X4Y ) − ∆ − δn | }. Thus, by combining this with (14), the total error probability is upper bounded by (n + 1)|X | 2 |Y|+|X ||Y| exp{−n min [D(PX Y kPXY ) PX Y + |R − H(X4Y ) − ∆ − δn |+ ]}. Since ∆ can be taken arbitrarily small, and the number of bits needed to send ACK-NACK is at most r.11 Consequently, Protocol 2 attains the exponent given in Result 6. 11 Our := (1 − v)h P exp{−n|R − H(Y |X̂) − H(X̂|X Y ) − ∆ − δn |+ } X X ≤ exp{−nD(PX Y kPXY )} P ∈Pn (X ×Y) XY )≥1 φ(P XY  X X̂|X Y H(X̂4Y )≤H(X4Y ) P ∈Pn (X ×Y) XY )≥1 φ(P XY (15) type-based protocol uses only constant number of rounds of interaction (independent of n). u 1−v   + (1 − u)h v 1−u  . When the rate R is sufficiently close to H(X4Y ) = κ(1/3, 1/3) = 4/3, the set Q(R) is not empty.12 Since (15) and κ(u, v) are both symmetric with respect to u and v and (15) and Q(R) are convex function and convex set, respectively, the optimal solution (u∗ , v ∗ ) in the infimum of Esp (R) satisfies u∗ = v ∗ . Furthermore, since R > κ(1/3, 1/3), we also have u∗ = v ∗ 6= 1/3. Note that for R sufficiently close to H(X4Y ), Esp (R) can be shown to equal Er (R). Thus, to show that a simple communication is strictly suboptimal for error exponent, it s (R), where the latter suffices to show that Esp (R) > Esp s quantity Esp (R) corresponds to the sphere packing bound for error exponent using simple communication and is given by s Esp (R) := max inf (R1 ,R2 ): QX Y ∈Qs (R1 ,R2 ) R1 +R2 ≤R D(QX Y kPXY ) and  Qs (R1 , R2 ) := QX Y : R1 < H(X|Y ) or R2 < H(Y |X) . Since the source is symmetric with respect to X and Y , for s evaluating Esp (R) we can assume without loss of generality † v† 1 that R1 ≥ R2 . Let u† := u∗ and v † := 1−u so that 1−u † = 2. 2 † Let QX be the distribution that corresponds to (u† , v † ). Note Y † that QX Y satisfies   v† † H(Y |X) = (1 − u )h 1 − u†   v∗ ∗ > (1 − u )h 1 − u∗ R ≥ 2 12 In fact, we can check that κ(z,z) dz z=1/3 = −1, and thus the function κ(z, z) takes its maximum away from (1/3, 1/3). 13 s which implies Esp (R) > Esp (R). ≥ R2 , and so, Q†X Y ∈ Qs (R1 , R2 ). For this choice of Q†X Y , we have D(Q∗X Y ∗ ∗ ∗ ∗ kPXY ) = log 3 − H({u , 1 − u − v , v })   v∗ ∗ ∗ = log 3 − h(1 − u ) − (1 − u )h 1 − u∗   v† † † > log 3 − h(1 − u ) − (1 − u )h 1 − u† = D(Q†X Y kPXY ), [4] M. Braverman and A. Rao, “Information equals amortized communication,” in FOCS, 2011, pp. 748–757. [5] T. M. Cover and J. A. Thomas, Elements of Information Theory. 2nd edition. John Wiley & Sons Inc., 2006. [6] I. Csiszár, “Linear codes for sources and source networks: Error exponents, universal coding,” IEEE Trans. Inf. Theory, vol. 28, no. 4, pp. 585–592, July 1982. [7] I. Csiszár and J. Körner, Information theory: Coding theorems for discrete memoryless channels. 2nd edition. Cambridge University Press, 2011. [8] I. Csiszár and P. Narayan, “Secrecy capacities for multiple terminals,” IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047–3061, December 2004. [9] S. C. Draper, “Universal incremental slepian-wolf coding,” Proc. Conference on Communication, Control, and Computing (Allerton), October 2004. [10] M. Feder and N. Shulman, “Source broadcasting with unknown amount of receiver side information,” in ITW, Oct 2002, pp. 127–130. [11] W. Feller, An Introduction to Probability Theory and its Applications, Volume II. 2nd edition. John Wiley & Sons Inc., UK, 1971. [12] P. Gács and J. Körner, “Common information is far less than mutual information,” Problems of Control and Information Theory, vol. 2, no. 2, pp. 149–162, 1973. [13] T. S. Han, Information-Spectrum Methods in Information Theory [English Translation]. Springer, 2003. [14] T. S. Han and S. Verdú, “Approximation theory of output statistics,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752–772, May 1993. [15] M. Hayashi, “Second-order asymptotics in fixed-length source coding and intrinsic randomness,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4619–4637, Oct 2008. [16] M. Hayashi, H. Tyagi, and S. Watanabe, “Secret key agreement: General capacity and second-order asymptotics,” arXiv:1411.0735, 2014. [17] ——, “Secret key agreement: General capacity and second-order asymptotics,” ISIT, 2014. [18] M. Hayashi, “Information spectrum approach to second-order coding rate in channel coding,” IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 4947–4966, Novemeber 2009. [19] R. Impagliazzo, L. A. Levin, and M. Luby, “Pseudo-random generation from one-way functions,” Proc. Annual Symposium on Theory of Computing, pp. 12–24, 1989. [20] E. Kushilevitz and N. Nisan, Communication Complexity. New York, NY, USA: Cambridge University Press, 1997. [21] U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742, May 1993. [22] S. Miyake and F. Kanaya, “Coding theorems on correlated general sources,” IIEICE Trans. Fundamental, vol. E78-A, no. 9, pp. 1063– 1070, September 1995. R EFERENCES [1] R. Ahlswede and I. Csiszár, “Common randomness in information theory and cryptography–part i: Secret sharing,” IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121–1132, July 1993. [2] Y. Altuğ and A. B. Wagner, “Feedback can improve the second-order coding performance in discrete memoryless channels,” ISIT, 2014. [3] C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, “Generalized privacy amplification,” IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915– 1923, November 1995. [23] A. Orlitsky and A. El Gamal, “Communication with secrecy constraints,” STOC, pp. 217–224, 1984. [24] A. Orlitsky, “Worst-case interactive communication i: Two messages are almost optimal,” IEEE Trans. Inf. Theory, vol. 36, no. 5, pp. 1111–1126, 1990. [25] Y. Polyanskiy, “Channel coding: non-asymptotic fundamental limits,” Ph. D. Dissertation, Princeton University, 2010. [26] Y. Polyanskiy, H. V. Poor, and S. Verdú, “Channel coding rate in the finite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307–2359, May 2010. [27] R. Renner, “Security of quantum key distribution,” Ph. D. Dissertation, ETH Zurich, 2005. [28] R. Renner and S. Wolf, “Simple and tight bounds for information reconciliation and privacy amplification,” in ASIACRYPT, 2005, pp. 199– 216. [29] D. Slepian and J. Wolf, “Noiseless coding of correlated information source,” IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471–480, July 1973. [30] V. Strassen, “Asymptotische abschätzungen in Shannon’s informationstheorie,” Third Prague Conf. Inf. Theory, pp. 689–723, 1962, English translation: http://www.math.cornell.edu/∼pmlut/strassen.pdf. [31] V. Y. F. Tan and O. Kosut, “On the dispersions of three network information theory problems,” IEEE Trans. Inf. Theory, vol. 60, no. 2, pp. 881–903, 2014. [32] H. Tyagi, “Common randomness principles of secrecy,” Ph. D. Dissertation, Univeristy of Maryland, College Park, 2013. [33] H. Tyagi, S. Venkatakrishnan, P. Viswanath, and S. Watanabe, “Information complexity density and simulation of protocols,” Proc. ACM Conference on Innovations in Theoretical Computer Science (ITCS), pp. 381–391, 2016. [34] ——, “Information complexity density and simulation of protocols,” IEEE Trans. Inf. Theory, vol. 63, no. 11, pp. 6979–7002, Nov 2017. [35] H. Tyagi and S. Watanabe, “A bound for multiparty secret key agreement and implications for a problem of secure computing,” in EUROCRYPT, 2014, pp. 369–386. [36] ——, “Converses for secret key agreement and secure computing,” IEEE Trans. Inf. Theory, vol. 61, no. 9, pp. 4809–4827, Sept 2015. [37] H. S. Witsenhausen, “On sequences of pairs of dependent random variables,” Siam J. Appl. Math., vol. 28, no. 1, pp. 100–113, January 1975. [38] E.-H. Yang and D.-K. He, “Interactive encoding and decoding for one way learning: Near lossless recovery with side information at the decoder,” Information Theory, IEEE Transactions on, vol. 56, no. 4, pp. 1808–1824, April 2010. [39] E.-H. Yang, D.-K. He, T. Uyematsu, and R. W. Yeung, “Universal multiterminal source coding algorithms with asymptotically zero feedback: fixed database case,” Information Theory, IEEE Transactions on, vol. 54, no. 12, pp. 5575–5590, Dec. 2008.
7cs.IT
Blind-date Conversation Joining ∗ Luca Cesari1,2 1 Università di Pisa, Italy [email protected] Rosario Pugliese2 2 Università Francesco Tiezzi3 3 IMT degli Studi di Firenze, Italy [email protected] Advanced Studies Lucca, Italy [email protected] [email protected] We focus on a form of joining conversations among multiple parties in service-oriented applications where a client may asynchronously join an existing conversation without need to know in advance any information about it. More specifically, we show how the correlation mechanism provided by orchestration languages enables a form of conversation joining that is completely transparent to clients and that we call ‘blind-date joining’. We provide an implementation of this strategy by using the standard orchestration language WS-BPEL. We then present its formal semantics by resorting to COWS, a process calculus specifically designed for modelling service-oriented applications. We illustrate our approach by means of a simple, but realistic, case study from the online games domain. 1 Introduction The increasing success of e-business, e-learning, e-government, and other similar emerging models, has led the World Wide Web, initially thought of as a system for human use, to evolve towards an architecture for supporting automated use. A new computing paradigm has emerged, called Service-Oriented Computing (SOC), that advocates the use of loosely-coupled services. These are autonomous, platformindependent, computational entities that can be described, published, discovered, and assembled as the basic blocks for building interoperable and evolvable systems and applications. Currently, the most successful instantiation of the SOC paradigm are Web Services, i.e. sets of operations that can be published, located and invoked through the Web via XML messages complying with given standard formats. In SOC, service definitions are used as templates for creating service instances that deliver application functionalities to either end-user applications or other instances. Upon service invocation, differently from what usually happens in traditional client-server paradigms, the caller (i.e., a service client) and the callee (i.e., a service provider) can engage in a conversation during which they exchange the information needed to complete all the activities related to the specific service. For instance, a client of an airplane ticket reservation service usually interacts several times with the service before selecting the specific flight to be reserved. Although initially established between a caller and callee, a conversation can dynamically accommodate and dismiss participants. Therefore, a conversation is typically a loosely-coupled, multiparty interaction among a (possibly dynamically varying) number of participants. The loosely-coupled nature of SOC implies that, from a technological point of view, the connection between communicating partners cannot be assumed to persist for the duration of a whole conversation. Even the execution of a simple request-response message exchange pattern provides no built-in means of automatically associating the response message with the original request. It is up to each single message to provide a form of context thus enabling partners to associate the message with others. This is achieved by including values in the message which, once located, can be used to correlate the message with others logically forming the same stateful conversation. The link among partners is thus determined by so called correlation values: only messages containing the ‘right’ correlation values are processed by the partner. ∗ This work has been partially sponsored by the EU project ASCENS (257414). A. Ravara and J. Silva (Eds.): 9th Workshop on Automated Specification and Verification of Web Systems (WWV’13) EPTCS 123, 2013, pp. 3–18, doi:10.4204/EPTCS.123.3 c L. Cesari, R. Pugliese & F. Tiezzi This work is licensed under the Creative Commons Attribution License. 4 Blind-date Conversation Joining Message correlation is an essential part of messaging within SOC as it enables the persistence of activities’ context and state across multiple message exchanges while preserving service statelessness and autonomy, and the loosely-coupled nature of SOC systems. It is thus at the basis of Web Services interaction which is implemented on top of stateless Internet protocols, such as the transfer protocol HTTP. For example, the Internet Cookies used by web sites in order to relate an HTTP request to a user profile, thus enabling to return a customized HTML file to the user, are correlation information. Besides being useful to implement stateful communication on top of stateless protocols, correlation is also a flexible and user programmable mechanism for managing loosely-coupled, multiparty conversations. Indeed, correlation data can be communicated to other partners in order to allow them to join a conversation or to delegate the task of carrying out an ongoing conversation. In this paper, we show another evidence of the flexibility of the correlation mechanism that involves creation of and joining conversations. More specifically, we demonstrate how correlation allows a partner to asynchronously join an existing conversation without need to know in advance any information about the conversation itself, such as e.g. its identifier or the other participants. Since this particular kind of conversation joining is completely transparent to participants we call it blind-date joining. It can be used in various domains like e-commerce, events organization, bonus payments, gift lists, etc. In the context of e-commerce, for instance, a social shopping provider (e.g., Groupon [1]) can activate deals only if a certain number of buyers adhere. In this scenario, the blind-date joining can be used to activate these deals. As another example, blind-date joining can be used to organize an event only if a given number of participants is reached. Specifically, the organizers can wait for the right amount of participants and, when this is reached, they send the invitation with the location details to each of them. We illustrate the blind-date joining strategy by exploiting a simple but realistic case study from the online games domain. We then implement the case study via a well-established orchestration language for web services, i.e. the OASIS standard WS-BPEL [20]. To better clarify and formally present the semantics of the blind-date joining strategy we also introduce a specification of the case study, and its step-by-step temporal evolution, using the process calculus COWS [15, 21], a formalism specifically designed for specifying and combining SOC applications, while modelling their dynamic behaviour. The rest of the paper is structured as follows. Section 2 surveys syntax and semantics of WSBPEL and COWS. Section 3 presents how blind-date conversation can be expressed in WS-BPEL by implementing a case study from the online games domain. Section 4 formally describes, by using COWS, the creation and joining phase of blind-date conversations. Finally, Section 5 concludes the paper by also reviewing more closely related work. 2 A glimpse of WS-BPEL and COWS This section presents a survey of WS-BPEL and COWS. The overview of WS-BPEL gives a highlevel description of the aspects captured by its linguistic constructs. Due to lack of space, the overview of COWS gives only a glimpse of its semantics, a full account of which can be found in [21]. 2.1 An overview of WS-BPEL WS-BPEL [20] is essentially a linguistic layer on top of WSDL for describing the structural aspects of Web Services ‘orchestration’, i.e. the process of combining and coordinating different Web Services to obtain a new, customised service. In practice, and briefly, WSDL [8] is a W3C standard that permits to express the functionalities offered and required by web services by defining, akin object interfaces in L. Cesari, R. Pugliese & F. Tiezzi 5 Object-Oriented Programming, the structure of input and output messages of operations. In WS-BPEL, the logic of interaction between a service and its environment is described in terms of structured patterns of communication actions composed by means of control flow constructs that enable the representation of complex structures. For the specification of orchestration, WS-BPEL provides many different activities that are distinguished between basic activities and structured activities. Orchestration exploits state information that is stored in variables and is managed through message correlation. In fact, when messages are sent/received, the value of their parameters is stored in variables. Likewise block structured languages, the scope of variables extends to the whole immediately enclosing <scope>, or <process>, activity (whose meaning is clarified below). The basic activities are: <invoke>, to invoke an operation offered by a Web Service; <receive>, to wait for an invocation to arrive; <reply>, to send a message in reply to a previously received invocation; <wait>, to delay execution for some amount of time; <assign>, to update the values of variables with new data; <throw>, to signal internal faults; <exit>, to immediately end a service instance; <empty>, to do nothing; <compensate> and <compensateScope>, to invoke compensation handlers; <rethrow>, to propagate faults; <validate>, to validate variables; and <extensionActivity>, to add new activity types. Notably, <reply> can be combined with <receive> to model synchronous request-response interactions. The structured activities describe the control flow logic of a business process by composing basic and/or structured activities recursively. The structured activities are: <sequence>, to execute activities sequentially; <if>, to execute activities conditionally; <while> and <repeatUntil>, to repetitively execute activities; <flow>, to execute activities in parallel; <pick>, to execute activities selectively; <forEach>, to (sequentially or in parallel) execute multiple activities; and <scope>, to associate handlers for exceptional events to a primary activity. Activities within a <flow> can be further synchronised by means of flow links. These are conditional transitions connecting activities to form directed acyclic graphs and are such that a target activity may only start when all its source activities have completed and the condition on the incoming flow links evaluates to true. The handlers within a <scope> can be of four different kinds: <faultHandler>, to provide the activities in response to faults occurring during execution of the primary activity; <compensationHandler>, to provide the activities to compensate the successfully executed primary activity; <terminationHandler>, to control the forced termination of the primary activity; and <eventHandler>, to process message or timeout events occurring during execution of the primary activity. If a fault occurs during execution of a primary activity, the control is transferred to the corresponding fault handler and all currently running activities inside the scope are interrupted immediately without involving any fault/compensation handling behaviour. If another fault occurs during a fault/compensation handling, then it is re-thrown, possibly, to the immediately enclosing scope. Compensation handlers attempt to reverse the effects of previously successfully completed primary activities (scopes) and have been introduced to support Long-Running (Business) Transactions (LRTs). Compensation can only be invoked from within fault or compensation handlers starting the compensation either of a specific inner (completed) scope, or of all inner completed scopes in the reverse order of completion. The latter alternative is also called the default compensation behaviour. Invoking a compensation handler that is unavailable is equivalent to perform an empty activity. A WS-BPEL program, also called (business) process, is a <process>, that is a sort of <scope> without compensation and termination handlers. WS-BPEL uses the basic notion of partner link to directly model peer-to-peer relationships between services. Such a relationship is expressed at the WSDL level by specifying the roles played by each of the services in the interaction. This information, however, does not suffices to deliver messages to a 6 Blind-date Conversation Joining service. Indeed, since multiple instances of the same service can be simultaneously active because service operations can be independently invoked by several clients, messages need to be delivered not only to the correct partner, but also to the correct instance of the service that the partner provides. To achieve this, WS-BPEL relies on the business data exchanged rather than on specific mechanisms, such as WSAddressing [10] or low-level methods based on SOAP headers. In fact, WS-BPEL exploits correlation sets, namely sets of correlation variables (called properties), to declare the parts of a message that can be used to identify an instance. This way, a message can be delivered to the correct instance on the basis of the values associated to the correlation variables, independently of any routing mechanism. 2.2 An overview of COWS COWS [15, 21] is a formalism for modelling (and analysing) service-oriented applications. It provides a novel combination of constructs and features borrowed from well-known process calculi such as nonbinding receiving activities, asynchronous communication, polyadic synchronization, pattern matching, protection, and delimited receiving and killing activities. As a consequence of its careful design, the calculus makes it easy to model many important aspects of service orchestrations à la WS-BPEL, such as service instances with shared state, services playing more than one partner role, stateful conversations made by several correlated service interactions, and long-running transactions. For the sake of simplicity, we present here a fragment of COWS (called µ COWS in [21]) without linguistic constructs for dealing with ‘forced termination’, since such primitives are not used in this work. The syntax of COWS is presented in Table 1. We use two countable disjoint sets: the set of values (ranged over by v, v0 , . . . ) and the set of ‘write once’ variables (ranged over by x, y, . . . ). The set of values is left unspecified; however, we assume that it includes the set of names (ranged over by n, m, p, o, . . . ) mainly used to represent partners and operations. We also use a set of expressions (ranged over by ε), whose exact syntax is deliberately omitted; we just assume that expressions contain, at least, values and variables. As a matter of notation, w ranges over values and variables and u ranges over names and variables. Notation ¯· stands for tuples, e.g. x̄ means hx1 , . . . , xn i (with n ≥ 0) where variables in the same tuple are pairwise distinct. We will omit trailing occurrences of 0, writing e.g. p • o?w̄ instead of p • o?w̄.0, and write [hu1 , . . . , un i] s in place of [u1 ] . . . [un ] s. We will write I , s to assign a name I to the term s. Services are structured activities built from basic activities, i.e. the empty activity 0, the invoke activity • ! and the receive activity • ? , by means of prefixing . , choice + , parallel composition | , delimitation [ ] and replication ∗ . We adopt the following conventions about the operators precedence: monadic operators bind more tightly than parallel composition, and prefixing more tightly than choice. Invoke and receive are the communication activities, which permit invoking an operation offered by a service and waiting for an invocation to arrive, respectively. Besides output and input parameters, both activities indicate an endpoint, i.e. a pair composed of a partner name p and an operation name o, through which communication should occur. An endpoint p • o can be interpreted as a specific implementation of operation o provided by the service identified by the logic name p. An invoke p • o!hε1 , . . . , εn i can proceed as soon as all expression arguments ε1 , . . . , εn can be successfully evaluated to values. A receive p • o?hw1 , . . . , wn i.s offers an invocable operation o along a given partner name p and thereafter (due to the prefixing operator) the service continues as s. An inter-service communication between these two activities takes place when the tuple of values hv1 , . . . , vn i, resulting from the evaluation of the invoke argument, matches the template hw1 , . . . , wn i argument of the receive. This causes a substitution of the variables in the receive template (within the scope of variables declarations) with the corresponding values produced by the invoke. Partner and operation names can be exchanged in communication, thus enabling many different interaction patterns among service instances. However, dynamically re- L. Cesari, R. Pugliese & F. Tiezzi 7 Expressions: ε, ε 0 , . . . Values: v, v0 , . . . Names: n, m, . . . Partners: p, p0 , . . . Operations: o, o0 , . . . Variables: x, y, . . . Services: s ::= | | | | u • u0 !ε̄ g s|s [u] s ∗s (invoke) (receive-guarded choice) (parallel composition) (delimitation) (replication) Variables/Values: w, w0 , . . . Variables/Names: u, u0 , . . . Receive-guarded choice: g ::= 0 (empty) | p • o?w̄.s (receive) | g+g (choice) Table 1: COWS syntax ceived names cannot form the endpoints used to receive further invocations. Indeed, endpoints of receive activities are identified statically because their syntax only allows using names and not variables. The empty activity does nothing, while choice permits selecting for execution one between two alternative receives. Execution of parallel services is interleaved. However, if more matching receives are ready to process a given invoke, only one of the receives that generate a substitution with smallest domain (see [21] for further details) is allowed to progress (namely, this receive has an higher priority to proceed than the others). This mechanism permits to model the precedence of a service instance over the corresponding service specification when both can process the same request (see also Section 4). Delimitation is the only binding construct: [u] s binds the element u in the scope s. It is used for two different purposes: to regulate the range of application of substitutions produced by communication, if the delimited element is a variable, and to generate fresh names, if the delimited element is a name. Finally, the replication construct ∗ s permits to spawn in parallel as many copies of s as necessary. This, for example, is exploited to implement recursive behaviours and to model business process definitions, which can create multiple instances to serve several requests simultaneously. 3 Blind-date conversations in WS-BPEL We present here a (web) service capable of arranging matches of 4-players1 online (card) games, such as e.g. burraco or canasta. To create or join a match, a player has only to indicate the kind of game he/she would like to play and his/her endpoint reference (i.e., his/her address). Thus, players do not need to know in advance any further information, such as the identifier of the table or the identifiers of other players. Moreover, players do not either know if a new match is created as a consequence of their request to play, or if they join an already existing match. Therefore, the arrangement of tables is completely transparent to players. Figure 1 shows a graphical representation2 We report below the code of the process where, to sim1 It is worth noticing that the blind-date conversation approach works as well with a number of players not fixed a priori. Of course, this would require using some extra activities. Therefore, to better highlight the specificities of the proposed approach, we have preferred to keep the example as simple as possible and, hence, we have fixed the number of players to four. 2 The representation has been created by using Eclipse BPEL Designer (http://www.eclipse.org/bpel/). 8 Blind-date Conversation Joining Figure 1: Graphical representation of the WS-BPEL process TableManager plify the reading of the code, we have omitted irrelevant details and highlighted the basic activities <receive>, <invoke> and <assign> by means of a grey background. <process name="TableManager" ... > <partnerLinks> <partnerLink name="tableManager" myRole="table" partnerRole="player" initializePartnerRole="no" partnerLinkType="tableManager:table"/> </partnerLinks> <variables> <variable messageType="tableManager:request" name="Player1"/> <variable messageType="tableManager:request" name="Player2"/> <variable messageType="tableManager:request" name="Player3"/> <variable messageType="tableManager:request" name="Player4"/> <variable messageType="tableManager:reply" name="PlayersReply"/> </variables> <correlationSets> <correlationSet name="GameCorrelationSet" properties="tableManager:gameNameProperty"/> </correlationSets> L. Cesari, R. Pugliese & F. Tiezzi <sequence> <receive partnerLink="tableManager" operation="join" variable="Player1" createInstance="yes"> <correlations> <correlation initiate="yes" set="GameCorrelationSet"/> </correlations> </receive> <receive partnerLink="tableManager" operation="join" variable="Player2"> <correlations> <correlation initiate="no" set="GameCorrelationSet"/> </correlations> </receive> <receive partnerLink="tableManager" operation="join" variable="Player3"> <correlations> <correlation initiate="no" set="GameCorrelationSet"/> </correlations> </receive> <receive partnerLink="tableManager" operation="join" variable="Player4"> <correlations> <correlation initiate="no" set="GameCorrelationSet"/> </correlations> </receive> <assign> ... <copy ...> <from>getTableID()</from> <to>$PlayersReply.payload/tableManager:tableID</to> </copy> </assign> <assign> <copy> <from>$Player1.payload/tableManager:playerAddress</from> <to partnerLink="tableManager"/> </copy> </assign> <invoke inputVariable="PlayersReply" operation="start" partnerLink="tableManager"/> <assign> <copy> <from>$Player2.payload/tableManager:playerAddress</from> <to partnerLink="tableManager"/> </copy> </assign> <invoke inputVariable="PlayersReply" operation="start" partnerLink="tableManager"/> 9 10 Blind-date Conversation Joining <assign> <copy> <from>$Player3.payload/tableManager:playerAddress</from> <to partnerLink="tableManager"/> </copy> </assign> <invoke inputVariable="PlayersReply" operation="start" partnerLink="tableManager"/> <assign> <copy> <from>$Player4.payload/tableManager:playerAddress</from> <to partnerLink="tableManager"/> </copy> </assign> <invoke inputVariable="PlayersReply" operation="start" partnerLink="tableManager"/> </sequence> </process> The process uses only one partner link, namely tableManager, that provides two roles: table and player. The former is used by the process to receive the players’ requests, while the latter is used by players to receive the table identifier. Five variables are used for storing data of the exchanged messages: one for each player request and one for the manager response. Notably, the used message style3 is document, thus messages are formed by a single part, called payload, that contains all message data. Therefore, we use XPath expressions of the form $VariableName.payload/Path to extract or store data in message variables. The process starts with a <receive> activity waiting for a message from a player; the message contains a request (stored in the variable Player1) to participate to a match of a given game. Whenever prompted by a player’s request, the process creates an instance (see the option createInstance="yes" in the first <receive>), corresponding to a new (virtual) card-table of the game specified by the player, and is immediately ready to concurrently serve other requests. Service instances are indeed the WS-BPEL counterpart of inter-service conversations. In order to deliver each request to an existing instance corresponding to a table of the requested game (if there exists one), the name of the game is used as correlation datum. Thus, each <receive> activity specifies the correlation set GameCorrelationSet, which is instantiated by the initial <receive>, in order to receive only requests for the same game indicated by the first request. The <property> defining the correlation set is declared in the WSDL document associated to the process as follows: <prop:property name="gameNameProperty" type="xs:string"/> <prop:propertyAlias messageType="this:request" part="payload" propertyName="this:gameNameProperty"> <prop:query queryLanguage=...>//this:RequestElement/this:gameName</prop:query> </prop:propertyAlias> 3 The SOAP message style configuration is specified in the binding section of the WSDL document associated to the WSBPEL process. We have preferred to use the document-style rather than the RPC-style, because the former minimizes coupling between the interacting parties. L. Cesari, R. Pugliese & F. Tiezzi 11 A <property> specifies an element of a correlation set and relies on one (or more) <propertyAlias> to identify correlation values inside messages. In our specification, the <propertyAlias> extracts from <request> messages the needed element by using an XPath <query>. Then, the correlation set GameCorrelationSet is defined by the property gameNameProperty that identifies the string element gameName of the messages sent by players. Once the initial <receive> is executed and an instance is created, other three <receive> activities are sequentially performed by such instance, in order to complete the card-table for the new match. Notice that the correlation mechanism ensures that only players that want to play the same game are put together in a table. When four players join a conversation for a new match (which, in WS-BPEL, corresponds to a process instance), a unique table identifier is generated, by means of the custom XPath expression getTableID(), and inserted into the variable PlayersReply. This variable contains the message that will be sent back to each player via four <invoke> activities using the tableManager partner link. Before every <invoke>, an activity <assign> is executed to extract (by means of an XPath expression) the endpoint reference of the player, contained within the player’s request, and to store it into the partnerRole of the tableManager partner link. These assignments allow the process to properly reply in an asynchronous way to the players. Now, the new table is arranged and, therefore, the players can start to play by using the received table identifier and by interacting with another service dedicated to this purpose (which, of course, is out of the scope of this work). Experimenting with the WS-BPEL process. This WS-BPEL process can be experimented via the Web interface at http://reggae.dsi.unifi.it/blinddatejoining/, or by downloading from the same address the source and binary code. More specifically, the process is configured to be deployed in a WS-BPEL engine Apache ODE [2]. Indeed, we have equipped the process with the corresponding WSDL and deployment descriptor files, which provide typing and binding information, respectively. Notably, in order to call the custom XPath expression getTableID() within the process, its definition must be previously installed in the ODE engine as a Java library. For the sake of simplicity, we have defined such expression as a random function. To experiment with the WS-BPEL program, we have developed a sort of testing environment consisting of a few Java classes implementing the service clients. Such classes rely on the artifacts automatically generated by JAX-WS [9] from the WSDL document of the process, and simply exchange SOAP messages with the process. These clients are instantiated and executed by a Web application developed by using the Play framework [24]; a screenshot of such application is shown in Figure 2. Notably, players created in a given browser session could be assigned to tables together with players created in other sessions. 4 Semantics mechanisms underlying blind-date conversation joining In this section, to clarify the behaviour at runtime of the TableManager process (and of its instances), we formally specify a scenario involving the manager service by means of the process calculus COWS. The aim is to shed light on the effect of the blind-date joining and to show how it can be easily programmed through the correlation approach. Moreover, this formal account also permits clarifying the mechanisms underlying message correlation (i.e., shared input variables, pattern-matching and priority among receive activities). 12 Blind-date Conversation Joining Figure 2: A screenshot of the Web application for experimenting with the process TableManager The TableManager process can be rendered in COWS as follows: TableManagerProcess , ∗ [xgame , xplayer1 , xplayer2 , xplayer3 , xplayer4 ] manager • join?hxgame , xplayer1 i. manager • join?hxgame , xplayer2 i. manager • join?hxgame , xplayer3 i. manager • join?hxgame , xplayer4 i. [tableId] ( xplayer1 • start!htableIdi | xplayer2 • start!htableIdi | xplayer3 • start!htableIdi | xplayer4 • start!htableIdi ) The replication operator ∗ specifies that the above term represents a service definition, which acts as a persistent service capable of creating multiple instances to simultaneously serve concurrent requests. The delimitation operator [ ] declares the scope of variables xgame and xplayer i , with i = 1..4. The endpoint manager • join (composed by the partner name manager and the operation join) is used by the service to receive join requests from four players. When sending their request, the players are required to provide only the kind of game, stored in xgame , and their partner names, stored in xplayer i , that they will then use to receive the table identifier. Player’s requests are received through receive activities of the form manager • join?hxgame , xplayer i i, which are correlated by means of the shared variable xgame . Then, the delimitation operator is used to create a fresh name tableId that represents an unique table identifier. Such identifier will be then communicated to each player by means of four invoke activities xplayer i • start!htableIdi. Notably, differently from the WS-BPEL specification of the process, in the COWS definition the assign activities are not necessary, because their role is played by the substitutions generated by the interactions along the endpoint manager • join. L. Cesari, R. Pugliese & F. Tiezzi 13 Consider now the following system Luca | Rosario | Francesco | . . . | TableManagerProcess where the players are defined as follows Luca , manager • join!hburraco, pL i | [xid ] pL • start?hxid i. hrest of Lucai Rosario , manager • join!hcanasta, pR i | [xid ] pR • start?hxid i. hrest of Rosarioi Francesco , manager • join!hburraco, pF i | [xid ] pF • start?hxid i. hrest of Francescoi ... If Luca requests to join a match, since there are not tables under arrangement, TableManager-Process initialises a new match instance (highlighted by grey background) and the system evolves to: [xid ] pL • start?hxid i. hrest of Lucai | Rosario | Francesco | . . . | TableManagerProcess | [xplayer2 , xplayer3 , xplayer4 ] manager • join?hburraco, xplayer2 i. manager • join?hburraco, xplayer3 i. manager • join?hburraco, xplayer4 i. [tableId] ( pL • start!htableIdi | xplayer2 • start!htableIdi | xplayer3 • start!htableIdi | xplayer4 • start!htableIdi ) Now, if Rosario invokes TableManagerProcess, a second match instance (highlighted by dark grey background) is created: [xid ] pL • start?hxid i. hrest of Lucai | [xid ] pR • start?hxid i. hrest of Rosarioi | Francesco | . . . | TableManagerProcess | [xplayer2 , xplayer3 , xplayer4 ] manager • join?hburraco, xplayer2 i. manager • join?hburraco, xplayer3 i. manager • join?hburraco, xplayer4 i. [tableId] ( pL • start!htableIdi | xplayer2 • start!htableIdi | xplayer3 • start!htableIdi | xplayer4 • start!htableIdi ) 14 Blind-date Conversation Joining | [xplayer2 , xplayer3 , xplayer4 ] manager • join?hcanasta, xplayer2 i. manager • join?hcanasta, xplayer3 i. manager • join?hcanasta, xplayer4 i. [tableId0 ] ( pR • start!htableId0 i | xplayer2 • start!htableId0 i | xplayer3 • start!htableId0 i | xplayer4 • start!htableId0 i ) When Francesco invokes TableManagerProcess, the process definition and the first created instance, being both able to receive the same message hburraco, pF i along the endpoint manager • join, compete for the request manager • join!hburraco, pF i. COWS’s (prioritized) semantics precisely establishes how this sort of race condition is dealt with: only the existing instance is allowed to evolve, as required by WS-BPEL. This is done through the dynamic prioritised mechanism of COWS, i.e. assigning the receives performed by instances (having a more defined pattern and requiring less substitutions) a greater priority than the receives performed by a process definition. In fact, in the above COWS term, the first instance can perform a receive matching the message and containing only one variable in its argument, while the initial receive of TableManagerProcess contains two variables. In this way, the creation of a new instance is prevented. Moreover, pattern-matching permits delivering the request to the appropriate instance, i.e. that corresponding to a burraco match. Therefore, the only feasible computation leads to the following term [xid ] pL • start?hxid i. hrest of Lucai | [xid ] pR • start?hxid i. hrest of Rosarioi | [xid ] pF • start?hxid i. hrest of Francescoi | . . . | TableManagerProcess | [xplayer3 , xplayer4 ] manager • join?hburraco, xplayer3 i. manager • join?hburraco, xplayer4 i. [tableId] ( pL • start!htableIdi | pF • start!htableIdi | xplayer3 • start!htableIdi | xplayer4 • start!htableIdi ) | [xplayer2 , xplayer3 , xplayer4 ] manager • join?hcanasta, xplayer2 i. manager • join?hcanasta, xplayer3 i. manager • join?hcanasta, xplayer4 i. [tableId0 ] ( pR • start!htableId0 i | xplayer2 • start!htableId0 i | xplayer3 • start!htableId0 i | xplayer4 • start!htableId0 i ) L. Cesari, R. Pugliese & F. Tiezzi 15 where Francesco joined to the burraco table under arrangement. Eventually, with the arrival of other requests from players that want to play burraco, the TableManagerProcess completes to arrange the burraco table and contacts the players for communicating them the table identifier: [tableId] ( hrest of Lucai | hrest of Francescoi | . . . ) | [xid ] pR • start?hxid i. hrest of Rosarioi | . . . | TableManagerProcess | [xplayer2 , xplayer3 , xplayer4 ] manager • join?hcanasta, xplayer2 i. manager • join?hcanasta, xplayer3 i. manager • join?hcanasta, xplayer4 i. [tableId0 ] ( pR • start!htableId0 i | xplayer2 • start!htableId0 i | xplayer3 • start!htableId0 i | xplayer4 • start!htableId0 i ) Therefore, the players of table tableId (including Luca and Francesco) can start to play, while Rosario continues to wait for other canasta players. 5 Concluding remarks We have illustrated blind-date conversation joining, a strategy allowing a participant to join a conversation without need to know information about the conversation itself, such as e.g. its identifier or the other participants, but the endpoint of the service provider. This is possible because some values in the request define which conversation the participant will join. In case such a conversation does not exist, a new one associated to these values will be created. We showed how the blind-date conversation joining strategy can be implemented in the wellestablished industrial standard WS-BPEL. In order to accomplish this task, we used WS-BPEL correlation sets to filter the client requests and create conversations identified by means of the filtered values. We also presented a formal semantics for the strategy by using the process calculus COWS. The semantics permits to highlight what the effect of the strategy is, by clarifying the mechanism underlying message correlation and showing how the strategy can be easily programmed in a correlation-based environment. This also permits appreciating the conciseness and cleanness of the COWS specification of the TableManager process, especially when compared with its WS-BPEL counterpart. We developed a case study to show how our strategy can be used in a realistic scenario. The case study defines an online games provider that arranges online matches of 4-players card games. This scenario is implemented using WS-BPEL and executed on Apache ODE. As we showed in Section 2.1, despite the XML markup used by WS-BPEL, the blind-date joining strategy permits to have a smooth and clean implementation. We also equipped the case study with a ‘testing environment’ in order to facilitate its testing. Related work. The peculiar form of conversation joining studied in this paper, which we call ‘blinddate’, originates from the message correlation mechanism used for delivering messages to the appropriate 16 Blind-date Conversation Joining service instances in both orchestration languages and formalisms for SOC. This joining strategy is, at least in principle, independent from the specific language or formalism used to enact it. In this paper, we have used the language WS-BPEL and the formalism COWS, but different choices could have been made. For example, Jolie [19] could be used as correlation-based orchestration language and SOCK [11] as the formalism, being the former a Java-based implementation of the latter. However, our choice fell on WS-BPEL because it is an OASIS open standard well-accepted by industries and, hence, supported by well-established and maintained engines. Instead, COWS has been selected because of its strict correspondence with WS-BPEL while, at the same time, being a core calculus consisting of just a few constructs, which makes it more suitable than WS-BPEL to reason on applications’ behaviour. In the SOC literature, two main approaches have been considered to connect the interaction protocols of clients and of the respective service instances. That based on the correlation mechanism was first exploited in [23] where, however, only interaction among different instances of a single service are taken into account. Another correlation-based formalism, besides COWS and SOCK mentioned above, is the calculus Corr [17], which is a sort of value-passing CCS without restriction and enriched with constructs for expressing services and their instances. Corr has been specifically designed to capture behaviours related to correlation aspects in a specific WS-BPEL engine. Another work with an aim similar to ours, i.e. to show an exploitation of the correlation-based mechanism for dealing with issues raised by practical scenarios, is presented in [16]. Such work proposes an implementation of a correlation-based primitive allowing messages to be delivered to more than one service conversation. Anyway, WS-BPEL (and COWS as well) natively provides such kind of broadcast primitive. A large strand of work, instead, relies on the explicit modelling of interaction sessions and their dynamic creation. A session corresponds to a private channel (à la π-calculus [18]) which is implicitly instantiated when calling a service: it binds caller and callee and is used for their future conversation. Although this the technology underling SOC, its abstraction level has proved convenient for reasoning about SOC applications. Indeed, session-based conversation can be regulated by so called session types that can statically guarantee a number of desirable properties, such as communication safety, progress, predictability. scenario declared in the session type). Therefore, an important group of calculi for modeling and proving properties of services is based on the explicit notion of interaction session. Most of such work (among which we mention [12, 6, 14, 3]) has been devoted to study dyadic sessions, i.e. interaction sessions between only two participants. Recently, another body of work (as, e.g., [13, 4, 5, 7]) focussed on a more general form of sessions, called multiparty sessions/conversations, which are closer to the notion of conversation that we have considered in this paper. The multiparty session approach proposed in [13] permits expressing a conversation by means of channels shared among the participants. However, the conversation is created through a single synchronization among all participants, whose number is fixed at design time. This differs from our notion of blind-date joining, where once a conversation has been created the participants can asynchronously join. Moreover, although in our case study we consider a conversation of five participants, in principle this number can change at runtime. The µse language [4] permits the declaration of multiparty sessions in a way transparent to the user. However, rather than relying on the correlation mechanism, as in our approach, µse creates multiparty conversations by using a specific primitive that permits to merge together previously created conversations. Instead, when relying on correlation, the conversation merging is automatically performed for each correlated request. Another formalism dealing with multiparty interactions is the Conversation Calculus [22, 5]. It uses the conversation-based mechanism for intersession communication, which permits to progressively accommodate and dismiss participants from the same conversation. This is realized by means of named containers for processes, called conversation contexts. However, processes in unrelated conversations cannot interact directly. Moreover, conversa- L. Cesari, R. Pugliese & F. Tiezzi 17 tion joining is not transparent to a new participant, because he has to know the name of the conversation. Instead, in our correlation-based approach, a conversation is represented by a service instance, which is not accessed via an identifier, but via the correlation values specified by the correlation set. In conclusion, the lower-level mechanism based on correlation sets, that exploits business data to correlate different interactions, is more robust and fits the loosely-coupled world of Web Services better than that based on explicit session references. It turned out to be powerful and flexible enough to fulfill the need of SOC, e.g. it easily allows a single message to participate in multiple conversations, each (possibly) identified by separate correlation values, which instead requires non-trivial workarounds by using the session-based approach. It is not a case that also the standard WS-BPEL uses correlation sets. Future work. To better highlight the semantics mechanisms underlying blind-date conversation joining, we have preferred to consider a quite simple case study. Anyway, many other features could be added without much effort that would make the case study even more realistic. For example, a player should be able to play concurrently in more than one match. However, for the sake of simplicity, we assume here that a player can ask to play the same game more than once only if each time it waits for the response to the previous request, otherwise it could be assigned more than once to the same table. Moreover, TableManagerProcess can be easily tailored to arrange matches for n-players online games with n 6= 4 (e.g. poker, bridge, . . . ). It could also be modified so to be able to manage games with a number of players not statically known, as well as games that can be played by a variable number of players, i.e. games that may begin with a minimum number of players but later on other players can dynamically join and some others can stop playing and leave. The fact that some players may give up, i.e. the number of players may also decrease, implies that some tables may dynamically have not enough players for the game to go on. In this case, tables with an insufficient number of players could be joined and there are several possible strategies to to this: a centralized solution could exploit the table manager as a forwarder for the player messages, while a decentralized one could exploit the tables with not enough players as forwarders; alternatively, we could exploit memory cell services to store the (dynamically updatable) value of the table assigned to each single player thus avoiding to replace, once and for all, the correlation variable with this value; finally, TableManagerProcess instances, instead of single tables, could represent rooms containing more tables for the same game and manage all the requests for that game. In order to avoid deadlocks, we could add timeouts to receive activities of TableManagerProcess and players’ services. This can be done both in WS-BPEL, by exploiting onAlarm events within pick activities, and in COWS, by using wait activities in conjunction with choice activities (as shown in [21]). We leave as a future work the task of formalizing the pattern underlying blind-date conversation joining in a way which is independently from the specific case study considered in this paper. We also plan to study and develop type theories for describing and regulating the correlation mechanism. This will permit to guarantee desired properties like those defined for dyadic and multiparty session types. We expect that to develop type theories for ensuring properties of the correlation mechanism be more difficult than doing so for session-based interaction because the communication media are not necessarily private and the correlation values are determined at runtime. References [1] Groupon. Web site: http://www.groupon.com/. [2] Apache Software Foundation (2011): Apache ODE 1.3.5. Available at http://ode.apache.org/. 18 Blind-date Conversation Joining [3] M. Boreale, R. Bruni, R. De Nicola & M. Loreti (2008): Sessions and Pipelines for Structured Service Programming. In: FMOODS, LNCS 5051, Springer, pp. 19–38, doi:10.1007/978-3-540-68863-1 3. [4] R. Bruni, I. Lanese, H.C. Melgratti & E. Tuosto (2008): Multiparty Sessions in SOC. In: COORDINATION, LNCS 5052, Springer, pp. 67–82, doi:10.1007/978-3-540-68265-3 5. [5] L. Caires & H.T. Vieira (2010): Conversation types. Theor. Comput. Sci. 411(51-52), pp. 4399–4440, doi:10.1016/j.tcs.2010.09.010. [6] M. Carbone, K. Honda & N. Yoshida (2007): Structured Communication-Centred Programming for Web Services. In: ESOP, LNCS 4421, Springer, pp. 2–17, doi:10.1007/978-3-540-71316-6 2. [7] M. Carbone & F. Montesi (2013): Deadlock-freedom-by-design: multiparty asynchronous global programming. In: POPL, ACM, pp. 263–274, doi:10.1145/2429069.2429101. [8] E. Christensen, F. Curbera, G. Meredith & S. Weerawarana (2001): Web Services Description Language (WSDL) 1.1. Technical Report, W3C. Available at http://www.w3.org/TR/wsdl/. [9] GlassFish community (2012): JAX-WS 2.2.7. Available at http://jax-ws.java.net/. [10] M. Gudgin, M. Hadley & T. Rogers (2006): Web Services Addressing 1.0 - Core. Technical Report, W3C. [11] C. Guidi, R. Lucchi, R. Gorrieri, N. Busi & G. Zavattaro (2006): SOCK: A Calculus for Service Oriented Computing. In: ICSOC, LNCS 4294, Springer, pp. 327–338, doi:10.1007/11948148 27. [12] K. Honda, V. T. Vasconcelos & M. Kubo (1998): Language Primitives and Type Discipline for Structured Communication-Based Programming. In: ESOP, LNCS 1381, Springer, pp. 122–138, doi:10.1007/BFb0053567. [13] K. Honda, N. Yoshida & M. Carbone (2008): Multiparty asynchronous session types. In: POPL, ACM Press, pp. 273–284, doi:10.1145/1328438.1328472. [14] I. Lanese, F. Martins, A. Ravara & V.T. Vasconcelos (2007): Disciplining Orchestration and Conversation in Service-Oriented Computing. In: SEFM, IEEE Computer Society Press, pp. 305–314, doi:10.1109/SEFM.2007.13. [15] A. Lapadula, R. Pugliese & F. Tiezzi (2007): A Calculus for Orchestration of Web Services. In: ESOP, LNCS 4421, Springer, pp. 33–47, doi:10.1007/978-3-540-71316-6 4. [16] J. Mauro, M. Gabbrielli, C. Guidi & F. Montesi (2011): An Efficient Management of Correlation Sets with Broadcast. In: COORDINATION, LNCS 6721, Springer, pp. 80–94, doi:10.1007/978-3-642-25535-9 45. [17] H.C. Melgratti & C. Roldán (2012): On Correlation Sets and Correlation Exceptions in ActiveBPEL. In: TGC, LNCS 7173, Springer, pp. 212–226, doi:10.1007/978-3-642-30065-3 13. [18] R. Milner, J. Parrow & D. Walker (1992): A Calculus of Mobile Processes, I and II. Information and Computation 100(1), pp. 1–40, 41–77, doi:10.1016/0890-5401(92)90009-5. [19] F. Montesi, C. Guidi, R. Lucchi & G. Zavattaro (2007): JOLIE: a Java Orchestration Language Interpreter Engine. In: MTCoord, Electronic Notes in Theoretical Computer Science 181, Elsevier, pp. 19–33, doi:10.1016/j.entcs.2007.01.051. [20] OASIS WSBPEL TC (2007): Web Services Business Process Execution Language Version 2.0. Technical Report, OASIS. Available at http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2. 0-OS.html. [21] R. Pugliese & F. Tiezzi (2012): A calculus for orchestration of web services. J. Applied Logic 10(1), pp. 2–31, doi:10.1016/j.jal.2011.11.002. [22] H.T. Vieira, L. Caires & J. C. Seco (2008): The Conversation Calculus: A Model of Service-Oriented Computation. In: ESOP, LNCS 4960, Springer, pp. 269–283, doi:10.1007/978-3-540-78739-6 21. [23] M. Viroli (2004): Towards a Formal Foundation to Orchestration Languages. In: WS-FM, Electronic Notes in Theoretical Computer Science 105, Elsevier, pp. 51–71, doi:10.1016/j.entcs.2004.05.008. [24] Zenexity and Typesafe (2013): Play framework 2.1.0. Available at http://www.playframework. com/.
6cs.PL
OPTIMAL RATE LIST DECODING OVER BOUNDED ALPHABETS USING ALGEBRAIC-GEOMETRIC CODES arXiv:1708.01070v1 [cs.CC] 3 Aug 2017 VENKATESAN GURUSWAMI AND CHAOPING XING Abstract. We give new constructions of two classes of algebraic code families which are efficiently list decodable with small output list size from a fraction 1 − R − ε of adversarial errors where R is the rate of the code, for any desired positive constant ε. The alphabet size depends only ε and is nearly-optimal. The first class of codes are obtained by folding algebraic-geometric codes using automorphisms of the underlying function field. The list decoding algorithm is based on a linear-algebraic approach, which pins down the candidate messages to a subspace with a nice “periodic” structure. The list is pruned by pre-coding into a special form of subspaceevasive sets. Instantiating this construction with the explicit Garcia-Stichtenoth tower of function fields yields codes list-decodable up to a 1 − R − ε error fraction with list size bounded by O(1/ε), matching the existential bound for random codes up to constant factors. Further, the alphabet size of the codes is a constant depending only on ε — it can be made exp(Õ(1/ε2 )) which is not much worse than the lower bound of exp(Ω(1/ε)). The parameters we achieve are thus quite close to the existential bounds in all three aspects — error-correction radius, alphabet size, and list-size — simultaneously. Our code construction is Monte Carlo and has the claimed list decoding property with high probability. Once the code is (efficiently) sampled, the encoding/decoding algorithms are deterministic with a running time Oε (N c ) for an absolute constant c, where N is the code’s block length. The second class of codes are obtained by restricting evaluation points of an algebraicgeometric code to rational points from a subfield. Once again, the linear-algebraic approach to list decoding to pin down candidate messages to a “periodic” subspace. We develop an alternate approach based on subspace designs is used to pre-code messages and prune the subspace of candidate solutions. Together with the subsequent explicit constructions of subspace designs, this yields the first deterministic construction of an algebraic code family of rate R with efficient list decoding from 1 − R − ε fraction of errors over an alphabet of constant size exp(Õ(1/ε2 )). The list size is bounded by a very slowly growing function of the block length N ; in particular, it is at most O(log(r) N ) (the r’th iterated logarithm) for any fixed integer r. The explicit construction avoids the shortcoming of the Monte Carlo sampling at the expense of a slightly worse list size. Extended abstracts announcing these results were presented at the 2012 and 2013 ACM Symposia on Theory of Computing (STOC) [16, 17]. This is a merged and revised version of these conference papers, that accounts for the explicit subspace designs that were constructed in [8] subsequent to [17], and makes some simplifications and improvements in the construction of h.s.e sets in Section 6 compared to [16]. The research of V. Guruswami was supported in part by a Packard Fellowship and NSF grants CCF-0963975 and CCF-1422045. Some of this work was done during visits by the author to Nanyang Technological University. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. The research of C. Xing was supported by the Singapore MoE Tier 1 grants RG20/13 and RG25/16, and NTU grant M4081575. 2 V. GURUSWAMI AND C. XING Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Prior and related work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2. Open questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.3. Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2. Our techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1. Algebraic ideas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2. Pseudorandomness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3. Periodic subspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4. Preliminaries on function fields and algebraic-geometric codes . . . . . . . . . . . . . . . . 11 5. Folded codes from the Hermitian tower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 5.1. Background on Hermitian tower. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 5.2. Redefining the code in terms of local expansion at P0 . . . . . . . . . . . . . . . . . . 15 5.3. List decoding folded codes from the Hermitian tower . . . . . . . . . . . . . . . . . . . 16 6. Subspace evasive sets with additional structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 6.1. Hierarchical subspace-evasive sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 6.2. Random sets are hierarchically subspace evasive . . . . . . . . . . . . . . . . . . . . . . . . 19 6.3. Pseudorandom construction of large h.s.e subsets . . . . . . . . . . . . . . . . . . . . . . . 20 6.4. Efficient computation of intersection with h.s.e. subsets . . . . . . . . . . . . . . . . 22 7. Folded codes from the Garcia-Stichtenoth tower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 7.1. Background on Garcia-Stichtenoth tower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 7.2. Redefining the code in terms of local expansion at P∞ . . . . . . . . . . . . . . . . . 25 7.3. List decoding FGS codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 8. Pruning list for folded AG codes using h.s.e sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 8.1. Combining folded Hermitian codes and h.s.e sets . . . . . . . . . . . . . . . . . . . . . . . 28 8.2. Combining folded Garcia-Stichtenoth codes and h.s.e sets . . . . . . . . . . . . . . 29 9. List decoding AG codes with subfield evaluation points . . . . . . . . . . . . . . . . . . . . . . . 31 10. 11. 9.1. Decoding Reed-Solomon codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 9.2. Decoding algebraic-geometric codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 9.3. Decoding the codes from the Garcia-Stichtenoth tower . . . . . . . . . . . . . . . . . 38 Subspace designs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 10.1. Constructing subspace designs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 10.2. Cascaded subspace designs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Good list decodable subcodes of RS and AG codes . . . . . . . . . . . . . . . . . . . . . . . . . . 44 11.1. Reed-Solomon codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 11.2. Subcodes of Garcia-Stichtenoth codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 AG CODES & NEAR-OPTIMAL LIST DECODING 3 1. Introduction An error-correcting code C of block length N over a finite alphabet Σ maps a set M of messages into codewords in ΣN . The rate of the code C, denoted R, equals N1 log|Σ| |M|. In this work, we will be interested in codes for adversarial noise, where the channel can arbitrarily corrupt any subset of up to τ N symbols of the codeword. The goal will be to correct such errors and recover the original message/codeword efficiently. It is easy to see that information-theoretically, we need to receive at least RN symbols correctly in order to recover the message (since |M| = |Σ|RN ), so we must have τ 6 1 − R. Perhaps surprisingly, in a model called list decoding, recovery up to this informationtheoretic limit becomes possible. Let us say that a code C ⊆ ΣN is (τ, ℓ)-list decodable if for every received word y ∈ ΣN , there are at most ℓ codewords c ∈ C such that y and c differ in at most τ N positions. Such a code allows, in principle, the correction of a fraction τ of errors, outputting at most ℓ candidate codewords one of which is the originally transmitted codeword. The probabilistic method shows that a random code of rate R over an alphabet of size exp(O(1/ε)) is with high probability (1 − R − ε, O(1/ε))-list decodable [2]. However, it is not known how to construct or even randomly sample such a code for which the associated algorithmic task of list decoding (i.e., given y ∈ ΣN , find the list of codewords within fractional radius 1 − R − ε) can be performed efficiently. This work takes a big step in that direction, giving a randomized construction of such efficiently list-decodable codes over a slightly worse alphabet size of exp(Õ(1/ε2 )). We note that the alphabet size needs to be at least exp(Ω(1/ε)) in order to list decode from a fraction 1 − R − ε of errors, so this is close to optimal. For the list-size needed as a function of ε for decoding a 1 − R − ε fraction of errors, the best lower bound is only Ω(log(1/ε)) [9], but as mentioned above, even random coding arguments only achieve a list-size of O(1/ε), which our construction matches up to constant factors. We also give a fully deterministic construction with a list-size that is very slowly growing as a function of the block length. We now review some of the key results on algebraic list decoding leading up to this work. A more technical comparison with related work appears in Section 1.1. The first construction of codes that achieved the optimal trade-off between rate and list-decoding radius, i.e., enabled list decoding up to a fraction 1−R−ε of worst-case errors with rate R, was due to Guruswami and Rudra [11]. They showed that a variant of Reed-Solomon (RS) codes called folded RS codes admit such a list decoder. For a decoding radius of 1 − R − ε, the code was based on bundling together disjoint windows of m = Θ(1/ε2 ) consecutive symbols of the RS codeword into a single symbol over a larger alphabet. As a result, the 2 alphabet size of the construction was N Ω(1/ε ) . Ideas based on code concatenation and expander codes can be used to bring down the alphabet size to exp(Õ(1/ε4 )), but this compromises some nice features such as list recovery and soft decoding of the folded RS code. Also, the decoding time complexity as well as proven bound on worst-case output list size for these constructions were N Ω(1/ε) . Our main final result statement is the following, offering two constructions, one randomized and one deterministic, of variants of algebraic-geometric (AG) codes that are list-decodable with optimal rate. More detailed statements can be found in the technical sections of the paper. Theorem 1.1 (Main). For any R ∈ (0, 1) and positive constant ε ∈ (0, 1), there is (i) a Monte Carlo construction of a family of codes of rate at least R over an alphabet size exp(O(log(1/ε)/ε2 )) that are encodable and (1−R−ε, O(1/(Rε))-list decodable 4 V. GURUSWAMI AND C. XING in Oε (N c ) time1, where N is the block length of the code and c is an absolute positive constant. (ii) a deterministic construction of a family of codes of rate at least R over an alphabet size exp(O(log2 (1/ε)/ε2 )) that are encodable and (1 − R − ε, L(N ))-list decodable in Oε (N c ) time, for a list size that satisfies L(N ) = o(log(r) N ) (the r’th iterated logarithm) for any fixed integer r. The first part of Theorem 1.1 is achieved through folded algebraic-geometric codes and hierarchical subspace-evasive sets. To fold algebraic-geometric codes, we first find suitable automorphisms of the ground function field. Consequently, the list of possible candidate messages has an exponential size, but is well structured. To prune down the list size, we only encode messages in a subspace-evasive set which has small intersection with the original list. To make use of subspace-evasive sets efficiently, we have to: (i) give an explicit pseudorandom construction of these sets; and (ii) encode the messages to subspace-evasive sets efficiently. We refer to Section 2 for details. The second part of Theorem 1.1 is obtained through usual algebraic-geometric codes with evaluation points over subfields and subspace design. As in the fist part, the list of possible candidate messages has an exponential size, but is well structured. The approach based on hierarchical subspace-evasive sets in the first part leads to excellent list size; however, we only know randomized constructions of hierarchical subspace-evasive sets. To obtain a deterministic list decoding, we prune down the list of possible solutions through subspace designs (see Section 2 for details). We note that our Monte Carlo construction gives codes that are quite close to the existential bounds in three aspects simultaneously — the trade-off between error fraction 1 − R − ε and rate R, the list-size as a function of ε, and the alphabet size of the code family (again as a function of ε). Even though these codes are not fully explicit, they are “functionally explicit” in the sense that once the code is (efficiently) sampled, with high probability the polynomial time encoding and decoding algorithms deliver the claimed error-correction guarantees for all allowed error pattern. The explicit construction avoids this shortcoming at the expense of a slightly worse list size. Our algorithms can also be extended to the “list recovery” setting in a manner similar to [11, 7]; we omit discussion of this aspect and the straightforward details. 1.1. Prior and related work. Let us recap a bit more formally the construction of folded RS codes from [11]. One begins with the Reed-Solomon encoding of a polynomial f ∈ Fq [X] of degree < k consisting of the evaluation of f on a subset of field elements ordered as 1, γ, . . . , γ N −1 for some primitive element γ ∈ Fq and N < q. For an integer “folding” parameter m > 1 that divides N , the folded RS codeword is defined over alphabet Fm q and consists of n/m blocks, with the j’th block consisting of the (j−1)m m-tuple (f (γ ), f (γ (j−1)m+1 ), . . . , f (γ jm−1 )). The algorithm in [11] for list decodq ing these codes was based on the algebraic identity f (γX) = f (X) in the residue field Fq [X]/(X q−1 − γ) where f denotes the residue f mod (X q−1 − γ). This identity is used to solve for f from an equation of the form Q(X, f (X), f (γX), . . . , f (γ s−1 X)) = 0 for some low-degree nonzero multivariate polynomial Q. The high degree q > n of this identity, coupled with s ≈ 1/ε, led to the large bounds on list-size and decoding complexity in [11]. One possible approach to reduce q (as a function of the code length) in this construction would be to work with algebraic-geometric codes based on function fields K 1We use the O (·) notation to hide constant factors that depend on ε. ε AG CODES & NEAR-OPTIMAL LIST DECODING 5 over Fq with more rational points. However, an automorphism σ of K that can play the role of the automorphism f (X) 7→ f (γX) of Fq (X) is only known (or even possible) for very special function fields. This approach was used in [6] to construct list-decodable codes based on cyclotomic function fields using as σ certain Frobenius automorphisms. These codes improved the alphabet size to polylogarithmic in N , but the bound on listsize and decoding complexity remained N Ω(1/ε) . Recently, a linear-algebraic approach to list decoding folded RS codes was discovered in [27, 7]. Here, in the interpolation stage, which is common to all list decoding algorithms for algebraic codes [26, 13, 21, 11], one finds a linear multivariate polynomial Q(X, Y1 , . . . , Ys ) whose total degree in the Yi ’s is 1. The simple but key observation driving the linear-algebraic approach is that the equation Q(X, f (X), . . . , f (γ s−1 X)) = 0 now becomes a linear system in the coefficients of f . Further, it is shown that the solution space has dimension less than s, which again gives a list-size upper bound of q s−1 . Finally, since the list of candidate messages fall in an affine space, it was noted in [7] that one can bring down the list size by carefully “precoding” the message polynomials so that their k coefficients belong to a “subspace-evasive set” (which has small intersection with every s-dimensional subspace of Fkq ). This idea was used in [14] to give a randomized construction of (1 − R − ε, O(1/ε))-list decodable codes of rate R. However, the alphabet size and runtime of the decoding algorithm both remained N Ω(1/ε) . Similar results were also shown in [14] for derivative codes, where the encoding of a polynomial f consists of the evaluations of f and its first m − 1 derivatives at distinct field elements. Concurrently with our work reported in [16], Dvir and Lovett gave an elegant construction of explicit subspace evasive sets based on certain algebraic varieties [1]. This yields an explicit version of the codes from [7], albeit with a worse list size bound of (1/ε)O(1/ε) . This work and [1] are incomparable in terms of results. The big advantage of [1] is the deterministic construction of the code. The benefits in our work are: (i) both constructions give codes over an alphabet size that is a constant independent of N , 2 whereas in [1] the N Ω(1/ε ) alphabet size of folded RS codes is inherited; (ii) our first Monte Carlo construction ensures list-decodability with a list-size of O(1/ε) that is much better and in fact matches the full random construction up to constant factors,2 and (iii) our second construction gives a deterministic algorithm as well with almost constant list size (and constant alphabet size). Another important feature is that both our work and [1] achieve a decoding complexity of Oε (N c ) with exponent independent of ε. Our paper presents two class of codes: folded algebraic-geometric codes and usual algebraic-geometric codes with evaluation points over subfields. For both the classes of codes, we can apply hierarchical subspace-evasive sets as well as subspace design to prune down the list size by taking certain subcodes. This is because of the “periodic” structure of the subspace in which the candidate messages are pinned down by the linear-algebraic list decoder is similar in both cases. Thus, we can obtain both randomized and deterministic algorithms from each of the two classes of codes. In total, we have four combinations of constructions. To illustrate both algebraic approaches, we decide to focus on two combinations, i.e., (i) folded algebraic-geometric codes with hierarchical subspace-evasive sets; and (ii) usual algebraic-geometric codes with evaluation points over subfields with subspace designs. These are listed in Figure 1. We note that the other two combinations are also possible, as the pruning of the subspace of solutions is “black-box” with respect to its periodic structure. 2As mentioned above, the bound in [1] is (1/ε)O(1/ε) and it seems very difficult to get a sub-exponential dependence on 1/ε with the algebraic approach relying on Bezout’s theorem to construct subspace-evasive sets. 6 V. GURUSWAMI AND C. XING Code Construction Alphabet size List size Decoding time 2 Folded RS/derivative Explicit N O(1/ε ) N O(1/ε) N O(1/ε) 2) O(1/ε Folded RS subcode Monte Carlo N O(1/ε) N O(1/ε) 2 O(1) Folded RS subcode Explicit N O(1/ε ) (1/ε)O(1/ε) N O(1) 21/ε 2 2 2 Folded cyclotomic Las Vegas (log N )O(1/ε ) N O(1/ε ) N O(1/ε ) O(1) Folded AG subcode Monte Carlo exp(Õ(1/ε2 )) O(1/ε) N O(1) 21/ε AG subcode Explicit exp(Õ(1/ε2 )) ∗ 2 2(log N) 22 Reference [11, 14] [14] [1] [6] Thm. 1.1(i) N O(1) (1/ε)O(ℓ) Thm. 1.1(ii) Figure 1. Parameters of various constructions of codes that enable list decoding (1 − R − ε) fraction of errors, with rate R. The last two lines are from this work. “Explicit” means the code can be constructed in deterministic polynomial time. The rows with first column in boldface are not dominated by other constructions. The last line gives the first deterministic construction of algebraic codes for efficient optimal rate list decoding over constant-sized alphabets. In the table presented in Figure 1, we list previous results and those in this paper. The major improvement of this work is to bring down the alphabet size to constant, while at the same time ensuring small list size and low decoding complexity where the exponent of the polynomial run time does not depend on ε. Our folded algebraic-geometric subcodes achieve a list size matching the fully random constructions up to constant factors, together with alphabet size not much worse than the lower bound exp(Ω(1/ε)). On the last line, our algebraic-geometric subcodes give a deterministic list decoding with almost constant list size and optimal decoding radius. 1.2. Open questions. The challenge of decoding up to radius approaching the optimal bound (1 − R) with rate R along with good list and alphabet size is, for the most part, solved by our work. There are still some goals that have not been met. One is to get a fully deterministic construction with constant list-size and alphabet size (as a function of ε), and construction/decoding complexity Oε (N c ). In this regard, in a recent personal communication, Kopparty, Ron-Zewi, and Saraf [19] report a construction that achieves constant list and alphabet size with complexity N c (log log N )O(1/ε) (the list size, while a constant, grows doubly exponentially in 1/ε). Another challenge is to construct a (1 − R − ε, L)-list decodable code of rate R (for list size L bounded by a polynomial in the block length), over an alphabet of size exp(O(1/ε)), which is the asymptotically optimal size. Note that all constructions over a constant-sized alphabet known so far have alphabet size at least exp(Ω(1/ε2 )). Finally, the various algebraic and expander-based techiques that have led to progress on list decoding only work over large alphabets. The challenge of efficient optimal rate list decoding over say the binary alphabet, even for the simpler model of erasures, remains wide open. The best known constructions are obtained via concatenation, and are list-decodable up to the so-called Blokh-Zyablov bound [12]. 1.3. Organization. The paper is organized as follows. In Section 2, we describe the detailed techniques of our paper including algebraic approaches and pseudorandomness. Following the section on techniques, in Section 3 we introduce periodic and ultra-periodic subspaces, give definitions and basic properties. In Section 4, we recall some basis results on function fields and algebraic-geometric codes. To illustrate our ideas in an algebraically simpler (and perhaps more practical) setting, in Section 5 we give a construction based AG CODES & NEAR-OPTIMAL LIST DECODING 7 on a tower of Hermitian field extensions [22]. This is capable of giving a similar result to our best ones based on the Garcia-Stichtenoth tower, albeit with alphabet size and list-size upper bound polylogarithmic in the code length. In Section 6 we first introduce hierarchical subspace-evasive sets, then show that random sets are hierarchical subspaceevasive with high probability. We also present a pseudorandom construction of hierarchical subspace-evasive sets, which also allow for efficient encoding and efficient computation of intersection with periodic subspaces. Folded algebraic-geometric codes from the Garcia-Stichtenoth tower are studied in Section 7. The list size, decoding radius and decoding algorithm via local expansion are also discussed in this section. Section 8 is devoted to the discussion of pruning down the list size for folded codes from both the Hermitian and the Garcia-Stichtenoth towers using hierarchical subspace-evasive sets. The second class of our codes, namely usual algebraicgeometric codes with evaluation points over subfields is presented in Section 9. In this section, we first discuss list decoding for the simpler Reed-Solomon case, and then generalize it to list decoding of arbitrary algebraic geometric codes and finally instantiate the approach with the codes from the Garcia-Stichtenoth tower. In Section 10, we introduce subspace designs and cascaded subspace designs, and discuss parameters of random and explicit constructions of those. In the last section, the explicit construction of subcodes of RS and AG subcodes based on subspace designs is presented. 2. Our techniques We describe some of the main new ingredients that go into our work. We need both new algebraic insights and constructions, as well as ideas in pseudorandomness relating to (variants of) subspace-evasive sets. We describe these in turn below. 2.1. Algebraic ideas. It is shown in [13] that one can list decode the usual algebraicgeometric codes up to the Johnson bound. Thus, to list decode the algebraic-geometric codes beyond the Johnson bound, we have to consider some variants of usual algebraicgeometric codes. In this work, we present two variants of algebraic-geometric codes–folded algebraic geometric codes and usual algebraic geometric codes with evaluation points over subfields. We describe these in turn. 2.1.1. Folding AG codes. The first approach is to use suitable automorphisms of function fields to fold the code. This approach was used for Reed-Solomon codes in [11] and for cyclotomic function field in [6], though this was done using the original approach in [11] where the messages to be list decoded were pinned down to the roots of a higher degree polynomial over a large residue field. As mentioned earlier, effecting this “non-linear” approach in [11, 6] with automorphisms of more general function fields seems intricate at best. In this work we employ the linear-algebraic list decoding method of [14]. However, the correct generalization of the linear-algebraic list decoding approach to the function field case is also not obvious. One of the main algebraic insights in this work is noting that the right way to generalize the linear-algebraic approach to codes based on algebraic function fields is to rely on the local power series expansion of functions from the message space at a suitable rational point. (The case for Reed-Solomon codes being the expansion around 0, which is a finite polynomial form.) Working with a suitable automorphism which has a “diagonal” action on the local expansion lets us extend the linear-algebraic decoding method to AG codes. Implementing this for specific AG codes requires an explicit specification of a basis for an associated message (Riemann-Roch) space, and the efficient computation of the local expansion of 8 V. GURUSWAMI AND C. XING the basis elements at a special rational point on the curve. We show how to do this for two towers of function fields: the Hermitian tower [22] and the asymptotically optimal GarciaStichtenoth tower [4, 5]. The former tower is quite simple to handle — it has an easily written down explicit basis, and we show how to compute the local expansion of functions around the point with all zero coordinates. However, the Hermitian tower does not have bounded ratio of the genus to number of rational points, and so does not give constant alphabet codes (we can get codes over an alphabet size that is polylogarithmic in the block length though). Explicit basis for Riemann-Roch spaces of the Garcia-Stichtenoth tower were constructed in [23]. Regarding local expansions, one major difference is that we work with local expansion of functions at the point at infinity, which is fully “ramified” in the tower. For both these towers, we find and work with a nice automorphism that acts diagonally on the local expansion, and use it for folding the codes and decoding them by solving a linear system. 2.1.2. Restricting evaluation points to a subfield. The second approach is to work with “normal” algebraic-geometric codes, based on evaluating functions from a Riemann-Roch space at some rational places, except we use a constant field extension of the function field for the function space, but restrict to evaluating at rational places over the original base field. Let use give a brief idea why restricting evaluation points to a subfield enables correcting more errors. The idea behind list decoding results for folded RS (or derivative) codes in [11, 14] is that the encoding of a message polynomial f ∈ FQ [X] includes the values of f and closely related polynomials at the evaluation points. Given a string not too far from the encoding of f , one can use this property together with the “interpolation method” to find an algebraic condition that f (and its closely related polynomials) must satisfy, eg. A0 (X) + A1 (X)f (X) + A2 (X)f ′ (X) + · · · + As (X)f (s−1) (X) = 0 in the case of derivative codes [14] (here f (i) denotes the i’th formal derivative of f , and the A0 , A1 , . . . , As are low-degree polynomials found by the decoder). The solutions f (X) to this equation form an affine space, which can be efficiently found (and later pruned for list size reduction when we pre-code messages into a subspace-evasive set). For Reed-Solomon codes as in Definition 12, the encoding only includes the values of f at α1 , α2 , . . . , αn . But since αi ∈ Fq , we have f (αi )q = f σ (αi ) where f σ is the polynomial obtained by the action of the Frobenius automorphism that maps y 7→ y q on f (formally, Pk−1 Pk−1 q j f σ (X) = j=0 fj X if f (X) = j=1 fj X j ). Thus the decoder can “manufacture” the 2 3 values of f σ (and similarly f σ , f σ , etc.) at the αi . Applying the above approach then s−1 enables finding a relation A0 (X) + A1 (X)f (X) + A2 (X)f σ (X) + · · · + As (X)f σ (X) = 0, which is again an Fq -linear condition on f that can be used to solve for f . We remark here that this approach can also be applied effectively to linearized polynomials, and can be used to construct variants of Gabidulin codes that are list-decodable up to the optimal 1 − R fraction of errors (where R is the rate) in the rank metric [15]. To extend this idea to algebraic-geometric codes, we work with constant extensions Fqm · F of algebraic function fields F/Fq . The messages belong to a Riemann-Roch space over Fqm , but they are encoded via their evaluations at Fq -rational points. For decoding, we recover the message function f in terms of the coefficients of its local expansion at some rational point P . (The Reed-Solomon setting is a special case when F = Fq (X), and P is 0, i.e., the zero of X.) To get the best trade-offs, we use AG codes based on a tower of function fields due to Garcia and Stichtenoth [4, 5] which achieve the optimal trade-off between the number of Fq -rational points and the genus. For this case, we recover messages in terms of their local expansion around the point at infinity P∞ which is also AG CODES & NEAR-OPTIMAL LIST DECODING 9 used to define the Riemann-Roch space of messages. So we treat this setting separately (Section 9.3), after describing the framework for general AG codes first (Section 9.2). 2.2. Pseudorandomness. The above algebraic ideas enable us to pin down the messages into a structured subspace of dimension linear in the message length. The specific structure of the subspace is a certain “periodicity” — there is a subspace W ⊂ Fm q such that once f0 , f1 , . . . , fi−1 (the first i coefficients of the message polynomial) are fixed, fi belongs to a coset of W . We now describe our ideas to prune this list, by restricting (or “pre-coding”) the message polynomials to belong to carefully constructed pseudorandom subsets that have small intersection with any periodic subspace. 2.2.1. Hierarchical subspace-evasive sets. The first approach to follows along the lines of [14] and only encode messages in a subspace-evasive set which has small intersection with low-dimensional subspaces. Implementing this in our case, however, leads to several problems. First, since the subspace we like to avoid intersecting much has large dimension, the list size bound will be linear in the code length and not a constant like in our final result. More severely, we cannot go over the elements of this subspace to prune the list as that would take exponential time. To solve the latter problem, we observe that the subspace has a special “periodic” structure, and exploit this to show the existence of large “hierarchically subspace evasive” (h.s.e) subsets which have small intersection with the projection of the subspace on certain prefixes. Isolating the periodic property of the subspaces, and formulating the right notion of evasiveness w.r.t to such subspaces, is an important aspect of this work. We also give a pseudorandom construction of good h.s.e sets using limited wise independent sample spaces, in a manner enabling the efficient iterative computation of the final list of intersecting elements. Further our construction allows for efficient indexing into the h.s.e set which leads to an efficient encoding algorithm for our code). As a further ingredient, we note that the number of possible subspaces that arise in the decoding is much smaller than the total number of possibilities. Using this together with an added trick in the h.s.e set construction, we are able to reduce the list size to a constant. 2.2.2. Subspace designs. The approach based on h.s.e sets leads to excellent list size; however, we only know randomized constructions of h.s.e sets with the required properties. Our second approach to prune the subspace of possible solutions is based on subspace designs and leads to deterministic subcode constructions. Recall that the coefficients f0 , f1 , . . . , fk−1 of the message polynomial (which belong to the extension field Fqm ) are pinned down by the linear-algebraic list decoder to a periodic subspace with the property that there is an Fq -subspace W ⊂ Fqm such that once f0 , f1 , . . . , fi−1 are fixed, fi belongs to a coset of W . Our idea then is to restrict fi to belong to a subspace Hi where H1 , H2 , . . . , Hk are a collection of subspaces in Fm q such that for any s-dimensional m subspace W ⊂ Fq , only a small number of them have non-trivial intersection with W . P More precisely, we require that ki=1 dim(W ∩ Hi ) is small. We call such a collection as a subspace design in Fm q . We feel that the concept of subspace designs is interesting in its own right, and view the introduction of this notion in Section 10 as a key contribution in this work. Indeed, subsequent work by Forbes and Guruswami [3] highlighted the central role played by subspace designs in “linear-algebraic pseudorandomness” and in particular how they lead to rank condensers and dimension expanders. A simple probabilistic argument shows the existence of q Ω(εm) random subspaces of dimension (1 − ε)m have small total intersection with every s-dimensional W . This construction can also be derandomized, though the construction complexity of the resulting 10 V. GURUSWAMI AND C. XING codes becomes quasi-polynomial with this approach for the parameter choices needed in the construction. Fortunately, in a follow-on to [17], Guruswami and Kopparty gave explicit constructions of subspace designs with parameters nearly matching the random constructions [8]. One can pre-code with this subspace design to get explicit list-decodable sub-codes of Reed-Solomon codes whose evaluation points are in a subfield (Section 11.1). However, this construction inherits the large field size of Reed-Solomon codes. For explicit subcodes of algebraic-geometric codes using subspace designs we need additional ideas. The dimension k in the case of AG codes is much larger than the alphabet size q m (in fact that is the whole point of generalizing to AG codes). So we cannot have a subspace design in Fm q with k subspaces. We therefore use several “layers” of subspace designs in a cascaded fashion (Section 10.2) — the first one in Fm q , the next √ √ m m m m 2 1 1 and so on. Since the mi ’s one in Fq for m1 ≫ q , the third one in Fq for m2 ≫ q increase exponentially, we only need about log∗ k levels of subspace designs. Each level incurs about a factor 1/ε increase in the dimension of the “periodic subspace” (W when we begin) at the corresponding scale. With a careful technical argument and choice of parameters, we are able to obtain the bounds of Theorem 1.1(ii). 3. Periodic subspaces In this section we formalize a certain “periodic” property of affine subspaces that will arise in our list decoding application. We begin with some notation. For a vector y = (y1 , y2 , . . . , ym ) ∈ Fm q and positive t −t +1 2 1 its projection onto coordinates integers t1 6 t2 6 m, we denote by proj[t1 ,t2 ] (y) ∈ Fq t1 through t2 , i.e., proj[t1 ,t2 ] (y) = (yt1 , yt1 +1 , . . . , yt2 ). When t1 = 1, we use projt (y) to denote proj[1,t] (y). These notions are extended to subsets of strings in the obvious way: proj[t1 ,t2 ] (S) = {proj[t1 ,t2 ] (x) | x ∈ S}. Definition 1 (Periodic subspaces). For positive integers r, b, ∆ and κ := b∆, an affine subspace H ⊂ Fκq is said to be (r, ∆, b)-periodic if there exists a subspace W ⊆ F∆ q of (j−1)∆ dimension at most r such that for every j = 1, 2, . . . , b, and every “prefix” a ∈ Fq the projected affine subspace of F∆ q defined as , {proj[(j−1)∆+1,j∆] (x) | x ∈ H and proj(j−1)∆ (x) = a} ∆ is contained in an affine subspace of F∆ q given by W + va for some vector va ∈ F dependent on a.3 The motivation of the above definition will be clear when we present our linearalgebraic list decoders, which will pin down the messages that must be output within an (where q m will be the alphabet size of the (s − 1, m, k)-periodic (affine) subspace of Fmk q code, k its dimension, and s a parameter of the algorithm that governs how close the decoding performance approaches the Singleton bound). The following properties of periodic affine spaces follow from the definition. Claim 3.1. Let H be an (r, ∆, b)-periodic affine subspace. Then for each j = 1, 2, . . . , b, (1) the projection of H to the first j blocks of ∆ coordinates, projj∆ (H) = {projj∆ (x) | x ∈ H}, has dimension at most jr. (In particular H has dimension at most br.) 3In fact, in our applications this affine space will either be empty or equal to a coset of W , but for a simpler definition we just require that it is always contained in a coset of W . AG CODES & NEAR-OPTIMAL LIST DECODING (j−1)∆ (2) for each a ∈ Fq proj(j−1)∆ (y) = a. 11 , there are at most q r extensions y ∈ projj∆ (H) such that For an affine space H, its underlying subspace is the subspace S such that H is a coset of S. Definition 2 (Representing periodic affine subspaces). The canonical representation of an (r, ∆, b)-periodic subspace H consists of a matrix B ∈ Fq∆×∆ such that ker(B) has ∆×∆ for 1 6 i 6 b and dimension at most r, and vectors ai ∈ F∆ q and matrices Ai,j ∈ Fq 1 6 j < i, such that x ∈ H if and only if for every i = 1, 2, . . . , b the following holds: i−1 X  ai + Ai,j · proj[(j−1)∆+1,j∆] (x) + B · proj[(i−1)∆+1,i∆] (x) = 0 . j=1 Ultra-periodic subspaces. For our result on pre-coding algebraic-geometric codes with subspace designs, we will exploit an even stronger property that holds for the subspaces output by the linear-algebraic list decoder. We formalize this notion below. Definition 3. An affine subspace H of Fκq is said to be (r, ∆)-ultra periodic if for every κ κ , setting bℓ = ℓ∆ , we have projbℓ ·ℓ∆ (H) is (ℓr, ℓ∆, bℓ )-periodic. integer ℓ, 1 6 ℓ 6 ∆ The definition captures the fact that the subspace is periodic not only for blocks of size ∆, but also for block sizes that are multiples of ∆. Thus the subspace looks periodic in all “scales” simultaneously. 4. Preliminaries on function fields and algebraic-geometric codes For convenience of the reader, we start with some background on global function fields over finite fields. The reader may refer to [25, 20] for detailed background on function fields and algebraic-geometric codes. For a prime power q, let Fq be the finite field of q elements. An algebraic function field over Fq in one variable is a field extension F ⊃ Fq such that F is a finite algebraic extension of Fq (x) for some x ∈ F that is transcendental over Fq . The field Fq is called the full constant field of F if the algebraic closure of Fq in F is Fq itself. Such a function field is also called a global function field. From now on, we always denote by F/Fq a function field F with the full constant field Fq . Let PF denote the set of places of F . The divisor group, denoted P by Div(F ), is the free abelian group generated by all places in PF . An element G = P ∈PF nP P of Div(F ) is called a divisor of F , where nP = 0 for almost all P ∈ PF . We denote np by νP (G). The support, denoted by Supp(G), of G is the set {P ∈ PF : nPP6= 0}. For a nonzero function z ∈ F , the principal divisor of z is defined to be div(z) = P ∈PF νP (z)P , where νP denotes the normalized P and pole divisors of z are P discrete valuation at P . The zero defined to be div(z)0 = νP (z)>0 νP (z)P and div(z)∞ = − νP (z)<0 νP (z)P , respectively. Riemann-Roch space. For a divisor G of F , we define the Riemann-Roch space associated with G by L(G) := {f ∈ F ∗ : div(f ) + G > 0} ∪ {0}, where F ∗ denotes the set of nonzero elements of F . Then L(G) is a finite dimensional space over Fq and its dimension ℓ(G) is determined by the Riemann-Roch theorem which gives ℓ(G) = deg(G) + 1 − g + ℓ(W − G), 12 V. GURUSWAMI AND C. XING where g is the genus of F and W is a canonical divisor of degree 2g − 2. Therefore, we always have that ℓ(G) > deg(G) + 1 − g and the equality holds if deg(G) > 2g − 1. Consider finite extension Fqm over Fq and the constant extension Fm := Fqm · F over F . A divisor G of F can be viewed as a divisor of Fm . Thus, we can consider the Riemann-Roch space in Fm given by ∗ Lm (G) := {f ∈ Fm : div(f ) + G > 0} ∪ {0}. Then it is clear that Lm (G) contains L(G) and Lm (G) is a finite dimensional vector space over Fqm . Furthermore, Lm (G) is the tensor product of L(G) with Fqm (see [24, Proposition 5.8 of Chapter II]). This implies that dimFqm (Lm (G)) = dimFq (L(G)) and an Fq -basis of L(G) is also an Fqm -basis of Lm (G). Automorphism. For a function f and a place P ∈ PF with νP (f ) > 0, we denote by f (P ) the residue class of f in the residue class field FP at P . For an automorphism φ ∈ Aut(F/Fq ) and a place P , we denote by P φ the place {φ(x) : x ∈ P }. For a function f ∈ F , we denote by f φ the action of φ on f . If νP (f ) > 0 and νP φ (f ) > 0, then one has P −1 −1 that νP (f φ ) > 0 and f (P φ ) = f φ (P ). Furthermore, for a divisor G = P ∈PF mP P P we denote by Gφ the divisor P ∈PF mP P φ . Therefore, we have φ(L(G)) := {f φ : f ∈ L(G)} = L(Gφ ). Assume that E/Fq is a subfield of F and φ is an automorphism of Aut(F/E). Then for a divisor G of F that is invariant under φ, then we have φ(L(G)) = L(G). Next we consider the constant extension Fm = Fqm · F . Let σ be the Frobenius automorphism Fqm , i.e., σ(α) = αq for any α ∈ Fqm . Then σ can be extended to an automorphism of Aut(Fm /F ). Local expansion (or power series). Let F/Fq be a function field and let P be a rational place. An element t of F is called a local parameter at P if νp (t) = 1 (such a local alwaysexists). For a nonzero function f ∈ F with νP (f ) > v, we have    parameter f f νP tv > 0. Put av = tv (P ), i.e., av is the value of the function f /tv at P . Note that     v vt the function f /tv − av satisfies νP tfv − av > 1, hence we know that νP f −a > 0. v+1 t   v vt (P ). Then νP (f − av tv − av+1 tv+1 ) > v + 2. Put av+1 = f −a tv+1 Assume that we have obtained a sequence {ar }m r=v (m > v)  of Pelements  of Fq such r Pk f− m r r=v ar t that νP (f − r=v ar t ) > k + 1 for all v 6 k 6 m. Put am+1 = (P ). Then tm+1 Pm+1 νP (f − r=v ar tr ) > m + 2. In this way we continue our construction Pmof ar .r Then we obtain an infinite sequence {ar }∞ of elements of F such that ν (f − q P r=v r=v ar t ) > m + 1 for all m > v. We summarize the above construction in the formal expansion ∞ X ar t r , (1) f= r=v which is called the local expansion of f at P . It is clear that the local expansions P of a function depends on P the choice of the local m i satisfies ν (f − i parameters t. Note that if a power series ∞ a t i P i=v i=v ai t ) > m + 1 for all m > v, then it is a local expansion of f . The above procedure shows that finding a local expansion at a rational place is very efficient as long as the computation of evaluations of functions at this place is easy. AG CODES & NEAR-OPTIMAL LIST DECODING 13 If f belongs to a Riemann-Roch space L(G) with deg(G) = d. Denote νP (G) by v, then the first d + 1 coefficients av , av+1 , . . . , av+d in (1) determines the function f . To see this, assume that g is a function of L(G) with the same first d + 1 coefficients in its local expansion. Then we have f − g ∈ L(G − (d + 1)P ) which is the zero vector space. This implies that f = g. Algebraic-geometric codes. Let P + {P1 , P2 , . . . , PN } be a set of N distinct rational places of a function field F/Fq of genus g. Let G be a divisor of F with Supp(G) ∩ P = ∅. Then the algebraic-geometric codes defined by C(P, G) := {(f (P1 ), f (P2 ), . . . , f (PN )) : f ∈ L(G)} is an Fq -linear code of length N . Furthermore, the dimensions of C(P, G) is equal to ℓ(G) if N > deg(G). The codes considered in this paper are variations of the above algebraic-geometric codes, namely, folded algebraic-geometric codes and algebraic-geometric codes with evaluation points in a subfield. 5. Folded codes from the Hermitian tower In this section, we will describe a family of folded codes based on the Hermitian function field (or rather a tower of such fields). 5.1. Background on Hermitian tower. In what follows, let r be a prime power and let q = r 2 . We denote by Fq the finite field with q elements. The Hermitian function tower that we are going to use for our code construction was discussed in [22]. The reader may refer to [22] for the detailed background on the Hermitian function tower, and Stichtenoth’s book [25] for general background on algebraic function fields and their use in constructing algebraic-geometric codes. The Hermitian tower is defined by the following recursive equations xri+1 + xi+1 = xr+1 , i i = 1, 2, . . . , e − 1. Put Fe = Fq (x1 , x2 , . . . , xe ) for e > 2. We will assume that r > 2e. Rational places. The function field Fe has r e+1 + 1 rational places. One of these is the “point at infinity” which is the unique pole P∞ of x1 (and is fully ramified). The other r e+1 come from the rational places lying over the unique zero Pα of x1 −α for each α ∈ Fq . Note that for every α ∈ Fq , Pα splits completely in Fe , i.e., there are r e−1 rational places lying over Pα . Intuitively, one can think of the rational places of Fe (besides P∞ ) as being given for i = 1, 2, . . . , e − 1. For by e-tuples (α1 , α2 , . . . , αe ) ∈ Feq that satisfy αri+1 + αi+1 = αr+1 i each value of α ∈ Fq , there are precisely r solutions to β ∈ Fq satisfying β r + β = αr+1 , so the number of such e-tuples is r e+1 (q = r 2 choices for α1 , and then r choices for each successive αi , 2 6 i 6 e). Riemann-Roch spaces. For a place P of Fe , we denote by νP the discrete valuation of P : for a function h ∈ Fe , if h has a zero at P , then νP (h) gives the number (multiplicity) of zeroes, if h has a pole at P , then −νP (h) gives the pole order of h at P , and νP (h) = 0 if h has neither a zero or a pole at P . For an integer l, we consider the Riemann-Roch space defined by L(lP∞ ) := {h ∈ Fe \ {0} : νP∞ (h) > −l} ∪ {0}. 14 V. GURUSWAMI AND C. XING Then the dimension ℓ(lP∞ ) is at least l − ge + 1 and furthermore, ℓ(lP∞ ) = l − ge + 1 if l > 2ge − 1. A basis over Fq of L(lP∞ ) can be explicitly constructed as follows ) ( e X j1 e−i i−1 e je ji r (r + 1) 6l . (2) x1 · · · xe : (j1 , . . . , je ) ∈ Z>0 , i=1 We stress that evaluating elements of L(lP∞ ) at the rational places of Fe (other than P∞ ) is easy: we simply have to evaluate a linear combination of the monomials allowed in (2) at the tuples (α1 , α2 , . . . , αe ) ∈ Feq mentioned above. In other words, it is just evaluating an e-variate polynomial at a specific subset of r e+1 points of Feq , and can be accomplished in polynomial time. Genus. The genus ge of the function field Fe is given by (3) !   e−1 e   e 1 i−1 er e X  e i−1 re X e 1 1 X e e−1 r 1+ 6 er e 6 − (r + 1) +1 6 ge = 2 r 2 2 r i r i−1 i=1 i=1 i=1 where the last step used r > 2e. A useful automorphism. Let γ be a primitive element of Fq and consider the automorphism σ ∈ Aut(Fe /Fq ) defined by i−1 σ : xi 7→ γ (r+1) xi for i = 1, 2, . . . , e. The order of σ is q − 1 and furthermore, we have the following facts: (i) Let P0 be the unique common zero of x1 , x2 , . . . , xe (this corresponds to the e-tuple (0, 0, . . . , 0)), and P∞ the unique pole of x1 . The automorphism σ keeps P0 and P∞ unchanged, i.e., P0σ = P0 and P∞ σ = P∞ , (ii) Let P be the set of all the rational places which are neither P∞ nor zeros of x1 . Then |P| = (q − 1)r e−1 . Moreover, σ divides P into r e−1 orbits and each orbit has q − 1 places. For an integer m with 1 6 m 6 q − 1, we can label N m distinct k j elements m−1 m−1 q−1 σ σ σ e−1 σ , . . . , PN , PN , . . . , PN in P, as long as N 6 r P1 , P1 , . . . , P1 m . Definition 4 (Folded codes from the Hermitian tower). Assume j k that m, l, N are positive q−1 e−1 integers satisfying 1 6 m 6 q − 1 and l/m 6 N 6 r m . The folded code from f Fe with parameters N, l, q, e, m, denoted by FH(N, l, q, e, m), encodes a message function f ∈ L(lP∞ ) as       f (PN ) f (P2 ) f (P1 )  f (PNσ )   f (P1σ )   f (P2σ )  N       (4) f 7→  . .. .. ,...,  ∈ Fm .. , q       . . . m−1 m−1 m−1 f (PNσ ) ) f (P2σ ) f (P1σ f Lemma 5.1. The above code FH(N, l, q, e, m) is an Fq -linear code over alphabet size q m , l−ge +1 rate at least N m , and minimum distance at least N − ml . Proof. It is clear that the map (4) is an Fq -linear map. The dimension over Fq of the message space L(lP∞ ) is at least l − ge + 1 by the Riemann-Roch theorem, which gives the claimed lower bound on rate. For the distance property, observe that if the i-th column is zero, then f has m zeros. This implies that the encoding of a nonzero function f can have at most l/m zero columns since f ∈ L(lP∞ ).  AG CODES & NEAR-OPTIMAL LIST DECODING 15 5.2. Redefining the code in terms of local expansion at P0 . For our decoding, we will actually recover the message f ∈ L(lP∞ ) in terms of the coefficients of its power series expansion around P0 f = f 0 + f 1 x + f 2 x2 + · · · where x := x1 is the local parameter at P0 (which means that x1 has exactly one zero at P0 , i.e., νP0 (x1 ) = 1). In fact, realizing that one must work in this power series representation is one of the key insights in this work. Let us first show that one can efficiently move back-and-forth between the representation of f ∈ L(lP∞ ) in terms of a basis for L(lP∞ ) and its power series representation (f0 , f1 , . . . ) around P0 . Since the mapping f 7→ (f0 , f1 , . . . ) is Fq -linear, it suffices to compute the local expansion at P0 of a basis for L(lP∞ ). Lemma 5.2. For any n, one can compute the first n terms of the local expansion of the basis elements (2) at P0 using poly(n) operations over Fq . Proof. By the structure of the basis functions in (2), it is sufficient to find an algorithm of efficiently finding local expansions of xi at P0 for every i = 1, 2, . . . , e. We can inductively find the local expansions of xi at P0 as follows. ci,j For i = 1, x1 is the local parameter x of P0 , so x is the local expansion of x1 at P0 . P j Now assume that we know the local expansion of xi = ∞ j=1 ci,j x at P0 for some ∈ Fq . Then we have    ∞ ∞ ∞ ∞ X X X X ci+1,j xj = xri+1 + xi+1 = xr+1 = cri,j xjr   ci,j xj  . cri+1,j xjr + i j=1 j=1 j=1 j=1 By comparing the coefficients of xj in the above identity, we can easily solve ci+1,j ’s from ci,j ’s. More specifically, the coefficient of xj at the left of the identity is  ci+1,j if r 6 |j ci+1,j + cri+1,j/r if r|j. Thus, all ci+1,j ’s can be easily solved recursively.  To keep the list output by the algorithm at a controllable size, we will combine the code with certain special subspace evasive sets. For this purpose, we will actually need to index the messages of the code by the first k coefficients (f0 , f1 , . . . , fk−1 ) of the local expansion of the function f at P0 . This requires that for every (f0 , f1 , . . . , fk−1 ) there is a f ∈ L(lP∞ ) whose power series expansion has the fi as the first k coefficients. This is easy to ensure by taking l = k + 2ge − 1 as we argue below. Note that to ensure that L(lP∞ ) has dimension k, it suffices to pick l = k + ge − 1 by the Riemann-Roch theorem. We pick l to be ge more than this bound. Since the genus will be much smaller than the code length, we can afford this small loss in parameters. Let us define the local expansion map evP0 : L((k + 2ge − 1)P∞ ) → Fkq that maps f to (f0 , f1 , . . . , fk−1 ) where f = f0 + f1 x + f2 x2 + · · · is the local expansion of f at P0 . Claim 5.3. evP0 is an Fq -linear surjective map. Further, we can compute evP0 using poly(k, ge ) operations over Fq given a representation of the input f ∈ L((k + 2ge − 1)P∞ ) in terms of the basis (2). Proof. The Fq -linearity of evP0 is clear. The kernel of evP0 is L((k+2ge −1)P∞ −kP0 ) which has dimension exactly ge by the Riemann-Roch theorem. By the rank-nullity theorem, 16 V. GURUSWAMI AND C. XING the image must have dimension k, and so the map is surjective. The claimed complexity of computation follows immediately from Lemma 5.2.  For each (f0 , f1 , . . . , fk−1 ) ∈ Fkq , we can therefore pick a pre-image in L((k + 2ge − 1)P∞ ). For convenience, we will denote an injective map making such a unique choice by κP0 : Fkq → L((k + 2ge − 1)P∞ ). By picking the pre-images of a basis of Fkq and extending it by linearity, we can assume κP0 to be Fq -linear, and thus specify it by a (k + ge ) × k matrix. We record this fact for easy reference below. Claim 5.4. The map κP0 : Fkq → L((k + 2ge − 1)P∞ ) is Fq -linear and injective. We can compute a representation of this linear transformation using poly(k, ge ) operations over Fq , and the map itself can be evaluated using poly(k, ge ) operations over Fq . N by We will now redefine a version of the folded Hermitian code that maps Fkq to (Fm q ) composing the folded encoding (4) from the original Definition 4 with κP0 . Definition 5 (Folded Hermitian code using local expansion). The folded Hermitian code f k + 2ge − 1, q, e, m)(κP0 (f )) FH(N, k, q, e, m) maps f = (f0 , f1 , . . . , fk−1 ) ∈ Fkq to FH(N, N m ∈ (Fq ) . The rate of the above code equals k/(N m) and its distance is at least N − (k + 2ge − 1)/m. 5.3. List decoding folded codes from the Hermitian tower. We now present a list decoding algorithm for the above codes. The algorithm follows the linear-algebraic list decoding algorithm for folded Reed-Solomon codes. Suppose a codeword (4) encoding f ∈ Im(κP0 ) ⊆ L((k + 2ge − 1)P∞ ) is transmitted and received as   y1,1 y2,1 yN,1 ..   y2,2 .   y (5) y =  1,2  ..   . y1,m · · · yN,m where some columns are erroneous. Let s > 1 be an integer parameter associated with the decoder. Lemma 5.5. Given a received word as in (5), using poly(N ) operations over Fq , we can find a nonzero linear polynomial in Fe [Y1 , Y2 , . . . , Ys ] of the form (6) satisfying (7) Q(Y1 , Y2 , . . . , Ys ) = A0 + A1 Y1 + A2 Y2 + · · · + As Ys j j j Q(yi,j , yi,j+1 , · · · , yi,j+s−1 ) = A0 (Piσ ) + As (Piσ )yi,j+1 + · · · + As (Piσ )yi,j+s = 0 for i = 1, 2, . . . , N and j = 0, 1, . . . , m−s. The coefficients Ai of Q satisfy Ai ∈ L(DP∞ ) for i = 1, 2, . . . , s and A0 ∈ L((D + k + 2ge − 1)P∞ ) for a “degree” parameter D chosen as   N (m − s + 1) − k + (s − 1)ge + 1 (8) D= . s+1 Proof. If we fix a basis of L(DP∞ ) (of the form (2)) and extend it to a basis of L((D + k + 2ge − 1)P∞ ), then the number of freedoms of A0 is at least D + k + ge and the number of freedoms of Ai is at least D − ge + 1 for i > 1. Thus, the total number of freedoms in the polynomial Q equals (9) s(D − ge + 1) + D + k + ge = (s + 1)(D + 1) − (s − 1)ge − 1 + k > N (m − s + 1) AG CODES & NEAR-OPTIMAL LIST DECODING 17 for the above choice (8) of D. The interpolation requirements on Q ∈ Fe [Y1 , . . . , Ys ] are the following: (10) j j j Q(yi,j , yi,j+1 , · · · , yi,j+s−1 ) = A0 (Piσ ) + As (Piσ )yi,j+1 + · · · + As (Piσ )yi,j+s = 0 for i = 1, 2, . . . , N and j = 0, 1, . . . , m − s. The interpolation requirements on Q give a total of N (m − s + 1) homogeneous linear equations that the coefficients of the Ai ’s w.r.t the chosen basis of L((D + k + 2ge − 1)P∞ ) must satisfy. Since the number of such coefficients (degrees of freedom in Q) exceeds N (m − s + 1), we can conclude that such a linear polynomial Q as required by the lemma must exist, and can be found by solving a homogeneous linear system over Fq with about N (m − s + 1) variables and constraints.  Similar to earlier interpolation based list decoding algorithms, the following lemma gives an algebraic condition that the message functions f ∈ L((k +2ge −1)P∞ ) we are interested in list decoding must satisfy. The proof is a standard argument comparing the pole order to the number of zeroes. Lemma 5.6. If f is a function in L((k + 2ge − 1)P∞ ) whose encoding (4) agrees with the e −1 received word y in at least t columns with t > D+k+2g m−s+1 , then −1 Q(f, f σ , . . . , f σ (11) −(s−1) ) = A0 + A1 f + A2 f σ −1 + · · · + As f σ −(s−1) = 0. −1 Proof. The proof proceeds by comparing the number of zeros of the function Q(f, f σ , −(s−1) −1 −(s−1) with D + k + 2ge − 1. Note that ) = A0 + A1 f + A2 f σ + · · · + As f σ . . . , fσ −(s−1) −1 σ σ ) is a function in L((D+k+2ge −1)P∞ ). If column i of the encoding ,...,f Q(f, f (4) of f agrees with y, then for all j = 0, 1, . . . , m − s, we have j j j j j j 0 = A0 (Piσ ) + A1 (Piσ )yi,j+1 + A2 (Piσ )yi,j+2 + · · · + As (Piσ )yi,j+s j j = A0 (Piσ ) + A1 (Piσ )f (Piσ ) + A2 (Piσ )f (Piσ = j ) + · · · + As (Piσ )f (Piσ j+s−1 ) j j j −(s−1) j j j −1 (Piσ ) + A1 (Piσ )f (Piσ ) + A2 (Piσ )f σ (Piσ ) + · · · + As (Piσ )f σ j −(s−1) −1 )(Piσ ) . A1 f + A2 f σ + · · · + As f σ we use the fact that f σ (P σ ) = f (P )σ = f (P ), or equivalently f (P σ ) j A0 (Piσ ) = (A0 + j+1 Note that here = −(s−1) −1 −1 ) has (m − s + 1) distinct zeros from this f σ (P ). In other words, Q(f, f σ , . . . , f σ agreeing column. Thus, there are a total of at least t(m − s + 1) zeros for all the agreeing −(s−1) −1 ) must be the zero function when t(m − s − 1) > columns. Hence, Q(f, f σ , . . . , f σ D + k + 2ge − 1.  Solving the functional equation for f . Our goal next is to recover the list of solutions f to the functional equation (11). Recall that our message functions lie in Im(κP0 ), so we can recover f by recovering the top k coefficients (f0 , f1 , . . . , fk−1 ) of its local expansion P j f= ∞ f j=0 j x at P0 . We now prove that (f0 , f1 , . . . , fk−1 ) for f satisfying Equation (11) belong to a “periodic” subspace (in the sense of Definition 1) of not too large dimension. Lemma 5.7. The set of solutions (f0 , f1 , . . . , fk−1 ) ∈ Fkq such that f = f0 + f1 x + f2 x2 + · · · ∈ L((k + 2ge − 1)P∞ ) obeys equation (12) A0 + A1 f + A2 f σ −1 + · · · + As f σ −(s−1) =0, when the Ai ’s obey the pole order restrictions of Lemma 5.5 and at least one Ai is nonzero, k ⌉)-periodic subspace (note that we do not require (q − 1)|k here and is an (s − 1, q − 1, ⌈ q−1 k ⌉ by padding with 0’s). Further, there one could extend the subspace to length (q − 1)⌈ q−1 are at most q N m+s+1 possible choices of this subspace over varying choices of the Ai ’s. 18 V. GURUSWAMI AND C. XING Proof. Let u = min{νP0 (Ai ) : i = 1, 2, . . . , s}. Then it is clear that u > 0 and νP0 (A0 ) > u. Each Ai has a local expansion at P0 : Ai = xu ∞ X ai,j xj j=0 for i = 0, 1, . . . , s − 1, which can be efficiently computed from the basis representation of the Ai ’s. From the definition of u, one knows that the polynomial B0 (X) := a1,0 + a2,0 X + · · · + as,0 X s−1 is nonzero. Assume that at P0 , the function f has a local expansion f σ−i has a local expansion at P0 as follows f σ−i = ∞ X P∞ j=0 fj x j. Then ξ ij fj xj , j=0 −1 where ξ = 1/γ. The coefficient of xd+u in the local expansion of Q(f, f σ , . . . , f σ is (13) 0 = B0 (ξ d )fd + d−1 X −(s−1) ) bi fi + a0,d , i=0 where bi ∈ Fq is a linear combination of ai,j which does not involve fj . Hence, fd is uniquely determined by f0 , . . . , fd−1 as long as B0 (ξ d ) 6= 0. Let S := {0 6 d 6 q − 2 : B0 (ξ d ) = 0}. Then it is clear that |S| 6 s − 1 since the order of ξ is q − 1 and B0 (X) has degree at most s − 1. Thus, B0 (ξ j ) 6= 0 if and only if j mod (q − 1) ∈ / S; and in this case fj is a fixed affine linear combination of fi for 0 6 i < j. k )Let W be the set of solutions (f0 , f1 , . . . , fk−1 ). The fact that W is (s, q − 1, q−1 periodic follows from (13). Note that the coefficients bd−j for j > 1 in that equation are given by Bj (ξ d−j ) where Bj (X) := a1,j + a2,j X + · · · + as,j X s−1 . Therefore, once the values of fi , 0 6 i < (j − 1)(q − 1) are fixed, the possible choices for the next block of (q − 1) coordinates, f(j−1)(q−1) , · · · , fj(q−1)−1 , lie in an affine shift of a fixed subspace of dimension at most (s − 1). Further, this shift is an easily computed affine linear combination of the fi ’s in the previous blocks. This implies the efficient computability of the claimed representation of W . Finally, by the choice of D in (8), the total number of possible (A0 , A1 , . . . , As ) and hence the number of possible functional equations (12), is at most q N (m−s+1)+s+1 6 q N m+s+1 . Therefore, the number of possible candidate subspaces W is also at most q N m+s+1 .  Combining Lemmas 5.6 and 5.7, we conclude, after some simple calculations, that one can find a representation of the (s, q − 1)-periodic subspace containing all candidate messages (f0 , f1 , . . . , fk−1 ) in polynomial time, when the fraction of errors τ = 1 − t/N satisfies k ge s 3m s − − . (14) τ6 s + 1 s + 1 N (m − s + 1) m − s + 1 mN Pruning the subspace. Applying Lemma 9.8 directly we would get a list size bound of ≈ q sk/q which would be super-polynomial in the code length unless k = O(q). Thus this idea does not directly allow us to get good list decodable codes while keeping the base field size small or achieve a list size that grows polynomially in s. Instead what we show AG CODES & NEAR-OPTIMAL LIST DECODING 19 is that by only encoding (f0 , f1 , . . . , fk−1 ) ∈ Fkq that are restricted to belong to a special subspace-evasive set, we can (i) bring down the list size, and (ii) find this list efficiently in polynomial time (and further the exponent of the polynomial is independent of ε, the gap to capacity). To this end, we develop the necessary machinery concerning subspace evasive sets next. Later, in Section 8.1, we combine these subspace evasive sets with our folded Hermitian codes to get good list-decodable codes. 6. Subspace evasive sets with additional structure Let us first recall the notion of “ordinary” subspace-evasive sets from [7]. Definition 6. A subset S ⊂ Fkq is said to be (d, ℓ)-subspace-evasive if for all d-dimensional affine subspaces W of Fkq , we have |S ∩ W | 6 ℓ. We next define the notion of evasiveness w.r.t a collection of subspaces instead of all subspaces of a particular dimension. Definition 7. Let F be a family of (affine) subspaces of Fkq , each of dimension at most d. A subset S ⊂ Fkq is said to be (F, d, ℓ)-evasive if for all W ∈ F, we have |S ∩ W | 6 ℓ. 6.1. Hierarchical subspace-evasive sets. The key to pruning the list to a small size is the notion of a hierarchical subspace-evasive set, which is defined as a subset of Fkq with the property that some of its prefixes are subspace-evasive with respect to (s, ∆, b)-periodic subspaces. We will show how the special subspace-evasive sets help towards pruning the list in our list decoding context in Section 6.4. Definition 8. Let F be a family of (s, ∆, b)-periodic subspaces of Fkq with k = b∆. A subset S ⊂ Fkq is said to be (F, s, ∆, b, L)-h.s.e (for hierarchically subspace evasive for block size ∆) if for every affine subspace W ∈ F, the following bound holds for j = 1, 2, . . . , b: |projj∆ (S) ∩ projj∆ (W )| 6 L . 6.2. Random sets are hierarchically subspace evasive. Our goal is to give a randomized construction of large h.s.e sets that works with high probability, with the further properties that one can index into elements of this set efficiently (necessary for efficient encoding), and one can check membership in the set efficiently (which is important for efficient decoding). An easy probabilistic argument, see [7], shows that a random subset of Fkq of size about q (1−ζ)k is (d, O(d/ζ))-subspace evasive with high probability. As a warmup, let us work out the similar proof for the case when we have only to avoid a not too large family F of all possible d-dimensional affine subspaces. The advantage is that the guarantee on the intersection size is now O(1/ζ) and independent of the dimension d of the subspaces one is trying to evade. Lemma 6.1. Let ζ ∈ (0, 1) and k be a large enough positive integer. Let F be a family of affine subspaces of Fkq , each of dimension at most d 6 ζk/2, with |F| 6 q ck for some positive constant c. Let W be a random subset of Fkq chosen by including each x ∈ Fkq in W with probability q −ζk . Then with probability at least 1 − q −ck , W satisfies both the following conditions: (i) |W| > q (1−2ζ)k , and (ii) W is (F, d, 4c/ζ)-evasive. 20 V. GURUSWAMI AND C. XING Proof. The first part follows by noting that the expected size of W equals q (1−ζ)k and a standard Chernoff bound calculation. For the second part, fix an affine subspace S ⊆ F of dimension at most d, and a subset T ⊆ S of size t, for some parameter t to be specified shortly. The probability that W ⊇ T equals q −ζkt. By a union bound over the at most q ck choices for the affine subspace S ∈ F, and the at most q dt choices of t-element subsets T of S, we get that the probability that W is not (F, d, t)-evasive is at most q ck+dt · q −ζkt 6 q ck q −ζkt/2 since d 6 ζk/2. Choosing t = ⌈4c/ζ⌉, this quantity is bounded from above by q −ck .  6.3. Pseudorandom construction of large h.s.e subsets. We next turn to the pseudorandom construction of large h.s.e subsets. Suppose, for some fixed subset F of (s, ∆, b)periodic subspaces of Fkq with k = b∆, we are interested in an (F, s, ∆, b, L)-h.s.e subset of Fkq of size ≈ q (1−ζ)k for a constant ζ, 1/∆ < ζ < 1/3. For simplicity, let us assume that the block size ∆ divides k, though arbitrary k can be easily handled. (We will also ignore floors and ceilings in the description to avoid notational clutter; those are easy to accommodate and do not affect any of the claims.) The parameters b, ∆, k and field size q will be considered fixed for the rest of the discussion in this section. Denote ∆′ = (1 − ζ)∆, b′ = (1 − ζ)b, and k′ = b′ ∆ = (1 − ζ)k. The random part of the construction will consist of mutually independent, random univariate polynomials P1 , P2 , . . . , Pb′ and Q, where Pj ∈ Fqj∆′ [T ] for 1 6 j 6 b′ and Q ∈ Fqk′ [T ] are random polynomials of degree λ.4 The degree parameter will be chosen to be λ = Θ(k).5 The key fact we will use about random polynomials is the following, which follows by virtue of the λ-wise independence of the values of a random degree λ polynomial. Fact 6.2. Let P ∈ K[T ] be a polynomial of degree λ whose coefficients are picked uniformly and independently at random from the field K. For a fixed subset T ⊆ K with |T | 6 λ, the values {P (α)}α∈T are independent random values in K. We remark that this property of low-degree polynomials was also the basis of the pseudorandom construction of subspace evasive sets in [14]. However, since we require the h.s.e property, and need to exploit the periodicity of the subspaces we are trying to evade (which can have large dimension), the construction here is more complicated, and needs to use several polynomials Pj ’s evaluated in a nested fashion, and one further polynomial Q to further bring down the list size to a constant (this final use of Q is similar in spirit to the construction in [14]). We remark that the construction presented here is a bit simpler and cleaner than the one in the conference version [16], and comes with efficient encoding automatically by construction. In contrast, the construction in [16] required some additional work in order to allow for efficient encoding. In what follows we assume that, for j = 1, 2, . . . , b′ , some fixed bases of the fields Fqj∆′ have been chosen, giving us some canonical Fq -linear injective maps ′ ρj : Fj∆ → Fqj∆′ . q 4We will assume that representations of the necessary extension fields Fi∆′ are all available. For this q purpose, we only need irreducible polynomials over Fq of appropriate degrees, which can be constructed by picking random polynomials and checking them for irreducibility. Our final construction is anyway randomized, so the randomized nature of this step does not affect the results. 5The degree of Q can in fact be just O(1/ζ), but for uniformity we fix the degree of all polynomials to be the same. AG CODES & NEAR-OPTIMAL LIST DECODING Also, for j = 1, 2, . . . , b′ , let 21 ξj : Fqj∆′ → Fζ∆ q be some arbitrary Fq -linear surjective map (thus ξj just outputs the first ζ∆ coordinates of ′ w.r.t some fixed basis). Finally, the representation of elements of Fqj∆′ as vectors in Fj∆ q let ρ : Fkq → Fqk′ be some fixed Fq -linear injective map, and ξ : Fqk′ → Fζk q be an arbitrary Fq -linear surjective map. ′ We are now ready to describe our construction of h.s.e set based on the random polynomials P1 , P2 , . . . , Pb′ , Q. Definition 9 (h.s.e set construction). Given the polynomials Pj ∈ Fqj∆′ [T ] for i = 1, 2, . . . , b′ and Q ∈ Fqk′ [T ], define the subset Γ(P1 , P2 , . . . , Pb ; Q) by n ′ (y1 , z1 , y2 , z2 , . . . , yb′ , zb′ ; w) ∈ Fkq for j = 1, 2, . . . , b′ : yj ∈ F∆ q , zj = ξj (Pj (ρj (y1 ◦ y2 ◦ · · · ◦ yj ))) ∈ Fζ∆ q ; and o . w = ξ(Q(ρ(y1 , z1 , . . . , yb′ , zb′ ))) ∈ Fζk q By construction, once suitable representations of the extension fields are available by pre-processing and the choice of P1 , . . . , Pb′ , Q is made, we can efficiently compute (1−ζ)2 k a bijective encoding map HSE : Fq → Γ(P1 , P2 , . . . , Pb ; Q). Indeed, we can view ′ ′ ∆′ b as (y1 , y2 , . . . , yb′ ) with yj ∈ F∆ the input y ∈ Fq q and then compute the zj ’s and w efficiently using poly(k) operations over Fq (recall that the degree of the polynomials is λ = Θ(k)). We now move on to the main claim about the h.s.e property of our construction. Theorem 6.3. Let ζ ∈ (0, 1/3) and s be a positive integer satisfying s < ζ∆/10. Let F be a subset of at most q ck (s, ∆, b)-periodic subspaces of Fkq for k = b∆ and some positive constant c. Suppose that the parameters satisfy the condition q ζ∆ > (2q 2 ck)10/9 . Then with probability 1 − q(−Ω(k)) over the choice of random polynomials {Pi }16i6b and Q each of degree λ = ⌈ck⌉, the set Γ(P1 , P2 , . . . , Pb ; Q) from Definition 9 is (F, s, ∆, b, L)-h.s.e and (F, sb, ℓ)-evasive for L = ⌈ck⌉ and ℓ = ⌈4c/ζ⌉. Proof. Note that the first k′ = (1− ζ)k symbols of vectors in Γ(P1 , . . . , Pb′ ; Q) only depend on the Pj ’s. We will first prove that with high probability over the choice of the Pj ’s the following holds (call such a choice of Pj ’s as good): For every W ∈ F, |projk′ (W ) ∩ projk′ (Γ)| < L, where we denote Γ as shorthand for Γ(P1 , . . . , Pb′ ; Q). Then, conditioned on a good choice of Pj ’s, we will prove that with high probability over the choice of the random polynomial Q, |W ∩ Γ| < ℓ. Together, these steps will imply that the set Γ(P1 , P2 , . . . , Pb′ ; Q) is (F, sb, ℓ)-evasive. (Note that every subspace in F has dimension at most sb by Claim 3.1.) We will return to the (F, s, ∆, b, L)-h.s.e property at the end of the proof. Let us first establish the second step. Fix a good choice of P1 , . . . , Pb′ , and suppose we pick Q randomly. Fix a subspace W ∈ F. Since |projk′ (W )∩projk′ (Γ)| < L (recall that projk′ (Γ) only depends on the Pj ’s and thus is already determined), the number of elements ′ of W that could possibly belong to Γ (after the choice of Q) is at most L · q s(b−b ) = Lq ζsb ; 22 V. GURUSWAMI AND C. XING ′ indeed for each prefix belonging to projk′ (Γ)∩projk′ (W ), there are most q s(b−b ) extensions that can fall in W since W is (s, ∆, b)-periodic. Further, the probability over the choice of Q that any such fixed extension belongs to Γ is at most q −ζk , and any ℓ of these events are independent. (Note that for a fixed prefix, there can be at most extension that falls in Γ, so for ℓ different strings to fall in Γ, their prefixes must be distinct and are mapped to independent locations by the random polynomial Γ.) Therefore, the probability over the choice of Q that |W ∩ Γ| > ℓ is at most (Lq ζsb )ℓ q −ζkℓ . By a union bound over all W ∈ F, we conclude that |W ∩ Γ| < ℓ for every W ∈ F simultaneously, except with probability at most q ck Lℓ q ζ(s−∆)bℓ 6 q ck (ck)ℓ q −ζ∆bℓ/2 = q ck q −ζkℓ/2 where in the first inequality we used s 6 ∆/2 and in the next one ck 6 q ζk both of which hold comfortably. For ℓ > 4c/ζ, the above probability upper bound is at most q −ck . We now turn to the first step, on the Pj ’s being good with high probability. Fix some W ∈ F; we will prove by induction on j that (15) |projj∆ (W ) ∩ projj∆ (Γ)| < L w.h.p over the choice of P1 , P2 , . . . , Pj , for 1 6 j 6 b′ (note that projj∆ (Γ) only depends on P1 , . . . , Pj , so this event is well defined). For the base case j = 1, |proj∆ (W )| 6 q s as W is (s, ∆, b)-periodic, and the probability that some L of these q s elements belong to proj∆ (Γ) is at most q sL times the probability that L distinct elements in Fq∆′ are mapped  −ζ∆ L . So the overall probability to specific values in Fζ∆ q by ξ1 ◦ P1 , which is at most q that |proj∆ (W ) ∩ proj∆ (Γ)| > L is at most q (s−ζ∆)L . Now let j > 2 and assume |proj(j−1)∆ (W ) ∩ proj(j−1)∆ (Γ)| < L. By the (s, ∆, b)periodicity of W , for each of the (less than L) prefixes in proj(j−1)∆ (W ) ∩ proj(j−1)∆ (Γ), there are at most q s extensions that fall in projj∆ (W ). Similarly to the argument used for second step above, the probability that some L of these belong to projj∆ (Γ) is at most (Lq s )L · q −ζ∆L . Thus, the probability that |projj∆ (W ) ∩ projj∆ (Γ)| > L is at most L L · q (s−ζ∆) . Combining these arguments, we conclude that the probability over the choice of the Pj ’s that |projb′ ∆ (W ) ∩ projb′ ∆ (Γ)| > L is at most b′ (L · q (s−ζ∆))L 6 (2ckq −0.9ζ∆ )L 6 q −2L where the last step used the assumption that q ζ∆ > (2q 2 ck)10/9 . Finally, since there are at most q ck subspaces W ∈ F, by a union bound we have that for all W ∈ F simultaneously, |projk′ (W ) ∩ projk′ (Γ)| < L with probability at least 1 − q ck q −L = 1 − q −ck over the choice of P1 , . . . , Pb′ . To finish the proof, we need to verify the (F, s, ∆, b, L)-h.s.e property. That is, we need to prove that w.h.p, |projj∆ (W )∩projj∆ (Γ)| 6 L for every W ∈ F and j = 1, 2, . . . , b. By (15), this holds for j = 1, 2, . . . , b′ . By construction, the last ζk symbols of any vector in Γ is a function of the first (1 − ζ)k = b′ ∆ symbols, so |projj∆ (W ) ∩ projj∆ (Γ)| 6 L also holds for b′ < j 6 b.  6.4. Efficient computation of intersection with h.s.e. subsets. The key aspect which makes h.s.e subsets useful in our context to prune the affine space of candidate messages, and indeed motivated the exact specifics of the definition and aspects of its construction, is the following claim which shows that intersection of a (s, ∆, b)-periodic subspace with our h.s.e set can found efficiently. AG CODES & NEAR-OPTIMAL LIST DECODING 23 Lemma 6.4. There is an algorithm running in time poly(k, q ζ∆ ) that provides the following guarantee. Given as input the polynomials P1 , . . . , Pb′ and Q underlying the construction of an (F, s, ∆, b, L)-h.s.e and (F, sb, ℓ)-evasive set Γ = Γ(P1 , . . . , Pb′ ; Q) and an (s, ∆, b)-periodic subspace W ⊆ Fkq belonging to F, the algorithm computes the at most ℓ elements of W ∩ Γ. Proof. The proof essentially follows from the observations made in the proof of Theorem 6.3. First note that claim that |W ∩ Γ(P1 , . . . , Pb′ ; Q) 6 ℓ just follows from the (F, sb, ℓ)-evasiveness of Γ. To compute W ∩ Γ, the algorithm iteratively computes the intersections projj∆ (W ) ∩ projj∆ (Γ) for 1 6 j 6 b′ . As Γ is (F, s, ∆, b, L)-h.s.e, this intersection has size at most L. To compute projj∆ (W )∩projj∆ (Γ), the algorithm runs over the at most q s possible extensions of each element of proj(j−1)∆ (W ) ∩ proj(j−1)∆ (Γ) that can belong to projj∆ (W ) (due to the (s, ∆, b)-periodicity of W ), and checks which ones also belong to projj∆ (Γ). The complexity amounts to q O(s) evaluations of degree O(k) polynomials, and thus takes q O(ζ∆) poly(k) time. To compute W ∩Γ from projb′ ∆ (W )∩projb′ ∆ (Γ), we recall the earlier observation that the construction of Γ implies that there is a unique extension of an element in projb′ ∆ (Γ) that belongs to Γ.  We conclude this section by recording in convenient form all necessary properties of our h.s.e set construction, which follow from Theorem 6.3 and Lemma 6.4. Theorem 6.5. Let ζ ∈ (0, 1), and b, ∆, s, and k = b∆ be positive integers satisfying s < ζ∆/10. Let F be a family of at most q ck (s, ∆, b)-periodic subspaces of Fkq . Then the poly(k, log q) time randomized construction from Definition 9 of the injective map (1−ζ)2 k HSE : Fq → Fkq satisfies the following properties: (1−ζ)2 k (1) Given x ∈ Fq , HSE(x) can be computed using poly(k) operations over Fq . (1−ζ)2 k (2) For every W ∈ F, the set {x ∈ Fq | HSE(x) ∈ W } has size at most O(c/ζ), and can be computed in poly(k, q ζ∆ ) time. 7. Folded codes from the Garcia-Stichtenoth tower Compared with the Hermitian tower of function fields, the Garcia-Stichtenoth tower of function fields yields folded codes with better parameters due to the fact that the GarciaStichtenoth tower is an optimal one in the sense that the ratio of number of rational places against genus achieves the maximal possible value. The construction of folded codes from the Garcia-Stichtenoth tower is almost identical to the one from the Hermitian tower except for one major difference: the redefined code from the Garcia-Stichtenoth tower is constructed in terms of the local expansion at point P∞ , while in the Hermitian case local expansion at P0 is considered. For convenience of the reader, we give a parallel description of folded codes from the Garcia-Stichtenoth tower, while only sketching the identical parts. 7.1. Background on Garcia-Stichtenoth tower. Again let r be a prime power and let q = r 2 . We denote by Fq the finite field with q elements. The Garcia-Stichtenoth towers that we are going to use for our code construction were discussed in [4, 5]. The reader may refer to [4, 5] for the detailed background on the Garcia-Stichtenoth function tower. There are two optimal Garcia-Stichtenoth towers that are equivalent. For simplicity, we introduce the tower defined by the following recursive equations [5] xr , i = 1, 2, . . . , e − 1. (16) xri+1 + xi+1 = r−1i xi + 1 24 V. GURUSWAMI AND C. XING Put Ke = Fq (x1 , x2 , . . . , xe ) for e > 2. Rational places. The function field Ke has at least r e−1 (r 2 − r) + 1 rational places. One of these is the “point at infinity” which is the unique pole P∞ of x1 (and is fully ramified). The other r e−1 (r 2 − r) come from the rational places lying over the unique zero of x1 − α for each α ∈ Fq with αr + α 6= 0. Note that for every α ∈ Fq with αr + α 6= 0, the unique zero of x1 − α splits completely in Ke , i.e., there are r e−1 rational places lying over the zero of x1 − α. Let P be the set of all the rational places lying over the zero of x1 − α for all α ∈ Fq with αr + α 6= 0. Then, intuitively, one can think of the r e−1 (r 2 − r) rational places αr in P as being given by e-tuples (α1 , α2 , . . . , αe ) ∈ Feq that satisfy αri+1 + αi+1 = αr−1i +1 for i i = 1, 2, . . . , e − 1 and αr1 + α1 6= 0. For each value of α ∈ Fq , there are precisely r solutions αr to β ∈ Fq satisfying β r + β = αr−1 , so the number of such e-tuples is r e−1 (r 2 − r) (r 2 − r +1 choices for α1 , and then r choices for each successive αi , 2 6 i 6 e). Riemann-Roch spaces. As shown in [23], every function of Ke with a pole only at P∞ has an expression of the form   (e−2)r+1 r−1 r−1 i1 i2 i e X X X x x · · · xe  , ci h1 1 2 (17) xa1  ··· π2 . . . πe−1 i1 =0 ie =0 i2 =0 where a > 0, ci ∈ Fq , and for 1 6 j < e, hj = xjr−1 + 1 and πj = h1 h2 . . . hj . Moreover, Shum et al. [23] present an algorithm running in time polynomial in l that outputs a basis of over Fq of L(lP∞ ) explicitly in the above form. We stress that evaluating elements of L(lP∞ ) at the rational places of P is easy: we simply have to evaluate a linear combination of the monomials allowed in (17) at the tuples (α1 , α2 , . . . , αe ) ∈ Feq mentioned above. In other words, it is just evaluating an e-variate polynomial at a specific subset of r e−1 (r 2 − r) points of Feq , and can be accomplished in polynomial time. Genus. The genus ge of the function field Ke is given by  e/2 (r − 1)2 if e is even ge = (e−1)/2 (e+1)/2 (r − 1)(r − 1) if e is odd. Thus the genus ge is at most r e . (Compare this with the er e bound for the Hermitian tower; this smaller genus is what allows to pick e as large as we want in the Garcia-Stichtenoth tower, while keeping the field size q fixed.) A useful automorphism. Let γ be a primitive element of Fr and consider the automorphism σ ∈ Aut(Ke /Fq ) defined by σ : xi 7→ γ (r+1)r i−1 xi for i = 1, 2, . . . , e. Then the order of σ is r − 1 and furthermore, we have the following facts: (i) σ keeps P∞ unchanged, i.e., P∞ σ = P∞ ; (ii) Let P be the set of all the rational places lying over x1 − α for all α ∈ Fq with αr + α 6= 0. Then |P| = (r − 1)r e . Moreover, σ divides P into r e orbits and each orbit has r − 1 places. For an integer m with 1 6 m 6 r − 1, we can label N m distinct elements P1 , P1σ , . . . , P1σ   in P, as long as N 6 r e r−1 m . m−1 m−1 , . . . , PN , PNσ , . . . , PNσ AG CODES & NEAR-OPTIMAL LIST DECODING 25 The folded codes from the Garcia-Stichtenoth tower are defined similarly to the Hermitian case. Definition 10 (Folded codes from the Garcia-Stichtenoth tower). that m, k, N  Assume  are positive integers satisfying 1 6 m 6 r − 1 and l/m < N 6 r e r−1 . The folded code m g from Ke with parameters N, l, q, e, m, denoted by FGS(N, l, q, e, m), encodes a message function f ∈ L(lP∞ ) as       f (PN ) f (P2 ) f (P1 )  f (PNσ )   f (P1σ )   f (P2σ )  N       . (18) f 7→  ..  ∈ Fm .. ,..., .. , q       . . . m−1 m−1 m−1 f (PNσ ) ) f (P2σ ) f (P1σ g Then we have a similar result on parameters of FGS(N, l, q, e, m). g Lemma 7.1. The above code FGS(N, l, q, e, m) is an Fq -linear code over alphabet size q m , l−ge +1 rate at least N m , and minimum distance at least N − ml . 7.2. Redefining the code in terms of local expansion at P∞ . In the Hermitian case, we use coefficients of its power series expansion around P0 . However, for the GarciaStichtenoth tower we do not have such a nice point P0 . Fortunately, we can use point P∞ to achieve our mission. Again for our decoding, we will actually recover the message f ∈ L(lP∞ ) in terms of the coefficients of its power series expansion around P∞ f = T −l (f0 + f1 T + f2 T 2 + · · · ) where T := x1e is the local parameter at P∞ (which means that xe has exactly one pole at P∞ , i.e., νP∞ (xe ) = −1). In this case we can also show that one can efficiently move back-and-forth between the representation of f ∈ L(lP∞ ) in terms of a basis for L(lP∞ ) and its power series representation (f0 , f1 , . . . ) around P∞ . Since the mapping f 7→ (f0 , f1 , . . . ) is Fq -linear, it suffices to compute the local expansion at P∞ of a basis for L(lP∞ ). Lemma 7.2. For any n, one can compute the first n terms of the local expansion of the basis elements (17) at P∞ using poly(n) operations over Fq . Proof. First let h be a nonzero function P∞ in Fqj(x1 , x2 , . . . , xe ) with νP∞ (h) = v ∈ Z. Assume 1 v that the local expansion h = T j=0 aj T is known. To find the local expansion h = P∞ −v j T j=0 cj T . Consider the identity    ∞ ∞ X X 1= cj T j   aj T j  . j=0 j=0 Then by comparing the coefficients of T i in the above identity, one has c0 = a−1 and 0 ci = −a−1 (c a + · · · + c a ) can be easily computed recursively for all i > 1. i−1 1 0 i 0 Thus, by the structure of the basis functions in (17), it is sufficient to find an algorithm of efficiently finding local expansions of xi at P∞ for every i = 1, 2, . . . , e. We can inductively find the local expansions of xi at P∞ as follows. We note that νP∞ (xi ) = −r e−i for i = 1, 2, . . . , e. For i = e, xe has the local expansion 1 T at P∞ . 26 V. GURUSWAMI AND C. XING Now assume that we know the local expansion of xi . Then we can easily compute the local expansion of xri + xi and hence the local expansion of 1/(xri + xi ). Let us assume that e−i+1 P∞ j 1/(xri + xi ) has local expansion 1/(xri + xi ) = T r j=0 αj T at P∞ for some αi ∈ Fq . P e−i+1 ∞ j Assume that 1/xi−1 has the local expansion 1/xi−1 = T r j=0 βj T . To find βj , we consider the identity  r ∞ ∞ ∞ X X X 1 1 1 e−i+1 r rj j r e−i+2 r e−i+1 αj T j . = r + = Tr βj T = βj T + T T xi−1 xi−1 xi + xi j=0 j=0 j=0 e−i+1 in the above identity, we have that β0 = α0 By comparing the coefficients of T j+r and βj can be easily computed recursively by the following formula for all i > 1.  αj if r 6 |j βj = α − β r if r|j. j j/r−1 Therefore, the local expansion of xi−1 at P∞ can be easily computed.  As in the Hermitian case, we will actually need to index the messages of the code by the first k coefficients (f0 , f1 , . . . , fk−1 ) of the local expansion of the function f at P∞ . Let us define the local expansion map evP∞ : L((k + 2ge − 1)P∞ ) → Fkq that maps f to (f0 , f1 , . . . , fk−1 ) where f = T −(k+2ge−1) (f0 + f1 T + f2 T 2 + · · · ) is the local expansion of f at P∞ . Claim 7.3. evP∞ is an Fq -linear surjective map. Further, we can compute evP∞ using poly(k, ge ) operations over Fq given a representation of the input f ∈ L((k + 2ge − 1)P∞ ) in terms of the basis (17). The proof of this claim is similar to Claim 5.3. Note that the kernel of evP∞ is L((2ge − 1)P∞ ) which has dimension exactly ge by the Riemann-Roch theorem. For each (f0 , f1 , . . . , fk−1 ) ∈ Fkq , we can therefore pick a pre-image in L((k + 2ge − 1)P∞ ). For convenience, we will denote an injective map making such a unique choice by κP∞ : Fkq → L((k + 2ge − 1)P∞ ). By picking the pre-images of a basis of Fkq and extending it by linearity, we can assume κP∞ to be Fq -linear, and thus specify it by a (k + ge ) × k matrix. We record this fact for easy reference below. Claim 7.4. The map κP∞ : Fkq → L((k + 2ge − 1)P∞ ) is Fq -linear and injective. We can compute a representation of this linear transformation using poly(k, ge ) operations over Fq , and the map itself can be evaluated using poly(k, ge ) operations over Fq . N Now we redefine a version of the folded Garcia-Stichtenoth code that maps Fkq to (Fm q ) by composing the folded encoding (18) from the original Definition 10 with κP∞ . Definition 11 (Folded Garcia-Stichtenoth code using local expansion). The folded GarciaStichtenoth code (FGS code for short) FGS(N, k, q, e, m) maps f = (f0 , f1 , . . . , fk−1 ) ∈ Fkq N g to FGS(N, k + 2ge − 1, q, e, m)(κP∞ (f )) ∈ (Fm q ) . The rate of the above code equals k/(N m) and its distance is at least N − (k + 2ge − 1)/m. 7.3. List decoding FGS codes. The list decoding part for the codes from the GarciaStichtenoth tower is almost identical to the Hermitian tower. We only sketch this part briefly. AG CODES & NEAR-OPTIMAL LIST DECODING 27 If f is a function in L((k + 2ge − 1)P∞ ) whose encoding (18) agrees with the received e −1 and word y in at least t columns with t > D+k+2g m−s+1   N (m − s + 1) − k + (s − 1)ge + 1 D= , s+1 then there exist Ai ∈ L(DP∞ ) for i = 1, 2, . . . , s and A0 ∈ L((D + k + 2ge − 1)P∞ ) such that they are not all zero and (19) −1 Q(f, f σ , . . . , f σ −(s−1) ) = A0 + A1 f + A2 f σ −1 + · · · + As f σ −(s−1) = 0. Solving the functional equation for f . As in the Hermitian case, our goal next is to recover the list of solutions f to the functional equation (19). Recall that our message functions lie in Im(κP∞ ), so we can recover f by recovering the top k coefficients (f0 , f1 , . . . , fk−1 ) of its local expansion. (20) f =T −(k+2ge −1) ∞ X fj T j j=0 at P∞ . We now prove that (f0 , f1 , . . . , fk−1 ) for f satisfying Equation (19) belong to a “periodic” subspace (in the sense of Definition 1) of not too large dimension. Lemma 7.5. The set of solutions (f0 , f1 , . . . , fk−1 ) ∈ Fkq such that f =T −(k+2ge −1) ∞ X j=0 obeys equation A0 + A1 f + A2 f σ (21) fj T j ∈ L((k + 2ge − 1)P∞ ) −1 + · · · + As f σ −(s−1) =0 k ⌉)-periodic subspace. when at least one Ai is nonzero is an (s − 1, r − 1, ⌈ r−1 Further, there are at most q N m+s+1 possible choices of this subspace over varying choices of the Ai ’s. Proof. Let u = min{νP∞ (Ai ) : i = 1, 2, . . . , s}. Then it is clear that u 6 0 and νP∞ (A0 ) > u − (k + 2ge − 1). Each Ai has a local expansion at P∞ : Ai = T u ∞ X ai,j T j j=0 for i = 1, . . . , s − 1 and A0 has a local expansion at P∞ : ∞ X a0,j T j A0 = T u−(k+2ge−1) j=0 From the definition of u, one knows that the polynomial is nonzero. B0 (X) := a1,0 + a2,0 X + · · · + as,0 X s−1 Assume that at P∞ , the function f has a local expansion (20). Then f σ expansion at P∞ as follows ∞ X σ−i −(k+2ge −1)i −(k+2ge −1) ξ ji fj T j , f =ξ T j=0 −i has a local 28 V. GURUSWAMI AND C. XING where ξ = 1/γ. −1 The coefficient of T d+u−(k+2ge−1) in the local expansion of Q(f, f σ , . . . , f σ (22) 0 = B(ξ d−(k+2ge −1) )fd + d−1 X −(s−1) ) is bi fi + a0,d , i=0 where bi ∈ Fq is a linear combination of ai,j which does not involve fj . Hence, fd is uniquely determined by f0 , . . . , fd−1 as long as B(ξ d−(k+ge −1) ) 6= 0. Let S := {0 6 d 6 r − 2 : B(ξ d−(k+ge −1) ) = 0}. Then it is clear that |S| 6 s − 1 since the order of ξ is r −1 and B0 (X) has degree at most s−1. Thus, B(ξ d−(k+ge −1) ) 6= 0 if and only if j mod (r − 1) ∈ / S; and in this case fj lis a fixed affine linear combination of fi for m 0 6 i < j. Note that B0 (X) has at most (s−1) k r−1 roots among {ξ i : i = 0, 1, . . . , k−1}. It follows that the set of solutions (f0 , f1 , . . . , fk−1 ) is an affine space W ⊂ Fkq , and the l m k dimension of W is at most (s − 1) r−1 . k The fact that W is (s, r − 1, ⌈ r−1 ⌉)-periodic subspace follows from (22). Note that the coefficients bd−j for j > 1 in that equation are given by Bj (ξ d−j−(k+2ge −1) ), where Bj (X) := a1,j + a2,j X + · · · + as,j X s−1 . Therefore, once the values of fi , 0 6 i < (j − 1)(r − 1) are fixed, the possible choices for the next block of (r − 1) coordinates, f(j−1)(r−1) , · · · , fj(r−1)−1 , lie in an affine shift of a fixed subspace of dimension at most (s − 1). Further, the affine shift is an affine linear combination of the fi ’s in the previous blocks. Finally, by the choice of D, the total number of possible (A0 , A1 , . . . , As ) and hence the number of possible functional equations (21), is at most q N (m−s+1)+s+1 6 q N m+s+1 . Therefore, the number of possible candidate subspaces W is also at most q N m+s+1 .  Similar to the bound (14) for the Hermitian case, we conclude, after some simple calculations and using the upper bound on genus ge 6 r e , that one can find a representation of the (s, r − 1)-periodic subspace containing all candidate messages (f0 , f1 , . . . , fk−1 ) in polynomial time, when the fraction of errors τ = 1 − t/N satisfies   re k 3m s . 1− − (23) τ6 s+1 N (m − s + 1) m − s + 1 mN 8. Pruning list for folded AG codes using h.s.e sets 8.1. Combining folded Hermitian codes and h.s.e sets. Instead of encoding arbitrary f ∈ Fkq by the folded Hermitian code (Definition 5), we can restrict the messages f to belong to the range of our h.s.e set, so that the affine space of solutions guaranteed by Lemma 5.7 can be efficiently pruned to a small list. The formal claim is below. Theorem 8.1. Let e > 2 be an integer, r > 2e be a large enough prime power, q = r 2 , and ζ ∈ (1/q, 1). Let k 6 q ζq/2 be a positive integer. Let s, m be positive integers satisfying 1 6 s 6 m 6 q − 1 and s < ζq/12. Finally let N be an integer satisfying k + 2er e 6 N m 6 (q − 1)r e . (1−ζ)2 k Consider the code C1 with encoding E1 : Fq N defined as → (Fm q ) E1 (x) = FH(N, k, q, e, m)(HSE(x)) , AG CODES & NEAR-OPTIMAL LIST DECODING 29 (1−ζ)2 k for a random map HSE : Fq → Fkq as constructed in Definition 9 for a period size k ∆ = q − 1 and b = ⌈ q−1 ⌉ (where technically we pad the input Fkq with 0’s to make its length b∆ to feed into HSE). Then, the code C1 code has rate R = (1−ζ)2 k/(N m), can be encoded in poly(N mq ζq ) time, and with high probability over the choice of HSE, it is (τ, ℓ)-list decodable in time poly(N mq ζq ) for ℓ 6 O(1/(Rζ)) and   s er e k 3m τ= . 1− − s+1 N (m − s + 1) m − s + 1 mN Proof. The claim about the rate is clear, and the encoding time follows from the time to compute HSE recorded in Theorem 6.5. By (3), the genus ge 6 er e , and so the condition on N, m meets the requirement for the construction of the folded Hermitian tower based code in Definition 4, and the claimed value of the error fraction τ satisfies (14). By Lemma 5.7, we know that the candidate k ⌉)-periodic messages found by the decoder lie in one of at most q 2N m possible (s, q −1, ⌈ q−1 6 subspaces. One can check that the conditions of Theorem 6.5 are met for our choice of ζ, s, q, k, ∆. Appealing to Theorem 6.5 with the choice c = 2N m/k = O(1/R), we conclude that, with high probability over the choice of HSE, there is a decoding algorithm running in time poly(N mq ζq ) to list decode C1 from a fraction τ of errors, outputting at most O(1/(Rζ)) messages in the worst-case.  Let ε > 0 be a small positive constant, and a family of codes of length N (assumed large enough) and rate R ∈ (0, 1) is sought. Pick n to be a growing parameter. By picking s = Θ(1/ε), m = Θ(1/ε2 ), r = ⌊log n⌋, e = ⌈ logloglogn n ⌉, ζ = (log n log log n)−1 , N = ⌊ (r 2 −1)r e m ⌋, and k proportional to N m in Theorem 8.1, we can conclude the following. Corollary 8.2. For any R ∈ (0, 1) and positive constant ε ∈ (0, 1), there is a Monte Carlo 2 construction of a family of codes of rate at least R over an alphabet size (log N )O(1/ε ) that are encodable and (1 − R − ε, O(R−1 log N log log N ))-list decodable in poly(N, 1/ε) time, where N is the block length of the code. Our promised main result (Theorem 1.1) achieves better parameters than the above — an alphabet size of exp(Õ(1/ε2 )) and list-size of O(1/(Rε)). This is based on the Garcia-Stichtenoth tower and is described next. 8.2. Combining folded Garcia-Stichtenoth codes and h.s.e sets. Similarly to Section 8.1, we now show how to pre-code the messages of the FGS code with a h.s.e subset. The approach is similar, though we need one additional idea to ensure that we can pick parameters so that the base field Fq can be constant-sized and obtain a final list-size bound that is a constant independent of the code length. This idea is to work with a larger “period size” ∆ for the periodic subspaces, based on the following observation. Observation 8.3. Let W be an (s, ∆, b)-periodic subspace of Fkq for k = b∆. Then W is also (su, ∆u, b)-periodic for every integer u, 1 6 u 6 b. 6Technically, it will belong to proj (W ) of such a periodic subspace W , but we may pretend that there k are (q−1)⌈k/(q−1)⌉−k extra dummy coordinates which we decode. Or we can just assume for convenience that k is divisible by (q − 1). 30 V. GURUSWAMI AND C. XING As in the Hermitian case, instead of encoding arbitrary f ∈ Fkq by the folded GarciaStichtenoth code (Definition 18), we will restrict the messages f to belong to the range of our h.s.e set. This will ensure that the affine space of solutions guaranteed by Lemma 7.5 can be efficiently pruned to a small list. Theorem 8.4. Let r be a prime power, q = r 2 , and e > 2 be an integer, and ζ ∈ (0, 1). Let k 6 q ζ∆/2 be a positive integer. Let ∆ 6 k be a multiple of (r − 1), say ∆ = u(r − 1) for a positive integer u. Let s, m be positive integers satisfying 1 6 s 6 m 6 r − 1 and s < ζr/12. Finally let N be an integer satisfying k + 2r e 6 N m 6 (r − 1)r e . (1−ζ)2 k Consider the code C2 with encoding E2 : Fq N defined as → (Fm q ) E2 (x) = FGS(N, k, q, e, m)(HSE(x)) , (1−ζ)2 k for a random map HSE : Fq → Fkq as constructed in Definition 9 for a period size ∆ k and b = ⌈ ∆ ⌉ (where we pad the input Fkq with 0’s to make its length b∆ to feed into HSE). The code C2 has rate R = (1 − ζ)2 k/(N m), can be encoded in poly(N mq ζ∆ ) time, and w.h.p over the choice of HSE, it is (τ, ℓ)-list decodable in time poly(N mq ζ∆ ) for ℓ 6 O(1/(Rζ)) and   re k 3m s . 1− − (24) τ= s+1 N (m − s + 1) m − s + 1 mN Proof. The proof is very similar to that of Theorem 8.1. The claim about the rate is clear, and the encoding time follows from the time to compute HSE recorded in Theorem 6.5. The genus ge is now upper bounded by r e , and so the condition on N, m meets the requirement for the construction of the folded Hermitian tower based code in Definition 4, and the claimed value of the error fraction τ satisfies (14). By Lemma 5.7, we know that the candidate messages found by the decoder lie in one of at most q 2N m possible k (s, r − 1, ⌈ r−1 ⌉)-periodic subspaces.7 Now by Observation 8.3, each of these subspaces is k ⌉)-periodic. One can check that the conditions of Theorem 6.5 are met for also (su, ∆, ⌈ ∆ our choice of ζ, s, q, k, ∆ and taking su to play the role of s (since s < ζr/12, we have su < ζ∆/10). Appealing to Theorem 6.5 with the choice c = 2N m/k = O(1/R), we conclude that there is a decoding algorithm running in time poly(N mq ζ∆ ) to list decode C2 from a fraction τ of errors, outputting at most O(1/(Rζ)) messages in the worst-case.  Finally, all that is left to be done is to pick parameters to show how the above can lead to optimal rate list-decodable codes over a constant-sized alphabet which further achieve very good list-size. Let ε > 0 be a small positive constant, and a family of codes of length N (assumed large enough) and rate R ∈ (0, 1) is sought. Pick n to be a growing parameter. n Let us pick s = Θ(1/ε), m = Θ(1/ε2 ), ζ = ε/12, r = Θ(1/ε), q = r 2 , and e = ⌈ log log r ⌉, e N = ⌊ (r−1)r ⌋, and k = RN m(1 + ε). This ensures that (i) there are at least n = N m m rational places and so we get a code of length at least n/m = N , (ii) the rate of the code C2 is at least R, and (iii) the error fraction (24) is at least 1 − R − ε. 7Technically, it will belong to proj (W ) of such a periodic subspace W , but we may pretend that there k are (r−1)⌈k/(r−1)⌉−k extra dummy coordinates which we decode. Or we can just assume for convenience that r − 1 divides k. AG CODES & NEAR-OPTIMAL LIST DECODING 31 The remaining part is to pick a multiple ∆ of (r − 1) so that the k 6 q ζ∆/2 condition log n ⌉ and ∆ = (r − 1)u. With these is met. This can be achieved by choosing u = ⌈ log(1/ε) choices, we can conclude the following, which is one of the main end goals of this paper. Theorem 8.5 (Main; Corollary to Theorem 8.4 with above choice of parameters). For any R ∈ (0, 1) and positive constant ε ∈ (0, 1), there is a Monte Carlo construction of a family of codes of rate at least R over an alphabet size exp(O(log(1/ε)/ε2 )) that are encodable and (1 − R − ε, O(1/(Rε))-list decodable in poly(N ) time, where N is the block length of the code. It may be instructive to recap why the Hermitian tower could not give a result like the above one. In the Hermitian case, the ratio ge /n of the genus to the number of rational √ places was about e/r = e/ q, and thus we needed q > e2 . Since the period ∆ was about q, the running time of the decoder was bigger than q Ω(ζq) , whereas the length of the code √ O( q) was at most q . This dictated the choice of q ≈ log2 n, and then to keep the running time polynomial, we had to take ζ ≈ (log n log log n)−1 . 9. List decoding AG codes with subfield evaluation points In this section, we will present a linear-algebraic list decoding algorithm for algebraicgeometric (AG) codes based on evaluations of functions at rational points over a subfield. The algorithm will manage to correct a large fraction of errors, and pin down the possible messages to a well-structured affine subspace of dimension much smaller than that of the code. For simplicity, we begin with the case of Reed-Solomon codes in Section 9.1. We then extend it to a general framework for decoding AG codes based on constant field extensions in Section 9.2. Finally, in Section 9.1, we instantiate the general framework (with a slight twist) to codes based on the Garcia-Stichtenoth tower. 9.1. Decoding Reed-Solomon codes. Our list decoding algorithm will apply to ReedSolomon codes with evaluation points in a subfield, defined below. Definition 12. [Reed-Solomon code with evaluations in a subfield] Let Fq be a finite field with q elements, and m a positive integer. Let n, k be positive integers satisfying 1 6 k < n 6 q. The Reed-Solomon code RS(q,m) [n, k] is a code over alphabet Fqm that encodes a polynomial f ∈ Fqm [X] of degree at most k − 1 as f (X) 7→ (f (α1 ), f (α2 ), · · · , f (αn )) where α1 , α2 , . . . , αn are an arbitrary sequence of n distinct elements of Fq . Note that while the message polynomial has coefficients from Fqm , the encoding only contains its evaluations at points in the subfield Fq . The above code has rate k/n, and minimum distance (n − k + 1). We now present a list decoding algorithm for the above Reed-Solomon codes. Suppose the codeword (f (α1 ), f (α2 ), · · · , f (αn )) is received as (y1 , y2 , . . . , yn ) ∈ Fnqm with at most e = τ n errors (i.e., yi 6= f (αi ) for at most e values of i ∈ {1, 2, . . . , n}). The goal is to recover the list of all polynomials of degree less than k whose encoding is within Hamming distance e from y. As is common in algebraic list decoders, the algorithm will have two steps: (i) interpolation to find an algebraic equation the message polynomials must satisfy, and (ii) solving the equation for the candidate message polynomials. 32 V. GURUSWAMI AND C. XING Interpolation step. Let 1 6 s 6 m be an integer parameter of the algorithm. Choose the “degree parameter” D to be   n−k+1 . (25) D= s+1 Definition 13 (Space of interpolation polynomials). Let P be the space of polynomials Q ∈ Fqm [X, Y1 , Y2 , . . . , Ys ] of the form (26) Q(X, Y1 , Y2 , . . . , Ys ) = A0 (X) + A1 (X)Y1 + A2 (X)Y2 + · · · + As (X)Ys , with each Ai ∈ Fqm [X] and deg(A0 ) 6 D + k − 1 and deg(Ai ) 6 D for i = 1, 2, . . . , s. The lemma below follows because for our choice of D, the number of degrees of freedom for polynomials in P exceeds the number n of interpolation conditions (27). We include the easy proof for completeness. Lemma 9.1. There exists a nonzero polynomial Q ∈ P such that (27) 2 Q(αi , yi , yiq , yiq , · · · , yiq s−1 )=0 for i = 1, 2, . . . , n . Further such a Q can be found using O(n3 ) operations over Fqm . Proof. Note that P is an Fqm -vector space of dimension (D + k) + s(D + 1) = (D + 1)(s + 1) + k − 1 > n, where the last inequality follows from our choice (25). The interpolation conditions required in the lemma impose n homogeneous linear conditions on Q. Since this is smaller than the dimension of P, there must exist a nonzero Q ∈ P that meets the interpolation conditions 2 s−1 Q(αi , yi , yiq , yiq , · · · , yiq ) = 0 for i = 1, 2, . . . , n . Finding such a Q amounts to solving a homogeneous linear system over Fqm with n constraints and at most dim(P) 6 n + s + 2 unknowns, which can be done in O(n3 ) time.  Lemma 9.3 below shows that any polynomial Q given by Lemma 9.1 yields an algebraic condition that the message functions f we are interested in list decoding must satisfy. Definition 14 (Frobenius action on polynomials). For a polynomial f ∈ Fqm [X] with f (X) = f0 + f1 X + · · · + fk−1 X k−1 , define the polynomial f σ ∈ Fqm [X] as f σ (X) = q f0q + f1q X + · · · + fk−1 X k−1 . i For i > 2, we define f σ recursively as (f σ i−1 )σ . The following simple fact is key to our analysis. j j Fact 9.2. If α ∈ Fq , then f (α)q = (f σ )(α) for all j = 1, 2, . . . . Lemma 9.3. Suppose Q ∈ P satisfies the interpolation conditions (27). Suppose f ∈ Fqm [X] of degree less than k satisfies f (αi ) 6= yi for at most e values of i ∈ {1, 2, . . . , n} s−1 2 s (n − k). Then Q(X, f (X), f σ (X), f σ (X), · · · , f σ (X)) = 0. with e 6 s+1 2 Proof. Define the polynomial Φ ∈ Fqm [X] by Φ(X) := Q(X, f (X), f σ (X), f σ (X), · · · , s−1 f σ (X)). By the construction of Q and the fact that deg(f ) 6 k − 1, we have deg(Φ) 6 n s D + k − 1 6 n−k+1 s+1 + k − 1 = s+1 + s+1 (k − 1). AG CODES & NEAR-OPTIMAL LIST DECODING qj yi 33 Suppose yi = f (αi ). By Fact 9.2, we have yiq = f (αi )q = (f σ )(αi ), and similarly j = (f σ )(αi ) for j = 2, 3, . . . . Thus for each i such that f (αi ) = yi , we have Φ(αi ) = Q(αi , f (αi ), f σ (αi ), · · · , f σ s−1 (αi )) = Q(αi , yi , yiq , · · · , yiq s−1 )=0. s n + s+1 k zeroes. Since this exceeds the upper bound on Thus Φ has at least n − e > s+1 the degree of Φ, Φ must be the zero polynomial.  Finding candidate solutions. The previous two lemmas imply that the polynomials s f whose encodings differ from (y1 , · · · , yn ) in at most s+1 (n − k) positions can be found s−1 = 0. amongst the solutions of the functional equation A0 + A1 f + A2 f σ + · · · + As f σ We now prove that these solutions form a well-structured affine space over Fq . Pk−1 Lemma 9.4. For integers 1 6 s 6 m, the set of solutions f = i=0 fi X i ∈ Fqm [X] to the equation (28) A0 (X) + A1 (X)f (X) + A2 (X)f σ (X) + · · · + As (X)f σ s−1 (X) = 0 when at least one of {A0 , A1 , . . . , As } is nonzero is an affine subspace over Fq of dimension at most (s − 1)k. Further, fixing an Fq -basis of Fqm and viewing each fi as an element of mk Fm q , the solutions are an (s − 1, m, k)-periodic subspace of Fq . A canonical representation of this periodic subspace (in the sense of Definition 2) can be computed in poly(k, m, log q) time. Proof. If f, g are two solutions to (28), then so is αf + βg for any α, β ∈ Fq with α + β = 1. So the solutions to (28) form an affine Fq -subspace. We now proceed to analyze the structure of the subspace. First, by factoring out a common powers of X that divide all of A0 (X), A1 (X), . . . , As (X), we can assume that at least one Ai∗ (X) for some i∗ ∈ {0, 1, . . . , s} is not divisible by X, and has nonzero constant term. Further, if A1 (X), . . . , As (X) are all divisible by X, then so is A0 (X), so we can take i∗ > 0. Let us denote Aι (X) = aι,0 + aι,1 X + aι,2 X 2 + · · · for ι = 0, 1, 2, . . . , s. For l = 0, 1, 2, . . . , k − 1, define the linearized polynomial (29) 2 Bl (X) = a1,l X + a2,l X q + a3,l X q + · · · + as,l X q s−1 . We know that ai∗ ,0 6= 0, and therefore B0 6= 0. This implies that the solutions β ∈ Fqm to B0 (β) = 0 is a subspace, say W , of Fqm of dimension at most s − 1. Fix an i ∈ {0, 1, . . . , k − 1}. Expanding the equation (28) and equating the coefficient of X i to be 0, we get (30) a0,i + Bi (f0 ) + Bi−1 (f1 ) + · · · + B1 (fi−1 ) + B0 (fi ) = 0 . This implies fi ∈ W +θi for some θi ∈ Fqm that is determined by f0 , f1 , . . . , fi−1 . Therefore, for each choice of f0 , f1 , . . . , fi−1 , fi must belong to a fixed coset of the subspace W of dimension at most s − 1. Thus, the solutions belong to an (s − 1, m, k)-periodic subspace. Also, it is clear from (30) that a canonical representation of the periodic subspace can be computed in poly(k, m, log q) time.  Combining Lemmas 9.3 and 9.4, we see that one can find an affine space of dimension (s − 1)k that contains the coefficients of all polynomials whose encodings differ from the s (1 − R) of the positions. Note the dimension input (y1 , . . . , yn ) in at most a fraction s+1 of the message space of the Reed-Solomon code RS(q,m) [n, k] over Fq is km. The above lemma pins down the candidate polynomials to a space of dimension (s − 1)k. For s ≪ m, 34 V. GURUSWAMI AND C. XING this is a lot smaller. In particular, it implies one can list decode in time sub-linear in the code size (the proof follows by taking s = ⌈1/ε⌉ and m > γs ). Corollary 9.5. For every R ∈ (0, 1), and ε, γ > 0, there is a positive integer m such that for all large enough prime powers q, the Reed-Solomon code C = RS(q,m) [q, Rq] can be list decoded from a fraction (1 − R − ε) of errors in |C|γ time, outputting a list of size at most |C|γ . Since the dimension of the subspace guaranteed by Lemma 9.4 grows linearly in k, we still cannot afford to list this subspace as the decoder’s output for polynomial time decoding. Instead, we will use a “pre-code” that only allows polynomials with coefficients in a carefully chosen subset that is guaranteed to have small intersection with the space of solutions to any equation of the form (28). Further, this intersection can be found quickly without going over all solutions to (28). In Section 10, we will see the approach to accomplish this based on subspace designs. 9.2. Decoding algebraic-geometric codes. In this section we generalize the ReedSolomon algorithm to algebraic-geometric codes. The description in this section will be for a general abstract AG code. So we will focus on the algebraic ideas, and not mention complexity estimates. The next subsection will focus on a specific AG code based on Garcia-Stichtenoth function fields, which will require a small change to the setup, and where we will also mention computational aspects. We assume familiarity with the basic setup of algebraic function fields and codes based on function fields, and use standard terminology and notation; the reader is referred to Stichtenoth’s book for basic background information [25]. Let F/Fq be a function field of genus g. Let P∞ , P1 , P2 , . . . , PN be N + 1 distinct Fq -rational places. Let σ ∈ Gal(Fqm /Fq ) be the Frobenius automorphism, i.e, ασ = αq for all α ∈ Fqm . Then we can extend σ to an automorphism in Gal(Fm /F ), where Fm is the constant extension Fqm · F . Note that P σ = P for any place of F . For a place P of F , we denote by νP the discrete valuation of P . For an integer l, we consider the Riemann-Roch space over Fq defined by L(lP∞ ) := {h ∈ F \ {0} : νP∞ (h) > −l} ∪ {0}. Then the dimension ℓ(lP∞ ) is at least l−g+1 and equality holds if l > 2g−1. Furthermore, we define the Riemann-Roch space over Fqm by Lm (lP∞ ) := {h ∈ Fm \ {0} : νP∞ (h) > −l} ∪ {0}. Consider the Goppa geometric code defined by C(m; l) := {(f (P1 ), f (P2 ), . . . , f (PN )) : f ∈ Lm (lP∞ )}. The following result is a fundamental fact about algebraic-geometric codes. Lemma 9.6. The above code C(m; l) is an Fqm -linear code over Fqm , rate at least and minimum distance at least N − l. l−g+1 N , We now present a list decoding algorithm for the above codes. The algorithm follows the linear-algebraic list decoding algorithm for RS codes. Suppose a codeword encoding f ∈ Lm ((k + 2g − 1)P∞ ) is transmitted and received as y = (y1 , y2 , . . . , yN ). Given such a received word, we will interpolate a nonzero linear polynomial over Fm (31) Q(Y1 , Y2 , . . . , Ys ) = A0 + A1 Y1 + A2 Y2 + · · · + As Ys AG CODES & NEAR-OPTIMAL LIST DECODING 35 where Ai ∈ Lm (DP∞ ) for i = 1, 2, . . . , s and A0 ∈ Lm ((D + k + 2g − 1)P∞ ) with the degree parameter D chosen to be   N − k + (s − 1)g + 1 . (32) D= s+1 If we fix a basis of Lm (DP∞ ) and extend it to a basis of Lm ((D + k + 2g − 1)P∞ ), then the number of freedoms of A0 is at least D + k + g and the number of freedoms of Ai is at least D − g + 1 for i > 1. Thus, the total number of freedoms in the polynomial Q equals (33) s(D − g + 1) + D + k + g = (s + 1)(D + 1) − (s − 1)g − 1 + k > N. for the above choice (32) of D. The interpolation requirements on Q ∈ Fm [Y1 , . . . , Ys ] are the following: (34) Q(yi , yiσ , . . . , yiσ s−1 ) = A0 (Pi ) + A1 (Pi )yi + A2 (Pi )yiσ + · · · + As (Pi )yiσ s−1 =0 for i = 1, 2, . . . , N . Thus, we have a total of N equations to satisfy. Since this number is less than the number of freedoms in Q, we can conclude that a nonzero linear function Q ∈ Fm [Y1 , . . . , Ys ] of the form (31) satisfying the interpolation conditions (34) can be found by solving a homogeneous linear system over Fqm with at most N constraints and at least s(D − g + 1) + D + k + g variables. The following lemma gives the algebraic condition that the message functions f ∈ Lm ((k + 2g − 1)P∞ ) we are interested in list decoding must satisfy. Lemma 9.7. If f is a function in Lm ((k + 2g − 1)P∞ ) whose encoding agrees with the received word y in at least t positions with t > D + k + 2g − 1, then (35) Q(f, f σ , . . . , f σ s−1 ) = A0 + A1 f + A2 f σ + · · · + As f σ s−1 = 0. Proof. The proof proceeds by comparing the number of zeros of the function Q(f, f σ , s−1 s−1 with D + k + 2g − 1. Note that Q(f, f σ , . . . , . . . , f σ ) = A0 + A1 f + A2 f σ + · · · + As f σ s−1 σ ) is a function in Lm ((D + k + 2g − 1)P∞ ). If position i of the encoding of f agrees f with y, then 0 = A0 (Pi ) + A1 (Pi )yi + A2 (Pi )yiσ + · · · + As (Pi )yiσ s−1 = A0 (Pi ) + A1 (Pi )f (Pi ) + A2 (Pi )(f (Pi ))σ + · · · + As (Pi )(f (Pi ))σ = A0 (Pi ) + A1 (Pi )f (Pi ) + A2 (Pi )f σ (Pi ) + · · · + As (Pi )f σ σ = (A0 + A1 f + A2 f + · · · + As f σs−1 s−1 s−1 (Pi ) )(Pi ) s−1 i.e., Pi is a zero of Q(f, f σ , . . . , f σ ). Thus, there are at least t zeros for all the agreeing s−1 positions. Hence, Q(f, f σ , . . . , f σ ) must be the zero function when t > D+k+2g−1.  Let P be a rational place in F and let T ∈ F be a local parameter of P . Then T σ = T . Here, we have two scenarios, i.e., P = P∞ or P 6= P∞ . In Subsection 9.3, we will consider the case where P = P∞ for the Garcia-Stichtenoth tower. While in this subsection, we only discuss the case where P 6= P∞ . This was the case with Reed-Solomon codes with message polynomials in Fq [X] in Subsection 9.1 where P∞ was the pole of X, and P the zero of X. Assume that a function f ∈ Lm ((k + 2g − 1)P∞ ) has a local expansion at P (36) f= ∞ X j=0 fj T j 36 V. GURUSWAMI AND C. XING for some fj ∈ Fqm . Then f is uniquely determined by (f0 , f1 , . . . , fk+2g−1 ) since f has the pole degree at most k + 2g − 1. Lemma 9.8. The set of solutions f ∈ Lm ((k + 2g − 1)P∞ ) to the equation (34) A0 + A1 f + A2 f σ + · · · + As f σ s−1 =0 when at least one Ai is nonzero has size at most q (s−1)(k+2g−1) . Further, the possible coefficients (f0 , f1 , . . . , fk+2g−1 ) of f ’s local expansion at P belong to an (s − 1, m)-ultra (k+2g−1)m periodic affine subspace of Fq . Proof. The argument is very similar to Lemma 9.4. Let u = min{νP∞ (Ai ) : i = 1, 2, . . . , s}. Then it is clear that u > 0 and νP (A0 ) > u. Each Ai has a local expansion at P : ∞ X ai,j T j Ai = T u j=0 for i = 0, 1, . . . , s. i Assume that at P , the function f has a local expansion (36). Then f σ has a local expansion at P as follows ∞ X i σi fjq T j . f = j=0 For l = 0, 1, . . . , define the linearized polynomial Bl (X) := a1,l X + a2,l X q + · · · + as,l X q s−1 From the definition of u, one knows that B0 (X) is nonzero. Equating the coefficient of s−1 to equal 0 gives us the condition T d+u in A0 + A1 f + A2 f σ + · · · + As f σ (37) a0,d + Bd (f0 ) + Bd−1 (f1 ) + · · · + B0 (fd ) = 0 . Let W = {α ∈ Fqm : B0 (α) = 0}. Then W is an Fq -subspace of Fqm of dimension at most s − 1, since B0 is a nonzero linearized polynomial of q-degree at most s − 1. As in Lemma 9.4, for each fixed f0 , f1 , . . . , fd−1 , the coefficient fd must belong to a coset of the subspace W . This implies that the coefficients (f0 , f1 , . . . , fk+2g−1 ) belong to an m(k+2g−1) (s − 1, m, k + 2g − 1)-periodic subspace of Fq . In particular, there are at most q (s−1)(k+2g−1) solutions f ∈ Lm ((k + 2g − 1)P∞ ) to (34). The equation (37) also shows that each group of ℓ successive coefficients fd−ℓ+1 , fd−ℓ+2 , · · · , fd belong to cosets of the same underlying ℓ(s − 1) dimensional subspace of Fmℓ q . This implies that (f0 , f1 , . . . , fk+2g−1 ) in fact belong to an (s − 1, m)-ultra periodic subspace.8  Restricting message functions using local expansions. Using Lemma 9.8, we will recover the message in terms of the coefficients of its local expansion at P . In order to prune the subspace of possible solutions, we will pick a subcode that corresponds to restricting the coefficients to a carefully constructed subset of all possibilities. This requires us to index message functions in terms of the local expansion coefficients. However, not all (k + 2g − 1) tuples over Fqm arise in the local expansion of functions in the k-dimensional subspace Lm ((k + 2g − 1)P∞ ). Below we show that we can find a k-dimensional subspace 8This ultra-periodicity was also true for the Reed-Solomon case in Lemma 9.4, but we did not state it there as we will not make use of this extra property for picking a subcode in the case of Reed-Solomon codes. AG CODES & NEAR-OPTIMAL LIST DECODING 37 of Lm ((k + 2g − 1)P∞ ) such that their top k local expansion coefficients give rise to all k-tuples over Fqm . Lemma 9.9. There exist a set of functions {g1 , g2 , . . . , gk } in Lm ((k + 2g − 1)P∞ ) such that the k × k matrix A formed by taking the ith row of A to be the first k coefficients in the local expansion (36) for gi at P is non-singular. Proof. Let {ψ1 , ψ2 , . . . , ψg } be a basis of Lm ((k + 2g − 1)P∞ − kP ). Extend this basis to a basis {ψ1 , ψ2 , . . . , ψg , g1 , g2 , . . . , gk } of Lm ((k + 2g − 1)P∞ ). We claim that the functions {g1 , g2 , . . . , gk } are our desired functions. Suppose that the matrix A is obtained from expansion of functions gi and it is P singular. This implies that there exists elements {λi }ki=1 such that the function ki=1 λi gi P∞ P k i has expansion the function i=k ai T at P for some ai ∈ Fq m . Therefore, i=1 λi gi Pk belongs to the space Lm ((k + 2g − 1)P∞ − kP ), i.e., i=1 λi gi is a linear combination of ψ1 , ψ2 , . . . , ψg . This forces that all λi are equal to 0 since {ψ1 , . . . , ψg , g1 , g2 , . . . , gk } is linearly independent. This completes the proof.  With the above lemma in place, we now describe our AG code in a manner convenient for pruning the possible local expansion coefficients. Encoding. Assume that we have found a set of functions {g1 , g2 , . . . , gk } of Lm ((k + 2g − 1)P∞ ) as in Lemma 9.9. After elementary row operations on the matrix A defined in Lemma 9.9, we may assume that A is the k × k P identity matrix, i.e., we assume that, j for 1 6 i 6 k, the function gi has expansion T i−1 + ∞ j=k λij T for some λij ∈ Fq m . Now for any subset M ⊆ Fkqm , we may assume that our messages belong to M , and encode each message (a1 , a2 , . . . , ak ) ∈ M to the codeword (f (P1 ), f (P2 ), . . . , f (PN )), P where f = ki=1 ai gi . Thus, our actual code is a subcode of C(m; k + 2g − 1) given by (38) k X def ai gi , (a1 , a2 , . . . , ak ) ∈ M } . C(m; k + 2g − 1 | M ) = {(f (P1 ), f (P2 ), . . . , f (PN )) : f = i=1 Decoding. To decode, we first establish the equation (35) and solve this equation to find the subspace of possible first k coefficients f0 , f1 , . . . , fk−1 in the local expansion of Pk the function f = i=1 ai gi at P . The following claim implies that the message tuple (a1 , a2 , . . . , ak ) belongs to this subspace. Lemma 9.10. The first k coefficients f0 , f1 , . . . , fk−1 of the local expansion of f = Pk i=1 ai gi at P equal a1 , a2 , . . . , ak . P j Proof. Since gi has local expansion T i−1 + ∞ j=k λij T , it is clear that the local expansion Pk−1 P ∞ i j of f is i=0 ai+1 T + j=k aj+1 T for some ak+1 , ak+2 , . . . in Fq m . Thus the first k coefficients of the local expansion of f are a1 , a2 , . . . , ak .  Combining Lemmas 9.7, 9.8, and 9.10, and recalling the choice of D in (32), we get the following. Corollary 9.11. For the code C(m; k + 2g − 1 | Fkqm ), we can find an (s − 1, m)-ultra periodic subspace of Fmk that includes all messages whose encoding differs from a received q 3s+1 s in at most word y ∈ FN m q s+1 (N − k) − s+1 g positions. 38 V. GURUSWAMI AND C. XING 9.3. Decoding the codes from the Garcia-Stichtenoth tower. Let r be a prime power and let q = r 2 . For e > 2, let Ke be the function field Fq (x1 , x2 , . . . , xe ) given by Garcia-Stichtenoth tower (16). Put F = Ke and Fm = Fqm · Ke . The encoding and decoding is almost identical to the algebraic geometric code described in the previous section except here we use P∞ for local expansion. Encoding. As in Lemma 9.9, we can find a set of functions {h1 , h2 , . . . , hk } of Lm ((k + 2ge −1)P∞ ) such that the k×k matrix A formed by taking the ith row of A to be the first k coefficients in the expansion (40) for hi at P∞ is non-singular (note that in this case, the local expansion starts from T −(k+2ge−1) , while in the previous subsection the local expansion starts from T 0 ). Furthermore, after some elementary row operations  on A,Pwe may assume  j for −(k+2g e −1) that, for 1 6 i 6 k, the function hi has expansion T T i−1 + ∞ j=k λij T some λij ∈ Fqm . We encode a message k-tuple (a1 , a2 , . . . , ak ) ∈ Fkqm by the codeword (f (P1 ), f (P2 ), . . . , P f (PN )) where f = ki=1 ai hi , and P1 , P2 , . . . , PN are arbitrary Fq -rational points (other than P∞ ) in the function field. The block length N can be any integer satisfying k 6 N 6 r e−1 (r 2 − r). As in Section 9.2, for any subset M ⊆ Fkqm , we can consider the subcode obtained by only encoding tuples in M : (39) k X def ai hi , (a1 , a2 , . . . , ak ) ∈ M } . CGS (m; k+2ge −1 | M ) = {(f (P1 ), f (P2 ), . . . , f (PN )) : f = i=1 Computing the code. Note that an explicit specification of the code simply requires the evaluations of the basis functions h1 , h2 , . . . , hk at the N rational points. One can find a basis of Lm (lP∞ ) along with its evaluations at the rational points using poly(N, l, m) operations over Fq [23] (see also [10, Sec. 7]). We can also compute the first l coefficients of the local expansion of the basis functions at P∞ using poly(l, m) operations over Fq as described in Section 4. The computation of the hi ’s following the method of Lemma 9.9 only requires elementary matrix operations, so we can compute its evaluations at the rational points also in polynomial time. List decoding. In order to list decode, we can find a functional equation A0 + A1 f + s−1 exactly as in Lemma 9.7. To solve for f from this equation, we A2 f σ + · · · + As f σ consider the local expansions of the message functions f at P∞ . Let T ∈ Ke be a local expansion of P∞ and suppose that a function f ∈ Lm ((k+2ge −1)P∞ ) has a local expansion at P∞ (40) f = T −(k+2ge −1) ∞ X fj T j j=0 Pk for some fj ∈ Fqm . As in Lemma 9.10, if f = i=1 ai hi , then the top k coefficients f0 , f1 , . . . , fk−1 in the above local expansion equal a1 , a2 , . . . , ak . Thus we can determine such f uniquely by finding f0 , f1 , . . . , fk−1 . The following lemma is similar to Lemma 9.8 and shows that the coefficients belong to an ultra-periodic subspace. Lemma 9.12. Suppose f ∈ Lm ((k + 2ge − 1)P∞ ) satisfies the equation A0 + A1 f + A2 f σ + · · · + As f σ s−1 =0 AG CODES & NEAR-OPTIMAL LIST DECODING 39 when at least one Ai is nonzero. Then the possible first k coefficients (f0 , f1 , . . . , fk−1 ) of f ’s local expansion (40) at P∞ belong to an (s − 1, m)-ultra periodic affine subspace of Fkm q . Proof. Let u = min{νP∞ (Ai ) : i = 1, 2, . . . , s} (so that −u is the maximum number of poles any Ai , 1 6 i 6 s, has at P∞ ). Then it is clear that u > −D and νP∞ (A0 ) > u − (k + 2ge − 1). Each Ai has a local expansion at P∞ : A0 = T u−(k+2ge −1) ∞ X j a0,j T ; and Ai = T u ∞ X ai,j T j for i = 1, 2, . . . , s. j=0 j=0 i Assume that at P∞ , the function f has a local expansion (36). Then f σ has a local expansion at P as follows ∞ X i i fjq T j . fσ = j=0 For l = 0, 1, . . . , define the linearized polynomial Bl (X) := a1,l X + a2,l X q + · · · + as,l X q s−1 From the definition of u, one knows that B0 (X) is nonzero. Equating the coefficient of s−1 to equal 0 gives us the condition T d+u−(k+2ge −1) in A0 + A1 f + A2 f σ + · · · + As f σ a0,d + Bd (f0 ) + Bd−1 (f1 ) + · · · + B0 (fd ) = 0 . Arguing as in Lemma 9.8 this constrains (f0 , f1 , . . . , fk−1 ) to belong to an (s − 1, m)-ultra  periodic subspaces of Fmk q . Similar to Corollary 9.11, we can now conclude the following: Corollary 9.13. The code CGS (m; k + 2ge − 1 | Fkqm ) can be list decoded from up to s 3s+1 s+1 (N − k) − s+1 ge errors, pinning down the messages to an (s − 1, m)-ultra periodic mk subspace of Fq . We conclude the section by incorporating the trade-off between ge and N , and stating the rate vs. list decoding radius trade-off offered by these codes, in a form convenient for improvements to the list size using subspace evasive sets and subspace designs (see Section 10). The claim about the number of possible solution subspaces follows since the subspace is determined by A0 , A1 , . . . , As , and for our choice of parameter D, there are at most q O(mN ) choices of those. Theorem 9.14. Let q be the even power of a prime. Let 1 6 s 6 m be integers, and √ let R ∈ (0, 1). Then for infinitely many N (all integers of the form q e/2 ( q − 1)), there is a deterministic polynomial time construction of an Fqm -linear code GS(q,m) [N, k] of block length N and dimension k = R · N that can be list decoded in poly(N, m, log q) time s O(mN ) possible (N − k) − √3N from s+1 q−1 errors, pinning down the messages to one of q (s − 1, m)-ultra periodic Fq -affine subspaces of Fmk q . 10. Subspace designs The linear-algebraic list decoder discussed in the previous sections pins down the coefficients of the message to a periodic subspace. This subspace has linear dimension, so we need to restrict the coefficients further so that the subspace can be pruned to a small list of solutions. We already saw, in Section 6, an approach using h.s.e. sets to prune the 40 V. GURUSWAMI AND C. XING periodic subspace to a small list. In this section, we will develop an alternate approach based a special collection of subspaces, which we call a subspace design, for pruning the periodic subspaces. This will lead to explicit constructions with somewhat larger list size. We begin with the definition of the central object of study in this section, subspace designs. Definition 15. Let Λ be a positive integer, and q a prime power. For positive integers Λ r < Λ and d, an (r, d)-subspace design in FΛ q is a collection of subspaces of Fq such that for every r-dimensional subspace W ⊂ FΛ q , we have X (41) dim(W ∩ H) 6 d . H∈H The cardinality of a subspace design H is the number of subspaces in its collection, i.e., |H|. If all subspaces in H have the same dimension t, then we refer to t as the dimension of the subspace design H. Note that the condition (41) in particular implies for every r-dimensional subspace W , at most d of the subspaces in an (r, d)-subspace design non-trivially intersect it. This weaker property is called a “weak subspace design” in [8] which gave explicit constructions of subspace designs following our original definition in [17]. For our list decoding application, the stronger property (41) is required. In particular, the usefulness of subspace designs defined above, in the context of pruning periodic subspaces, is captured by the following key lemma. Lemma 10.1 (Periodic subspaces intersected with a subspace design). Suppose H1 , H2 , . . . , Hb are subspaces in an (r, d)-subspace design in FΛ q , and T is a (r, Λ, b)-periodic affine subspace of FΛb with underlying subspace S. Then the set q T = {(f1 , f2 , . . . , fb ) ∈ T | fj ∈ Hj for j = 1, 2, . . . , b} is an affine subspace of FΛb q of dimension at most d. Also, the underlying subspace of T def is contained in S = S ∩ (H1 × H2 × · · · × Hb ). Proof. It is clear that T is an affine subspace, since its elements are restricted by the set of linear constraints defining T and the Hj ’s. Also, the difference of two elements in T is contained in both the subspaces S and (H1 × H2 × · · · × Hb ), which implies that the underlying subspace of T is contained in S. We will prove the bound on dimension by proving that |T | 6 q d . To prove this, we will imagine the elements of T as the leaves of a tree of depth b, with the nodes at level j representing the possible projections of T onto the first j blocks. The root of this tree has as children the elements of the affine space proj[1,Λ] (T ) ∩ H1 . Let W be the subspace of FΛ q of dimension at most r associated with the periodic subspace T (in the sense of Definition 1). Note that the underlying subspace of the affine space proj[1,Λ] (T ) ∩ H1 is contained in the subspace W ∩ H1 . Continuing this argument, the children of an element a ∈ FjΛ q at level j will be a followed by the possible extensions of a to the (j + 1)’th block, given by {proj[j∆+1,(j+1)∆] (x) | x ∈ T and projj∆ (x) = a} ∩ Hj+1 . The periodic property of T and the fact that Hj+1 is a subspace implies that the possible extensions of a are given by a coset of a subspace of W ∩ Hj+1 . Thus the nodes at level j have degree at most q dim(W ∩Hj+1 ) for j = 0, 1, . . . , b − 1. Since the Hj ’s belong to an AG CODES & NEAR-OPTIMAL LIST DECODING 41 P (r, d)-subspace design we have bj=1 dim(W ∩ Hj ) 6 d. Therefore, the tree has at most q d leaves, which is also an upper bound on |T |.  10.1. Constructing subspace designs. We now turn to the construction of subspace designs of large size and dimension. We first analyze the performance of a random collection of subspaces. Lemma 10.2. Let η > 0 and q be a prime power. Let r, Λ be integers Λ > 8/η and r 6 ηΛ/2. Consider a collection H of subspaces of FΛ q obtained by picking, independently at random, q ηΛ/8 subspaces of FΛ of dimension (1 − η)Λ each. Then, with probability at q −Λr least 1 − q , H is an (r, 8r/η)-subspace design. Proof. Let ℓ = 8r/η, and let M = q ηΛ/8 denote the number of randomly chosen subspaces.9 Let H1 , H2 , . . . , HM be the subspaces in the collection H. Fix a subspace W of FΛ q of dimension r. Fix a tuple of non-negative integers (a1 , a2 , . . . , aM ) summing up to ℓ. For each j ∈ {1, 2, . . . , M }, the probability that dim(W ∩Hj ) > aj is at most q raj q −ηΛaj . Since the choice of the different Hj ’s are independent, the probability that dim(W ∩ Hj ) > aj for every j is at most q (r−ηΛ)ℓ 6 q −ηΛℓ/2 (the last step uses r 6 ηΛ/2). A union bound over the at most q Λr subspaces W ⊂ FΛ q of dimension r, and the at  ℓ+M ℓ 2ℓ most ℓ 6 (M +ℓ) 6 M choices of the tuples (a1 , a2 , . . . , aM ), we get the probability that H is not an (r, ℓ)-subspace design is at most q Λr · q −ηΛℓ/2 · (q ηΛ/8 )2ℓ = q Λr · q −ηΛℓ/4 6 q −Λr where the last step uses ℓ > 8r/η.  Note that given a collection H of subspaces, one can deterministically check if it is O(Λr) |H| time by doing a brute-force check of all ran (r, d)-subspace design in FΛ q in q P Λ dimensional subspaces W of Fq , and for each computing H∈H dim(W ∩H) using |H|ΛO(1) operations over Fq . Thus the above lemma gives a q O(Λr) time Las Vegas construction of an (r, d)-subspace design with many subspaces each of large dimension (1 − η)m. Lemma 10.3. For parameters η, r, Λ as in Lemma 10.2, for any b 6 q ηΛ/8 , one can compute an (r, 8r/η)-subspace design in FΛ q of dimension (1 − η)Λ and cardinality b in O(Λr) q Las Vegas time. As noted in the conference version [17] of this paper, the construction can be derandomized using the method of conditional expectations to successively find good subspaces Hi to add to the subspace design. However, as each step involves searching over all O(Λ2 ) even for con(1 − η)Λ-dimensional subspaces of FΛ q , the construction time would be q structing subspace designs with few subspaces. For our application to reducing the list size for long algebraic-geometric codes (either folded or with rational points in a subfield), we will need subspace designs for ambient dimension Λ growing at least logarithmically in the 2 code length. The q O(Λ ) complexity will thus lead to a quasi-polynomial code construction time, as claimed in the conference version [17]. In fact, even the Las Vegas construction time of q O(Λr) will be super-polynomial for the parameters used in the construction. The question of explicit (polynomial time) constructions of subspace designs naturally arose following [17] and was addressed in the follow-up work by Guruswami and Kopparty [8], who proved the following. 9For simplicity, we ignore the floor and ceil signs in defining integers; these can be easily incorporated. 42 V. GURUSWAMI AND C. XING Theorem 10.4 (Explicit subspace designs [8]). For every η > 0, integers r, Λ with r 6 ηΛ/4, and prime powers q satisfying q ηΛ/(2r) > 2r/η, for any b 6 q ηΛ/(4r) , there exists an explicit (r, r 2 /η)-subspace design of cardinality b and dimension (1 − η)Λ, that can be constructed deterministically in time poly(b, q) time. In the case when q > Λ, one can explicitly construct an (r, 2r/η)-subspace design with the same parameters. We note a couple of senses in which the parameters offered by the explicit construction are weaker than those guaranteed by the probabilistic construction. First, the total intersection dimension (41) is r 2 /η rather than O(r/η) (except when q is large). This is because, for small fields, their construction yields only a weak subspace design, incurring a factor r loss when passing to a subspace design. Second, the number of subspaces in the design is smaller, roughly q Ω(ηΛ/r) instead of q Ω(ηΛ) . Finally, there is a modest restriction the field size q, and we need to pick r, Λ suitably to allow for fixed q. Fortunately, all these restrictions can be accommodated for our application. We remark that a recent construction of subspace designs based on cyclotomic function fields [18] gives an analog of Theorem 10.4 over any field Fq with an (r, O(r logq Λ/η))-subspace design; for our application, however, the r 2 /η bound is more useful as r ≪ Λ, and we can’t afford the dependence on Λ in the bound. Let us now record a construction of subspaces with low-dimensional intersection with every periodic subspace based on the above subspace designs. This form will be convenient for later use in pre-coding Reed-Solomon codes. Theorem 10.5. Let η ∈ (0, 1) and q be a prime power, and r, Λ, b be integers such that r 6 ηΛ/4 and b < q. Then, one can construct a subspace V of FbΛ q of dimension at least O(Λ) (1 − η)bΛ in either deterministic q time: For every (r, Λ, b)-periodic subspace T ⊂ FbΛ q , V ∩ T is an Fq -affine subspace of dimension at most 2r/η. Proof. We will take V = H1 × H2 × · · · Hb where the Hi ’s belong to a (r, 2r/η)-subspace design in F∆ q of cardinality b and dimension at least (1−η)Λ as guaranteed by Theorem 10.4 when q > Λ. er Clearly dim(V ) > (1 − η)bΛ since each Hi has dimension at least (1 − η)Λ. The claim now follows using Lemma 10.1.  10.2. Cascaded subspace designs. In preparation for our results about algebraic-geometric codes, whose block length ≫ q m is much larger than the possible size of subspace designs in Fm q , we now formalize a notion that combines several “levels” of subspace designs. The definition might seem somewhat technical, but it has a natural use in our application to list-size reduction for AG codes. Note that there is no “consistency” requirement between subspace designs at different levels other than the lengths and cardinalities matching. Definition 16 (Subspace designs of increasing length). Let l be a positive integer. For positive integers r0 6 r1 6 · · · 6 rl and m0 6 m1 6 · · · 6 ml such that mι−1 |mι for 1 6 ι 6 l, an (r0 , r1 , . . . , rl )-cascaded subspace design with length-vector (m0 , m1 , . . . , ml ) and dimension vector (d0 , d1 , . . . , dl−1 ) is a collection of l subspace designs, specifically an (rι−1 , rι )-subspace design in Fqmι−1 of cardinality mι /mι−1 and dimension dι−1 for each ι = 1, 2, . . . , l. Note that the l = 1 case of the above definition corresponds to an (r0 , r1 )-subspace 0 of dimension d design in Fm 0 and cardinality m1 /m0 . In Lemma 10.1, we used the q subspace H1 × H2 × · · · × Hb based on a subspace design consisting of the Hi ’s to prune a periodic subspace. Generalizing this, we now define a subspace associated with a cascaded subspace design based on the subspace designs comprising it. AG CODES & NEAR-OPTIMAL LIST DECODING 43 Definition 17 (Canonical subspace). Let M be a cascaded subspace design with lengthvector (m0 , m1 , . . . , ml ) such that the ι’th subspace design in M has subspaces (ι) (ι) (ι) ι−1 H1 , H2 , · · · , Hmι /mι−1 ⊂ Fm , for 1 6 ι 6 l . q The canonical subspace associated with such a cascaded subspace design, denoted U (M), is a subspace of Fqml defined as follows: l A vector x ∈ Fm q belongs to U (M) if and only if for every ι ∈ {1, 2, . . . , l}, each of the mι -sized blocks of x given proj[jmι +1,(j+1)mι ] (x) for 0 6 j < (ι) (ι) (ι) ml /mι ) belongs H1 × H2 × · · · × Hmι /mι−1 . In other words, we apply the construction of Lemma 10.1 for (disjoint) intervals of length mι at each level ι ∈ {1, 2, . . . , l}. The following simple fact, which follows by counting number of linear constraints imposed, gives a lower bound on the dimension of a canonical subspace. Observation 10.6. For a cascaded subspace design M as above, if the ι’th subspace design has dimension at least (1 −ξι−1 )mι−1 for 1 6 ι 6 l, then the dimension of the canonical subspace U (M) is at least 1 − (ξ0 + ξ1 + · · · + ξl−1 ) ml . The following is the crucial claim about pruning ultra-periodic subspaces using (the canonical subspace of) a cascaded subspace design. It generalizes Lemma 10.1 which corresponds to the l = 1 case. Lemma 10.7. Suppose M is a (r0 , r1 , . . . , rl )-cascaded subspace design with length-vector l (m0 , m1 , . . . , ml ). Let T be a (r0 , m0 )-ultra periodic affine subspace of Fm q . Then the dimension of the affine space T ∩ U (M) is at most rl . Proof. The idea will be to apply Lemma 10.1 inductively, for increasing periods m0 , m1 , . . . , ml−1 . Since T is (r0 , m0 )-ultra periodic, it is (r0 , m0 )-periodic and ((m1 /m0 )r0 , m1 )periodic. Using this together with Lemma 10.1, it follows that (1) (1) (1) l T ∩ {x ∈ Fm q | proj[jm1 +1,(j+1)m1 ] (x) ∈ H1 × H2 × · · · × Hm1 /m0 for 0 6 j < ml /m1 } is an affine subspace that is (r1 , m1 )-periodic. Continuing this argument, the affine sub(ι) (ι) (ι) space of T formed by restricting each mι -block to belong to H1 × H2 × · · · × Hmι /mι−1 l for 1 6 ι 6 j is (rj , mj )-periodic. For j = l, we get the intersection T ∩ U (M) ⊂ Fm q will be (rl , ml )-periodic, which simply means that it is an rl -dimensional affine subspace l  of Fm q . We conclude this section by constructing a canonical subspace that has low-dimensional intersection with ultra-periodic subspaces based on the explicit subspace designs of Theorem 10.4. This statement will be used in Section 11.2 for pre-coding algebraic-geometric codes based on the Garcia-Stichtenoth tower. Theorem 10.8. Let q > 4 be a prime power. Let η ∈ (0, 1) and integers Λ, r > 2 satisfy Λ > crη −1 log(r/η) for a large enough (absolute) constant c > 0. For all large enough multiples κ of Λ, we can construct a subspace U of Fκq of dimension at least (1 − η)κ such that for every (r, Λ)-ultra periodic affine subspace T ⊂ Fκq , the dimension of the O(log∗ κ) affine subspace U ∩ T is at most (r/η)2 deterministically in poly(κ, q) time. . The subspace U can be constructed in 44 V. GURUSWAMI AND C. XING Proof. We will take U to the canonical subspace U (M) of an appropriate cascaded subspace design M. To this end, given our work so far, the main remaining task is to pick η the parameters of M carefully. Let ηι = 4·2 ι for ι = 0, 1, 2, . . . . √ Let m0 = Λ, m1 = m0 · ⌊(r/η)c/4 ⌋, and for ι > 0, mι+1 = mι · q ⌈ mι ⌉ . Let r0 = r, and for ι > 0, rι+1 = ⌈rι2 /ηι ⌉. For this choice of parameters, one can verify that (i) rι 6 ηι mι /4, and (ii) q ηι mι /(4rι ) > mι+1 /mι for all ι > 0. Indeed, to verify the first condition by induction, one only needs to check that mι+1 > m2ι , which is true for ι = 0 √ for a large enough choice of c, and for ι > 1, mι+1 in fact grows exponentially in mι . For the second condition, for ι = 0 it follows from our assumption that Λ > crη −1 log(r/η). √ For ι > 1, it is implied by rι /ηι ≪ mι /4, which is true for ι = 1 for large enough c, and for ι > 1 by induction since rι /ηι grows quadratically in each step, whereas mι grows exponentially. We can therefore conclude by Theorem 10.4 that we can construct a (rι , rι+1 )ι subspace design of cardinality mι+1 /mι in Fm q of dimension (1 − ηι )mι . Pick l to the smallest integer so that ml−1 > (logq κ)2 . Since m0 = Λ > 2 and √ mι+1 > q mι for 1 6 ι < l, it is easy to see that that l 6 O(log∗ κ). Redefine ml−1 to equal m′l−1 which is the smallest multiple of ml−2 that is at least (logq κ)2 . Since ml−2 < (logq κ)2 , we have (logq κ)2 6 m′l−1 < 2(logq κ)2 . We also redefine ml to equal the largest multiple m′l of m′l−1 that is at most κ. This implies κ − m′l < m′l−1 . Note that √ ′ √ m′l−1 6 ml−2 q ⌈ ml−2 ⌉ and m′l 6 q ml−1 . For notational simplicity, let us re-denote m′l−1 and m′l by ml−1 and ml . Thus for these parameters, we can construct an (r0 , r1 , . . . , rl )-cascaded subspace design Ml with length-vector (m0 , m1 , . . . , ml ) and dimension-vector (d0 , d1 , . . . , dl−1 ) where dι > (1 − η/2ι+2 )mι . The construction time for subspace designs guaranteed by Theorem 10.4 implies that Ml can be constructed in poly(ml , q) time. We define the desired subspace U ⊂ Fκq as l U (Ml ) × 0κ−ml , i.e., U consists of the vectors in the canonical subspace U (Ml ) ⊂ Fm q padded with κ − ml zeroes at the end. By Observation 10.6, the dimension of U is at least ! l−1 X η ml > (1 − η/2)ml > (1 − η/2)(κ − ml−1 ) 1− ι 4 · 2 ι=0 > (1 − η/2)κ − 2(logq κ)2 > (1 − η)κ for large enough κ. This proves that the subspace U has dimension at least (1 − η)κ, and can be constructed deterministically in poly(q, κ) time. It remains to prove the claimed intersection property with ultra-periodic subspaces. Let T be an arbitrary (r, Λ)-ultra periodic affine subspace of Fκq . By Lemma 10.7, l of dimension at most r . Clearly, the projml (T ) ∩ U (M) is an affine subspace of Fm l q same dimension bound also holds for T ∩ U since the last κ − ml coordinates for vectors in U are set to 0. The proof is complete by noting that for our choice of parameters, l  rl 6 (2r/η)2 and l 6 O(log∗ κ). 11. Good list decodable subcodes of RS and AG codes We now combine our code constructions in Section 9 with a pre-coding step that restricts coefficients to belong to a subspace design, and thereby obtain subcodes that are list decodable with smaller list-size in polynomial time. AG CODES & NEAR-OPTIMAL LIST DECODING 45 11.1. Reed-Solomon codes. We begin with the case of Reed-Solomon codes. For a finite field Fq , constant ε > 0, integers n, k, m, s satisfying 1 6 k < n 6 q and 1 6 s 6 εm/12, we will define subcodes of RS(q,m) [n, k]. Below for a polynomial f ∈ Fqm [X] with k coefficients f0 , f1 , . . . , fk−1 , we denote by f0 , f1 , . . . , fk−1 the representation of these coefficients as vectors in Fm q by fixing some Fq -basis of Fq m . c of RS(q,m) [n, k] consisting of the encodings of f ∈ Fqm [X] such Define the subcode RS guaranteed by Theorem 10.5, when that (f0 , f1 , . . . , fk−1 ) ∈ V for a subspace V ⊆ Fmk q applied with the parameter choices Λ = m; b = k; r = s − 1; η=ε. c is an Fq -linear code over the alphabet Fqm of rate (1 − ε)k/n, and it can be Note that RS 2 constructed in deterministic q O(m ) time, or Las Vegas q O(ms) time.10 Theorem 11.1. Given an input string y ∈ Fnqm , a basis of an affine subspace of dimension at most O(s/ε) that includes all codewords of the above subcode within Hamming distance s s+1 (n − k) from y can be found in deterministic poly(n, log q, m) time. Proof. By Lemma 9.4, we can compute the (s − 1, m, k)-periodic subspace T of messages s whose Reed-Solomon encodings can be within Hamming distance s+1 (n − k) from y. By Theorem 10.5, the intersection T ∩ V is is an affine subspace over Fq of dimension d = O(s/ε). Since both steps involve only basic linear algebra, they can be accomplished  using poly(n, m) operations over Fq . By picking s = Θ(1/ε) and m = Θ(1/ε2 ) in the above construction, we can conclude the following. Corollary 11.2. For every R ∈ (0, 1) and ε > 0, and all large enough integers n < q with q a prime power, one can construct a rate R Fq -linear subcode of a Reed-Solomon code of length n over Fqm , such that the code can be (i) encoded in (n/ε)O(1) time and (ii) list decoded from a fraction (1 − ε)(1 − R) of errors in (n/ε)O(1) time, outputting a subspace over Fq of dimension O(1/ε2 ) including all close-by codewords. The code can be constructed deterministically in poly(q) time. We note that the above list decoding guarantee is in fact weaker than what is achieved for folded Reed-Solomon codes in [14], where the codewords were pinned down to a dimension O(1/ε) subspace. We can improve the list size above to poly(1/ε) using pseudorandom subspace-evasive sets as in [14], or to exp(ε−O(1) ) using the explicit subspace-evasive sets from [1]. The main point of the above result is not the parameters but that an explicit subcode of RS codes has optimal list decoding radius with polynomial complexity. 11.2. Subcodes of Garcia-Stichtenoth codes. We now pre-code the codes constructed in Section 9.3. For a finite field Fq , constant ε > 0, and integers s, m satisfying 1 6 s 6 O(εm/ log(1/ε)) and m > Ω(1/ε2 ), we will define subcodes of GS(q,m) [N, k] guaranteed by Theorem 9.14. Note that messages space of this code can be identified with Fmk q . d of GS(q,m) [N, k] consisting of the encodings of a subspace Define the subcode GS mk U ⊆ Fq guaranteed by Theorem 10.8, when applied with the parameter choices (42) η = ε; r = s − 1; Λ = m; κ = km . 10It can also be constructed in Monte Carlo (q/ε)O(1) time by randomly picking subspaces for the subspace design used to construct V in Theorem 10.5. 46 V. GURUSWAMI AND C. XING d is an Fq -linear code over the alphabet Fqm of rate (1 − ε)k/N . Also, it can Note that GS be constructed in poly(k, m, q) time by virtue of the construction complexity of U . Lemma 11.3. Given an input string y ∈ FN q m , a basis of an affine subspace of dimension at most O(log ∗ (km) (s/ε)2 that includes all codewords of the above subcode within Hamming distance √ 3N/( q − 1) from y can be found in deterministic poly(n, log q, m) time. s s+1 (N − k) − Proof. By Theorem 9.14, we can compute the (s − 1, m)-ultra periodic subspace T of √ s (N − k) − 3N/( q − 1) messages whose encodings can be within Hamming distance s+1 from y. By Theorem 10.8, for the above choice of parameters (42), the intersection T ∩ U O(log ∗ (km) . Since both steps involve only is is an affine subspace over Fq of dimension (s/ε)2 basic linear algebra, they can be accomplished using poly(N, m) operations over Fq .  By taking q = Θ(1/ε2 ), and choosing s = Θ(1/ε) and m = Θ(ε−2 log(1/ε)) in the above lemma, we conclude the following main result concerning the explicit construction of codes list decodable up to the Singleton bound. Theorem 11.4 (Main deterministic code construction). For every R ∈ (0, 1) and ε > 0, there is a deterministic polynomial time constructible family of error-correcting codes of rate R over an alphabet of size exp(O(ε−2 log2 (1/ε))) that can be list decoded in polynomialtime from a fraction (1  − R − ε) of errors, outputting a list of size at most ∗ exp1/ε exp1/ε (exp(O(log N ))) , where N is block length of the code. References [1] Zeev Dvir and Shachar Lovett, Subspace evasive sets, Proceedings of the 44th Symposium on Theory of Computing Conference (STOC), 2012, pp. 351–358. [2] Peter Elias, Error-correcting codes for list decoding, IEEE Transactions on Information Theory 37 (1991), 5–12. [3] Michael A. Forbes and Venkatesan Guruswami, Dimension expanders via rank condensers, 19th International Workshop on Randomization and Computation (RANDOM), 2015, pp. 800–814. [4] Arnaldo Garcia and Henning Stichtenoth, A tower of Artin-Schreier extensions of function fields attaining the Drinfeld-Vlădut bound, Inventiones Mathematicae 121 (1995), 211–222. [5] , On the asymptotic behavior of some towers of function fields over finite fields, Journal of Number Theory 61 (1996), no. 2, 248–273. [6] Venkatesan Guruswami, Cyclotomic function fields, Artin-Frobenius automorphisms, and list errorcorrection with optimal rate, Algebra and Number Theory 4 (2010), no. 4, 433–463. [7] , Linear-algebraic list decoding of folded Reed-Solomon codes, Proceedings of the 26th IEEE Conference on Computational Complexity, June 2011. [8] Venkatesan Guruswami and Swastik Kopparty, Explicit subspace designs, Combinatorica 36 (2016), no. 2, 161–185, Preliminary version in FOCS 2013. [9] Venkatesan Guruswami and Srivatsan Narayanan, Combinatorial limitations of average-radius listdecoding, IEEE Transactions on Information Theory 60 (2014), no. 10, 5827–5842. [10] Venkatesan Guruswami and Anindya Patthak, Correlated Algebraic-Geometric codes: Improved list decoding over bounded alphabets, Mathematics of Computation 77 (2008), no. 261, 447–473. [11] Venkatesan Guruswami and Atri Rudra, Explicit codes achieving list decoding capacity: Errorcorrection with optimal redundancy, IEEE Transactions on Information Theory 54 (2008), no. 1, 135–150. [12] , Better binary list decodable codes via multilevel concatenation, IEEE Trans. Information Theory 55 (2009), no. 1, 19–26. [13] Venkatesan Guruswami and Madhu Sudan, Improved decoding of Reed-Solomon and Algebraicgeometric codes, IEEE Transactions on Information Theory 45 (1999), no. 6, 1757–1767. AG CODES & NEAR-OPTIMAL LIST DECODING 47 [14] Venkatesan Guruswami and Carol Wang, Linear-algebraic list decoding for variants of reed-solomon codes, IEEE Transactions on Information Theory 59 (2013), no. 6, 3257–3268. [15] Venkatesan Guruswami, Carol Wang, and Chaoping Xing, Explicit list-decodable rank-metric and subspace codes via subspace designs, IEEE Trans. Information Theory 62 (2016), no. 5, 2707–2718. [16] Venkatesan Guruswami and Chaoping Xing, Folded codes from function field towers and improved optimal rate list decoding, Proceedings of the 44th Symposium on Theory of Computing Conference (STOC), 2012, pp. 339–350. [17] , List decoding Reed-Solomon, algebraic-geometric, and Gabidulin subcodes up to the Singleton bound, Proceedings of the ACM Symposium on Theory of Computing Conference (STOC), 2013, pp. 843–852. [18] Venkatesan Guruswami, Chaoping Xing, and Chen Yuan, Subspace designs based on algebraic function fields, 44th International Colloquium on Automata, Languages, and Programming (ICALP), 2017, pp. 86:1–86:10. [19] Swastik Kopparty, Noga Ron-Zewi, and Shubhangi Saraf, Personal communication, 2017. [20] Harald Niederreiter and Chaoping Xing, Rational points on curves over finite fields–theory and applications, Cambridge University Press, 2001. [21] Farzad Parvaresh and Alexander Vardy, Correcting errors beyond the Guruswami-Sudan radius in polynomial time, Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science, 2005, pp. 285–294. [22] Ba-Zhong Shen, A Justesen construction of binary concatanated codes that asymptotically meet the Zyablov bound for low rate, IEEE Transactions on Information Theory 39 (1993), 239–242. [23] Kenneth Shum, Ilia Aleshnikov, P. Vijay Kumar, Henning Stichtenoth, and Vinay Deolalikar, A low-complexity algorithm for the construction of algebraic-geometric codes better than the GilbertVarshamov bound, IEEE Transactions on Information Theory 47 (2001), no. 6, 2225–2241. [24] Joseph H. Silverman, The arithmetic of elliptic curves, Springer, New York, 1985. [25] Henning Stichtenoth, Algebraic function fields and codes, Universitext, Springer-Verlag, Berlin, 1993. [26] Madhu Sudan, Decoding of Reed-Solomon codes beyond the error-correction bound, Journal of Complexity 13 (1997), no. 1, 180–193. [27] Salil Vadhan, Pseudorandomness, Foundations and Trends in Theoretical Computer Science 7(1-3): 1-336 (2012) Computer Science Department, Carnegie Mellon University, Pittsburgh, USA. E-mail address: [email protected] Division of Mathematical Sciences, School of Physical & Mathematical Sciences, Nanyang Technological University, Singapore. E-mail address: [email protected]
7cs.IT
APPLICATION OF SIGNAL ANALYSIS TO THE EMBEDDING PROBLEM OF Zk -ACTIONS arXiv:1709.00125v1 [math.DS] 1 Sep 2017 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Abstract. We study the problem of embedding arbitrary Zk -actions into the shift Zk action on the infinite dimensional cube [0, 1]D . We prove that if a Zk -action X satisfies the marker property (in particular if X is a minimal system without periodic points) and if its mean dimension is smaller than D/2 then we can embed it in the Zk shift on [0, 1]D . The value D/2 here is optimal. The proof goes through signal analysis. We develop the theory of encoding Zk -actions into band-limited signals and apply it to proving the above statement. Main technical difficulties come from higher dimensional phenomena in signal analysis. We overcome them by exploring analytic techniques tailored to our dynamical settings. The most important new idea is to encode the information of a tiling of Rk into a band-limited function which is constructed from another tiling. 1. Introduction 1.1. Background. The main purpose of this paper is to deepen interactions between signal analysis and dynamical systems. (This subsection is just a motivation. So readers can skip unfamiliar/undefined terminologies.) If we think of signal analysis in a broad sense (like signal analysis ≈ Fourier analysis), then applications of signal analysis are ubiquitous in ergodic theory. For example, Fourier analysis proof of the unique ergodicity of the irrational rotation (due to Weyl) is a milestone of such applications. But here we would like to think of signal analysis in a narrower sense, say signal analysis is a part of communication theory. From this viewpoint, a masterpiece is Shannon’s work on communications over band-limited channels with Gaussian noise ([Sha48], [CT06, Chapter 9]): Suppose that we try to send information by using signals (say, of telephone line) whose frequencies are limited in [−W/2, W/2]. If the averaged power of signal is P and if the noise is additive white Gaussian noise of spectral density N, then the capacity of the channel (i.e. the amount of information we can send by using this channel) is given by Date: February 14, 2018. 2010 Mathematics Subject Classification. 37B05, 54F45, 94A12. Key words and phrases. Band-limited signal, dynamical system, Zk -action, mean dimension, embedding, tiling of Rk . Y.G. was partially supported by the Marie Curie grant PCIG12-GA-2012-334564 and the National Science Center (Poland) grant 2016/22/E/ST1/00448. Y.Q. was partially supported by NNSF of China (11371339 and 11571335). M.T. was supported by John Mung Program of Kyoto University. 1 2 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO the formula   W P Capacity = bits per second. log2 1 + 2 NW The details of this formula are not important here. We just would like to emphasize that the band-width W is a crucial parameter in the communications over band-limited channels. Recently the first and third named authors [GT] found an analogous theory in the context of topological dynamics. They started the theory of encoding arbitrary dynamical systems into band-limited signals and applied it to solving an open problem posed by Lindenstrauss [Lin99] in 1999. The purpose of the present paper is to expand this theory to multi-dimensional case. 1.2. Encoding into discrete signals. We start from a problem seemingly unrelated to signal analysis. Let k be a natural number. A triple (X, Zk , T ) (often abbreviated to X) is called a dynamical system if X is a compact metric space and T : Zk × X → X, (n, x) 7→ T n x is a continuous action. A fundamental example of dynamical systems is the shift action on the infinite dimensional cube. Let D be a natural number. Consider the infinite Zk Zk Zk be the shift: → [0, 1]D product [0, 1]D . Let σ : Zk × [0, 1]D σ m ((xn )n∈Zk ) = (xn+m )n∈Zk .  Zk k  Zk The triple [0, 1]D , Z , σ is a dynamical system and called the shift on [0, 1]D . We study the old problem of embedding arbitrary dynamical systems in the shift on Zk Zk is called [0, 1]D . Let (X, Zk , T ) be a dynamical system. A map f : X → [0, 1]D k an embedding of a dynamical system if f is a Z -equivariant continuous injection. We Zk would like to understand when X can be embedded in the shift on [0, 1]D . Notice that Zk every compact metric space can be topologically embedded in [0, 1]D . So the problem is a genuinely dynamical question. It will be convenient later to see the problem from a slightly different viewpoint: A point Zk can be seen as a discrete signal 1 valued in [0, 1]D . Then the x = (xn )n∈Zk in [0, 1]D embedding problem asks when we can encode a given dynamical system X into discrete signals. We review the history of the problem before explaining our main result (Main Theorem 1 below). The embedding problem was first studied by Jaworski [Jaw74] in 1974. For understanding his result, notice that periodic points form an obvious obstruction to the Zk embedding. For example, the shift on ([0, 1]2 ) cannot be embedded in the shift on k k Zk [0, 1]Z because the fixed points sets of ([0, 1]2 ) and [0, 1]Z are homeomorphic to the 1When k = 2, it might be better to call x a discrete image. EMBEDDING PROBLEM OF Zk -ACTIONS 3 square [0, 1]2 and the line segment [0, 1] respectively and the square cannot be topologically embedded in the line segment. A dynamical system (X, Zk , T ) is said to be aperiodic if T n x 6= x for all x ∈ X and nonzero n ∈ Zk . Jaworski [Jaw74] proved that periodic points are the only obstruction if X is a finite dimensional system: Theorem 1.1 (Jaworski, 1974). Let (X, Z, T ) be an aperiodic finite dimensional dynamical system. Then we can embed it in the shift on [0, 1]Z . Although this theorem is stated only for Z-actions, it can be easily generalized to Zk actions. (Indeed the Zk -case can be deduced from the Z-case.) After Jaworski, people were interested in whether the assumption of finite dimensionality is essential or not. Auslander [Aus88, p. 193] asked whether we can embed every minimal system (X, Z, T ) in the shift on [0, 1]Z . A system (X, Zk , T ) is said to be minimal if the orbit {T n x}n∈Zk is dense in X for every x ∈ X. When k = 1, minimal systems X have no periodic points unless X is a finite set. (If X is finite, then it can be obviously embedded in the shift on [0, 1]Z .) Therefore the question essentially asks whether there is another obstruction different from periodic points. Lindenstrauss–Weiss [LW00] found that mean dimension provides a new obstruction to the embedding. Mean dimension (first introduced by Gromov [Gro99]) is a topological invariant of dynamical systems which counts the average number of parameters of a given system. The mean dimension of (X, Zk , T ) is denoted by mdim(X). We review its definition in Subsection 2.1. Finite dimensional systems and finite topological entropy systems are known to have zero mean dimension. Zk is equal to D, which means that The mean dimension of the shift on [0, 1]D k  Z has D parameters in average. If (X, Zk , T ) can be embedded in the shift [0, 1]D Zk on [0, 1]D then mdim(X) ≤ D. Lindenstrauss–Weiss [LW00, Proposition 3.5] constructed a minimal system (X, Z, T ) of mean dimension strictly greater than one. This system cannot be embedded in the shift on [0, 1]Z although it is minimal. Thus it solved Auslander’s question. Lindenstrauss went further; he proved a partial converse [Lin99, Theorem 5.1]. Theorem 1.2 (Lindenstrauss, 1999). If a minimal system (X, Z, T ) satisfies mdim(X) < Z D/36 then we can embed it in the shift on [0, 1]D . Lindenstrauss [Lin99, p. 229] asked the problem of improving the condition mdim(X) < D/36. This problem was solved by the first and third named authors [GT, Theorem 1.4]: Theorem 1.3 (Gutman–Tsukamoto). If a minimal system (X, Z, T ) satisfies mdim(X) < Z D/2 then we can embed it in the shift on [0, 1]D . The condition mdim(X) < D/2 is optimal because there exists a minimal system Z (X, Z, T ) of mean dimension D/2 which cannot be embedded in the shift on [0, 1]D 4 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO ([LT14]). Theorem 1.3 can be seen as a dynamical analogue of the classical theorem in dimension theory [HW41, Thm. V2]: A compact metric space X can be topologically embedded in [0, 1]D if dim X < D/2. We review the proof of this classical result in Subsection 2.3. A motivation of the present paper is to generalize Theorem 1.3 to Zk -actions. It is convenient to introduce the following notion. A dynamical system (X, Zk , T ) is said to satisfy the marker property if for every natural number N there exists an open set U ⊂ X satisfying [ U ∩ T −n U = ∅ (0 < |n| < N), X = T −n U. n∈Zk This property obviously implies the aperiodicity. The following dynamical systems are known to satisfy the marker property: • Aperiodic minimal systems. (This is an immediate fact from the definition.) • Aperiodic finite dimensional systems ([Gut12, Theorem 6.1])2. • If X satisfies the marker property and if π : Y → X is an extension (i.e. Zk equivariant continuous surjection) then Y also satisfies the marker property. The authors do not know an example of aperiodic actions which do not satisfy the marker property. Lindenstrauss and the first and third named authors [GLT16, Theorem 1.5] proved: Theorem 1.4 (Gutman–Lindenstrauss–Tsukamoto, 2016). If a dynamical system (X, Zk , T ) satisfies the marker property and D mdim(X) < then we can embed it in the shift on [0, 1]2D Zk 2k+1 . After stating this theorem, the paper [GLT16] posed the problem of improving the condition mdim(X) < D/2k+1. Quoting [GLT16, p. 782]: Note also that in our condition mdim(X) < D/2k+1, the constant involved is likely far from optimal. Presumably for an aperiodic Zk -system k if mdim(X) < D2 then X can be embedded in ([0, 1]D )Z . The first main theorem of the present paper confirms this conjecture under the assumption of the marker property: 2More generally, we can prove that if an aperiodic dynamical system satisfies the small boundary property then it satisfies the marker property. The small boundary property is a notion introduced by Lindenstrauss–Weiss [LW00, Definition 5.2], which is satisfied by every aperiodic finite dimensional system. We do not use these facts. So we omit the detailed explanation. EMBEDDING PROBLEM OF Zk -ACTIONS 5 Main Theorem 1. If a dynamical system (X, Zk , T ) satisfies the marker property and mdim(X) < then we can embed it in the shift on [0, 1]D Zk D , 2 . As in the case of Theorem 1.3, the condition mdim(X) < D/2 is optimal because the paper [LT14]3 provides an example of aperiodic minimal system (X, Zk , T ) of mean Zk dimension D/2 which cannot be embedded in the shift on [0, 1]D . Main Theorem 1 has some novelty even in the case of k = 1: Since both aperiodic finite dimensional systems and aperiodic minimal systems satisfy the marker property, Main Theorem 1 unifies Jaworski’s theorem (Theorem 1.1) and Theorem 1.3 into a single statement. 1.3. Encoding into band-limited signals. A discovery of the paper [GT] is that we can approach to the embedding problem in Subsection 1.2 via signal analysis. We need to prepare some terminologies. For a rapidly decreasing function ϕ : Rk → C we define its Fourier transforms by Z √ F (ϕ)(ξ) = ϕ̂(ξ) = ϕ(t) e−2π −1t·ξ dt1 . . . dtk , k ZR √ F(ϕ)(t) = ϕ̌(t) = ϕ(ξ) e2π −1t·ξ dξ1 . . . dξk . Rk  It follows that F F (ϕ) = F (F (ϕ)) = ϕ. We extend F and F to tempered distributions ψ by the dualities hF (ψ), ϕi = hψ, F(ϕ)i and hF(ψ), ϕi = hψ, F (ϕ)i where ϕ are rapidly √ decreasing functions (Schwartz [Sch66, Chapter 7]). For example, if ψ(t) = e2π −1a·t (a ∈ Rk ) then F (ψ) = δa is the delta probability measure at a. Let a1 , . . . , ak be positive numbers. A bounded continuous function ϕ : Rk → R is said to be band-limited in [−a1 /2, a1 /2] × · · · × [−ak /2, ak /2] if the Fourier transform ϕ̂ satisfies h a a i h a a i 1 k 1 k supp ϕ̂ ⊂ − , ×···× − , , 2 2 2 2 which means that hϕ̂, φi = hϕ, φ̌i = 0 for all rapidly decreasing functions φ satisfying h a a i h a a i k 1 k 1 ×···× − , = ∅. supp φ ∩ − , 2 2 2 2 For example, when k = 1, the functions sin(πt1 ), cos(πt1 ), sin(πt1 ) πt1 are band-limited in [−1/2, 1/2]. We define B(a1 , . . . , ak ) as the Banach space of all bounded continuous functions ϕ : Rk → R band-limited in [−a1 /2, a1 /2] × · · · × [−ak /2, ak /2]. Its norm is the L∞ -norm. 3Strictly speaking, the paper [LT14] considered only the case of k = 1. But their construction can be generalized to Zk -actions without any changes. 6 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO We define B1 (a1 , . . . , ak ) as the set of ϕ ∈ B(a1 , . . . , ak ) satisfying ||ϕ||L∞ (Rk ) ≤ 1. In this paper we promise that the space B1 (a1 , . . . , ak ) is always endowed with the topology of uniform convergence over compact subsets. Namely B1 (a1 , . . . , ak ) is endowed with the topology given by the distance ∞ X  d(ϕ, ψ) = 2−n ||ϕ − ψ||L∞ (Bn ) , Bn = {t ∈ Rk | |t| ≤ n} . n=1 B1 (a1 , . . . , ak ) is compact (see Corollary 2.3 below) and endowed with a natural continuous action of Zk defined by σ : Zk × B1 (a1 , . . . , ak ) → B1 (a1 , . . . , ak ), σ n (ϕ)(t) = ϕ(t + n). We call the dynamical system (B1 (a1 , . . . , ak ), Zk , σ) the shift on B1 (a1 , . . . , ak ). Its mean dimension is equal to the product4 a1 . . . ak , which is a multi-dimensional version of band-width W introduced in Subsection 1.1. As band-width W plays a crucial role in Shannon’s theory, the quantity a1 . . . ak becomes a key parameter below. We consider the problem of embedding arbitrary dynamical systems in the shift on B1 (a1 , . . . , ak ). In other words we ask when we can encode a given dynamical system into band-limited signals. When k = 1, the first and third named authors [GT, Theorem 1.7] proved: Theorem 1.5 (Gutman–Tsukamoto). If an aperiodic minimal system (X, Z, T ) satisfies mdim(X) < a1 /2 then we can embed it in the shift on B1 (a1 ). The second main theorem of the present paper generalizes this theorem to the higher dimensional case: Main Theorem 2. If a dynamical system (X, Zk , T ) satisfies the marker property and a1 . . . ak , mdim(X) < 2 then we can embed it in the shift on B1 (a1 , . . . , ak ). As in the case of Main Theorem 1, the condition mdim(X) < a1 . . . ak /2 is optimal because a modification of [LT14] provides an aperiodic minimal system (X, Zk , T ) of mean dimension a1 . . . ak /2 which cannot be embedded in the shift on B1 (a1 , . . . , ak ). We can prove Main Theorem 1 by using Main Theorem 2. Proof: Main Theorem 2 implies Main Theorem 1. From mdim(X) < D/2 we can choose positive numbers a1 , . . . , ak satisfying a1 . . . ak . a1 < D, a2 < 1, . . . , ak < 1, mdim(X) < 2 4This fact is not used in the paper. So we omit the proof. EMBEDDING PROBLEM OF Zk -ACTIONS 7 Main Theorem 2 implies that we can embed X in the shift on B1 (a1 , . . . , ak ). We define a lattice Λ ⊂ Rk by  o n n 1 , n2 , . . . , nk n1 , n2 . . . , nk ∈ Z . Λ= D It follows from a sampling theorem (see Lemma 2.4 below) that the map B1 (a1 , . . . , ak ) → [−1, 1]Λ , ϕ 7→ ϕ|Λ is injective. Set e = (1/D, 0, . . . , 0) ∈ Rk . The above injectivity means that the Zk equivariant map B1 (a1 , . . . , ak ) → [−1, 1]D Zk , ϕ 7→ (ϕ(n), ϕ(n + e), . . . , ϕ (n + (D − 1)e))n∈Zk is an embedding. Since the system X can be embedded in the shift on B1 (a1 , . . . , ak ), it Zk can be also embedded in the shift on [−1, 1]D , which is obviously isomorphic to the Zk shift on [0, 1]D .  1.4. One dimension versus multi-dimension; what are the main difficulties? This subsection explains what are the main difficulties in the proof of Main Theorem 2. When the authors started the research of this paper, they optimistically thought that the proof of Main Theorem 2 is probably more or less a direct generalization of the proof of Theorem 1.5 in [GT]. This expectation turned out to be wrong. Completely new difficulties arose in the context of signal analysis. The paper [GT] used the technique of one dimensional signal analysis. The proof of Main Theorem 2 uses mutli-dimensional signal analysis. The difference of one dimension/multi-dimension is fundamental and causes big changes of the approaches significantly. We review some basic signal analysis in Subsection 2.2 below. The main results there are Paley–Wiener’s theorem (Lemma 2.2) and a sampling theorem (Lemma 2.4) for functions in B(a1 , . . . , ak ), whose proofs are a simple generalization of (or a reduction to) the corresponding theorems in one-variable case. They might give readers an impression that multi-dimensional signal analysis is just a simple generalization of one-dimensional signal analysis. This is far from being true. It is well-known in classical analysis community (cf. [OU12]) that multi-dimensional signal analysis is inherently more difficult than onedimensional signal analysis. Some important theorems in one-dimensional case cannot be generalized to higher dimension. For explaining further, we need to recall the statement of Paley–Wiener’s theorem (Lemma 2.2): A bounded continuous function f : Rk → R belongs to B(a1 , . . . , ak ) if and only if it can be extended to a holomorphic function in Ck satisfying √  √ f x1 + y1 −1, . . . , xk + yk −1 ≤ const · eπ(a1 |y1 |+···+ak |yk |) . 8 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Roughly speaking, band-limited functions are the same as holomorphic functions of exponential type. Therefore we can say that signal analysis is a part of complex analysis5. Then it is easy to see why multi-dimensional case is more difficult than one-dimensional case: Zero points of holomorphic functions in C are isolated, whereas zero points of holomorphic functions in Ck (k ≥ 2) form positive dimensional complex varieties whose geometry are highly nontrivial in general. This causes a fundamental difference in the nature of one-dimensional/multi-dimensional signal analysis. More concretely speaking, we face difficulties of higher dimension in the following two issues. (The second issue is more serious than the first one.) (1) Interpolation: Sampling and interpolation are the most basic themes of signal analysis. We recall a sampling theorem stated in Lemma 2.4 with a bit simplifidef cation6: Let f ∈ B(1, . . . , 1) and 0 < c < 1. If f vanishes over Λ = cZk then f is identically zero. This theorem is valid for all dimensions. The crucial point of the statement is that we consider only regular sampling, which means that the fundamental domain [0, c]k of the sampling set Λ = cZk is similar to the frequency domain [−1/2, 1/2]k . It is also easy to prove the following regular interpolation theorem: If c > 1 then the map B(1, . . . , 1) → ℓ∞ (cZk ), f 7→ (f (λ))λ∈cZk is surjective. When k = 1, Beurling [Beu89] proved that essentially the same results also hold for irregular sampling/interpolation: Let Λ ⊂ R be a uniformly discrete set, i.e. the infimum of |λ1 − λ2 | over distinct λ1 , λ2 ∈ Λ is positive. Suppose the lower density #(Λ ∩ [t, t + R]) lim inf inf R→∞ t∈R R is larger than 1. Under this setting, Beurling proved that if f ∈ B(1) vanishes over Λ then f is identically zero. Similarly, he also proved that if Λ ⊂ R is a uniformly discrete set and its upper density lim sup sup R→∞ t∈R #(Λ ∩ [t, t + R]) R is smaller than 1, then the map B(1) → ℓ∞ (Λ), 5Of f 7→ (f (λ))λ∈Λ course this is over-simplified. Signal analysis is a mutli-faceted discipline and cannot be classified as a sub-area of complex analysis. For example, we emphasized its communication theory aspect in Subsection 1.1. But the complex analysis viewpoint is convenient here. 6 Here we state a (seemingly) simpler version of the theorem for clarifying the argument, but indeed this statement is equivalent to Lemma 2.4. EMBEDDING PROBLEM OF Zk -ACTIONS 9 is surjective. Therefore only the lower/upper density of Λ determines its sampling/interpolation property. When k ≥ 2, the situation is much more messy. We have no clear theorems valid for irregular sampling and interpolation (see [OU12] for the details). For example, consider       t2 t2 2 Λ1 = ε t1 , t1 , t2 ∈ Z , Λ2 = ε t1 , 2 t1 , t2 ∈ Z (ε > 0). ε ε Suppose ε is very small. The density of Λ1 is equal to 1/ε (very large) and the density of Λ2 is equal to ε (very small). The function f (z1 , z2 ) = sin(πεz2 ) ∈ B(1, 1) vanishes over Λ1 but is not identically zero. Thus Λ1 is not a sampling set for functions in B(1, 1) although its density is very large. Similarly, it is also easy to prove that Λ2 is not an interpolation set for B(1, 1), namely the map B(1, 1) → ℓ∞ (Λ2 ), f 7→ (f (λ))λ∈Λ2 is not surjective, although its density is very small. In the proof of Main Theorem 2 we need to construct interpolating functions for some irregular sets Λ ⊂ Rk . The paper [GT] addressed the same problem (in dimension one) by employing Beurling’s interpolation theorem mentioned above. But this theorem is not valid in higher dimension. (2) Zero points of band-limited maps f : Ck → Ck : One crucial ingredient of the proof of Main Theorem 2 is the study of (isolated) zero points7 of some holomorphic maps f = (f1 , . . . , fk ) : Ck → Ck all of whose entries fi are band-limited functions. We call such a map f a band-limited map. It becomes important to know the growth of (1.1) {z ∈ Ck | z is an isolated zero point of f with |z| < R} as R goes to infinity. If k = 1, then this is a very easy problem. It follows from Jensen’s formula or Nevanlinna’s first main theorem ([Hay64, Section 1.3], [NW14, Section 1.1]) that if f ∈ B(a) then Z R dr #{z ∈ C| f (x) = 0, |z| < r} ≤ 2aR + constf . r 1 In particular (1.1) grows at most linearly in R. Moreover if f ∈ B(a) has no zero points, then it must be of the form f (z) = eαz+β for some constants α and β. 7A point p ∈ Ck is a zero point of f : Ck → Ck if f (p) = 0. Notice that the domain and target of f have the same dimension. Therefore generically zero points of f are expected to be isolated. 10 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO When k ≥ 2, the situation is radically different. First, we have no simple description of f : Ck → Ck having no zero points. For example, the map of the form f (z1 , z2 ) = (eαz1 +β , f2 (z1 , z2 )), (f2 (z1 , z2 ): arbitrary band-limited function), have no zero points. Second (and more importantly), the set (1.1) may have arbitrarily fast growth. This inconvenient phenomena was first observed by Cornalba– Shiffman [CS72] and known as the failure of the transcendental Bezout theorem. Here we briefly review their construction (with minor modification). Let {αn }∞ n=1 2n be an arbitrary sequence of positive integers (say, αn = 2 ). We choose a polynomial pn (w) (of one-variable) having αn zeros in |w| < 1. Let ϕ : R → R be a (nonzero) rapidly decreasing function satisfying supp ϕ̂ ⊂ [−1/2, 1/2]. We choose βn > 0 so that the function def gn (w) = βn ϕ(w)pn (w) is bounded by 2−n over R. We define f = (f1 , f2 ) : C2 → C2 as follows: f1 (z1 , z2 ) = sin(πz1 ), f2 (z1 , z2 ) = ∞ X n=1 gn (z2 ) sin π(z1 − n) . π(z1 − n) Both f1 and f2 belong to B(1, 1). The map f has αn zero points of the form (n, w) (|w| < 1). Therefore #{z ∈ C2 | z is an isolated zero point of f and |z| < n + 1} ≥ αn . As a conclusion, it is hard (and sometimes impossible) to control the set (1.1) in higher dimension. The above two issues show that general theory of multi-dimensional signal analysis is not strong enough for the proof of Main Theorem 2. Thus we have to develop tailored methods specific for the situation of the theorem. This becomes the main technical task of the paper. We address the issues (1) and (2) in Sections 4 and 5 respectively. The techniques developed there seem to have some independent interests, and possibly further applications will be found in a future. The key ideas are as follows. (Here we ignore many details for simplicity. The real arguments are different.) (1)’ Almost regular interpolation: As we mentioned above, we need to construct interpolation for some irregular sets Λ ⊂ Rk . But our sets Λ are not completely general uniformly discrete sets. They are “almost” regular sets in the sense that we have a decomposition Λ= ∞ [ n=1 Λn EMBEDDING PROBLEM OF Zk -ACTIONS 11 Figure 1.1. Almost regular interpolation set Λ. Different pieces Λm and Λn are sufficiently far from each other. such that each Λn is a part of a regular interpolation set and that the distances between different pieces Λm and Λn are sufficiently large. See Figure 1.1. We develop a technique of constructing interpolation for such almost regular sets. As a conclusion, we can prove that they have (essentially) all the nice properties which regular interpolation sets possess. (2)’ Good/bad decomposition of the space: It is very difficult in general to control the zero points of holomorphic maps f : Ck → Ck . The maps f used in the proof of Main Theorem 2 are very special, but still we cannot control all their (isolated) zero points. Therefore we simply give up to control all the zero points of f . Instead we decompose the space Ck into two disjoint regions: Ck = G ∪ B. In the “good region”G, the zero points of f are very sparsely distributed and we can control them as we like. In the “bad region” B, the zero points of f may have extremely high density, but the region B itself is very tiny. See Figure 1.2. We consider a Voronoi diagram with respect to the zero points of f . Then most of the space Ck is cover by very large (and hence well organized) tiles whose Voronoi centers are zero points in G. We don’t have any control of tiles whose centers are located in B. They may have very complicated structure. But every messy phenomena is confined in the tiny region B and does not affect much the whole picture. In Subsection 3.1 we state a key proposition (Proposition 3.1) and prove Main Theorem 2 assuming it. The rest of the paper is devoted to the proof of Proposition 3.1. The strategy of the proof is explained in Subsection 3.2. It might be better for some readers to go to Subsections 3.1 and 3.2 before reading Section 2. 12 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Figure 1.2. Schematic picture of the good/bad decomposition. Zero points of f are sparsely and almost regularly distributed inside the good region G. The bad region B may contain plenty of zero points but it is tiny. 1.5. Organization of the paper. In Section 2 we review mean dimension, band-limited functions, simplicial complexes and convex sets. In Section 3 we state the main proposition and prove Main Theorem 2 assuming it. In particular, we give an overview of the proof of the main theorem. In Section 4 we construct interpolating functions. In Section 5 we construct certain “tiling-like maps” and study their properties. In Section 6 we prove the main proposition by using the results in Sections 2, 4 and 5. In Section 7 we explain some open problems. Acknowledgement. This paper was written when the third named author stayed in the Einstein Institute of Mathematics in the Hebrew University of Jerusalem. He would like to thank the institute for its hospitality. 2. Preliminaries 2.1. Review of mean dimension. Here we review the definition of mean dimension [Gro99, LW00]. Throughout this paper we promise that every simplicial complex is finite (i.e. it has only finitely many simplicies) and that for a natural number N [N] = {0, 1, 2, . . . , N − 1}k . Let (X, d) be a compact metric space and Y a topological space. Let ε be a positive number and f : X → Y a continuous map. f is said to be an ε-embedding if diamf −1 (y) < ε for all y ∈ Y . We define the ε-width dimension Widimε (X, d) as the minimum integer n such that there exist an n-dimensional simplicial complex P and an ε-embedding f : X → P . This is a macroscopic dimension of X in the scale of ε. The EMBEDDING PROBLEM OF Zk -ACTIONS 13 topological dimension dim X can be obtained by8 dim X = lim Widimε (X, d). ε→0 k Let (X, Z , T ) be a dynamical system, namely X is a compact metric space (with a distance d) and T : Zk × X → X is a continuous action. For a finite subset Ω ⊂ Zk we define a distance dΩ on X by dΩ (x, y) = max d(T n x, T n y). n∈Ω It is easy to check the following subadditivity and invariance: Widimε (X, dΩ1 ∪Ω2 ) ≤ Widimε (X, dΩ1 ) + Widimε (X, dΩ2 ), Widimε (X, da+Ω ) = Widimε (X, dΩ ) (a ∈ Zk , a + Ω = {a + x| x ∈ Ω}). Then by the standard division argument we can show the existence of the limit  Widimε X, d[N ] lim . N →∞ Nk We define the mean dimension of (X, Zk , T ) by ! Widim X, d ε [N ] . mdim(X, Zk , T ) = lim lim ε→0 N →∞ Nk This is a topological invariant, namely it is independent of the choice of the distance d. We usually abbreviate this to mdim(X). 2.2. Review of band-limited functions. Here we review some basic theorems on band-limited functions. Throughout this subsection we assume that a1 , . . . , ak are pos√ itive numbers. We denote by z = x + y −1 the standard coordinate of Ck with x = (x1 , . . . , xk ), y = (y1 , . . . , yk ) ∈ Rk . Lemma 2.1. Let f : Ck → C be a holomorphic function such that there exists C > 0 √  satisfying f x + y −1 ≤ Ceπ(a1 |y1 |+···+ak |yk |) . Then it follows that √  f x + y −1 ≤ ||f ||L∞ (Rk ) eπ(a1 |y1 |+···+ak |yk |) . Proof. The paper [GT, Lemma 2.1] proves this for f : C → C. So we consider the √ √  √ case of k > 1. Fix x + y −1 ∈ Ck . For s + t −1 ∈ C we set g s + t −1 = √  f x + y s + t −1 . g is a holomorphic function satisfying √  g s + t −1 ≤ Ceπ|t|(a1 |y1 |+···+ak |yk |) . √  By the statement of the one variable case, g s + t −1 is bounded by ||g||L∞ (R) eπ|t|(a1 |y1 |+···+ak |yk |) ≤ ||f ||L∞ (Rk ) eπ|t|(a1 |y1 |+···+ak |yk |) . 8If readers do not know the definition of topological dimension, then they may think that this is the definition of topological dimension. Only one nontrivial point is that dim X is a topological invariant whereas Widimε (X, d) depends on the distance d. 14 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Letting s = 0 and t = 1, we get the statement.  Lemma 2.2 (Paley–Wiener’s theorem). Let f : Rk → C be a bounded continuous function. Then the following two conditions are equivalent. Q (1) The Fourier transform fˆ is supported in k [−ai /2, ai /2]. i=1 (2) f can be extended to a holomorphic function in Ck such that there exists C > 0 √  satisfying f x + y −1 ≤ Ceπ(a1 |y1 |+···+ak |yk |) . Proof. This is a special case of a distribution version of Paley–Wiener’s theorem ([Sch66, Chapter 7, Section 8]). Here we prove it directly only by using the standard version of Paley–Wiener’s theorem ([DM72, Section 3.3]): For a (one-variable) L2 -function f : R → Q C, the above two Conditions (1) and (2) are equivalent. Set Ω = ki=1 [−ai /2, ai /2]. First we assume that f : Rk → C is a L2 -function and prove (1) ⇔ (2). Suppose f satisfies (1). Then Z Z √ √ 2π −1x·ξ ˆ f (x) = f (ξ)e dξ1 . . . dξk = fˆ(ξ)e2π −1x·ξ dξ1 . . . dξk . Rk Ω We extend f to a holomorphic function in Ck by Z √ √ √  f x + y −1 = fˆ(ξ)e2π −1(x+y −1)·ξ dξ1 . . . dξk . Ω Then we can check Condition (2): Z √  f x + y −1 ≤ |fˆ(ξ)|e−2πy·ξ dξ1 . . . dξk ≤ const · eπ(a1 |y1 |+···+ak |yk |) . Ω Next suppose f satisfies (2). Fix ξ ∈ Rk and suppose |ξ1 | > a1 /2. We will show fˆ(ξ) = 0. We fix x2 , . . . , xk and consider f (x1 , . . . , xk ) as a one-variable function of variable x1 . This is a L2 -function (of variable x1 ) for almost every choice of (x2 , . . . , xk ).  √ It follows from f x1 + y1 −1, x2 , . . . , xk ≤ const · eπa1 |y1 | and the standard Paley– Wiener’s theorem that Z ∞ √ f (x1 , x2 , . . . , xk )e−2π −1x1 ξ1 dx1 = 0 for a.e. (x2 , . . . , xk ). −∞ Therefore Z fˆ(ξ) = Rk−1 Z ∞ −∞ √ −2π −1x1 ξ1 f (x1 , x2 , . . . , xk )e  dx1 e−2π √ −1(x2 ξ2 +···+xk ξk ) dx2 . . . dxk = 0. Thus the proof has been completed under the assumption f ∈ L2 . Next we only assume that f : Rk → C is a bounded continuous function. We choose a rapidly decreasing function ϕ : Rk → R such that maxx∈Rk |ϕ(x)| = ϕ(0) = 1 and supp ϕ̂ ⊂ (−1/2, 1/2)k . We set ϕε (x) = ϕ(εx) for ε > 0. It satisfies ϕ̂ε (ξ) = ε−k ϕ̂(ξ/ε) and hence supp ϕ̂ε ⊂ (−ε/2, ε/2)k . ϕε converges to 1 uniformly over every compact subset EMBEDDING PROBLEM OF Zk -ACTIONS 15 of Rk as ε → 0. Since ϕε is rapidly decreasing (and hence in L2 ), we can extend it to a holomorphic function satisfying √  ϕε x + y −1 ≤ eπε(|y1 |+···+|yk |) (here we used Lemma 2.1). (2.1) We set fε (x) = ϕε (x)f (x). Then fε is a L2 -function and satisfies |fε (x)| ≤ |f (x)|. Q Suppose f satisfies (1). Then fˆε is supported in ki=1 [−(ai + ε)/2, (ai + ε)/2]. Thus by the previous argument for L2 -functions and Lemma 2.1, we can extend fε to a holomorphic function satisfying √  fε x + y −1 ≤ ||fε ||L∞ (Rk ) eπ{(a1 +ε)|y1 |+···+(ak +ε)|yk |} (2.2) ≤ ||f ||L∞ (Rk ) eπ{(a1 +ε)|y1 |+···+(ak +ε)|yk |} . Then we can extend f to a meromorphic function in Ck by √  √  fε x + y −1 √ . f x + y −1 = ϕε x + y −1 This is independent of ε > 0 because of the unique continuation. Since ϕε converges to √  1 uniformly over every compact subset, f x + y −1 is actually a holomorphic function (namely it does not have neither poles nor indeterminacy points). By taking the limit in (2.2) we get √  f x + y −1 ≤ ||f ||L∞ (Rk ) eπ(a1 |y1 |+···+ak |yk |) . Next suppose f satisfies (2). By (2.1) and Lemma 2.1, we get (2.2) again. Since fε ∈ L2 , Q the Fourier transform fˆε is supported in ki=1 [−(ai + ε)/2, (ai + ε)/2]. The functions fˆε Q converge to fˆ in the topology of distribution. Thus fˆ is supported in ki=1 [−ai /2, ai /2].  Corollary 2.3. The space B1 (a1 , . . . , ak ) of continuous functions f : Rk → [−1, 1] bandQ limited in ki=1 [−ai /2, ai /2] is compact with respect to the topology of uniform convergence over compact subsets of Rk . Proof. Let {fn }∞ n=1 be a sequence in B1 (a1 , . . . , ak ). By Lemmas 2.1 and 2.2 the functions fn can be holomorphically extended over Ck satisfying |fn (z)| ≤ eπ(a1 |y1 |+···+ak |yk |) . In particular {fn } is bounded over every compact subset of Ck . By the Cauchy integration formula, it becomes an equicontinuous family over every compact subset (i.e. normal family). So we can choose a converging subsequence by the Arzela–Ascoli theorem.  Lemma 2.4 (Sampling theorem). Let f : Rk → R be a bounded continuous function Q band-limited in ki=1 [−ai /2, ai /2]. Suppose that there exist positive numbers b1 , . . . , bk such that ai bi < 1 for all 1 ≤ i ≤ k and that f vanishes over {(b1 n1 , . . . , bk nk )| n1, . . . , nk ∈ Z}. Then f is identically zero. 16 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Proof. As in the proof of Lemma 2.2, it is enough to prove the statement under the assumption that f is a L2 -function. Then the proof is standard as follows. Set g(x1 , . . . , xk ) = f (b1 x1 , . . . , bk xk ). This vanishes on Zk .   1 ξk ξ1 ˆ ĝ(ξ) = ,..., . f b1 . . . bk b1 bk Then ĝ is supported in   k k  Y ai bi ai bi 1 1 − ⊂ − , , . 2 2 2 2 i=1 Consider the Fourier series of ĝ(ξ) for ξ ∈ (−1/2, 1/2)k : X √ ĝ(ξ) = an e−2π −1n·ξ . n∈Zk The coefficients an are given by Z √ an = e2π −1n·ξ ĝ(ξ)dξ1 . . . dξk = F (F (g)) (n) = g(n) = 0. [−1/2,1/2]k Thus ĝ = 0. This implies g = 0 and f = 0.  2.3. Technical results on simplicial complexes. The results of this subsection are used only in Section 6. So readers can postpone reading this subsection until they come to Section 6. Recall that we promised that every simplicial complex is finite. (This is mainly for the simplicity of the exposition.) Let P be a simplicial complex. A map f : P → Rn is said to be simplicial if it has the form ! ! m m m X X X f λk vk = λk f (vk ), λk ≥ 0, λk = 1 , k=0 k=0 k=0 on every simplex ∆ ⊂ P , where v0 , . . . , vm are the vertices of ∆. We define ||x||∞ = max1≤i≤n |xi | for x = (x1 , . . . , xn ) ∈ Rn . Lemma 2.5 (Approximation lemma). Let ε and δ be positive numbers. Let (X, d) be a compact metric space and P a simplicial complex. Let π : X → P be an ε-embedding and f : X → Rn a continuous map satisfying d(x, y) < ε =⇒ ||f (x) − f (y)||∞ < δ. Then, after taking a sufficiently fine subdivision of P , we can find a simplicial map g : P → Rn satisfying ||f (x) − g(π(x))||∞ < δ (∀x ∈ X). Proof. We reproduce the proofs in [GLT16, GT] for the completeness. By subdividing P we can assume that for every vertex v ∈ P the diameter of π −1 (O(v)) is smaller than ε, where O(v) is the open star of v, i.e. the union of the relative interiors of all simplices containing v. For each vertex v ∈ P we choose g(v) ∈ f (π −1 (O(v))). (If this is empty, EMBEDDING PROBLEM OF Zk -ACTIONS 17 then we choose arbitrary g(v).) We linearly extend g all over P . Take x ∈ X and let ∆ ⊂ P be the simplex containing π(x) in its relative interior. Every vertex v ∈ ∆ satisfies π(x) ∈ O(v) and hence ||f (x) − g(v)||∞ < δ because the diameter of f (π −1 (O(v))) (which contains both f (x) and g(v)) is smaller than δ. g(π(x)) is a convex combination of such g(v). Hence ||f (x) − g(π(x))||∞ < δ.  Let P be a simplicial complex. We denote by V the set of all vertices of P . The set Hom(P, Rn ) of simplicial maps f : P → Rn can be identified with (Rn )V , which is endowed with the natural topology. Lemma 2.6 (Embedding lemma). (1) If dim P < n/2 then the set of simplicial embeddings (i.e. injective simplicial maps) f : P → Rn is an open dense subset of Hom(P, Rn ). (2) Let U be the set of simplicial maps f : P → Rn such that, for every subcomplex Q ⊂ P and every subset A ⊂ {1, 2, . . . , n} with #A > 2 dim Q, the map Q → RA , x 7→ f (x)|A is an embedding. Then U is open and dense in Hom(P, Rn ). Proof. The statement (2) follows from (1) because the natural map (restriction) Hom(P, Rn ) → Hom(Q, RA ) is an open map and thus the preimage of an open and dense set under this map is also open and dense. (Notice that it corresponds to the natural projection (Rn )V (P ) → (RA )V (Q) where V (P ) and V (Q) are the sets of vertices of P and Q.) Thus it is enough to prove (1). First we show that simplicial embeddings f : P → Rn form an open set. Let f : P → Rn be a simplicial embedding. We would like to show that “injectiveness” is preserved under a small perturbation of f . • Let ∆ ⊂ P be a simplex with the vertices v0 , . . . , vm . Then f |∆ : ∆ → Rn is an injection, which means that f (v0 ), . . . , f (vm ) are affinely independent. If g : P → Rn is sufficiently close to f then g(v0), . . . , g(vm ) are also affinely independent. • Let ∆1 , ∆2 ⊂ P be two disjoint simplices. Then the distance between f (∆1 ) and f (∆2 ) is positive. This condition is certainly preserved under a small perturbation. • Let ∆1 , ∆2 ⊂ P be two simplices which share a nonempty simplex ∆1 ∩ ∆2 . We assume ∆1 6= ∆1 ∩ ∆2 and ∆2 6= ∆1 ∩ ∆2 . Consider V (∆1 ) \ V (∆1 ∩ ∆2 ) and V (∆2 ) \ V (∆1 ∩ ∆2 ), and denote their convex hulls by ∆′1 and ∆′2 respectively. Fix v ∈ V (∆1 ∩ ∆2 ). The map f |∆1 ∪∆2 : ∆1 ∪ ∆2 → Rn is injective, which means the positivity of −→) and f (− −→)| w ∈ ∆′ , w ∈ ∆′ } . min {Angle between the vectors f (− vw vw 1 2 1 2 1 2 This condition is preserved under a small perturbation. 18 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO The above proves that sufficiently small perturbations of f are also injective. Next we prove that simplicial embeddings f : P → Rn form a dense set. Let f : P → Rn be an arbitrary simplicial map and U ⊂ Hom(P, Rn ) an open neighborhood of f . By simple linear algebra we can choose g ∈ U such that for any subset {v1 , . . . , vm } ⊂ V (P ) with m ≤ n + 1 the points g(v1 ), . . . , g(vm ) are affinely independent. As 2 dim P + 1 ≤ n, g|∆1∪∆2 is an embedding for any two simplices ∆1 , ∆2 ⊂ P and thus g is an embedding.  How to use Lemmas 2.5 and 2.6: We would like to illustrate the above two lemmas by a simple application. (This is a prototype of the later argument but logically independent of the proof of the main theorems. So experienced readers can skip it.) Let (X, d) be a compact metric space. We prove a classical result in the dimension theory: If dim X < n/2 then X can be topologically embedded into Rn . The set of all embeddings f : X → Rn is equal to ∞ \ (2.3) {f : X → Rn | (1/m)-embedding}. m=1 So it is a Gδ -subset of the space of all continuous maps f : X → Rn since “(1/m)embedding” is an open condition. Fix a natural number m and a positive number δ. Let f : X → Rn be an arbitrary continuous map. Choose 0 < ε < 1/m so that d(x, y) < ε =⇒ ||f (x) − f (y)||∞ < δ. By dim X = limε→0 Widimε (X, d), we can find a simplicial complex P of dim P ≤ dim X < n/2 and an ε-embedding π : X → P . By Lemma 2.5 there exists a simplicial map g : P → Rn satisfying ||f (x) − g(π(x))||∞ < δ for all x ∈ X. By dim P < n/2 and Lemma 2.6 (1) we can find a simplicial embedding h : P → Rn satisfying ||g(p) − h(p)||∞ < δ for all p ∈ P . Then the map h ◦ π : X → Rn is an ε-embedding (and hence (1/m)-embedding by ε < 1/m) and satisfies ||f (x) − h ◦ π(x)||∞ < 2δ for all x ∈ X. Since δ is arbitrary, this shows that {f : X → Rn | (1/m)-embedding} is dense in the space of all continuous maps from X to Rn . Thus, by the Baire Category Theorem, the set (2.3) is dense Gδ . In particular there exists a topological embedding of X into Rn . 2.4. A lemma on convex sets. The result of this subsection is used only in Section 6. Let r > 0 and W ⊂ Rk . We define ∂r W as the set of all t ∈ Rk such that the closed r-ball Br (t) around t have non-empty intersections both with W and Rk \ W . We set Intr W = W \ ∂r W . Lemma 2.7. For any c > 1 and r > 0 there exists R > 0 such that if a bounded closed convex subset W ⊂ Rk satisfies IntR W 6= ∅ then |W ∪ ∂r W | < c |Intr W | . EMBEDDING PROBLEM OF Zk -ACTIONS 19 Here | · | denotes the k-dimensional volume (Lebesgue measure). Proof. We can assume 0 ∈ IntR W . For a > 0 we set aW = {at| t ∈ W }.  Claim 2.8. ∂r W ⊂ 1 + Rr W .  Proof. Take u ∈ Rk outside of 1 + Rr W . There exists a hyperplane H = {a1 x1 + · · · +  ak xk = 1} ⊂ Rk separating u and 1 + Rr W . Namely  r u ∈ {a1 x1 + · · · + ak xk > 1}, 1+ W ⊂ {a1 x1 + · · · + ak xk < 1}. R Then W ⊂   r −1 a1 x1 + · · · + ak xk < 1 + . R  It follows that the distance between u and W is greater than the distance between H and −1 −1 H. Let h be the distance between 1 + Rr H and the origin. h > R since 1 + Rr  r −1 0 ∈ IntR W . Then the distance between H and 1 + R H is  1+ rh r h−h= > r. R R This implies that u does not belong to ∂r W .   Claim 2.9. ∂r W ∩ 1 − Rr W = ∅ and hence Intr W ⊃ 1 − Rr W .  Proof. Almost the same argument shows that if we take a point u outside of W then  the distance between u and 1 − Rr W is greater than r. This implies that every point  v ∈ 1 − Rr W satisfies Br (v) ⊂ W and hence does not belong to ∂r W .  It follows from these two claims that   r k r W = 1+ |W ∪ ∂r W | ≤ 1 + |W |, R R   r r k |Intr W | ≥ 1 − W = 1− |W |. R R Thus |W ∪ ∂r W | ≤  1+ 1− r k R r R |Intr W | . Since c > 1, if r/R is sufficiently small then the right-hand side is smaller than c |Intr W |.  3. Main proposition 3.1. Statement of the main proposition. Main Theorem 2 in Subsection 1.3 follows from the next proposition whose proof occupies the rest of the paper. 20 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Proposition 3.1 (Main Proposition). Let a1 , . . . , ak and δ be positive numbers. Let (X, Zk , T ) be a dynamical system and d a distance on X. Let f : X → B1 (a1 , . . . , ak ) be a Zk -equivariant continuous map. If X has the marker property and satisfies mdim(X) < a1 . . . ak 2 then there exists a Zk -equivariant continuous map g : X → B1 (a1 + δ, . . . , ak + δ) such that • ||f (x) − g(x)||L∞ (Rk ) < δ for all x ∈ X. • g is a δ-embedding with respect to the distance d. It is important to note that the map g takes values in B1 (a1 + δ, . . . , ak + δ) which is slightly larger than the target B1 (a1 , . . . , ak ) of the original map f . Here we prove that Proposition 3.1 implies Main Theorem 2. Proof of Main Theorem 2, assuming Proposition 3.1. The proof is very close to the standard proof of the Baire Category Theorem. We assume diam(X, d) < 1 by rescaling the distance (just for simplicity of the notation). For 1 ≤ i ≤ k we choose sequences {ain }∞ n=1 such that 0 < ai1 < ai2 < ai3 < · · · < ai , mdim(X) < a1n a2n . . . akn 2 (∀n ≥ 1). For n ≥ 1 we inductively define a positive number δn and a Zk -equivariant (1/n)embedding (with respect to d) fn : X → B1 (a1n , . . . , akn ). First we set δ1 = 1, f1 (x) = 0 (∀x ∈ X). Notice that f1 is a 1-embedding because diam(X, d) < 1. Suppose we have defined δn and fn . Since fn is a (1/n)-embedding, we can choose 0 < δn+1 < δn /2 such that if a Zk -equivariant continuous map g : X → B1 (a1 , . . . , ak ) satisfies sup ||fn (x) − g(x)||L∞ (Rk ) ≤ δn+1 x∈X then g is also a (1/n)-embedding. By applying Proposition 3.1 to fn , we can find a Zk -equivariant continuous map fn+1 : X → B1 (a1,n+1 , . . . , ak,n+1) such that • supx∈X ||fn (x) − fn+1 (x)||L∞ (Rk ) < δn+1 /2. 1 -embedding with respect to d. • fn+1 is a n+1 EMBEDDING PROBLEM OF Zk -ACTIONS For n > m ≥ 1 sup ||fn (x) − fm (x)||L∞ (Rk ) ≤ x∈X < < n−1 X l=m 21 sup ||fl (x) − fl+1 (x)||L∞ (Rk ) x∈X n−1 X δl+1 l=m ∞ X l=1 2 2−l δm+1 = δm+1 → 0 (m → ∞). Here we used δl+1 < δl /2. By taking a limit, we find a Zk -equivariant continuous map f : X → B1 (a1 , . . . , ak ) satisfying sup ||f (x) − fn (x)||L∞ (Rk ) ≤ δn+1 x∈X for all n ≥ 1. It follows from the definition of δn+1 that f is a (1/n)-embedding. Since n is arbitrary, f is an embedding.  The above proof used a flexibility exhibited by band-limited signals and not by discrete signals. At each step of the induction, the target B1 (a1,n+1 , . . . , ak,n+1) of the map fn+1 is slightly bigger than the previous target B1 (a1n , . . . , akn ). The differences ai,n+1 − ain converge to zero as n goes to infinity. Such an argument is possible because a1 , . . . , ak Zk are continuous parameters. We cannot apply the same argument to [0, 1]D because it depends on a discrete parameter D. 3.2. Strategy of the proof. Most known theorems about embedding (e.g. the Whitney embedding theorem for manifolds) are proved by perturbation. The proof of Proposition 3.1 also uses this idea but with a twist. The map g in the statement of Proposition 3.1 will have the form g(x) = g1 (x) + g2 (x), (x ∈ X). The first term g1 (x) is a band-limited function in B1 (a1 , . . . , ak ), which is constructed by perturbing the function f (x) ∈ B1 (a1 , . . . , ak ). The second term g2 (x) is also a bandlimited function whose frequencies are restricted in a compact subset of  Y k h k  Y ai ai i ai + δ ai + δ − , \ . , − 2 2 2 2 i=1 i=1 The construction of g2 (x) is (essentially) independent of f (x). The function g2 (x) encodes how to perturb f (x). In other words, the function g1 (x) is constructed by perturbing the function f (x), and the perturbation method is determined by the function g2 (x). Probably this explanation is not very clear. So let us try a more naive explanation. Consider cooking. Each point x ∈ X is a cook. The function f (x) is an ingredient of cooking (e.g. a raw salmon) that the cook x chooses. The function g2 (x) is a cookware (e.g. kitchen knife and oven) that the cook x possesses. The function g1 (x) is the result 22 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO of cooking (e.g. grilled salmon). The grilled salmon g1 (x) is made from the raw salmon f (x) by using the knife and oven g2 (x). The knife and oven g2 (x) are independent of the raw salmon f (x). The Fourier transforms F (g1 (x)) and F (g2 (x)) have disjoint supports. Hence if we have the equation g(x) = g(y) for some x and y in X, then it follows that g1 (x) = g1 (y), g2 (x) = g2 (y). We would like to deduce d(x, y) < δ from these equations. In other words we try to determine who is the cook (up to some small error) by knowing the result of cooking (g1 (x) = g1 (y)) and what cookware was used (g2 (x) = g2 (y)). More precisely, the proof goes as follows. Take x ∈ X. The function f (x) is defined over Rk . It is difficult to control functions over unbounded domains. So we introduce a tiling (indexed by Zk ) [ Rk = W (x, n), n∈Zk such that (1) Each tile W (x, n) is a bounded convex set, and different tiles W (x, n) and W (x, m) are disjoint except for their boundaries. (2) W (x, n) depends continuously on x ∈ X in the Hausdorff topology. (3) The tiles are equivariant in the sense that W (T n x, m) = −n + W (x, n + m) = {−n + t| t ∈ W (x, n + m)}. (4) “Most” part of the space Rk is covered by “sufficiently large” tiles. We try to perturb the function f (x) over each tile W (x, n). We can construct a good perturbation over sufficiently large tiles. So if every tile is sufficiently large, then we can construct a good perturbation of f (x) over the whole space Rk . Unfortunately some tiles may be small in general. We cannot construct a good perturbation over such tiny tiles. Condition (4) helps us here. We will construct a “social welfare system” of the tiles W (x, n). (This idea was first introduced in [GT].) Large tiles help small tiles and bear “additional” perturbations which are originally “duties” of small tiles. By using this social welfare system we construct the perturbation g1 (x) of the function f (x). The map g1 will have the following property: If x and y in X satisfy g1 (x) = g1 (y) and (3.1) ∀n ∈ Zk : W (x, n) = W (y, n) then it follows that d(x, y) < δ. Namely if we know g1 (x) and the tiling {W (x, n)} then we can recover the point x up to error δ. So the next problem is how to encode the information of the tiles. The function g2 (x) is introduced for solving this problem. We encode all the information of the tiles W (x, n) to a band-limited function g2 (x). (Indeed the real argument below goes in a reverse way. First we construct the function g2 (x), and then the tiles W (x, n) are constructed from g2 (x). So g2 (x) knows everything about the EMBEDDING PROBLEM OF Zk -ACTIONS 23 tiles W (x, n).) In particular the equation g2 (x) = g2 (y) implies (3.1). As a conclusion, the function g(x) = g1 (x) + g2 (x) satisfies the requirements of Proposition 3.1. This is the outline of the proof. We would like to emphasize that the most important new idea introduced in this paper is the technique to encode the information of the tiling {W (x, n)} into the band-limited function g2 (x). This idea is new even in the one dimensional case. This is the main reason why Main Theorems 1 and 2 have some novelty even in the case of k = 1. Section 4 introduces interpolating functions which will be used in the perturbation process. In Section 5 we construct the tiling W (x, n) and their social welfare system and explain how to encode them into a band-limited function. The proof of Proposition 3.1 is finished in Section 6. 3.3. Fixing some notations. The proof of Proposition 3.1 is notationally messy. So here we gather some of the notations for the convenience of readers. Throughout the rest of the paper (except for Section 7 where we discuss open problems) we fix the following. • a1 , . . . , ak and δ are positive numbers. We additionally assume (3.2) δ < min(1, a1 , . . . , ak ). • (X, Zk , T ) is a dynamical system satisfying the marker property and a1 . . . ak . mdim(X) < 2 • We fix positive rational numbers ρ1 , . . . , ρk satisfying ρ1 . . . ρk (3.3) ρi < ai (∀1 ≤ i ≤ k), mdim(X) < . 2 • We define a lattice Γ ⊂ Rk by    t1 tk (3.4) Γ= t1 , . . . , tk ∈ Z . ,..., ρ1 ρk (3.5) Moreover we define Γ1 ⊂ Rk by [ Γ1 = (n + Γ), n∈Zk (n + Γ = {n + γ| γ ∈ Γ}). Since ρi are rational numbers, Γ1 is also a lattice. 4. Interpolating functions Recall that we fixed positive numbers a1 , . . . , ak , positive rational numbers ρ1 , . . . , ρk with ρi < ai and lattices Γ ⊂ Γ1 ⊂ Rk in Subsection 3.3. We fix a positive number τ satisfying (4.1) ∀1 ≤ i ≤ k : ρi + τ < ai . 24 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO For r > 0 and a ∈ Rk we denote by Br (a) the closed r-ball around a, and we set Br = Br (0). We choose a rapidly decreasing function χ0 : Rk → R satisfying χ0 (0) = 1 and supp F (χ0 ) ⊂ Bτ /2 . Notation 4.1. (1) We set (4.2) K0 = sup X t∈Rk λ∈Γ 1 |χ0 (t − λ)|. This is finite because χ0 is rapidly decreasing and Γ1 is a lattice. (2) We fix r0 > 0 satisfying X 1 |χ0 (λ)| < . (4.3) 2 λ∈Γ1 \Br0 Definition 4.2. (1) A subset Λ ⊂ Γ1 is called an admissible set if any two points λ1 , λ2 ∈ Λ satisfy at least one of the following two conditions: • λ1 − λ2 ∈ Γ. • |λ1 − λ2 | > r0 . This notion is an elaborated formulation of “almost regular interpolation set” introduced in Subsection 1.4. We denote by Ads the set of all admissible sets Λ ⊂ Γ1 . (2) A function p : Γ1 → [0, 1] is called an admissible function if the set {λ ∈ Γ1 | p(λ) > 0} is an admissible set. We denote by Adf the set of all admissible functions. We define the function sinc : R → R by sinc(t) = sin(πt) , πt sinc(0) = 1. This is one of the most famous functions in signal analysis. The function sinc(t) vanishes on Z \ {0} and its Fourier transform is supported in [−1/2, 1/2]. It satisfies |sinc(t)| ≤ 1 for all t ∈ R. Let Λ ⊂ Γ1 be an admissible set. We denote by ℓ∞ (Λ) the Banach space of all bounded functions u : Λ → R endowed with the supremum norm ||·||∞ . For u ∈ ℓ∞ (Λ) we define a band-limited function ϕΛ (u) ∈ B(ρ1 + τ, . . . , ρk + τ ) by ϕΛ (u)(t) = X λ=(λ1 ,...,λk )∈Λ u(λ)χ0 (t − λ) k Y i=1 sinc (ρi (ti − λi )) , (t = (t1 , . . . , tk ) ∈ Rk ). Here ρi are rational numbers introduced in Subsection 3.3. It follows from the definition of K0 that ||ϕΛ (u)||L∞ (Rk ) ≤ K0 ||u||∞ . EMBEDDING PROBLEM OF Zk -ACTIONS 25 Since we promised ρi + τ < ai in (4.1), the function ϕΛ (u) belongs to B(a1 , . . . , ak ). We define a bounded linear operator SΛ : ℓ∞ (Λ) → ℓ∞ (Λ) by  SΛ (u) = ϕΛ (u)|Λ = (ϕΛ (u)(λ))λ∈Λ . Remark 4.3. When Λ is the empty set, we define ℓ∞ (Λ) to be the trivial vector space consisting only of zero and ϕΛ (0) = 0, the operator SΛ the identity operator of the trivial vector space. Lemma 4.4. ||SΛ − id|| ≤ 1/2, where the left-hand side is the operator norm of SΛ − id. Proof. For λ = (λ1 , . . . , λk ) ∈ Λ the function χ0 (t − λ) k Y i=1 sinc (ρi (ti − λi )) vanishes on (λ + Γ) \ {λ} and its value at t = λ is 1. Then by the admissibility of Λ ϕΛ (u)(λ) − u(λ) = X ′ λ′ ∈Λ\Br0 (λ) By the choice of r0 in (4.3),  |ϕΛ (u)(λ) − u(λ)| ≤  ′ u(λ )χ0 (λ − λ) X λ′ ∈Λ\Br0 (λ) k Y i=1 sinc (ρi (λ′i − λi )) .  |χ0 (λ′ − λ)| ||u||∞ ≤ 1 ||u||∞ . 2  Therefore the operator SΛ has the inverse SΛ−1 = ∞ X n=0 (id − SΛ )n with SΛ−1 ≤ 2. For u ∈ ℓ∞ (Λ) we define a band-limited function ψΛ (u) ∈ B(a1 , . . . , ak ) by ψΛ (u) = ϕΛ (SΛ−1 (u)). This function satisfies ψΛ (u)(λ) = u(λ) (∀λ ∈ Λ), ||ψΛ (u)||L∞ (Rk ) ≤ 2K0 ||u||∞ . The former property means that ψΛ (u) interpolates the sequence u. The construction of ψΛ (u) is “Zk -equivariant”: For n ∈ Zk and u ∈ ℓ∞ (Λ) we define v ∈ ℓ∞ (n + Λ) by v(n + λ) = u(λ). Then ψn+Λ (v)(t + n) = ψΛ (u)(t). If Λ is the empty set, then ψΛ (0) = 0. We denote by B1 (ℓ∞ (Λ)) the closed unit ball of ℓ∞ (Λ) around the origin with respect to the supremum norm. The function ψΛ (u) depends continuously on Λ and u as follows: 26 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Lemma 4.5 (Continuity of the construction of ψΛ (u)). For any r > 0 and ε > 0 there exist r ′ > 0 and ε′ > 0 so that if Λ1 , Λ2 ∈ Ads, u1 ∈ B1 (ℓ∞ (Λ1 )) and u2 ∈ B1 (ℓ∞ (Λ2 )) satisfy (4.4) Λ1 ∩ Br′ = Λ2 ∩ Br′ , then for all t ∈ Br |u1 (λ) − u2 (λ)| < ε′ (∀λ ∈ Λ1 ∩ Br′ ) |ψΛ1 (u1 )(t) − ψΛ2 (u2 )(t)| < ε. Proof. By the linearity of ϕΛ , ψΛ (u) = ϕΛ (SΛ−1 (u)) = ∞ X n=0 By Lemma 4.4 ϕΛ ((id − SΛ )n u) . ||ϕΛ ((id − SΛ )n u)||L∞ (Rk ) ≤ K0 ||(id − SΛ )n u||∞ ≤ K0 ||u||∞ . 2n Therefore the statement follows from the next claim. Claim 4.6. (1) For any r > 0 and ε > 0 there exist r ′ > 0 and ε′ > 0 so that if Λ1 , Λ2 ∈ Ads, u1 ∈ B1 (ℓ∞ (Λ1 )) and u2 ∈ B1 (ℓ∞ (Λ2 )) satisfy (4.4) then for all t ∈ Br |ϕΛ1 (u1 )(t) − ϕΛ2 (u2 )(t)| < ε. (2) For any r > 0, ε > 0 and a natural number n there exist r ′ > r and ε′ > 0 so that if Λ1 , Λ2 ∈ Ads, u1 ∈ B1 (ℓ∞ (Λ1 )) and u2 ∈ B1 (ℓ∞ (Λ2 )) satisfy (4.4) then for all λ ∈ Λ1 ∩ Br |(id − SΛ1 )n (u1 )(λ) − (id − SΛ2 )n (u2 )(λ)| < ε. Proof. (1) We choose r ′ > r so large that for all t ∈ Br X ε |χ0 (t − λ)| < . 4 λ∈Γ1 \Br ′ Then Condition (4.4) implies that for t ∈ Br X ε |ϕΛ1 (u1 )(t) − ϕΛ2 (u2 )(t)| < + |u1(λ) − u2 (λ)| · |χ0 (t − λ)| 2 λ∈Λ1 ∩Br ′ X ε ≤ + ε′ |χ0 (t − λ)|. 2 λ∈Γ1 ∩Br ′ We can choose ε′ > 0 so small that the right-hand side is smaller than ε. (2) The statement can be reduced to the case of n = 1 by induction. The case of n = 1 immediately follows from the statement (1).   EMBEDDING PROBLEM OF Zk -ACTIONS 27 ψΛ (u) is a nice interpolating function. But we need one more twist. We naturally identify the set {0, 1}Γ1 with the set of all subsets of Γ1 . Namely, Λ ⊂ Γ1 is identified with the characteristic function 1Λ ∈ {0, 1}Γ1 . Then in particular Ads (the set of admissible sets) is a Borel subset of {0, 1}Γ1 . Let p : Γ1 → [0, 1] be an admissible function, namely {λ ∈ Γ1 | p(λ) > 0} belongs to Ads. We define a probability measure µp on {0, 1}Γ1 by Y ((1 − p(λ)) δ0 + p(λ)δ1 ) , µp = λ∈Γ1 where δ0 and δ1 are the delta probability measures at 0 and 1 on {0, 1} respectively. Since p is admissible, the set Ads has full measure: µp (Ads) = 1. Let ℓ∞ (Γ1 ) be the Banach space of bound functions u : Γ1 → R. For u ∈ ℓ∞ (Γ1 ) we define a band-limited function Ψ(p, u) ∈ B(a1 , . . . , ak ) by Z (4.5) Ψ(p, u) = ψΛ (u|Λ ) dµp(Λ). Λ∈Ads This function is the main product of this section. Lemma 4.7 (Basic properties of Ψ). Ψ satisfies: (1) Interpolation: If λ ∈ Γ1 satisfies p(λ) = 1 then Ψ(p, u)(λ) = u(λ). (2) Boundedness: ||Ψ(p, u)||L∞ (Rk ) ≤ 2K0 ||u||∞ . (3) Equivariance: For n ∈ Zk we define q ∈ Adf and v ∈ ℓ∞ (Γ1 ) by q(λ+n) = p(λ) and v(λ + n) = u(λ) for λ ∈ Γ1 . Then Ψ(q, v)(t + n) = Ψ(p, u)(t). Proof. These three properties immediately follow from the corresponding properties of ψΛ (u).  We would like to show that the map Ψ depends continuously on p and u (Proposition 4.9 below). But we need a preparation before that. For r > 0 and p ∈ Adf we define probability measures µp,r and νp,r on {0, 1}Γ1 ∩Br and {0, 1}Γ1 \Br respectively by Y Y ((1 − p(λ)) δ0 + p(λ)δ1 ) . ((1 − p(λ)) δ0 + p(λ)δ1 ) , νp,r = µp,r = λ∈Γ1 ∩Br λ∈Γ1 \Br It follows µp = µp,r ⊗ νp,r . Lemma 4.8 (Truncation of the integral). For any r > 0 and ε > 0 if we choose r ′ > 0 sufficiently large then for any p ∈ Adf, u ∈ B1 (ℓ∞ (Γ1 )) and t ∈ Br Z (4.6) Ψ(p, u)(t) − ψΛ (u|Λ )(t) dµp,r′ (Λ) < ε. Λ∈Ads∩{0,1}Γ1 ∩Br ′ Proof. For an admissible set Λ1 ⊂ Γ1 ∩ Br′ we define Ads(Λ1 , r ′) ⊂ Ads as the set of Λ2 ⊂ Γ1 \ Br′ satisfying Λ1 ∪ Λ2 ∈ Ads. If µp,r′ ({Λ1 }) > 0 then Ads(Λ1 , r ′) has full measure with respect to νp,r′ because µp (Ads) = 1. 28 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO By µp = µp,r′ ⊗ νp,r′ Ψ(p, u) = Z Λ1 ∈Ads∩{0,1}Γ1 ∩Br ′ Z Λ2 ∈Ads(Λ1 ,r ′ ) ψΛ1 ∪Λ2 (u|Λ1∪Λ2 ) dνp,r′ (Λ2 )  dµp,r′ (Λ1 ). If r ′ is sufficiently large, then it follows from Lemma 4.5 that |ψΛ1 ∪Λ2 (u|Λ1∪Λ2 ) − ψΛ1 (u|Λ1 )| < ε on Br . Then (4.6) follows.  Proposition 4.9 (Continuity of Ψ). For any r > 0 and ε > 0 there exist r ′ > 0 and ε′ > 0 so that if p, q ∈ Adf and u, v ∈ B1 (ℓ∞ (Γ1 )) satisfy ∀λ ∈ Γ1 ∩ Br′ : (4.7) |p(λ) − q(λ)| < ε′ , |u(λ) − v(λ)| < ε′ then for all t ∈ Br |Ψ(p, u)(t) − Ψ(q, v)(t)| < ε. Proof. From Lemma 4.8 it is enough to show that if Condition (4.7) holds for sufficiently large r ′ > 0 and sufficiently small ε′ > 0 then for all t ∈ Br Z Λ∈Ads∩{0,1}Γ1 ∩Br ′ ψΛ (u|Λ )(t) dµ The left-hand side is bounded by Z p,r ′ Λ∈Ads∩{0,1}Γ1 ∩Br ′ + Z (Λ) − Z Λ∈Ads∩{0,1}Γ1 ∩Br ′ ψΛ (v|Λ )(t) dµq,r′ (Λ) < ε. |ψΛ (u|Λ )(t) − ψΛ (v|Λ )(t)| dµp,r′ (Λ) Λ∈Ads∩{0,1}Γ1 ∩Br ′ |ψΛ (v|Λ )(t)| d|µp,r′ − µq,r′ |(Λ). The first term can be made arbitrarily small by Lemma 4.5. The second term is bounded by Z 2K0 d|µp,r′ − µq,r′ |. {0,1}Γ1 ∩Br ′ The integral here is the total variation of the signed measure µp,r′ − µq,r′ , which is equal to the sum X |µp,r′ ({Λ}) − µq,r′ ({Λ})| . Λ∈{0,1}Γ1 ∩Br ′ This can be made arbitrarily small by choosing ε′ > 0 in (4.7) sufficiently small.  EMBEDDING PROBLEM OF Zk -ACTIONS 29 5. Dynamical construction of tiling-like band-limited maps This section is the longest section of the paper. As we described in Subsection 3.2, the S proof of Proposition 3.1 uses a tiling Rk = n∈Zk W (x, n) and a social welfare system among tiles, which should be encoded into a certain band-limited function g2 (x). The purpose of this section is to construct these ingredients. The following diagram outlines the construction. A point x in a dynamical system (X, Zk , T ) satisfying the marker property.   y S A tiling Rk = n∈Zk W0 (x, n).   y A tiling-like band-limited map Φ(x) : Ck → Ck , which is equivalent to a band-limited function g2 (x).   y S A tiling Rk = n∈Zk W (x, n).   y k Weight functions w(x, n) ∈ [0, 1]Z for n ∈ Zk , which form a social welfare system among tiles W (x, n). S Take x ∈ X. First we construct a tiling Rk = n∈Zk W0 (x, n) from the point x. We use the marker property assumption only here. This tiling is not used directly in the proof of Proposition 3.1. Instead we construct a certain holomorphic map Φ(x) : Ck → Ck called a “tiling-like band-limited map” from the tiles W0 (x, n). Write Φ(x) = (Φ(x)1 , . . . , Φ(x)k ). The Fourier transforms of Φ(x)1 |Rk , . . . , Φ(x)k |Rk and their complex conjugates are adjusted to have disjoint supports. Then the band-limited function def g2 (x) = k X Re (Φ(x)i ) i=1 becomes “equivalent” to Φ(x). Namely if g2 (x) = g2 (y) for some x, y ∈ X then Φ(x) = Φ(y). (Indeed we will define g2 (x) in Section 6 by multiplying a small constant to the above function so that the norm of g2 (x) becomes sufficiently small.) Let us give some more heuristics concerning the construction of Φ(x). Consider the function πzk πz1 , · · · , sin ) : Rk → Rk Θ̃L = (sin L L for some positive integer L thought to be very big. Every entry sin(πzi /L) of the map Θ̃L vanishes on LZk ⊂ Rk and belongs to B( L1 , · · · , L1 ). Suppose we are given a family of 30 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO tilings W0 (x) = {W0 (x, n)}n∈Zk of Rk depending continuously9 and Zk -equivariantly (i.e. W0 (T n x, m) = −n + W0 (x, n + m)) on x ∈ X. We would like to replace this family of tilings by a family of Voronoi tilings10 generated by the zeros of a continuous function F : X × Rk → Rk , where F has the following properties: (1) Band-limited: Every entry of F (x, ·) belongs to B( L1 , · · · , L1 ). (2) Equivariance: F (T n x, z) = F (x, z + n) for any x ∈ X, z ∈ Rk and n ∈ Zk . A candidate for F is the following function X × Rk → Rk , (x, t) 7→ X n∈Zk e L (t − n) 1W0 (x,n) (t). Θ This function is equivariant but unfortunately not continuous. However a small change (for details see Subsection 5.2) makes it band-limited (and continuous). Figure 5.1. The original tiling W0 (x, n): ——; The zeros of F in the “deep” interior of “big” tiles: •; “Regular” part of the new tiling W (x, n): - - - - -. The most simple way of generating Voronoi tilings would be to use the zeros of F (x, ·)  as generating sets for the Voronoi tiling, i.e. W (x) = Voronoi zeros of F (x, ·) . However, the zeros of band-limited maps behave rather wildly in general, e.g. they are not isolated and form a positive dimensional variety in general. We will thus instead adopt a more 9More precisely, for ε > 0 and for each x ∈ X and n ∈ Zk with Int W0 (x, n) 6= ∅, if y ∈ X is sufficiently close to x, then the Hausdorff distance between W0 (x, n) and W0 (y, n) is smaller than ε. 10A Voronoi tiling generated by a discrete set A ⊂ Rk is a partitioning of Rk into regions based on the closest distance to points in A. For more details, see Subsection 5.3. EMBEDDING PROBLEM OF Zk -ACTIONS 31 elaborate scheme. We give a weight v(x, n) ∈ [0, 1] to every x ∈ X and n ∈ Zk , which is constructed from (some appropriate) zeros of F (x, ·) in a neighborhood of n. We use these weights to generate a family of indexed Voronoi tilings {W (x, n)}n∈Zk . The exact procedure is described in Subsection 5.4. For big tiles and big L > 0 the picture schematically looks like Figure 5.1. The new tiling is used in the proof of Proposition 3.1 in Section 6. We construct a certain “weight function” (not to be confused with v(x, n) of the previous paragraph)  k  k Z w(x) = (w(x, n))n∈Zk ∈ [0, 1]Z from the tiles W (x, n). This will play a role of a social welfare system among the tiles W (x, n). The tiles W (x, n) and functions w(x, n) are constructed from Φ(x). So all their informations are encoded into Φ(x), which is equivalent to the band-limited function g2 (x). Subsection 5.1 is a function-theoretic preparation for the construction of tiling-like band-limited maps. Subsection 5.2 constructs a tiling-like band-limited map from a tiling of Rk (not necessarily coming from a dynamical system). Subsection 5.3 describes a S construction of the first tiling Rk = n∈Zk W0 (x, n). Subsection 5.4 uses the preparations in Subsections 5.1, 5.2 and 5.3 and constructs Φ(x), W (x, n) and w(x, n). 5.1. Quantitative persistence of zero points. We start from the following elementary observation: Let f : Ck → Ck be a holomorphic map such that f (0) = 0 and the derivative df0 at the origin is an invertible matrix. For any neighborhood U of the origin in Ck , if g : Ck → Ck is a holomorphic map such that |f (z) − g(z)| is sufficiently small over the unit ball B1 , then there exists z ∈ U such that g(z) = 0 and the derivative dgz at z is also invertible. The purpose of this subsection is to develop a quantitative version of this observation for some very special f (i.e. the function ΘL introduced below). Here “quantitative” means that we would like to specify how small |g(x) − f (x)| should be and how much non-degenerate dgz is. Let r > 0. For u ∈ C we define Dr (u) as the closed disk of radius r around u in C. We set Dr = Dr (0). For u = (u1 , . . . , uk ) ∈ Ck we define the polydisc Drk (u) in Ck by Drk (u) = Dr (u1 ) × · · · × Dr (uk ). We set Drk = Drk (0). First we study the sine function sin z in the complex domain. Consider the image sin(∂Dπ/2 ) of the circle ∂Dπ/2 of radius π/2 under the map sin : C → C. This curve does not contain the origin and its rotation number around the origin is one: Z Z dz 1 cos z 1 √ = √ dz = 1. 2π −1 sin(∂Dπ/2 ) z 2π −1 ∂Dπ/2 sin z This implies that the map  sin∗ : H1 Dπ/2 \ {0} → H1 (C \ {0}) 32 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO is an isomorphism. Here H1 (·) is the standard homology group of Z-coefficients. (Both sides of the above are isomorphic to Z.) The map sin∗ is the homomorphism induced by the map sin : Dπ/2 \ {0} → C \ {0}. The natural maps   H2 Dπ/2 , Dπ/2 \ {0} → H1 Dπ/2 \ {0} , H2 (C, C \ {0}) → H1 (C \ {0}) are isomorphic by the canonical long exact sequence ([Hat02, Theorem 2.16]). It follows by composition that  sin∗ : H2 Dπ/2 , Dπ/2 \ {0} → H2 (C, C \ {0}) is also an isomorphism. In the same way, for any n ∈ Z, the map  sin∗ : H2 Dπ/2 (πn), Dπ/2 (πn) \ {πn} → H2 (C, C \ {0}) is an isomorphism. Definition 5.1. (1) Recall that we introduced positive numbers a1 , . . . , ak and δ in Subsection 3.3. We set bi = ai + δ/2. For L > 1 we define ΘL : Ck → Ck by   √ √ ΘL (z1 , . . . , zk ) = eπ −1 b1 z1 sin(πz1 /L), . . . , eπ −1 bk zk sin(πzk /L) . This map vanishes on LZk . The Fourier transform of the i-th entry eπ √ −1 bi ti sin(πti /L), (t = (t1 , . . . , tk ) ∈ Rk ) of ΘL |Rk (the restriction of ΘL to Rk ) is supported in   1 bi 1 bi i−1 × {0}k−i , (1 ≤ i ≤ k). − , + {0} × 2 2L 2 2L We will choose a very large L later. So this line segment will be very small. (2) Let A be a k × k matrix. We set ν(A) = min z∈Ck ,|z|=1 |Az|. The matrix A is invertible if and only if ν(A) > 0. So ν(A) quantifies the amount of non-degeneracy of A. For another k × k matrix B we have (5.1) |ν(A) − ν(B)| ≤ |A − B| (the operator norm of A − B). In particular ν(A) depends continuously on A. Lemma 5.2. For every n = (n1 , . . . , nk ) ∈ Zk the homomorphism   k k (ΘL )∗ : H2k DL/2 (Ln), DL/2 (Ln) \ {Ln} → H2k Ck , Ck \ {0} is isomorphic. (Notice that the both sides are isomorphic to Z.) EMBEDDING PROBLEM OF Zk -ACTIONS 33    k k Proof. We define a homotopy ft : DL/2 (Ln), DL/2 (Ln) \ {Ln} → Ck , Ck \ {0} for 0 ≤ t ≤ 1 by  √  √ ft (z1 , . . . , zk ) = eπ −1 t b1 z1 sin(πz1 /L), . . . , eπ −1 t bk zk sin(πzk /L) . f1 = ΘL . So it is enough to show that f0 induces an isomorphism on the 2k-th homology groups (see [Hat02, Theorem 2.10]). The map f0 is given by f0 (z1 , . . . , zk ) = (sin(πz1 /L), . . . , sin(πzk /L)) . Set ϕ(z) = sin(πz/L) for z ∈ C. We have natural isomorphisms by the Künneth theorem (Spanier [Spa66, p. 235, 10 Theorem]): H2k k k DL/2 (Ln), DL/2 (Ln) H2k  \ {Ln} ∼ =  C , C \ {0} ∼ = k k k O i=1 k O i=1 H2 DL/2 (Lni ), DL/2 (Lni ) \ {Lni }  H2 (C, C \ {0}) . Under these isomorphisms, the homomorphism (f0 )∗ is identified with ⊗ki=1 ϕ∗ : k O i=1  H2 DL/2 (Lni ), DL/2 (Lni ) \ {Lni } → k O i=1 H2 (C, C \ {0}) . By the argument in the beginning of this subsection, each factor  ϕ∗ : H2 DL/2 (Lni ), DL/2 (Lni ) \ {Lni } → H2 (C, C \ {0}) is isomorphic. Thus (f0 )∗ is an isomorphism.  The derivative (dΘL )z at z = (z1 , . . . , zk ) is a diagonal matrix whose (i, i)-th entry is given by   √ √ cos(πzi /L) π −1 bi zi −1 bi sin(πzi /L) + πe , (1 ≤ i ≤ k). L Notation 5.3. We choose 0 < r1 < 1/4 so small that for all 1 ≤ i ≤ k and z ∈ Dr1   √ √ cos(πz/L) 3 π −1 bi z −1 bi sin(πz/L) + π e > . L L Since for small z cos(πz/L) 1 πz , ≈ , L L L we can choose r1 independent of L > 1. (This independence is a plausible fact but it is not really needed in the argument below.) sin(πz/L) ≈ It immediately follows from the definition that for all n ∈ Zk and z ∈ Drk1 (Ln) (5.2) ν ((dΘL )z ) > 3 . L 34 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Notation 5.4 (The threshold θL ). We define Ω ⊂ Ck as the set of z = (z1 , . . . , zk ) satisfying |Im(zi )| ≤ 1 for all 1 ≤ i ≤ k. We define θL > 0 as the minimum of the following two quantities: ( ) [ 1 k −1/2 (3/4)k+1 , inf |ΘL (z)| z ∈ Ω \ Drk1 (Ln) . L k n∈Z The next lemma is the main result of this subsection. Lemma 5.5 (Persistence of zero points of ΘL ). Let f : Ck → Ck be a holomorphic map. Let W ⊂ Ck be a subset and suppose |f (z) − ΘL (z)| < θL for all z ∈ W . Then the following (1) and (2) hold. (1) {z ∈ W ∩ Ω| f (z) = 0} ⊂ k (2) For every n ∈ Z with D1k (Ln) [ Drk1 (Ln). n∈Zk ⊂ W there exists z ∈ Drk1 (Ln) satisfying f (z) = 0, ν(dfz ) > 2 . L Proof. (1) is a direct consequence of the definition of θL . So we consider (2). For the notational simplicity, assume n = 0. It follows from the definition of θL that max |f (z) − ΘL (z)| < min |ΘL (z)|, z∈∂Drk1 z∈∂Drk1 where ∂Drk1 is the boundary of Drk1 . (So in particular its (2k − 1)-th homology group is isomorphic to Z.) Then we can define a homotopy ft : ∂Drk1 → Ck \ {0} between ΘL and f by ft (z) = (1 − t)ΘL (z) + tf (z), (0 ≤ t ≤ 1). Here the point is that ft has no zero on ∂Drk1 . It follows from Lemma 5.2 that f∗ =  (ΘL )∗ : H2k−1 (∂Drk1 ) → H2k−1 Ck \ {0} is isomorphic. Then f must attain zero at some   (interior) point of Drk1 . Otherwise the map f∗ : H2k−1 ∂Drk1 → H2k−1 Ck \ {0} is equal to the composition of the maps   f∗  H2k−1 ∂Drk1 → H2k−1 Drk1 → H2k−1 Ck \ {0} .    But H2k−1 Drk1 = 0 implies that the map f∗ : H2k−1 ∂Drk1 → H2k−1 Ck \ {0} is zero. This is a contradiction. The rest of the work is to prove the statement about the derivative of f at zero points. By (5.1) and (5.2) it is enough to prove that for all z ∈ Drk1 the operator norm of dfz − (dΘL )z is smaller than 1/L. Let z = (z1 , . . . , zk ) ∈ Drk1 . By the Cauchy integration formula, Z Z 1 f (w) − ΘL (w) √ f (z) − ΘL (z) = dw1 . . . dwk . ··· k (2π −1) ∂D1 ∂D1 (w1 − z1 ) . . . (wk − zk ) EMBEDDING PROBLEM OF Zk -ACTIONS 35 For u = (u1 , . . . , uk ) ∈ Ck with |u| = 1, the vector dfz (u) − (dΘL )z (u) is given by Z Z k X f (w) − ΘL (w) 1 √ ··· ui dw1 . . . dwk . 2 k (2π −1) i=1 ∂D1 (w1 − z1 ) . . . (wi − zi ) . . . (wk − zk ) ∂D1 For zi ∈ Dr1 and wi ∈ ∂D1 we have |wi − zi | > 3/4 because r1 < 1/4. Hence |dfz (u) − (dΘL )z (u)| < ≤ k X i=1 √ |ui |(4/3)k+1θL k(4/3) k+1 1 θL ≤ , L  by θL ≤ k −1/2 (3/4) k+1 1 L  . This proves |dfz − (dΘL )| < 1/L.  5.2. Tiling-like band-limited maps. We choose a rapidly decreasing function χ1 : Rk → R satisfying supp F (χ1 ) ⊂ Bδ/8 and Z (5.3) F (χ1 )(0) = χ1 (t) dt1 . . . dtk = 1. Rk Notation 5.6. We set K1 = Z Rk |χ1 (t)| dt1 . . . dtk . The function χ1 can be extended holomorphically over Ck (see Lemma 2.2) by Z √ F (χ1 )(ξ) e2π −1ξ·z dξ1 . . . dξk , (z = (z1 , . . . , zk ) ∈ Ck ). χ1 (z) = Bδ/8 For any polynomial P (z1 , . . . , zk ), by the integration by parts, √  √   √ Z −1 ∂ −1 ∂ P P (z1 , . . . , zk )χ1 (z) = ,..., F (χ1 )(ξ) e2π −1ξ·z dξ1 . . . dξk . 2π ∂ξ1 2π ∂ξk Bδ/8 Hence there exists a positive constant constP depending on P and satisfying v   u k uX |Im(zi )|2  . |P (z1 , . . . , zk )χ1 (z)| ≤ constP · e(πδ/4)|Im(z)| , |Im(z)| = t i=1 In particular for each l ≥ 0 there exists a constant constl satisfying (5.4) |χ1 (z)| ≤ constl · (1 + |z|)−l · e(πδ/4)|Im(z)| . It follows that the integral Z Rk χ1 (z − t) dt1 . . . dtk converges and becomes a holomorphic function in z ∈ Ck . It is constantly equal to one for z ∈ Rk by (5.3). Therefore indeed it is identically equal to one: Z (5.5) χ1 (z − t) dt1 . . . dtk = 1, (z ∈ Ck ). Rk 36 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Let W = {Wn }n∈Zk be a set of bounded convex sets of Rk (indexed by Zk ) such that it tiles the whole space Rk , namely S • Rk = n∈Zk Wn . • For any two distinct m and n in Zk the sets Wm and Wn intersect at most on their boundaries ∂Wm and ∂Wn : Wm ∩ Wn = ∂Wm ∩ ∂Wn . Notice that some Wn may be empty. For L > 1 we define a tiling-like band-limited map ΦL (W) : Ck → Ck by Z X χ1 (z − t) dt1 . . . dtk . ΦL (W) (z) = ΘL (z − n) Wn n∈Zk As was already explained before, intuitively we would like to consider X ΘL (t − n) 1Wn (t), (t ∈ Rk ). n∈Zk Namely we would like to “paint” the map ΘL (t − n) over each tile Wn . But this is not even continuous in t. So instead we defined ΦL (W) as in the above. √ It follows from ||ΘL ||L∞ (Rk ) = k and Notation 5.6 that the map ΦL (W) (t) is bounded over t ∈ Rk : Z X |ΦL (W) (t)| ≤ ||ΘL ||L∞ (Rk ) |χ1 (t − x)| dx1 . . . dxk n∈Zk = ||ΘL ||L∞ (Rk ) √ = kK1 . Wn Z Rk |χ1 (t − x)| dx1 . . . dxk The Fourier transform of the i-th entry of ΦL (W)|Rk is supported in i−1    k−i  δ δ 1 δ bi 1 δ bi δ δ × − , × − − , + + , (1 ≤ i ≤ k). − , 8 8 2 2L 8 2 2L 8 8 8 Since bi = ai + δ/2, if L > 4/δ then this is contained in  i−1    k−i δ δ δ δ ai ai δ − , × − , , + × 4 4 2 2 2 4 4 Since we assumed δ < min(a1 , . . . , ak ) in (3.2) in Subsection 3.3, these k sets are disjoint with each other. Notation 5.7. Recall that Ω ⊂ Ck is the set of z = (z1 , . . . , zk ) satisfying |Im(zi )| ≤ 1 for all 1 ≤ i ≤ k. By (5.4) we can choose E = E(L) > 0 such that for all z ∈ Ω Z θL |χ1 (z − t)| dt1 . . . dtk < , ||ΘL ||L∞ (Ω) 2 Rk \BE (Re(z)) where θL is the constant introduced in Notation 5.4. EMBEDDING PROBLEM OF Zk -ACTIONS 37 We recall the notations introduced in Subsection 2.4: For r > 0 and A ⊂ Rk , we define  ∂r A as the set of all t ∈ Rk satisfying Br (t) ∩ A 6= ∅ and Br (t) ∩ Rk \ A 6= ∅. We set Intr A = A \ ∂r A, namely Intr A is the set of t ∈ A satisfying Br (t) ⊂ A. Lemma 5.8. Let n ∈ Zk and z ∈ Ω. If Re(z) ∈ IntE Wn then |ΦL (W) (z) − ΘL (z − n)| < θL . Proof. For simplicity of the notation we assume n = 0. By (5.5) ΦL (W) (z) − ΘL (z) = X m6=0 ΘL (z − m) − ΘL (z) Z Z Rk \W0 Hence |ΦL (W) (z) − ΘL (z)| ≤ 2 ||ΘL ||L∞ (Ω) Wm χ1 (z − t) dt1 . . . dtk χ1 (z − t) dt1 . . . dtk . Z Rk \W0 |χ1 (z − t)| dt1 . . . dtk . This is smaller than θL by the definition of E.  The next lemma is the summary of this subsection. Lemma 5.9 (Main properties of ΦL (W)). (1) The restriction of ΦL (W) to Rk is a √ bounded continuous map such that ||ΦL (W)||L∞ (Rk ) ≤ kK1 and that if L > 4/δ then the Fourier transform of the i-th entry of ΦL (W) |Rk is supported in  δ δ − , 4 4 i−1 ×  ai ai δ , + 2 2 2   δ δ × − , 4 4 k−i , (1 ≤ i ≤ k), which are disjoint with each other. (2) Let n ∈ Zk and z ∈ Ω. If Re(z) ∈ IntE Wn and ΦL (W) (z) = 0 then there exists m ∈ Zk satisfying z ∈ Drk1 (n + Lm). (3) Let n, m ∈ Zk with n + Lm ∈ IntE+√k Wn . Then there exists z ∈ Drk1 (n + Lm) satisfying ΦL (W) (z) = 0, ν ((dΦL (W))z ) > 2 . L Proof. (1) was already proved. (2) follows from Lemmas 5.5 (1) and 5.8. For (3), notice that n + Lm ∈ IntE+√k Wn implies B√k (n + Lm) ⊂ IntE (Wn ) and that every point z ∈ D1k (n + Lm) satisfies Re(z) ∈ IntE (Wn ). Then (3) follows from Lemmas 5.5 (2) and 5.8.  38 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Conditions (2) and (3) in Lemma 5.9 are the rigorous formulation of “good/bad decomposition” explained in Subsection 1.4. The domain Ω is decomposed into two regions: ( ) [ Good region = z ∈ Ω Rez ∈ IntE+√k Wn , Bad region = n∈Zk ( z ∈ Ω Rez ∈ [ ∂E+√k Wn n∈Zk ) . The above (2) and (3) mean that we have a good control (for our purpose here) of zero points of ΦL (W) over the good region. As we explained in Subsection 1.4, the bad region should be “tiny”. This means that we need to introduce a tiling W such that the “boundary region” [ ∂E+√k Wn n∈Zk is sufficiently small. (Indeed we will need a bit more involved condition later; see (5.9) below). The purpose of the next subsection is to construct such tilings. 5.3. Dynamical Voronoi diagram. This subsection is largely a reproduction of [GLT16, Section 4]. Here we introduce a dynamically generated Voronoi diagram. Our use of Voronoi diagram is conceptually influenced by the works of Lightwood [Lig03, Lig04]. Let (X, Zk , T ) be a dynamical system having the marker property as we promised in Subsection 3.3. Let M be a natural number. It follows from the marker property that there exists an open set U ⊂ X satisfying [ U ∩ T n U = ∅ (0 < |n| < M), X = T n U. n∈Zk We can find a natural number M1 ≥ M and a compact set F ⊂ U satisfying X = S n |n|<M1 T F . Choose a continuous function h : X → [0, 1] satisfying supp h ⊂ U and h = 1 on F . Then it satisfies [ T n ({x ∈ X| h(x) = 1}) . (5.6) (supp h) ∩ T n (supp h) = ∅ (0 < |n| < M), X = |n|<M1 For x ∈ X consider the following discrete set in Rk+1 :    1 k n n ∈ Z , h(T x) > 0 . n, h(T n x) We consider the Voronoi diagram determined by this set. Namely we define a convex set V0 (x, n) for n ∈ Zk as follows: If h(T n x) = 0 then we set V0 (x, n) = ∅. If h(T n x) > 0 then we define it as the set of all u ∈ Rk+1 satisfying     1 1 k m ≤ u − m, . u − n, ∀m ∈ Z with h(T x) > 0 : h(T n x) h(T m x) EMBEDDING PROBLEM OF Zk -ACTIONS 39 Figure 5.2. Voronoi tiling. The Voronoi center (n, 1/h(T n x)) is located inside V0 (x, n). The shadowed region is W0 (x, n). The sets V0 (x, n) form a tiling of Rk+1 : Rk+1 = [ V0 (x, n). n∈Zk Let πRk : Rk+1 → Rk be the projection to the first k coordinates (i.e. forgetting the last  √ 2 coordinate). Set H = M1 + k and  W0 (x, n) = πRk V0 (x, n) ∩ Rk × {−H} . See Figure 5.2. These form a tiling of Rk : [ Rk = W0 (x, n). n∈Zk This tiling is Zk -equivariant in the sense that W0 (T n x, m) = −n + W0 (x, n + m) = {−n + u| u ∈ W0 (x, n + m)}. The tiles W0 (x, n) depend continuously on x ∈ X in the Hausdorff topology. More precisely, for ε > 0 and for each x ∈ X and n ∈ Zk with Int W0 (x, n) 6= ∅, if y ∈ X is sufficiently close to x, then the Hausdorff distance between W0 (x, n) and W0 (y, n) is smaller than ε. Here Int W0 (x, n) denotes the interior of W0 (x, n). (When the tile W0 (x, n) has no interior point, it may vanish after x moves slightly. But this does not cause any problem.) The set W0 (x, n) depends on the choice of the parameter M. So we sometimes write W0M (x, n) = W0 (x, n) for clarifying that M is the parameter11. In the next subsection we consider the tiling-like band-limited map for this tiling. The following property of 11It might look that M1 and h are also parameters. But we can choose them to be functions of M . Namely for each natural number M we fix a natural number M1 = M1 (M ) and a continuous function h = hM : X → [0, 1] satisfying (5.6). Then only M remains to be a parameter. 40 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO W0M (x, n) becomes crucial there, which means that the “bad region” is negligible as we explained at the end of the last section. Lemma 5.10. For any r > 0 ( lim M →∞ lim sup sup R→∞ BR ∩ x∈X S ∂r W0M (x, n) |BR | n∈Zk !) = 0. Here | · | is the k-dimensional volume (Lebesgue measure). Proof. We need some auxiliary claims. Claim 5.11. Let x ∈ X and n ∈ Zk with h(T n x) > 0. (1) V0 (x, n) contains the ball BM/2 (n, 1/h(T n x)). (2) W0 (x, n) ⊂ BM1 +√k (n). (3) If W0 (x, n) 6= ∅ then h(T n x) > 1/2. Proof. It follows from the first property of h in (5.6) that if m ∈ Zk also satisfies h(T m x) > 0 then |n − m| ≥ M. Property (1) easily follows from this. For the proof of (2) and (3), take u ∈ W0 (x, n). Let v ∈ Zk be the integer point closest to u. By the second property of h in (5.6) there exists m ∈ Zk satisfying |m| < M1 and h(T v+m x) = 1. It follows from the definition of the Voronoi tiling that   1 (u, −H) − n, (5.7) ≤ |(u, −H) − (v + m, 1)| . h(T n x) Since |H + 1/h(T n x)| ≥ H + 1, |u − n| ≤ |u − v − m| < |u − v| + M1 < √ k + M1 . This proves (2). It follows from (5.7) that  2 2 √ 1 2 2 k + M1 + (H + 1)2 . H+ ≤ |u − v − m| + (H + 1) < h (T n x) Then Property (3) follows: √ k + M1 1 < h(T n x) 2H   2 √ where we used H = M1 + k > 1. 2 +1+ 1 1 1 < + 1 + = 2, 2H 2 2  Let ε > 0. We take c > 1 satisfying c−k > 1 − ε. We choose M so large that (5.8) (c − 1)M > r, 2(c + 1)  2 c+ M −k > 1 − ε. EMBEDDING PROBLEM OF Zk -ACTIONS 41 Figure 5.3. Configurations of V0 (x, n), W0 (x, n) and W1 (x, n).  For x ∈ X and n ∈ Zk we set W1M (x, n) = W1 (x, n) = πRk V (x, n) ∩ Rk × {−cH} , where πRk : Rk+1 → Rk is the projection to the first k coordinates. It follows from the same proof of Claim 5.11 (2) that W1 (x, n) ⊂ BM1 +√k (n). For u ∈ W1 (x, n) we denote by (f (u), −H) the intersection point of the hyperplane Rk × {−H} and the line segment between (u, −cH) and the Voronoi center (n, 1/h(T n x)). It follows from the convexity of V0 (x, n) that f (u) ∈ W0 (x, n). See Figure 5.3. Claim 5.12. (1) For any u ∈ W1 (x, n) the point f (u) belongs to Intr W0 (x, n). (2) |Intr W0 (x, n)| ≥ (1 − ε) |W1 (x, n)|. Proof. (1) From BM/2 (n, 1/h(T n x)) ⊂ V0 (x, n), the set W0 (x, n) × {−H} contains the intersection point of the hyperplane Rk × {−H} and the line segment between (u, −cH) and (v, 1/h(T nx)) for v ∈ BM/2 (n). Then W0 (x, n) contains the ball of radius cH − H M · 1 cH + h(T n x) 2 around the point f (u). See Figure 5.3 again. From h(T n x) > 1/2 (Claim 5.11 (3)), cH − H (c − 1)H M (c − 1)M M . > · = · 1 cH + 2 2 cH + h(T n x) 2 2 c + H2  √ 2 By H = M1 + k > 2, this is larger than (c − 1)M >r 2(c + 1) (by the first condition of (5.8)). 42 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO This shows f (u) ∈ Intr W0 (x, n). (2) We can assume W1 (x, n) 6= ∅. (Otherwise the statement is trivial.) From (1) !k H + h(T1n x) |W1 (x, n)| . |Intr W0 (x, n)| ≥ |{f (u)| u ∈ W1 (x, n)}| = cH + h(T1n x) From h(T n x) > 1/2 (Claim 5.11 (3)),  k k  H 1 |Intr W0 (x, n)| ≥ |W1 (x, n)| . |W1 (x, n)| = cH + 2 c + H2  √ 2 Since H = M1 + k > M |Intr W0 (x, n)| ≥  1 c + M2 k |W1 (x, n)| . By the second condition of (5.8) this proves (2). √ Let x ∈ X and R > 2M1 + 2 k. BR ∩ [ n∈Zk ∂r W0 (x, n) ≤ |BR | − [ √ |n|≤R−M1 − k ≤ |BR | − (1 − ε)  (by W0 (x, n) ⊂ BM1 +√k (n)) Intr W0 (x, n) [ √ (by Claim 5.12 (2)). W1 (x, n) |n|≤R−M1 − k S Since W1 (x, n) ⊂ BM1 +√k (n) and Rk = n∈Zk W1 (x, n), [ W1 (x, n) ⊃ BR−2M1 −2√k . √ |n|≤R−M1 − k Hence BR ∩ Thus [ n∈Zk ∂r W0 (x, n) ≤ |BR | − (1 − ε) BR−2M1 −2√k . lim sup sup R→∞ This proves the statement. x∈X BR ∩ S ∂r W0 (x, n) |BR | n∈Zk ! ≤ ε.  5.4. Tiling and weight functions from tiling-like band-limited maps. Let A, L0 and L be positive numbers. These three parameters control the construction of this subsection. We assume: Condition 5.13 (L is much larger than AL0 ). L is an integer satisfying  √  L > 1000k (A + 1) L0 + 1 + k . EMBEDDING PROBLEM OF Zk -ACTIONS 43 Let E = E(L) be the positive constant introduced in Notation 5.7. By Lemma 5.10 we can choose M = M(A, L0 , L) > 0 so that the sets W0 (x, n) = W0M (x, n) in Subsection 5.3 satisfy   S B3R ∩ n∈Zk ∂E+2(L+1)√k+L0 +1 W0 (x, n) 1 < . (5.9) lim sup sup 6A + 2 BR/2 R→∞ x∈X Let x ∈ X. We define ΦA,L0 ,L (x) = ΦL ({W0 (x, n)}n∈Zk ) : Ck → Ck as the tiling-like band-limited map with respect to the tiling {W0 (x, n)}n∈Zk , namely for z ∈ Ck Z X ΦA,L0 ,L (x)(z) = ΘL (z − n) χ1 (z − t) dt1 . . . dtk . W0 (x,n) n∈Zk We often abbreviate ΦA,L0 ,L (x) to Φ(x). Lemma 5.14 (Basic properties of Φ(x)). Φ satisfies √ (1) Boundedness: ||Φ(x)||L∞ (Rk ) ≤ kK1 . (2) Frequencies: If L > 4/δ then the Fourier transform of the i-th entry of Φ(x)|Rk (1 ≤ i ≤ k) is supported in i−1    k−i  δ δ ai ai δ δ δ × − , , + × , − , 4 4 2 2 2 4 4 which are disjoint with each other. (3) Equivariance: Φ(T n x)(z) = Φ(x)(z + n) for all x ∈ X, n ∈ Zk and z ∈ Ck . (4) Continuity: If a sequence xn in X converges to x then Φ(xn ) converges to Φ(x) uniformly over every compact subset of Ck . Proof. (1) and (2) immediately follow from Lemma 5.9 (1). (3) and (4) follow from the equivariance and continuity of the tiles W0 (x, n).  Let 0 < r1 < 1/4 be the positive number introduced in Notation 5.3. Let α1 : Ck → [0, 1] and α2 : R → [0, 1] be continuous functions satisfying   k , z∈ / D2r α1 (z) = 1 z ∈ Drk1 , α1 (z) = 0 1     2 1 , α2 (t) = 1 t≥ . α2 (t) = 0 t≤ L L For each x ∈ X and n ∈ Zk we define a non-negative number νA,L0 ,L (x, n) = ν(x, n) by     X ν(x, n) = min 1, α1 (z − n) α2 (ν (dΦ(x)z )) .   Φ(x)(z)=0 k Here the sum is taken over all z ∈ Ck satisfying Φ(x)(z) = 0, z ∈ D2r (n) and ν (dΦ(x)z ) ≥ 1 1/L. The set of such z is a finite set because non-degenerate zero points are isolated. So k this is a finite sum. (Notice that the polydisk D2r (n) may contain infinitely many zeros of 1 Φ(x). The above definition of ν(x, n) addresses this problem. The number 1/L is chosen 44 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO so that the zero points found in Lemma 5.9 (3) contribute to the above sum.) For each n ∈ Zk the number ν(x, n) depends continuously on x ∈ X. We again consider a Voronoi tiling. Let x ∈ X. Consider the following discrete set in k+1 R :    1 k n ∈ Z , ν(x, n) > 0 . n, ν(x, n) This set is not empty. (See the proof of Lemma 5.15 (1) below.) So this determines a Voronoi diagram. Namely for n ∈ Zk we define V (x, n) as the set of u ∈ Rk+1 satisfying     1 1 k u − n, ∀m ∈ Z with ν(x, m) > 0 : ≤ u − m, . ν(x, n) ν(x, m) If ν(x, n) = 0 then V (x, n) = ∅. These form a tiling of Rk+1 : [ Rk+1 = V (x, n). n∈Zk  We set W (x, n) = πRk V (x, n) ∩ Rk × {0} , where πRk : Rk+1 → Rk is the projection to the first k coordinates as before. The sets W (x, n) form a tiling of Rk : [ Rk = W (x, n). n∈Zk This is also Zk -equivariant, namely W (T n x, m) = −n + W (x, n + m). Each W (x, n) is a bounded convex set of Rk (see Lemma 5.15 (1) below) and depends continuously on x ∈ X in the Hausdorff topology as in the case of W0 (x, n). We sometimes denote W (x, n) by W A,L0 ,L (x, n) for clarifying the dependence on the parameters A, L0 , L. For x ∈ X we S define ∂(x) = ∂ A,L0 ,L (x) as n∈Zk ∂W (x, n). Lemma 5.15 (Basic properties of W (x, n)). (1) The diameter of W (x, n) is bounded k uniformly in x ∈ X and n ∈ Z . Moreover sup sup sup x∈X n∈Zk u∈W (x,n) |n − u| < ∞. (2) Let α3 : R → [0, 3] be a continuous function satisfying α3 (t) = 3 (t ≤ L0 ), α3 (t) = 0 (t ≥ L0 + 1). There exists R0 = R0 (A, L0 , L) > 0 such that for all x ∈ X and all u ∈ Zk X X |IntL0 W (x, n)| , α3 (d (n, ∂(x))) < A |n−u|≤2R0 |n−u|≤R0 where d (n, ∂(x)) = inf t∈∂(x) |n−t| and the sums are taken over all n ∈ Zk satisfying |n−u| ≤ 2R0 and |n−u| ≤ R0 in the left-hand side and right-hand side respectively. Proof. Let x ∈ X and n ∈ Zk . It follows from Lemma 5.9 (2) and (3) that  ∀ integer point m ∈ IntE+2r1 √k W0 (x, n) \ n + LZk : ν(x, m) = 0, (5.10)  ∀ m ∈ n + LZk ∩ IntE+√k W0 (x, n) : ν(x, m) = 1. EMBEDDING PROBLEM OF Zk -ACTIONS 45 (1) By (5.9) if we choose R sufficiently large then for all x ∈ X [ BR ∩ ∂E+(L+1)√k W0 (x, n) 6= BR . n∈Zk Then there exists n ∈ Zk satisfying BR ∩ IntE+(L+1)√k W0 (x, n) 6= ∅. Then we can find  a point m ∈ n + LZk ∩ BR+L√k ∩ IntE+√k W0 (x, n). It follows from the second line of (5.10) that ν(x, m) = 1. By the Zk -equivariance we conclude that for any p ∈ Zk there exists an integer point q ∈ BR+L√k (p) satisfying ν(x, q) = 1. Take u ∈ W (x, n). Let p be the integer point closest to u. Then we can find an integer point q ∈ BR+L√k (p) satisfying ν(x, q) = 1. It follows form the definition of the Voronoi tiling that   1 ≤ |(u, 0) − (q, 1)| . (u, 0) − n, ν(x, n) From ν(x, n) ≤ 1, |u − n| ≤ |u − q| ≤ |u − p| + |p − q| ≤ This proves sup sup sup x∈X n∈Zk u∈W (x,n) √ √ k + R + L k. √ |n − u| ≤ R + (L + 1) k. (2) The above (5.10) implies k ∀m ∈ n + LZ because for such m  ∩ IntE+(L+1)√k W0 (x, n)  L L : W (x, m) = m + − , 2 2 ∀ integer point l ∈ m + L (−1, 1)k with l 6= m : ∀ l ∈ m + L {−1, 0, 1}k : k , ν(x, l) = 0, ν(x, l) = 1. We introduce a dichotomy: For x ∈ X we define a “good set” Gx as the set of m ∈ Zk satisfying W (x, m) = m + [−L/2, L/2]k . We define a “bad set” Bx as the complement of Gx in Zk . Then it follows that [ IntE+(2L+1)√k W0 (x, n) ⊂ W (x, m), (5.11) [ m∈Bx W (x, m) ⊂ [ m∈Gx ∂E+(2L+1)√k W0 (x, n). n∈Zk √ For simplicity of the notation, we set E ′ = E +(2L+1) k. We define D as the supremum of |n − u| over all x ∈ X, n ∈ Zk and u ∈ W (x, n). This is finite by (1). P Let r and R be positive numbers and u ∈ Zk . We estimate n∈BR (u) |∂r W (x, n)|. Noting [ BR−D (u) ⊂ W (x, n) ⊂ BR+D (u), n∈BR (u) 46 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO we can estimate (5.12) X n∈BR (u) |∂r W (x, n)| = X n∈BR (u)∩Gx |∂r W (x, n)| + ≤ 2k+1 r(L + 2r)k−1 = X n∈BR (u)∩Bx |∂r W (x, n)| [ |BR+D | B (u) ∩ + ∂E ′ +r W0 (x, n) R+D+r Lk k n∈Z [ 2k+1 r(L + 2r)k−1 |B | + B ∩ ∂E ′ +r W0 (T u x, n) . R+D R+D+r Lk k n∈Z We would like to prove that for sufficiently large R (uniformly in x ∈ X and u ∈ Zk ) (5.13) A X X α3 (d (n, ∂(x))) < n∈B2R (u) n∈BR (u) |IntL0 W (x, n)| . It follows from (5.12) that X n∈BR (u) |IntL0 W (x, n)| ≥ X n∈BR (u) (|W (x, n)| − |∂L0 W (x, n)|) 2k+1L0 (L + 2L0 )k−1 |BR+D | Lk [ ∂E ′ +L0 W0 (T u x, n) . − BR+D+L0 ∩ ≥ |BR−D | − n∈Zk If R is sufficiently larger than D + L0 then (noting L > 2L0 by Condition 5.13) (5.14) X n∈BR (u) |IntL0 W (x, n)| ≥ BR/2 − =  1− [ 4k L0 |B2R | − B2R ∩ ∂E ′ +L0 W0 (T u x, n) L k n∈Z 16k L0 L  BR/2 − B2R ∩ [ n∈Zk The left-hand side of (5.13) is bounded by 3A# Zk ∩ B2R (u) ∩ ≤ 3A B2R+√k (u) ∩ ≤ 3A X [ n∈Zk [ ∂L0 +1 W (x, n) ! ∂L0 +1+√k W (x, n) n∈Zk ∂L0 +1+√k W (x, n) . n∈B2R+2√k+D+L 0 +1 (u) ∂E ′ +L0 W0 (T u x, n) . EMBEDDING PROBLEM OF Zk -ACTIONS 47 As in the case of (5.14) if R is sufficiently large then this is bounded by (noting L > √ 2L0 + 2 + 2 k by Condition 5.13)    √  4k L0 + 1 + k [ |B3R | + B3R ∩ ∂E ′ +L0 +1+√k W0 (T u x, n)  3A  L n∈Zk (5.15)     √ 24k L0 + 1 + k [ = 3A  BR/2 + B3R ∩ ∂E ′ +L0 +1+√k W0 (T u x, n)  . L k n∈Z By combining (5.14), (5.15) with Condition 5.13 and (5.9), we can conclude that (5.13) holds for sufficiently large R.  As we explained in Subsection 3.2 we need a social welfare system among the tiles W (x, n). The next proposition provides it. Proposition 5.16 (Construction of weight functions). We can construct a continuous map  k  k k Z , x 7→ (w(x, n))n∈Zk , where w(x, n) = (wm (x, n))m∈Zk ∈ [0, 1]Z (5.16) X → [0, 1]Z satisfying the following. (1) The map is equivariant in the sense that for all m, n ∈ Zk and x ∈ X w(T mx, n) = w(x, n + m). (2) If x, y ∈ X satisfy Φ(x) = Φ(y) then w(x, n) = w(y, n) for all n ∈ Zk . (3) For all x ∈ X and n ∈ Zk #{m ∈ Zk | wm (x, n) > 0} < 1 + 1 |IntL0 W (x, n)| . A In particular if IntL0 W (x, n) = ∅ then wm (x, n) = 0 for all m ∈ Zk . (4) Let x ∈ X and p ∈ Zk with d (p, ∂(x)) ≤ L0 . There exists n ∈ Zk ∩ BR0 (p) satisfying wp−n (x, n) = 1. Here R0 = R0 (A, L0 , L) is the positive number introduced in Lemma 5.15 (2). We call w(x, n) weight functions and sometimes write w A,L0,L (x, n) = w(x, n) for clarifying the dependence on parameters. Probably the intuitive meaning of the statement is not clear at all. So we explain it before the proof. (The idea of the social welfare system was first introduced in [GT]. The explanation below is more or less a reproduction of the argument around [GT, Lemma 6.4].) In the proof of Proposition 3.1 we construct a perturbation g1 (x) of a given bandlimited function f (x) for each x ∈ X. It is difficult to construct a perturbation over the whole space Rk at once. So we will perturb f (x) over each tile W (x, n) separately. The difficulty arises near the boundary ∂W (x, n). The parameter L0 will be chosen so 48 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO that we can construct a good perturbation in IntL0 W (x, n). But we cannot control the perturbation over ∂L0 W (x, n). (Note that if the tile W (x, n) is tiny, it may be contained in ∂L0 W (x, n). So the problem is approximately equivalent to “how to help small tiles”.) The function g1 (x) should encode the information of the orbit of x ∈ X. The above argument means that it becomes difficult to encode the information of T p x for p ∈ Zk with d (p, ∂(x)) ≤ L0 . The weight functions wm (x, n) help with this situation. Roughly (and very inaccurately) speaking, we will encode the (100 × wm (x, n)) % of the information of T n+m x to g1 (x)|W (x,n). So wm (x, n) is the “amount of help” that the tile W (x, n) gives to the point n + m. In particular, if wm (x, n) = 1 then the information of T n+m x is perfectly encoded into g1 (x)|W (x,n). Now we can explain the intuitive meaning of the above (1)–(4). Condition (1) is an obvious requirement. Condition (2)12 means that the weight function w(x, n) is determined by the tiling-like band-limited map Φ(x). Condition (3) means that the amount of “additional encoding” which W (x, n) has to bear is controlled by the volume of IntL0 W (x, n). Condition (4) means that every point near the boundary ∂(x) is “successfully rescued” by some large tile. Namely we can solve all the difficulties coming from the boundary effect. Proof of Proposition 5.16. We fix a bijection between Zk and N = {1, 2, 3, . . . } N ∋ l 7→ ml ∈ Zk such that if l1 < l2 then |ml1 | ≤ |ml2 |. (Then in particular m1 = 0.) Fix x ∈ X. For n ∈ Zk we set u0 (n) = |IntL0 W (x, n)| , A v0 (n) = α3 (d (n, ∂(x))) . Here α3 : R → [0, 3] is the continuous function introduced in Lemma 5.15 (2). We define ωl (n), ul (n), vl (n) inductively with respect to l ≥ 1 by ωl (n) = min (ul−1 (n), vl−1 (n + ml )) , ul (n) = ul−1 (n) − ωl (n), vl (n) = vl−1 (n) − ωl (n − ml ). This process can be explained in “social welfare” terms: • The tiles W (x, n) should pay tax. Tax is used for helping integer points p ∈ Zk . The tile W (x, n) can pay at most u0 (n) and the point p needs v0 (p). • At the l-th step of the induction, the tile W (x, n) gives the money ωl (n) to the point n + ml . After the step, W (x, n) still can pay ul (n) and points p still need vl (p). 12The above explanation does not feature Condition (2). But indeed this is a very important condition. It did not appear in the paper [GT]. A substantial amount of the argument in this section has been developed for establishing this condition. EMBEDDING PROBLEM OF Zk -ACTIONS 49 Figure 5.4. At the l-th step of the induction, the tile W (x, n) gives the amount of money ωl (n) to the point n + ml . Before this step, W (x, n) has the amount of money ul−1 (n) and the point n + ml needs vl−1 (n + ml ). After this step, either W (x, n) loses all its money (i.e. ul (n) = 0) or n + ml becomes satisfied (i.e. vl (n+ml ) = 0). Namely, min (ul (n), vl (n + ml )) = 0. • At each step, W (x, n) pays as much as possible. Namely, after the l-th step, at least one of ul (n) and vl (n + ml ) is zero. This is a key property of the process. Figure 5.4 schematically explains the process.  Set l0 = # Zk ∩ BR0 . Then Zk ∩ BR0 = {m1 , . . . , ml0 }. It follows from Lemma 5.15 (2) that this process terminates: For all l ≥ l0 and n ∈ Zk vl (n) = 0, ωl+1 (n) = 0, because if vl0 (n0 ) > 0 for some n0 then ul0 (n) = 0 for all n ∈ BR0 (n0 ) and hence X u0 (n) = X l0 X ωl (n) < n∈BR0 (n0 ) l=1 n∈BR0 (n0 ) X v0 (n), n∈B2R0 (n0 ) which contradicts Lemma 5.15 (2). It follows from the construction that for n, p ∈ Zk l0 X (5.17) l=1 l0 X (5.18) l=1 ωl (n) ≤ u0 (n) = |IntL0 W (x, n)| , A ωl (p − ml ) = v0 (p) = α3 (d (n, ∂(x))) . We define continuous functions α4 : R → [1, 2l0 ] and α5 : R → [0, 1] such that α4 (0) = 2l0 , α4 (t) = 1 (t ≥ 1), α5 (t) = 0 (t ≤ 1), α5 (t) = 1 (t ≥ 2). We define F : Rl0 → Rl0 by F (x1 , . . . , xl0 ) = (y1 , . . . , yl0 ) where yl0 = 2l0 xl0 , yl0 −1 = α4 (yl0 )xl0 −1 , y1 = α4 (max(yl0 , . . . , y2 )) x1 . yl0 −2 = α4 (max(yl0 , yl0 −1 )) xl0 −2 , ... 50 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO This satisfies (5.19) #{1 ≤ l ≤ l0 | yl > 1} ≤ 1 + #{1 ≤ l ≤ l0 | xl > 1}. We define G : Rl0 → [0, 1]l0 by G(y1 , . . . , yl0 ) = (α5 (y1 ), . . . , α5 (yl0 )). Then it follows from the above (5.19) that if we set GF (x1 , . . . , xl0 ) = (z1 , . . . , zl0 ) then (5.20) #{1 ≤ l ≤ l0 | zl > 0} ≤ 1 + #{1 ≤ l ≤ l0 | xl > 1}. We define wm (x, n) for |m| ≤ R0 and n ∈ Zk by   wm1 (x, n), wm2 (x, n), . . . , wml0 (x, n) = GF (ω1 (n), . . . , ωl0 (n)) . We set wm (x, n) = 0 for |m| > R0 . Now we have defined the map (5.16) in the statement. We need to check its properties. It is continuous and equivariant (i.e. Property (1)) because the tiles W (x, n) depend continuously on x ∈ X and W (T mx, n) = −m + W (x, n + m). Property (2) is obvious because the tiles W (x, n) are constructed from the function Φ(x). Fix x ∈ X again. From (5.17) #{1 ≤ l ≤ l0 | ωl (n) > 1} < |IntL0 W (x, n)| . A Then Property (3) follows from (5.20): #{m| wm (x, n) > 0} ≤ 1 + #{1 ≤ l ≤ l0 | ωl (n) > 1} < 1 + |IntL0 W (x, n)| . A Finally we check Property (4). Let p ∈ Zk with d (p, ∂(x)) ≤ L0 . Then v0 (p) = 3. From (5.18) l0 X ωl (p − ml ) = 3. l=1 We define l1 as the maximum of 1 ≤ l ≤ l0 satisfying ωl (p − ml ) > 0. If ωl1 (p − ml1 ) ≥ 2 then wml1 (p − ml1 ) = 1. Otherwise lX 1 −1 l=1 Then there exists l2 < l1 satisfying ωl (p − ml ) > 1. ωl2 (p − ml2 ) > 1 1 ≥ . l1 l0 The condition l2 < l1 implies ul2 (p − ml2 ) = 0 (otherwise vl2 (p) = 0 and ωl1 (p − ml1 ) = 0) and hence ωl (p − ml2 ) = 0 for all l > l2 . It follows from the definition of the maps F and G that wl2 (p − ml2 ) = 1. This proves Property (4).  EMBEDDING PROBLEM OF Zk -ACTIONS 51 6. Proof of Main Proposition We prove Proposition 3.1 in this section. We recommend readers to review the notations introduced in Subsection 3.3. We repeat the statement of the proposition (assuming the notations in Subsection 3.3): Proposition 6.1 (= Proposition 3.1). Let d be a distance on X and f : X → B1 (a1 , . . . , ak ) a Zk -equivariant continuous map. Then there exists a Zk -equivariant continuous map g : X → B1 (a1 + δ, . . . , ak + δ) such that • ||g(x) − f (x)||L∞ (Rk ) < δ for all x ∈ X. • g is a δ-embedding with respect to the distance d. We can assume ||f (x)||L∞ (Rk ) ≤ 1 − δ for all x ∈ X by replacing f with (1 − δ)f if necessary. We fix 0 < δ ′ < δ satisfying 4K0 δ ′ < δ (6.1) where K0 is the positive number introduced in Notation 4.1 (1). We choose 0 < ε < δ such that for any x, y ∈ X (6.2) d(x, y) < ε =⇒ ||f (x) − f (y)||L∞ ([0,1]k ) < δ ′ . From mdim(X) < ρ1 . . . ρk /2 we can find c0 > 1 and a natural number N such that • ρi N are integers for all 1 ≤ i ≤ k. (Recall ρi ∈ Q.) •  Widimε X, d[N ] + 1 ρ1 . . . ρk < . c0 · k N 2 From the second condition, we can find a simplicial complex P and an ε-embedding  Π : X, d[N ] → P satisfying dim P + 1 ρ1 . . . ρk < . k N 2 We take a simplicial complex Q and an ε-embedding π : (X, d) → Q. We define the cone CP as [0, 1] × P/ ∼, where (0, p) ∼ (0, q) for all p, q ∈ P . We denote by tp the equivalence class of (t, p) ∈ [0, 1] × P . We set ∗ = 0p and call it the vertex of the cone. We define CQ in the same way. It follows from (6.3) that (6.3) c0 (6.4) c0 ρ1 . . . ρk dim CP < . k N 2 We set ρ1 . . . ρk dim CP − c0 > 0. 2 Nk Recall that we introduced the positive number r0 in Notation 4.1 (2). We set v u k uX (6.6) r2 = r0 + t (1/ρi )2 . (6.5) c1 = i=1 52 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO Notation 6.2 (Fixing the parameters A, L0 , L). We take positive numbers A, L0 and L satisfying the following conditions. (1) c1 A > 2 dim CQ. √ (2) L0 is sufficiently larger than r2 + N k such that if a bounded closed convex set W ⊂ Rk satisfies IntL0 W 6= ∅ then (6.7) 2 dim CQ < c1 Intr2 +N √k W , (6.8) W ∪ ∂N √k W < c0 Intr2 +N √k W . The second condition is satisfied for sufficiently large L0 by Lemma 2.7. (3) L > 4/δ (see Lemma 5.14 (2)) and Condition 5.13 holds. For these A, L0 and L we construct the tiles W (x, n) = W A,L0,L (x, n) and the weight functions w(x, n) = w A,L0 ,L (x, n) as in Subsection 5.4. Lemma 6.3. Let x ∈ X and n ∈ Zk . We define #(x, n) = #{m ∈ Zk | wm(x, n) > 0}. If IntL0 W (x, n) 6= ∅ then (6.9) W (x, n) ∪ ∂N √k W (x, n) dim CP + #(x, n) · dim CQ Nk ρ1 . . . ρk Intr2 +N √k W (x, n) . < 2 Proof. By (6.8) and Proposition 5.16 (3), the left-hand side of (6.9) is smaller than   Intr2 +N √k W (x, n) |IntL0 W (x, n)| dim CQ. dim CP + 1 + (6.10) c0 Nk A By Notation 6.2 (1) and (2), the second term is smaller than 1 1 c1 Intr2 +N √k W (x, n) + c1 |IntL0 W (x, n)| 2 2 ≤ c1 Intr2 +N √k W (x, n) √ (by L0 > r2 + N k). Then it follows from the definition of c1 in (6.5) that the above (6.10) is smaller than   ρ1 . . . ρk dim CP Intr2 +N √k W (x, n) . + c1 Intr2 +N √k W (x, n) = c0 k N 2  Notation 6.4 (Choice of R). We take a positive number R such that • R ∈ NZ. • R > R0 (A, L0 , L) where R0 (A, L0 , L) is the positive number introduced in Lemma 5.15 (2). EMBEDDING PROBLEM OF Zk -ACTIONS 53 • For all x ∈ X and n ∈ Rk , the tile W (x, n) satisfies −n + W (x, n) ⊂ [−R, R)k , where −n + W (x, n) = {−n + t| t ∈ W (x, n)}. This condition is satisfied for sufficiently large R by Lemma 5.15 (1). We set k ∩N Zk P = (CP )[−R,R) , k ∩Zk Q = (CQ)[−R,R) . For i ≥ 0 we define Q(i) ⊂ Q as the set of (qn )n∈[−R,R)k ∩Zk satisfying qn = ∗ except for at most i entries. In particular Q(0) = {(∗, . . . , ∗)} and dim Q(i) ≤ i dim CQ. Let W ⊂ [−R, R)k be a convex set. We define P(W ) ⊂ P as the set of (pn )n∈[−R,R)k ∩N Zk  such that if W ∩ n + [0, N)k = ∅ then pn = ∗. Its dimension is estimated by W ∪ ∂N √k W dim CP. Nk dim P(W ) ≤ We define a map ΠW : X → P(W ) by ΠW (x) = W ∩ n + [0, N)k Nk  · Π(T n x) ! . n∈[−R,R)k ∩N Zk ΠW is an ε-embedding with respect to the distance dIntW ∩Zk , where IntW is the interior of W . It follows from Lemma 6.3 that for any x ∈ X and n ∈ Zk with IntL0 W (x, n) 6= ∅ ρ1 . . . ρk Intr2 +N √k W (x, n) . (6.11) dim (P (−n + W (x, n)) × Q (#(x, n))) < 2 Recall that we introduced lattices Γ and Γ1 of Rk in Subsection 3.3. Applying Lemma 2.5 to the ε-embedding Π : (X, d[N ] ) → P and a map k X → RΓ∩[0,N ) , x 7→ (f (x)(λ))λ∈Γ∩[0,N )k , k we can find a simplicial map F : P → RΓ∩[0,N ) satisfying ∀x ∈ X, λ ∈ Γ ∩ [0, N)k : |F (Π(x)) (λ) − f (x)(λ)| < δ ′ . We extend F over CP by F (tp) = tF (p). We define a simplicial map G : P × Q → k RΓ∩[−R,R) as follows: For p = (pn )n∈[−R,R)k ∩N Zk ∈ P, q ∈ Q, n ∈ [−R, R)k ∩ NZk and λ ∈ Γ ∩ [0, N)k G(p, q)(n + λ) = F (pn )(λ). Using Lemma 2.6 (2), we perturb G and construct a simplicial map G : P × Q → k RΓ∩[−R,R) satisfying the following. Property 6.5 (Properties on G). (1) G is sufficiently close to G in the sense that for all (p, q) ∈ P × Q and λ ∈ Γ ∩ [−R, R)k |G(p, q)(λ) − G(p, q)(λ)| < δ ′ − sup x∈X,λ∈Γ∩[0,N )k |F (Π(x)) (λ) − f (x)(λ)| . This implies that for all convex sets W ⊂ [−R, R)k , x ∈ X and q ∈ Q ∀λ ∈ Γ ∩ IntN √k W : |G (ΠW (x), q) (λ) − f (x)(λ)| < δ ′ . 54 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO (2) If a convex set W ⊂ [−R, R)k , i ≥ 0 and a subset Λ ⊂ Γ ∩ [−R, R)k satisfy dim (P(W ) × Q(i)) < |Λ| , 2 then the map P(W ) × Q(i) → RΛ , (p, q) 7→ G(p, q)|Λ is an embedding. Now we are ready to prove the main proposition. Proof of Proposition 3.1. We choose continuous functions β1 , β2 : R → [0, 1] satisfying β1 (t) = 0 (t ≤ r0 ), β1 (t) = 1 (t ≥ r0 + 1),   √  √  β2 (t) = 0 t ≤ N k , β2 (t) = 1 t ≥ r0 + N k . S Let x ∈ X. Recall that we introduced ∂(x) = n∈Zk ∂W (x, n). We define px : Γ1 → [0, 1] and ux = (ux (λ))λ∈Γ1 ∈ ℓ∞ (Γ1 ) as follows: For λ ∈ Γ1 • If there exists n ∈ Zk satisfying λ ∈ (n + Γ) ∩ W (x, n) then px (λ) =β1 (d(λ, ∂(x))) , ux (λ) =β2 (d(λ, ∂(x))) {−f (x)(λ)    + G Π−n+W (x,n)(T n x), wm (x, n) · π(T n+m x) m∈[−R,R)k ∩Zk (λ − n)}. • Otherwise we set px (λ) = 0 and ux (λ) = 0. px is an admissible function in the sense of Definition 4.2 (2). It follows from Property 6.5 (1) with f (x)(λ) = f (T n x)(λ − n) that (6.12) ||ux ||∞ < δ ′ . Since the tiles W (x, n) and the weight functions w(x, n) depend continuously on x ∈ X, the numbers px (λ) and ux (λ) depend continuously on x for each fixed λ ∈ Γ1 . We set g1 (x) = f (x) + Ψ(px , ux ) ∈ B(a1 , . . . , ak ) where Ψ is the interpolating function introduced in Section 4. By the continuity of Ψ (Proposition 4.9), g1 (x) depends continuously on x ∈ X. Since the tiles W (x, n) and the weight functions w(x, n) satisfy the natural Zk -equivariance, px (λ) and ux (λ) also satisfy the Zk -equivariance (i.e. pT n x (λ) = px (λ + n) and uT n x (λ) = ux (λ + n)). The interpolating function Ψ also satisfies it (Lemma 4.7 (3)). Therefore the map X ∋ x 7→ g1 (x) ∈ B1 (a1 , . . . , ak ) is Zk -equivariant. By Lemma 4.7 (2) and (6.12) (6.13) ||g1 (x) − f (x)||L∞ (Rk ) = ||Ψ(px , ux )||L∞ (Rk ) < 2K0 δ ′ < δ 2 (we assumed 4K0 δ ′ < δ in (6.1)) . EMBEDDING PROBLEM OF Zk -ACTIONS 55 Let ΦA,L0 ,L (x) = (Φ(x)1 , . . . , Φ(x)k ) : Ck → Ck be the tiling-like band-limited map introduced in Subsection 5.4 for the parameters A, L0 , L in Notation 6.2. We define g2 (x) : Rk → R by ! k X δ Re Φ(x)i . g2 (x) = 2kK1 i=1 √ It follows from ||Φ(x)||L∞ (Rk ) ≤ kK1 (Lemma 5.14 (1)) that δ ||g2 (x)||L∞ (Rk ) ≤ . 2 By Lemma 5.14 (2) with L > 4/δ, the Fourier transform of each Φ(x)i |Rk is supported in i−1    k−i  δ δ δ δ ai ai δ def × − , ∆i = − , × , (1 ≤ i ≤ k). , + 4 4 2 2 2 4 4 (6.14) Then the Fourier transform of g2 (x) is supported in (6.15) k [ i=1 ∆i ∪ (−∆i ), (−∆i = {−ξ| ξ ∈ ∆i }). Q This is contained in ki=1 [−(ai + δ)/2, (ai + δ)/2]. So g2 (x) ∈ B(a1 + δ, . . . , ak + δ). The map X ∋ x 7→ g2 (x) ∈ B(a1 + δ, . . . , ak + δ) is continuous and Zk -equivariant by the corresponding properties of Φ(x) in Lemma 5.14 (3) and (4). Finally we set g(x) = g1 (x) + g2 (x). By (6.13) and (6.14) ||f (x) − g(x)||L∞ (Rk ) < δ. In particular ||g(x)||L∞ (Rk ) < 1 by the assumption ||f (x)||L∞ (Rk ) ≤ 1 − δ in the beginning of the section. The map X ∋ x 7→ g(x) ∈ B1 (a1 + δ, . . . , ak + δ) is continuous and Zk -equivariant. We need to prove that g : X → B1 (a1 + δ, . . . , ak + δ) is a δ-embedding with respect to d. Suppose g(x) = g(y) for some x, y ∈ X. We would like to show d(x, y) < δ. It follows from g(x) = g(y) that g1 (x) = g1 (y) and g2 (x) = g2 (y) because the Fourier transforms Q of g1 (x) and g1 (y) are supported in ki=1 [−ai /2, ai /2], which is disjoint with (6.15). The equation g2 (x) = g2 (y) implies Φ(x)i = Φ(y)i for all 1 ≤ i ≤ k because 2k sets ∆i and −∆i are disjoint with each other. So Φ(x) = Φ(y). Then it follows that W (x, n) = W (y, n) and w(x, n) = w(y, n) for all n ∈ Zk because the tiles W (x, n) and the weight functions w(x, n) are constructed from the tiling-like band-limited map Φ(x). Case 1: Suppose d (0, ∂(x)) > L0 . Then there exists n ∈ Zk satisfying 0 ∈ IntL0 W (x, n). For all λ ∈ (n + Γ) ∩ Intr0 +N √k W (x, n) px (λ) = 1,    ux (λ) = −f (x)(λ) + G Π−n+W (x,n)(T n x), wm (x, n) · π(T n+m x) m∈[−R,R)k ∩Zk (λ − n). 56 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO It follows from the interpolation property of Ψ in Lemma 4.7 (1) that for all λ ∈ (n + Γ) ∩ Intr0 +N √k W (x, n)    g1 (x)(λ) = G Π−n+W (x,n)(T n x), wm (x, n) · π(T n+m x) m∈[−R,R)k ∩Zk (λ − n), (6.16)    g1 (y)(λ) = G Π−n+W (y,n) (T n y), wm (y, n) · π(T n+m y) m∈[−R,R)k ∩Zk (λ − n). From IntL0 W (x, n) 6= ∅ (because 0 ∈ IntL0 W (x, n)) and (6.11) ρ1 . . . ρk dim (P (−n + W (x, n)) × Q (#(x, n))) < Intr2 +N √k W (x, n) 2  1 ≤ # Γ ∩ −n + Intr0 +N √k W (x, n) , 2  s X by r2 = r0 + (1/ρi )2 in (6.6) . i Therefore by Property 6.5 (2) the map (6.17) P (−n + W (x, n)) × Q (#(x, n)) → R  Γ∩ −n+Intr (p, q) 7→ G(p, q)|Γ∩−n+Int r0 +N 0 +N √ √ k  W (x,n)  k W (x,n) is an embedding. Thus g1 (x) = g1 (y) implies that Π−n+W (x,n)(T n x) = Π−n+W (y,n) (T n y). Recall that the map Π−n+W (x,n) is an ε-embedding with respect to the distance d−n+IntW (x,n) . It follows from 0 ∈ IntL0 W (x, n) that −n ∈ −n + IntW (x, n). Thus we get d(x, y) ≤ d−n+IntW (x,n) (T n x, T n y) < ε < δ. Case 2: Suppose d (0, ∂(x)) ≤ L0 . It follows from Proposition 5.16 (3) and (4) that there exists n ∈ BR0 ∩ Zk satisfying IntL0 W (x, n) 6= ∅ and w−n (x, n) = w−n (y, n) = 1. As in Case 1, we have the same formula (6.16) for all λ ∈ (n + Γ) ∩ Intr0 +N √k W (x, n). The map (6.17) is also an embedding. Then the equation g1 (x) = g1 (y) implies that   wm (x, n) · π(T n+m x) m∈[−R,R)k ∩Zk = wm (y, n) · π(T n+m y) m∈[−R,R)k ∩Zk . Since w−n (x, n) = w−n (y, n) = 1, we get π(x) = π(y). Thus d(x, y) < ε < δ because π : X → Q is an ε-embedding with respect to d.  Now we have completed the proof of Main Theorem 2 (and hence the proof of Main Theorem 1). 7. Open problems Here we explain major open problems in the direction of the paper. (1) From Main Theorem 1, we have a good understanding of when dynamical systems Zk under the assumption of the marker property. So can be embedded in [0, 1]D the next step is how to remove the assumption. We would like to propose EMBEDDING PROBLEM OF Zk -ACTIONS 57 Conjecture 7.1. Let (X, Zk , T ) be a dynamical system. For a subgroup A ⊂ Zk we define XA ⊂ X as the space of x ∈ X satisfying T a x = x for all a ∈ A. The quotient group Zk /A naturally acts on XA . Then X can be embedded in the shift Zk if for every subgroup A ⊂ Zk the mean dimension of XA with respect on [0, 1]D to the (Zk /A)-action is smaller than D/2. If Zk /A is a finite group, then the mean dimension of XA is just dim XA . #(Zk /A) When k = 1, Conjecture 7.1 is equivalent to [LT14, Conjecture 1.2]. Notice that Zk then for any subgroup A ⊂ Zk the system YA is naturally if we set Y = [0, 1]D k  Z /A identified with [0, 1]D , whose mean dimension is D. So Conjecture 7.1 can k be rephrased; if (X, Z , T ) satisfies ∀ subgroup A ⊂ Zk : mdim(XA ) < mdim(YA ) , 2 Zk then it can be embedded in Y = [0, 1]D . (2) Let Ω ⊂ Rk be a compact subset. We define B1 (Ω) as the space of continuous functions f : Rk → C satisfying suppfˆ ⊂ Ω and ||f ||L∞ (Rk ) ≤ 1. The mean dimension of the natural Zk -action on B1 (Ω) is equal to 2|Ω|. (Here notice that f are complex-valued functions. The factor 2 comes from dim C = 2.) We would like to ask when a dynamical system (X, Zk , T ) can be embedded in the shift on B1 (Ω). By almost the same argument as the proof of Main Theorem 2, we can prove Theorem 7.2. Suppose Ω is a rectangle (i.e. congruent to a set [a1 , b1 ] × · · · × [ak , bk ]). If a dynamical system (X, Zk , T ) satisfies the marker property and mdim(X) < |Ω| = (b1 − a1 ) × · · · × (bk − ak ), then we can embed it in the shift on B1 (Ω). The proof of this theorem is notationally more messy than the proof of Main Theorem 2. So we concentrate on Main Theorem 2 in this paper. If Ω is not a rectangle, then the method of this paper does not work directly. Nevertheless, it seems reasonable to conjecture that if Ω is a “nice” set (e.g. a semialgebraic set) and if a dynamical system (X, Zk , T ) satisfies the marker property and mdim(X) < |Ω| then X can be embedded in the shift on B1 (Ω). We hope to return to this problem in a future. 58 YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO (3) An ambitious question is how to generalize Main Theorems 1 and 2 to the actions of noncommutative groups. In particular it is very interesting to see what kind of signal analysis should be involved. We don’t have an answer even for nilpotent groups. References [Aus88] J. Auslander, Minimal flows and their extensions, North-Holland, Amsterdam, 1988. [Beu89] Collected works of Arne Beurling, Vol. 2, Harmonic Analysis, Edited by L. Carleson, P. Malliavan, J. Neuberger, and J. Wermer, Birkhäuser, Boston-Basel-Berlin, 1989. [CS72] M. Cornalba, B. Shiffman, A couterexample to the “Transcendental Bezout Problem”. Ann. of Math. 96 (1972) 402-406. [CT06] T.M. Cover, J.A. Thomas, Elements of information theory, second edition, Wiley, New York, 2006. [DM72] H. Dym, H.P. McKean, Fourier series and integrals, Academic Press, New York-London, 1972. [Gro99] M. Gromov, Topological invariants of dynamical systems and spaces of holomorphic maps: I, Math. Phys. Anal. Geom. 2 (1999) 323-415. [Gut12] Y. Gutman, Mean dimension and Jaworski-type theorems, Proceedings of the London Mathematical Society 111(4) (2015) 831-850. [GLT16] Y. Gutman, E. Lindenstrauss, M. Tsukamoto, Mean dimension of Zk -actions, Geom. Funct. Anal. 26 Issue 3 (2016) 778-817. [GT] Y. Gutman , M. Tsukamoto, Embedding minimal dynamical systems into Hilbert cubes, preprint, arXiv:1511.01802. [Hay64] W.K. Hayman, Meromorphic functions, Clarendon Press, Oxford, 1964. [HW41] W. Hurewicz, H. Wallman, Dimension theory, Princeton University Press, 1941. [Hat02] A. Hatcher, Algebraic topology, Cambridge University Press, 2002. [Jaw74] A. Jaworski, Ph.D. Thesis, University of Maryland (1974). [Lig03] S.J. Lightwood, Morphisms from non-periodic Z2 -subshifts. I. Constructing embeddings from homomorphisms, Ergodic Theory Dynam. Systems 23 (2003) 587–609. [Lig04] S.J. Lightwood, Morphisms from non-periodic Z2 subshifts. II. Constructing homomorphisms to square-filling mixing shifts of finite type. Ergodic Theory Dynam. Systems 24 (2004) 1227–1260. [Lin99] E. Lindenstrauss, Mean dimension, small entropy factors and an embedding theorem, Inst. Hautes Études Sci. Publ. Math. 89 (1999) 227-262. [LT14] E. Lindenstrauss, M. Tsukamoto, Mean dimension and an embedding problem: an example, Israel J. Math. 199 (2014) 573-584. [LW00] E. Lindenstrauss, B. Weiss, Mean topological dimension, Israel J. Math. 115 (2000) 1-24. [NW14] J. Noguchi, J. Winkelmann, Nevanlinna theory in several complex variables and Diophantine approximation, Springer, Tokyo, 2014. [OU12] A. Olevskii, A. Ulanovskii, On multi-dimensional sampling and interpolation, Anal. Math. Phys. 2 (2012) 149-180 [Sch66] L. Schwartz, Théorie des distributions, Hermann, Paris, 1966. [Sha48] C.E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J. 27 (1948) 379-423, 623-656. [Spa66] E.H. Spanier, Algebraic topology, Springer-Verlag, New York, 1966. EMBEDDING PROBLEM OF Zk -ACTIONS Yonatan Gutman Institute of Mathematics, Polish Academy of Sciences, ul. Warszawa, Poland E-mail address: [email protected] 59 Śniadeckich 8, 00-656 Yixiao Qiao Institute of Mathematics, Polish Academy of Sciences, ul. Śniadeckich 8, 00-656 Warszawa, Poland – and – Department of Mathematics, University of Science and Technology of China, Hefei, Anhui 230026, P.R. China E-mail address: [email protected] Masaki Tsukamoto Department of Mathematics, Kyoto University, Kyoto 606-8502, Japan E-mail address: [email protected]
7cs.IT
Distributed Testing of Excluded Subgraphs Pierre Fraigniaud∗1 , Ivan Rapaport†2 , Ville Salo‡2 , and Ioan Todinca3 1 arXiv:1605.03719v1 [cs.DC] 12 May 2016 2 CNRS and University Paris Diderot, France DIM-CMM (UMI 2807 CNRS), Universidad de Chile, Chile 3 Université d’Orléans, France Abstract We study property testing in the context of distributed computing, under the classical CONGEST model. It is known that testing whether a graph is triangle-free can be done in a constant number of rounds, where the constant depends on how far the input graph is from being triangle-free. We show that, for every connected 4-node graph H, testing whether a graph is H-free can be done in a constant number of rounds too. The constant also depends on how far the input graph is from being H-free, and the dependence is identical to the one in the case of testing triangles. Hence, in particular, testing whether a graph is K4 -free, and testing whether a graph is C4 -free can be done in a constant number of rounds (where Kk denotes the k-node clique, and Ck denotes the k-node cycle). On the other hand, we show that testing Kk -freeness and Ck -freeness for k ≥ 5 appear to be much harder. Specifically, we investigate two natural types of generic algorithms for testing H-freeness, called DFS tester and BFS tester. The latter captures the previously known algorithm to test the presence of triangles, while the former captures our generic algorithm to test the presence of a 4-node graph pattern H. We prove that both DFS and BFS testers fail to test Kk -freeness and Ck -freeness in a constant number of rounds for k ≥ 5. Keywords: property testing, decision and verification algorithms, CONGEST model. ∗ Additional support from ANR project DISPLEXITY, and Inria project GANG. Additional support from CONICYT via Basal in Applied Mathematics, Núcleo Milenio Información y Coordinación en Redes ICM/FIC RC130003, Fondecyt 1130061. ‡ Additional support from FONDECYT project 3150552. † 1 Introduction Let P be a graph property, and let 0 < ǫ < 1 be a fixed parameter. According to the usual definition from property testing [17], an n-node m-edge graph G is ǫ-far from satisfying P if applying a sequence of at most ǫm edge-deletions or edge-additions to G cannot result in a graph satisfying P. In the context of property testing, graphs are usually assumed to be stored using an adjacency list, and a centralized algorithm has the ability to probe nodes, via queries of the form (i, j) where i ∈ {1, . . . , n}, and j ≥ 0. The answer to a query (i, 0) is the degree of node i, while the answer to a query (i, j) with j > 0 is the identity of the jth neighbor of node i. After a small number of queries, the algorithm must output either accept or reject. An algorithm Seq is a testing algorithm for P if and only if, for every input graph G,  G satisfies P =⇒ Pr[Seq accepts G] ≥ 32 ; G is ǫ-far from satisfying P =⇒ Pr[Seq rejects G] ≥ 32 . (An algorithm is 1-sided if it systematically accepts every graph satisfying P). The challenge in this context is to design testing algorithms performing as few queries as possible. In the context of distributed property testing [7], the challenge is not the number of queries (as all nodes perform their own queries in parallel), but the lack of global perspective on the input graph. The graph models a network. Every node of the network is a processor, and every processor can exchange messages with all processors corresponding to its neighboring nodes in the graph. After a certain number of rounds of computation, every node must output accept or reject. A distributed algorithm Dist is a distributed testing algorithm for P if and only if, for any graph G modeling the actual network,  G satisfies P =⇒ Pr[Dist accepts G in all nodes] ≥ 23 ; G is ǫ-far from satisfying P =⇒ Pr[Dist rejects G in at least one node] ≥ 23 . The challenge is to use as few resources of the network as possible. In particular, it is desirable that every processor could take its decision (accept or reject) without requiring data from far away processors in the network, and that processors exchange messages of size respecting the inherent bounds imposed by the limited bandwidth of the links. These two constraints are well captured by the CONGEST model. This model is a classical model for distributed computation [28]. Processors are given distinct identities, that are supposed to have values in [1, nc ] in n-node networks, for some constant c ≥ 1. All processors start at the same time, and then proceed in synchronous rounds. At each round, every processor can send and receive messages to/from its neighbors, and perform some individual computation. All messages must be of size at most O(log n) bits. So, in particular, every message can include at most a constant number of processor identities. As a consequence, while every node can gather the identities of all its neighbors in just one round, a node with large degree that is aware of all the identities of its neighbors may not be able to send them all simultaneously to a given neighbor. The latter observation enforces strong constraints on distributed testing algorithms in the CONGEST model. For instance, while the LOCAL model allows every node to gather its t-neighborhood in t rounds, even just gathering the 2-neighborhood may require Ω(n) rounds in the CONGEST model (e.g., in the Lollipop graph). As a consequence, detecting the presence of even a small given pattern in a graph efficiently is not necessarily an easy task. The presence or absence of a certain given pattern (typically, paths, cycles or cliques of a given size) as a subgraph, induced subgraph, or minor, has a significant impact on graph properties, and/or on the ability to design efficient algorithms for hard problems. This paper investigates the existence of efficient distributed testing algorithms for the H-freeness property, depending on the given graph H. Recall that, given a graph H, a graph G is H-free if and only 1 if H is not isomorphic to a subgraph of G, where H is a subgraph of a graph G if V (H) ⊆ V (G), and E(H) ⊆ E(G). Recently, Censor-Hillel et al. [7] established a series of results regarding distributed testing of different graph properties, including bipartiteness and triangle-freeness. A triangle-free graph is a K3 -free graph or, equivalently, a C3 -free graph, where Kk and Ck respectively denote the clique and the cycle on k vertices. The algorithm in [7] for testing bipartiteness (of bounded degree networks) requires O(log n) rounds in the CONGEST model, and the authors conjecture that this is optimal. However, quite interestingly, the algorithm for testing triangle-freeness requires only a constant number of rounds, O(1/ǫ2 ), i.e., it depends only on the (fixed) parameter ǫ quantifying the ǫ-far relaxation. In this paper, we investigate the following question: what are the (connected) graphs H for which testing H-freeness can be done in a constant number of rounds in the CONGEST model? 1.1 Our results We show that, for every connected 4-node graph H, testing whether a graph is H-free can be done in O(1/ǫ2 ) rounds. Hence, in particular, testing whether a graph is K4 -free, and testing whether a graph is C4 -free can be done in a constant number of rounds. Our algorithm is generic in the sense that, for all 4-node graphs H, the global communication structure of the algorithm is the same, with only a variant in the final decision for accepting or rejecting, which of course depends on H. In fact, we identify two different natural generic types of testing algorithms for H-freeness. We call the first type DFS tester, and our algorithm for testing the presence of 4-node patterns is actually the DFS tester. Such an algorithm applies to Hamiltonian graphs H, i.e., graphs H containing a simple path spanning all its vertices. It performs in |H| − 1 rounds. Recall that, for a node set A, G[A] denotes the subgraph of G induced by A. At each round t of the DFS tester, at every node u, and for each of its incident edges e, node u pushes a graph G[At ] (where, initially, A0 is just the graph formed by u alone). The graph G[At ] is chosen u.a.r. among the sets of graphs received from the neighbors at the previous round. More specifically, upon reception of every graph G[At−1 ] at round t − 1, node u forms a graph G[At−1 ∪ {u}], and the graph G[At ] pushed by u along e at round t is chosen u.a.r. among the collection of graphs G[At−1 ∪ {u}] currently held by u. We call BFS tester the second type of generic testing algorithm for H-freeness. The algorithm in [7] for triangle-freeness is a simplified variant of the BFS tester, and we prove that the BFS tester can test K4 -freeness in O(1/ǫ2 ) rounds. Instead of guessing a path spanning H (which may actually not exist for H large), the BFS tester aims at directly guessing all neighbors in H simultaneously. The algorithm performs in D − 1 rounds, where D is the diameter of H. For the sake of simplicity, let us assume that H is d-regular. At each round, every node u forms groups of d neighboring nodes. These groups may overlap, but a neighbor should not participate to more than a constant number of groups. Then for every edge e = {u, v} incident to u, node u pushes all partial graphs of the form G[At−1 ∪ {v1 , . . . , vt }] where v ∈ {v1 , . . . , vt }, At−1 is chosen u.a.r. among the graphs received at the previous round, and the vi ’s will be in charge of checking the presence of edges between them and the other vj ’s. We prove that neither the DFS tester, nor the BFS tester can test Kk -freeness in a constant number of rounds for k ≥ 5, and that the same holds for testing Ck -freeness (with the exception of a finite number of small values of k). This shows that testing Kk -freeness or Ck -freeness for k ≥ 5 in a constant number of rounds requires, if at all possible, to design algorithms which explore G from each node in a way far more intricate than just parallel DFSs or parallel BFSs. Our impossibility results, although restricted to DFS and BFS testers, might be hints that testing Kk -freeness and Ck -freeness for k ≥ 5 in n-node networks does require to perform a 2 number of rounds which grows with the size n of the network. 1.2 Related work The CONGEST model has become a standard model in distributed computation [28]. Most of the lower bounds in the CONGEST model have been obtained using reduction to communication complexity problems [12, 24, 9]. The so-called congested clique model is the CONGEST model in the complete graph Kn [11, 23, 25, 27]. There are extremely fast protocols for solving different types of graph problems in the congested clique, including finding ruling sets [21], constructing minimum spanning trees [20], and, closely related to our work, detecting small subgraphs [8, 10]. The distributed property testing framework in the CONGEST model was recently introduced in the aforementioned paper [7], inspired from classical property testing [17, 18]. Distributed property testing relaxes classical distributed decision [13, 14, 19], typically designed for the LOCAL model, by ignoring illegal instances which are less than ǫ-far from satisfying the considered property. Without such a relaxation, distributed decision in the CONGEST model requires non-constant number of rounds [9]. Other variants of local decision in the LOCAL model have been studied in [2, 3], where each process can output an arbitrary value (beyond just a single bit — accept or reject), and [4, 22], where nodes are bounded to perform a single round before to output at most O(log n) bits. Distributed decision has been also considered in other distributed environments, such as shared memory [15], with application to runtime verification [16], and networks of finite automata [29]. 2 Detecting Small Graphs Using a DFS Approach In this section, we establish our main positive result, which implies, in particular, that testing C4 -freeness and testing K4 -freeness can be done in constant time in the CONGEST model. Theorem 1 Let H be a graph on four vertices, containing a P4 (a path on four vertices) as a subgraph. There is a 1-sided error distributed property-testing algorithm for H-freeness, performing in a constant number of rounds in the CONGEST model. Proof. We show the theorem by exhibiting a generic distributed testing protocol for testing H-freeness, that applies to any graph H on four vertices containing a P4 as a subgraph. The core of this algorithm is presented as Algorithm 1. Note that the test H ⊆ G[u, u′ , v ′ , w′ ] at step 4 of Algorithm 1 can be performed thanks to the bit b that tells about the only edge that node u is not directly aware of. Algorithm 1 performs in just two rounds (if we omit the round used to acquire the identities of the neighbors), and that a single O(log n)-bit message is sent through every edge at each round. Clearly, if G is H-free, then all nodes accept. Algorithm 1: Testing H-freeness for 4-node Hamiltonian H. Instructions for node u. 1 2 3 4 5 Send id(u) to all neighbors; For every neighbor v, choose a received identity id(w) u.a.r., and send (id(w), id(u)) to v; For every neighbor v, choose a received pair (id(w′ ), id(u′ )) u.a.r., and send (id(w′ ), id(u′ ), id(u), b) to v, where b = 1 if w′ is a neighbor of u, and b = 0 otherwise; For every received 4-tuple (id(w′ ), id(v ′ ), id(u′ ), b), check whether H ⊆ G[u, u′ , v ′ , w′ ]; If H ⊆ G[u, u′ , v ′ , w′ ] for one such 4-tuple then reject else accept. In order to analyze the efficiency of Algorithm 1 in case G is ǫ-far from being H-free, let us consider a subgraph G[{u1 , u2 , u3 , u4 }] of G containing H, such that (u1 , u2 , u3 , u4 ) is 3 a P4 spanning H. Let E be the event “at step 2, vertex u2 sends (id(u1 ), id(u2 )) to its neighbor u3 ”. We have Pr[E] = 1/d(u2 ). Similarly, let E ′ be the event “at step 3, vertex u3 sends (id(u1 ), id(u2 ), id(u3 )) to its neighbor u4 ”. We have Pr[E ′ |E] = 1/d(u3 ). Since Pr[E ∧ E ′ ] = Pr[E ′ |E] · Pr[E], it follows that Pr[H is detected by u4 while performing Algorithm 1] ≥ 1 . d(u2 )d(u3 ) (1) Note that the events E and E ′ only depend on the choices made by u2 for the edge {u2 , u3 } and by u3 for the edge {u3 , u4 }, in steps 3 and 4 of Algorithm 1, respectively. Since these choices are performed independently at all nodes, it follows that if H1 and H2 are edge-disjoint copies of H in G, then the events E1 and E2 associated to them are independent, as well as the events E ′ 1 and E ′ 2 The following result will be used throughout the paper, so we state it as a lemma for further references. Lemma 1 Let G be ǫ-far from being H-free. Then G contains at least ǫm/|E(H)| edge-disjoint copies of H. To establish Lemma 1, let S = {e1 , . . . , ek } be a smallest set of edges whose removal from G results in an H-free graph. We have k ≥ ǫm. Let us then remove these edges from G according to the following process. The edges are removed in arbitrary order. Each time an edge e is removed from S, we select an arbitrary copy He of H containing e, we remove all the edges of He from G, and we reset S as S \ E(He ). We proceed as such until we have exhausted all the edges of S. Note that each time we pick an edge e ∈ S, there always exists a copy He of H containing e. Indeed, otherwise, S \ {e} would also be a set whose removal from G results in an H-free graph, contradicting the minimality of |S|. After at most k such removals, we get a graph that is H-free, and, by construction, for every two edges e, e′ ∈ S, we have that He and He′ are edge-disjoint. Every step of this process removes at most |E(H)| edges from S, hence the process performs at least ǫm/|E(H)| steps before exhausting all edges in S. Lemma 1 follows. Let us now define an edge {u, v} as important if it is the middle-edge of a P4 in one of the ǫm/|E(H)| edge-disjoint copies of H constructed in the proof of Lemma 1. We denote by I(G) the set of all important edges. Let N0 be the random variable counting the number of distinct copies of H that are detected by Algorithm 1. As a direct consequence of Eq (1), we get that X 1 . E(N0 ) ≥ d(u)d(v) {u,v}∈I(G) Define an edge {u, v} of G as good if d(u)d(v) ≤ 4m|E(H)|/ǫ, and let g(G) denote the set of good edges. Note that if there exists a constant γ > 0 such that |I(G) ∩ g(G)| ≥ γm, then the expected number of copies of H detected during a phase is X 1 γǫ 1 ≥ γm = . (2) E(N0 ) ≥ d(u)d(v) 4m|E(H)|/ǫ 4|E(H)| {u,v}∈I(G)∩g(G) We now show that the number of edges that are both important and good is indeed at least a 3 fraction γ of the egdes, for some constant γ > 0. We first show that G has at least (1− 4|E(H)| ǫ)m P good edges. Recall that u∈V (G) d(u) = 2m, and define N (u) as the set of all neighbors of node u. We have X X X 1 X d(u) d(v) ≤ d(u) m ≤ 2m2 . d(u)d(v) = 2 {u,v}∈E(G) u∈V (G) v∈N (u) 4 u∈V (G) Thus G must have at least (1 − X d(u)d(v) ≥ {u,v}∈E(G) 3 4|E(H)| ǫ)m X good edges, since otherwise d(u)d(v) > {u,v}∈E(G)\g(G) 3 4m|E(H)| ǫm = 3m2 , 4|E(H)| ǫ 3 contradicting the aforementioned 2m2 upper bound. Thus, G has at least (1 − 4|E(H)| ǫ)m good edges. On the other hand, since the number of important edges is at least the number of edgedisjoint copies of H in G, there are at least ǫm/|E(H)| important edges. It follows that the ǫ m. Therefore, by Eq. (2), number of edges that are both important and good is at least 4|E(H)| we get that  2 ǫ E(N0 ) ≥ . 4|E(H)| All the above calculations were made on the ǫm/|E(H)| edge-disjoint copies of H constructed (0) (0) in the proof of Lemma 1. Therefore, if Xi denotes the random variable satisfying Xi = 1 if P (0) ǫm/|E(H)| (0) the ith copy H is detected, and Xi = 0 otherwise, then we have N0 = i=1 Xi , and (0) the variables Xi , i = 1, . . . , ǫm/|E(H)|, are mutually independent. Let T = 8 ln 3  4|E(H)| ǫ 2 . P −1 By repeating the algorithm T times, and defining N = Tt=0 Nt where Nt denotes the number of copies of H detected at the tth independent repetition, we get E(N ) ≥ 8 ln 3. P −1 Pǫm/|E(H)| (t) (t) In fact, we also have N = Tt=0 Xi where Xi = 1 if the ith copy H is detected i=1 (t) at the tth iteration of the algorithm, and Xi = 0 otherwise. All these variables are mutually independent, as there is mutual independence within each iteration, and all iterations are performed independently. Therefore, Chernoff bound applies (see Theorem 4.5 in [26]), and so, for every 0 < δ < 1, we have 2 Pr[N ≤ (1 − δ)E[N ]] ≤ e−δ E[N ]/2 . By taking δ = 1 2 we get Pr[N ≤ 4 ln 3] ≤ 1 . 3 Therefore, a copy of H is detected with probability at least 23 , as desired, which completes the proof of Theorem 1.  Remark. Theorem 1 requires the existence of a P4 in the graph H. All connected graphs H of four vertices satisfy this condition, with the only exception of the star K1,3 (a.k.a. the claw ). Nevertheless, detecting whether a graph G has a star K1,3 as a subgraph is trivial (every node rejects whenever its degree at least three). 3 Limits of the DFS Approach Algorithm 1 can be extended in a natural way to any k-node graph H containing a Hamiltonian path, as follows. Given a graph G = (V, E), and A ⊆ V , let G[A] = (A, EA ) denote the subgraph of G induced by A (i.e., for every two nodes u and v in A, {u, v} ∈ EA ⇐⇒ {u, v} ∈ E). 5 The extension of Algorithm 1 to Hamiltonian graphs H is depicted in Algorithm 2. At the first round, every vertex u sends its identifier to its neighbors, and composes the d(u) graphs formed by the edge {u, v}, one for every neighbor v. Then, during the k − 2 following rounds, every node u forwards through each of its edges one of the graphs formed a the previous round. Algorithm 2: Testing H-freeness: Hamiltonian H, |V (H)| = k. Instructions for node u. 8 send the 1-node graph G[u] to every neighbor v; form the graph G[{u, v}] for every neighbor v; repeat k − 2 times for every neighbor v do choose a graph G[A] u.a.r. among those formed during the previous round; send G[A] to v; receive the graph G[A′ ] from v; form the graph G[A′ ∪ {u}]; 9 if H ⊆ G[A] for one of the graphs formed at the last round then reject else accept. 1 2 3 4 5 6 7 Let (u1 , u2 , . . . , uk ) be a simple path in G, and assume that G[{u1 , u2 , . . . , uk }] contains H. If, at each round i, 2 ≤ i < k, vertex ui sends to ui+1 the graph G[{u1 , . . . , ui }], then, when the repeat-loop completes, vertex uk will test precisely the graph G[{u1 , u2 , . . . , uk }], and thus H will be detected by the algorithm. Theorem 1 states that Algorithm 2 works fine for 4-node graphs H. We show that, k = 4 is precisely the limit of detection for graphs that are ǫ-far from being H-free, even for the cliques and the cycles. Theorem 2 Let H = Kk for arbitrary k ≥ 5, or H = Ck for arbitrary odd k ≥ 5. There exists a graph G that is ǫ-far from being H-free in which any constant number of repetitions of Algorithm 2 fails to detect H, with probability at least 1 − o(1). For the purpose of proving Theorem 2, we use the following combinatorial result, which extends Lemma 7 of [1], where the corresponding claim was proved for k = 3, with a similar proof. The bound on p′ is not even nearly optimal in Lemma 2 below, but it is good enough for our purpose1 . Lemma 2 Let k be a constant. For any sufficiently large p, there exists a set X ⊂ {0, . . . , p−1} of size p′ ≥ p log log p+4 1− log log log p k−1 X such that, for any k elements x1 , x2 , . . . , xk of X, xi ≡ (k − 1)xk (mod p) =⇒ x1 = · · · = xk−1 = xk . i=1 k j Proof. Let b = ⌊log p⌋ and a = logloglogp p . Take p sufficiently large so that a < b/k is satisfied. X is a set of integers encoded in base b, on a b-ary digits, such that the digits of each x ∈ X are a permutation Pa−1 of i{0, 1, . . . , a − 1}. More formally, for any permutation π over {0, . . . , a − 1}, let Nπ = i=0 π(i)b . Then, let us set X = {Nπ | π is a permutation of {0, . . . , a − 1}}. Observe that different permutations π and π ′ yield different numbers Nπ and Nπ′ because these numbers have different digits in base b. Hence X has p′ = a! elements. Using the inequality z! > (z/e)z as in [1] (Lemma 7), we get that a! ≥ p1− log log log p+4 log log p 1 , as desired. The interested reader can consult [30] for the state-of-the-art on such combinatorial constructions, in partic√ ′ 1−c/ log p , for a constant c depending on k. ular constructions for p ≥ p 6 log p Now, for any x ∈ X, we have x ≤ p/k. Indeed, x < a·ba−1 ≤ k1 ba , and ba ≤ (log p) log log p = p. Consequently, the modulo in the statement of the Lemma becomes Pk−1 irrelevant, and we will simply consider integer sums. Let x1 , . . . , xk−1 , xk in X, such that l=1 xi = (k − 1)xk . Viewing the xi ’s as integers in base b, and having in mind that all digits are smaller than b/k, we get that the equality must hold coordinate-wise. For every 1 ≤ l ≤ k, let πl be the permutation such that xl = Nπl . For every i ∈ 0, . . . , a − 1, we have k−1 X πl (i) = (k − 1)πk (i). l=1 By the Cauchy-Schwarz inequality applied to vectors (π1 (i), . . . , πk−1 (i)) and (1, . . . , 1), for every i ∈ {0, . . . , a − 1}, we also have k−1 X (πl (i))2 ≥ (k − 1) (πk (i))2 . l=1 Moreover equality holds if and only if π1 (i) = · · · = πk−1 (i) = πk (i). By summing up P the 2a inequalities induced by the a coordinates, observe that both sides sum to exactly (k−1) a−1 i=0 i . Therefore, for every i, the Cauchy-Schwarz inequality is actually an equality, implying that the ith digit is identical in all the k integers x1 , . . . , xk . As a consequence, x1 = · · · = xk−1 = xk , which completes the proof.  Proof of Theorem 2. Assume that G[{u1 , u2 , . . . , uk }] contains H, where (u1 , u2 , . . . , uk ) is a path of G. For 2 ≤ i ≤ k − 1, let us consider the event “at round i, vertex ui sends the graph G[u1 , . . . , ui }] to ui+1 ”. Observe that this event happens with probability d(u1 i ) because ui choses which subgraph to send uniformly at random among the d(ui ) constructed subgraphs. With the same arguments as the ones used to establish Eq. (1), we get Pr[H is detected along the path (u1 , . . . , uk )] = 1 . d(u2 )d(u3 ) . . . d(uk−1 ) (3) We construct families of graphs which will allow us to show, based on that latter equality, that the probability to detect a copy of H vanishes with the size of the input graph G. We actually use a variant of the so-called Behrend graphs (see, e.g., [1, 5]), and we construct graph families indexed by k, and by a parameter p, that we denote by BC(k, p) for the case of cycles, and by BK(k, p) for the case of cliques. We prove that these graphs are ǫ-far from being H-free, while the probability that Algorithm 2 detects a copy of H in these graphs goes to 0. Let us begin with the case of testing cycles. Let p be a large prime number, and let X be log log log p+4 a subset of {0, . . . , p − 1} of size p′ ≥ p1− log log p , where p′ is as defined in Lemma 2. Graph BC(k, p) is then constructed as follows. The vertex set V is the disjoint union of an odd number k of sets, V 0 , V 2 , . . . V k−1 , of p elements each. For every l, 0 ≤ l ≤ k − 1, let uli , i = 0, . . . , p − 1 be the nodes in V l so that V l = {uli | i ∈ {0, . . . , p − 1}}. For every i ∈ {0, . . . , p − 1} and every x ∈ X, edges in BC(k, p) form a cycle k−1 Ci,x = (u0i , . . . , uli+lx , ul+1 i+(l+1)x , . . . , ui+(k−1)x ), where the indices are taken modulo p. The cycles Ci,x form a set of pp′ edge-disjoint copies of Ck in BC(k, p). Indeed, for any two distinct pairs (i, x) 6= (i′ , x′ ), the cycles Ci,x and Ci′ ,x′ are 7 edge-disjoint. Otherwise there exists a common edge e between the two cycles. It can be either between two consecutive layers V l and V l+1 , or between V 0 and V k−1 . There are two cases. If ′ ′ ′ ′ e = {uly , ul+1 z } we must have y = i + lx = i + lx and z = i + (l + 1)x = i + (l + 1)x , where equalities are taken modulo p, and, as a consequence, (i, x) = (i′ , x′ ). If e = {u0y , uzk−1 } then we have y = i = i′ and z = i + (k − 1)x′ = i′ + (k − 1)x′ , and, since p is prime, we also conclude that (i, x) = (i′ , x′ ). We now show that any k-cycle has exactly one vertex in each set V l , for 0 ≤ l < k − 1. For this purpose, we focus on the parity of the layers formed by consecutive vertices of a cycle. The “short” edges (i.e., ones between consecutive layers) change the parity of the layer, and hence every cycle must include “long” edges (i.e., ones between layers 0 and k − 1). However, long edges do not change the parity of the layer. Therefore, every cycle contains an odd number of long edges, and an even number of short edges. For this to occur, the only possibility is that the cycle contains a vertex from each layer. Next, we show that any cycle of k vertices in BC(k, p) must be of the form Ci,x for some pair k−1 (i, x). Let C = (u0y0 , . . . ulyl , ul+1 yl+1 , . . . , uyk−1 ) be a cycle in BC(k, p). For every l = 1, . . . , k − 1, l let xl = yl − yl−1 mod p. We have xl ∈ X because the edge {ul−1 yl−1 , uyl } is in some cycle Ci,xl . } is in the cycle Cy0 ,xk . In particular we must Also set xk ∈ X such that the edge {u0y0 , uyk−1 k−1 have that yk−1 = y0 + (k − 1)xk . It follows that yk−1 = y0 + (k − 1)xk = y0 + x1 + x2 + · · · + xk−1 . By Lemma 2, we must have x1 = · · · = xk−1 = xk , so C is of the form Ci,x . It follows from the above that BC(k, p) has exactly pp′ edge-disjoint cycles of k vertices. Since BC(k, p) has n = kp vertices, and m = kpp′ edges, BC(k, p) is ǫ-far from being Ck -free, for ǫ = k1 . Also, each vertex of BC(k, p) is of degree 2p′ because each vertex belongs to p′ edge-disjoint cycles. Let us now consider an execution of Algorithm 2 for input BC(k, p). As BC(k, p) is regular 2k to detect any given cycle C of degree d = 2p′ , this execution has probability at most dk−2 of k vertices. Indeed, C must be detected along one of the paths formed by its vertices in graph BC(k, p), there are at most 2k such paths in C (because all Ck ’s in BC(k, p) are induced subgraphs, and paths are oriented), and, by Eq. (3), the probability of detecting the cycle along 1 . Therefore, applying the union bound, the probability of detecting a one of its paths is dk−2 2k given cycle C is at most dk−2 . ′ Since there are pp edge-disjoint cycles, the expected number of cycles detected in one execu2kpp′ tion of Algorithm 2 is at most (2p ′ )k−2 . It follows that the expected number of cycles detected by repeating the algorithm T times is at most 2kpT . 2(2p′ )k−3 Consequently, the probability that the al- 2kpT ′ 1−o(1) , gorithm detects a cycle is at most 2(2p ′ )k−3 . Plugging in the fact that, by Lemma 2, p = p we conclude that, for any constant T , the probability that T repetitions of Algorithm 2 detect a cycle goes to 0 when p goes to ∞, as claimed. The case of the complete graph is treated similarly. Graphs BK(k, p) are constructed in a way similar to BC(k, p), as k-partite graphs with p vertices in each partition (in particular, BK(k, p) also has n = kp vertices). The difference with BC(k, p) is that, for each pair (i, x) ∈ {0, . . . , p − 1} × X, we do not add a cycle, but a complete graph Ki,x on the vertex k−1 set {u0i , . . . , uli+lx , ul+1 i+(l+1)x , . . . , ui+(k−1)x }. By the same arguments as for BC(k, p), BK(k, p) contains contains exactly pp′ edge-disjoint copies of Kk (namely Ki,x , for each pair (i, x)). This fact holds even for even values of k, because any k-clique must have  a vertex in each layer, no matter the parity of k. Thus, in particular BK(k, p) has m = k2 pp′ edges, and every vertex 2 . is of degree d = (k − 1)p′ . The graph BK(k, p) is ǫ-far from being Kk -free, for ǫ = k(k−1) k! The probability that Algorithm 2 detects a given copy of Kk is at most dk−2 . Indeed, a given Kk has k! (oriented) paths of length k, and, by Eq. (3), the probability that the algorithm 8 detects this copy along a given path is 1 . dk−2 The expected number E[N ] of Kk ’s detected in ′ T pp k! pT T runs of Algorithm 2 is, as for BC(k, p), at most k!dk−2 = (k−1)k−2 . Therefore, since (p′ )k−3 Pr[N 6= 0] ≤ E[N ], we get that the probability that the algorithm detects some Kk goes to 0 as p goes to ∞. It follows that the algorithm fails to detect Kk , as claimed.  Remark. The proof that Algorithm 2 fails to detect Ck for odd k ≥ 5, can be extended to all (odd or even) k ≥ 13, as well as to k = 10. The cases of C6 , C8 , are C12 are open, although we strongly believe that Algorithm 2 also fails to detect these cycles in some graphs. 4 Detecting Small Graphs Using a BFS Approach We discuss here another very natural approach, extending the algorithm proposed by CensorHillel et al. [7] for testing triangle-freeness. In the protocol of [7], each node u samples two neighbors v1 and v2 uniformly at random, and asks them to check the presence of an edge between them. We generalize this protocol as follows. Assume that the objective is to test H-freeness, for a graph H containing a universal vertex. Each node u samples d(u) sets S1 , . . . , Sd(u) , of |V (H)| − 1 neighbors each. For each i = 1, . . . , d(u), node u sends Si to all its neighbors in Si , asking them to check the presence of edges between them, and collecting their answers. Based on these answers, node u can tell whether G[Si ∪ {u}] contains H. We show that this very simple algorithm can be used for testing K4 -freeness. Theorem 3 There is a 1-sided error distributed property-testing algorithm for K4 -freeness, performing in a constant number of rounds in the CONGEST model. Proof. Again, we show the theorem by exhibiting a generic distributed testing protocol for testing H-freeness, that applies to any graph H on four vertices with a universal vertex. The core of this algorithm is presented as Algorithm 3 where all calculations on indices are performed modulo d = d(u) at node u. This algorithm is presented for a graph H with k nodes. Algorithm 3: Testing H-freeness for H with a universal vertex. Instructions for node u of degree d. We let k = |V (H)|. 1 2 3 4 5 6 7 8 9 send id(u) to all neighbors; index the d neighbors v0 , . . . , vd−1 in increasing order of their IDs; pick a permutation π ∈ Σd of {0, 1, . . . , d − 1}, u.a.r.; for each i ∈ {0, . . . , d − 1} do Send (id(vπ(i) ), id(vπ(i+1) ), . . . , id(vπ(i+k−2) )) to vπ(i) , vπ(i+1) , . . . , vπ(i+k−2) ; for each i ∈ {0, . . . , d − 1} do for each of the k − 1 tuples (id(w(1) ), . . . , id(w(k−1) )) received from vi do Send (b(1) , . . . , b(k−1) ) to vi where b(j) = 1 iff u = w(j) or {u, w(j) } ∈ E; If ∃i ∈ {0, . . . , d − 1} s.t. H ⊆ G[u, vπ(i) , . . . , vπ(i+k−2) ] then reject else accept. At Step 3, node u picks a permutation π u.a.r., in order to compose the d(u) sets S1 , . . . , Sd(u) , which are sent in parallel at Steps 4-5. At Step 8, every node u considers separately each of the k − 1 tuples of size k − 1 received from each of its neighbors, checks the presence of edges between u and each of the nodes in that tuple, and sends back the result to the neighbor from which it received the tuple. Finally, the tests H ⊆ G[u, vπ(i) , vπ(i+1) , . . . , vπ(i+k−2) ] performed at the last step is achieved thanks to the (k − 1)-tuple of bits received from each of the neighbors 9 vπ(i) , vπ(i+1) , . . . , vπ(i+k−2) , indicating the presence or absence of all the edges between these nodes. Note that exactly 2k − 5 IDs are actually sent through each edges at Steps 4-5, because of the permutation shifts. Similarly, 2k − 5 bits are sent through each edge at Steps 6-8. Therefore Algorithm 3 runs in a constant number of rounds in the CONGEST model. We now show that, for any given G which is ǫ-far from being K4 -free, Algorithm 3 for H = K4 rejects G with constant probability. Let K be a copy of K4 containing a node u. Note that d(u) ≥ k − 1 (this condition will be implicitly used in the sequel). Observe that, if u samples the vertices of K \ {u} (Step 5 of Algorithm 3), then u will detect K. Let us first prove that   d(u) Pr[u detects K] = d(u)/ . (4) k−1 Indeed, among the d(u)! permutations π of Σd(u) , the ones that sample K \ {u} are those where the vertices of K \ {u} appear consecutively as vπ(i) , . . . , vπ(i+d−1) , for some i, 0 ≤ i ≤ d(u)−1 (recall that indices are taken modulo d in Algorithm 3). We say that we insert a sequence (y0 , . . . yk−2 ) into a sequence (x0 , . . . , xi , xi+1 . . . , xd(u)−k ) starting from position i ≤ d(u)−k+1, for creating the sequence (x0 , . . . , xi−1 , y0 , . . . , yk−2 , xi , . . . , xd(u)−k ). If i > d(u) − k + 1, the insertion of (y0 , . . . yk−2 ) into (x0 , . . . , xd(u)−k ) at position i means the sequence (yd(u)−i , . . . , yk−2 , x0 , . . . , xd(u)−k , y0 , . . . , yd(u)−i−1 ). The permutations that sample K\{u} are the permutations obtained from one of the (d(u) − k + 1)! permutations of the vertices of N (u) \ K by inserting one of the (k − 1)! permutations of K \ {u} starting from position i, 0 ≤ i ≤ d(u) − 1, which proves Equation 4. Since G is ǫ-far from being K4 -free, it follows from Lemma 1 that the graph G contains a family of ǫm 6 edge-disjoint copies of K4 . For each vertex u, denote by c(u) the number of copies (i) in this family that contain u. For i = 0, . . . , c(u) − 1, let Xu be the random variable indicating whether u detects the ith copy of K4 incident to it, and denote by Xu the random variable indicating whether u detects at least one of these copies. We have: Pr[Xu = 1] = Pr[(Xu(0) = 1) ∨ (Xu(1) = 1) ∨ · · · ∨ (Xu(c(u)−1) = 1)]. By the inclusion-exclusion principle and Bonferroni’s inequality [6] (Exercise 1.7 in [26]), we get Pr[Xu = 1] ≥ c(u) X Pr[Xu(i) = 1] − i=1 X Pr[Xu(i) = 1 ∧ Xu(j) = 1]. (5) 1≤i<j≤c(u) (i) Now, for every i, Pr[Xu = 1] is given by Equation 4. In particular, Pr[Xu(i) = 1] = (k − 1)! , (d(u) − 1)(d(u) − 2) . . . (d(u) − k + 2) which, for k = 4, gives Pr[Xu(i) = 1] ≥ 6 , (d(u) − 1)(d(u) − 2) 10 (6) and c(u) X Pr[Xu(i) = 1] ≥ i=1 6c(u) . (d(u) − 1)(d(u) − 2) (7) We now claim that, for any pair i, j such that 0 ≤ i < j ≤ c(u), we have Pr[Xu(i) = 1 ∧ Xu(j) = 1] ≤ d(u)2 ((k − 1)!)2 (d(u) − 2(k − 1))! . d(u)! Indeed, let K i and K j be edge-disjoint copies of K4 containing u corresponding to the random (i) (j) (i) variables Xu and Xu . Among the d(u)! permutations of N (u), those who will satisfy Xu = (j) Xu = 1 are such that the elements of K i \ {u} and of K j \ {u} appear consecutively (in the cyclic order). Such a permutation is obtained from one of the (d(u) − 2(k − 1))! permutations of N (u) \ (K i ∪ K j ), by inserting one of the (k − 1)! permutations of K i \ {u}, and one of the (k − 1)! permutations of K j \ {u}, each at one of the d(u) possible positions between 0 and d(u) − 1. The inequality holds automatically if d(u) ≥ 2(k − 1), as otherwise there cannot be two edge-disjoint copies of Kk containing u. In particular, for k = 4, we obtain Pr[Xu(i) = 1 ∧ Xu(j) = 1] ≤ 36d(u) 36d(u)2 (d(u) − 6)! = . d(u)! (d(u) − 1)(d(u) − 2) . . . (d(u) − 5) Therefore, X Pr[Xu(i) 1≤i<j≤c(u) =1∧ Xu(j) = 1] ≤   c(u) 36d(u) . 2 (d(u) − 1)(d(u) − 2) . . . (d(u) − 5) For each u, we have c(u) ≤ d(u) 3 because c(u) counts edge-disjoint copies of K4 containing u. So   d(u) − 3 c(u) c(u)(c(u) − 1) ≤ c(u) · , = 2 6 2 and X 0≤i<j≤c(u) Pr[Xu(i) = 1 ∧ Xu(j) = 1] ≤ c(u) 6d(u) . (d(u) − 1)(d(u) − 2)(d(u) − 4)(d(u) − 5) (8) By Eq. (5), and by subtracting Eq. (7) and (8), we obtain   d(u) 6c(u) 1− . Pr[Xu = 1] ≥ (d(u) − 1)(d(u) − 2) (d(u) − 4)(d(u) − 5) If d(u) ≥ 8, the the expression in the parenthesis is at least 1/3. Therefore, if d(u) ≥ 8 then Pr[Xu = 1] ≥ 2c(u) . d(u)2 For vertices u such that d(u) < 8, observe that c(u) ≤ 2. Therefore, thanks to Eq. (6), we deduce 2c(u) that the probability that u detects a K4 is at least d(u) 2 . Consequently, for any vertex u, Pr[Xu = 1] ≥ 11 2c(u) . d(u)2 (9) Let Y denote the random variable counting thePnumber of vertices u such that u detects one of the ǫm u∈V (G) Xu and, by Equation 9, 6 edge-disjoint copies of K4 . Hence Y = E[Y ] ≥ X 2c(u) d(u)2 u∈V (G) Let us prove that this expectation is lower bounded by a positive constant. We say that the vertex u is good if d(u) ≤ 24c(u) ǫ . Otherwise, u is bad. The set of good vertices is denoted by Good(G) and the set of bad vertices is denoted by Bad(G). Observe that X ǫm c(u) < , 12 u∈Bad(G) because 2m = X X d(u) ≥ u∈V (G) X d(u) > u∈Bad(G) u∈Bad(G) 24c(u) . ǫ ǫm 6 Therefore, among the edge-disjoint copies of K4 , at least half do not contain bad nodes, i.e., all their nodes are good. Hence, the number of edges between good vertices is at least ǫm 2 . Now, we claim that among good vertices, at least half have degree at most 8g ǫ . By contra′ diction, let g = |Good(G)| and assume that there is a set Good (G) ⊆ Good(G) containing at least 2g vertices, each of degree greater than 8g ǫ . Then m≥ 1 2 X d(u) > u∈Good′ (G) 1 g 8g 2g2 · · = . 2 2 ǫ ǫ The number of edges between good vertices is at most g 2 and at least ǫm 2 . In particular,   ǫ 2g2 g ǫm > · = g2 , ≥ 2 2 ǫ 2 a contradiction. It follows from the above that E[Y ] ≥ X 2 u∈Good(G) and, by summing only over the at least g 2 c(u) ≥ d(u)2 X u∈Good(G) 2 c(u) 1 d(u) d(u) good vertices of degree at most E[Y ] ≥ 2 · 8g ǫ , we conclude that ǫ ǫ2 g ǫ · · = . 2 24 8g 192 Recall that Y is the sum of independent boolean variables Xu . Let N be the random variable counting the number of vertices detecting a K4 in T iterations of Algorithm 3, so N = T · Y . For T = 8 ln 3 · 192 , we have that ǫ2 E[N ] ≥ 8 ln 3. Chernoff bound applies to variable N and, as in the proof of Theorem 1, we conclude that Pr[N ≤ 4 ln 3] ≤ 31 . Altogether, a copy of K4 is detected with probability at least 23 , which completes the proof.  12 5 Limits of the BFS Approach As it happened with the DFS-based approach, the BFS-based approach fails to generalize to large graphs H. Actually, it already fails for K5 . Theorem 4 Let k ≥ 5. There exists a graph G that is ǫ-far from being Kk -free in which any constant number of repetitions of Algorithm 3 fails to detect any copy of Kk , with probability at least 1 − o(1). Proof. The family of graphs BK(k, p) constructed in the proof of Theorem 2 for defeating Algorithm 2 can also be used to defeat Algorithm 3. Recall that those graphs have n = kp vertices, m = k2 pp′ edges, and every vertex is of degree d = (k − 1)p′ , for p′ = p1−o(1) . Moreover, they have exactly pp′ copies of Kk , which are pairwise edge-disjoint. BK(k, p) is k ǫ-far from being Kk -free with ǫ = 1/ 2 . By Equation 4, for each copy K of Kk , and for d  α for some constant α > 0. every u ∈ K, the probability that u detects K is d/ k−1 ≤ dk−2 Therefore, when running the algorithm T times, it follows from the union bound that the pp′ , which tends to 0 when p → ∞, for expected number of detected copies of Kk is at most αkT dk−2 any k ≥ 5. Consequently, the probability of detects at least one copy of Kk also tends to 0.  6 Conclusion and Further Work We have proved that not only the presence of triangles can be tested in O(1) rounds in the CONGEST model, but also the presence of any 4-node subgraph. On the other hand, we have also proved that the natural approaches used to test such small patterns fail to detect larger patterns, like the presence of Kk for k ≥ 5. Interestingly, as mentioned before, the lower bound techniques for the CONGEST model are essentially based on reductions to communication complexity problems. Such an approach does not seem to apply easily in the context of distributed testing. The question of whether the presence of large cliques (or cycles) can be tested in O(1) rounds in the CONGEST model is an intriguing open problem. It is worth mentioning that our algorithms generalize to testing the presence of induced subgraphs. Indeed, if the input graph G contains at least ǫm edge-disjoint induced copies of H, for a graph H on four vertices containing a Hamiltonian path, then Algorithm 1 detects an induced subgraph H with constant probability (the only difference is that, in the last line of the algorithm, we check for an induced subgraph instead of just a subgraph). Moreover, if the input contains ǫm edge-disjoint induced claws (i.e., induced subgraphs K1,3 ), then Algorithm 3 detects one of them with constant probability. Thus, for any connected graph H on four vertices, distinguishing between graphs that do not have H as induced subgraph, and those who have ǫm edge-disjoint induced copies of H can be done in O(1) rounds in the CONGEST model. However, we point out that, unlike in the case of subgraphs, a graph that is ǫ-far from having H as induced subgraph may not have many edge-disjoint induced copies of H. 13 References [1] Noga Alon, Tali Kaufman, Michael Krivelevich, and Dana Ron. Testing triangle-freeness in general graphs. SIAM J. Discrete Math., 22(2):786–819, 2008. [2] Heger Arfaoui, Pierre Fraigniaud, David Ilcinkas, and Fabien Mathieu. Distributedly testing cycle-freeness. In 41st Graph-Theoretic Concepts in Computer Science (WG), volume 8747 of LNCS, pages 15–28, 2014. [3] Heger Arfaoui, Pierre Fraigniaud, and Andrzej Pelc. Local decision and verification with bounded-size outputs. In 15th Int. Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), volume 8255 of LNCS, pages 133–147. Springer, 2013. [4] Florent Becker, Adrian Kosowski, Martin Matamala, Nicolas Nisse, Ivan Rapaport, Karol Suchan, and Ioan Todinca. Allowing each node to communicate only once in a distributed system: shared whiteboard models. Distributed Computing, 28(3):189–200, 2015. [5] Felix A Behrend. On sets of integers which contain no three terms in arithmetical progression. Proceedings of the National Academy of Sciences of the United States of America, 32(12):331, 1946. [6] C.E. Bonferroni. Teoria statistica delle classi e calcolo delle probabilità. Pubblicazioni del R. Istituto superiore di scienze economiche e commerciali di Firenze. Libreria internazionale Seeber, 1936. [7] Keren Censor-Hillel, Eldar Fischer, Gregory Schwartzman, and Yadu Vasudev. Fast distributed algorithms for testing graph properties. CoRR, abs/1602.03718, Feb. 2016. [8] Keren Censor-Hillel, Petteri Kaski, Janne H. Korhonen, Christoph Lenzen, Ami Paz, and Jukka Suomela. Algebraic methods in the congested clique. In ACM Symposium on Principles of Distributed Computing (PODC), pages 143–152, 2015. [9] Atish Das-Sarma, Stephan Holzer, Liah Kor, Amos Korman, Danupon Nanongkai, Gopal Pandurangan, David Peleg, and Roger Wattenhofer. Distributed verification and hardness of distributed approximation. SIAM J. Comput., 41(5):1235–1265, 2012. [10] Danny Dolev, Christoph Lenzen, and Shir Peled. “Tri, Tri Again”: Finding triangles and small subgraphs in a distributed setting. In 26th International Symposium on Distributed Computing (DISC), volume 7611 of LNCS, pages 195–209, 2012. [11] Andrew Drucker, Fabian Kuhn, and Rotem Oshman. On the power of the congested clique model. In ACM Symposium on Principles of Distributed Computing (PODC), pages 367– 376, 2014. [12] Michael Elkin. An unconditional lower bound on the time-approximation trade-off for the distributed minimum spanning tree problem. SIAM Journal on Computing, 36(2):433–456, 2006. [13] Pierre Fraigniaud, Mika Göös, Amos Korman, and Jukka Suomela. What can be decided locally without identifiers? In ACM Symposium on Principles of Distributed Computing (PODC), pages 157–165, 2013. [14] Pierre Fraigniaud, Amos Korman, and David Peleg. Local distributed decision. In 52nd IEEE Symp. on Foundations of Computer Science (FOCS), pages 708–717, 2011. 14 [15] Pierre Fraigniaud, Sergio Rajsbaum, and Corentin Travers. Locality and checkability in wait-free computing. Distributed Computing, 26(4):223–242, 2013. [16] Pierre Fraigniaud, Sergio Rajsbaum, and Corentin Travers. On the number of opinions needed for fault-tolerant run-time monitoring in distributed systems. In 5th International Conference on Runtime Verification (RV), LNCS 8734, pages 92–107. Springer, 2014. [17] Oded Goldreich, editor. Property Testing - Current Research and Surveys, volume 6390 of LNCS. Springer, 2010. [18] Oded Goldreich, Shari Goldwasser, and Dana Ron. Property testing and its connection to learning and approximation. Journal of the ACM, 45(4):653–750, 1998. [19] Mika Göös and Jukka Suomela:. Locally checkable proofs. In 30th ACM Symposium on Principles of Distributed Computing (PODC), pages 159–168, 2011. [20] James W. Hegeman, Gopal Pandurangan, Sriram V. Pemmaraju, Vivek B. Sardeshmukh, and Michele Scquizzato. Toward optimal bounds in the congested clique: Graph connectivity and MST. In ACM Symposium on Principles of Distributed Computing (PODC), pages 91–100, 2015. [21] James W. Hegeman, Sriram V. Pemmaraju, and Vivek Sardeshmukh. Near-constanttime distributed algorithms on a congested clique. In 28th Int. Symposium on Distributed Computing (DISC), pages 514–530, 2014. [22] Jarkko Kari, Martin Matamala, Ivan Rapaport, and Ville Salo. Solving the induced subgraph problem in the randomized multiparty simultaneous messages model. In 22nd Int. Colloquium on Structural Information and Communication Complexity (SIROCCO), volume 9439 of LNCS, pages 370–384. Springer, 2014. [23] Christoph Lenzen. Optimal deterministic routing and sorting on the congested clique. In ACM Symposium on Principles of Distributed Computing (PODC), pages 42–50, 2013. [24] Zvi Lotker, Boaz Patt-Shamir, and David Peleg. Distributed MST for constant diameter graphs. Distributed Computing, 18(6):453–460, 2006. [25] Zvi Lotker, Elan Pavlov, Boaz Patt-Shamir, and David Peleg. MST construction in O(log log n) communication rounds. In 15th ACM Symp. on Parallel Algorithms and Architectures (SPAA), pages 94–100, 2003. [26] M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, 2005. [27] Boaz Patt-Shamir and Marat Teplitsky. The round complexity of distributed sorting. In ACM Symposium on Principles of Distributed Computing (PODC), pages 249–256, 2011. [28] David Peleg. Distributed Computing: A Locality-sensitive Approach. SIAM, Philadelphia, PA, USA, 2000. [29] Fabian Reiter. Distributed graph automata. In 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), pages 192–201, 2015. [30] Tomasz Schoen and Ilya D. Shkredov. Roth’s theorem in many variables. Israel Journal of Mathematics, 199(1):287–308, 2014. 15
8cs.DS
Exploiting variable associations to configure efficient local search algorithms in large-scale binary integer programsI arXiv:1604.08448v2 [cs.DS] 12 May 2017 Shunji Umetani∗ Graduate School of Information Science and Technology, Osaka University, 1-5 Yamadaoka, Suita, Osaka, 565-0871, Japan Abstract We present a data mining approach for reducing the search space of local search algorithms in a class of binary integer programs including the set covering and partitioning problems. The quality of locally optimal solutions typically improves if a larger neighborhood is used, while the computation time of searching the neighborhood increases exponentially. To overcome this, we extract variable associations from the instance to be solved in order to identify promising pairs of flipping variables in the neighborhood search. Based on this, we develop a 4-flip neighborhood local search algorithm that incorporates an efficient incremental evaluation of solutions and an adaptive control of penalty weights. Computational results show that the proposed method improves the performance of the local search algorithm for large-scale set covering and partitioning problems. Keywords: combinatorial optimization, heuristics, set covering problem, set partitioning problem, local search 1. Introduction The Set Covering Problem (SCP) and Set Partitioning Problem (SPP) are representative combinatorial optimization problems that have many real-world applications, such as crew scheduling (Barnhart et al., 1998; Hoffman & Padberg, 1993; Mingozzi et al., 1999), vehicle routing (Agarwal et al., 1989; Baldacci et al., 2008; Bramel & Simchi-Levi, 1997; Hashimoto et al., 2009), facility location (Boros et al., 2005; Farahani et al., 2012) and logical analysis of data (Boros et al., 2000; Hammer & Bonates, 2006). Real-world applications of SCP and SPP are comprehensively reviewed in (Ceria et al., 1997) and (Balas & Padberg, 1976), respectively. IA preliminary version of this paper was presented in (Umetani, 2015). author. Tel.: +81 (6) 6879 7799. Email address: [email protected] (Shunji Umetani) ∗ Corresponding Preprint submitted to Elsevier January 3, 2018 Given a ground set of m elements i ∈ M = {1, . . . , m}, n subsets Sj ⊆ M (|Sj | ≥ 1), and their costs cj ∈ R (R is the set Sof real values) for j ∈ N = {1, . . . , n}, we say that X ⊆ N is a cover S of M if j∈X Sj = M holds. We also say that X ⊆ N is a partition of M if j∈X Sj = M and Sj1 ∩ Sj2 = ∅ for all j1 , j2 ∈ X hold. The goals of SCP and SPP are to find a minimum cost cover and partition X of M , respectively. In this paper, we consider the following class of Binary Integer Programs (BIPs) including SCP and SPP: X minimize cj xj subject to j∈N X j∈N X j∈N X aij xj ≤ bi , i ∈ ML , aij xj ≥ bi , i ∈ MG , aij xj = bi , i ∈ ME , (1) j∈N xj ∈ {0, 1}, j ∈ N, where aij ∈ {0, 1} and bi ∈ Z+ (Z+ is the set of nonnegative integer values). We note that aij = 1 if i ∈ Sj holds and aij = 0 otherwise, and xj = 1 if j ∈ X holds and xj = 0 otherwise. That is, a column vector aj = (a1j , . . . , amj )> of the matrix (aij ) represents the corresponding subset Sj = {i ∈ M | aij = 1}, and the vector x also represents the corresponding cover (or partition) X = {j ∈ N | xj = 1}. For notational convenience, we denote M = ML ∪ MG ∪ ME . For each i ∈ M , let Ni = {j ∈ N | aij =P1} be the index set of subsets Sj that contain the elements i, and let si (x) = j∈N aij xj be the left-hand side of the ith constraint. Continuous development of mathematical programming has much improved the performance of exact and heuristic algorithms and this has been accompanied by advances in computing machinery. Many efficient exact and heuristic algorithms for large-scale SCP and SPP instances have been developed (Atamtürk et al., 1995; Barahona & Anbil, 2000; Bastert et al., 2010; Borndörfer, 1998; Boschetti et al., 2008; Caprara et al., 1999, 2000; Caserta, 2007; Ceria et al., 1998; Linderoth et al., 2001; Umetani & Yagiura, 2007; Wedelin, 1995; Yagiura et al., 2006), many of which are based on a variant of the column generation method called the pricing method that reduces the number of variables to be considered in the search by using Linear Programming (LP) and/or Lagrangian relaxation. However, many large-scale SCP and SPP instances still remain unsolved because there is little hope of closing the large gap between the lower and upper bounds of the optimal values. In particular, the equality constraints of SPP often make the pricing method less effective because they often prevent solutions from containing highly evaluated variables together. In this paper, we consider an alternative approach for extracting useful features from the instance to be solved with the aim of reducing the search space of local search algorithms for large-scale SCP and SPP instances. In the design of local search algorithms for combinatorial optimization prob2 lems, the quality of locally optimal solutions typically improves if a larger neighborhood is used. However, the computation time of searching the neighborhood also increases exponentially. To overcome this, extensive research has investigated ways to efficiently implement neighborhood search, which can be broadly classified into three types: (i) reducing the number of candidates in the neighborhood (Pesant & Gendreau, 1999; Shaw et al., 2002; Yagiura et al., 1999, 2006), (ii) evaluating solutions by incremental computation (Michel & Van Hentenryck, 2000; Yagiura et al., 1999; Van Hentenryck & Michel, 2005; Voudouris et al., 2001), and (iii) reducing the number of variables to be considered by using LP and/or Lagrangian relaxation (Caprara et al., 1999; Ceria et al., 1998; Umetani et al., 2013; Yagiura et al., 2006). To suggest an alternative, we develop a data mining approach for reducing the search space of local search algorithms. That is, we construct a k-nearest neighbor graph by extracting variable associations from the instance to be solved in order to identify promising pairs of flipping variables in the neighborhood search. We also develop a 4-flip neighborhood local search algorithm that flips four variables alternately along 4-paths or 4-cycles in the k-nearest neighbor graph. We incorporate an efficient incremental evaluation of solutions and an adaptive control of penalty weights into the 4-flip neighborhood local search algorithm. 2. 2-flip neighborhood local search Local Search (LS) starts from an initial solution x and then iteratively replaces x with a better solution x0 in the neighborhood NB(x) until no better solution is found in NB(x). For some positive integer r, let the r-flip neighborhood NBr (x) be the set of solutions obtainable by flipping at most r variables in x. We first develop a 2-Flip Neighborhood Local Search (2-FNLS) algorithm as a basic component of our algorithm. In order to improve efficiency, the 2-FNLS first searches NB1 (x), and then searches NB2 (x) \ NB1 (x) only if x is locally optimal with respect to NB1 (x). The BIP is NP-hard, and the (supposedly) simpler problem of judging the existence of a feasible solution is NP-complete. We accordingly consider the following formulation of the BIP that allows violations of the constraints and introduce the following penalized objective function with penalty weights wi+ ∈ R+ (R+ is the set of nonnegative real values) for i ∈ ML ∪ ME and wi− ∈ R+ 3 for i ∈ MG ∪ ME . minimize z(x) = subject to X X j∈N j∈N X j∈N X X cj x j + wi+ yi+ + X wi− yi− i∈MG ∪ME i∈ML ∪ME aij xj − yi+ ≤ bi , i ∈ ML , aij xj + yi− ≥ bi , i ∈ MG , aij xj − yi+ + yi− = bi , i ∈ ME , (2) j∈N xj ∈ {0, 1}, yi+ ≥ 0, yi− ≥ 0, j ∈ N, i ∈ ML ∪ M E , i ∈ MG ∪ ME . For a given x ∈ {0, 1}n , we can easily compute optimal yi+ = |si (x) − bi |+ and yi− = |bi − si (x)|+ , where we denote |x|+ = max{x, 0}. Because the region searched by a single application of LS is limited, LS is usually applied many times. When a locally optimal solution is found, a standard strategy is to update the penalty weights and to resume LS from the obtained locally optimal solution. We accordingly evaluate solutions by using an alternative function z̃(x), where the original penalty weight vectors w+ and w− e + and w e − , respectively, and these are adaptively controlled are replaced by w during the search (see Section 6 for details). We first describe how 2-FNLS is used to search NB1 (x), which is called the 1-flip neighborhood. Let ( ∆z̃j↑ (x) j ∈ N \ X ∆z̃j (x) = (3) ∆z̃j↓ (x) j ∈ X, be the increase in z̃(x) due to flipping xj ← 1 − xj , where X X ∆z̃j↑ (x) = cj + w ei+ − i∈Sj ∩(ML ∪ME )∩{l|sl (x)≥bl } ∆z̃j↓ (x) = −cj − X i∈Sj ∩(MG ∪ME )∩{l|sl (x)<bl } w ei+ i∈Sj ∩(ML ∪ME )∩{l|sl (x)>bl } w ei− , + X w ei− , i∈Sj ∩(MG ∪ME )∩{l|sl (x)≤bl } (4) are the increases in z̃(x) due to flipping xj = 0 → 1 and xj = 1 → 0, respectively. 2-FNLS first searches for an improved solution obtainable by flipping xj ← 1 − xj for j ∈ N . If an improved solution exists, it chooses j with the minimum value of ∆z̃j (x) and flips xj ← 1 − xj . We next describe how 2-FNLS is used to search NB2 (x) \ NB1 (x), which is called the 2-flip neighborhood. We derive conditions that reduce the number of candidates in NB2 (x) \ NB1 (x) without sacrificing the solution quality by expanding the results as shown in (Yagiura et al., 2006). Let ∆z̃j1 ,j2 (x) be the increase in z̃(x) due to simultaneously flipping the values of xj1 and xj2 . 4 Lemma 1. If a solution x is locally optimal with respect to NB1 (x), then ∆z̃j1 ,j2 (x) < 0 holds only if Sj1 ∩ Sj2 6= ∅ and xj1 6= xj2 . Proof. By the assumption of the lemma, ∆z̃j1 (x) ≥ 0 and ∆z̃j2 (x) ≥ 0 hold. It is clear from (4) that ∆z̃j1 ,j2 = ∆z̃j1 (x) + ∆z̃j2 (x) ≥ 0 holds if Sj1 ∩ Sj2 = ∅. We show that ∆z̃j1 ,j2 (x) ≥ 0 holds if Sj1 ∩ Sj2 6= ∅ and xj1 = xj2 . First, we consider the case of xj1 = xj2 = 1. If si (x) = bi + 1 holds for i ∈ Sj1 ∩ Sj2 ∩ (ML ∪ ME ), then decrease of the violation yi+ partly cancels by flipping xj1 = 1 → 0 and xj2 = 1 → 0 simultaneously. Similarly, if si (x) = bi + 1 holds for i ∈ Sj1 ∩ Sj2 ∩ (MG ∪ ME ), then a new violation yi− occurs by flipping xj1 = 1 → 0 and xj2 = 1 → 0 simultaneously. We then have ∆z̃j1 ,j2 (x) = ∆z̃j↓1 (x) + ∆z̃j↓2 (x) + X w ei+ i∈Sj1 ∩Sj2 ∩(ML ∪ME )∩{l|sl (x)=bl +1} X + w ei− ≥ 0. (5) i∈Sj1 ∩Sj2 ∩(MG ∪ME )∩{l|sl (x)=bl +1} Next, we consider the case of xj1 = xj2 = 0. If si (x) = bi − 1 holds for i ∈ Sj1 ∩ Sj2 ∩ (ML ∪ ME ), then a new violation yi+ occurs by flipping xj1 = 0 → 1 and xj2 = 0 → 1 simultaneously. Similarly, if si (x) = bi − 1 holds for i ∈ Sj1 ∩ Sj2 ∩ (MG ∪ ME ), then decrease of the violation yi− partly cancels by flipping xj1 = 0 → 1 and xj2 = 0 → 1 simultaneously. We then have ∆z̃j1 ,j2 (x) = ∆z̃j↑1 (x) + ∆z̃j↑2 (x) + X w ei+ i∈Sj1 ∩Sj2 ∩(ML ∪ME )∩{l|sl (x)=bl −1} X + w ei− ≥ 0. (6) i∈Sj1 ∩Sj2 ∩(MG ∪ME )∩{l|sl (x)=bl −1}  Based on this lemma, we consider only the case of xj1 = 1 and xj2 = 0. If si (x) = bi holds for i ∈ Sj1 ∩ Sj2 ∩ (ML ∪ ME ), then increase of the violation yi+ by flipping xj2 = 0 → 1 cancels by flipping xj1 = 1 → 0 simultaneously, while no decrease of the violation yi+ occurs by flipping xj1 = 1 → 0 independently. Similarly, if si (x) = bi holds for i ∈ Sj1 ∩ Sj2 ∩ (MG ∪ ME ), then increase of the violation yi− by flipping xj1 = 1 → 0 cancels by flipping xj2 = 0 → 1 simultaneously, while no decrease of the violation yi− occurs by flipping xj2 = 0 → 1 independently. We then have X X w ei+ − w ei− , ∆z̃j1 ,j2 (x) = ∆z̃j↓1 (x) + ∆z̃j↑2 (x) − i∈S̄(x)∩(ML ∪ME ) i∈S̄(x)∩(MG ∪ME ) (7) where S̄(x) = {i ∈ Sj1 ∩ Sj2 | si (x) = bi }. From these results, the 2-flip neighborhood can be restricted to the set of solutions satisfying xj1 6= xj2 and S̄(x) 6= ∅. However, it might not be possible to search this set efficiently without 5 first extracting it. We thus construct a neighbor list that stores promising pairs of variables xj1 and xj2 for efficiency (see Section 4 for details). To increase the efficiency of 2-FNLS, we decompose the neighborhood NB2 (x) (j ) into a number of sub-neighborhoods. Let NB2 1 (x) = {x0 ∈ NB2 (x) | xj1 = 1, x0j1 = 0} be the subset of NB2 (x) obtainable by flipping xj1 = 1 → 0. 2FNLS searches NB2 1 (x) for each j1 ∈ X in ascending order of ∆z̃j↓1 (x). If an improved solution exists, it chooses the pair j1 and j2 with the minimum (j ) value of ∆z̃j1 ,j2 (x) among NB2 1 (x) and flips xj1 = 1 → 0 and xj2 = 0 → 1. 2-FNLS skips to search the remaining sub-neighborhoods and immediately return to search NB1 (x) whenever an improved solution is obtained in a sub(j ) neighborhood NB2 1 (x). The first version of 2-FNLS is formally described as Algorithm 1. (j ) e+, w e−) Algorithm 1 2-FNLS(x, w e + and w e−. Input: A solution x and penalty weight vectors w Output: A solution x. 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: START: x0 ← x for j ∈ N do if z̃(x) + ∆z̃j (x) < z̃(x0 ) then x0 ← x, x0j ← 1 − x0j end if end for if z̃(x0 ) < z̃(x) then x ← x0 goto START end if for j1 ∈ X in ascending order of ∆z̃j↓1 (x) do x0 ← x for j2 ∈ N \ X do if z̃(x) + ∆z̃j1 ,j2 (x) < z̃(x0 ) then x0 ← x, x0j1 ← 0, x0j2 ← 1 end if end for if z̃(x0 ) < z̃(x) then x ← x0 goto START end if end for {Search NB1 (x)} {Search NB2 (x)} (j ) {Search NB2 1 (x)} 3. Efficient incremental evaluation The 2-FNLS requires O(σ) time to compute the value of the evaluation function z̃(x) for the current solution x if implemented naively, where σ = 6 P P j∈N aij denote the number of nonzero elements in the constraint matrix (aij ). To overcome this, we first develop a standard incremental evaluation of ∆z̃j↑ (x) and ∆z̃j↓ (x) in O(|Sj |) time by keeping the values of the left-hand side of constraints si (x) for i ∈ M in memory. We further develop an improved incremental evaluation of ∆z̃j↑ (x) and ∆z̃j↓ (x) in O(1) time by keeping additional auxiliary data in memory. By using this, 2-FNLS is also able to evaluate ∆z̃j1 ,j2 (x) in O(|Sj |) time by (7). We first consider a standard incremental evaluation of ∆z̃j↑ (x) and ∆z̃j↓ (x) in O(|Sj |) time using the following formulas: i∈M ∆z̃j↑ (x) ∆p̃↑j (x) = cj + ∆p̃↑j (x) + ∆q̃j↑ (x), X = w ei+ (|(si (x) + 1) − bi |+ − |si (x) − bi |+ ) , i∈Sj ∩(ML ∪ME ) ∆q̃j↑ (x) = X w ei− (8) (|bi − (si (x) + 1)|+ − |bi − si (x)|+ ) , i∈Sj ∩(MG ∪ME ) ∆z̃j↓ (x) ∆p̃↓j (x) = −cj + ∆p̃↓j (x) + ∆q̃j↓ (x), X = w ei+ (|(si (x) − 1) − bi |+ − |si (x) − bi |+ ) , i∈Sj ∩(ML ∪ME ) ∆q̃j↓ (x) = X w ei− (9) (|bi − (si (x) − 1)|+ − |bi − si (x)|+ ) , i∈Sj ∩(MG ∪ME ) where 2-FNLS keeps the values of the left-hand side of constraints si (x) for i ∈ M in memory. 2-FNLS updates si (x) for i ∈ Sj in O(|Sj |) time by si (x0 ) ← si (x) + 1 and si (x0 ) ← si (x) − 1 when the current solution x moves to x0 by flipping xj = 0 → 1 and xj = 1 → 0, respectively. We further develop an improved incremental evaluation of ∆z̃j↑ (x) and ∆z̃j↓ (x) in O(1) time by directly keeping ∆p̃↑j (x), ∆q̃j↑ (x) for j ∈ N \ X and ∆p̃↓j (x), ∆q̃j↓ (x) for j ∈ X in memory. When the current solution x moves to x0 by flipping xj = 0 → 1, 2-FNLS first updates si (x) for i ∈ Sj in O(|Sj |) time by si (x0 ) ← si (x) + 1, and then updates ∆p̃↑k (x), ∆q̃k↑ (x) for k ∈ Ni \ X, i ∈ Sj P and ∆p̃↓k (x), ∆q̃k↓ (x) for k ∈ Ni ∩ X, i ∈ Sj in O( i∈Sj |Ni |) time using the following formulas: X  ∆p̃↑k (x0 ) ← ∆p̃↑k (x) + w ei+ ∆yi+ (x0 ) − ∆yi+ (x) , i∈Sj ∩Sk ∩(ML ∪ME ) ∆q̃k↑ (x0 ) ← ∆q̃k↑ (x) + X  w ei− ∆yi− (x0 ) − ∆yi− (x) , i∈Sj ∩Sk ∩(MG ∪ME ) ∆p̃↓k (x0 ) ∆p̃↓k (x) ← ∆q̃k↓ (x0 ) ← ∆q̃k↓ (x) + + X  w ei+ ∆yi+ (x0 ) − ∆yi+ (x) , i∈Sj ∩Sk ∩(ML ∪ME ) X  w ei− ∆yi− (x0 ) − ∆yi− (x) , i∈Sj ∩Sk ∩(MG ∪ME ) 7 (10)     (aij ) =    0 1 1 0 1 0 1 0 1 0 1 0 1 1 0 1 0 0 1 0 0 0 1 1 0 1 0 1 0 1 0 0 0 1 1 0 0 1 1 1 0 0 0 0 1 1 1 0 1 0 0 1 0 1 0 1 1 0 0 1      −→   x1 x2 x3 x4 x5 x6 x7 x8 x9 x10 x2 x7 x8 x1 x4 x8 x5 x7 x9 x2 x9 x3 x7 x9 x10 x10 x8 x1 x3 x5 x8 x1 x2 x6 x7 x3 x4 x5 x1 x5 x7 x10 Figure 1: Example of the neighbor list where ∆yi+ (x0 ) = |(si (x0 ) + 1) − bi |+ − |si (x0 ) − bi |+ , ∆yi+ (x) = |si (x0 ) − bi |+ − |si (x) − bi |+ , ∆yi− (x0 ) = |bi − (si (x0 ) + 1)|+ − |bi − si (x0 )|+ , ∆yi− (x) = |bi − si (x0 )|+ − |bi − si (x)|+ . (11) Similarly, when the current solution x moves to x0 by flipping xj = 1 → 0, 2FNLS first updates si (x) for i ∈ Sj in O(|Sj |) time, and then updates ∆p̃↑k (x), ↓ ↓ ∆q̃k↑ (x) P for k ∈ Ni \ X, i ∈ Sj and ∆p̃k (x), ∆q̃k (x) for k ∈ Ni ∩ X, i ∈ Sj in O( i∈Sj |Ni |) time. We note that the computation time for updating the auxiliary data has little effect on the total computation time of 2-FNLS because the number of solutions actually visited is much less than the number of neighbor solutions evaluated in most cases. 4. Exploiting variable associations It is known that the quality of locally optimal solutions improves if a larger neighborhood is used. However, the computation time to search the neighborhood NBr (x) also increases exponentially with r, since |NBr (x)| = O(nr ) generally holds. A large amount of computation time is thus needed in practice in order to scan all candidates in NB2 (x) for large-scale instances with millions of variables. To overcome this, we develop a data mining approach that identifies promising pairs of flipping variables in NB2 (x) by extracting variable associations from the instance to be solved using only a small amount of computation time. From the results in Section 2, the 2-flip neighborhood can be restricted to the set of solutions satisfying xj1 6= xj2 and S̄(x) 6= ∅. We further observe from (7) that it is favorable to select pairs of flipping variables xj1 and xj2 which gives a larger size |Sj1 ∩ Sj2 | in order to obtain ∆z̃j1 ,j2 (x) < 0. Based on this observation, we keep a limited set of pairs of variables xj1 and xj2 for which 8 |Sj1 ∩ Sj2 | is large in memory, and we call this the neighbor list (Figure 1). We note that |Sj1 ∩ Sj2 | represents a certain kind of similarity between the subsets Sj1 and Sj2 (or column vectors aj1 and aj2 of the constraint matrix (aij )) and we keep the k-nearest neighbors for each variable xj for j ∈ N in the neighbor list. (In Figure 1, we keep the set of pairs of variables xj1 and xj2 having |Sj1 ∩ Sj2 | ≥ 2 in the neighbor list, because small examples often have many ties.) For each variable xj1 for j1 ∈ N , we store the first k = min{|N (j1 ) |, α|M |} variables xj2 (j2 6= j1 ) in descending order of |Sj1 ∩ Sj2 | in the j1 th row of the neighbor list, where N (j1 ) = {j2 ∈ N | j2 6= j1 , Sj1 ∩Sj2 6= ∅} and α is a program parameter that we set to five. Let L[j1 ] be the index set of variables xj2 stored in the j1 th row of the neighbor list. We then reduce the number of candidates in NB2 (x) by restricting the pairs of flipping variables xj1 and xj2 to pairs in the neighbor list j1 ∈ X and j2 ∈ (N \ X) ∩ L[j1 ]. We note that it is still expensive to construct the whole neighbor list for large-scale instances with millions of variables. To overcome this, we develop a lazy construction algorithm for the neighbor list. That is, 2-FNLS starts from an empty neighbor list and generates the j1 th row of the neighbor list L[j1 ] only (j ) when 2-FNLS searches NB2 1 (x) for the first time. The improved version of 2-FNLS is formally described as Algorithm 2. A similar approach has been developed in local search algorithms for the Euclidean Traveling Salesman Problem (TSP) in which a sorted list containing only the k-nearest neighbors is stored for each city by using a geometric data structure called the k-dimensional tree (Johnson & McGeoch, 1997). However, it is not suitable for finding the k-nearest neighbors efficiently in high-dimensional spaces. We thus extend it for application to the high-dimensional column vectors aj ∈ {0, 1}m for j ∈ N of BIPs by using a lazy construction algorithm for the neighbor list. 5. 4-flip neighborhood local search We can regard the neighbor-list in Section 4 as an adjacency-list representation of a directed graph, and represent associations between variables by a corresponding directed graph called the k-nearest neighbor graph. Figure 2 illustrates an example of the k-nearest neighbor graph corresponding to the neighbor-list in Figure 1. Using the k-nearest neighbor graph, we extend 2-FNLS to search a set of promising neighbor solutions in NB4 (x). For each variable xj1 for j1 ∈ X, we keep the variables xj2 for j2 ∈ (N \ X) ∩ L[j1 ] having the minimum value of ∆z̃j1 ,j2 (x) in memory as j2 = π(j1 ). The extended 2-FNLS, called the 4-Flip Neighborhood Local Search (4-FNLS) algorithm, then searches for an improved solution by flipping xj1 = 1 → 0, xπ(j1 ) = 0 → 1, xj3 = 1 → 0 and xπ(j3 ) = 0 → 1 for j1 ∈ X and j3 ∈ X ∩ L[π(j1 )] satisfying j1 6= j3 and π(j1 ) 6= π(j3 ), i.e., flipping the values of variables alternately along 4-paths or 4-cycles in the k-nearest neighbor graph. Let ∆z̃j1 ,j2 ,j3 ,j4 (x) be the increase in z̃(x) due to 9 e+, w e−) Algorithm 2 2-FNLS(x, w e + and w e−. Input: A solution x and penalty weight vectors w Output: A solution x. 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: for j1 ∈ N do Set L[j1 ] ← ∅ end for START: x0 ← x for j ∈ N do if z̃(x) + ∆z̃j (x) < z̃(x0 ) then x0 ← x, x0j ← 1 − x0j end if end for if z̃(x0 ) < z̃(x) then x ← x0 goto START end if for j1 ∈ X in ascending order of ∆z̃j↓1 (x) do if L[j1 ] = ∅ then Generate L[j1 ] end if x0 ← x for j2 ∈ (N \ X) ∩ L[j1 ] do if z̃(x) + ∆z̃j1 ,j2 (x) < z̃(x0 ) then x0 ← x, x0j1 ← 0, x0j2 ← 1 end if end for if z̃(x0 ) < z̃(x) then x ← x0 goto START end if end for 10 {Initialize L[j1 ]} {Search NB1 (x)} {Search NB2 (x)} {Generate L[j1 ]} (j ) {Search NB2 1 (x)} x5 x7 x10 x3 x8 x6 x9 x2 x4 x1 Figure 2: Example of the k-nearest neighbor graph simultaneously flipping xj1 = 1 → 0, xj2 = 0 → 1, xj3 = 1 → 0 and xj4 = 0 → 1. 4-FNLS computes ∆z̃j1 ,j2 ,j3 ,j4 (x) in O(|Sj |) time by applying the standard incremental evaluation alternately (see Section 3 for details). 4-FNLS is formally described with as Algorithm 3. 6. Adaptive control of penalty weights In our algorithm, solutions are evaluated by the alternative evaluation function z̃(x) in which the fixed penalty weight vectors w+ and w− in the original e + and w e − , respectively, and evaluation function z(x) has been replaced by w + − the values of w ei for i ∈ ML ∪ ME and w ei for i ∈ MG ∪ ME are adaptively controlled in the search. It is often reported that a single application of LS tends to stop at a locally optimal solution of insufficient quality when large penalty weights are used. This is because it is often unavoidable to temporally increase the values of some violations yi+ and yi− in order to reach an even better solution from a good solution through a sequence of neighborhood operations, and large penalty weights thus prevent LS from moving between such solutions. To overcome this, we incorporate an adaptive adjustment mechanism for determining appropriate values of penalty weights w ei+ for i ∈ ML ∪ ME and w ei− for i ∈ MG ∪ ME (Nonobe & Ibaraki, 2001; Yagiura et al., 2006; Umetani et al., 2013). That is, LS is applied iteratively while updating the values of the penalty weights w ei+ − for i ∈ ML ∪ ME and w ei for i ∈ MG ∪ ME after each call to LS. We call this sequence of calls to LS the Weighting Local Search (WLS) according to (Selman & Kautz, 1993; Thornton, 2005). This strategy is also referred as the breakout algorithm (Morris, 1993) and the dynamic local search (Hutter et al., 2002) in the literature. Let x be the solution at which the previous local search stops. WLS ree + and w e − . We sumes LS from x after updating the penalty weight vectors w + assume that the original penalty weights wi for i ∈ ML ∪ ME and wi− for 11 e+, w e−) Algorithm 3 4-FNLS(x, w e + and w e−. Input: A solution x and penalty weight vectors w Output: A solution x. 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: 39: 40: 41: 42: 43: 44: for j1 ∈ N do {Initialize L[j1 ]} Set L[j1 ] ← ∅ end for START: x0 ← x for j ∈ N do {Search NB1 (x)} if z̃(x) + ∆z̃j (x) < z̃(x0 ) then x0 ← x, x0j ← 1 − x0j end if end for if z̃(x0 ) < z̃(x) then x ← x0 goto START end if for j1 ∈ X in ascending order of ∆z̃j↓1 (x) do {Search NB2 (x)} if L[j1 ] = ∅ then {Generate L[j1 ]} Generate L[j1 ] end if x0 ← x, ∆z̃ ∗ ← ∞ (j ) for j2 ∈ (N \ X) ∩ L[j1 ] do {Search NB2 1 (x)} ∗ if ∆z̃j1 ,j2 (x) < ∆z̃ then {Update π(j1 )} ∆z̃ ∗ ← ∆z̃j1 ,j2 (x), π(j1 ) ← j2 end if if z̃(x) + ∆z̃j1 ,j2 (x) < z̃(x0 ) then x0 ← x, x0j1 ← 0, x0j2 ← 1 end if end for if z̃(x0 ) < z̃(x) then x ← x0 goto START end if end for for j1 ∈ X in ascending order of ∆z̃j1 ,π(j1 ) (x) do {Search NB4 (x)} x0 ← x for j3 ∈ X ∩ L[π(j1 )] satisfying j3 6= j1 and π(j1 ) 6= π(j3 ) do if z̃(x) + ∆z̃j1 ,π(j1 ),j3 ,π(j3 ) (x) < z̃(x0 ) then x0 ← x, x0j1 ← 0, x0π(j1 ) ← 1, x0j3 ← 0, x0π(j3 ) ← 1 end if end for if z̃(x0 ) < z̃(x) then x ← x0 goto START end if end for 12 i ∈ MG ∪ME are sufficiently large. Starting from the original penalty weight vece+, w e − ) ← (w+ , w− ), the penalty weight vectors w e + and w e − are updated tors (w ∗ as follows. Let x be the best feasible solution obtained so far for the original formulation (1). We modify 4-FNLS to keep the best feasible solution x∗ , and update it whenever an improved feasible solution is found. If z̃(x) ≥ z(x∗ ) holds, e+, w e − ) ← β(w e+, w e − ), WLS uniformly decreases the penalty weights by (w where 0 < β < 1 is a program parameter that is adaptively computed so that the new value of ∆z̃j↓ (x) becomes negative for 10% of variables xj for j ∈ X. Otherwise, WLS increases the penalty weights by z(x∗ ) − z̃(x) yi+ , i ∈ ML ∪ ME , +2 −2 (y + y ) l∈M l l z(x∗ ) − z̃(x) w ei− ← w ei− + P yi− , i ∈ MG ∪ ME . +2 −2 (y + y ) l∈M l l w ei+ ← w ei+ + P (12) e + and w e− WLS iteratively applies LS, updating the penalty weight vectors w after each call to LS until the time limit is reached. WLS is formally described as Algorithm 4. Note that we set the initial solution to x = 0 in practice. Algorithm 4 WLS(x) Input: An initial solution x. Output: The best feasible solution x∗ . e+, w e − ) ← (w+ , w− ) 1: x̃ ← x, z ∗ ← ∞, (w 2: repeat e+, w e−) 3: (x̃, x0 ) ← 4-FNLS(x̃, w 0 e+, w e − )} 4: {x is the best feasible solution obtained in 4-FNLS(x̃, w 5: if z(x0 ) < z ∗ then 6: x∗ ← x0 , z ∗ ← z(x0 ) 7: end if 8: if z̃(x̃) ≥ z ∗ then e+, w e − ) ← β(w e+, w e−) 9: Decrease the penalty weights by (w 10: else 11: Increase the penalty weights by (12) 12: end if 13: until The time limit is reached 7. Computational results We report computational results of our algorithm for the SCP instances from (Beasley, 1990; Umetani et al., 2013) and the SPP instances from (Borndörfer, 1998; Chu & Beasley, 1998; Koch et al., 2011). Tables 1 and 2 summarize the information about the SCP and SPP instances, respectively. The first column shows the name of the group (or the instance), and the number in parentheses shows the number of instances in the group. In the subsequent part of this paper, we show the average value in each cell of the tables for the instances of the group. 13 Table 1: Benchmark instances for SCP instance ?G.1–5 (5) ?H.1–5 (5) ?I.1–5 (5) ?J.1–5 (5) ?K.1–5 (5) ?L.1–5 (5) ?M.1–5 (5) ?N.1–5 (5) RAIL507 RAIL516 RAIL582 RAIL2536 ?RAIL2586 ?RAIL4284 ?RAIL4872 zLP 149.48 45.67 138.97 104.78 276.67 209.34 415.78 348.93 172.15 182.00 209.71 688.40 935.92 1054.05 1509.64 zbest 166.4 59.6 158.0 129.0 313.2 258.0 549.8 503.8 ∗174 ∗182 ∗211 ∗689 947 1064 1530 original #cst. #var. 1000.0 10000.0 1000.0 10000.0 1000.0 50000.0 1000.0 100000.0 2000.0 100000.0 2000.0 200000.0 5000.0 500000.0 5000.0 1000000.0 507 63009 516 47311 582 55515 2536 1081841 2586 920683 4284 1092610 4872 968672 presolved #cst. #var. 1000.0 10000.0 1000.0 10000.0 1000.0 49981.0 1000.0 99944.8 2000.0 99971.0 2000.0 199927.6 5000.0 499988.0 5000.0 999993.2 440 20700 403 37832 544 27427 2001 480597 2239 408724 3633 607884 4207 482500 time limit 600 s 600 s 1200 s 1200 s 1800 s 1800 s 3600 s 3600 s 600 s 600 s 600 s 3600 s 3600 s 3600 s 3600 s Table 2: Benchmark instances for SPP instance aa01–06 (6) us01–04 (4) v0415–0421 (7) v1616–1622 (7) t0415–0421 (7) ?t1716–1722 (7) ?ds ?ds-big ?ivu06-big ?ivu59 zLP 40372.75 9749.44 2385764.17 1021288.76 5199083.74 121445.76 57.23 86.82 135.43 884.46 zbest ∗40588.83 ∗9798.25 ∗2393303.71 ∗1025552.43 5453475.71 157516.29 187.47 731.69 166.02 1878.83 original #cst. #var. 675.3 7587.3 121.3 295085.0 1479.3 30341.6 1375.7 83986.7 1479.3 7304.3 475.7 58981.3 656 67732 1042 174997 1177 2277736 3436 2569996 presolved #cst. #var. 478.7 6092.7 65.5 85772.5 263.9 7277.0 1171.9 51136.7 820.7 2617.4 475.7 13193.6 656 67730 1042 173026 1177 2197774 3413 2565083 time limit 600 s 600 s 600 s 600 s 600 s 3600 s 3600 s 3600 s 3600 s 3600 s The detailed computational results are in the online supplement. The second column “zLP ” shows the optimal values of the LP relaxation problems. The third column “zbest ” shows the best upper bounds among all algorithms in this paper. The fourth and sixth columns “#cst.” show the number of constraints, and the fifth and seventh columns “#vars.” show the number of variables. Since several preprocessing techniques that often reduce the size of instances by removing redundant rows and columns are known (Borndörfer, 1998), all algorithms are tested on the presolved instances. The instances marked “?” are hard instances that cannot be solved optimally within at least 1 h by the tested Mixed Integer Programming (MIP) solvers (i.e., CPLEX12.6, Gurobi5.6.3 and SCIP3.1). We compare the results of our algorithm with those of its variations. Our algorithm was implemented in C language and tested on a MacBook Pro laptop computer with a 2.7 GHz Intel Core i7 processor and 16 GB memory. All variations of our algorithm were run on a single thread under MacOS10.12 operating system with time limits as shown in Tables 1 and 2. best Tables 3 and 4 show the relative gap z(x)−z × 100 (%) of the best feasible z(x) solutions for the original formulation (1) achieved by the variations of our algorithm for the SCP and SPP instances, respectively. We note that all variations of our algorithm found feasible solutions for all SCP instances. The second column “no-list” shows the results of our algorithm without the neighbor list, and the third column “no-inc” shows the results of our algorithm without the improved incremental evaluation (i.e., only applying the standard incremental evaluation in Section 3). The fourth column “2-FNLS” shows the results of our algorithm without the 4-flip neighborhood search (i.e., only applying 2-FNLS in Section 4). In Table 4, the number in parentheses shows the number of instances 14 Table 3: Computational results of variations of the proposed algorithm for SCP instances instance ?G.1–5 (5) ?H.1–5 (5) ?I.1–5 (5) ?J.1–5 (5) ?K.1–5 (5) ?L.1–5 (5) ?M.1–5 (5) ?N.1–5 (5) RAIL507 RAIL516 RAIL582 RAIL2536 ?RAIL2586 ?RAIL4284 ?RAIL4872 avg. (all) avg. (with stars) no-list 0.00% 0.31% 1.24% 2.42% 2.12% 3.44% 10.97% 19.11% 0.00% 0.00% 0.47% 2.68% 2.57% 5.42% 4.43% 4.55% 4.89% no-inc 0.12% 0.31% 0.86% 1.67% 1.69% 3.51% 8.33% 22.06% 0.57% 0.00% 0.47% 2.27% 2.87% 5.17% 3.47% 4.42% 4.75% 2-FNLS 0.00% 0.31% 0.50% 1.68% 1.32% 2.35% 2.79% 4.76% 0.00% 0.00% 0.47% 1.29% 2.27% 2.74% 2.36% 1.65% 1.77% proposed 0.00% 0.00% 0.50% 1.53% 1.26% 2.05% 2.65% 5.47% 0.00% 0.00% 0.00% 0.72% 1.56% 2.12% 1.80% 1.56% 1.69% Table 4: Computational results of variations of the proposed algorithm for SPP instances instance aa01–06 (6) us01–04 (4) v0415–0421 (7) v1616–1622 (7) t0415–0421 (7) ?t1716–1722 (7) ?ds ?ds-big ?ivu06-big ?ivu59 avg. (all) avg. (with stars) no-list 2.33%(6) 0.04%(4) 0.00%(7) 0.62%(7) 1.46%(5) 5.46%(7) 36.03% 29.11% 5.31% 15.75% 3.76%(40/42) 10.37%(12/13) no-inc 2.26%(6) 1.16%(4) 0.00%(7) 0.17%(7) 1.30%(6) 4.33%(7) 33.80% 0.00% 3.83% 11.39% 2.60%(41/42) 6.61%(12/13) 2-FNLS 2.07%(6) 0.63%(4) 0.00%(7) 0.09%(7) 0.29%(7) 5.71%(7) 24.13% 40.75% 2.25% 16.01% 3.35%(42/42) 9.48%(13/13) proposed 1.60%(6) 0.04%(4) 0.00%(7) 0.09%(7) 0.92%(6) 2.45%(7) 0.00% 0.00% 0.00% 0.00% 0.81%(41/42) 1.43%(12/13) for which the algorithm obtained at least one feasible solution within the time limit, and the relative gap shows the average value for them. Tables 5 and 6 show the computational efficiency of variations of our algorithm with respect to the number of calls to 4-FNLS (and 2-FNLS in the fourth column “2-FNLS”), where the bottom rows show average factors normalized so that that of our algorithm is set to one. From these results, we observe that the proposed method improves the computational efficiency of the local search algorithm for the SCP and SPP instances in comparison with its variations, and our algorithm attains good performance even when the size of the neighbor list is considerably small. We also observe that the 4-flip neighborhood search substantially improves the performance of our algorithm even though there are fewer calls to 4-FNLS compared to 2-FNLS. rows Tables 7 and 8 show the ratio #generated × 100 (%) of generated rows |N | in the neighbor list. We observe that our algorithm achieves good performance while generating only a small part of the neighbor list for the large-scale instances. We compare the result of our algorithm with those of general purpose solvers, i.e., the latest MIP solvers called CPLEX12.6 (2014), Gurobi5.6.3 (2014) and SCIP3.1 (Achterberg, 2009) and a local search solver for BIP (including nonlinear constraints and objective functions) called LocalSolver3.1 (Benoist et al., 2011). LocalSolver3.1 is a simulated annealing based on ejection chain moves specialized for maintaining the feasibility of Boolean constraints and an efficient incremental evaluation using a directed acyclic graph. LocalSolver3.1 is not the 15 Table 5: The number of calls to 4-FNLS of variations of the proposed algorithm for SCP instances instance ?G.1–5 (5) ?H.1–5 (5) ?I.1–5 (5) ?J.1–5 (5) ?K.1–5 (5) ?L.1–5 (5) ?M.1–5 (5) ?N.1–5 (5) RAIL507 RAIL516 RAIL582 RAIL2536 ?RAIL2586 ?RAIL4284 ?RAIL4872 avg. factor no-list 1528.2 1040.8 845.2 494.0 364.0 262.4 103.0 78.8 4498 2004 3079 429 416 182 197 0.37 no-inc 1094.2 434.4 750.6 454.6 444.8 273.8 117.2 66.0 6482 3345 4037 359 399 195 229 0.30 2-FNLS 5755.8 2191.6 5072.0 2580.4 2828.8 1862.6 1412.8 929.4 38195 16915 22123 4045 5398 2665 4214 2.21 proposed 3001.4 1248.2 2189.8 1057.8 1445.8 809.0 535.0 290.8 23692 12350 15140 3206 3028 1683 2374 1.00 Table 6: The number of calls to 4-FNLS of variations of the proposed algorithm for SPP instances instance aa01–06 (6) us01–04 (4) v0415–0421 (7) v1616–1622 (7) t0415–0421 (7) ?t1716–1722 (7) ?ds ?ds-big ?ivu06-big ?ivu59 avg. factor no-list 10152.2 35418.5 1516414.7 1197.7 9412.6 32689.3 3109 852 236 141 0.20 no-inc 20544.8 36491.75 1783742.3 4029.1 19885.4 60992.9 3463 1019 305 208 0.38 2-FNLS 93694.3 92397.5 4274501.6 17626.9 145916.4 281283.4 14142 4370 1293 620 1.70 proposed 56584.8 86031.0 2749825.9 10048.7 53751.7 174405.1 11414 3294 1060 438 1.00 latest version, but it performs better than the latest version (LocalSolver4.5) for the SCP and SPP instances. We note the following issues in comparing the performance of our algorithm with that of the latest MIP solvers. Due to the lack of pruning mechanism, it is inherently difficult to find optimal solutions by local search algorithms even for instances having a small gap between the lower and upper bounds of the optimal values, while the latest MIP solvers find optimal solutions quickly by the branch-and-cut procedure. Of course, local search algorithms often obtain good upper bounds close to the optimal values for the instances. On the other hand, the latest MIP solvers often prefer running primal heuristics rather than the branch-and-cut procedure for instances having a large gap between the lower and upper bounds of the optimal values. Indeed, the latest MIP solvers include dozens of primal heuristics and spend much computation time on finding good feasible solutions (Lodi, 2013), e.g., SCIP3.1 reported that it spent 1644.73 s out of 3600 s running primal heuristics for solving the “ds” instance, while it spent 837.47 s for solving LP relaxation problems. We also compare our algorithm with a 3-flip local search algorithm specially tailored for SCP developed by Yagiura et al. (2006) (denoted by YKI). In order to handle large-scale SCP instances, many heuristic algorithms have introduced the pricing method that reduces the number of variables to be considered by using LP and/or Lagrangian relaxation. YKI introduced a pricing method based on Lagrangian relaxation that substantially reduces the number of variables to be considered to 1.05% from the original SCP instances on average. Hence, in 16 Table 7: The ratio of generated rows in the neighbor list for SCP instances instance ?G.1–5 (5) ?H.1–5 (5) ?I.1–5 (5) ?J.1–5 (5) ?K.1–5 (5) ?L.1–5 (5) ?M.1–5 (5) ?N.1–5 (5) RAIL507 RAIL516 RAIL582 RAIL2536 ?RAIL2586 ?RAIL4284 ?RAIL4872 1 min 3.58% 2.12% 1.39% 0.82% 1.20% 0.57% 0.20% 0.01% 13.41% 4.73% 8.19% 0.30% 0.44% 0.20% 0.37% 10 min 3.95% 2.43% 1.63% 1.10% 1.49% 0.98% 0.58% 0.21% 22.02% 8.94% 10.66% 1.36% 1.67% 1.01% 1.56% 20 min 30 min 1 h 1.71% 1.16% 1.57% 1.06% 0.73% 0.29% 1.61% 1.10% 0.81% 0.35% 0.93% 0.49% 1.87% 2.19% 1.43% 2.11% 2.17% 2.54% 1.73% 2.46% 2.73% 3.28% 2.29% 3.10% Table 8: The ratio of generated rows in the neighbor list for SPP instances instance aa01–06 (6) us01–04 (4) v0415–0421 (7) v1616–1622 (7) t0415–0421 (7) ?t1716–1722 (7) ?ds ?ds-big ?ivu06-big ?ivu59 1 min 40.47% 3.93% 31.44% 6.55% 83.47% 61.00% 2.29% 0.21% 0.01% 0.01% 10 min 49.17% 5.17% 31.64% 7.42% 90.00% 94.38% 12.63% 2.06% 0.07% 0.05% 30 min 1 h 97.12% 27.11% 4.96% 0.23% 0.11% 97.98% 40.05% 8.10% 0.45% 0.16% addition to the original SCP instances, we also tested all algorithms for reduced SCP instances by another pricing method based on LP relaxation (Umetani & Yagiura, 2007). Table 9 summarize the reduced SCP instances, where we applied preprocessing to the reduced SCP instances as well as the original SCP instances. The eighth column “#free var.” shows the number of variables to be considered in YKI for the original SCP instances. We note that it turned out that many of reduced SPP instances by the pricing method (Umetani & Yagiura, 2007) were infeasible because the equality constraints of SPP often prevent solutions from containing highly evaluated variables together and make the pricing method less effective. Tables 10 and 11 show the relative gap of the best feasible solutions for the original formulation (1) achieved by the algorithms for the original and reduced SCP instances, respectively. We note that all algorithms found feasible solutions for all SCP instances. All algorithms were tested on a MacBook Pro laptop computer with a 2.7 GHz Intel Core i7 processor and 16 GB memory, and were run on a single thread under MacOS10.12 operating system with time limits as shown in Tables 1 and 9. That is, we tested all algorithms under the same amount of available computational resources for fair comparison. We observe that our algorithm achieves better upper bounds than general purpose solvers (CPLEX12.6.3, Gurobi5.6.3, SCIP3.1 and LocalSolver3.1) for the original and reduced SCP instances. We also observe that our algorithm achieves good upper bounds close to those of YKI for the reduced SCP instances. It shows that our algorithm attains good performance close to that of the specially tailored algorithm (YKI) for SCP by combining a pricing method. In view of these, our algorithm achieves sufficiently good upper bounds compared to the other algorithms for the SCP instances. 17 Table 9: Reduced benchmark instances for SCP instance ?G.1–5 (5) ?H.1–5 (5) ?I.1–5 (5) ?J.1–5 (5) ?K.1–5 (5) ?L.1–5 (5) ?M.1–5 (5) ?N.1–5 (5) RAIL507 RAIL516 RAIL582 RAIL2536 ?RAIL2586 ?RAIL4284 ?RAIL4872 zLP 149.48 45.67 138.97 104.78 276.67 209.34 415.78 348.93 172.15 183.00 209.71 688.68 935.92 1054.05 1510.87 zbest 166.4 59.8 158.4 129.4 313.8 259.0 551.6 505.0 ∗174 ∗183 ∗211 ∗691 948 1066 1532 reduced #cst. #var. 1000.0 441.8 1000.0 236.2 1000.0 721.6 1000.0 703.6 2000.0 1434.2 2000.0 1421.0 5000.0 3245.2 5000.0 4471.4 507 2649 516 3788 582 2091 2536 13746 2586 13349 4284 21728 4872 21329 presolved #cst. #var. 1000.0 441.8 1000.0 236.2 1000.0 721.6 1000.0 703.6 2000.0 1434.2 2000.0 1421.0 5000.0 3245.2 5000.0 4471.4 402 1019 350 3088 491 1493 1391 5782 2083 7377 3189 14565 3577 11404 Yagiura et al. #free var. 339.0 174.6 479.4 429.6 959.4 856.4 1836.4 1660.6 394 492 513 1598 2089 2639 3650 time limit 600 s 600 s 1200 s 1200 s 1800 s 1800 s 3600 s 3600 s 600 s 600 s 600 s 3600 s 3600 s 3600 s 3600 s Table 10: Computational results of the latest solvers and the proposed algorithm for SCP instances instance ?G.1–5 (5) ?H.1–5 (5) ?I.1–5 (5) ?J.1–5 (5) ?K.1–5 (5) ?L.1–5 (5) ?M.1–5 (5) ?N.1–5 (5) RAIL507 RAIL516 RAIL582 RAIL2536 ?RAIL2586 ?RAIL4284 ?RAIL4872 avg. (all) avg. (with stars) CPLEX12.6 0.37% 1.92% 2.81% 8.37% 4.77% 9.57% 18.43% 33.13% 0.00% 0.00% 0.00% 0.00% 2.27% 5.34% 1.73% 8.64% 9.45% Gurobi5.6.3 0.49% 2.28% 2.72% 4.30% 4.38% 8.44% 10.10% 12.49% 0.00% 0.00% 0.00% 0.00% 2.17% 1.57% 1.73% 4.92% 5.38% SCIP3.1 0.24% 1.93% 1.85% 3.59% 2.55% 3.52% 30.71% 42.32% 0.00% 0.00% 0.00% 0.86% 2.27% 30.55% 2.67% 10.00% 10.91% LocalSolver3.1 45.80% 61.54% 41.38% 58.40% 51.22% 57.79% 71.08% 75.63% 5.43% 3.19% 5.80% 3.50% 5.39% 6.50% 5.61% 49.99% 54.22% Yagiura et al. 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.29% 0.00% 0.00% 0.00% 0.01% 0.00% proposed 0.00% 0.00% 0.50% 1.53% 1.26% 2.05% 2.65% 5.47% 0.00% 0.00% 0.00% 0.72% 1.56% 2.12% 1.80% 1.56% 1.69% Table 12 shows the relative gap of the best feasible solutions achieved by the algorithms for the SPP instances. All algorithms were tested on a MacBook Pro laptop computer with a 2.7 GHz Intel Core i7 processor and 16 GB memory, and were run on a single thread under MacOS 10.12 operating system with time limits as shown in Table 2. In Table 12, the number in parentheses shows that of instances for which the algorithm obtained at least one feasible solution within the time limit, and the relative gap shows the average value for them. We also compare the computational results of our algorithm with those of a Lagrangian heuristic algorithm for BIP called the Wedelin’s heuristic (Bastert et al., 2010; Wedelin, 1995) and a branch-and-cut algorithm specially tailored for SPP developed by Borndörfer (1998). The computational results for the Wedelin’s heuristic are taken from (Bastert et al., 2010), where it was tested on a 1.3 GHz Sun Ultra Sparc-IIIi and run with a time limit of 600 s. The computational results for the branch-and-cut algorithm are taken from (Borndörfer, 1998), where it was tested on a Sun Ultra Sparc 1 Model 170E and run with a time limit of 7200 s. We first observe that our algorithm achieves better upper bounds than the latest MIP solvers (CPLEX12.6, Gurobi5.6.3 and SCIP3.1) for hard SPP instances and good upper bounds close to the optimal values for the others. We next observe that our algorithm achieves better upper bounds than the general purpose heuristic solvers (LocalSolver3.1 and the Wedelin’s heuristic) and 18 Table 11: Computational results of the latest solvers and the proposed algorithm for reduced SCP instances instance ?G.1–5 (5) ?H.1–5 (5) ?I.1–5 (5) ?J.1–5 (5) ?K.1–5 (5) ?L.1–5 (5) ?M.1–5 (5) ?N.1–5 (5) RAIL507 RAIL516 RAIL582 RAIL2536 ?RAIL2586 ?RAIL4284 ?RAIL4872 avg. (all) avg. (with stars) CPLEX12.6 0.60% 1.92% 2.59% 4.43% 2.84% 4.77% 10.82% 15.95% 0.00% 0.00% 0.00% 0.00% 0.84% 0.47% 0.84% 4.72% 5.16% Gurobi5.6.3 0.24% 1.62% 1.64% 3.99% 2.48% 4.85% 4.56% 11.36% 0.00% 0.00% 0.00% 0.00% 0.52% 0.93% 1.23% 3.33% 3.64% SCIP3.1 0.47% 1.62% 2.10% 3.42% 2.66% 3.13% 31.15% 34.17% 0.00% 0.00% 0.00% 0.00% 0.73% 0.74% 1.10% 8.43% 9.21% LocalSolver3.1 3.78% 1.90% 1.74% 2.99% 2.18% 2.41% 4.89% 6.47% 0.57% 1.61% 0.47% 0.29% 1.66% 1.66% 1.73% 2.98% 3.18% Yagiura et al. 0.00% 0.00% 0.00% 0.15% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.02% 0.02% proposed 0.00% 0.00% 0.00% 0.31% 0.63% 0.77% 1.01% 1.06% 0.00% 0.00% 0.00% 0.00% 0.84% 0.84% 0.84% 0.45% 0.50% Table 12: Computational results of the latest solvers and the proposed algorithm for SPP instances instance CPLEX12.6 Gurobi5.6.3 aa01–06 (6) 0.00%(6) 0.00%(6) us01–04 (4) 0.00%(4) 0.00%(4) v0415–0421 (7) 0.00%(7) 0.00%(7) v1616–1622 (7) 0.00%(7) 0.00%(7) t0415–0421 (7) 0.66%(7) 0.60%(7) ?t1716–1722 (7) 8.34%(7) 16.58%(7) ?ds 8.86% 55.61% ?ds-big 62.16% 24.03% ?ivu06-big 20.86% 0.68% ?ivu59 28.50% 4.36% avg. (all) 4.37%(42/42) 4.88%(42/42) avg. (with stars) 14.10%(13/13) 15.66%(13/13) † 600 s on a 1.3 GHz Sun Ultra Sparc-IIIi ‡ 7200 s on a Sun Ultra Sparc 1 Model 170E SCIP3.1 0.00%(6) 0.00%(3) 0.00%(7) 0.00%(7) 1.61%(6) 3.51%(7) 40.53% 72.01% 17.90% 37.84% 5.06%(40/42) 15.07%(13/13) LocalSolver3.1 13.89%(1) 11.26%(2) 0.05%(7) 4.60%(7) — (0) 37.08%(1) 85.17% 92.69% 52.54% 48.95% 17.52%(22/42) 63.29%(5/13) Bastert et al.† — — 0.71%(6) 6.64%(3) 1.30%(5) 12.55%(7) 8.82% — — — 5.79%(22/29) 10.79%(9/10) Borndörfer‡ 0.00%(6) 0.00%(4) 0.00%(7) 0.01%(7) 1.83%(7) 1.63%(7) — — — — 0.64%(38/38) 1.77%(9/9) good upper bounds comparable to those of the branch-and-bound algorithm (Borndörfer, 1998) for many SPP instances. In view of these, our algorithm achieves sufficiently good upper bounds compared to the other algorithms for the SPP instances, particularly for hard SPP instances. 8. Conclusion We present a data mining approach for reducing the search space of local search algorithms for a class of BIPs including SCP and SPP. In this approach, we construct a k-nearest neighbor graph by extracting variable associations from the instance to be solved in order to identify promising pairs of flipping variables in the 2-flip neighborhood. We also develop a 4-flip neighborhood local search algorithm that flips four variables alternately along 4-paths or 4-cycles in the k-nearest neighbor graph. We incorporate an efficient incremental evaluation of solutions and an adaptive control of penalty weights into the 4-flip neighborhood local search algorithm. Computational results show that the proposed method improves the performance of the local search algorithm for large-scale SCP and SPP instances. We expect that data mining approaches could also be beneficial for efficiently solving other large-scale combinatorial optimization problems, particularly for 19 proposed 1.60%(6) 0.04%(4) 0.00%(7) 0.09%(7) 0.92%(6) 2.45%(7) 0.00% 0.00% 0.00% 0.00% 0.81%(41/42) 1.43%(12/13) hard instances having large gaps between the lower and upper bounds of the optimal values. Acknowledgment This work was supported by the Grants-in-Aid for Scientific Research (JP26282085). References Achterberg, T. (2009). SCIP: Solving constraint integer programs. Mathematical Programming Computation, 1, 1–41. Agarwal, Y., Mathur, K., & Salkin, H. M. (1989). A set-partitioning-based exact algorithm for the vehicle routing problem. Networks, 19, 731–749. Atamtürk, A., Nemhauser, G. L., & Savelsbergh, M. W. P. (1995). A combined Lagrangian, linear programming, and implication heuristic for large-scale set partitioning problems. Journal of Heuristics, 1, 247–259. Balas, E., & Padberg, M. W. (1976). Set partitioning: A survey. SIAM Review, 18, 710–760. Baldacci, R., Christofides, N., & Mingozzi, A. (2008). An exact algorithm for the vehicle routing problem based on the set partitioning formulation with additional cuts. Mathematical Programming, 115, 351–385. Barahona, F. & Anbil, R. (2000). The volume algorithm: Producing primal solutions with a subgradient method. Mathematical Programming, 87, 385– 399. Barnhart, C., Johnson, E. L., Nemhauser, G. L., Savelsbergh, M. W. P., & Vance, P. H. (1998). Branch-and-price: Column generation for solving huge integer programs. Operations Research, 46, 316–329. Bastert, O., Hummel, B. & de Vries, S. (2010). A generalized Wedelin heuristic for integer programming. INFORMS Journal on Computing, 22, 93–107. Beasley, J. E. (1990). OR-Library: Distributing test problems by electronic mail. Journal of the Operational Research Society, 41, 1069–1072. Benoist, T., Estellon, B., Gardi, F., Megel, R., & Nouioua, K. (2011). LocalSolver 1.x: A black-box local-search solver for 0-1 programming. 4OR — A Quarterly Journal of Operations Research, 9, 299–316. Borndörfer, R. (1998). Aspects of set packing, partitioning and covering. Ph. D. Dissertation, Berlin: Technischen Universität. Boros, E., Hammer, P. L., Ibaraki, T., Kogan, A., Mayoraz, E., & Muchnik, I. (2000). An implementation of logical analysis of data. IEEE Transactions on Knowledge and Data Engineering, 12, 292–306. 20 Boros, E., Ibaraki, T., Ichikawa, H., Nonobe, K., Uno, T., & Yagiura, M. (2005). Heuristic approaches to the capacitated square covering problem. Pacific Journal of Optimization, 1, 465–490. Boschetti, M. A., Mingozzi, A. & Ricciardelli, S. (2008). A dual ascent procedure for the set partitioning problem. Discrete Optimization, 5, 735–747. Bramel, J., & Simchi-Levi, D. (1997). On the effectiveness of set covering formulations for the vehicle routing problem with time windows. Operations Research, 45, 295–301. Caprara, A., Fischetti, M., & Toth, P. (1999). A heuristic method or the set covering problem. Operations Research, 47, 730–743. Caprara, A., Toth, P., & Fischetti, M. (2000). Algorithms for the set covering problem. Annals of Operations Research, 98, 353–371. Caserta, M. (2007). Tabu search-based metaheuristic algorithm for large-scale set covering problems. In W. J. Gutjahr, R. F. Hartl, & M. Reimann (eds.), Metaheuristics: Progress in Complex Systems Optimization (pp. 43–63). Berlin: Springer. Ceria, S., Nobili, P., Sassano, A. (1997). Set covering problem. In M. Dell’Amico, F. Maffioli & S. Martello (eds.): Annotated Bibliographies in Combinatorial Optimization, (pp. 415–428). New Jersey: John Wiley & Sons. Ceria, S., Nobili, P., & Sassano, A. (1998). A Lagrangian-based heuristic for large-scale set covering problems. Mathematical Programming, 81, 215–288. Chu P. C., & Beasley, J. E. (1998). Constraint handling in genetic algorithms: The set partitioning problem. Journal of Heuristics, 11, 323–357. CPLEX Optimizer. (2014). http://www-01.ibm.com/software/commerce/ optimization/cplex-optimizer/index.html Accessed 2017.01.23. Farahani, R. Z., Asgari, N., Heidari, N., Hosseininia, M., & Goh, M. (2012). Covering problems in facility location: A review. Computers & Industrial Engineering, 62, 368–407. Gurobi Optimizer. (2014). http://www.gurobi.com/ Accessed 2017.01.23. Hammer, P. L., & Bonates, T. O. (2006). Logical analysis of data — An overview: From combinatorial optimization to medical applications. Annals of Operations Research, 148, 203–225. Hashimoto, H., Ezaki, Y., Yagiura, M., Nonobe, K., Ibaraki, T., & Løkketangen, A. (2009). A set covering approach for the pickup and delivery problem with general constraints on each route. Pacific Journal of Optimization, 5, 183–200. Hoffman, K. L., & Padberg, A. (1993). Solving airline crew scheduling problems by branch-and-cut. Management Science, 39, 657–682. 21 Hutter, F., Tompkins, D. A. D., & Hoos, H. H. (2002). Scaling and probabilistic smoothing: Efficient dynamic local search for SAT. Proceedings of International Conference on Principles and Practice of Constraint Programming (CP), 233–248. Johnson, D. S., & McGeoch, L. A. (1997). The traveling salesman problem: A case study. In E. Aarts, & K. Lenstra (eds.), Local Search in Combinatorial Optimization (pp. 215–310). New Jersey: Princeton University Press. Koch, T., Achterberg, T., Andersen, E., Bastert, O., Berthold, T., Bixby, R. E., Danna, E., Gamrath, G., Gleixner, A. M., Heinz, S, Lodi, A., Mittelmann, H., Ralphs, T., Salvagnin, D., Steffy, D. E., & Wolter, K. (2011). MIPLIB2010: Mixed integer programming library version 5. Mathematical Programming Computation, 3, 103–163. Linderoth, J. T., Lee, E. K., & Savelbergh, M. W. P. (2001). A parallel, linear programming-based heuristic for large-scale set partitioning problems. INFORMS Journal on Computing, 13, 191–209. Lodi, A. (2013) The heuristic (dark) side of MIP solvers. In E. -G. Talbi (ed.), Hybrid Metaheuristics (pp. 273–284). Berlin: Springer. Michel, L. & Van Hentenryck, P. (2000). Localizer. Constraints: An International Journal, 5, 43–84. Mingozzi, A., Boschetti, M. A., Ricciardelli, S., & Bianco, L. (1999). A set partitioning approach to the crew scheduling problem. Operations Research, 47, 873–888. Morris, P. (1993). The breakout method for escaping from local minima. Proceedings of National Conference on Artificial Intelligence (AAAI), 40–45. Nonobe, K., & Ibaraki, T. (2001). An improved tabu search method for the weighted constraint satisfaction problem. INFOR, 39, 131–151. Pesant, G., & Gendreau, M. (1999). A constraint programming framework for local search methods. Journal of Heuristics, 5, 255–279. Selman, B., & Kautz, H. (1993). Domain-independent extensions to GSAT: Solving large structured satisfiability problems. Proceedings of International Conference on Artificial Intelligence (IJCAI), 290–295. Shaw, P., Backer, B. D., & Furnon, V. (2002). Improved local search for CP toolkits. Annals of Operations Research, 115, 31–50. Thornton, J. (2005). Clause weighting local search for SAT. Journal of Automated Reasoning, 35, 97–142. Umetani, S., & Yagiura, M. (2007). Relaxation heuristics for the set covering problem. Journal of the Operations Research Society of Japan, 50, 350–375. 22 Umetani, S., Arakawa, M., & Yagiura, M. (2013). A heuristic algorithm for the set multicover problem with generalized upper bound constraints. Proceedings of Learning and Intelligent Optimization Conference (LION), 75–80. Umetani, S. (2015). Exploiting variable associations to configure efficient local search in large-scale set partitioning problems. Proceedings of AAAI Conference on Artificial Intelligence (AAAI), 1226–1232. Van Hentenryck, P., & Michel, L. (2005). Constraint-Based Local Search, Cambridge: The MIT Press. Voudouris, C., Dorne, R., Lesaint, D., & Liret, A. (2001). iOpt: A software toolkit for heuristic search methods. Proceedings of Principles and Practice of Constraint Programming (CP), 716–729. Wedelin, D. (1995). An algorithm for large-scale 0-1 integer programming with application to airline crew scheduling. Annals of Operations Research, 57, 283–301. Yagiura, M. & Ibaraki, T. (1999). Analysis on the 2 and 3-flip neighborhoods for the MAX SAT. Journal of Combinatorial Optimization, 3, 95–114. Yagiura, M., Kishida, M., & Ibaraki, T. (2006). A 3-flip neighborhood local search for the set covering problem. European Journal of Operational Research, 172, 472–499. 23
2cs.AI
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION arXiv:1412.4266v2 [math.AC] 8 Sep 2015 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT Abstract. Let (R, m, K) be a local ring, and let M be an R-module of finite length. We study asymptotic invariants, βiF (M, R), defined by twisting with Frobenius the free resolution of M . This family of invariants includes the Hilbert-Kunz multiplicity (eHK (m, R) = β0F (K, R)). We discuss several properties of these numbers that resemble the behavior of the Hilbert-Kunz multiplicity. Furthermore, we study when the vanishing of βiF (M, R) implies that M has finite projective dimension. In particular, we give a complete characterization of the vanishing of βiF (M, R) for one-dimensional rings. As a consequence of our methods, we give conditions for the non-existence of syzygies of finite length. Contents 1. Introduction 2. Notation and terminology 3. Definition and properties of βiF (M, N) and µFi (M, N) 4. Relations with projective dimension 5. Syzygies of finite length Acknowledgments References 1 3 5 10 18 23 23 1. Introduction Let (R, m, K) denote an F -finite local ring of dimension d and characteristic p > 0, and let α = logp [K : K p ]. Given an R-module M and an integer e > 0, e M denotes the R-module e structure on M given by r ∗ m = r p m for every m ∈ eM and r ∈ R. In addition, λR (M), or simply λ(M) when the ring is clear from the context, denotes the length of M as an R-module. Let q = pe be a power of p. For an ideal I ⊆ R, let I [q] = (iq | i ∈ I) be the ideal generated by the q-th powers of elements in I. If I is m-primary, the Hilbert-Kunz multiplicity of I in R is defined by λ(R/I [q] ) . eHK (I, R) = lim e→∞ qd The existence of the previous limit was proven by Monsky [Mon83]. Under mild conditions, eHK (m, R) = 1 if and only if R is a regular ring [WY00]. The Hilbert-Kunz multiplicity can be interpreted as a measure of singularity: the smaller it is, the nicer the ring is. For instance, Aberbach and Enescu proved rings with small Hilbert-Kunz multiplicity are Gorenstein and F -regular [AE08] (see also [BE04]). We have that e λ(R/I [q] ) = q α λ(R/I ⊗R e R) = q α λ(TorR 0 (R/I, R)) 1 2 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT This gives rise to the following extension of the Hilbert-Kunz multiplicity for higher Tor functors. Let N be a finitely generated R-module. For an integer i > 0 define e λ(TorR i (M, N)) . e→∞ q (d+α) βiF (M, N) = lim We denote βiF (K, R) by βiF (R) and call it the i-th Frobenius Betti number of R. These higher invariants also detect regularity. Namely, Aberbach and Li [AL08] show that R is a regular ring if and only if βiF (R) = 0 for some i > 1. Note that R is regular if and only if K has finite projective dimension as R-module. In this manuscript, we seek an answer to the following question. Question 1.1. Let M be an R-module of finite length. What vanishing conditions on βiF (M, R) imply that M has finite projective dimension? Miller [Mil00] showed if R is a complete intersection and M is an R-module of finite length, then the vanishing of βiF (M, R) for some i > 1 implies that M has finite projective dimension. We refer to [DS13] for related results for Gorenstein rings. In Section 4, we answer this question for rings that have small regular algebras, and for rings that have F -contributors. Later, we focus on one-dimensional rings and give the following characterization for the vanishing of βiF (M, R). Theorem. (see Theorem 4.7) Let (R, m, K) be a one-dimensional local ring of positive characteristic p, and let M be an R-module of finite length. Let (Gj , ϕj )j>0 be a minimal free resolution of M. Then the following are equivalent: (i) Im(ϕi+1 ) ⊆ Hm0 (Gi ). e (ii) TorR i (M, (R/p)) = 0 for all e > 0, for all p ∈ Min(R). R e (iii) Tori (M, (R/p)) = 0 for all e ≫ 0, for all p ∈ Min(R). (iv) βiF (M, R) = 0. Assume in addition that R is complete and K is algebraically closed. If V denotes the integral closure of R in its ring of fractions, then the conditions above are equivalent to (v) TorR i (M, V ) = 0. As a consequence of this theorem, we show that if R is a one-dimensional Cohen-Macaulay local ring and λ(M) < ∞, then βiF (M, R) = 0 for any i > 1 implies that M has finite projective dimension (see Corollary 4.8). Furthermore, we prove that the vanishing of two consecutive βiF (M, R) implies that M has finite projective dimension in every one-dimensional local ring (see Corollary 4.9). From the theorem above we have that βiF (M, R) = 0 if and only the (i + 1)-syzygy has finite length. On the other hand, there are modules of infinite projective dimension over onedimensional rings which have second syzygies of finite length (see Example 5.1). Motivated by Iyengar’s question about the eventual stability of dimensions of syzygies and by our results regarding βiF (M, R), we ask the following question. Question 1.2. Let R be a d-dimensional local ring, and let M be a finitely generated Rmodule such that pdR (M) = ∞ and λ(M) < ∞. If i > d + 1, then must the length of the i-th syzygy be infinite? In Section 5, we study this question, mainly for one-dimensional rings. In particular, we show that the answer to Question 1.2 is positive for one-dimensional Buchsbaum rings (see FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 3 Proposition 5.3). We also obtain a partial answer for modules whose Betti numbers are eventually non-decreasing (see Proposition 5.7). Furthermore, we show that the first and third syzygies of M are either zero or have infinite length for every finite length module M over a one-dimensional ring (see Corollary 5.10). The assumption of M having finite length is necessary, as shown in Example 5.11. Aside from the study of projective dimension, we study basic properties of the higher invariants that resemble the Hilbert-Kunz multiplicity in other aspects. 2. Notation and terminology Throughout this article, (R, m, K) will denote a local ring of Krull dimension dim(R) = d. For a finitely generated R-module M, we define dim(M) = dim(R/(0 :R M)), where 0 :R M = {x ∈ R | xM = 0}. When M = 0, we set dim(M) = −1. An element x ∈ R such that dim(R/(x)) = d − 1 will be called a parameter of R. Given a finitely generated R-module M, a minimal free resolution (G• , ϕ• ) of M is an exact sequence ... // Gi+1 ϕi+1 // Gi ϕi // ...... // G1 ϕ1 // G0 // M // 0 such that Gi ∼ = Rβi (M ) are free R-modules and Im(ϕi+1 ) ⊆ mGi . The integers βi (M) = rk(Gi ) = λ(TorR j (M, K)) are called the Betti numbers of M. If βi (M) = 0 for some i, we say that M has finite projective dimension, and that it is equal to pdR (M) = max{i ∈ N | βi (M) 6= 0}. We adopt the convention that pdR (M) = −∞, when M = 0. For all i > 0 we set Ωi (M) = Coker(ϕi ), and we call it the i-th syzygy of the module M. Note that Ω0 (M) = M. When no confusion may arise, we will denote Ωi (M) simply by Ωi . Throughout the manuscript we often make use of local cohomology tools. For every k ∈ N, the quotient map R/mk+1 → R/mk induces maps of functors ExtiR (R/mk , −) → ExtiR (R/mk+1 , −). For an R-module M, we define the i-th local cohomology of M with support on m by Hmi (M) = lim ExtiR (R/mk , M). S k→∞ In particular, Hm0 (M) = k∈N 0 :M mk = {v ∈ M | mk v = 0 for some k ∈ N}. For a non-zero finitely generated R-module M, depth(M) denotes the smallest integer j such that Hmj (R) 6= 0. When depth(M) = dim(M), the module is called Cohen-Macaulay, and M is called maximal Cohen-Macaulay if depth(M) = dim(R). We now review some basic facts about integral closures. For an ideal I ⊆ R and an element x ∈ R we say that x is integral over I if it satisfies an equation of the form xn + r1 xn−1 + . . .+ rn = 0, where rj ∈ I j for all j = 1, . . . , n. The set of elements integral over I forms an ideal, which is called the integral closure of I, and denoted I. For an ideal J ⊆ I, we say that J is a reduction of I if J = I. We say that J is a minimal reduction of I if it is a reduction of I which minimal with respect to containment. We refer the reader to [SH06, Chapter 8] for more details about reductions. For a domain R, let V be the integral closure of R in its field of fractions L. We define the conductor of R as the set of all elements z ∈ L such that zV ⊆ R, and we denote it by C. When V is finite over R, one can show that C is the largest ideal which is common to R and V , and that C contains a non-zero divisor for R [SH06, Exercise 2.11]. In particular, if (R, m, K) is an excellent one dimensional local domain, the conductor is m-primary. See [SH06, Chapter 12] for more results about conductors. 4 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT We also need the notion of dualizing complex. We refer to [Rob80, P. 51] or to [Har66, Chapter V] for more details. Definition 2.1. Let (S, n, L) be a local ring of dimension d. We say that a complex D • is a dualizing complex of S if L (1) D i = dim S/p=d−i ES (S/p). (2) The cohomology H i (D • ) is finitely generated. Remark 2.2. If (S, n, L) is a complete ring, then S has a dualizing complex, DS• [Har66, P. 299]. If p is a prime ideal such that dim S/p = dim S, we have that Sp is Artinian, hence complete. In addition, DS• p := DS• ⊗ Sp is a dualizing complex for Sp . Furthermore, H j (DS• p ) = H j (DS• ) ⊗ Sp = 0 for j > 0 and ωSp ∼ = H 0(DS• p ) = ESp (Sp /pSp ), because Sp is Artinian, and so, Cohen-Macaulay. We now introduce Buchsbaum rings, which we study Question 1.2 in Section 5. Definition 2.3. Let (R, m, K) be a local ring of dimension d. We say that R is a Buchsbaum ring if, for any system of parameters x1 , . . . , xd , we have (x1 , . . . , xi−1 ) : xi = (x1 , . . . , xi−1 ) : m for every i = 1, . . . , d. When i = 1, the ideal (x1 , . . . , xi−1 ) is simply the zero ideal. There are several equivalent ways to define Buchsbaum rings, but the one above is the most convenient for our purposes. Remark 2.4. Let (R, m, K) be a one-dimensional local ring. Suppose that R is not CohenMacaulay, so that Hm0 (R) 6= 0. Then there exists a parameter x of R such that Hm0 (R) = 0 :R x. In fact, fix an integer n ∈ N such that mn Hm0 (R), using that Hm0 (R) ⊆ R is an ideal, hence it is finitely generated. Take any parameter y ∈ m, and set x = y n . With this choice, one has xHm0 (R) ⊆ mn Hm0 (R) = 0, so that Hm0 (R) ⊆ 0 :R x. On the other hand, there exists k ∈ N such that mk ⊆ (x). Therefore, if r ∈ 0 :R x, we get rmk ⊆ r(x) = 0, so that r ∈ Hm0 (R). We conclude that Hm0 (R) = 0 :R x. Remark 2.5. Let (R, m, K) be a one-dimensional Buchsbaum ring. By Remark 2.4, there exists a parameter x ∈ R such that 0 :R x = Hm0 (R). By definition of Buchsbaum ring, we have that Hm0 (R) = 0 :R x = 0 :R m. Lt K is a finite dimensional K-vector space. In particular, mH 0 (R) = 0, that is, H 0 (R) ∼ = m m j=1 For the rest of the section, we assume that (R, m, K) is a local ring of characteristic p > 0. For an integer e > 1, we consider the e-th iteration of the Frobenius endomorphism e F e : R → R, F e (r) = r p for all r ∈ R. For an R-module M, one can consider M with the action induced by restriction of scalars, via F e . We denote this module by eM. More e explicitly, for r ∈ R and m ∈ eM, we have r ∗ m = r p m. Definition 2.6. We say that R is F -finite if 1 R is a finitely generated R-module. Note that R is F -finite if and only if eR is a finitely generated R-module for any > 1 or, equivalently, for all e > 1. Furthermore, F -finite rings are excellent [Kun76, Theorem 2.5]. When R is F -finite, we have that [K : K p ] < ∞. In this case, we set α = logp [K : K p ]. FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 5 3. Definition and properties of βiF (M, N) and µFi (M, N) We start by defining the Frobenius Betti numbers and showing basic properties that resemble the Hilbert-Kunz multiplicity. Definition 3.1 (see also [Li08]). Let (R, m, K) be a local ring of characteristic p > 0, let M be an R-module of finite length and let N be a finitely generated R-module. Define e λ(TorR i (M, N)) . e→∞ q (d+α) F βi,R (M, N) = lim F F We denote βi,R (K, R) by βi,R (R) and call it the i-th Frobenius Betti number of R. If the ring is clear from the context, we only write βiF (M, N). The above limit exists by the main result in [Sei89]. We point out that Li [Li08] focused on βiF (R/I, R), which he denoted by ti (I, R). Example 3.2. Suppose that R = S/f S, where S is an F -finite regular local ring of characteristic p > 0, and f ∈ S. We can write eR ∼ = Rae ⊕ Me , where Me has no free summands. ae exists [Tuc12, Theorem 4.9], and it is called the F -signature of The limit s(R) := lim q(d+α) e→∞ R, which is an important invariant related to strong F -regularity [AL03, Theorem 0.2]. We consider the minimal free resolution of eR: ... // e Rβi ( R) // e Rβi−1 ( R) // ... // e Rβ0 ( R) // e R // 0. We note that β0 (eR) = ae + β0 (Me ) and βi (eR) = βi (Me ) for i > 0. Since Me is a maximal Cohen-Macaulay module with no free summands, we have that βi (Me ) = β0 (Me ) for i > 0 [Eis80, Proposition 5.3 and Theorem 6.1]. Then, β0 (eR) ae β0 (Me ) β0 (Me ) = lim (d+α) + lim (d+α) = s(R) + lim (d+α) . (d+α) e→∞ q e→∞ q e→∞ q e→∞ q β0F (R) = eHK (m, R) = lim Hence, βiF (R) βi (eR) βi (Me ) β0 (Me ) = lim (d+α) = lim (d+α) = lim (d+α) = eHK (m, R) − s(R) e→∞ q e→∞ q e→∞ q for i > 0. As for the Hilbert-Kunz multiplicity, the Frobenius Betti numbers also increase after taking the quotient by a nonzero divisor. Proposition 3.3. Let (R, m, K) be a local ring of characteristic p > 0, M be an R-module of finite length, and x ∈ ann(M) be a nonzero divisor on R. Then R/(x) e λ(TorR λ(Tori (M, e (R/(x)))) i (M, R)) F = lim 6 β (N, R/(x)) = lim , i,R/(x) e→∞ e→∞ q (d+α) q (d−1+α) where the subscripts indicate over which ring we are computing the Frobenius Betti numbers. F F In particular, βi,R (R) 6 βi,R/(x) (R/(x)). F βi,R (M, R) Proof. Let G• → e R be a minimal free resolution of e R. Let R denote R/xR. We have that G• = G• ⊗R R is a free resolution for e R ⊗R R as an R-module. Furthermore, we have that e H0 (G• ) = e R ⊗R R. This is a consequence of the fact that Hi (G• ) = TorR i ( R, R) = 0 for e i > 0 because x is a nonzero divisor on R and R. 6 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT Since x ∈ ann(M), we have that R e e TorR i (M, R) = Hi (M ⊗R G• ) = Hi (M ⊗R R ⊗R G• ) = Hi (M ⊗R G• ) = Tori (M, R ⊗R R). Since x is a nonzero divisor on R, there is a filtration 0 = L0 ⊆ L1 ⊆ . . . ⊆ Lqα = e R ⊗R R R e e α such that Lr+1 /Lr = e (R). As a consequence, λ(TorR i (M, R ⊗R R)) 6 q λ(Tori (M, R)) Then e e λ(TorR λ(TorR i (M, R)) i (M, R)) 6 lim lim e→∞ e→∞ q (d+α) q (d−1+α)  We now introduce µFi (M, N), a dual version of βiF (M, N), which is defined in terms of Ext. In Proposition 3.11, we establish a relation between these asymptotic invariants. Definition 3.4. Let (R, m, K) be a local ring of characteristic p > 0, let M be an R-module of finite length, and let N be a finitely generated R-module. We define µFi (M, N) λ(ExtiR (M, e N)) = lim , e→∞ q (d+α) Next, we prove that the numbers µFi (M, N) are well defined. The proof is essentially the same as the one for βiF (M, N), as it uses the main result in [Sei89]. Nonetheless, we include it here for completeness. Proposition 3.5. Let (R, m, K) be a local ring of characteristic p > 0, let M be an Rλ(ExtiR (N,e M )) module of finite length, and let N be a finely generated R-module. Then, lim q (d+α) e→∞ exists. Moreover, if 0 → N1 → N2 → N3 → 0 is a short exact sequence, then λ(ExtiR (M, e N2 )) λ(ExtiR (M, e N1 )) λ(ExtiR (M, e N3 )) = lim + lim . e→∞ e→∞ e→∞ q (d+α) q (d+α) q (d+α) lim Proof. Let G• → M be a minimal free resolution of M and define ge (N) = λ(H i (HomR (G• ), eN)). Let 0 → N1 → N2 → N3 → 0 be a short exact sequence of finitely generated R-modules. We have that ge (N2 ) 6 ge (N1 ) + ge (N3 ) and equality holds if the sequence splits. Then, ge (N) λ(ExtiR (M, eN)) = lim e→∞ q (d+α) e→∞ q (d+α) exists, and it is additive in short exact sequences [Sei89]. lim  Proposition 3.6. Let (R, m, K) be a local ring of characteristic p > 0, M be an R-module of finite length, and N be a finitely generated R-module. Let Λ be the set of all prime ideals p such that dim R/p = dim R. We have that X βiF (M, N) = βiF (M, R/p)λRp (Np ) p∈Λ and µFi (M, N) = X p∈Λ µFi (M, R/p)λRp (Np ). FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 7 Proof. We only prove the first statement, since the proof of the second is completely analogous. Let 0 = N0 ⊆ N1 ⊆ . . . ⊆ Nh = N be a filtration for N such that Nj /Nj−1 ∼ = R/pj , where pj ⊆ R is a prime ideal. Thus, we have short exact sequences 0 → Nj−1 → Nj → P R/pj → 0. We deduce that βiF (M, N) = hj=1 βiF (M, R/pj ) [Sei89, Proposition 1(b)]. In addition, we have that βiF (M, R/pj ) = 0 whenever dim(R/pj ) < dim(R) [Sei89, Proposition 1(a)]. To prove the result, we need to count the number of times that a prime p such that dim R/p = dim R appears in the prime filtration. This number is obtained by localizing the above filtration at p, and counting the length of the resulting chain. Since the localized chain is a composition series of the module Np , we obtain that the number of times p appears in the prime filtration above is given by λRp (Np ). Then βiF (M, N) = h X βiF (R/pj ) = j=1 pj ∈ Λ X βiF (M, R/p)λRp (Np ). p∈Λ  Remark 3.7. It follows from Proposition 3.6 that, if βiF (M, R) = 0 for some i ∈ N, we have that βiF (N, R/p) = 0 for every minimal prime of R such that dim(R/p) = d. Therefore, if this is the case, βiF (M, N) = 0 for every finitely generated R-module N, using again Proposition 3.6. A similar statement holds for µFi (M, R). The following theorem is related to results of Chang [Cha97, Lemma 1.20 and Corollary 2.4], and in some cases it follows from them. We present a different proof that does not use spectral sequences. Theorem 3.8. Let (R, m, K) be a local ring of characteristic p > 0, M be an R-module of finite length, and N be a finitely generated R-module. Then λ(ExtiR (M, e N)) =0 lim e→∞ q (i+1+α) for i < d. In particular, µFi (M, N) = 0 for i < d. Proof. Our proof will be by induction on n = dim(N). If n = 0, we have that h = λ(N) is finite. There is a filtration 0 = N0 ⊆ N1 ⊆ . . . ⊆ Nh = N such that Nj /Nj−1 ∼ = K. From the short exact sequences 0 → Nj−1 → Nj → K → 0, we have that λ(ExtiR (M, e Nj ))) 6 λ(ExtiR (K, e Nj−1 )) + λ(ExtiR (K, e K)). Since λ(ExtiR (M, e K)) q α λ(ExtiR (M, K)) λ(ExtiR (M, K)) lim = lim = lim = 0, e→∞ e→∞ e→∞ q (i+1+α) q (i+1+α) q (i+1) we have that λ(ExtiR (M, e N)) =0 e→∞ q (i+1+α) lim by an inductive argument. 8 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT Suppose that our claim is true for modules of dimension less or equal to n − 1. There is a filtration 0 = N0 ⊆ N1 ⊆ . . . ⊆ Nh = N such that Nj /Nj−1 ∼ = R/pj , where pj ⊂ R is a prime ideal. From the short exact sequences 0 → Nj−1 → Nj → R/pj → 0 we have that λ(ExtiR (M, e Nj )) 6 λ(ExtiR (M, e Nj−1 )) + λ(ExtiR (M, e (R/pj ))). It suffices to show that λ(ExtiR (M, e (R/pj ))) lim =0 e→∞ q (i+1+α) (3.0.1) for primes pj such that dimR (R/pj ) = n = dimR N. Let T = R/pj . Let x ∈ AnnR M \ pj , which exists because dimR T = dimR N > 0 = dimR M. We have a short exact sequence 0 // e x T // e T // e T /x(e T ) // 0, which induces a long exact sequence (3.0.2) ... // ExtiR (M, e T ) 0 // ExtiR (M, e T ) // ExtiR (M, e T /x(e T )) // .... Then, for every i, e e λ(ExtiR (M, e T )) 6 λ(Exti−1 R (M, T /x( T ))). We have a filtration 0 = L0 ⊆ L1 ⊆ . . . ⊆ Lqα = e T /x(e T ) such that Lr+1 /Lr = e (T /xT ) because x is not a zero divisor of T. From the induced long exact sequence by ExtiR (M, −), we have that λ(ExtiR (M, e T /x(e T ))) 6 q α λ(ExtiR (M, e (T /xT )))). Therefore e e λ(Exti−1 λ(ExtiR (M, e T )) R (M, T /x( T ))) 6 lim e→∞ e→∞ q (i+1+α) q (i+1+α) e q α λ(Exti−1 R (M, (T /xT ))) 6 lim e→∞ q (i+1+α) e λ(Exti−1 R (K, (T /xT )))) = lim e→∞ q (i+α) = 0 because dim T /xT = n − 1. lim  Corollary 3.9. Let (R, m, K) be a local ring of characteristic p > 0. Let N be a finitely generated R-module, and let C be an R-module such that, for all e ≫ 0, C θe is a direct θe summand of e N for some θe ∈ N. Assume that θ = lim supe→∞ q(d+α) > 0. Then, for all R-modules M of finite length, and all integers i, we have µFi (M, N) > θ · λ(ExtiR (M, C)). In particular, C is a maximal Cohen-Macaulay module. FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 9 Proof. We have λ(ExtiR (M, e N)) θe · λ(ExtiR (M, C)) > lim sup = θ · λ(ExtiR (M, C)). (d+α) (d+α) e→∞ q q e→∞ µFi (M, N) = lim Using M = K in Theorem 3.8, we obtain that µFi (K, N) = 0 for all i < d. It follows from the inequality that ExtiR (K, C) = 0 for all i < d, and then C is a maximal Cohen-Macaulay module.  Remark 3.10. Let (R, m, K) be a local ring of characteristic p > 0, and N be a finitely generated R-module. We say that an R-module C is an F -contributor of N if C θe is a direct θe summand of eN for e ≫ 0, and lim supe→∞ q(d+α) > 0 [Yao05]. Corollary 3.9 shows that every F -contributor is a maximal Cohen-Macaulay module. This was already noted by Yao [Yao05, Lemma 2.2] when N has finite F -representation type. The following proposition shows that taking limits with respect to Tor or Ext give the same invariants up to a shift in the homological degrees. Proposition 3.11. Let (R, m, K) be a local ring of characteristic p > 0, and M be an R-module of finite length. Then βiF (M, R) = µFd+i (M, R) for every i ∈ N. Proof. Since βiF (M, R) and µFd+i (M, R) are not affected by completion at m, we may assume • that R is a complete local ring. In this case, R has a dualizing complex DR by Remark 2.2. We have that • βiF (M, R) = µFd+i (M, H 0(DR )) by [Cha97, Proposition 2.3(2)]. Let Λ be the set of all prime ideals of R such that dim R/p = • • ) = ωRp by Remark 2.2. We have that dim R. Let p ∈ Λ. We have that (H 0(DR ))p = H 0(DR p ωRp = HomRp (Rp , ERp (Rp /pRp )) and λRp (ωRp ) = λRp (Rp ). Finally, by Proposition 3.6 X • • )) µFd+i (M, H 0 (DR )) = µFd+i (M, R/p)λRp (H 0 (DR p p∈Λ = X µFd+i (M, R/p)λRp (ωRp ) p∈Λ = X µFd+i (M, R/p)λRp (Rp ) p∈Λ = µFd+i (M, R).  Remark 3.12. If R itself has an F -contributor C, then we get a relation involving the βiF ’s. In fact, by Proposition 3.11, we have βiF (M, R) = µFd+i (M, R) for all i ∈ N. Thus, in the notation of Corollary 3.9, we have βiF (M, R) > θ · λ(Extd+i R (M, C)). We end this section with a proposition that shows how βiF (M, N) behaves under some flat ring extensions. First, we need a different way to compute βiF (M, N). 10 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT Remark 3.13. Let (R, m, K) be a local ring of characteristic p > 0, let M be an R-module of finite length, and let N be a finitely generated R-module. Let G• = (Gj , ϕj )j>0 denote a [q] [q] [q] minimal free resolution of M. Let G• be the complex (Gj , ϕj )j>0, where the matrix of ϕj has as entries the q-th powers of the entries in the matrix of ϕj . We have that e α [q] λ(TorR i (M, N)) = q λ(Hi (G• ⊗R N)). Hence, [q] βiF (M, N) λ(Hi (G• ⊗R N)) = lim . q→∞ qd Proposition 3.14. Let (R, m, K) → (S, n, L) be a flat extension of two F -finite local rings of characteristic p > 0. Let M be a finite length R-module. Let α = logp [K : K p ] and θ = logp [L : Lp ]. Suppose that mS = n. Then, e λ(TorR λ(TorSi (M ⊗R S, e S)) i (M, R)) F = lim = βi,S (M ⊗R S, S). e→∞ e→∞ pe(d+α) pe(d+θ) F βi,R (M, R) = lim F c R). b In particular, we have that βi,R (M, R) = βi,FRb (M, Proof. Let q = pe . We have that e λR (TorR i (M, R)) = λR (Hi (G[q] • )) by Remark 3.13. qα = λS (Hi (G[q] • ⊗R S)) because S is flat and mS = n. = λS (Hi ((G• ⊗R S)[q] )) because G• is free. = λS (TorSi (M ⊗R S, e S) by Remark 3.13 and because S is flat. qθ After dividing by q d and taking limits, we have that F F βi,R (M, R) = βi,S (M ⊗R S, S).  4. Relations with projective dimension Let (R, m, K) be a local F -finite ring of characteristic p > 0, and let M be an R-module of finite length. In this section we investigate when the vanishing of βiF (M, R) detects whether M has finite projective dimension. We first recall known results in this direction. We have that R is a regular ring if and only if βiF (R) = βiF (K, R) = 0 for some i > 1 [AL08, Corollary 3.2]. Let M be a finitely e generated R-module. If M has finite projective dimension, then TorR i (M, R) = 0 for all R e i > 0 and all e > 0 [PS73, Théorème 1.7]. Conversely, if Tori (M, R) = 0 for infinitely many e and all i > 0, then M has finite projective dimension [Her74, Theorem 3.1]. In fact, even e more is true: if TorR i (M, R) = 0 for depth(R) + 1 consecutive values of i and some e ≫ 0, then M has finite projective dimension [KL98, Proposition 2.6] (see also [Mil03, Theorem 2.2.8]). Now, suppose that R is a complete intersection. If βiF (M, R) = 0 for some i > 0, then M has finite projective dimension by [Mil00, Corollary 2.5] (see also [DS13, Corollary 4.11]). FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 11 Proposition 4.1. Let (R, m, K) be a local ring of characteristic p > 0, and let M be an R-module of finite length. Suppose that there is a regular local ring (A, n, L) and a map of local rings φ : R → A such that A is finitely generated as an R-module, and dim A = d. If F F βjF (M, R) = βj+1 (M, R) = . . . = βj+d (M, R) = 0, then M has finite projective dimension. Proof. We note that logp [L : Lp ] = logp [K : K p ] = α < ∞, and so, A is F -finite. Since A is Lq(d+α) A. Let x1 , . . . , xd ∈ A be a set of generators for n, and let regular and local, e A ∼ = Ir := (x1 , . . . , xr )A. By induction on r we will show that R TorR j+r (M, A/Ir ) = . . . = Torj+d (M, A/Ir ) = 0 (4.0.3) e q for every r. If r = 0, we have that TorR i (M, A) = ⊕ R R e (d+α) λ(Tori (M, A)) = q λ(Tori (M, A)), and thus (d+α) TorR i (M, A) for every i ∈ N. Then, βiF (M, A) = λ(TorR i (M, A)). Since A is finitely generated, and since βiF (M, R) = 0 for i = j, . . . , j + d by assumption, we F have that βjF (M, A) = . . . = βj+d (M, A) = 0 by Remark 3.7. Hence, TorR j (M, A) = . . . = R Torj+d (M, A) = 0. We suppose that (4.0.3) holds for r − 1 and prove it for r. We have a short exact sequence 0 A/Ir−1 // xr // A/Ir−1 // A/Ir // 0. This induces a long exact sequence ... // TorR i (M, A/Ir−1 ) xr // TorR i (M, A/Ir−1 ) // TorR i (M, A/Ir ) // TorR i−1 (M, A/Ir−1 ) // .... R R Since TorR j+r−1 (M, A/Ir−1 ) = . . . = Torj+d (M, A/Ir−1 ) = 0, we have that Torj+r (M, A/Ir ) = R . . . = TorR j+d (M, A/Ir ) = 0, proving the claim. In particular, we get Torj+d (M, A/Id ) = 0. Since L = A/Id is a finite field extension of K, we have R 0 = λ(TorR j+d (M, A/Id )) = [L : K] · λ(Torj+d (M, K)). Therefore, TorR j+d (M, K) = 0 and M has finite projective dimension.  Lemma 4.2. Let (R, m, K) be a local ring of characteristic p > 0. Suppose that there is an R-module N of dimension d that has an F -contributor C. Let M be an R-module of e finite length. If βiF (M, N) = 0, then TorR i (M, C) = 0 for every e > 0. In particular, if R is strongly F -regular of positive dimension d, and βiF (M, R) = 0 for d consecutive values of i, then M has finite projective dimension. ′ ′ Proof. For e′ ≫ 0 and q ′ = pe , we have that C θe′ is a direct summand of e N, for some ′ θe′ > 0. We note that (eC)θe′ is a direct summand of e+e N for θe′ ∈ N such that lim sup q′(d+α) all e > 0. Then   e e+e′ λ(TorR λ(TorR N)) θe′ i (M, C)) i (M, 6 lim = βiF (M, N) = 0. lim sup ′(d+α) (d+α) ′(d+α) ′ e →∞ ′ q q qq e →∞ e It follows that TorR i (M, C) = 0. If R is strongly F -regular, then R is an F -contributor of itself. In addition, R is Cohen-Macaulay, and if Tori (M, e R) = 0 for d consecutive values of i and for e ≫ 0, we have that M has finite projective dimension [KL98, Proposition 2.6] (see also [Mil03, Theorem 2.2.11]).  12 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT Proposition 4.3. [CHKV06, Corollary 3.3] Let (R, m, K) be a local ring, let I be an integrally closed m-primary ideal, and let N be a finitely generated R-module. Then pdR (N) < i if and only if TorR i (N, R/I) = 0. e In particular, Proposition 4.3 shows that, if TorR i (R/I, R) = 0 for some e > 1, then R is regular [Kun69, Theorem 2.1]. We now present a similar result for Frobenius Betti numbers. Proposition 4.4. Let (R, m, K) be a reduced local ring of characteristic p > 0. Suppose that there exists an R-module N of dimension d that has an F -contributor C. If I is an integrally closed m-primary ideal such that βiF (R/I, N) = 0 for some i > 0, then R is regular. Proof. By Lemma 4.2, we have that Tori (R/I, e C) = 0 for every e > 0, and thus e C has finite projective dimension by [CHKV06, Corollary 3.3]. Since e C is a maximal Cohen-Macaulay e (see Remark 3.10),L we have that module [Yao05, Lemma 2.2]L L 1 C is a free module for every 1 2 1 ∼ ∼ e > 0. In particular, C = α R and C = ( α R) = α R is free as well. Therefore, 1 R is free and R is regular [Kun69, Theorem 2.1].  We now focus on one-dimensional rings. In this case, we can find a characterization of the vanishing of βiF (M, R). We first prove two lemmas. Lemma 4.5. Let (R, m, K) be a one-dimensional complete local domain of characteristic p > 0, with K algebraically closed. Then there exists a parameter x ∈ R such that (xq ) = m[q] e for all q = pL ≫ 0. Furthermore, if V denotes the integral closure of R in its field of fractions, e ∼ V for all e ≫ 0 (as R-modules). then R = Proof. Since R is a complete domain, we have that (V, mV , K) is a one dimensional, integrally closed, local domain. Hence, V is a DVR. Let x ∈ R be a minimal reduction of m, and let v denote the order valuation on V . Let x, y1 , . . . , yn be a minimal generating set of the maximal ideal. We claim that we can choose the elements yi ’s such that v(x) < v(yi ) for all i = 1, . . . , n. We have v(x) 6 v(yi ) for all i because x is a minimal reduction of m [SH06, Proposition 6.8.1]. If equality holds, say for i = 1, we have that y1 /x = α ∈ KV = K since K is algebraically closed. Fix a lifting u ∈ R of α. If we replace y1 for y1′ := y1 − ux we have that x, y1′ , . . . , yn is still a minimal generating set of m. Now v(x) < v(y1′ ), since y1′ /x ∈ mV . Similarly, if necessary, we may replace each yi to obtain our claim. Since the conductor C [q] is mV -primary, for all e ≫ 0 and all i = 1, . . . , n, we have that (yi /x)q = ri ∈ mV ⊆ C ⊆ R. q Thus yi = ri xq ∈ (x)q . This shows the first part of the lemma. We now focus on the second part of the lemma. Since K is algebraically closed, R and K have the same residue field. It then follows that R ⊆ V = R + mV . Since R is a domain, we can identify eR with R1/q , the ring of q-th roots of R. For w ∈ V , we can write w = u + v, [q] for some u ∈ R and v ∈ mV . Therefore, we have that mV ⊆ C ⊆ R for e ≫ 0, because C is mV primary. This shows that w q = uq + v q ∈ R, that is w ∈ R1/q . Thus, for e ≫ 0, we have R ⊆ V ⊆ eR. Hence, eR is a V -module. Since V is a DVR, eR decomposes into a V -free part e and a V -torsion L part. Therefore R is torsion free as a eV -module because R is a domain. e ∼ Thus, R = q V . Finally, the V -module structure on R is compatible with the inclusion L V is also an isomorphism of R-modules.  R ⊆ V ; therefore, eR ∼ = Lemma 4.6. Let (R, m, K) be a one-dimensional local ring of characteristic p > 0. Let (Gj , ϕj )j>0 be a minimal free resolution of a finite length R-module M. Suppose there exists FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 13 i > 0 such that Im(ϕi+1 ) 6⊆ pGi for some p ∈ Min(R). Then e λ(TorR i (M, R)) > 0. e→∞ qα βiF (M, R) = lim b = KJx1 , . . . , xn K/I for some n ∈ N Proof. By the Cohen Structure Theorem, we have that R and some ideal I ⊆ KJx1 , . . . , xn K. Let S = LJ1, . . . , xn K/I ′ , where L is the algebraic closure of K and I ′ = I LJ1, . . . , xn K. Every inclusion K → L gives a flat extension R → S such that mS is the maximal ideal of S. If Im(ϕi+1 ⊗R 1S ) = Im(ϕi+1 ) ⊗R S is contained in in a minimal prime of S, then Im(ϕi+1 ) must be contained in the contraction of such minimal prime to R. Then, we can assume that R is complete and that K is algebraically closed by Proposition 3.14. Let R denote R/p, x the class of the element x modulo p, and V the integral closure of R. Since R/p is a one-dimensional complete local domain, by Lemma 4.5 we can choose 0 6= x ∈ R a minimal reduction of m := m/p and q0 = pe0 such that m[q] = (xq ) for q > q0 . We may also choose q0 large enough so that xq V ∩ R ⊆ xR, by using the Artin-Rees Lemma and the fact that the conductor from R to V is primary to the maximal ideal. In particular, / xR, where mV is the maximal ideal of V , (xq V :V r) ⊆ mV for every r ∈ R such that r ∈ which is a DVR. [q] [q] Fix q > q0 and consider the matrix associated to ϕi+1 := ϕi+1 ⊗ 1R . Since q > q0 , [q] Im(ϕi+1 ⊗ 1R ) ⊆ m[q] Gi = (xq )Gi . Because Im(ϕi+1 ) 6⊆ pGi , by changing the basis for Gi+1 if needed, we can assume that the matrix [q] ϕi+1  r1 ∗ . . .  r2 ∗ . . . = xq+j   ... ... rn ∗ . . . ∗ ∗ .. . ∗   ,  where we have factored out the biggest possible power of x, so that r 1 ∈ / (x). Here n = rk(Gi ). [qq ′ ] ′ e′ Let q = p , and consider the matrix associated to ϕi+1 : (4.0.4)   ′  [qq ′ ] ϕi+1 = x(q+j)q   ′ rq1 ∗ . . . ′ rq2 ∗ . . . .. .. . . ′ rqn ∗ . . . ∗ ∗ .. . ∗    .    ′ ′ ′ [qq ′ ] . In fact, we have that We claim that [r q1 , rq2 , . . . , r qn ]T ∈ Ker ϕi   ′ ′  xqq +jq   ′ r1 q ′ r2 q .. . rn q ′        [qq ′ ] [qq ′ ] ;  ∈ Im ϕi+1 ⊆ Ker ϕi  14 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT therefore, [qq ′ ] ϕi ′ ′      qq′ +jq′  · x    ′ r1 q ′ r2 q .. . rn q  ′ r1q ′ r2q .. .   ′ ′  [qq ′ ]   = xqq +jq · ϕi    ′ rn q ′ Since xqq +jq is a nonzero divisor in R, we have   ′ r1q  q′   [qq ′ ]  r 2 ϕi  ..  = 0,  .  ′ rn q which proves the claim. Thus     = 0.    [qq ′ ] q′ q′ T R[r , . . . , r ] + Im ϕ 1 n i+1 e+e′    λ(TorR (R/p))) > λ  i (M, ′ [qq ] Im ϕi+1  ′ > λ (rq1 ) + (xqq ) ′ (xqq ) ′ ! ,   ′ [qq ′ ] [qq ′ ] because Im ϕi+1 ⊆ (xqq )Gi . This comes from the expression of ϕi+1 in (4.0.4). We also have projected onto the first component of Gi . We now have a cyclic module which is ′ ′ isomorphic to the quotient of R by the ideal (xqq : r q1 ). We claim that there exists an integer q1 = pe1 such that for all q ′ , ′ (xqq : r q1 ) ⊆ (xq /q1 ). ′ ′ Assuming the claim and lifting back to R, we get ′ λ(TorR i (M, e+e′ R)) > λ >λ (rq1 ) + (xqq ) ′ (xqq )  ′ R (xq /q1 ) ′  ! . Dividing by qq ′ and taking the limit as e′ → ∞, we get e+e λ(TorR (R))) i (M, = lim ′ e′ →∞ qq ′ 1 λ(R/(xq /q1 )) > lim = eHK (x, R) > 0. ′ ′ e →∞ qq qq1 ′ βiF (M, R) Since dim(R/q) = dim(R) for q ∈ Spec(R) if and only if q ∈ Min(R), we have X  βiF (M, R) = βiF (M, R/q)λ(Rq ) > βiF (M, R/p) > 0. q∈Min(R) FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 15 by Proposition 3.6. ′ ′ ′ ′ It remains to prove the claim. Suppose that u ∈ (xqq : rq1 ). Then u ∈ (xqq : r q1 )V ∩ R = ′ ′ (xq V :V r 1 )[q ] ∩ R ⊆ mqV ∩ R by the choice of q. Since the conductor of R is primary to the ′ ′ maximal ideal it follows that there exists a q1 = pe1 such that mqV ∩ R ⊆ (xq /q1 ) as claimed.  Theorem 4.7. Let (R, m, K) be a one-dimensional local ring of characteristic p > 0, and M be an R-module of finite length. Let (Gj , ϕj )j>0 denote a minimal free resolution of M. Then the following are equivalent: (i) (ii) (iii) (iv) Im(ϕi+1 ) ⊆ Hm0 (Gi ). e TorR i (M, (R/p)) = 0 for all e > 0, for all p ∈ Min(R). e TorR i (M, (R/p)) = 0 for all e ≫ 0, for all p ∈ Min(R). F βi (M, R) = 0. Assume in addition that R is complete and K is algebraically closed. If V denotes the integral closure of R in its ring of fractions, then the conditions above are equivalent to (v) TorR i (M, V ) = 0. Proof. We will show that (i) ⇒ (ii) ⇒ (iii) ⇒ (iv) ⇒ (i). We assume (i). Let p ∈ Min(R). Since M has finite length we have Mp = 0, and thus R p e e TorR j (M, (R/p))p = Torj (Mp , (R/p)p ) = 0 for all j > 0. In particular, the complex [q] e (G• ⊗ (R))p : . . . // (Gi+1 )p (ϕi+1 )p [q] // (Gi )p (ϕi )p // (Gi−1 )p // ... // (G0 )p // 0 is split exact. All the entries in a matrix associated to ϕi+1 are in Hm0 (R), and in particular [q] they are nilpotent. We choose q0 = pe0 such that Im(ϕi+1 ) = 0 for all q > q0 . For such q, we [q] [q] have (ϕi+1 )p ≡ 0; therefore, (Gi )p splits inside (Gi−1 )p via (ϕi )p . This means that (4.0.5) [q] bi := rk((Gi )p ) = rk(Gi ) = rk((ϕi )p ) [q] Ibi (ϕi ) 6⊆ p, and where Ir (ψ) denotes the Fitting ideal of an homomorphism ψ : G → H of rank r between two free modules G and H. Note that localizing and taking powers only decreases the rank of ϕi , [q] and bi is already the maximal possible rank. Thus bi = rk(ϕi ) for all q > 1. Furthermore, [q] if Ibi (ϕi ) was contained in p, then so would be Ibi (ϕi ). Hence (4.0.5) holds in fact for all q = pe . Consider the following complex [q] 0 // Gi ⊗ R/p ϕi ⊗1R/p // Gi−1 ⊗ R/p // Cq // 0, where Cq is the cokernel. By Buchsbaum-Eisenbud Theorem [BE73], the two conditions (4.0.5) ensure that it is acyclic for all q. Then, R e TorR i (M, (R/p)) = Tor1 (Cq , R/p) = 0. for all e > 0. This holds for all p ∈ Min(R), proving (ii). 16 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT Clearly (ii) implies (iii). We now show (iii) ⇒ (iv). Since for all p ∈ Min(R), we have e F TorR i (M, (R/p)) = 0 for e ≫ 0, in particular βi (M, R/p) = 0. Hence X   βiF (M, R) = βiF (M, R/p)λRp (Rp ) = 0. p∈Min(R) We now prove (iv) ⇒ (i). Now suppose that βiF (M, R) = 0. By Lemma 4.6, we have \ √ Im(ϕi+1 ) ⊆ pGi = 0Gi . p∈Min(R) Since the image is nilpotent, as noticed above in (4.0.5) taking q = 1, we have bi = rk(Gi ) = rk(ϕi ) and Ibi (ϕi ) 6⊆ p for all p ∈ Min(R). Localizing the resolution at any p ∈ Min(R) gives a split exact complex (G• )p : 0 // (Gi )p (ϕi )p // ...... // (G0 )p // 0. In particular, Im((ϕi+1 )p ) = (Im(ϕi+1 ))p = 0. This holds for all minimal primes p of R, proving that Im(ϕi+1 ) ⊆ Hm0 (Gi ). Finally, assume that R is complete and K is algebraically closed, and let V be integral closure of R in its ring of fractions. Let p ∈ Min(R) and let V (p) be L the integral e ∼ closure of R/p, which is a DVR. By Lemma 4.5, we have V (p) for all L thatR (R/p) = e ∼ e ≫ 0. Condition (iii) implies that TorR Tor (M, V (p)) = 0, therefore (M, (R/p)) = i i L R ∼ Tori (M, V (p)) = 0 for all p ∈ Min(R). Since V = p∈Min(R) V (p), we see that (iii) implies R (v). Conversely, if TorR i (M, V ) = 0, by the same argument, we get that Tori (M, V (p)) = 0 R implies Tori (M, e(R/p)) = 0 for all e ≫ 0 and for all p ∈ Min(R). Then, (v) implies (iii).  Corollary 4.8. Let (R, m, K) be a one-dimensional Cohen-Macaulay local ring of characteristic p > 0, and M be an R-module of finite length. Then the following are equivalent: (i) βiF (M, R) = 0 for all i > 1. (ii) βiF (M, R) = 0 for some i > 1. (iii) pdR (M) < ∞. Proof. Clearly (i) implies (ii). Now assume (ii), we want to show that (iii) holds. By assumption, there exists an integer i > 1 such that βiF (M, R) = 0. Then, Theorem 4.7 implies that Im(ϕi+1 ) ⊆ Hm0 (Gi ), where (Gj , ϕj )j>0 is a minimal free resolution of M. However, R has positive depth and hence Im(ϕi+1 ) = Hm0 (Im(ϕi+1 )) ⊆ Hm0 (Gi ) = 0, since Gi is a free module. Thus Im(ϕi+1 ) = 0 and pdR (M) < ∞. Finally, if (iii) holds, e we have TorR i (M, R) = 0 for all i > 1 and e > 0 [PS73, Théorème 1.7]. In particular, βiF (M, eR) = 0 for all i > 1.  Corollary 4.9. Let (R, m, K) be a one-dimensional local ring of characteristic p > 0, and F let M be a finite length R-module. If βiF (M, R) = βi+1 (M, R) = 0 for some i > 1, then pdR (M) < ∞. In particular, for any parameter x, if β2F (R/(x), R) = 0 then R is CohenMacaulay. FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 17 Proof. Let (Gj , ϕj )j>0 be a minimal free resolution of M. Since βiF (M, R) = 0, we have that [q] Im(ϕi+1 ) has finite length, and it is nilpotent. Take q = pe ≫ 0 so that Im(ϕi+1 ) = 0. For such q we have Ker(ϕi+1 ) = Gi+1 . Since the resolution is minimal, we get !   G R i+1 R e α α λ(Tori+1 (M, R)) = q λ , >q λ [q] m[q] Im(ϕi+2 ) where the last inequality comes from projecting onto one of the components of Gi+1 . Dividing by q and taking limits, we get e λ(TorR λ(R/m[q] ) i+1 (M, R)) > lim = eHK (m, R) > 0, e→∞ e→∞ q (1+α) q which is a contradiction. The last claim follows from the fact that for any parameter x, we have F βi+1 (M, R) = lim λ(H1 (xq ; R)) 6 lim = 0, e→∞ q where H1 denotes the first Koszul homology (see [Rob87] and [HH93, Theorem 6.2]). β1F (R/(x), R)  Lemma 4.10. Let (R, m, K) be a local ring of positive characteristic p > 0, and p ∈ Spec(R). If pdR (p) < ∞, then R is a domain. Proof. Since p has finite projective dimension, given a minimal free resolution 0 // Lt ψt // ... // L0 // R/p // 0 of R/p over R, we have that [q] 0 // Lt ψt // ... // L0 // R/p[q] // 0 is a minimal free resolution of R/p[q] over R [PS73, Exemples 1.3 d)]. Then AssR (R/p[q] ) = {p}, and so, p[q] is p-primary for all q = pe . Let x ∈ / p and assume xy = 0 for y ∈ R. This [q] implies that for any q, we have xy ∈ p . We conclude that y ∈ p[q] since x ∈ / p. Thus \ y∈ p[q] = (0). q>1 In particular, the localization map R → Rp is injective. We have that pdR (R/p) < ∞ implies pdRp (k(p)) < ∞. Then, Rp is a regular local ring; in particular, a domain. Therefore, R is a domain.  Proposition 4.11. Let (R, m, K) be a one-dimensional local ring of characteristic p > 0, and I be an m-primary integrally closed ideal. If βiF (R/I, R) = 0 for some i > 0, then R is regular. Proof. Let p be a minimal prime of R. Since βiF (R/I, R) = 0, by Theorem 4.7 we have that TorR i (R/I, R/p) = 0. By Proposition 4.3, it follows that pdR (R/p) < ∞, and thus R is a domain by Lemma 4.10. Since one-dimensional local domains are Cohen-Macaulay, by Corollary 4.8 we have that pdR (R/I) < ∞. In particular TorR j (R/I, K) = 0 for j ≫ 0. We conclude that pdR (K) < ∞ because R/I tests finite projective dimension [Bur68, Theorem 5(ii)]. Hence, R is regular.  18 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT 5. Syzygies of finite length We now present several characteristic-free results. In particular, we do not always assume that the rings have positive characteristic. We focus on Question 1.2. Specifically, we give support to the claim that a finite length R-module M of infinite projective dimension cannot have a finite length syzygy Ωi for i > dim(R) + 1. As a consequence of our methods, we describe, in some cases, the dimension of the syzygies. It follows from Theorem 4.7 that if dim(R) = 1 and R has positive characteristic, then a positive answer to Question 1.2 is equivalent to the statement: for every M of finite length, βiF (M, R) = 0 for some i > 1 implies pdR (M) < ∞. We now provide an example that shows that the requirement of i > dim(R)+1 in Question 1.2 is necessary to have a positive answer. Example 5.1. Let R = Fp Jx, yK/(x2 , xy) and M = R/(x). Then dim(R) = 1. In addition, 0 (R) = (x) has pdR (M) = ∞ because R is not Cohen-Macaulay. We have that Ω2 ∼ = H(x,y) finite length. Lemma 5.2. Let (R, m, K) be a local ring and let M be a finite length R-module that has a finite length syzygy Ωi+1 , for some fixed i > 0. Then,  0 TorR i M, R/Hm (R) = 0. If R has positive characteristic p, then for all e > 0 e 0 TorR i M, R/Hm (R)  = 0. Proof. Set H := Hm0 (R). Let (G• , ϕ• ) be a minimal free resolution of M: G• : . . . // ϕi+1 Gi+1 // ϕi Gi // ϕi−1 Gi−1 // Gi−2 // ... // G0 // M // 0. Tensor G• with R/H and denote by G• its residue class modulo H: Gi+1 ϕi+1 // ϕi Gi // Gi−1 Since Im(ϕi+1 ) = Ωi+1 has finite length by assumption, we have ϕi+1 = 0. We want to show that Ker(ϕi ) = 0 as well. For any p ∈ Spec(R) r {m}, the complex (G• )p is split exact: 0 // (Gi )p (ϕi )p // (Gi−1 )p (ϕi−1 )p // (Gi−2 )p // ... // (G0 )p // 0, because M and Ωi+1 have finite length. We have that rk((ϕi )p ) is maximal, because rk(Gi ) 6 rk(Gi−1 ) as the localized complex is split exact, and localizing only decreases the rank of a map. Thus, r := rk(Gi ) = rk((ϕi )p ) = rk(ϕi ). Furthermore, Ir (ϕi ) 6⊆ p, by split exactness. Since this holds for all p ∈ Spec(R) r {m}; in particular, we have depth(Ir (ϕi )) > 1. By the Buchsbaum-Eisenbud Criterion, we have that 0 // Gi ϕi // Gi−1 // Ωi−1 = Ωi−1 /HΩi−1 // 0. is an exact complex. Therefore Ker(ϕi ) = 0, and hence TorR i (M, R/H) = 0. For the second part of the Lemma, when R has positive characteristic, the argument is the same: just notice that the complex e(G• )p is again split exact for all primes p 6= m and apply the same [q] argument as above to the map ϕi .  FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 19 We now give results that support an affirmative answer to Question 1.2 for one-dimensional rings. Over Buchsbaum rings, the modules Hmi (R) are K-vector spaces for i < dim(R). Because of this fact, we can prove the following proposition using Lemma 5.2. Proposition 5.3. Let (R, m, K) be a one-dimensional Buchsbaum ring. Then the answer to Question 1.2 is positive. Proof. Assume that there exists a finite length R-module M such that Ωi+1 (M) has finite length for some i > 2. By Lemma 5.2, we have   0 R 0 ∼ 0 = TorR i M, R/Hm (R) = Tori−1 M, Hm (R) , Lt where i − 1 > 1 for dimension shifting. By Remark 2.5, we have that Hm0 (R) ∼ = j=1 K. Therefore, t  M 0 0 = TorR M, H (R) = TorR i−1 m i−1 (M, K) , j=1 TorR i−1 (M, K) which implies = 0. Hence, pdR (M) 6 i − 2.  We now present two results about the dimension of syzygies of a finite-length module. These results will be used in Proposition 5.7 to give a case in which a finite-length module cannot have infinitely many syzygies of finite length. Proposition 5.4. Let (R, m, K) be a local ring of dimension d and let M be a finite length R-module. Let i > 1 and let Ωi be the i-th syzygy of M. Then either dim(Ωi ) = d or Ωi has finite length. Proof. By way of contradiction, we suppose dim(Ωi ) = k with 0 < k < d. Let G• → M → 0 be a minimal free resolution of M. By our assumption on dim(Ωi ), we can choose p ∈ Min(ann(Ωi )) r ({m} ∪ Min(R)) and localize G• at p. The resulting complex is split exact, because Mp = 0. In particular, (Ωi )p is a free Rp -module. By our choice of p, we have that (Ωi )p has finite length, and dim(Rp ) > 0, a contradiction.  Proposition 5.5. Let (R, m, K) be a local ring of positive dimension. Suppose there exists an R-module M of infinite projective dimension and finite length which has a finite length syzygy Ωi+1 , for some fixed i > 0. If βi (M) > βi−1 (M), then Ωi−1 has finite length as well and R is one-dimensional. Proof. Let (G• , ϕ• ) be a minimal free resolution of M: ϕi+1 G• : Gi+1 ◗◗◗ ◗◗(( (( Ωi+1 // Rβi (M ) ▼▼▼ ♦77 ♦ ▼▼▼&& ♦ * ♦♦ && ϕi Ωi // Rβi−1 (M ) PPP ♦♦77 PPP(( ♦ (( * ♦♦♦ ϕi−1 Ωi−1 // G 88 i−2 q q + qq // ... // G0 // M // 0. Let p ∈ Spec(R) r {m}. We localize G• at p. Since both M and Ωi+1 have finite length, we have a split exact sequence G• : 0 // β (M ) Rp i ◆◆◆ ◆ ∼ '' = (Ωi )p // Rpβi−1 (M ) ◗◗◗ ♥77 ◗(( (( ) ♥♥♥♥ // (Gi−2 )p // ... // (G0 )p // 0 (Ωi−1 )p . In particular, this implies βi (M) 6 βi−1 (M). Since the opposite inequality holds by or assumption, we have equality. Set β = βi (M) = βi−1 (M). From the split exact sequence 20 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT above, we also get that Rpβ ∼ = (Ωi )p ; therefore, (Ωi−1 )p = 0. Since p is an arbitrary prime in Spec(R) r {m}, we have that Ωi−1 has finite length. Thus, we have a free complex 0 → F1 = Rβ → F0 = Rβ → 0 with finite length homology. We conclude that R has dimension one by the New Intersection Theorem [Rob87].  Remark 5.6. If in Proposition 5.5 one assumes that the sequence of Betti numbers {βi (M)} is non-decreasing, then one can repeat the argument above to show that i is necessarily odd, and βi (M) = βi−1 (M), βi−2 (M) = βi−3 (M), . . ., β1 (M) = β0 (M). In addition, Ωj (M) has finite length for all j even, 0 6 j 6 i + 1. In particular, the typical situation to study would be (R, m, K) a one-dimensional ring and a resolution 0 // Ω4 // Rβ // Rβ ❏❏ ❏❏ $$ Ω2 // Rα :: t ttt // Rα // M // 0 with Ω4 and Ω2 of finite length. As a consequence of these results, we give a partial answer to Question 1.2 in the case where M has eventually non-decreasing Betti numbers. It is a conjecture of Avramov that every finitely generated module over a local ring has eventually non-decreasing Betti numbers [Avr84]. The conjecture is know to be true in several cases [Eis80, Les90, Cho90, Sun94, AGP97, Sun98], in particular, for Golod rings [Les90, Corollaire 6.5]. Proposition 5.7. Let (R, m, K) be a local ring and let M be a finite length R-module of infinite projective dimension with eventually non-decreasing Betti numbers. Then, for all i ≫ 0, there exists p ∈ Min(R) such that dim(Ωi ) = dim(R/p). In particular, M cannot have arbitrarily high syzygies of finite length. Proof. If Supp(Ωi ) ∩ Min(R) 6= ∅ for all i ≫ 0 then we are done. By way of contradiction, assume that there exist infinitely many syzygies Ωi of M such that Supp(Ωi ) ∩ Min(R) = ∅. Notice that, by Proposition 5.4, such syzygies must have finite length. By replacing M with a high enough syzygy, we can then assume that M is a module of finite length with nondecreasing Betti numbers, and with infinitely many syzygies of finite length. We have that R is one-dimensional by Proposition 5.5. Furthermore, by Remark 5.6, we have β2i = β2i+1 for all i > 0. For i > 0 consider the short exact sequence 0 // Ω2i+2 // Rβ ϕ // Rβ // Ω2i // 0, where β := β2i = β2i+1 . Let S := R[ϕ]. Then Rβ becomes an S-module. The exact sequence above shows that Ω2i ∼ = (0 :Rβ ϕ). Then, by [SH06, Proposition = Rβ ⊗S S/(ϕ) and Ω2i+2 ∼ 11.1.9 (2)], λ(Ω2i ) − λ(Ω2i+2 ) = e(ϕ; Rβ ), where e(ϕ; −) denotes the Hilbert-Samuel multiplicity with respect to the ideal (ϕ) in S. Since such multiplicity is always positive, we have that λ(Ω2i+2 ) < λ(Ω2i ), for all i > 0. Since there cannot be an infinite strictly decreasing sequence of such lengths, we obtain a contradiction.  Remark 5.8. Proposition 5.7 also follows from [BL13, Theorem 8], and it gives another proof of the fact that, when M is a module of finite length with eventually non-decreasing Betti numbers and R is equidimensional, then the sequence of integers {dim(Ωi )}∞ i=0 is constant for i ≫ 0 (see [BL13, Corollary 2]). FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 21 Proposition 5.9. Let (R, m, K) be a one-dimensional local ring. Suppose that there exists a finite length module M of infinite projective dimension that has a finite length syzygy Ωi+1 , for some fixed i > 2. Then λ(Ωi+1 ) = i X (−1)i−j+1 λ(TorR j (M, R/(x))), j=0 where x is a suitable parameter. Proof. Consider a minimal free resolution of M: G• : ... // Gi+1 ◆ ◆◆◆ '' // G r99 i ■■■ ■$$ rrr Ωi+1 Ωi // Gi−1 r99 r r r ... // G1 ■ ■■■ $$ // // G0 ✉:: ✉ ✉ ✉ Ω1 // M // 0. For all j = 1, . . . , i + 1, we break it into short exact sequences: 0 // Ωj // Gj−1 // Ωj−1 // 0, where Ω0 := M. These give two exact sequences: 0 Ωi+1 // Hm0 (Gi ) // // Hm0 (Ωi ) // 0 and 0 // Hm0 (Ωj ) // Hm0 (Gj−1 ) // Hm0 (Ωj−1 ). The first short exact sequence comes from the fact that Ωi+1 has finite length, and so, Hm1 (Ωi+1 ) = 0. Furthermore, the cokernel of the rightmost map in the second exact sequence, which can be proved to be the kernel of the leftmost map in Ωj ⊗R Hm1 (R) // Gj−1 ⊗R Hm1 (R) // Ωj−1 ⊗R Hm1 (R) // 0 1 0 0 is then TorR 1 (Ωj−1 , Hm (R)). For simplicity, we denote ωj := λ(Hm (Ωj )), gj := λ(Hm (Gj )) 1 and αj := λ(TorR 1 (Ωj , H (R))). Then, we have relations ωi+1 = gi − ωi ωi = gi−1 − ωi−1 + αi−1 .. . ω2 ω1 = g 1 − ω 1 + α1 = g0 − λ(M) + λ(Tor1 (M, Hm1 (R))). After localizing the resolution G• at any minimal prime p, since (Ωi+1 )p = 0, we obtain that Pi Pi j j 0 j=0 (−1) βj (M) = 0. Then, j=0 (−1) gj = 0 because gj = βj (M) · λ(Hm (R)). Therefore, ωi+1 = λ(Ωi+1 ) = i−1 X (−1)i−j αj + (−1)i λ(Tor1 (M, H 1 (R))) + (−1)i−1 λ(M). j=1 Choose a parameter x such that Hm0 (R) = 0 :R x, as in Remark 2.4. By similar considerations we can also assume that xM = 0. From this choice, we have that xHm0 (Ωj ) = 0 for all j = 0, . . . , i + 1, because Ωj ⊆ Gj−1 is a free R-module. Since the Tor modules can be computed using flat resolutions, we have an exact sequence 0 // Hm0 (R) // R // Rx // Hm1 (R) // 0. 22 ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT We complete on the left to get a flat resolution of Hm1 (R): ... // 0 Rµ(Hm (R)) // R ❖❖❖ // ♦77 Rx ♦ ♦ ♦♦ ❖❖❖ '' // Hm1 (R) // 0 R/Hm0 (R) By our choice of x, we have that a free resolution of R/x starts as ... // 0 Rµ(Hm (R)) R // // R // R/(x) 0. // For all j = 1, . . . , i − 1, we obtain R R 1 ∼ ∼ TorR 1 (Ωj , Hm (R)) = Tor1 (Ωj , R/(x)) = Torj+1 (M, R/(x)), where the last isomorphism comes from dimension shifting. In addition, TorR (M, H 1 (R)) ∼ = TorR (M, R/(x)). 1 Finally, since xHm0 (Ω0 ) 1 m = xM = 0, we get M∼ = TorR = M/xM ∼ 0 (M, R/(x)), and the proposition then follows.  Corollary 5.10. Let (R, m, K) be a one-dimensional ring, and let M be a finite length module of infinite projective dimension. Then λ(Ω1 ) = λ(Ω3 ) = ∞. Proof. Note that λ(Ω1 ) = ∞ ; otherwise, we would have a short exact sequence 0 // Ω1 G0 // // M // 0 in which both Ω1 and M have finite length. This cannot happen because G0 6= 0 is free and dim(R) = 1. Now let us assume by way of contradiction that λ(Ω3 ) < ∞. Let (G• , ϕ• ) be a minimal free resolution of M: 0 // Ω3 // G2 ϕ2 // ϕ1 G1 // G0 // M // 0 Let x ∈ R be a parameter such that xM = xHm0 (R) = 0. Consider the short exact sequence 0 // (x) // R // R/(x) // 0. By our choice of x we have 0 :R x = Hm0 (R), hence (x) ∼ = R/Hm0 (R). After tensoring the sequence with M, we obtain that 0 // TorR 1 (M, R/(x)) // M/Hm0 (R)M // M // M/xM // 0. Since xM = 0, we obtain 0 λ(TorR 1 (M, R/(x))) = λ(M/Hm (R)M). Then, by Proposition 5.9 we have R λ(Ω3 ) = −λ(TorR 2 (M, R/(x))) + λ(Tor1 (M, R/(x))) − λ(M) 6 λ(TorR 1 (M, R/(x))) − λ(M) = λ(M/Hm0 (R)M) − λ(M) 6 0, which gives a contradiction since Ω3 6= 0, because M has infinite projective dimension.  FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION 23 The following example is due to the second author, and it is taken from [BL13]. It shows the assumption that M has finite length is needed in Corollary 5.10. Example 5.11. Let S = Q[x, y, z, u, v] and let I ⊆ S be the ideal I = (x2 , xz, z 2 , xu, zv, u2 , v 2 , zu + xv + uv, yu, yv, yx − zu, yz − xv). Let R = S/I, which is a one-dimensional ring of depth 0. In this case y is a parameter, 0 :R y = (u, v, z 2 ) and (y) = 0 :R (0 :R y). Let M be the cokernel of the rightmost map in the following exact complex  u  v  z2  R 3 [u v z2 ] y R3 . Then M is a one-dimensional module with first and third syzygies Ω1 ∼ = = R/(y) and Ω3 ∼ 0 :R y. These are both modules of finite length since y is a parameter. ... // // R // R // Acknowledgments The second author thanks the National Science Foundation for support through Grant DMS-1259142. The third author thanks the National Council of Science and Technology of Mexico (CONACYT) for support through Grant #207063. We thank the referee for helpful comments and suggestions. References [AE08] Ian M. Aberbach and Florian Enescu. Lower bounds for Hilbert-Kunz multiplicities in local rings of fixed dimension. Michigan Math. J., 57:1–16, 2008. Special volume in honor of Melvin Hochster. 1 [AGP97] Luchezar L. Avramov, Vesselin N. Gasharov, and Irena V. Peeva. Complete intersection dimension. Inst. Hautes Études Sci. Publ. Math., (86):67–114 (1998), 1997. 20 [AL03] Ian M. Aberbach and Graham J. Leuschke. The F -signature and strong F -regularity. Math. Res. Lett., 10(1):51–56, 2003. 5 [AL08] Ian M. Aberbach and Jinjia Li. Asymptotic vanishing conditions which force regularity in local rings of prime characteristic. Math. Res. Lett., 15(4):815–820, 2008. 2, 10 [Avr84] Luchezar L. Avramov. Local algebra and rational homotopy. In Algebraic homotopy and local algebra (Luminy, 1982), volume 113 of Astérisque, pages 15–43. Soc. Math. France, Paris, 1984. 20 [BE73] David A. Buchsbaum and David Eisenbud. What makes a complex exact? J. Algebra, 25:259–268, 1973. 15 [BE04] Manuel Blickle and Florian Enescu. On rings with small Hilbert-Kunz multiplicity. Proc. Amer. Math. Soc., 132(9):2505–2509 (electronic), 2004. 1 [BL13] Kristen A. Beck and Micah J. Leamer. Asymptotic behavior of dimensions of syzygies. Proc. Amer. Math. Soc., 141(7):2245–2252, 2013. 20, 23 [Bur68] Lindsay Burch. On ideals of finite homological dimension in local rings. Proc. Cambridge Philos. Soc., 64:941–948, 1968. 17 [Cha97] Shou-Te Chang. Hilbert-Kunz functions and Frobenius functors. Trans. Amer. Math. Soc., 349(3):1091–1119, 1997. 7, 9 [CHKV06] Alberto Corso, Craig Huneke, Daniel Katz, and Wolmer V. Vasconcelos. Integral closure of ideals and annihilators of homology. In Commutative algebra, volume 244 of Lect. Notes Pure Appl. Math., pages 33–48. Chapman & Hall/CRC, Boca Raton, FL, 2006. 12 [Cho90] Sangki Choi. Betti numbers and the integral closure of ideals. Math. Scand., 66(2):173–184, 1990. 20 24 [DS13] [Eis80] [Har66] [Her74] [HH93] [KL98] [Kun69] [Kun76] [Les90] [Li08] [Mil00] [Mil03] [Mon83] [PS73] [Rob80] [Rob87] [Sei89] [SH06] [Sun94] [Sun98] [Tuc12] [WY00] [Yao05] ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT Hailong Dao and Ilya Smirnov. On generalized hilbert-kunz function and multiplicity. Preprint, arXiv:1305.1833 [math.AC]., 2013. 2, 10 David Eisenbud. Homological algebra on a complete intersection, with an application to group representations. Trans. Amer. Math. Soc., 260(1):35–64, 1980. 5, 20 Robin Hartshorne. Residues and duality. Lecture notes of a seminar on the work of A. Grothendieck, given at Harvard 1963/64. With an appendix by P. Deligne. Lecture Notes in Mathematics, No. 20. Springer-Verlag, Berlin-New York, 1966. 4 Jürgen Herzog. Ringe der Charakteristik p und Frobeniusfunktoren. Math. Z., 140:67–78, 1974. 10 Melvin Hochster and Craig Huneke. Phantom homology. Mem. Amer. Math. Soc., 103(490):vi+91, 1993. 17 Jee Koh and Kisuk Lee. Some restrictions on the maps in minimal resolutions. J. Algebra, 202(2):671–689, 1998. 10, 11 Ernst Kunz. Characterizations of regular local rings for characteristic p. Amer. J. Math., 91:772– 784, 1969. 12 Ernst Kunz. On Noetherian rings of characteristic p. Amer. J. Math., 98(4):999–1013, 1976. 4 Jack Lescot. Séries de Poincaré et modules inertes. J. Algebra, 132(1):22–49, 1990. 20 Jinjia Li. Characterizations of regular local rings in positive characteristics. Proc. Amer. Math. Soc., 136(5):1553–1558, 2008. 5 Claudia Miller. A Frobenius characterization of finite projective dimension over complete intersections. Math. Z., 233(1):127–136, 2000. 2, 10 Claudia Miller. The Frobenius endomorphism and homological dimensions. In Commutative algebra (Grenoble/Lyon, 2001), volume 331 of Contemp. Math., pages 207–234. Amer. Math. Soc., Providence, RI, 2003. 10, 11 P. Monsky. The Hilbert-Kunz function. Math. Ann., 263(1):43–49, 1983. 1 C. Peskine and L. Szpiro. Dimension projective finie et cohomologie locale. Applications à la démonstration de conjectures de M. Auslander, H. Bass et A. Grothendieck. Inst. Hautes Études Sci. Publ. Math., (42):47–119, 1973. 10, 16, 17 Paul Roberts. Homological invariants of modules over commutative rings, volume 72 of Séminaire de Mathématiques Supérieures [Seminar on Higher Mathematics]. Presses de l’Université de Montréal, Montreal, Que., 1980. 4 Paul Roberts. Le théorème d’intersection. C. R. Acad. Sci. Paris Sér. I Math., 304(7):177–180, 1987. 17, 20 Gerhard Seibert. Complexes with homology of finite length and Frobenius functors. J. Algebra, 125(2):278–287, 1989. 5, 6, 7 Irena Swanson and Craig Huneke. Integral closure of ideals, rings, and modules, volume 336 of London Mathematical Society Lecture Note Series. Cambridge University Press, Cambridge, 2006. 3, 12, 20 Li-Chuan Sun. Growth of Betti numbers of modules over local rings of small embedding codimension or small linkage number. J. Pure Appl. Algebra, 96(1):57–71, 1994. 20 Li-Chuan Sun. Growth of Betti numbers of modules over generalized Golod rings. J. Algebra, 199(1):88–93, 1998. 20 Kevin Tucker. F -signature exists. Invent. Math., 190(3):743–765, 2012. 5 Kei-ichi Watanabe and Ken-ichi Yoshida. Hilbert-Kunz multiplicity and an inequality between multiplicity and colength. J. Algebra, 230(1):295–317, 2000. 1 Yongwei Yao. Modules with finite F -representation type. J. London Math. Soc. (2), 72(1):53–72, 2005. 9, 12 Department of Mathematics, University of Virginia, Charlottesville, VA 22903 Email address: [email protected] Department of Mathematics, University of Virginia, Charlottesville, VA 22903 Email address: [email protected] FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION Department of Mathematics, University of Virginia, Charlottesville, VA 22903 Email address: [email protected] 25
0math.AC
Marmara Turkish Coreference Corpus and Coreference Resolution Baseline Peter Schüller, Kübra Cingilli, Ferit Tunçer, Barış Gün Sürmeli, Ayşegül Pekel, Ayşe Hande Karatay, arXiv:1706.01863v1 [cs.CL] 6 Jun 2017 Marmara University, Faculty of Engineering Istanbul, Turkey [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] Hacer Ezgi Karakaş Sabanci University Faculty of Engineering and Natural Science Istanbul, Turkey [email protected] Version 1, June 7, 2017 Technical Report: manuscript submitted to Natural Language Engineering by Cambridge University Press http://journals.cambridge.org/nle Abstract We describe the Marmara Turkish Coreference Corpus, which is an annotation of the whole METU-Sabanci Turkish Treebank with mentions and coreference chains. Collecting nine or more independent annotations for each document allowed for fully automatic adjudication. We provide a baseline system for Turkish mention detection and coreference resolution and evaluate it on the corpus. 1 Introduction Coreference Resolution is the task of identifying groups of phrases in a text that refer to the same discourse entity. Such referring phrases are called mentions, a set of mentions that all refer to the same discourse entity is called a chain. Annotated corpora are important resources for developing and evaluating automatic coreference resolution methods. Turkish is an agglutinative language and Turkish coreference resolution poses several challenges different from many other languages, in particular the absence of grammatical gender, the possibility of null pronouns in subject and object position, possessive pronouns that can be expressed as suffixes, and ambiguities among possessive and number morphemes, e.g., ‘çocukları’ can be analyzed as ‘their children’ or as ‘his/her children’, depending on context (Oflazer and Bozşahin, 1994). No coreference resolution corpus exists for Turkish so far. We here describe the result of an effort to create such a corpus based on the METU-Sabanci Turkish Treebank (Atalay et al., 2003; Oflazer 1 et al., 2003; Say et al., 2004), which is, to the best of our knowledge, the only publicly available Turkish Treebank. Our contributions are as follows. • We describe two stages of annotation: in Phase I, annotators created mentions and chains, which did not yield sufficient inter-annotator agreement. In Phase II, mentions were given to annotators who created only chains. We collected on average more than ten independent annotations per document for each document in the METU-Sabanci Turkish Treebank. • We describe annotator profiles and adjudication, which was done semi-automatically in Phase I and fully automatically in Phase II. We describe the principles of our automatic adjudication tool which uses a voting-like approach. Such an automatic approach is possible because we collected enough (on average 10) annotations per document. • We describe the XML format used to address documents, sentences, and tokens in the METUSabanci Turkish Treebank. We provide a public version of the corpus as XML, including tools to convert the corpus to CoNLL format. (For licensing reasons we cannot re-publish the Turkish Treebank data.) • We describe and provide a baseline method for mention detection and coreference resolution, compatible with the format of the corpus. We evaluate this baseline method on the corpus with leave-one-out cross-validation. Section 2 gives preliminaries of Coreference Resolution and the Turkish language and describes related work. Section 3 explains the annotation and adjudication process and discusses properties of the corpus, annotator profiles, and supporting tools. Section 4 describes the baseline system and its evaluation on the corpus. Section 5 concludes and gives an outlook on future work. We provide the Marmara Turkish Coreference Corpus, tools, and the baseline system, at https://bitbucket.org/knowlp/marmara-turkish-coreference-corpus . 2 Preliminaries and Related Work Next we give background and related work on coreference resolution, the Turkish language, and specific challenges of coreference resolution in Turkish. 2.1 Coreference Resolution Coreference resolution is the task of marking noun phrases that refer to the same discourse entity as coreferent. Mention detection, which identifies such noun phrases, is usually included in that task. Coreference resolution is not limited to resolving pronouns: in computer linguistics it was first introduced as a benchmark for deep semantic understanding of text in the message understanding conference series (Grishman and Sundheim, 1995) and later continued in the Automatic Content Extraction (ACE) program (Doddington et al., 2004) which required English coreference resolution as foundation for all tasks of years 2000–2004. The SemEval competition series followed ACE and featured the first multilingual coreference resolution challenge in 2010 (Recasens et al., 2010). Connected to that is the freely available, large, and multilingual OntoNotes (Hovy et al., 2006) corpus, which was used in the multilingual coreference task in SemEval 2012 (Pradhan et al., 2012) and contains coreference annotations for English, Arabic, and Mandarin (Pradhan et al., 2007). Coreference resolution has been surveyed by Ng (2010). Approaches are manifold and include machine-learning-based approaches, rule-based systems, and combinations of both. In most machinelearning approaches, equivalence relations of chains (sometimes called clusters) are assembled from predictions of the relatedness of pairs of mentions (mention-mention links). The earliest machine-learning approach is due to Soon et al. (2001), methods for building chains from link predictions include local greedy heuristics as done by Bengtson and Roth (2008) or Stoyanov and Eisner (2012), global optimization formulations such as relaxation labeling (Sapena et al., 2012) or ranking with ILP or Markov Logic (Culotta et al., 2007; Denis and Baldridge, 2009), and representations of trees of mention-mention links (Chang et al., 2013; Fernandes et al., 2012). The first rule-based algorithm for anaphora resolution 2 was done by Hobbs (1978). More recent rule-based systems merge chains based on several sets of rules in a multi-stage filtering approach (Lee et al., 2013), moreover there are hybrid systems combining rules and machine learning such as the one by Chen and Ng (2012). Other approaches use curated or distributed knowledge sources such as WordNet, Google distance, and Wikipedia (Poesio et al., 2004; Zheng et al., 2013). Note that anaphora resolution (Hirst, 1981; Mitkov, 2002) is a problem orthogonal to coreference resolution (van Deemter and Kibble, 2000), because anaphora resolution focuses on referring expressions that point to previous expressions in the text. Cataphora (pointing to later occurrences in the text) are exluded. On the other hand, different from most works on coreference, anaphora resolution includes bound pronouns that do not refer to concrete entities because they are quantified using, e.g., ‘some’ or ‘none’. 2.2 Turkish Turkish is a member of the family of Altaic languages, it is an agglutinative language where suffixes are attached to a root word. Derivational and inflectional suffixes are very productive (Oflazer, 1993; Oflazer et al., 1994) and are subject to vowel harmony from the root word. Morphological analysis is challenging due to ambiguities between different types of suffixes, for example ‘izin’ can mean ‘your trace’ (iz+P2Sg+Nom), ‘trace’ (iz+Pnon+Gen), or ‘permission’ (izin+Pnon+Nom) (Hakkani-Tür et al., 2002). The METU-Sabanci Turkish Treebank (in the following just called Turkish Treebank) (Atalay et al., 2003; Oflazer et al., 2003; Say et al., 2004) contains a subset of the METU Turkish Corpus (Say et al., 2004) in tokenized form. Each token is analyzed morphologically and split into inflectional groups (IGs). Sentences are annotated with dependency parse information, where dependencies point to specific IGs within tokens. The Turkish Treebank splits tokens into IGs on derivational boundaries, for example, ‘evimdekiler’ (those in my house) is analyzed (Oflazer et al., 2003) as ev+Noun+A3sg+P1sg+Loc^DB+Adj^DB+Noun+Zero+A3pl+Pnon+Nom where ^DB indicates derivation boundaries and the token consists of three IGs ‘evimde’ (in my house), ‘ki’ (adjectivization), and ‘ler’ (nominalization+plural). A CoNLL format that provides a CoNLL token corresponding to each IG of a token has been created for Turkish dependency parsing (Buchholz and Marsi, 2006). Named entities in the Turkish Treebank are not marked specially, but multi-word named entities are represented as single tokens. Turkish Coreference Resolution. The following properties of Turkish are in particular relevant for coreference resolution. In the above example, ‘those in my house’ as well as ‘my house’ as well as ‘my’ could be coreferent with mentions in the document. However, neither ‘my house’ nor ‘my’ is available as a separate unit of analysis: both are parts of the first IG (‘evimde’). Gender is not marked in Turkish with the exception of honorifics ‘Bey’ and ‘Hanım’ which corresponds to English ‘Mr’ and ‘Mrs’. Moreover several common first names apply to both genders. Hence gender-based syntactic compatibility checks for mentions are only possible in some cases. Personal pronoun subjects in Turkish are usually realized as suffixes of the verb, e.g., ‘gidiyoruz’ (we are going) and ‘gidiyorlar’ (they are going) but they can also be realized explicitly as in ‘biz gidiyoruz’, depending on discourse conditions (Turan, 1996). Suffixes of proper nouns in written Turkish are systematically separated from the proper nouns using a single quote, e.g., ‘Türkiye’den’ (from Turkey) and ‘Türkiye’deki’ (the thing in Turkey). This systematic rule simplifies finding equal proper noun mentions in coreference resolution for Turkish. Most works about referring expressions in Turkish focus on anaphora resolution and not on full coreference resolution. One exception is the work of Küçük and Yazıcı (2008) on political news texts extracted from videos: they focus on Gazetteers for extracting mentions (without considering general NPs or syntactic information), provide a rule-based heuristic based on recency for creating coreference chains, and evaluate their approach on three documents (which are not part of the Turkish Treebank). In the following we describe work on Turkish anaphora resolution, which is related to coreference resolution. 3 METU-Sabanci Turkish Treebank (1960 text fragments) Phase I Treebank documents (33 documents) 21 documents GATE annotation 12 documents Mention annotation Semi-automatic adjudication Phase II Mention candidates (for 33 documents) Annotation of chains (339 annotations) Automatic adjudication Marmara Turkish Coreference Corpus Figure 1: Annotation process visualisation Turkish Anaphora Resolution. Erkan and Akman (1998) describe an implementation of pronoun anaphora resolution in a framework for situation theory which is based on knowledge representation and logical reasoning. Hobb’s naïve pronoun resolution algorithm (Hobbs, 1978) was realized for Turkish and tested on 10 toy sentences (Tüfekçi and Kılıçaslan, 2007). Centering theory (Grosz et al., 1995) is the foundation of several works on Turkish pronouns. Turan (1996) performed a study about discourse conditions for referring vs. nonreferring expressions and null vs. overt pronouns, and evaluated the theory on 2500 annotated tokens. Yüksel and Bozsahin (2002) created a system for generating referring expressions that was tested on a machine translation task. Furthermore, there is a theoretical model of anaphora resolution based on centering theory by Yıldırım et al. (2004). Küçük and Yöndem (2007) described a system for finding and resolving Turkish pronominal anaphora and annotated 12266 anaphor candidate instances in the METU Turkish Corpus to evaluate their candidate extractor and decision tree learner for anaphora resolution. Kılıçaslan et al. (2009) performed a comprehensive study on pronoun resolution and evaluated various machine learning methods for resolving overt and null pronouns in a corpus of 20 children stories. 3 Marmara Turkish Coreference Corpus We next describe the annotation and adjudication process including formal adjudication criteria, key properties of the resulting corpus, and supporting tools. 3.1 Annotation Process Figure 1 visualizes the process that led to the final corpus. Annotations were collected in two phases: Phase I took place in October–December 2015 and Phase II during October–December 2016. Annotations were collected from computer engineering students participating in a lecture on natural language processing, after educating them in basic linguistic analysis and coreference resolution. To achieve reasonable annotation quality, we aimed to keep annotation simple and therefore based it on few principles and examples. We designed an annotation manual (Sürmeli et al., 2016) for marking coreference according to the following principles: • all concrete entities that are mentioned more than once shall be annotated, • mentions shall be marked as the biggest possible span of tokens that describes the entity, • lists shall not be annotated (elements of lists can be annotated), and 4 Genre Doc # sum News Short Story Novel Essay Research Monogr. Article Travel Other Overall Ann # avg IAA1 % avg IAA2 % avg Tok # avg CM # avg AM # avg AC # avg Ph1 # sum 9 8 7 2 2 3 1 1 10.2 10.1 10.4 9.5 10.5 10.7 11.0 10.0 87 64 67 85 72 90 79 62 94 84 87 93 89 96 92 83 1324 1540 1798 2058 2020 1506 2142 2284 139 170 183 92 182 121 178 301 126 164 176 87 179 120 173 275 35 23 22 28 27 32 44 44 2 5 5 2 2 3 1 1 33 10.3 76 90 1634 160 152 29 21 Table 1: Key metrics about corpus and inter-annotator agreement per genre and overall. Doc is the number of documents, Ann the number of annotations received, IAA1 and IAA2 are inter-annotator agreements, Tok and CM indicate the number of tokens and given mentions, AM and AC show the number of received mentions and chains, and Ph1 indicates how many documents were annotated in both annotation phases. Columns Doc through CM and Ph1 are accumulated over documents, while AM and AC are accumulated over annotations. • predications shall not be annotated. Note that, by marking mentions as the biggest spans, mentions and potentially available appositives are annotated as single mentions, which is different from OntoNotes where appositives are a special type of coreference annotation. We do not mark predications because they are a different type of coreference as argued by van Deemter and Kibble (2000). In Phase I, annotations were created by 19 annotators with the GATE (Cunningham et al., 2013; Gaizauskas et al., 1996) coreference annotation tool. This yielded on average 6.5 annotations per document for 21 documents in the Treebank. Adjudication of these documents was done semi-automatically (see Sections 3.2 and 3.4). However, due to low inter-annotator agreement about mention boundaries, decisions often depended on the adjudicator. Therefore, in order to make the setting simpler, we decided to collect more annotations with given mentions. We used the list of mentions resulting from the adjudicated documents of Phase I. Mentions for those 12 documents that were not annotated in Phase I were manually created in a collaboration of two annotators for each document. In Phase II, 46 annotators were given CoNLL files with token and coreference columns where each mention was given in its own chain. Annotators created files with equalities between chain IDs and uploaded these files to a web service where they were checked for syntactical correctness. The submission file format is described in (Sürmeli et al., 2016). Phase II yielded 339 individual annotations of sufficient inter-annotator agreement to perform fully automatic adjudication (see next section). This method of collecting annotation as text files might seem archaic, however, in practice, annotators were more comfortable with such a system than with the graphical user interface of GATE in Phase I. We were not able to use the BRAT (Stenetorp et al., 2012) annotation tool, because of difficulties representing sentence and word addresses in a way that they can be extracted from annotations. 3.2 Adjudication Table 1 shows key properties of the annotated corpus including inter-annotator agreement. Statistics are accumulated per genre as well as over the whole corpus. Coreference IAA scores IAA1 and IAA2 are calculated as described in (Passonneau, 2004) and (Passonneau et al., 2006), respectively. IAA1 is an adaption of Krippendorff α (Krippendorff, 1980) where a pair of chains gets a score of 1 for a perfect match, 32 if one chain is a subset of the other one, 31 if they are intersecting, and 0 otherwise. (Krippendorff α assigns 1 for a perfect match and 0 in all other cases.) IAA2 uses Jaccard distance instead of fixed scores for the above cases, which provides more realistic results if chains have heterogeneous sizes. (This is often the case in coreference corpora.) Over all documents, IAA1 is 76% and IAA2 is 90%. We observe 5 worse IAA for genres that are based on writing as an art form, i.e., for short stories, novels, and the Other genre (a first-person narrative). The amount of annotations per document, combined with the observed IAA, allows us to automatically adjudicate the corpus. This is different from other coreference annotations, in particular in OntoNotes, where two annotators created annotations followed by adjudication done by a single human expert (Weischedel et al., 2012). Automatic adjudication is based on combinatorial optimization, where we search for a solution of chains that has overall minimal divergence from all annotator inputs. Divergence is measured in terms of mention-mention links given and omitted by annotators. Formally, given a set M of mentions in a document, a chain is a subset of these mentions, and k annotators produce annotations (sets of chains that are nonintersecting) A1 , . . . , Ak over M . A solution G is also a set of chains over M and we search for G such that the following objective becomes minimal: X 2 · a(m, m0 , Ai ) · na(m, m0 , G) + na(m, m0 , Ai ) · a(m, m0 , G) (1) m,m0 ∈ M i ∈ {1,...,k} where a(· · · ) is an indicator function for mentions in the same chain within an annotation A, formally  1 if there is a chain C ∈ A with {m, m0 } ⊆ C 0 a(m, m , A) = 0 otherwise and na(· · · ) is an indicator for mention pairs that are not in the same chain in an annotation A: na(m1 , m2 , A) = 1 − a(m1 , m2 , A). Objective (1) incurs a cost of 2j for each mention pair that is not in the same chain in the solution G contrary to the opinion of j annotators. Moreover, (1) incurs a cost of l for each mention-pair that is in the same chain in G contrary to the opinion of l annotators. This makes optimal solutions ignore as little as possible information from annotators. The coefficient 2 has the effect, that not annotating a mention to be in some chain has less weight than annotating a mention as part of some chain. We introduced this preference into the objective, because not annotating some mention can be due to an oversight, while putting a mention into a chain is more likely done intentionally. Note that, if annotators produce different sets of mentions, we can build M from the union of all mentions produced by annotators with unused mentions becoming singleton partitions. We describe practical issues of our adjudication tool in Section 3.4. 3.3 Corpus Properties and Annotator Profiles Table 1 shows key properties of the annotated corpus, accumulated over genres and overall figures. Average number of tokens and mentions per genre varies a lot. In particular, the Essay genre contains texts discussing abstract concepts like ‘home’ and ‘science’ which are not annotated. The narrative in genre Other contains many person names which are repeatedly mentioned. Column Ph1 indicates how many of the documents were annotated in both phases of the annotation process. For example the News genre contains 9 documents. Mentions of 2 News documents were obtained from Phase I, the others from Phase II (see Figure 1). We observe better IAA values for Phase II than for Phase I (not shown in table). This might be due to the high ratio of documents from genre News (7 out of 12) in Phase II, because we observed that IAA for News is higher than in other genres, independent from the annotation phase. By comparing column CM (given mentions) and AM (annotated mentions) we see that annotators rarely use all mentions in the annotated chains. To reduce the chance that these mentions were omitted due to an oversight, the annotation submission system indicated which mentions were left unused. Annotator Profiles. Anonymized learner profiles were collected from all students in Phase II (written permission for using and publishing the data was also obtained). Learner profiles include age, gender, native language, languages spoken at home, in primary and secondary school, foreign language knowledge, and the number of years the annotator spent in Turkish-speaking communities. Annotators are on average 23 years old university students at Marmara University in Istanbul. Annotations were done after basic introduction to linguistics and coreference resolution and after discussing the annotation manual (Sürmeli et al., 2016). 6 Out of 46 annotators, 29 are male and 17 are female. One annotator indicated Azerbaijani as a native language, all others indicated Turkish as one of their native languages. (Azerbaijani is close to Turkish.) Two annotators indicated Kurdish as further native language, and one each Arabic, English, and Macedonian. Primary and secondary school education was Turkish for 43 annotators, English for two and Azerbaijani for one. Moreover 43 annotators lived at least 20 years in predominantly Turkishspeaking communities, the remaining annotators answered 4, 5, and 14 years, respectively, for this question. According to this data we consider our annotators to be capable of understanding and annotating the texts in the corpus. 3.4 Tools For creating this corpus, we built several tools. Document Extractor. The METU-Sabanci Turkish Treebank contains 1960 text fragments, distributed over 33 documents. Most documents are split over several XML files, however there is also one XML file containing two distinct documents. We provide a tool for extracting documents from the Turkish Treebank and store each document in a single XML file. The Turkish Treebank is licensed in a way that it cannot be redistributed with the Marmara Turkish Coreference Corpus, therefore the tool generates document files from a directory containing the unpacked Turkish Treebank. Our tool not only creates one XML file for each document, it also recodes all data to UTF-8 and fixes problematic (non-encoded) attributes that are present in the original corpus. Coreference XML Format. For representing coreference information we created an XML format that contains pointers to sentence and word IDs into documents extracted from the Turkish Treebank. A sample of such an XML file with two mentions and one chain is as follows. <coref> <mentions> <mention fromWordIX="1" id="0" sentenceNo="00016112313.1" toWordIX="1"> Prof._Dr._Semih_Koray’ın </mention> <mention fromWordIX="1" id="2" sentenceNo="00016112313.2" toWordIX="1"> Koray </mention> </mentions> <chains> <chain> <mention mentionId="0">Prof._Dr._Semih_Koray’ın</mention> <mention mentionId="2">Koray</mention> </chain> </chains> </coref> In this example, ‘Prof._Dr._Semih_Koray’ın’ is a mention with ID 0 containing token 1 (called ‘word’ in the Treebank) in sentence ‘00016112313.1’ of the document assembled from the Treebank. Moreover there is a chain containing that mention and another mention in the first token of sentence ‘00016112313.2’. Note that the actual text within mentions is only for readability purposes, the information about mention content is fully represented in attributes. CoNLL ⇔ XML Converters. As the CoNLL reference coreference scorer (Pradhan et al., 2014) is based on CoNLL format, we provide tools for converting a document and a coreference XML file into a CoNLL file (and vice versa). CoNLL format is also more readable than XML Format for humans. We use XML to be consistent with the Turkish Treebank and because the Treebank license prevents redistribution. 7 (Semi-)automatic coreference adjudication tool. Merging several distinct coreference annotations into a single gold standard is a complex task, in particular if annotators do not agree on mentions. To simplify this task we created a tool that merges multiple annotations into a single solution according to objective (1) from Section 3.2. Manual intervention for editing mentions and chains is also possible, details about a preliminary (Phase I) version of the tool is described by Schüller (2016). Note that, in Phase II we performed only automatic adjudication and did not need manual intervention. For the purpose of this project, it was sufficient to use our tool directly on CoNLL files without a GUI. In the future, to make the tool accessible to a wider part of the community, we consider integrating it into an existing software, for example BART (Broscheit et al., 2010). 4 Baseline We have created a baseline for mention detection, based on the work of Sapena et al. (2012), and for coreference resolution, inspired by Bengtson and Roth (2008). The baseline is based on Python and scikit-learn (Pedregosa et al., 2011). We considered to integrate also the Named Entity Recognition (NER) module of the ITU-pipeline (Eryiğit, 2014) because NER is not annotated in the Turkish Treebank, however we found that the output the web service changed significantly several times during the development of the baseline. To facilitate reproducibility of results we decided to create a stand-alone baseline that allows reproducing our results using only the METU-Sabanci Turkish Treebank (Say et al., 2004) and scikit-learn. Mention Detection. Our Mention Detection baseline marks all (i) noun phrases, (ii) pronouns, and (iii) capitalized common nouns or proper names that occur two or more times in the document as mentions, similar to the approach of Sapena et al. (2012) for English. Coreference Resolution. Our Coreference Resolution baseline is inspired by the work of Bengtson and Roth (2008) who describe a simple method with reasonable accuracy and without the need for custom machine learning models and algorithms that are specific to coreference resolution. As input the baseline uses a set of candidate mentions (either gold or predicted), furthermore lemma and dependency parsing information for obtaining mention heads, as available in the Turkish Treebank. The type of a mention is marked as pronoun if the lemma of the head is one of ben, sen, biz, siz, bu, şu, o, bura, şura, ora, kendi, birbiri. To separate proper noun from noun phrase mention types, we realized our own heuristic which (i) collects all uppercase tokens not at sentence-initial position, (ii) strips case markers, and (iii) uses the resulting set of strings to mark all (including sentence-initial) tokens as proper nouns. All remaining mentions obtain the type noun phrase. Based on mention types and head information we create the following features for each mentionmention pair (m1 , m2 ): (i) type of m1 and type of m2 (2 features), (ii) both mentions are pronouns, proper nouns, or noun phrases (3 features), (iii) heads of m1 and m2 match, and the same for head lemmas (2 features), (iv) last part of name is equal in m1 and m2 , and (v) m1 is an acronym of m2 , (vi) head of m1 is a substring of head of m2 , and the same for head lemmas (2 features), (vii) m1 is an acronym of m2 . 8 RMD PMD MUC B3 CEAFe CEAFm BLANC News Short Story Novel Essay Research.M Article Travel Other 82.6 89.6 84.0 85.7 76.5 71.4 71.4 89.6 14.7 22.0 19.9 7.1 13.4 11.6 10.5 23.9 81.1 77.4 79.0 76.1 76.5 78.1 66.1 72.1 74.9 55.5 56.0 70.4 56.0 70.7 57.6 47.7 71.8 57.2 51.2 66.8 51.8 68.7 55.2 46.6 73.2 56.6 55.4 67.1 55.6 70.6 55.3 45.6 72.3 60.7 61.7 63.4 62.8 68.6 52.6 50.9 Total 83.2 16.9 77.8 62.1 59.7 61.4 63.8 Genre Table 2: Evaluation of baseline by genres: RMD and PMD show recall and precision for mention detection, other columns show F1 scores of the respective metrics for coreference resolution on gold mentions using linear SVC all-links method. Accumulations are averages weighted by document size (# tokens). Features (v)–(vii) are asymmetric, that means exchanging m1 and m2 can change the feature value. For these features we also add the respective reverse direction feature, as well as the disjunction of features of both directions. Moreover we add all possible pairs of features (i)–(ii) and (iii)–(vii) to allow the machine learning to give separate weight to features (iii)–(vii) per mention type. We implemented two machine learning methods for predicting coreference based on classification (SVC) and regression (SVR). SVC is based on classification with a linear-kernel SVM (Corinna Cortes and Vapnik, 1995). Positive examples are mentions and their closest predecessors within all chains, while negative examples are all mention pairs that are not in the same chain with less than 100 mentions distance. For predicting chains, we first generate candidate mention pairs for all mentions except for noun phrases with pronoun predecessor, then we predict whether they are in the same chain using the SVM. Finally, each mention starts in its own chain and we go through mentions from the beginning of the document to the end, and merge mentions to (potentially several) previous chains for all predicted mention-mention links. We prevent merges that lead to chains with overlapping mentions. SVR is based on support vector regression with a linear-kernel SVM (Drucker et al., 1997) trained on the same examples as SVC. For prediction we generate the same candidate mentions as in SVC. For building chains we also start with one chain per mention, but this time we use the Best-Link (Bengtson and Roth, 2008) strategy: we iterate over mentions in order of occurrence in the document, and merge each mention with at most one predecessor chain if its highest-scored candidate link to a predecessor mention is above 0.1 and if the resulting chain does not contain overlapping mentions. In addition to the above, when predicting coreference on predicted mentions, we include incorrect mentions predicted on the training documents to generate negative examples. We randomly sample at most as many incorrect mentions as already contained in the gold annotation. When predicting coreference on gold mentions, we train only on gold mentions. We balance example weight by class size (we have significantly more negative examples), and we use L2 regularization for both SVC and SVR. 4.1 Evaluation We evaluate our baseline using the CoNLL reference coreference scorer (Pradhan et al., 2014) and report MUC, B3 , CEAFm , CEAFe , and BLANC scores. Intuitively, MUC (Vilain et al., 1995) computes precision and recall of mention-mention links over all gold chains compared with all predicted chains. B3 (Bagga and Baldwin, 1998) computes precision and recall over each individual mention which makes the score also applicable to singleton mentions. CEAFm (Luo, 2005) creates an optimal matching between predicted and gold mentions and evaluates the percentage of mentions correctly assigned to chains, while CEAFe does the same from the perspective of chains. BLANC (Recasens and Hovy, 2010) gives equal importance to mention-mention links and non-existing mention-mention links, without the need to consider per-mention or per-chain score accumulations. In the following we compute scores per document and accumulate them into overall and genre-based scores using the number of tokens in each document as weight. Mention detection is done on the Turkish 9 MUC B3 CEAFe CEAFm BLANC average best worst 77.8 92.3 61.8 62.1 89.8 39.6 59.8 88.5 37.2 61.4 90.4 45.2 63.8 88.1 45.0 SVR/GM average best worst 75.0 92.4 60.6 60.6 90.0 36.3 60.5 89.2 39.5 61.3 90.8 42.6 61.7 87.8 38.9 SVR/PM average best worst 32.2 55.0 7.6 23.3 35.7 8.5 17.2 31.2 9.9 24.7 37.9 9.3 18.1 33.5 1.4 Method Accumulation SVC/GM Table 3: Evaluation of our baseline using support vector machine classification (SVC) and regression (SVR) on gold (GM) and predicted mentions (PM). Scores are F1 scores, averages are again weighted by document size, best/worst rows are over single documents. SVC on PM is not applicable (see text). Treebank data and is a deterministic algorithm which does not require learning. Coreference resolution is done either on gold mentions (GM) or on predicted mentions (PM). Scores are obtained by leave-one-out cross-validation on all 33 documents of the corpus, yielding 33 folds. All scores are given in percent. For mention detection we report Precision and Recall, for coreference scores we report only F1. Table 2 shows baseline results for mention detection and coreference with SVC on gold mentions. We obtain 83.2% recall for mention detection over the whole Treebank. As expected and as intended, precision is much worse because we expect the coreference resolution step to eliminate spurious mentions. Coreference resolution yields a MUC score of 77.8%, while the stricter B3 , CEAF, and BLANC scores are lower. The worst scores for BLANC, MUC, and CEAFm are obtained from genres Travel and Other, which is logical because these genres contain only one document each. Hence, in cross-validation, the training set contains only documents from other genres. Table 3 shows results for the best and worst document in the corpus, and overall average of scores for SVC, SVR on gold mentions and SVR on predicted mentions. Average is again weighted by document size. SVC on gold mentions is the same setup as in Table 2. For comparison we show again the average score, and additionally the best and worst score obtained from a single document. Using SVR on gold mentions yields scores similar to SVC except for BLANC where the worst document is 6.1% worse than with SVM. On predicted mentions, SVC puts nearly all mentions into a single chain, which yields reasonable MUC score but low other scores. Therefore, we omit SVC results on predicted mentions from the table, and show only results for SVR which has the systematic advantage of selecting only the best link. Naturally, coreference prediction on predicted mentions yields significantly worse results than on gold mentions, with an average MUC score of 32.2% and an average BLANC score of 18.1%. The document producing the worst BLANC score of 1.4% is a scientific article about the meaning of the word ‘home’, which is a text that contains mainly abstract examples about the animal world, hence the score is not surprising. The best BLANC score on predicted mentions is obtained from a story about street children which is about concrete events and individuals. As this is only a baseline, we did not include more sophisticated features described in (Bengtson and Roth, 2008). For example, semantic features based on WordNet (Bilgin et al., 2004; Miller, 1995) could rule out certain predicted mentions as relevant and thus could improve precision of the baseline. 5 Conclusion The Turkish coreference corpus and the Turkish coreference resolution baseline are a starting point for further research. Annotations on the token level have the consequence that coreference between morphemes and other tokens (or morphemes) cannot be annotated. While such coreference annotations are desirable, we decided to reduce the complexity of the annotation task by omitting such coreference links and by presenting tokens without morphological analysis to annotators. For future annotation projects it could be interesting to extend annotations to include morpheme coreference links. Scoring with the reference 10 scorer tool would require development of a novel CoNLL representation for tokens that are split within IGs. If this representation is not used for annotation, development of a tool for such annotations is also necessary. We think this would also require annotators with a higher level of expertise than available for our study. As the only pronoun anaphora annotations (Küçük and Yöndem, 2007) that were done on the METUSabanci Turkish Treebank can no longer be found by the authors (personal communication), we have no possibility of validating the annotations performed in our annotation project. To improve the mention detection baseline, information about appositives as well as finding a way to filter out generic mentions could be useful. To improve the coreference resolution baseline, adding more complex features by integrating Turkish WordNet (Bilgin et al., 2004), Turkish NER (Şeker and Eryiğit, 2012), and Turkish WSD (İlgen et al., 2012) could be helpful. For a full processing pipeline from plain text to coreference annotations, we need at least morphological analysis (Sak et al., 2007), disambiguation (Sak et al., 2007), and dependency parsing (Eryiğit et al., 2008). Available tools are the ITU-pipeline (Eryiğit, 2014) and the older Zemberek system (Akın and Akın, 2007). Acknowledgements We are grateful to Kemal Oflazer and Bilge Say for support about the METU-Sabanci Turkish Treebank, and to Dilek Küçük and Savaş Yıldırım for support about their papers and datasets. This work has been supported by The Scientific and Technological Research Council of Turkey (TUBITAK) under grant agreements 114E430 and 114E777. Author contributions are as follows (in chronological order): creating documents from Treebank fragments (B.G.S), evaluating GATE and BRAT annotation software (B.G.S., A.P.), creating the annotation manual (P.S., K.C., F.T., B.G.S.), performing manual adjudication in Phase I (K.C., B.G.S., A.P., H.E.K.), annotating mentions for those documents in Phase II that were not annotated in Phase I (K.C., H.E.K.), revising the manuscript as an English native-speaker (A.H.K.), writing the baseline software (P.S., F.T., A.P.), managing the project, performing baseline experiments, analyzing data and result, and writing the manuscript (P.S). References Akın, A. A. and Akın, M. D. (2007). Zemberek, An Open Source NLP Framework for Turkic Languages. Structure, 10:1–5. Atalay, N. B., Oflazer, K., and Say, B. (2003). The Annotation Process in the Turkish Treebank. In International Workshop on Linguistically Interpreted Corpora (LINC). Bagga, A. and Baldwin, B. (1998). Algorithms for Scoring Coreference Chains. In International Conference on Language Resources and Evaluation (LREC), pages 563–566. Bengtson, E. and Roth, D. (2008). Understanding the value of features for coreference resolution. In Empirical Methods in Natural Language Processing (EMNLP), pages 294–303. Bilgin, O., Çetinoğlu, Ö., and Oflazer, K. (2004). Building a Wordnet for Turkish. Romanian Journal of Information Science and Technology, 7(1-2):163–172. Broscheit, S., Poesio, M., Ponzetto, P. S., Rodriguez, J. K., Romano, L., Uryupina, O., Versley, Y., and Zanoli, R. (2010). BART: A Multilingual Anaphora Resolution System. In International Workshop on Semantic Evaluation (SemEval), pages 104–107. Buchholz, S. and Marsi, E. (2006). CoNLL-X shared task on Multilingual Dependency Parsing. In Computational Natural Language Learning (CoNLL), pages 149–164. Chang, K.-W., Samdani, R., and Roth, D. (2013). A Constrained Latent Variable Model for Coreference Resolution. In Empirical Methods in Natural Language Processing (EMNLP), pages 601–612. 11 Chen, C. and Ng, V. (2012). Combining the Best of Two Worlds: A Hybrid Approach to Multilingual Coreference Resolution. In Empirical Methods in Natural Language Processing and Computational Natural Language Learning, Shared Task, pages 56–63. Corinna Cortes and Vapnik, V. (1995). Support Vector Networks. Machine Learning, 20(3):273–297. Culotta, A., Wick, M., and Mccallum, A. (2007). First-Order Probabilistic Models for Coreference Resolution. In Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pages 81–88. Cunningham, H., Tablan, V., Roberts, A., and Bontcheva, K. (2013). Getting more out of biomedical documents with GATE’s full lifecycle open source text analytics. PLoS computational biology, 9(2):e1002854. Denis, P. and Baldridge, J. (2009). Global joint models for coreference resolution and named entity classification. Procesamiento del Lenguaje Natural, 42:87–96. Doddington, G., Mitchell, A., Przybocki, M., Ramshaw, L., Strassel, S., and Weischedel, R. (2004). The Automatic Content Extraction (ACE) Program-Tasks, Data, and Evaluation. In International Conference on Language Resources and Evaluation (LREC), pages 837–840. Drucker, H., Burges, C. J. C., Kaufman, L., Smola, A., and Vapnik, V. (1997). Support vector regression machines. Advances in Neural Information Processing Systems, 9:155–161. Erkan, T. and Akman, V. (1998). Situated Processing of Pronominal Anaphora. In Verarbeitung natürlicher Sprache (KONVENS), pages 369–378. Bilkent University. Eryiğit, G. (2014). ITU Turkish NLP Web Service. In Conference of the European Chapter of the Association for Computational Linguistics (EACL) Demonstrations, pages 1–4. Eryiğit, G., Nivre, J., and Oflazer, K. (2008). Dependency Parsing of Turkish. Computational Linguistics, 34(3):357–389. Fernandes, E. R., dos Santos, C. N., and Milidiú, R. L. (2012). Latent structure perceptron with feature induction for unrestricted coreference resolution. In Joint Conference on EMNLP and CoNLL: Shared Task, pages 41–48. Gaizauskas, R., Cunningham, H., Wilks, Y., Rodgers, P., and Humphreys, K. (1996). GATE: an environment to support research and development in natural language engineering. In International Conference on Tools with Artificial Intelligence (ICTAI), pages 58–66. Grishman, R. and Sundheim, B. (1995). Design of the MUC-6 evaluation. In Message Understanding Conference (MUC), pages 413–422. Grosz, B. J., Joshi, A. K., and Weinstein, S. (1995). Centering: A Framework for Modelling the Local Coherence of Discourse. Computational Linguistics, 21(2):203–225. Hakkani-Tür, D. Z., Oflazer, K., and Tür, G. (2002). Statistical morphological disambiguation for agglutinative languages. Computers and the Humanities, 36(4):381–410. Hirst, G. (1981). Anaphora in Natural Language Understanding: A Survey. Springer. Hobbs, J. R. (1978). Resolving Pronoun References. Lingua, 44(4):311–338. Hovy, E., Marcus, M., Palmer, M., Ramshaw, L., and Weischedel, R. (2006). OntoNotes: the 90% solution. In Human Language Technology Conference of the NAACL, Short Papers, pages 57–60. Krippendorff, K. (1980). Content Analysis: An Introduction to Its Methodology. Sage Publications. Küçük, D. and Yazıcı, A. (2008). Identification of coreferential chains in video texts for semantic annotation of news videos. In International Symposium on Computer and Information Sciences (ISCIS). 12 Küçük, D. and Yöndem, M. T. (2007). Automatic Identification of Pronominal Anaphora in Turkish Texts. In International Conference on Computer and Information Science (ICIS). Kılıçaslan, Y., Güner, E. S., and Yıldırım, S. (2009). Learning-based pronoun resolution for Turkish with a comparative evaluation. Computer Speech & Language, 23(3):311–331. Lee, H., Chang, A., Peirsman, Y., Chambers, N., Surdeanu, M., and Dan Jurafsky (2013). Deterministic Coreference Resolution Based on Entity-Centric, Precision-Ranked Rules. Computational Linguistics, 39(4):885–916. Luo, X. (2005). On coreference resolution performance metrics. In Conference on Human Language Technology and Empirical Methods in Natural Language Processing (HLT/EMNLP), pages 25–32. Miller, G. A. (1995). WordNet: a lexical database for English. Communications of the ACM, 38(11):39– 41. Mitkov, R. (2002). Anaphora Resolution. Longman. Ng, V. (2010). Supervised Noun Phrase Coreference Research: The First Fifteen Years. In Association for Computational Linguistics (ACL), pages 1396–1411. Oflazer, K. (1993). Two-level Description of Turkish Morphology. In Conference of the European Chapter of the Association for Computational Linguistics (EACL), pages 472–472. Oflazer, K. and Bozşahin, H. C. (1994). Turkish Natural Language Processing Initiative: An Overview. In Turkish Symposium on Artificial Intelligence and Neural Networks. Oflazer, K., Göçmen, E., and Bozşahin, C. (1994). An Outline of Turkish Morphology. Technical report, NATO Science Division SfS III, Brussels. Oflazer, K., Say, B., Hakkani-Tür, D. Z., and Tür, G. (2003). Building a Turkish Treebank. In Treebanks, Building and Using Parsed Corpora, pages 261–277. Springer Netherlands. Passonneau, R., Habash, N., and Rambow, O. (2006). Inter-annotator agreement on a multilingual semantic annotation task. In International Conference on Language Resources and Evaluation (LREC), pages 1951–1956. Passonneau, R. J. (2004). Computing reliability for coreference annotation. In Language Resources and Evaluation (LREC), pages 1503–1506. Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., and Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830. Poesio, M., Mehta, R., Maroudas, A., and Hitzeman, J. (2004). Learning to resolve bridging references. In Annual Meeting on Association for Computational Linguistics (ACL). Paper #143. Pradhan, S., Luo, X., Recasens, M., Hovy, E., Ng, V., and Strube, M. (2014). Scoring Coreference Partitions of Predicted Mentions: A Reference Implementation. In Annual Meeting of the Association for Computational Linguistics (ACL), pages 30–35. Pradhan, S., Moschitti, A., Xue, N., Uryupina, O., and Zhang, Y. (2012). CoNLL-2012 Shared Task: Modeling Multilingual Unrestricted Coreference in OntoNotes. In Joint Conference on EMNLP and CoNLL: Shared Task, pages 1–40. Pradhan, S. S., Ramshaw, L., Weischedel, R., MacBride, J., and Micciulla, L. (2007). Unrestricted Coreference: Identifying Entities and Events in OntoNotes. In International Conference on Semantic Computing (ICSC 2007), pages 446–453. Recasens, M. and Hovy, E. (2010). BLANC: Implementing the Rand Index for Coreference Evaluation. Natural Language Engineering, 17(4):485–510. 13 Recasens, M., Màrquez, L., Sapena, E., Martí, M. A., Taulé, M., Hoste, V., Poesio, M., and Versley, Y. (2010). SemEval-2010 Task 1: Coreference Resolution in Multiple Languages. In International Workshop on Semantic Evaluation (SemEval) at ACL, pages 1–8. Sak, H., Güngör, T., and Saraçlar, M. (2007). Morphological disambiguation of Turkish text with perceptron algorithm. In Intelligent Text Processing and Computational Linguistics, pages 107–118. Sapena, E., Padro, L., and Turmo, J. (2012). A Constraint-Based Hypergraph Partitioning Approach to Coreference Resolution. Computational Linguistics, 39(4):847–884. Say, B., Zeyrek, D., Oflazer, K., and Özge, U. (2004). Development of a Corpus and a Treebank for Present day Written Turkish. In İmer, K. and Doğan, G., editors, Current Research in Turkish Linguistics (Proceedings of the Eleventh International Conference of Turkish Linguistics, 2002), pages 182–192. Eastern Mediterranean University Press. Schüller, P. (2016). Adjudication of Coreference Annotations via Finding Optimal Repairs of Equivalence Relations. In International Workshop on Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion (RCRA), pages 57–71. Soon, W., Ng, H., and Lim, D. (2001). A machine learning approach to coreference resolution of noun phrases. Computational linguistics, 27(4):521–544. Stenetorp, P., Pyysalo, S., Topic, G., Ohta, T., Ananiadou, S., and Tsujii, J. (2012). Brat: a Web-based Tool for NLP-Assisted Text Annotation. In European Chapter of the Association for Computational Linguistics (EACL), pages 102–107. Stoyanov, V. and Eisner, J. (2012). Easy-first Coreference Resolution. In International Conference on Computational Linguistics (COLING), pages 2519–2534. Sürmeli, B. G., Cıngıllı, K., Tunçer, F., and Schüller, P. (2016). Turkish coreference annotation manual (V2). https://tinyurl.com/jovfmua . Tüfekçi, P. and Kılıçaslan, Y. (2007). A Computational Model for Resolving Pronominal Anaphora in Turkish Using Hobbs’ Naïve Algorithm. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 1(5):1402–1406. Turan, Ü. D. (1996). Null Vs. Overt Subjects in Turkish. PhD thesis, University of Pennsylvania. van Deemter, K. and Kibble, R. (2000). On Coreferring: Coreference in MUC and Related Annotation Schemes. Computational Linguistics, 26(4):629–637. Vilain, M., Burger, J., Aberdeen, J., Connolly, D., and Hirschman, L. (1995). A Model-Theoretic Coreference Scoring Scheme. In Message Understanding Conference (MUC), pages 45–52. Weischedel, R., Pradhan, S., Ramshaw, L., Kaufman, J., Franchini, M., El-Bachouti, M., Xue, N., Palmer, M., Hwang, J. D., Bonial, C., Choi, J., Mansouri, A., Foster, M., Hawwary, A.-a., Marcus, M., Taylor, A., Greenberg, C., Hovy, E., Belvin, R., and Houston, A. (2012). OntoNotes Release 5.0. Yüksel, Ö. and Bozsahin, C. (2002). Contextually appropriate reference generation. Natural Language Engineering, 8(1):69–89. Yıldırım, S., Kılıçaslan, Y., and Aykaç, R. E. (2004). A Computational Model for Anaphora Resolution in Turkish via Centering Theory: an Initial Approach. In International Conference on Computational Intelligence, pages 124–128. Zheng, J., Vilnis, L., Singh, S., Choi, J. D., and McCallum, A. (2013). Dynamic Knowledge-Base Alignment for Coreference Resolution. In Computational Natural Language Learning (CoNLL), pages 153–162. İlgen, B., Adalı, E., and Tantuğ, A. C. (2012). Building up Lexical Sample Dataset for Turkish Word Sense Disambiguation. In International Symposium on Innovations in Intelligent Systems and Applications (INISTA), pages 1–5. 14 Şeker, G. A. and Eryiğit, G. (2012). Initial explorations on using CRFs for Turkish Named Entity Recognition. In International Conference on Computational Linguistics (COLING), pages 2459–2474. 15
2cs.AI
Quantum-enhanced reinforcement learning for finite-episode games with discrete state spaces arXiv:1708.09354v3 [quant-ph] 15 Sep 2017 Florian Neukart∗1 , David Von Dollen1 , Christian Seidel2 , and Gabriele Compostella2 1 Volkswagen Group of America 2 Volkswagen Data:Lab Abstract Quantum annealing algorithms belong to the class of metaheuristic tools, applicable for solving binary optimization problems. Hardware implementations of quantum annealing, such as the quantum annealing machines produced by D-Wave Systems [1], have been subject to multiple analyses in research, with the aim of characterizing the technology’s usefulness for optimization and sampling tasks [2–16]. Here, we present a way to partially embed both Monte Carlo policy iteration for finding an optimal policy on random observations, as well as how to embed n sub-optimal state-value functions for approximating an improved state-value function given a policy for finite horizon games with discrete state spaces on a D-Wave 2000Q quantum processing unit (QPU). We explain how both problems can be expressed as a quadratic unconstrained binary optimization (QUBO) problem, and show that quantum-enhanced Monte Carlo policy evaluation allows for finding equivalent or better state-value functions for a given policy with the same number episodes compared to a purely classical Monte Carlo algorithm. Additionally, we describe a quantum-classical policy learning algorithm. Our first and foremost aim is to explain how to represent and solve parts of these problems with the help of the QPU, and not to prove supremacy over every existing classical policy evaluation algorithm. ∗ Corresponding author: [email protected] 1 1 Introduction The physical implementation of quantum annealing that is used by the D-Wave machine minimizes the two-dimensional Ising Hamiltonian, defined by the operator H: H(s) = X hi si + i∈V X Jij si sj . (1) ij∈E Here, s is a vector of n spins {−1, 1}, described by an undirected weighted graph with vertices (V ) and edges (E). Each spin si is a vertex (in V ), hi represents the weights for each spin, and Jij are the strengths of couplings between spins (edges in E). Finding the minimum configuration of spins for such a Hamiltonian is known to be NP-hard. The QPU is designed to solve quadratic unconstrained binary optimization (QUBO) problems, where each qubit represents a variable, and couplers between qubits represent the costs associated with qubit pairs. The QPU is a physical implementation of an undirected graph with qubits as vertices and couplers as edges between them. The functional form of the QUBO that the QPU is designed to minimize is: Obj(x, Q) = xT · Q · x, (2) where x is a vector of binary variables of size N , and Q is an N × N real-valued matrix describing the relationship between the variables. Given the matrix Q, finding binary variable assignments to minimize the objective function in Equation 2 is equivalent to minimizing an Ising model, a known NP-hard problem [16, 17]. To directly submit a problem to a D-Wave QPU, the problem must be formulated as either an Ising model or a QUBO instance. The spins are represented by superconducting loops of niobium metal, which are the quantum bits (qubits). The preparation of states by the quantum annealer is done such that the initial configuration of all spins are purely quantum, in uniform superposition in both available states. The quantum annealing system then slowly evolves the system to construct the problem being minimized (described by the QUBO matrix Q, or the Ising model’s h and J). Figure 1: Left: Initial superposition represented by the minimum energy of the 1-qubit system. Middle: Double-well potential caused by quantum annealing. Right: Tilting of the double-well potential by the application of external magnetic fields. During the annealing, the qubits transition from being quantum objects to classical objects, whose states can then be readout without destroying quantum information. Due to superconductivity, 2 superposition is maintained by inducing a current in both directions at once, corresponding to the 1 and 0 states. Concerning an energy function, the superposition state corresponds to the lowest point in the function’s single valley (Fig. 1). During the process of quantum annealing, a barrier is raised, turning the energy diagram into a double-well potential, where the low point of the left valley represents the state 0, and the low point on the right the state 1. The initial probability of being in either the state 0 or the state 1, is given an equally-weighted probability, 1 2 for each. By construction, the qubits always start in the minimum energy configuration. As the problem is introduced, other energy levels get closer to the lowest energy level, which poses a challenge: the smaller the gap between the energy states, the more likely it is that the system will jump from its lowest energy configuration into one of the excited states. The so-called minimum gap is the point where the first excited state approaches the ground state closely, and thermal fluctuations or too short annealing times could result in the system jumping from the ground state to an excited state. If the annealing happens slow enough, meaning that the system stays in the ground state, it follows an adiabatic process. This is particularly worth mentioning, because the larger the system is, the more unlikely it is to remain in the ground state during the annealing cycle. However, even if the quantum system settles in one of the excited states, this result can be useful. As the system size grows, it becomes harder to classically validate the optimal (minimum energy) solution. Brute force is, for example, classically intractable for even a modest number of qubits (∼ 104 ). If an excited state is still low-energy enough to be useful in a practical setting, much computation time can be saved by using the quantum annealing system. Additional built-in devices in D-Wave quantum annealers are the couplers, which allow multi-qubit entanglement. Entanglement refers to correlating qubits in a way that they cannot be described as separate subsystems and act as a single quantum object. Thus, considering a two qubit system, the change of one qubits state also affects the second qubit, and they can be correlated such that if q1 ends up in a certain state, q2 is forced to take the same or opposite state. However, the object q1 q2 can take 4 different states S = 00, 01, 10, 11, and the relative energy of these states depends on the biases of each qubit, and the coupling between them. This is how a program on the D-Wave quantum annealing system is defined [18]: choosing a set of biases and couplings defines an energy-landscape, whose global minima correspond to the problem being solved. At the end of the quantum algorithm, the system ends up in the minimum energy configuration, thus solving the problem. A classical algorithm would represent the problem in the same way, but where a classical algorithm can walk the surface, the qubits are capable of using quantum tunneling to pass through the energy barriers of the surface. Once entangled, qubits can tunnel together through the energy barriers from one configuration to another. Previous publications have shown how quantum effects in the D-Wave QPU, such as entanglement, superposition, and tunneling, help the QPU solve combinatorial optimization problems [19]. 3 2 Formalization of the reinforcement learning problem using the Markov decision process framework The reinforcement learning problem can be described by the Markov decision process (MDP), which consists of states, actions that can be taken in each of these states, state transitions, and a reward function. Furthermore, a distinction between discrete and continuous state spaces, and finite vs. infinite horizon episodes have to be made [20, 21]. 2.1 States  A set of states S is defined as finite set s1 , ..., sN , and each s ∈ S is described by its features, and taking a self-driving cars (SDC) as example, some of the features are the SDC’s position in the world, other traffic participants (position, velocity, trajectory,...), infrastructure (traffic lights, road condition, buildings, construction zones,...), weather conditions, ..., thus, everything that matters for the SDC in a certain situation at a certain time. Some states are legal, some are illegal, which is based upon the combination of features. It is, for example, illegal for the SDC to occupy space that’s occupied by a building or another vehicle at the same time. 2.2 Actions In any given state an agent should be able to evaluate and execute a set of actions, which is defined  as the finite set a1 , ..., aK , where K characterizes the size of the action space |A| = K. Before we mentioned illegal states, which may result from applying an illegal action for a state, so not every action may be applied in every given state. Generally, and we describe the set of actions that may be applied in a particular state s ∈ S by A(s), where A(s) ⊆ A and A(s) = A for all s ∈ S. As we also need to account for illegal states, this can be modeled by a precondition function: flegal : S × A → {true, f alse} , 2.3 (3) Transition A transition from a state s ∈ S to a consecutive state s0 ∈ S occurs after the agent executes an action in the former. The transition is usually not encoded in hard rules, but given by a probability distribution over the set of possible transitions (different actions will result in different states). This is encoded into a transition function, which is defined as T : S × A × S → [0, 1] , (4) which states that the probability of transitioning to state s0 ∈ S after executing A(s) in s ∈ S is T (s, a, s0 ). For all actions a, all states s, and consecutive states after transition s0 , T (s, a, s0 ) ≥ 0 and P T (s, a, s0 ) ≤ 1, and for all actions a, s0 T (s, a, s0 )=1. Given that the result of an action does not depend on the history (previous states and actions), and depends only on the current state, then it is 4 called Markovian: P (st+1 |st , at , st−1 , at−1 ) = P (st+1 |st , at ) = T (st , at , st+1 ) , (5) where t = 1, 2, ... are the time steps. In such a system, only the current state s encodes all the information required to make an optimal decision. 2.4 Reward The reward is given by a function for executing an action in a given state, or for being in a given state. Different actions in a state s may result in different rewards, and the respective reward function is either defined as R : S → R, (6) R : S × A → R, (7) R : S × A × S → R, (8) or as or as Equation 6 gives the reward obtained in states, Equation 7 gives rewards for performing actions in certain states, and Equation 8 gives rewards transitions between states. 3 Finite horizon, discrete state space We have been focusing on finite horizon and discrete state space games so far, and in games such as the one used to describe the introduced quantum reinforcement learning example, the foundation for finding ”good states” and subsequently approximating an optimal policy are observations in the form of completed games (episodes). In Black Jack, a state is given by the player’s current sum (12-21), the dealer’s one showing card (given by the values 1-10, where 1 is an ace), and whether or not the player holds a usable ace (given by 0 or 1, where 0 is no usable ace). The two actions the player can execute are either to stick (=stop receiving cards), to hit (=receive another card), given by a ∈ {0, 1}. Every episode is composed of multiple state-action pairs, and for each state-action pair a reward value is given. Although the same state-action pairs may occur in different episodes, it is very unlikely that the reward for these in two episodes is the same, as the reward in a state not only depends from the state, but also from the previous states and actions. What we intend to approximate from n complete episodes is the optimal policy under consideration of all states. 5 4 Difference Monte Carlo and quantum-enhanced Monte-Carlo policy evaluation Monte Carlo methods learn from complete sample returns, which implies that they are defined for episodic tasks only. An update happens after each episode, so learning happens directly from experience. The goal is to learn the optimal policy given some episodes, and the basic idea is to average the returns after a state s was visited. A distinction has to be made about whether the returns for each visit to s in an episode are averaged, or only first time visits. Each of the approaches converges asymptotically. As for the used game each state occurs only once per episode, first-visit Monte Carlo policy evaluation is described in Algorithm 1: Algorithm 1 Monte Carlo policy evaluation Initialize: π, V, Return(s) Repeat forever: (a) Generate an episode using π (b) For each state s in current episode R ← return following the first occurrence of s Append R to Return(s) V (s) ← average (Return(s)) where π is the policy to be evaluated, V a state-value function, and Return(s) is initialized as empty list and will hold all s ∈ S. In the Black Jack example, our aim is to have a card sum that is greater than the dealer’s sum, but in the same instance we must not exceed 21. A reward of +1 is given for winning the game, 0 reward for a draw game, and -1 for losing the game. The state-value function we approximate is based on the policy α, which is defined as ”stick if the sum is 20 or 21, and else hit”. For this, we simulated many Black Jack games using policy α and averaged the returns following each state. Finding the state-value function with a purely classical Monte Carlo algorithm requires thousands of observations (simulations), based on which the returns following each state are averaged (see Figs. 2, 3, showing the ”no usable ace”-scenario only). 6 Figure 2: Monte Carlo: 10,000 episodes, policy α, no usable ace Figure 3: Monte Carlo: 500,000 episodes, policy α, no usable ace Additionally, we simulated many blackjack games using random policy β, which would choose a random action in each state, averaged the returns following each state, and used this to find a policy only on observation. The respective value function is plotted in 4. 4.1 State-value function approximation In the first example, we generate n sub-optimal state-value functions by purely classical Monte Carlo policy evaluation. We want to emphasize that the formulation of the algorithm is such that either n classically generated (sub-optimal) state-value functions can be embedded for approximating an improved state-value function, or the state-value functions can be generated quantum-enhanced by supplying episodes with their respective (non-averaged) rewards to the algorithm. Both may also be combined in a nested algorithm. The QUBO formulation is such that it will find the preferable 7 Figure 4: Monte Carlo: 500,000 episodes, policy β, no usable ace state-action pairs based on their rewards over the episodes, and once this has been completed for m episodes, n state-value functions can be generated according to the same proceeding: • Based on ( episodes, find n sub-optimal state-value functions classically and embed each state-action pair with the respective value directly on the QPU and so help to approximate the optimal state-value function, which is better than each of the n sub-optimal state-value functions. How identical state-action pairs over different state-value functions are dealt with will be explained below. • Based on ( episodes, we embed state-action pairs directly on the QPU and approximate a policy directly from the observations. When using the QPU to approximate the state-value function, we first classically simulated m Black Jack games according to the policy α. We did this n times, and generated n sub-optimal state-value functions. We then embedded these state-value functions on the QPU such that the QPU acts as a filter, which identifies the state-action pairs that do not positively contribute to approximating the optimal state-value function, and removes these from the result. Still, the result may contain identical state-action pairs with different rewards, but those are averaged over. In our experiments, with the help of the QPU we were on average able to filter out approximately 1/2 of the state-action-value triples from the initially supplied observations. Due to the partially stochastic nature of the game and the varying episode-length, the number of different state-action-value triples may vary. 4.2 Policy iteration Concerning policy iteration, we chose random actions in each state, observed the obtained reward, and use this to learn a policy. The proceeding is similar to the latter example, except that we we do not start with a given policy, such as alpha described above, but try to find a policy (what to do in each state) based observations. By applying the QPU-filter to the original data, we show that we are 8 able to learn policies of similar quality as with the purely classical algorithm, although the number of states in the original data can be reduced by up to 2/3. 5 Formulation of the problem as QUBO The following explanations are based on classically generated, sub-optimal state-value functions, which are embedded on the QPU. The resulting state-value function is compared with single sub-optimal state-value functions, as well as with a state-value function which was obtained by averaging over all sub-optimal state-value functions. The sub-optimal state-value functions in this example were generated using 100 - 500 (m) episodes each. We varied the number of generated state-value functions n from 2 - 7. Unsurprisingly, we obtained the best results with 500 episodes and 7 sub-optimal state-value functions. Increasing n by 1 and/ or m by 50 did not allow for embedding the problem on the QPU without splitting it into sub-problems. Here, we explain how to use qubits for representing state-action pairs, and how to determine the entries of the QUBO by using the value per state-action pair we obtained in our sub-optimal state-value functions. In a nutshell, we use the 2-dimensional physical architecture of the chip as if it was 3-dimensional by representing the problem as a tensor-like structure, but the introduced method generalizes to more complex problems with n dimensions. Based on the following explanations it will become obvious that the more observations are supplied, the more qubit and connections between single qubits are required. Thus, as we have to deal with sparse connectivity and a limited number of qubits, it is in our interest to find a formulation of the problem that allows us to find a sufficiently good state-value function for a given policy by keeping the number of observations small. 5.1 Conditions What we approximate is a state-value function for a policy based on observations (complete episodes), and the reward that is given for an action in a given state. Certainly, it is not possible to just rely on one observation, as in each episode we can see a certain state-action pair only once, and thus only are given one reward-value. It may be that in one episode a certain action for a certain state is rewarded higher than in another episode, depending on which actions have been executed in which states in the past. Furthermore, a game such as Black Jack features stochastic components, thus we assume it is possible to make some assumptions about future states (i.e. the player’s current sum in an ongoing episode will not decrease in the next state), but it cannot be accurately predicted. This means that we should not ignore the future states in a given state completely, but have to include them into our considerations to a certain degree. Therefore, for formulating the problem as a QUBO we need to consider the following conditions: • As identical state-action pairs may be rewarded differently in different episodes, we must assume that in the worst case the execution of a certain action given a certain state is positively rewarded in one episode, and negatively rewarded in another episode. As we intend to not only identify random successful state-action pairs, but successful sequences (see condition 2), averaging or any other means of aggregating the rewards of state-action pairs is prohibited, 9 and the QUBO must be formulated such identical state action-pairs over the episodes are given different entries. • As the reward in a certain state partly depends on what happened in the past, and we are dealing with multiple episodes and want to consider the success of an action in a given state by evaluating the future states, the QUBO must be formulated such that both actions taken in past and future states are taken into account, which allows us to not only determine preferable state-action pairs, but preferable state-action chains by indirectly encoding the statistical probability of consecutive state-action pairs being successful or not while approaching the end of the game. If, in our observed episodes, we find state-action-sequences (s0 , a0 , s00 , a00 , s000 , a000 ...) and (s∗, a∗, s ∗ ∗, a ∗ ∗, s ∗ ∗∗, a ∗ ∗ ∗ ...), and the latter comes with higher rewards for consecutive state-action pairs, we assume that this is a more successful sequence. If k >> l and a sequence b gives positive reward k times, and negative reward l times, b will be considered as successful sequence, as k times the cumulative positive reward outweighs the l times cumulative negative reward. If for b only k > l, other successful sequences may outweigh b, and it may not contribute to and appear in the optimal policy. lf for b k < l or even only k ≈ l then it must not be considered in the resulting optimal policy. 5.2 QUBO Each of the n episodes consists of a different number of states Sn = {sn1 , ..., snm }, where m is the number of states in a given episode and may vary over the episodes. For each state snx in Sn we may also see varying actions and rewards, depending on the history that lead us to snx . Furthermore, we may see different actions, depending on whether the player behaved risk-affine or risk-averse an episode under consideration. Each of the snx must be given a separate entry in the QUBO matrix, as not only the rewards for the state itself, but also the consecutive state-action pairs including their respective rewards may differ. Therefore, the first step is to iterate over all episodes, create a list L of length l containing state-action pairs and the observed negative rewards r ∗ (−1) ∗ rf in a temporary dictionary, where rf is a factor applied to scale the reward up or down, depending on the size of the real values. In this given problem, all rewards ranged from (-1) to 1, and we had best successes in scaling up the rewards by a factor of 10. Due to fluctuations during the annealing cycle, the energies of different possible solutions must not be too close to each other, as jumps may happen, i.e. from a lower energy-solution (better) to a higher-energy solution (worse). On the other hand, the higher the energy barriers, the more unlikely tunneling will happen and we may get stuck in a local minimum, so the energy values also must not be too far apart. The negative rewards are needed, as maximizing the reward equals minimizing the negative reward, which can be interpreted as energy minimization problem on the QPU. The basic QUBO-entry for each state-action pair Vs,a is thus calculated as shown in Equation 9. Ls,a = Vs,a = Rs,a ∗ (−1) ∗ rf , (9) The QUBO-matrix is an upper triangular N ×N -matrix by i ∈ {0, ..., N − 1} and j ∈ {0, ..., N − 1}  and has rows and columns LS,A , LTS,A , each entry initialized with 0, and is an where S are all observed states and A the respective actions. LS,A is of length n ∗ M , where n is the number of 10 observed episodes and M = {m0 , ...mn−1 } is the number of states in each episode (which may vary). The entries are given by the following functions (Eqs. 10, 11, 12):    QU BO(i, j) + (Li(v) + Lj(v) )2 ,   QU BO(i, j) = QU BO(i, j) − ((Li(v) + Lj(v) )2 ),    QU BO(i, j), where if c1 if c2 (10) otherwise c1 : Li(s,a) = Lj(s,a) and (Li(v) + Lj(v) ) > 0 and i 6= j (11) c2 : Li(s,a) = Lj(s,a) and (Li(v) + Lj(v) ) < 0 and i 6= j (12) and where Li(v) gives the ith value v in Ls,a,v ∈ LS,A,V , S = {s1 , s2 , ..., sn }, A = a1 , a2 , ..., an {a}. This basically means that we lock each state-action pair in LS,A , and find the respective duplicate state-action pairs over the remaining entries, which are summed and squared to represent the QUBO entries. For this first QUBO manipulation there are several conditions, however, to be considered for writing an entry: • An entry is only added if it is the summed and squared values are maximum or minimum per Li(v) . • An entry is only added if the state-action pairs Li(s,a) + Lj (s, a) match. • We intend to find the best action per state given n observations of respective length mn . As it is most likely that identical state-action pairs appear in different episodes, and as each state-action pair is given a separate QUBO-entry, even if it is identical to one added from another episode, they may not have the same value. We increase or decrease these values quadratically, in order to separate them from one another, which results in a separation or an amplification of identical state-actions based on their values. As we are minimizing energies and therefore multiply the state values by (−1): the smaller −((Li(n) + Lj )2 ) the better. We add the diagonal terms as follows Equation 13:  QU BO(i, j) + (L i(v) + Lj(v) ), QU BO(i, j) = QU BO(i, j), if Li(s,a) = Lj(s,a) and i = j (13) otherwise What follows next is the separation of different state values from one another, as we only want to find the optimal policy, which is the best action in a given state considering the future states. Games like Black Jack have a stochastic component, but nevertheless the history resulting in a state and n observations let us statistically determine what the most likely future states in a given states are. 11 We penalize identical states with different actions as described in Equation 14. QU BO(i, j) =  QU BO(i, j) + p, QU BO(i, j), if Li(s) = Lj(s) and Li(a) 6= Lj(a) and i 6= j (14) otherwise where p is a penalization constant, which should be set to according to the energy scale. In order to approximate a good policy not only based on high-valued observations, but chains of consecutive states with cumulative high reward, it is possible to consider chains of length h (the horizon) by manipulating the QUBO-entries of h consecutive states. While iterating over all episodes and states, we identify each state s0 following a state-action pair {s, a}, which may differ from episode to episode. For each of the consecutive states s0 we create or manipulate the respective entry according to Eqs. 15 - 17. where    QU BO(i, j) + (Li(v) + Lj+k(v) )2 , if c1   QU BO(i, j) = QU BO(i, j) − ((Li(v) + Lj+k(v) )2 ), if c2    QU BO(i, j), (15) otherwise c1 : Li−(k−1)(s,a) = Lj(s,a) and (Li(v) + Lj+k(v) ) > 0 and i 6= j (16) c2 : Li−(k−1)(s,a) = Lj(s,a) and (Li(v) + Lj+k(v) ) < 0 and i 6= j (17) and We initialize k with 1 so that in the first iteration i − (k − 1) = i, and in consecutive iterations i increases with k, and we always consider consecutive states. As identical state-action pairs from different episodes received separate entries, the more often a chain is successful, the more often all of its respective values are increased at different i, j in the matrix. Due to the penalization in Equation 14 different actions per state are already separated. The bigger the horizon, the more qubits we need to represent the problem, and the smaller the original problem must be so that it can be embedded without splitting it into sub-problems. 6 Experimental results and conclusions By formulating and embedding the QUBO-matrix on the QPU as specified, we are able to show that: • Given a policy α, which is defined as ”stick if the sum is 20 or 21, and else hit”, and a limited number of observations, we can use the QPU as a filter to identify the states or sequences of states that do not positively contribute to approximating the optimal state-value function. We can reduce the source state-action-value triples by up to 1/2, and by averaging over the remaining values per state, whereby we may still see duplicate state-action pairs in the result, we can generate an improved state-value function. The resulting state-value function, found by 12 the quantum-enhanced Monte Carlo algorithm, is at least equivalent or even better compared to one learned with purely classical Monte Carlo policy evaluation on all given state-action-value triples. Due to the partially stochastic nature of the game and the varying episode-length, the number of different source-state-action-value triples may vary, but here are two examples in support of our explanations: by setting n = 7, m = 500, we obtained 1072 different stateaction-value triples in the source data, with 1004 of them being distinct. With the QPU-filter, we could reduce the number of state-action-value triples to 618, over which we averaged. In another example, with unchanged n and m, we ran the algorithm 5 times, and summarized the result to 5393 state-action-value triples in the source data, with 4699 of them being distinct. With the QPU-filter, we could reduce the number state-action-value triples to 3019, over which we averaged. For the latter case, plotted in Figs. 6 and 7, the Euclidean distance from the state-value function found with the quantum-enhanced algorithm to the optimal state-value function found with the purely classical algorithm and 500,000 episodes (with varying numbers of states) is 2.01, whereas the distance from a state-value function determined with the purely classical algorithm to the (also purely classically determined) optimal policy is 3.26. • Given a random policy beta, in which an action is randomly chosen in each state, and a limited number of observations, we can use the QPU as a filter to identify the states or sequences of states that do not positively contribute to learning a policy which approximates an optimal policy. We can reduce the source state-action-value triples by up to 2/3, and by conducting a majority vote over the remaining actions per state we can approximate a policy that is equivalent or only slightly poorer than the policy found with the purely classical algorithm on all given state-action-value triples. By setting n = 7, m = 500 and running the algorithm 5 times and summarizing the result, we obtained 4904 state-action-value triples in the source data, with 4489 them being distinct. With the QPU-filter, we could reduce the number state-action-value triples to 1615. Due to the limited number of observations, we were not able to completely eliminate duplicate states with different actions in the quantum-classical algorithm. Thus, we applied a majority vote, and show that the results produced by the classical algorithm are only slightly better than the ones produced by the quantum-classical algorithm. However, the purely classical algorithm required 4904 state-action-value triples for making a decision, whereas the quantum-enhanced algorithm was able to filter out 3289 state-action-value triples and then find a qualitatively similar policy with only 1615 observations. In the described case, calculating the Euclidean distance from the policy found with the quantum-enhanced to the optimal policy found with the purely classical algorithm and 500,000 episodes (with varying numbers of states) is 10.2, whereas the distance from a policy determined with the purely classical algorithm to the (also purely classically determined) optimal policy is 9.8. Summing up, we were able to directly embed maximally 7 complete state-value functions generated on 500 observations each on the QPU. With each execution the results my slightly vary, which is because of the randomly chosen observations, based on which different numbers of different states-action-value triples are available. We used between 1,100 and 1,700 qubits, a number which also varied with different sets of observations. The considered horizon h can be of arbitrary length, and a discount factor may be used to scale the importance of the future states compared to the actual state, whereby 13 we applied discount factors from 0.1 - 0.9 in our experiments. We were able to show that we can partially formulate policy-evaluation and iteration as QUBO, such that it can be presented to and solved with the support of a D-Wave 2000Q QPU. We were also able to show that by augmenting Monte Carlo policy evaluation, which calculates the value function for a given policy using sampling, with the introduced algorithm, we obtain equivalent or slightly better results compared to averaging over n state-value functions or to each of the sub-optimal state-value functions (with identical m). The state-value functions we found based on the n episodes and sub-optimal state-value functions are still not optimal, compared to classically found state-value functions based on tens or hundreds of thousands of observations. Figure 5 shows the state value function (assuming the player has a usable ace) based on the classical Monte Carlo algorithm. Figure 6 shows the state-value function based learned from averaging over 5 iterations and 7 classically found state-value functions. Figure 7 shows the results produced by the quantum-classical algorithm, which, in this case, produces a better than the classical algorithms with the same parameters. Figure 5: Classical Monte Carlo: 500 episodes, policy α, no usable ace 14 Figure 6: Classical Monte Carlo: 500 episodes, 7 policies, policy α, no usable ace Figure 7: Quantum-enhanced Monte Carlo: 500 episodes, 7 policies, policy α, no usable ace 15 7 Future work In this report, we showed how to partially embed policy evaluation for discrete state spaces on the D-Wave QPU, whereas in our current work we aim to find quantum-classical algorithms capable of dealing with continuous state spaces, which is, i.e., ultimately useful in the context self-driving vehicles, where an agent needs to be able to make decisions considering a dynamically changing environment based on continuous state spaces. Furthermore, actions cannot necessarily be discretized, i.e., when we consider reinforcement learning in terms of self-learning/ healing machines, which we also aim to solve. We will continue to focus on solving practically relevant problems by means of quantum machine learning [22–27], quantum simulation, and quantum optimization. Acknowledgments Thanks go to VW Group CIO Martin Hofmann and VW Group Region Americas CIO Abdallah Shanti, who enable our research. 16 References [1] D-Wave (2017): Quantum Computing, How D-Wave Systems Work [04-24-2017]; URL: https://www.dwavesys.com/quantum-computing [2] M. Benedetti, J.R.-Gmez, R. Biswas, A. Perdomo-Ortiz (2015): Estimation of effective temperatures in quantum annealers for sampling applications: A case study with possible applications in deep learning; URL: https://arxiv.org/abs/1510.07611 [3] V. N. Smelyanskiy, D. Venturelli, A. Perdomo-Ortiz, S. Knysh, M. I. Dykman (2015): Quantum annealing via environment-mediated quantum diffusion; URL: https://arxiv.org/abs/1511.02581 [4] D. Venturelli, D. J.J. Marchand, G. Rojo (2015): Quantum Annealing Implementation of Job-Shop Scheduling; URL: https://arxiv.org/abs/1506.08479 [5] Z. Jiang, E. G. Rieffel (2015): Non-commuting two-local Hamiltonians for quantum error suppression; URL: https://arxiv.org/abs/1511.01997 [6] S. V. Isakov, G. Mazzola, V. N. Smelyanskiy, Z. Jiang, S. Boixo, H. Neven, M. Troyer (2015): Understanding Quantum Tunneling through Quantum Monte Carlo Simulations(2015); URL: https://arxiv.org/abs/1510.08057 [7] B. O’Gorman, A. Perdomo-Ortiz, R. Babbush, A. Aspuru-Guzik, V. Smelyanskiy (2014): Bayesian Network Structure Learning Using Quantum Annealing; URL: https://arxiv.org/abs/1407.3897 [8] E. G. Rieffel, D. Venturelli, B. O’Gorman, M. B. Do, E. Prystay, V. N. Smelyanskiy (2014): A case study in programming a quantum annealer for hard operational planning problems; https://arxiv.org/abs/1407.2887 [9] D. Venturelli, S. Mandr, S. Knysh, B. O’Gorman, R. Biswas, V. Smelyanskiy (2014): Quantum Optimization of Fully-Connected Spin Glasses; URL: https://arxiv.org/abs/1406.7553 [10] A. Perdomo-Ortiz, J. Fluegemann, S. Narasimhan, R. Biswas, V. N. Smelyanskiy (2014): A Quantum Annealing Approach for Fault Detection and Diagnosis of Graph-Based Systems; URL: https://arxiv.org/abs/1406.7601 [11] S. Boixo, T. F. Ronnow, S. V. Isakov, Z. Wang, D. Wecker, D. A. Lidar, J. M. Martinis, M. Troyer (2014): Quantum annealing with more than one hundred qubits; URL: https://arxiv.org/abs/1304.4595 [12] R. Babbush, A. Perdomo-Ortiz, B. O’Gorman, W. Macready, A. Aspuru-Guzik (2012): Construction of Energy Functions for Lattice Heteropolymer Models: Efficient Encodings for Constraint Satisfaction Programming and Quantum Annealing Advances in Chemical Physics, in press; URL: https://arxiv.org/abs/1211.3422 [13] L. Wang, T. F. Ronnow, S. Boixo, S. V. Isakov, Z. Wang, D. Wecker, D. A. Lidar, J. M. Martinis, M. Troyer (2013): Classical signature of quantum annealing; URL: https://arxiv.org/abs/1305.5837 17 [14] A. Perdomo-Ortiz, N. Dickson, M. Drew-Brook, G. Rose, A. Aspuru-Guzik (2012): Finding low-energy conformations of lattice protein models by quantum annealing; URL: https://arxiv.org/abs/1204.5485 [15] Los Alamos National Laboratory (2016): D-Wave 2X Quantum Computer; URL: http://www.lanl.gov/projects/national-security-education-center/information-sciencetechnology/dwave/ [16] F. Neukart, C. Seidel, G. Compostella, D. Von Dollen, S. Yarkoni, B. Parney (2017): Traffic flow optimization using a quantum annealer; arXiv preprint arXiv:1708.01625 [quant-ph] [17] A. Lucas (2014): Ising formulations of many NP problems; Frontiers in Physics; URL: http://journal.frontiersin.org/article/10.3389/fphy.2014.00005 [18] D. Korenkevych et al. (2016): Benchmarking Quantum Hardware for Training of Fully Visible Boltzmann Machines; arXiv:1611.04528 [quant-ph] [19] T. Lanting et al. (2013): Entanglement in a Quantum Annealing Processor; Phys. Rev. X 4, 021041 [20] M. Wiering, M. van Otterlo (2012): Reinforcement Learning and Markov Decision Processes; Springer, Heidelberg [21] R. S. Sutton, A. G. Barto (1998): Reinforcement Learning: an Introduction; MIT Press, Cambridge [22] F. Neukart, S. M. Moraru (2013): On Quantum Computers and Artificial Neural Networks; Signal Processing Research 2 (1), 1-11 [23] F. Neukart, S. M. Moraru (2014): Operations on Quantum Physical Artificial Neural Structures; Procedia Engineering 69, 1509-1517 [24] Springer Professional: Volkswagen Trials Quantum Computers; URL: https://www.springerprofessional.de/en/automotive-electronics—software/companies— institutions/volkswagen-trials-quantum-computers/12170146?wt mc=offsi.emag.mtzworldwide.rssnews.-.x [25] F. Neukart (2017): Quantum physics and the biological brain. In: Reverse Engineering the Mind. AutoUni Schriftenreihe, vol 94. Springer, Wiesbaden [26] A. Levit et al. (2017): Free-Energy-based Reinforcement Learning Using a Quantum Processor; arXiv:1706.00074v1 [cs.LG] [27] D. Crawford et al. (2016): Reinforcement Learning Using Quantum Boltzmann Machines; arXiv:1612.05695 [quant-ph] 18
7cs.IT
Intersection types for unbind and rebind∗ Mariangiola Dezani-Ciancaglini Paola Giannini Dip. di Informatica, Univ. di Torino, Italy Dip. di Informatica, Univ. del Piemonte Orientale, Italy Elena Zucca DISI, Univ. di Genova, Italy We define a type system with intersection types for an extension of lambda-calculus with unbind and rebind operators. In this calculus, a term t with free variables x1 , . . . , xn , representing open code, can be packed into an unbound term h x1 , . . . , xn | t i, and passed around as a value. In order to execute inside code, an unbound term should be explicitly rebound at the point where it is used. Unbinding and rebinding are hierarchical, that is, the term t can contain arbitrarily nested unbound terms, whose inside code can only be executed after a sequence of rebinds has been applied. Correspondingly, types are decorated with levels, and a term has type τ k if it needs k rebinds in order to reduce to a value of type τ . With intersection types we model the fact that a term can be used differently in contexts providing different numbers of unbinds. In particular, top-level terms, that is, terms not requiring unbinds to reduce to values, should have a value type, that is, an intersection type where at least one element has level 0. With the proposed intersection type system we get soundness under the call-by-value strategy, an issue which was not resolved by previous type systems. Introduction In previous work [12, 13] we introduced an extension of lambda-calculus with unbind and rebind operators, providing a simple unifying foundation for dynamic scoping, rebinding and delegation mechanisms. This extension relies on the following ideas: • A term h Γ | t i, where Γ is a set of typed variables called unbinders, is a value, of a special type code, representing “open code” which may contain free variables in the domain of Γ. • To be used, open code should be rebound through the operator t[r], where r is a (typed) substitution (a map from typed variables to terms). Variables in the domain of r are called rebinders. When the rebind operator is applied to a term h Γ | t i, a dynamic check is performed: if all unbinders are rebound with values of the required types, then the substitution is performed, otherwise a dynamic error is raised. For instance, the term1 h x, y | x + y i[x 7→ 1, y 7→ 2] reduces to 1 + 2, whereas both h x, y | x + y i[x 7→ 1] and h x:int | x + 1 i[x:int → int 7→ λ y.y + 1] reduce to error. Unbinding and rebinding are hierarchical, that is, the term t can contain arbitrarily nested unbound terms, whose inside code can only be executed after a sequence of rebinds has been applied2 . For instance, two rebinds must be applied to the term h x | x + h x | x i i in order to get an integer: h x | x + h x | x i i[x 7→ 1][x 7→ 2] −→ (1 + h x | x i)[x 7→ 2] −→ (1[x 7→ 2]) + (h x | x i[x 7→ 2]) −→⋆ 1 + 2 ∗ This work has been partially supported by MIUR DISCO - Distribution, Interaction, Specification, Composition for Object Systems, and IPODS - Interacting Processes in Open-ended Distributed Systems. 1 In the examples we omit type annotations when they are irrelevant. 2 See the Conclusion for more comments on this choice. E. Pimentel, B. Venneri and J. Wells (Eds.): Workshop on Intersection Types and Related Systems 2010 (ITRS 2010). EPTCS 45, 2011, pp. 45–58, doi:10.4204/EPTCS.45.4 c Dezani, Giannini and Zucca This work is licensed under the Creative Commons Attribution License. Intersection types for unbind and rebind 46 Correspondingly, types are decorated with levels, and a term has type τ k if it needs k rebinds in order to reduce to a value of type τ . With intersection types we model the fact that a term can be used differently in contexts which provide a different number k of unbinds. For instance, the term h x | x + h x | x i i above has type int2 ∧ code0 , since it can be safely used in two ways: either in a context which provides two rebinds, as shown above, or as a value of type code, as, e.g., in: (λ y.y[x 7→ 1][x 7→ 2]) h x | x + h x | x i i On the other side, the term h x | x + h x | x i i does not have type int1 , since by applying only one rebind with [x 7→ 1] we get the term 1 + h x | x i which is stuck. The use of intersection types allows us to get soundness w.r.t. the call-by-value strategy. This issue was not resolved by previous type systems [12, 13] where, for this reason, we only considered the callby-name reduction strategy. To see the problem, consider the following example. The term (λ y.y[x 7→ 2]) (1 + h x | x i) is stuck in the call-by-value strategy, since the argument is not a value, hence should be ill typed, even though the argument has type int1 , which is a correct type for the argument of the function. By using intersection types, this can be enforced by requiring arguments of functions to have value types, that is, intersections where (at least) one of the conjuncts is a type of level 0. In this way, the above term is ill typed. Note that a call-by-name evaluation of the above term gives (λ y.y[x 7→ 2]) (1 + h x | x i) −→ (1 + h x | x i)[x 7→ 2] −→ (1[x → 7 2]) + (h x | x i[x 7→ 2]) −→⋆ 1 + 2. Instead, the term (λ y.y[x 7→ 2]) h x | 1 + x i is well typed, and it reduces as follows in both call-by-value and call-by-name strategies: (λ y.y[x 7→ 2]) h x | 1 + x i −→ h x | 1 + x i[x 7→ 2] −→ 1 + 2. It is interesting to note that this phenomenon is due to the possibility for operators (in our case for +) of acting on arguments which are unbound terms. This design choice is quite natural in view of discussing open code, as in MetaML [23]. In pure λ -calculus there is no closed term which converges when evaluated by the lazy call-by-name strategy and is stuck when evaluated by the call-by-value strategy. Instead there are closed terms, like (λ x.λ y.y)((λ z.z z)(λ z.z z)), which converge when evaluated by the lazy call-by-name strategy and diverge when evaluated by the call-by-value strategy, and open terms, like (λ x.λ y.y)z, which converge when evaluated by the lazy call-by-name strategy and are stuck when evaluated by the call-by-value strategy.3 In summary, the contribution of this paper is the following. We define a type system for the calculus of Dezani et al. [12, 13], where, differently from those papers, we omit types on the lambda-binders in order to get the whole expressivity of the intersection type constructor [25]. The type system shows, in our opinion, an interesting and novel application of intersection types. Indeed, they handle in a uniform way the three following issues. • Functions may be applied to arguments of (a finite set of) different types. • A term can be used differently in contexts providing different numbers of unbinds. Indeed, an intersection type for a term includes a type of form τ k if the term needs k rebinds in order to reduce to a value of type τ . 3 Note that following Pierce [18] we consider only λ -abstractions as values, while for Plotkin [19] also variables are values. Dezani, Giannini and Zucca 47 • Most notably, the type system guarantees soundness for the call-by-value strategy, by requiring that top-level terms, that is, terms which do not require unbinds to reduce to values, should have value types. Paper Structure. In Section 1 we introduce the syntax and the operational semantics of the language. In Section 2 we define the type system and prove its soundness in Section 3. In Section 4 we discuss related and further work. 1 Calculus The syntax and reduction rules of the calculus are given in Figure 1. t Γ r :: = x | n | t1 + t2 | λ x.t | t1 t2 | h Γ | t i | t[r] | error term :: = x1 :T1 , . . . , xm :Tm type context :: = x1 :T1 → 7 t1 , . . . , xm :Tm 7→ tm (typed) substitution v :: = λ x.t | h Γ | t i | n rv :: = x1 :T1 7→ v1 , . . . , xm :Tm 7→ vm E σ value value substitution :: = [ ] | E + t | n + E | E t | v E | t[r, x:T 7→ E ] :: = x1 → 7 v1 , . . . , xm 7→ vm n1 + n2 −→ n (λ x.t) v −→ t{x 7→ v} h Γ | t i[rv ] −→ t{subst(rv )|dom(Γ) } h Γ | t i[rv ] −→ error n[rv ] −→ n (t1 + t2 )[rv ] −→ t1 [rv ] + t2 [rv ] (λ x.t)[rv ] −→ λ x.t[rv ] (t1 t2 )[rv ] −→ t1 [rv ] t2 [rv ] t[r][rv ] −→ t′ [rv ] error[rv ] −→ error t −→ t′ ñ = ñ1 +Z ñ2 (C TX ) (S UM ) (A PP ) if if Γ ⊆ tenv(rv ) Γ 6⊆ tenv(rv ) (R EBIND U NBINDY ES ) (R EBIND U NBIND N O ) (R EBIND N UM ) (R EBIND S UM ) (R EBINDA BS ) (R EBINDA PP ) if t[r] −→ t′ (R EBIND R EBIND ) (R EBIND E RROR ) t −→ error E 6= [ ] E [t] −→ E [t′ ] if evaluation context (untyped) substitution E 6= [ ] E [t] −→ error (C TX E RROR ) Figure 1: Syntax and reduction rules Terms of the calculus are the λ -calculus terms, the unbind and rebind constructs, and the dynamic error. Moreover, we include integers with addition to show how unbind and rebind behave on primitive data types. Unbinders and rebinders are annotated with types T, which will be described in the following section. Here it is enough to assume that they include standard int and functional types. Type contexts and substitutions are assumed to be maps, that is, order is immaterial and variables cannot appear twice. Intersection types for unbind and rebind 48 Free variables and application of a substitution to a term are defined in Figure 2. Note that an unbinder behaves like a λ -binder: for instance, in a term of shape h x | t i, the unbinder x introduces a local scope, that is, binds free occurrences of x in t. Hence, a substitution for x is not propagated inside t. Moreover, a condition, which prevents capture of free variables similar to the λ -abstraction case is needed. For instance, the term (λ y.h x | y i) (λ z.x) reduces to h x | y i{y 7→ λ z.x} which is stuck, i.e., it does not reduce to h x | λ z.x i, which would be wrong. However, λ -binders and unbinders behave differently w.r.t. α -equivalence. A λ -binder can be renamed, as usual, together with all its bound variable occurrences, whereas this is not safe for an unbinder: for instance, h x | x + 1 i[x 7→ 2] is not equivalent to h y | y + 1 i[x 7→ 2]. Only a global renaming, e.g., leading to h y | y + 1 i[y 7→ 2], would be safe.4 FV(x) = {x} FV(n) = 0/ FV(t1 + t2 ) = FV(t1 ) ∪ FV(t2 ) FV(λ x.t) = FV(t) \ {x} FV(t1 t2 ) = FV(t1 ) ∪ FV(t1 ) FV(h Γ | t i) = FV(t) \ dom(Γ) FV(t[r]) = FV(t) ∪ FV(subst(r)) S FV(x1 7→ t1 , . . . , xm 7→ tm ) = i∈1..m FV(ti ) x{σ } = v if σ (x) = v x{σ } = x if x 6∈ dom(σ ) n{σ } = n (t1 + t2 ){σ } = t1 {σ } + t2 {σ } (λ x.t){σ } = λ x.t{σ\{x} } if x 6∈ FV(σ ) (t1 t2 ){σ } = t1 {σ } t2 {σ } h Γ | t i{σ } = h Γ | t{σ\dom(Γ) } i if dom(Γ) ∩ FV(σ ) = 0/ t[x1 :T1 7→ t1 , . . . , xm :Tm 7→ tm ]{σ } = t{σ }[x1 :T1 7→ t1 {σ }, . . . , xm :Tm 7→ tm {σ }] Figure 2: Free variables and application of substitution The call-by-value operational semantics is described by the reduction rules and the definition of the evaluation contexts E . We denote by ñ the integer represented by the constant n, by tenv(r) and subst(r) the type context and the untyped substitution, respectively, extracted from a typed substitution r, by dom the domain of a map, by σ|{x1 ,...,xn } and σ\{x1 ,...,xn } the substitutions obtained from σ by restricting to or removing variables in set {x1 , . . . , xn }, respectively. Rules for sum and application (of a lambda to a value) are standard. The (R EBIND ) rules determine what happens when a rebind is applied to a term. There are two rules for the rebinding of an unbound term. Rule (R EBIND U NBINDY ES ) is applied when the unbound variables are all present (and of the required types), in which case the associated values are substituted, otherwise rule (R EBIND U NBIND N O) produces a 4 A more sophisticated solution [5] allows local renaming of unbinders by a “precompilation” step annotating variables with indexes, which can be α -renamed, but are not taken into account by the rebinding mechanism. Indeed, variable occurrences which are unbinders, rebinders, or bound to an unbinder, actually play the role of names rather than standard variables. Note that variables in a rebinder, e.g., x in [x 7→ 2], are not bindings, and x is neither a free, nor a bound variable. See the Conclusion for more comments on this difference. Dezani, Giannini and Zucca 49 dynamic error. This is formally expressed by the side condition Γ ⊆ tenv(r). Note that a rebind applied to a term may be stuck even though the variables are all present and of the right type, when the substitution is not defined. This may be caused by the fact that when applied to an unbound term, a substitution could cause capture of free variables (see the example earlier in this section). Rebinding a term which is a number or error does not affect the term. On sum, abstraction and application, the rebind is simply propagated to subterms, and if a rebind is applied to a rebound term, (R EBIND R EBIND ), the inner rebind is applied first. The evaluation order is specified by rule (C TX ) and the definition of contexts, E , that gives the call-by-value strategy. Finally rule (C TX E RROR ) propagates errors. To make rule selection deterministic, rules (C TX ) and (C TX E RROR ) are applicable only when E 6= [ ]. As usual −→⋆ is the reflexive and transitive closure of −→. When a rebind is applied, only variables which were explicitly specified as unbinders are replaced. For instance, the term h x | x + y i[x 7→ 1, y 7→ 2] reduces to 1 + y rather than to 1 + 2. In other words, the unbinding/rebinding mechanism is explicitly controlled by the programmer. Looking at the rules we can see that there is no rule for the rebinding of a variable. Indeed, it will be resolved only when the variable is substituted as effect of a standard application. For instance, the term (λ y.y[x 7→ 2]) h x | x + 1 i reduces to h x | x + 1 i[x 7→ 2]. Note that in rule (R EBINDA BS ), the binder x of the λ -abstraction does not interfere with the rebind, even in case x ∈ dom(r). Indeed, rebind has no effect on the free occurrences of x in the body of the λ abstraction. For instance, (λ x.x + h x | x i)[x 7→ 1] 2, which is α -equivalent to (λ y.y + h x | x i)[x 7→ 1] 2, reduces in some steps to 2 + 1. On the other hand, both λ -binders and unbinders prevent a substitution for the corresponding variable from being propagated in their scope, for instance: h x, y | x + λ x.(x + y) + h x | x + y i i[x 7→ 2, y 7→ 3] −→ 2 + (λ x.x + 3) + h x | x + 3 i A standard (static) binder can also affect code to be dynamically rebound, when it binds free variables in a substitution r, as shown by the following example: (λ x.λ y.y[x 7→ x] + x) 1 h x | x + 2 i −→ (λ y.y[x 7→ 1] + 1) h x | x + 2 i −→ h x | x + 2 i[x 7→ 1] + 1 −→ 1 + 2 + 1. Note that in [x 7→ x] the two occurrences of x refer to different variables. Indeed, the second is bound by the external lambda whereas the first one is a rebinder. 2 Type system We have three kinds of types: primitive types τ , value types V, and term types T; see Figure 3. T :: = τ k | T1 ∧ T2 (k ∈ N) term type 0 value type V :: = τ | V ∧ T τ :: = int | code | T → T ′ primitive type Figure 3: Types Primitive types characterise the shape of values. In our case we have integers (int), functions (T → T ′ ), and code, which is the type of a term h Γ | t i, that is, (possibly) open code. Term types are primitive types decorated with a level k or intersection of types. If a term has type τ k , then by applying k rebind operators to the term we get a value of primitive type τ . We abbreviate a type τ 0 by τ . Terms have the intersection type T1 ∧ T2 when they have both types T1 and T2 . On intersection Intersection types for unbind and rebind 50 we have the usual congruence due to idempotence, commutativity, associativity, and distributivity over arrow type, defined in the first four clauses of Figure 4. Value types characterise terms that reduce to values, so they are intersections in which (at least) one of the conjuncts must be a primitive type of level 0. For instance, the term h x : int | h y : int | x + y i i has type code0 ∧ code1 ∧ int2 , since it is code that applying one rebinding produces code that, in turn, applying another rebinding produces an integer. The term h x : int | x + h y : int | y + 1 i i has type code0 ∧ int2 since it is code that applying one rebinding produces the term n + h y : int | y + 1 i, for some n. Both code0 ∧ code1 ∧ int2 and code0 ∧ int2 are value types, whereas int1 , which is the type of term n + h y : int | y + 1 i, is not a value type. Indeed, in order to produce an integer value the term must be rebound (at least) once. The typing rule for application enforces the restriction that a term may be applied only to terms reducing to values, that is the call-by-value strategy. Similar for the terms associated with variables in a substitution. V V Let I = {1, . . . , m}. We write i∈I τiki and i∈1..m τiki to denote τ1k1 ∧ · · · ∧ τmkm . Note that any type T V V is such that T = i∈1..m τiki , for some τi and ki (i ∈ 1..m). Given a type T = i∈1..m τiki , with (T)⊕h we V denote the type i∈1..m τiki +h . T ≡ T ∧T T1 ∧ T2 ≡ T2 ∧ T1 (T → T1 )k ∧ (T → T2 )k ≡ (T → T1 ∧ T2 )k T1 ∧ (T2 ∧ T3 ) ≡ (T1 ∧ T2 ) ∧ T3 (T ′ → (T)⊕h )k+1 ≡ (T ′ → (T)⊕(h+1) )k Figure 4: Congruence on types Figure 4 defines congruence on types. In addition to the standard properties of intersection, the last clause says that the level of function types can be switched with the one of their results. That is, unbinding and lambda-abstraction commute. So rebinding may be applied to lambda-abstractions, since reduction rule (R EBINDA BS ) pushes rebinding inside. For instance, the terms h Γ | λ x.t i and λ x.h Γ | t i may be used interchangeably. intk ≤ intk+1 T2 ≤ T1 T1′ ≤ T2′ (T1 → T1′ )k ≤ (T2 → T2′ )k T1 ≤ T2 T2 ≤ T3 T1 ≤ T3 T1 ∧ T2 ≤ T1 T1 ≤ T1′ T2 ≤ T2′ T1 ∧ T2 ≤ T1′ ∧ T2′ T1 ≡ T2 T1 ≤ T2 Figure 5: Subtyping on types Subtyping, defined in Figure 5, expresses subsumption, that is, if a term has type T1 , then it can be used also in a context requiring a type T2 with T1 ≤ T2 . For integer types it is justified by the reduction rule (R EBIND N UM ), since once we obtain an integer value any number of rebindings may be applied.5 For intersections, it is intersection elimination. The other rules are the standard extension of subtyping 5 Note that the generalisation of intk ≤ intk+1 to T k ≤ T k+1 is sound but useless. Dezani, Giannini and Zucca 51 to function and intersection types, transitivity, and the fact that congruent types are in the subtyping relation. (T-I NTER ) (T-N UM ) (T-A BS ) Γ ⊢ t : T1 Γ ⊢ t : T2 Γ ⊢ t : T1 ∧ T2 Γ ⊢ n : int0 (T-S UM ) Γ, x:T ⊢ t : T ′ Γ ⊢ λ x.t : (T → T ′ )0 (T-U NBIND -0) (T-R EBIND ) (T-S UB ) Γ ⊢ t : T T ≤ T′ Γ ⊢ t : T′ Γ ⊢ t1 : intk Γ ⊢ t2 : intk Γ ⊢ t1 + t2 : intk (T-A PP ) Γ, Γ′ ⊢ t : T Γ ⊢ h Γ′ | t i : code0 Γ(x) = T Γ⊢x:T (T-E RROR ) Γ ⊢ error : T Γ ⊢ t1 : (V → T)0 Γ ⊢ t2 : V Γ ⊢ t1 t2 : T (T-U NBIND ) Γ ⊢ t : (T)⊕1 Γ ⊢ r : ok Γ ⊢ t[r] : T (T-VAR ) Γ, Γ′ ⊢ t : T Γ ⊢ h Γ′ | t i : (T)⊕1 (T-R EBINDING ) Γ ⊢ ti : Vi Vi ≤ Ti (i ∈ 1..m) Γ ⊢ x1 :T1 7→ t1 , . . . , xm :Tm 7→ tm : ok Figure 6: Typing rules Typing rules are defined in Figure 6. We denote by Γ, Γ′ the concatenation of the two type contexts Γ and Γ′ with disjoint domains, which turns out to be a type context (map) as well. A number has the value type int0 . With rule (T-S UB ), however, it can be given the type intk for any k. Rule (T-S UM ) requires that both operands of a sum have the same type, with rule (T-S UB ) the term can be given as level the biggest level of the operands. Rule (T-E RROR ) permits the use of error in any context. In rule (T-A BS ) the initial level of a lambda abstraction is 0 since the term is a value. With rule (T-S UB ) we may decrease the level of the return type by increasing, by the same amount, the level of the whole arrow type. This is useful since, for example, we can derive ⊢ λ x.x + h y:int | y + h z:int | z i i : (int → int1 )1 by first deriving the type (int → int2 )0 for the term, and then applying (T-S UB ). Therefore, we can give type to the rebinding of the term, by applying rule (T-R EBINDING ) that requires that the term to be rebound has level bigger than 0, and whose resulting type is decreased by one. For example, ⊢ (λ x.x + h y:int | y + h z:int | z i i)[y:int 7→ 5] : (int → int1 )0 which means that the term reduces to a lambda abstraction, i.e., to a value, which applied to an integer needs one rebind in order to produce an integer or error. The rule (T-A PP ) assumes that the type of the function be a level 0 type. This is not a restriction, since using rule (T-S UB ), if the term has any function type it is possible to assign it a level 0 type. The type of the argument must be a value type. This condition is justified by the example given in the introduction. The two rules for unbinds reflect the fact that code is both a value, and as such has type code0 , and also a term that needs one more rebinding than its body in order to produce a value. Taking the intersection of the types derived for the same unbind with these two rules we can derive a value type for the unbind and use it as argument of an application. For example typing h y : int | y i by code0 ∧ int1 we can derive type int0 for the term Intersection types for unbind and rebind 52 (λ x.2 + x[y: int 7→ 3])h y : int | y i. The present type system only takes into account the number of rebindings which are applied to a term, whereas no check is performed on the name and the type of the variables to be rebound. This check is performed at runtime by rules (R EBIND U NBINDY ES ) and (R EBIND U NBIND N O ). In papers introducing the calculus [12, 13] we have also provided an alternative type system (for the call-by-name calculus) such that this check is statically perfomed, see the Conclusion for more comments. Note that terms which are stuck since application of substitution is undefined, such as the previous example (λ y.h x | y i) (λ z.x), are ill typed. Indeed, in the typing rules for unbinding, unbinders are required to be disjoint from outer binders, and there is no weakening rule. Hence, a type context for the example should simultaneously include a type for x and not include a type for x in order to type λ z.x and λ y.h x | y i, respectively. For the same reason, a peculiarity of the given type system is that weakening does not hold, in spite of the fact that no notion of linearity is enforced. 3 Soundness of the type system The type system is safe since types are preserved by reduction and a closed term with value type is a value or error or can be reduced. In other words the system has both the subject reduction and the progress properties. Note that a term that may not be assigned a value type can be stuck, as for example 1 + h x:int | x i, which has type int1 . The proof of subject reduction (Theorem 5) is standard. We start with a lemma (Lemma 1) on the properties of the equivalence and pre-order relation on types, which can be easily shown by induction on their definitions. Then we give an Inversion Lemma (Lemma 2), a Substitution Lemma (Lemma 3) and a Context Lemma (Lemma 4). Lemmas 2 and 3 can be easily shown by induction on type derivations. The proof of Lemma 4 is by structural induction on contexts. Lemma 1 1. If V i∈I (Ti V → Ti′ )0 ≡ (T → T ′ )0 , then Ti ≡ T for all i ∈ I and V ′ i∈I Ti ≡ T ′. 2. If i∈I (Ti → Ti′ )0 ≤ T, then there are L, T̂l , T̂l′ , (l ∈ L), such that T ≡ l ∈ L there is Jl ⊆ I with V l∈L (T̂l → T̂l′ )0 , and for all • T̂l ≤ T j for all j ∈ Jl , and V • j∈Jl T̂ ′j ≤ Tl′ . Lemma 2 (Inversion Lemma) 1. If Γ ⊢ x : T, then Γ(x) ≤ T. 2. If Γ ⊢ n : T, then int0 ≤ T. 3. If Γ ⊢ t1 + t2 : T, then int0 ≤ T and Γ ⊢ t1 : T and Γ ⊢ t2 : T. 4. If Γ ⊢ λ x.t : T, then there are m, Ti , Ti′ (i ∈ 1..m) such that T ≡ (i ∈ 1..m). V i∈1..m (Ti → Ti′ )0 , and Γ, x:Ti ⊢ t : Ti′ 5. If Γ ⊢ t1 t2 : T, then there is V such that Γ ⊢ t1 : (V → T)0 and Γ ⊢ t2 : V. V ki i∈1..m τi , then : τiki −1 for all ki > 6. If Γ ⊢ h Γ′ | t i : • Γ, Γ′ ⊢ t • τi = code for all ki = 0. 0, and Dezani, Giannini and Zucca 53 When m = 1 and k1 = 0 we also have Γ, Γ′ ⊢ t : T ′ , for some T ′ . 7. If Γ ⊢ t[r] : V ki i∈1..m τi , then Γ ⊢ t : V ki +1 i∈1..m τi and Γ ⊢ r : ok. 8. If Γ ⊢ x1 :T1 7→ t1 , . . . , xm :Tm 7→ tm : ok, then there are Vi ≤ Ti for i ∈ 1..m such that Γ ⊢ ti : Vi . Proof By induction on typing derivations. We only consider some interesting cases. For Point (4), if the last applied rule is (T-S UB ), then the result follows by induction from Lemma 1(2). For the same Point if the last applied rule is (T-I NTER ), then let Γ ⊢ λ x.t : T ∧ T ′ . By induction hypothesis there are m, m′ , Ti , T ′j , T̂i , T̂ ′j (i ∈ 1..m, j ∈ 1..m′ ) such that: • T≡ V i∈1..m (Ti → T̂i )0 , • Γ, x:Ti ⊢ t : T̂i (i ∈ 1..m), • T′ ≡ V ′ j∈1..m′ (T j → T̂ ′j )0 , and • Γ, x:T ′j ⊢ t : T̂ ′j ( j ∈ 1..m′ ). V V Therefore T ∧ T ′ ≡ i∈1..m (Ti → T̂i )0 ∧ j∈1..m′ (T ′j → T̂ ′j )0 . For Point (5) if the last applied rule is (T-I NTER ), then let Γ ⊢ t1 t2 : T1 ∧ T2 . By induction hypothesis we have Γ ⊢ t1 : Vi → Ti and Γ ⊢ t2 : Vi , for some Vi , i = 1, 2. We derive Γ ⊢ t1 : (V1 → T1 ) ∧ (V2 → T2 ) and Γ ⊢ t2 : V1 ∧ V2 by rule (T-I NTER ). Since (V1 → T1 ) ∧ (V2 → T2 ) ≤ V1 ∧ V2 → T1 ∧ T2 , applying rule (T-S UB ) we get Γ ⊢ t1 : V1 ∧ V2 → T1 ∧ T2 . Lemma 3 (Substitution Lemma) If Γ, x:T ⊢ t : T ′ , and Γ ⊢ v : T, then Γ ⊢ t{x 7→ v} : T ′ . Lemma 4 (Context Lemma) Let Γ ⊢ E [t] : T, then • Γ ⊢ t : T ′ for some T ′ , and • if Γ ⊢ t′ : T ′ , then Γ ⊢ E [t′ ] : T, for all t′ . Theorem 5 (Subject Reduction) If Γ ⊢ t : T and t −→ t′ , then Γ ⊢ t′ : T. Proof By induction on reduction derivations. We only consider some interesting cases. If the applied rule is (A PP ), then (λ x.t) v −→ t{x 7→ v} From Γ ⊢ (λ x.t) v : T by Lemma 2, case (5) we have that: there is V such that Γ ⊢ λ x.t : (V → T)0 and Γ ⊢ v : V. By Lemma 2, case (4) we have that there are m, Ti , Ti′ (i ∈ 1..m) such that (V → T)0 ≡ V (T → Ti′ )0 , and Γ, x:Ti ⊢ t : Ti′ (i ∈ 1..m). From Lemma 1(1) we get Ti ≡ V for all i ∈ 1..m and Vi∈1..m ′i i∈1..m Ti ≡ T. Then we can derive Γ, x:V ⊢ t : T using rules (T-S UB ) and (T-I NTER ). By Lemma 3 we conclude that Γ ⊢ t{x 7→ v} : T. If the applied rule is (R EBIND U NBINDY ES ), then h Γ′ | t i[rv ] −→ t{subst(rv )|dom(Γ′ ) } Γ′ ⊆ tenv(rv ) v ′ v ′ Let r|dom(Γ ′ ) = x1 :T1 7→ v1 , . . . , xm :Tm 7→ vm . Since Γ ⊆ tenv(r ) we have that Γ = x1 :T1 , . . . , xm :Tm . V V From Γ ⊢ h Γ′ | t i[rv ] : T by Lemma 2, case (7), we get T = i∈1..n τiki and Γ ⊢ h Γ′ | t i : i∈1..n τiki +1 and V Γ ⊢ rv : ok. From Lemma 2, case (6), we have that Γ, Γ′ ⊢ t : i∈1..n τiki . Moreover, by Lemma 2, case (8), and rule (T-S UB ) we have that Γ ⊢ rv : ok implies that Γ ⊢ vi : Ti for i ∈ 1..m. Applying m times Lemma 3, we derive Γ ⊢ t{subst(rv )|dom(Γ′ ) } : T. Intersection types for unbind and rebind 54 In order to show the Progress Theorem (Theorem 9), we start as usual with a Canonical Forms Lemma (Lemma 6). Then we state the standard relation between type contexts and free variables (Lemma 7), and lastly we prove that all closed terms which are rebound terms always reduce (Lemma 8). Lemma 6 (Canonical Forms) 1. If ⊢ v : int0 , then v = n. 2. If ⊢ v : code0 , then v = h Γ | t i. 3. If ⊢ v : (T → T ′ )0 , then v = λ x.t. Proof By case analysis on the shape of values. Lemma 7 If Γ ⊢ t : T, then FV(t) ⊆ dom(Γ). Proof By induction on type derivations. Lemma 8 If t = t′ [rv ] for some t′ and rv , and FV(t) = 0, / then t −→ t′′ for some t′′ . Proof Let t = t′ [r1v ] · · · [rnv ] for some t′ , r1v , . . . , rnv (n ≥ 1), where t′ is not a rebind. The proof is by mathematical induction on n. If n = 1, then one of the reduction rules is applicable to t′ [r1v ]. Note that, if t′ = h Γ | t1 i, then rule (R EBIND U NBINDY ES ) is applicable in case Γ is a subset of the type environment associated with r1v , otherwise rule (R EBIND U NBIND N O ) is applicable. v ]. If FV(t′ [rv ] · · · [rv ]) = 0, Let t = t′ [r1v ] · · · [rn+1 / then also FV(t′ [r1v ] · · · [rnv ]) = 0. / By induction hypothesis 1 n+1 ′ v v ′′ ′ v v ′′ v t [r1 ] · · · [rn ] −→ t , therefore t [r1 ] · · · [rn+1 ] −→ t [rn+1 ] with rule (R EBIND R EBIND ). Theorem 9 (Progress) If ⊢ t : V, then either t is a value, or t = error, or t −→ t′ for some t′ . Proof By induction on the derivation of ⊢ t : V with case analysis on the last typing rule used. If t is not a value or error, then the last applied rule in the type derivation cannot be (T-N UM ), (T-E RROR ), or (T-U NBIND ). Moreover the typing environment for the expression is empty, hence by Lemma 7 the last applied rule cannot be (T-VAR ). (T-A BS ), (T-U NBIND -0), If the last applied rule is theorem holds by induction. (T-S UB ), note that T ≤ V implies that T is a value type, and therefore the If the last applied rule is (T-A PP ), then t = t1 t2 , and taking into account that the resulting type must be a value type: ⊢ t1 : V ′ → V ⊢ t2 : V ′ ⊢ t1 t2 : V If t1 is not a value or error, then, by induction hypothesis, t1 −→ t1′ . So t1 t2 = E [t1 ] with E = [ ] t2 , and by rule (C TX ), t1 t2 −→ t1′ t2 . If t1 is error, we can apply rule (C ONT E RROR ) with the same context. It t1 is a value v, and t2 is not a value or error, then, by induction hypothesis, t2 −→ t2′ . So t1 t2 = E [t2 ] with E = v [ ], and by rule (C TX ), v t2 −→ v t2′ . If t2 is error, we can apply rule (C ONT E RROR ) with the same context. If both t1 and t2 are values, then by Lemma 6, case (3), t1 = λ x.t′ and, therefore, we can apply rule (A PP ). If the last applied rule is (T-S UM ), then t = t1 + t2 and taking into account that the resulting type must be a value type: ⊢ t1 : int0 ⊢ t2 : int0 ⊢ t1 + t2 : int0 Dezani, Giannini and Zucca 55 If t1 is not a value or error, then, by induction hypothesis, t1 −→ t1′ . So by rule (C TX ), with context E = [ ] + t2 , we have t1 + t2 −→ t1′ + t2 . If t1 is error, we can apply rule (C ONT E RROR ) with the same context. If t1 is a value, then, by Lemma 6, case (1), t1 = n1 . Now, if t2 is not a value or error, then, by induction hypothesis, t2 −→ t2′ . So by rule (C TX ), with context E = n1 + [ ], we get t1 + t2 −→ t1 + t2′ . If t2 is error, we can apply rule (C ONT E RROR ) with the same context. Finally, if t2 is a value, then by Lemma 6, case (1), t2 = n2 . Therefore rule (S UM ) is applicable. If the last applied rule is (T-R EBIND ), then t = t′ [r]. If some term ti in r is not a value, then by Lemma 2(7) and (8) ti is typed with a value type, and therefore ti −→ ti′ by induction, so t reduces using rule (C TX ). Otherwise t = t′ [rv ]. Since ⊢ t′ [rv ] : V, we have that FV(t′ [rv ]) = 0 / by Lemma 7. From Lemma 8 we get that t′ [rv ] −→ t′′ for some t′′ . 4 Conclusion We have defined a type system with intersection types for an extension of lambda-calculus with unbind and rebind operators introduced in previous work [12, 13]. Besides the traditional use of intersection types for typing (finitely) polymorphic functions, this type system shows two novel applications: • An intersection type expresses that a term can be used in contexts which provide a different number of unbinds. • In particular, an unbound term can be used both as a value of type code and in a context providing an unbind. This type system could be used for call-by-name with minor modifications. However, the call-byvalue case is more significant since the condition that the argument of an application must reduce to a value can be nicely expressed by the notion of value type. Moreover, only the number of rebindings which are applied to a term is taken into account, whereas no check is performed on the name and the type of the variables to be rebound; this check is performed at runtime. This solution is convenient, e.g., in distributed scenarios where code is not all available at compile time, or in combination with delegation mechanisms where, in case of dynamic error due to an absent/wrong binding, an alternative action is taken. In papers introducing the calculus [12, 13] we have also provided an alternative type system (for the call-by-name calculus) which ensures a stronger form of safety, that is, that rebinding always succeeds. The key idea is to decorate types with the names of the variables which need to be rebound, as done also by Nanevski and Pfenning [17]. In this way run-time errors arising from absence (or mismatch) in rebind are prevented by a purely static type system, at the price of quite sophisticated types. A similar system could be developed for the present calculus. Also the type system of Dezani et al. [12, 13] could be enriched with intersection types to get the stronger safety for the call-by-value calculus. Intersection types have been originally introduced [6] as a language for describing and capturing properties of λ -terms, which had escaped all previous typing disciplines. For instance, they were used in order to give the first type theoretic characterisation of strongly normalising terms [20], and later in order to capture (persistently) normalising terms [8]. Very early it was realised that intersection types had also a distinctive semantical flavour. Namely, they expressed at a syntactical level the fact that a term belonged to suitable compact open sets in a Scott domain [4]. Since then, intersection types have been used as a powerful tool both for the analysis and the synthesis of λ -models. On the one hand, intersection type disciplines provide finitary inductive 56 Intersection types for unbind and rebind definitions of interpretation of λ -terms in models [7], and they are suggestive for the shape the domain model has to have in order to exhibit specific properties [10]. More recently, systems with both intersection and union types have been proposed for various aims [3, 14], but we do not see any gain in adding union types in the present setting. Ever since the accidental discovery of dynamic scoping in McCarthy’s Lisp 1.0, there has been extensive work in explaining and integrating mechanisms for dynamic and static binding. The classical reference for dynamic scoping is Moreau’s paper [16], which introduces a λ -calculus with two distinct kinds of variables: static and dynamic. The semantics can be (equivalently) given either by translation in the standard λ -calculus or directly. In the translation semantics, λ -abstractions have an additional parameter corresponding to the application-time context. In the direct semantics, roughly, an application (λ x.t) v, where x is a dynamic variable, reduces to a dynamic let dlet x = v in t. In this construct, free occurrences of x in t are not immediately replaced by v, as in the standard static let, but rather reduction of t is started. When, during this reduction, an occurrence of x is found in redex position, it is replaced by the value of x in the innermost enclosing dlet, so that dynamic scoping is obtained. In our calculus, the behaviour of the dynamic let is obtained by the unbind and rebind constructs. However, there are at least two important differences. Firstly, the unbind construct allows the programmer to explicitly control the program portions where a variable should be dynamically bound. In particular, occurrences of the same variable can be bound either statically or dynamically, whereas Moreau [16] assumes two distinct sets. Secondly, our rebind behaves in a hierarchical way, whereas, taking Moreau’s approach [16] where the innermost binding is selected, a new rebind for the same variable would rewrite the previous one, as also in work by Dezani et al. [11]. For instance, h x | x i[x 7→ 1][x 7→ 2] would reduce to 2 rather than to 1. The advantage of our semantics, at the price of a more complicated type system, is again more control. In other words, when the programmers want to use “open code”, they must explicitly specify the desired binding, whereas in Moreau’s paper [16] code containing dynamic variables is automatically rebound with the binding which accidentally exists when it is used. This semantics, when desired, can be recovered in our calculi by using rebinds of the shape t[x1 7→ x1 , . . . , xn 7→ xn ], where x1 , . . . , xn are all the dynamic variables which occur in t. Other calculi for dynamic binding and/or rebinding have been proposed [9, 15, 5]. We refer to our previous papers introducing the calculus [12, 13] for a discussion and comparison. As already mentioned, an interesting feature of our calculus is that elements of the same set can play the double role of standard variables, which can be α -renamed, and names, which cannot be α renamed (if not globally in a program) [2, 17]. The crucial difference is that in the case of standard variables the matching betweeen parameter and argument is done on a positional basis, as demonstrated by the de Bruijn notation, whereas in the case of names it is done on a nominal basis. An analogous difference holds between tuples and records, and between positional and name-based parameter passing in languages, as recently discussed by Rytz and Odersky [21]. Distributed process calculi provide rebinding of names, see for instance the work of Sewell [22]. Moreover, rebinding for distributed calculi has been studied [1], where, however, the problem of integrating rebinding with standard computation is not addressed, so there is no interaction between static and dynamic binding. Finally, an important source of inspiration has been multi-stage programming as, e.g., in MetaML [23], notably for the idea of allowing (open) code as a special value, the hierarchical nature of the unbind/rebind mechanism and, correspondingly, of the type system. The type system of Taha and Sheard [23] is more expressive than the present one, since both the turn-style and the types are decorated with integers. A deeper comparison will be subject of further work. Dezani, Giannini and Zucca 57 In order to model different behaviours according to the presence (and type concordance) of variables in the rebinding environment, we plan to add a construct for conditional execution of rebind [11]. With this construct we could model a variety of object models, paradigms and language features. Future investigation will also deal with the general form of binding discussed by Tanter [24], which subsumes both static and dynamic binding and also allows fine-grained bindings which can depend on contexts and environments. Acknowledgments. We warmly thank the anonymous referees for their useful comments. In particular, one referee warned us about the problem of avoiding variable capture when applying substitution to an unbound term. We also thank Davide Ancona for pointing out the work by Rytz and Odersky [21] and the analogy among the pairs variable/name, tuple/record, positional/nominal, any misinterpretation is, of course, our responsibility. References [1] Davide Ancona, Sonia Fagorzi & Elena Zucca (2008): A Parametric Calculus for Mobile Open Code. In: DCM’07. ENTCS 192(3), Elsevier, pp. 3–22, doi:10.1016/j.entcs.2008.10.024. [2] Davide Ancona & Eugenio Moggi (2004): A Fresh Calculus for Name Management. In: GPCE’04. LNCS 3286, Springer, pp. 206–224, doi:10.1007/978-3-540-30175-2 11. [3] Franco Barbanera, Mariangiola Dezani-Ciancaglini & Ugo de’ Liguoro (1995): Intersection and Union Types: Syntax and Semantics. Information and Computation 119, pp. 202–230, doi:10.1006/inco.1995.1086. [4] Henk P. Barendregt, Mario Coppo & Maraingiola Dezani-Ciancaglini (1983): A filter lambda model and the completeness of type assignment. The Journal of Symbolic Logic 48(4), pp. 931–940, doi:10.2307/2273659. [5] Gavin Bierman, Michael W. Hicks, Peter Sewell, Gareth Stoyle & Keith Wansbrough (2003): Dynamic Rebinding for Marshalling and Update, with Destruct-Time λ . In: ICFP’03. ACM Press, pp. 99–110, doi:10.1145/944705.944715. [6] Mario Coppo & Mariangiola Dezani-Ciancaglini (1980): An extension of the basic functionality theory for the λ -calculus. Notre Dame Journal of Formal Logic 21(4), pp. 685–693, doi:10.1305/ndjfl/1093883253. [7] Mario Coppo, Mariangiola Dezani-Ciancaglini, Furio Honsell & Giuseppe Longo (1984): Extended type structures and filter lambda models. In: Logic colloquium ’82. North-Holland, pp. 241–262, doi:10.1016/S0049-237X(08)71819-6. [8] Mario Coppo, Mariangiola Dezani-Ciancaglini & Maddalena Zacchi (1987): Type theories, Information and Computation 72(2), pp. 85–116, normal forms, and D∞ -lambda-models. doi:10.1016/0890-5401(87)90042-3. [9] Laurent Dami (1997): A Lambda-Calculus for Dynamic Binding. Theoretical Computer Science 192(2), pp. 201–231, doi:10.1016/S0304-3975(97)00150-3. [10] Mariangiola Dezani-Ciancaglini, Silvia Ghilezan & Silvia Likavec (2004): Behavioural Inverse Limit lambda-models. Theoretical Computer Science 316(1–3), pp. 49–74, doi:10.1016/j.tcs.2004.01.023. [11] Mariangiola Dezani-Ciancaglini, Paola Giannini & Oscar Nierstrasz (2008): A Calculus of Evolving Objects. Scientific Annals of Computer Science 18, pp. 63–98. [12] Mariangiola Dezani-Ciancaglini, Paola Giannini & Elena Zucca (2009): The essence of static and dynamic bindings. In: ICTCS’09. http://www.disi.unige.it/person/ZuccaE/Research/papers/ICTCS09-DGZ.pdf. [13] Mariangiola Dezani-Ciancaglini, Paola Giannini & Elena Zucca (2010): Extending lambdacalculus with unbind and rebind. RAIRO - Theoretical Informatics and Applications To appear. http://www.disi.unige.it/person/ZuccaE/Research/papers/ITA10.pdf. 58 Intersection types for unbind and rebind [14] Alain Frisch, Giuseppe Castagna & Veronique Benzaken (2008): Semantic Subtyping: dealing settheoretically with function, union, intersection, and negation types. Journal of the ACM 55(4), pp. 1–64, doi:10.1145/1391289.1391293. Extends and supersedes LICS’02 and ICALP/PPDP’05 articles. [15] Oleg Kiselyov, Chung-chieh Shan & Amr Sabry (2006): Delimited dynamic binding. In: ICFP’06. ACM Press, pp. 26–37, doi:10.1145/1159803.1159808. [16] Luc Moreau (1998): A Syntactic Theory of Dynamic Binding. Higher Order and Symbolic Computation 11(3), pp. 233–279, doi:10.1023/A:1010087314987. [17] Aleksandar Nanevski & Frank Pfenning (2005): Staged computation with names and necessity. Journal of Functional Programming 15(5), pp. 893–939, doi:10.1017/S095679680500568X. [18] Benjamin C. Pierce (2002): Types and Programming Languages. MIT Press. [19] Gordon Plotkin (1977): LCF considered as a programming language. Theoretical Computer Science 5, pp. 225–255, doi:10.1016/0304-3975(77)90044-5. [20] Garrel Pottinger (1980): A type assignment for the strongly normalizable λ -terms. In: To H. B. Curry: essays on combinatory logic, lambda calculus and formalism. Academic Press, pp. 561–577. [21] Lukas Rytz & Martin Odersky (2010): Named and default arguments for polymorphic object-oriented languages. In: OOPS’10. ACM Press, pp. 2090–2095, doi:10.1145/1774088.1774529. [22] Peter Sewell, James J. Leifer, Keith Wansbrough, Mair Allen-Williams, Francesco Zappa Nardelli, Pierre Habouzit & Viktor Vafeiadis (2007): Acute: High-level programming language design for distributed computation: Design rationale and language definition. Journal of Functional Programming 17(4-5), pp. 547–612, doi:10.1017/S0956796807006442. [23] Walid Taha & Tim Sheard (2000): MetaML and multi-stage programming with explicit annotations. Theoretical Computer Science 248(1-2), pp. 211–242, doi:10.1016/S0304-3975(00)00053-0. [24] Èric Tanter (2009): Beyond Static and Dynamic Scope. In: Dynamic Languages Symposium’09. ACM Press, pp. 3–14, doi:10.1145/1640134.1640137. [25] Betti Venneri (1994): Intersection Types as Logical Formulae. Journal of Logic and Computation 4(2), pp. 109–124, doi:10.1093/logcom/4.2.109.
6cs.PL
arXiv:1711.08278v1 [cs.CV] 22 Nov 2017 Neuron-level Selective Context Aggregation for Scene Segmentation Zhenhua Wang* Hebrew University of Jerusalem Fanglin Gu* Shandong University [email protected] [email protected] Dani Lischinski Hebrew University of Jerusalem Daniel Cohen-Or Tel Aviv University Changhe Tu Shandong University [email protected] [email protected] [email protected] Baoquan Chen Shandong University [email protected] formed through the use of deep neural networks. Long et al. [13] proposed a fully convolutional network which can be trained end-to-end to predict a dense labeling map, capable of extracting coarse object shapes. This approach was extended by Noh et al. [15] by introducing multiple deconvolutional layers to gradually capture the finer details. In these pure CNN-based methods, the representations of neurons in the convolutional feature maps are extracted from limited receptive fields, capturing only local information. Abstract Contextual information provides important cues for disambiguating visually similar pixels in scene segmentation. In this paper, we introduce a neuron-level Selective Context Aggregation (SCA) module for scene segmentation, comprised of a contextual dependency predictor and a context aggregation operator. The dependency predictor is implicitly trained to infer contextual dependencies between different image regions. The context aggregation operator augments local representations with global context, which is aggregated selectively at each neuron according to its onthe-fly predicted dependencies. The proposed mechanism enables data-driven inference of contextual dependencies, and facilitates context-aware feature learning. The proposed method improves strong baselines built upon VGG16 on challenging scene segmentation datasets, which demonstrates its effectiveness in modeling context information. To address this problem, Liu et al. [12] propose to use the average feature of a layer as global context to augment the local features at each neuron. Yu and Koltun [28] introduce dilated convolutions to systematically aggregate multi-scale contextual information without losing resolution. Zhao et al. [30] exploit global context information by different region-based context aggregation through pyramid pooling. Although these methods improve the segmentation accuracy, they aggregate context in a predefined manner, which does not depend on the input image. Thus, they lack internal mechanisms for handling non-uniform dependencies among different image regions. 1. Introduction In another line of research, Shuai et al. [24] proposed Directed Acyclic Graph Recurrent Neural Networks (DAGRNNs) to leverage contextual information, thereby enhancing the representation ability of convolutional features. Their approach has demonstrated significant advances over the state-of-the-art on three challenging datasets. However, due to the gradient vanishing problem of RNNs [1, 16], the contextual information can only be propagated to nearby neurons, thus the long-range dependencies cannot be well captured. In fact, Shuai et al. [23] report that using DAGRNNs induced from 8-connected grids, significantly outperforms the 4-connected case. Moreover, due to the usage of Scene segmentation is a long standing fundamental problem in computer vision, which aims to associate a semantic object category label with each pixel in an image of a scene. It has long been recognized that taking into account the semantic context between image regions can significantly improve the performance of scene segmentation algorithms [8, 14, 21, 26]. As is the case in many other areas of computer vision, the state-of-the-art in scene segmentation has been trans* equal contribution 1 Contextual Dependency Predictor Convolutions # Context Aggregation Operator ! " Deconvolutions Neuron-level Selective Context Aggregation Input Predicted Labels Figure 1. An overview of the proposed scene segmentation network architecture. RNNs, the hidden vectors of DAG-RNNs must be sequentially updated, making it less efficient than pure CNN-based methods. In this work, we propose a new approach for selectively aggregating contextual information at each neuron, and doing so in an input-dependent manner, by introducing a novel context aggregation module. This module takes as input the feature map of a convolutional layer, and outputs a contextaware feature map. Specifically, this module consists of two main components: a contextual dependency predictor and a context aggregation operator. The dependency predictor is an auxiliary network that infers a coefficient representing the degree of dependency between each pair of neurons. Note that these coefficients are input-dependent. The context aggregator densely connects each output neuron to all the input neurons according to its predicted coefficients, yielding feature maps with enhanced context representation ability. These feature maps are then fed to a deconvolutional network to predict a semantic label map (see Fig. 1). We refer to the proposed module as a neuron-level Selective Aggregation (SCA) module, since each of its output neurons uses a different set of weights to aggregate contextual features from the input neurons. In summary, our work makes three main contributions: • We present a novel context aggregation module which selectively injects global context information into local representations, based on image-specific dependencies among neurons in the deep convolutional feature map. • We introduce a contextual dependency predictor that learns to infer image-specific dependencies between neurons. The resulting dependency coefficients allow each neuron to selectively aggregate context information from the entire image. • We apply the proposed network on the scene segmentation task, and demonstrate its effectiveness and potential on two large datasets. The rest of the paper is organized as follows: Sec. 2 discusses some work related to our method, Sec. 3 introduces the two components of the proposed new module, Sec. 4 gives the implementation details, and, finally, Sec. 5 reports the results of our experiments. 2. Related Works The semantic segmentation problem has been addressed by a wide variety of methods in recent years. Since visually similar pixels are locally indistinguishable, a major question that arises is how to leverage contextual information for disambiguation. Many methods rely on Probabilistic Graphical Models (PGMs), e.g. Markov Random Fields (MRFs) and Conditional Random Fields (CRFs), to account for context [21, 8, 27, 29, 18]. These methods usually require a pre-segmentation, such as superpixels, from which to extract features, and they are usually inefficient for inference due to the iterative solving of local beliefs. Due to the recent advances in deep neural networks, the mainstream methods of semantic segmentation usually adopt Convolutional Neural Networks (CNNs) as their basic component. Farabet et al. [6] feed their CNN with a multiscale pyramid of images, covering a large context. Pinheiro et al. [17] encode long range pixel label dependencies by using a recurrent CNN architecture. Sharma et al. [19] use a recursive neural network to recursively aggregate contextual information from local neighborhoods to the entire image and then propagate the global context back to individual local features. Shuai et al. [22] use a non-parametric model to represent global context, and transfer such information to local features extracted by CNN. Long et al. [13] propose a fully convolutional network to directly predict label map from the input image. Noh et al. [15] extend [13] by introducing multi-layer deconvolution networks. Liu et al. [12] propose to use the average feature of a layer as global context to augment the features at each neuron. Yu and Koltun [28] introduce dilated convolutions to systematically aggregate multi-scale contextual information without losing resolution. Zhao et al. [30] exploit global context information by different region-based context aggregation through pyramid pooling. Shuai et al. [24] utilize DAG-RNNs to embed context into local features. Different from all these methods, which use an input-independent and fixed manner to aggregate context, our method introduces a dynamic mechanism which aggregates context selectively at each neuron, and does so in an input-dependent manner. Our approach of using an auxiliary network to achieve input-dependent processing is similar in spirit to spatial transformer networks [7] and deformable convolution networks [5] 3. Our Approach Contextual information has been widely used in computer vision applications [8, 14, 21, 26]. In general, context can refer to any global information that has a facilitative effect on representation ability. Note, however, that a local representation may be influenced differently by different semantic categories of pixels in its context. For example, the presence of ‘sea’ pixels in an image is a more important clue for classifying nearby sand-colored pixels as ‘beach’, compared to ‘mountain’ pixels, since ‘sea’ and ‘beach’ have higher co-occurrence correlation. However, previous methods [12, 28, 30] usually embed global context into a local representation in a fixed and uniform way, thereby lacking internal mechanisms to effectively account for non-uniform dependencies among different image regions. To enhance the ability of handling non-uniform contextual information, we propose an input-dependent way to selectively incorporate context into the local representation. Fig. 1 shows an overview of our proposed segmentation network architecture. Given an input image I, the convolution layers gradually extract its abstract features, yielding a highlevel feature map X. Next, a neuron-level Selective Context Aggregation (SCA) module is applied onto X to augment it with context information. The SCA module consists of two components. The first component is the contextual dependency predictor network, which takes X as input, and through several hidden layers predicts a matrix A, which consists of the dependency coefficients between all pairs of neurons in X. A dependency coefficient aij attempts to predict the extent to which neuron xj should be accounted for in the context of neuron xi . Next, the context aggregation operator uses the predicted dependency matrix A to transform the input feature map X into a context-aware feature map H. Finally, several deconvolutional layers are applied on H to predict the final semantic segmentation label map. 3.1. Context Aggregation Operator Generally, a context aggregation operator aims to encode global contextual information into a local neuron representation. It takes as input a feature map X, and produces a context-aware feature map H with the same spatial dimensions (but possibly with a different number of channels). To fully exploit the context, the receptive field of this operator should cover the full size image. A naive approach is to use a fully-connected layer in which each output neuron is connected to all the input neurons. To be more specific, let xi ∈ RN and hi ∈ RM denote the feature vectors of the i-th neuron in X and H, respectively. Using a fully-connected Figure 2. An illustration of the proposed context aggregation operator on a 1D feature map. layer each neuron in H is given by: hi = n X Wij xj (1) j=1 where n is the number of input neurons in X, and Wij ∈ RM ×N is the weight matrix. As can be seen, Wij is particular to the i-th input neuron and the j-th output neuron. Thus, the learned weights are location sensitive, which is undesirable for dense label prediction, as the same category of pixels can appear anywhere in the image. Furthermore, after training, Wij is fixed during test time, and thus the context aggregation is input-independent. Finally, the fully-connected layer consumes a huge amount of learnable parameters, making it easy to overfit the training data. To address all these problems, we introduce a new aggregation operator. Our operator first uses two 1 × 1 convolutions to extract two different features, the identity feature and the context feature, for each neuron. The intuition is that the feature used to describe the neuron itself and the feature that describes its contribution to the context of other neurons may be different. Then, the output feature of a neuron is produced by linearly combining its own identity feature with the context features of all the other neurons, according to some input-dependent coefficients. Formally, the computation of the output neuron hi is defined as: hi = aii Wd xi + Pn n X 1 j=1,j6=i aij aij Wc xj (2) j=1,j6=i where aij is a coefficient which controls the amount of information taken from xj to hi , Wd ∈ RM ×N and Wc ∈ RM ×N are the weight matrices for extracting the identity and context features, respectively. In practice, we always set aii to 1 so that the output neuron takes all of its identity feature. Fig. 2 illustrates the computation procedure of the proposed operator for a single output neuron on a 1D feature map. Notably, this new operator has several appealing properties. First of all, the matrices Wd , Wc are shared across neurons, reducing the parameter space from n2 N M (for a fully-connected layer) to 2N M . Secondly, the operation preserves spatial information, thus it is suitable to be applied on dense prediction tasks. Thirdly, the coefficients aij are not fixed parameters, and are capable of representing arbitrary dependencies between different pairs of neurons. These dependencies may be manually defined, according to some prior knowledge, or automatically inferred for the specific input X. Here we adopt a data-driven paradigm, and introduce an auxiliary contextual dependency predictor (Sec. 3.2) that learns to infer the dependencies among neurons and provide on-the-fly input-dependent predictions for the proposed context aggregation operator. To allow backpropagation through the proposed operator, we must define the gradients of the loss L with respect to both the input feature map neurons xi and the coefficients aij . These gradients are given by n a ∂L ∂L X ∂L Pn ki WcT = aii WdT + , ∀i ∈ [1, n] ∂xi ∂hi ∂h a k kj j6=k k6=i (3) and Pn aik (Wc xj − Wc xk ) Pn , ∀j 6= i ( k6=i aik )2 (4) L where ∂h denotes the loss gradients with respect to h i rei ceived from top layer, denotes the element-wise multiplication, and the outermost sum in (4) is over the feature channel. X ∂L ∂L = ∂aij ∂hi k6=i minimize the final segmentation loss. The CDP should take a feature map X with n neurons as input, and output an n × n matrix A, in which each element aij represents the dependency coefficient between neuron xi and xj , for the context aggregation operator. To achieve this goal, we propose a new network architecture described below; also see Figure 3. Firstly, several 1 × 1 convolutional layers are applied on X to map the representation of each neuron into a higher-level feature space. Intuitively, the purpose of this mapping is to prevent the network from simply computing linear correlations between the neurons; instead, the network is able to explore higherlevel semantic relationships that may prove useful for the final semantic segmentation. In order to efficiently predict dependencies for all neuron pairs, we use a simple trick to construct a large feature map in which each location stores a concatenation of the mapped features of a particular neuron pair. Concretely, we reshape the 2D feature map to a 1D feature vector, expand it to two 2D square feature maps using horizontal and vertical replication, respectively, and then concatenate these two replicated feature maps through the depth channel. Using the resulting large feature map, we simply apply one more 1×1 convolutional layer to produce the dependency matrix. According to Eq. (4), the CDP can receive gradients from upper layers which enable it to be jointly trained with the main network without using extra supervision. It learns how to selectively incorporate context information, by producing appropriated dependency coefficients for different pairs of neurons, to help minimize the overall segmentation cost during training. 3.2. Contextual Dependency Predictor 4. Implementation Details The contextual dependency predictor (CDP) aims to estimate the dependencies between neurons of the input features. More precisely, given a pair of neurons (xi , xj ), the goal is to predict the weight that the context feature extracted from xj should be given when aggregating the context of neuron xi . Since each pair may be assigned a different weight, the global context information is encoded selectively into each neuron’s local representation. The dependency function between neurons may be modeled by a neural network. Typically, Siamese networks, which are popular for tasks that involve finding inherent relationships between two inputs, can be used to learn such a function. Training Siamese networks requires paired inputs and their corresponding ground truths. However, our input feature map is not organized as neuron pairs, and, more importantly, we do not have well-defined ground truth for the dependencies among such pairs. Our approach is thus to learn the dependency function implicitly, by training the CDP jointly with the context aggregation operator (as well as the rest of the network) to 4.1. Network Architecture The convolution layers of our network are adopted from the ImageNet pre-trained VGG16 network, i.e., all the layers before the 5-th pooling layer. Following [28], we remove the last two pooling and striding layers, and replace all subsequent convolutions with dilated convolutions of appropriate factors to make the last convolution layer produce a feature map that is 4 times larger. For the proposed SCA module, the dimensions of Wc and Wd in the context aggregation operator are both set to be 512 × 512. The contextual dependency predictor uses three 1 × 1 × 128 convolution layers to extract features, and uses a 1 × 1 × 1 convolution layer on the concatenated features to predict dependent coefficients. The deconvolution module is similar to that of a FCN [13]. Concretely, we convert the first fully-connected layer of VGG16 to a 7 × 7 × 4096 convolution layer, and convert the second one to a 1 × 1 × 4096 convolution layer. Then, a 1 × 1 × #classes convolution is applied to predict Figure 3. The architecture of the contextual dependency predictor. V-Replicate denotes a layer which vertically replicates the input 1D feature map to a 2D square feature map, and H-Replicate denotes the horizontally replicated one. scores for all classes in the dataset at each location. Finally, a bilinear upsampling layer is applied to resize the coarse score map to have the same resolution as the input. 4.2. Loss Re-weighting The class distributions in scene labeling datasets are usually highly unbalanced, thus, it is common to increase the weights of rare classes during training to improve their accuracies [6, 23]. In our work, we simply adopt the re-weighting strategy proposed in [23]. Specifically, the weight for class ci is defined as wi = 2dlog10 (η/fi )e where fi is the frequency of ci and η is a dataset dependent scalar defined by the 85%/15% rule on frequent/rare classes. 4.3. Training and Testing For training, since every component of the proposed segmentation network is differentiable, errors can be backpropagated to all network layers and parameters, making the network trainable using any gradient-based optimization method. In practice, we use min-batch gradient descent with momentum. During training, we use the “poly” learning rate policy, where current learning rate equals to iter the base learning rate multiplied by (1 − maxiter )0.9 . The base learning rate for the bottom convolution module is set to 10−3 , while it is set to 10−2 for both the SCA and the deconvolution modules. Due to the GPU memory limitations, we set the batch size to 3. The number of training epochs is set to 50. To augment training data, similarly to most of the previous methods, we adopt random horizontal flipping for all datasets. At test time, we simply do a forward pass of the test image to obtain the estimated label map. 5. Experiments Similarly to most previous works, we report results on three different evaluation metrics: Per-Pixel Accuracy (PPA), Class Average Accuracy (CAA) and mean Intersection over Union (mIoU). We extensively compare our proposed method with the-state-of-the-art methods on two large scene segmentation datasets: PASCAL Context [14] dataset contains 10103 images with an approximate resolution of 375 × 500, in which Kl 0 1 2 3 4 PPA 85.9% 86.0% 86.6% 86.3% 85.5% CAA 54.2% 54.1% 52.7% 54.2% 53.6% mIoU 38.9% 39.5% 38.7% 39.2% 38.0% Table 1. Results of using different Kl for the contextual dependency predictor on SIFT Flow. Kf is set to 128. 4999/5104 images are used for training/testing. These images originally come from Pascal VOC 2010 dataset, and are augmented with pixel-wise annotations of 540 classes. Following [14], we only consider the most frequent 59 classes in the evaluation. To enable batch-based training, we rescale and pad each image to be 448 × 448. COCO Stuff [2] dataset contains 10000 images in various resolutions, in which 9000/1000 images are used for training/testing. These images originally come from the Microsoft COCO dataset [10] with pixel-wise annotations of 80 Thing categories. They are further augmented with 91 Stuff categories. In total, there are 171 categories in this dataset. 5.1. Hyper-parameters Study To be fair, we conduct the hyper-parameter study on a third dataset, SIFT Flow [11]. This dataset is smaller compared to PASCAL Context and COCO Stuff, making it faster for tuning. It contains 2488/200 images for training/testing with a resolution of 256 × 256, and are annotated with 33 classes. Specifically, we study two hyper-parameters of the attention predictor: the number Kl of convolution layers for feature extraction and the number Kf of output feature channels of convolution in each layer. The results are shown in Tab. 1 and Tab. 2, respectively. We note that, for overall performance, Kl = 3 and Kf = 512 perform slightly better than other settings. In the following experiments, we will use these two values as the default setting. Kf 128 256 512 PPA 86.1% 86.9% 87.0% CAA 55.0% 54.5% 54.3% mIoU 40.0% 40.2% 40.7% Table 2. Results of using different Kf for the contextual dependency predictor on SIFT Flow. Kl is set to 3. (a) 5.2. Ablation Study To investigate the usefulness and effectiveness of the SCA module, we compare our method with two baselines that use different configurations of the SCA module. Note that, for a fair comparison, all these baselines use the same convolution and deconvolution modules as our proposed network. (b) • baseline-no We remove the dependency predictor and set aij = 1, ∀j = i and aij = 0, ∀j 6= i. In this case, the SCA module does not embed any context information into the local neuron representations, degenerating to a 1 × 1 convolution layer. • baseline-ave We remove the dependency predictor and set aij = 1, ∀i, j ∈ [1, n]. In this case, the SCA module embeds the averaged context features into local neuron representations. This is similar to the global context module proposed in [12], where the globally pooled feature is concatenated with the local feature everywhere. The results on both PASCAL Context and COCO Stuff are shown in Tab. 3. As can be seen, baseline-no performs the worst on most metrics as it does not explicitly embed context into local neuron representation. Although the use of dilated convolution can help to expand the theoretical receptive fields of neurons to aggregate context, the empirical receptive field that affects the neurons may still be small [12]. With the use of globally averaged features as context, the baseline-ave expand its receptive field to the entire image, thus improving the performance of baselineno. Our method further improves baseline-ave on all the metrics on both datasets by a significant margin. Since all the settings are the same except for the way of aggregating context, it demonstrates the effectiveness of the proposed neuron-level selective context aggregation. The proposed SCA module successfully models neuron-dependent contextual information, by exploring the dependencies between neurons, to facilitate context-aware feature learning. 5.3. Comparisons with the State of the Art The results on PASCAL Content dataset presented in Tab. 4. Comparing with previous CNN-based models, our method significantly outperforms all these methods on all metrics except for mIoU on UoA-Context+CRF. Consid- Figure 4. Visualization of dependency masks of different neurons. Red and green circles denote different regions corresponding to the selected neurons. ering RNN-based methods, our method outperforms CRFRNN by a large margin. For DAG-RNN, we perform better on PPA, and are worse than it on CAA and mIoU. The results on COCO Stuff are presented in Tab. 5. As can be seen, we also outperform all CNN-based methods, and perform better than DAG-RNN on CAA and worse than it on PPA and mIoU. The results on these two challenging datasets demonstrate the effectiveness of the proposed method. We also note that in DAG-RNN, skip-connections are used to fuse the features of higher layers with low level convolution features, which significantly improves their performance. In our method, to best investigate how the proposed SCA model helps to improve the representation ability of the last convolution features, we do not employ skipconnections in our architecture. Meanwhile, the RNNbased methods have to sequentially update their hidden vectors over time, which make them inappropriate to be parallelized to improve speed. In contrast, our method is a feedforward network, which can be easily parallelized. 5.4. Qualitative Results Fig. 4 visualizes the dependency maps for different selected neurons, from which we note that there are two different behaviors of the CDP. Firstly, as shown in Fig. 4(a), the two different selected neurons (indicated using green and red circles) generally have different dependency maps, as they belong to different classes. The CDP has learned to predict a different dependency map for each neuron, enhancing their local representation with different global context. Secondly, as shown in Fig. 4(b), there are also cases where two different neurons may have very similar dependency maps. This may be attributed to the fact that the salient regions, e.g., the birds here, provide an important baseline-no baseline-ave ours PASCAL Context PPA CAA mIoU 71.0% 51.0% 39.3% 72.1% 52.1% 41.1% 72.8% 54.4% 42.0% COCO Stuff PPA CAA mIoU 59.9% 41.2% 27.9% 60.8% 40.5% 27.6% 61.6% 42.5% 29.1% Table 3. Results of ablation study on PASCAL Context dataset and COCO Stuff dataset. Figure 5. Qualitative results selected in PASCAL Context dataset. We place a yellow circle on a selected region where most pixels inside are misclassified by the baseline-no method while are correctly classified by our method. The leftmost is the dependency mask corresponds to the select region. context for all other regions. Still, note that context of the green neuron in the grass region includes the surrounding grass regions, while these regions are not important for the semantic interpretation of the red neuron containing the bird’s head. To better understand how the proposed SCA module helps to improve segmentation accuracy, we show some visual examples from Pascal Context and COCO Stuff in Fig. 5 and Fig. 6, respectively. These examples are also included in the supplementary material with the full legend of label colors. For example, in the top row of Fig. 5 it may be seen that, without considering context, the top part of the bus is mislabeled as ‘car’. The dependency map for a neuron located in that region predicts high dependencies for other neurons in different parts of the bus, which are easier to recognize as such, and thus our method correctly labels the problematic area as ‘bus’. Similarly, in the top row of Fig. 6, part of the playing field is mislabeled as ‘grass’ in the baseline-no result. Neurons in that area are assigned a high dependency with the areas containing the players, which helps our method to correctly label the area as ‘playingfield’. Figure 6. Qualitative results selected in COCO Stuff dataset. We place a yellow circle on a selected region where most pixels inside are misclassified by the baseline-no method while are correctly classified by our method. The leftmost is the dependency mask corresponds to the select region. Table 4. Comparison with state-of-the-art methods on PASCAL Context dataset. Methods CFM et al. [4] DeepLab et al. [3] ParseNet et al. [12] ConvPP-8s et al. [25] FCN-8s et al. [20] UoA-Context+CRF et al. [9] CRF-RNN et al. [31] DAG-RNN et al. [24] ours PPA N/A N/A N/A N/A 67.5% 71.5% N/A 72.7% 72.8% CAA N/A N/A N/A N/A 52.3% 53.9% N/A 55.3% 54.4% mIoU 31.5% 37.6% 40.4% 41.0% 39.1% 43.3% 39.3% 42.6% 42.0% 6. Conclusion In this paper, we have presented a neuron-level selective context aggregation module for scene segmentation. The key idea is to augment local representation with global con- Table 5. Comparison with state-of-the-art methods on COCO Stuff dataset. Methods FCN et al. [2] DeepLab et al. [3] FCN-8s et al. [20] DAG-RNN et al. [24] ours PPA 52.0% 57.8% 60.4% 62.2% 61.6% CAA 34.4% 38.1% 38.5% 42.3% 42.5% mIoU 22.7% 26.9% 27.2% 30.4% 29.1% text which is selectively aggregated at each neuron according to its own dependencies, which are predicted on-the-fly by an auxiliary network. The strength of our method stems from that fact that the auxiliary network is jointly trained with the main network without extra supervision. It learns to predict appropriated dependency coefficients for different pairs of neurons to selectively aggregate context by minimizing the overall segmentation loss. This mechanism en- ables data-driven inference of contextual dependencies, and facilitates context-aware feature learning. Adding global context to local representation does not necessarily help in many cases. It mainly excels in harder cases, where otherwise local context alone might fail. In our current work, we learned general neuron dependencies. In the future, we consider narrowing down and focusing specifically on long-range dependencies, or possibly crossimage dependencies, where we analyze more than a single image in test time. We believe that learning dependency for co-segmentation is a viable research direction to further improve semantic segmentation capabilities. References [1] Y. Bengio, P. Simard, and P. Frasconi. Learning long-term dependencies with gradient descent is difficult. IEEE Transactions on Neural Networks, 5(2):157–166, 1994. 1 [2] H. Caesar, J. R. R. Uijlings, and V. Ferrari. COCO-Stuff: thing and stuff classes in context. CoRR, abs/1612.03716, 2016. 5, 8 [3] L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. L. Yuille. DeepLab: semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected CRFs. arXiv preprint arXiv:1606.00915, 2016. 8 [4] J. Dai, K. He, and J. Sun. Convolutional feature masking for joint object and stuff segmentation. In Proc. IEEE CVPR, pages 3992–4000, 2015. 8 [5] J. Dai, H. Qi, Y. Xiong, Y. Li, G. Zhang, H. Hu, and Y. Wei. Deformable convolutional networks. arXiv preprint arXiv:1703.06211, 2017. 3 [6] C. Farabet, C. Couprie, L. Najman, and Y. LeCun. Learning hierarchical features for scene labeling. IEEE Trans. Pattern Analysis and Machine Intelligence, 35(8):1915–1929, 2013. 2, 5 [7] M. Jaderberg, K. Simonyan, and A. Zisserman. Spatial transformer networks. In Advances in Neural Information Processing Systems, pages 2017–2025, 2015. 3 [8] P. Krähenbühl and V. Koltun. Efficient inference in fully connected CRFs with Gaussian edge potentials. In Advances in Neural Information Processing Systems, pages 109–117, 2011. 1, 2, 3 [9] G. Lin, C. Shen, A. van den Hengel, and I. Reid. Efficient piecewise training of deep structured models for semantic segmentation. In Proc. CVPR, pages 3194–3203, 2016. 8 [10] T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C. L. Zitnick. Microsoft COCO: Common objects in context. In Proc. ECCV, pages 740–755. Springer, 2014. 5 [11] C. Liu, J. Yuen, and A. Torralba. Nonparametric scene parsing: Label transfer via dense scene alignment. In Proc. IEEE CVPR, pages 1972–1979. IEEE, 2009. 5 [12] W. Liu, A. Rabinovich, and A. Berg. ParseNet: Looking wider to see better. arXiv preprint arXiv:1506.04579, 2015. 1, 2, 3, 6, 8 [13] J. Long, E. Shelhamer, and T. Darrell. Fully convolutional networks for semantic segmentation. In Proc. IEEE CVPR, pages 3431–3440, 2015. 1, 2, 4 [14] R. Mottaghi, X. Chen, X. Liu, N.-G. Cho, S.-W. Lee, S. Fidler, R. Urtasun, and A. Yuille. The role of context for object detection and semantic segmentation in the wild. In IEEE CVPR, pages 891–898, 2014. 1, 3, 5 [15] H. Noh, S. Hong, and B. Han. Learning deconvolution network for semantic segmentation. In Proc. IEEE ICCV, pages 1520–1528, 2015. 1, 2 [16] R. Pascanu, T. Mikolov, and Y. Bengio. On the difficulty of training recurrent neural networks. In Proc. ICML (3), volume 28, pages 1310–1318, 2013. 1 [17] P. H. Pinheiro and R. Collobert. Recurrent convolutional neural networks for scene labeling. In ICML, pages 82–90, 2014. 2 [18] A. Roy and S. Todorovic. Scene labeling using beam search under mutex constraints. In Proc. IEEE CVPR, pages 1178– 1185, 2014. 2 [19] A. Sharma, O. Tuzel, and M.-Y. Liu. Recursive context propagation network for semantic scene labeling. In Advances in Neural Information Processing Systems, pages 2447–2455, 2014. 2 [20] E. Shelhamer, J. Long, and T. Darrell. Fully convolutional networks for semantic segmentation. IEEE Trans. Pattern Analysis and Machine Intelligence, 39(4):640–651, 2017. 8 [21] J. Shotton, J. Winn, C. Rother, and A. Criminisi. TextonBoost for image understanding: Multi-class object recognition and segmentation by jointly modeling texture, layout, and context. International Journal of Computer Vision, 81(1):2–23, 2009. 1, 2, 3 [22] B. Shuai, G. Wang, Z. Zuo, B. Wang, and L. Zhao. Integrating parametric and non-parametric models for scene labeling. In Proc. IEEE CVPR. IEEE, 2015. 2 [23] B. Shuai, Z. Zuo, B. Wang, and G. Wang. DAG-recurrent neural networks for scene labeling. In Proc. IEEE CVPR, pages 3620–3629, 2016. 1, 5 [24] B. Shuai, Z. Zuo, B. Wang, and G. Wang. Scene segmentation with DAG-recurrent neural networks. IEEE Trans. Pattern Analysis and Machine Intelligence, 2017. 1, 2, 8 [25] S. Xie, X. Huang, and Z. Tu. Top-Down Learning for Structured Labeling with Convolutional Pseudoprior, pages 302– 317. Springer International Publishing, Cham, 2016. 8 [26] J. Yang, B. Price, S. Cohen, and M.-H. Yang. Context driven scene parsing with attention to rare classes. In IEEE CVPR, June 2014. 1, 3 [27] J. Yao, S. Fidler, and R. Urtasun. Describing the scene as a whole: Joint object detection, scene classification and semantic segmentation. In Proc. IEEE CVPR, pages 702–709, June 2012. 2 [28] F. Yu and V. Koltun. Multi-scale context aggregation by dilated convolutions. In Proc. ICLR 2016, 2016. 1, 2, 3, 4 [29] Y. Zhang and T. Chen. Efficient inference for fullyconnected CRFs with stationarity. In Proc. IEEE CVPR, pages 582–589. IEEE, 2012. 2 [30] H. Zhao, J. Shi, X. Qi, X. Wang, and J. Jia. Pyramid scene parsing network. In Proc. CVPR, 2017. 1, 2, 3 [31] S. Zheng, S. Jayasumana, B. Romera-Paredes, V. Vineet, Z. Su, D. Du, C. Huang, and P. H. Torr. Conditional random fields as recurrent neural networks. In Proc. IEEE ICCV, pages 1529–1537, 2015. 8
1cs.CV
arXiv:1611.07397v1 [cs.NI] 22 Nov 2016 Non-linear Barrier Coverage using Mobile Wireless Sensors Ashutosh Baheti Arobinda Gupta Dept. of Computer Sc. & Engineering Indian Institute of Technology, Kharagpur Kharagpur, WB-721302, India Email: [email protected] Dept. of Computer Sc. & Engineering Indian Institute of Technology, Kharagpur Kharagpur, WB-721302, India Email: [email protected] Abstract—A belt region is said to be k-barrier covered by a set of sensors if all paths crossing the width of the belt region intersect the sensing regions of at least k sensors. Barrier coverage can be achieved from a random initial deployment of mobile sensors by suitably relocating the sensors to form a barrier. Reducing the movement of the sensors is important in such scenarios due to the energy constraints of sensor devices. In this paper, we propose a centralized algorithm which achieves 1-barrier coverage by forming a non-linear barrier from a random initial deployment of sensors in a belt. The algorithm uses a novel idea of physical behavior of chains along with the concept of virtual force. Formation of non-linear barrier reduces the movement of the sensors needed as compared to linear barriers. Detailed simulation results are presented to show that the proposed algorithm achieves barrier coverage with less movement of sensors compared to other existing algorithms in the literature. Keywords—sensor network, barrier coverage, virtual force I. I NTRODUCTION A Wireless Sensor Network (WSN) consists of a set of sensor nodes. Each node can sense some physical parameters, and has limited computation and communication capability. The data sensed by the sensor nodes is usually transmitted to a central base station using a wireless network connecting the sensors for further processing. Mobile Wireless Sensor Networks (MWSNs) [1], [2], [3] are a class of wireless sensor networks in which some or all of the sensor nodes are mobile. Wireless sensor networks have been used for a wide variety of applications such as habitat monitoring, target tracking, intruder detection etc. Many different problems have been addressed on wireless sensor networks, such as routing, topology control, localization, coverage, data aggregation etc. In this work, we focus on the coverage problem in sensor networks, which addresses the problem of covering a given area or set of objects using sensors. Several different variations of the problem exist depending on the nature of coverage required. As an example, Area Coverage requires that all points in a given area are within the sensing field of at least one sensor. In contrast, Point Coverage requires that only a given set of points within an area be covered by at least one sensor. Many other definitions of coverage exist such as perimeter coverage, barrier coverage, sweep coverage, path coverage etc. [4]. In this paper, we focus on Barrier Coverage in sensor networks. A target belt region provides strong k-barrier cov- erage if all crossing paths (a path crossing the width of the belt region, originating from one parallel boundary of the belt region and terminating at the other) intersect the sensing region of at least k distinct sensors. In the rest of this paper, we will refer to strong barrier coverage as just barrier coverage. Barrier coverage has many important applications such as intrusion detection along international borders, identifying spread of lethal chemicals around chemical factories, detecting potential sabotage in gas pipelines etc. [5], [6]. Static WSNs may not always work well in barrier coverage applications for different reasons. In many applications, sensors cannot be placed exactly at the locations desired due to deployment constraints, and hence sensors may be randomly deployed around the area. Such applications can benefit from mobile WSNs if the deployed sensors can autonomously move after deployment to achieve the desired barrier coverage. Mobile sensors can also help in scenarios where one or more sensors fail, thereby breaking barrier coverage. In such scenarios, some of the nearby sensors can readjust their positions to recreate the barrier. However, designing algorithms that utilize mobility efficiently is a challenging problem. Keeping the energy constraint of battery-powered sensor devices in mind, algorithms for mobility control should be able to achieve barrier coverage with low movement of the sensors. There exist many works on formation of barrier coverage using mobile sensors. Some of these works propose centralized solutions for deploying sensors to achieve barrier coverage [7], [8], [6]. Centralized solutions are good since all the information is available at a central station. Hence, all computations regarding movement can be done centrally and only the final locations are sent to the sensors which then move to those locations. However, maintaining the information centrally incurs some overhead. To address this problem, distributed approaches in which sensors locally coordinate to adjust and move to their final positions have also been proposed [9], [10], [11], [12], [13]. However, most of these solutions (centralized or distributed) try to organize all sensors in a straight line to achieve barrier coverage. While a linear barrier is optimal with respect to the number of sensors needed to create a barrier, it can cause large redundant movement to move randomly deployed sensors to a linear configuration. In this paper, we propose a centralized algorithm for 1barrier coverage which, given a random deployment of sensors in a belt, creates a non-linear barrier of sensors that provides barrier coverage of the belt region. The proposed algorithm views the barrier as a chain of sensors whose sensing disks overlap with each other, and uses some novel ideas of physical behavior of a chain along with the concept of virtual force to move the sensors to achieve barrier coverage. Detailed simulation results are presented to show that the proposed algorithm achieves barrier coverage from random initial deployments with both less average displacement and less maximum displacement of the sensors compared to other existing algorithms in the literature. The rest of the paper is organized as follows. Section II discusses some related works. The problem statement is defined in Section III, Section IV describes the centralized algorithm and evaluates its performance. Finally, Section V concludes the work. II. R ELATED W ORKS Barrier coverage has been widely studied in WSNs [14], [15]. Saipulla et al. [6] suggested an approach to relocate sensors from an initial randomized line-based deployment model to replicate a scenario of sensors dropped from an aircraft. The work in [8] studied the problem of relocating mobile sensors with limited mobility in order to save energy. Bhattacharya et al. [7] proposed and solved an optimization problem to calculate an optimal movement strategy for barrier coverage on a circular region. All these approaches are centralized. Distributed approaches to barrier coverage formation are addressed in [12], [13], [9], [10], [16]. Kong et al. [12] used the concept of virtual forces to solve the kbarrier coverage. Silvestri [13] presented a novel approach MobiBar that outperforms the algorithm of [12] in k-barrier coverage. Cheng and Savkin [10] presented a decentralized approach of creating 1-barrier coverage between any two prespecified landmarks in the belt region. Shen et al. [9] suggested a centralized CBarrier and a distributed DBarrier(based on virtual forces) algorithm that create a barrier after an random initial deployment. Eftekhari et al. [16] presented distributed algorithms for barrier coverage using sensor relocation. All of the algorithms proposed in the literature (except DBarrier whose performance has been shown to be poorer than CBarrier) try to rearrange sensors on a straight line to form a linear barrier. Ban et al. [17] defined a special type of non-linear k-barrier coverage called grid barrier that is formed out of linear segments coinciding with grid boundaries in the region; however, the algorithm presented for 1-barrier coverage only (named CBGB) still forms linear barrier only. A linear barrier uses the minimum possible number of sensors, but causes more movement of the sensors to arrange them along a straight line. When some extra sensors (over the minimum number required) are available, forming a non-linear barrier can reduce the movement of the sensors and consequently cause less energy usage. Ban et al. [17] also presented a more general k-barrier coverage algorithm that creates a non-linear grid barrier by breaking the region into subregions, forming linear barriers in each subregions, and then forming vertical isolation barriers between subregions to connect the horizontal barriers. However, the algorithm uses very large number of redundant sensors, and for 1-barrier coverage (k = 1), provides no significant advantage over the CBGB algorithm. The algorithm proposed in this paper differs from the other algorithms (except DBarrier [9]) in that it finds truly non-linear barriers which reduces the movement of the sensors. The number of redundant sensors used is also low. III. P ROBLEM F ORMULATION We assume a rectangular belt region of length L and width W , with L  W . A set of N mobile sensors with unique IDs are initially randomly deployed in this belt region. Each sensor has a sensing range Rs and thus can cover a circular area of radius Rs centered around the position where the sensor is placed. We assume that a sensor knows its own location. The displacement of a sensor is defined as the Euclidean distance between the initial and final location of the sensor. As noted earlier, a centralized algorithm can compute the final location of the sensors and then the sensors can move to that location directly. Thus, the goal of the centralized barrier formation algorithm is to relocate the sensors to form 1-barrier coverage over the belt region while minimizing the average and maximum displacement of the sensors. IV. C ENTRALIZED A LGORITHM FOR BARRIER F ORMATION We first describe the intuition behind the proposed algorithm. A more formal description of the algorithm is given next. A barrier can be viewed as a physical chain where each sensor, with its imaginary sensing disk, is analogous to a circular chain link. In a physical chain, if one chain link is pulled, it will exert a force on all chain links connected to it, and a chain link connected to it will move when the distance between them becomes maximum, i.e., when their rims start touching. We primarily use this simple property in designing the algorithm. Some of the terms we will use to describe the operation of the algorithm are described below. • Chain Link: A chain link in the algorithm refers to a sensor with sensing radius Rs . We will use the terms sensor and chain link interchangeably in the rest of this paper. The leftmost sensor in the belt region is called the left chain link. Similarly, the rightmost sensor is called the right chain link. In case there are multiple leftmost (rightmost) sensors, any one sensor is chosen as the left (right) chain link. • Connected Chain Links: Two chain links are said to be connected if the sensing regions of the corresponding sensors intersect. Note that the distance between the centers of two connected chain links cannot be more than 2Rs . If one chain link is pulled, a chain link connected to it will feel a force when the distance between their centers becomes equal to 2Rs . • Chain Graph: Consider the undirected graph G with each chain link as a node and an edge added between two nodes if the corresponding chain links are connected. A chain graph is a connected component of G. The chain graph that contains the left chain link is called the left chain graph. Similarly, the chain graph containing the right chain link is called the right chain graph. Note that though a distance less than 2Rs between the positions of two sensors implies that the sensors are connected by the above definitions, sometimes we will delete a connection even if the distance is less than 2Rs to work with a subgraph of the chain graph. Such deletions will be clearly specified while describing the algorithm. Given the above virtual constructs, the main idea of the algorithm can be described as follows. Each chain graph, by virtue of its connectedness, can provide barrier coverage for a part of the belt region (the part between the left boundary of its leftmost chain link and the right boundary of its rightmost chain link). The algorithm tries to extend the barrier coverage to the entire belt region by merging smaller chain graphs into larger ones, until a large enough chain graph is formed that spans across the length of the belt. In order to merge two chain graphs, one special chain link of one chain graph is pulled towards a chain link of the other chain graph in steps, pulling the other chain links along with it until the two chains merge. We next describe this technique in more detail. 2) 3) A. Merging Chain Graphs Let C denote the set of all chain links (sensors). Let CG denote the set of chain links in a chain graph G. For any chain link u ∈ CG and v ∈ C \ CG , we define the force f (u, v) exerted on u by v as α f (u, v) = u ∈ CG , v ∈ C \ CG dist(u, v) where dist(u, v) is the Euclidean distance between u and v. Note that f represents the attractive force between two chain links in two chain graphs, with the force becoming stronger as the distance between the chain links decreases. α is simply a scaling parameter. For a chain link u in CG , let F (u) = max f (u, v) v u ∈ CG , ∀ v ∈ C \ CG denote the maximum force exerted on u by a chain link in another chain graph. Then the dominant point of the chain graph G is defined as the chain link dG ∈ CG such that F (dG ) is the maximum among all F (u), u ∈ CG . The chain link in a chain graph X 6= G that exerts the maximum force on dG is defined as the co-dominant point of G. If there are more than one pair of dominant and co-dominant points with the maximum force then we choose the pair which has a sensor with the lowest ID. For merging two chain graphs, we compute the dominant and the co-dominant points of the chain graphs and then pull the dominant point towards the co-dominant point using the attractive force defined, pulling the other chain links in the chain graph along with it. The movements of a chain link due to the attractive force as well as when a connected chain link is pulled follows the usual laws of physics. The algorithm for merging chain graphs works in four phases: 1) Initialization Phase: In this phase, the algorithm first identifies all the chain graphs based on the initial locations of the sensors. For each chain graph, a DFS spanning tree is constructed starting from an arbitrary node, and all edges not in the tree are deleted from 4) the chain graph. Removing an edge between two chain links implies that they are not considered as connected (even if their sensing regions overlap) in the rest of the algorithm and are not constrained to move together in any way. The DFS tree helps in identifying long paths in chain graphs that will be used to flatten the chain graphs later. At the end of this stage, all chain graphs to be considered are trees. We will refer to the DFS tree corresponding to a chain graph as a chain tree in the rest of this section. Left-Attach Phase: In this phase, the left chain link is pulled horizontally towards the left boundary of the belt until it touches the left boundary. Note that pulling the left chain link may pull other chain links in the left chain graph. Once the left chain link touches the left boundary, it is allowed to only slide along the width of the belt but is not allowed to move away from the left boundary in the rest of the algorithm. Right-Attach Phase: This phase is similar to the Left-Attach Phase, only difference being the right chain link is moved horizontally towards the right boundary of the belt in this case. Barrier-Formation Phase: This phase actually creates the barrier by merging chain graphs. The dominant point and co-dominant points are first determined for all chain graphs. The algorithm then iterates over the following step, with every iterative step corresponding logically to a time step τ of movement defined suitably. a) One chain graph G is picked up randomly from the set of chain graphs. b) The dominant point dG of G is moved towards the co-dominant point of G for duration τ (or until it touches the co-dominant point, whichever is earlier) following the laws of physics depending on the force f between them. Note that this may move other chain links in G, again following the laws of Physics. c) If dG does not touch the co-dominant point after the movement, the force f between dG and the co-dominant point is recomputed (as it may have changed due to the change in distance between them), and the algorithm goes to the next iteration. If dG touches the codominant point (the two chain graphs have merged), then the dominant and co-dominant point of all the chain graphs are recomputed before going to the next iteration. This phase terminates when the merging of the chain graphs causes a barrier to be formed. Thus, at each step of this phase, one chain graph is moved slightly. Note that moving one arbitrary chain graph completely in one step to cause two chain graphs to merge may cause a lot of redundant movement unless the proper chain graph is chosen; the random choice reduces this redundant movement in case of a bad choice of chain graph. Note that a chain graph can potentially cover a larger part of the belt if more nodes in it have degree two, as higher degree nodes in a chain graph cause more redundant nodes that do not contribute in extending the barrier. Therefore, at each step of moving the dominant point, a flattening logic is applied to the chain graph that flattens the chain to make it longer. B. Flattening Chain Graphs The flattening logic is applied to the chain tree formed from the chain graph. For any chain tree, the dominant point of the chain tree is defined as the root chain link of the tree. For any chain tree (except the left and the right chain trees) the longest path from the root chain link in the chain tree is first computed. This path is called the flatten path. The following step are applied after each step of the Barrier Formation phase. The flatten path is traversed starting from the root chain link until the first node with degree greater than two (branching) is found. Let this node be called the current chain link c. Let Nc denote the set of chain links connected to c and Sc denote the set of chain links connected to c but are not on the flatten path. For every chain link u ∈ Sc , the chain link v (v ∈ Nc \ Sc ) closest to u in the flatten path is found, and a small fixed attractive force (taken to be β × f , 0 < β << 1, where f is the force between the dominant and the co-dominant point of the chain graph) is exerted upon u towards v to make u move towards v. If u touches v as a result of this movement, an edge is added in the chain graph between u and v and the edge between c and v is deleted (even if their sensing regions overlap). Note that this extends the flatten path by one sensor (replacing the edge (c, v) in the flatten path with the edge (c, u) and (u, v)). The change in edges still maintains a tree. Thus, as the dominant point of a chain graph moves towards another chain graph in successive steps, the application of the above logic brings more and more nodes into the flatten path, eventually causing all chain links not present in this flatten path to collapse on it. This, along with the movement of the dominant point which pulls the chain links on the flatten path, causes a chain to become longer with sufficient number of steps, thus allowing a single chain to form a larger part of the barrier. Note that for a long enough belt region (large L), if the merging step and the flattening logic is applied on a chain graph long enough, the graph will be transformed into a linear chain with all nodes having degree two (except the end nodes that are with degree one), with the distance between the centers of two connected chain links becoming maximum. An example of the flattening logic is shown in Figure 1. Figure 1a shows the initial state of a chain tree. The green chain link denotes the dominant point, with the red arrow depicting the direction of the force exerted. The chain links on the flatten path computed from the root chain link (dominant point) are shown in blue. As shown in Figure 1b, a node connected to the the first node on the flatten path (starting from the root) with degree greater than two is moved towards the flatten path. When this node meets the flatten path after sufficient number of steps, the flatten path is changed as shown in Figure 1c. This adds one more sensor to the flatten path. At later steps, the next chain link on the flatten path with degree greater than two is chosen and a chain link connected to it is moved towards and finally added to the flatten path (Figures 1d and 1e). The next chain link on this new flatten path with (a) (b) (c) (d) (e) (f) Fig. 1: Example of the flattening logic degree greater than two is then moved towards the flatten path (Figure 1f). This process is repeated with each step to flatten the chain tree as much as needed. Note that as the dominant point moves because of the force exerted on it, the chain links on the flatten path are pulled along with it, causing the chain to straighten out and form a longer barrier. For the left and the right chain tree, the flatten path is fixed to be the path from the dominant point to the left and the right chain links respectively. The rest of the logic remains the same. This is done because of the special constraint on the leftmost and the rightmost sensors. The pseudo code for the flattening logic is given in Algorithm 1. More details are omitted because of space constraints. Figure 2 graphically shows the complete algorithm running on an example scenario that is generated by simulating the algorithm. The example scenario has a belt region of length 50m and width 8m. It has 65 uniformly randomly distributed mobile sensors each having a sensing radius of 0.5m. The color coding of the sensors is the same as in Figure 1. After the Initialization Phase, the sensor positions are as shown in Figure 2a. As seen in the figure, only small chain graphs exist spread all over the belt region, with no discernible parts of the barrier. Figure 2b shows the state after the Left-Attach Phase and Right-Attach Phase. Dominant points for all the chain graphs are calculated and are pulled towards their corresponding codominant points, pulling the chains with them. We can also observe some merged chain graphs compared to Figure 2a. After few steps in the simulation, we can see larger chain graphs in the belt region formed gradually as shown in Figure 2c and Figure 2d. It can be seen that there are only two chain Algorithm 1 Flattening Algorithm 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: function FLATTEN(chain graph G, chain link root) Compute flatten path P from root current = root while degree of current ≤ 2 do current = next node after current on P end while Sc = set of neighbor nodes of current that are not on P for each u ∈ Sc do v = neighbor node of current closest to u on P apply force f on u towards v to move u if distance between u and v ≤ 2Rs then delete edge (current, v) from G add edge (u, v) to G P = P ∪ {(u, v), (current, u)} − (current, v) break end if end for end function (a) (b) (c) (d) (e) (f) Fig. 2: Example of 1-barrier formation graphs remaining (left and right chain graphs) in Figure 2e which then combine to form the final barrier as shown in Figure 2f. Note that the final barrier is non-linear and some of the sensors are still redundant. The following theorem can be proved for the correctness of the algorithm; we omit the proof here due to lack of space. Theorem 1: For a belt region of length L and sensors with sensing radius Rs , the proposed algorithm always terminates with a strong barrier coverage if the number of sensors is L greater than or equal to d 2R e. s C. Performance Evaluation The centralized algorithm is simulated using the pymunk1 (python physics simulation library) and pygame2 (python game development library used for visualizing sensor movements). Each sensor is modeled as a point rigid body in a gravity free environment. The connections between chain links are are modelled as slide joints. A slide joint is like an imaginary rod between two ends, which can keep the ends from getting too far apart but will allow them to get closer to each other. The constraints for the leftmost and the rightmost sensors are modelled as Groove Joints. The anchor point in the groove joint can slide on a specified line, which helps the leftmost and the rightmost sensors to slide on the left and right boundary when required. Pymunk allows us to apply forces on mobile rigid bodies and can simulate the results in time steps. The coordinates from pymunk simulation space are used in pygame to draw sensors and the connections between them. The proposed algorithm is compared with two existing algorithms, the CBarrier algorithm proposed by Shen et al. [9], and the CBGB algorithm proposed by Ban et al. [17]. The CBarrier algorithm is chosen as the DBarrier algorithm proposed in the same work is the only one that forms a truly non-linear barrier, and it has been shown that CBarrier has a better performance than DBarrier. The CBGB algorithm is chosen as it has been shown to find a near-optimal movement strategy for linear barrier formation. We simulate both algorithms and measure the average and maximum displacement of a sensor. It should be noted that the algorithm can be centrally executed given the initial locations of the sensors and only final locations can be sent to the sensors directly without the need of sensors to make any intermediate movement. A belt of dimensions 50m × 8m is taken, with varying number of sensors. The value of the sensing radius Rs is taken as 0.5m. Note that these parameter values imply that a minimum of 50 sensors are needed to provide barrier coverage (when a linear barrier is formed). The results reported are the average of running the algorithms on 100 random initial deployments. The results are shown in Figure 3. The results indicate that the proposed algorithm outperforms both CBarrier and CBGB algorithms with respect to both the average and maximum displacement of a sensor. In particular, the maximum displacement of the proposed algorithm is significantly better than both the algorithms. As the number of sensors are increased, the performance of the 1 http://pymunk.readthedocs.org/en/latest/ 2 http://www.pygame.org/ R EFERENCES [1] [2] [3] [4] [5] [6] [7] (a) Average displacement [8] [9] [10] [11] [12] [13] (b) Maximum displacement Fig. 3: Average and maximum displacement of a sensor [14] [15] [16] algorithm improves as more and more redundant sensors are available for local flattening and merging of chain graphs, thereby reducing the movement required. [17] V. C ONCLUSION In this paper, we have presented a centralized algorithm to form a barrier from a random initial deployment using mobile sensors. The algorithm uses some novel techniques of viewing a barrier as a chain and applying laws of physics to create non-linear barriers that reduce the movement of sensors. Simulation results indicate that the algorithm outperforms other existing algorithms in terms of average and maximum displacement even with a small number of redundant sensors. The work can be extended further to investigate the design of distributed algorithms for the problem and algorithms for localized maintenance of the barrier after failures using similar techniques. G. Wang, G. Cao, and T. La Porta, “Movement-assisted sensor deployment,” IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp. 640–652, 2006. K. Ma, Y. Zhang, and W. Trappe, “Managing the mobility of a mobile sensor network using network dynamics,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 1, pp. 106–120, 2008. N. Bartolini, T. Calamoneri, T. La Porta, and S. Silvestri, “Autonomous deployment of heterogeneous mobile sensors,” IEEE Transactions on Mobile Computing, vol. 10, no. 6, pp. 753–766, 2011. B. Wang, “Coverage problems in sensor networks: A survey,” ACM Computing Surveys, vol. 43, no. 4, pp. 32:1–32:53, 2011. A. Chen, S. Kumar, and T. H. Lai, “Local barrier coverage in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 4, pp. 491–504, 2010. A. Saipulla, C. Westphal, B. Liu, and J. Wang, “Barrier coverage with line-based deployed mobile sensors,” Ad Hoc Networks, vol. 11, no. 4, pp. 1381–1391, 2013. B. Bhattacharya, M. Burmester, Y. Hu, E. Kranakis, Q. Shi, and A. Wiese, “Optimal movement of mobile sensors for barrier coverage of a planar region,” Theoretical Computer Science, vol. 410, no. 52, pp. 5515–5528, 2009. A. Saipulla, B. Liu, G. Xing, X. Fu, and J. Wang, “Barrier coverage with sensors of limited mobility,” in 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2010, pp. 201–210. C. Shen, W. Cheng, X. Liao, and S. Peng, “Barrier coverage with mobile sensors,” in ISPAN 2008, International Symposium on Parallel Architectures, Algorithms, and Networks, 2008, pp. 99–104. T. M. Cheng and A. V. Savkin, “A problem of decentralized selfdeployment for mobile sensor networks: Barrier coverage between landmarks,” in ICCA 2009, IEEE International Conference on Control and Automation, 2009, 2009, pp. 1438–1442. G. Yang, W. Zhou, and D. Qiao, “Defending against barrier intrusions with mobile sensors,” in WASA 2007, International Conference on Wireless Algorithms, Systems and Applications, 2007, 2007, pp. 113– 120. L. Kong, X. Liu, Z. Li, and M.-Y. Wu, “Automatic barrier coverage formation with mobile sensor networks,” in ICC 2010, IEEE International Conference on Communications, 2010, pp. 1–5. S. Silvestri, “Mobibar: Barrier coverage with mobile sensors,” in GLOBECOM 2011, Global Telecommunications Conference, 2011, pp. 1–6. M. Cardei and J. Wu, “Energy-efficient coverage problems in wireless ad-hoc sensor networks,” Computer Communications, vol. 29, no. 4, pp. 413–420, 2006. G. Fan and S. Jin, “Coverage problem in wireless sensor network: A survey,” Journal of Networks, vol. 5, no. 9, pp. 1033–1040, 2010. M. Eftekhari, E. Kranakis, D. Krizanc, O. Morales-Ponce, L. Narayanan, J. Opatrny, and S. Shende, “Distributed algorithms for barrier coverage using relocatable sensors,” in PODC 2013, ACM Symposium on Principles of Distributed Computing, 2013, pp. 383–392. D. Ban, J. Jiang, W. Yang, W. Dou, and H. Yi, “Strong k-barrier coverage with mobile sensors,” in IWCMC 2010, 6th International Wireless Communications and Mobile Computing Conference, 2010, pp. 68–72.
3cs.SY
Open3D: A Modern Library for 3D Data Processing Qian-Yi Zhou Jaesik Park Intel Labs arXiv:1801.09847v1 [cs.CV] 30 Jan 2018 Abstract Vladlen Koltun ing practices. Open3D was created to address this need. It is an opensource library that supports rapid development of software that deals with 3D data. The Open3D frontend exposes a set of carefully selected data structures and algorithms in both C++ and Python. The Open3D backend is implemented in C++11, is highly optimized, and is set up for OpenMP parallelization. Open3D was developed from a clean slate with a small and carefully considered set of dependencies. It can be set up on different platforms and compiled from source with minimal effort. The code is clean, consistently styled, and maintained via a clear code review mechanism. Open3D has been in development since 2015 and has been used in a number of published research projects [22, 13, 15, 12]. It has been deployed and is currently running in the Tanks and Temples evaluation server [13]. Open3D is released open-source under the permissive MIT license and is available at http://www.open3d. org. We welcome contributions from the open-source community. Open3D is an open-source library that supports rapid development of software that deals with 3D data. The Open3D frontend exposes a set of carefully selected data structures and algorithms in both C++ and Python. The backend is highly optimized and is set up for parallelization. Open3D was developed from a clean slate with a small and carefully considered set of dependencies. It can be set up on different platforms and compiled from source with minimal effort. The code is clean, consistently styled, and maintained via a clear code review mechanism. Open3D has been used in a number of published research projects and is actively deployed in the cloud. We welcome contributions from the open-source community. 1. Introduction The world is three-dimensional. Systems that operate in the physical world or deal with its simulation must often process three-dimensional data. Such data takes the form of point clouds, meshes, and other representations. Data in this form is produced by sensors such as LiDAR and depth cameras, and by software systems that support 3D reconstruction and modeling. Despite the central role of 3D data in fields such as robotics and computer graphics, writing software that processes such data is quite laborious in comparison to other data types. For example, an image can be efficiently loaded and visualized with a few lines of OpenCV code [3]. A similarly easy to use software framework for 3D data has not emerged. A notable prior effort is the Point Cloud Library (PCL) [18]. Unfortunately, after an initial influx of opensource contributions, PCL became encumbered by bloat and is now largely dormant. Other open-source efforts include MeshLab [6], which provides a graphical user interface for processing meshes; libigl [11], which supports discrete differential geometry and related research; and a variety of solutions for image-based reconstruction [13]. Nevertheless, there is currently no open-source library that is fast, easy to use, supports common 3D data processing workflows, and is developed in accordance with modern software engineer- 2. Design Two primary design principles of Open3D are usefulness and ease of use [8]. Our key decisions can be traced to these two principles. Usefulness motivated support for popular representations, algorithms, and platforms. Ease of use served as a countervailing force that guarded against heavyweight dependencies and feature creep. Open3D provides data structures for three kinds of representations: point clouds, meshes, and RGB-D images. For each representation, we have implemented a complete set of basic processing algorithms such as I/O, sampling, visualization, and data conversion. In addition, we have implemented a collection of widely used algorithms, such as normal estimation [16], ICP registration [2, 4], and volumetric integration [7]. We have verified that the functionality of Open3D is sufficient by using it to implement complete workflows such as large-scale scene reconstruction [5, 15]. We carefully chose a small set of lightweight dependencies, including Eigen for linear algebra [9], GLFW for OpenGL window support, and FLANN for fast nearest neighbor search [14]. For easy compilation, powerful 1 but heavyweight libraries such as Boost and Ceres are excluded. Instead we use either lightweight alternatives (e.g., pybind11 instead of Boost.Python) or in-house implementations (e.g., for Gauss-Newton and Levenberg-Marquardt graph optimization). The source code of all dependencies is distributed as part of Open3D. The dependencies can thus be compiled from source if not automatically detected by the configuration script. This is particularly useful for compilation on operating systems that lack package management software, such as Microsoft Windows. The development of Open3D started from a clean slate and the library is kept as simple as possible. Only algorithms that solve a problem of broad interest are added. If a problem has multiple solutions, we choose one that the community considers standard. A new algorithm is added only if its implementation demonstrates significantly stronger results on a well-known benchmark. Open3D is written in standard C++11 and uses CMake to support common C++ toolchains including memory access to these data fields via a numpy array. The following code sample demonstrates reading and accessing the point coordinates of a point cloud. from py3d import * import numpy as np pointcloud = read_point_cloud(’pointcloud.ply’) print(np.asarray(pointcloud.points)) Similarly, TriangleMesh has two master data fields – TriangleMesh.vertices and TriangleMesh.triangles – as well as three auxiliary data fields: TrianTriangleMesh.vertex colors, gleMesh.vertex normals, and TriangleMesh.triangle normals. The Image data structure is implemented as a 2D or 3D array and can be directly converted to a numpy array. A pair of depth and color images of the same resolution can be combined into a data structure named RGBDImage. Since there is no standard depth image format, we have implemented depth image support for multiple datasets including NYU [19], TUM [20], SUN3D [21], and Redwood [5]. The following code sample reads a pair of RGB-D images from the TUM dataset and converts them to a point cloud. • GCC 4.8 and later on Linux • XCode 8.0 and later on OS X • Visual Studio 2015 and later on Windows from py3d import * import numpy as np depth = read_image(’TUM_depth.png’) color = read_image(’TUM_color.jpg’) rgbd = create_rgbd_image_from_tum_format(color, depth) pointcloud = create_point_cloud_from_rgbd_image( rgbd, PinholeCameraIntrinsic. prime_sense_default) A key feature of Open3D is ubiquitous Python binding. We follow the practice of successful computer vision and deep learning libraries [1, 3]: the backend is implemented in C++ and is exposed through frontend interfaces in Python. Developers use Python as a glue language to assemble components implemented in the backend. Figure 1 shows code snippets for a simple 3D data processing workflow. An implementation using the Open3D Python interface is compared to an implementation using the Open3D C++ interface and to an implementation based on PCL [18]. The implementation using the Open3D Python interface is approximately half the length of the implementation using the Open3D C++ interface, and about five times shorter than the implementation based on PCL. As an added benefit, the Python code can be edited and debugged interactively in a Jupyter Notebook. 3.2. Visualization Open3D provides a function draw geometries() for visualization. It takes a list of geometries as input, creates a window, and renders them simultaneously using OpenGL. We have implemented many functions in the visualizer, such as rotation, translation, and scaling via mouse operations, changing rendering style, and screen capture. A code sample using draw geometries() and its result are shown in Figure 2. In addition to draw geometries(), Open3D has a number of sibling functions with more advanced functionality. draw geometries with custom animation() allows the programmer to define a custom view trajectory and play an animation in the GUI. draw geometries with animation callback() and draw geometries with key callback() accept Python callback functions as input. The callback function is called in an automatic animation loop, or upon a key press event. The following code sample shows a rotating point cloud using draw geometries with animation callback(). 3. Functionality Open3D has nine modules, listed in Table 1. 3.1. Data The Geometry module implements three geometric representations: PointCloud, TriangleMesh, and Image. The PointCloud data structure has three data fields: PointCloud.points, PointCloud.normals, PointCloud.colors. They are used to store coordinates, normals, and colors. The master data field is PointCloud.points. The other two fields are considered valid only when they have the same number of records as PointCloud.points. Open3D provides direct 2 Estimate normal Downsample (a) A simple 3D data processing task: load a point cloud, downsample it, and estimate normals. from py3d import * pointcloud = read_point_cloud(’pointcloud.ply’) downsampled = voxel_down_sample(pointcloud, voxel_size = 0.05) estimate_normals(downsampled, KDTreeSearchParamHybrid(radius = 0.1, max_nn = 30)) draw_geometries([downsampled]) (b) An implementation using the Open3D Python interface. #include <Core/Core.h> #include <IO/IO.h> #include <Visualization/Visualization.h> void main(int argc, char *argv[]) { using namespace three; auto pointcloud = CreatePointCloudFromFile(argv[1]); auto downsampled = VoxelDownSample(pointcloud, 0.05) EstimateNormals(*downsampled, KDTreeSearchParamHybrid(0.1, 30)); DrawGeometry(downsampled); } (c) An implementation using the Open3D C++ interface. #include <pcl/point_types.h> #include <pcl/point_cloud.h> #include <pcl/features/normal_3d.h> #include <pcl/filters/voxel_grid.h> #include <pcl/io/pcd_io.h> #include <pcl/visualization/cloud_viewer.h> void main(int argc, char *argv[]) { using namespace pcl; PointCloud<PointNormal>::Ptr pcd(new PointCloud<PointNormal>()); io::loadPCDFile<PointNormal>(argv[1], *pcd); VoxelGrid<PointNormal> grid; grid.setLeafSize(0.05, 0.05, 0.05); grid.setInputCloud(pcd); grid.filter(*pcd); PointCloud<PointNormal>::Ptr result(new PointCloud<PointNormal>()); NormalEstimation<PointNormal, PointNormal> est; est.setInputCloud(pcd); est.setRadiusSearch(0.1); est.compute(*result); pcl::visualization::PCLVisualizer viewer("PCL Viewer"); viewer.addPointCloudNormals<PointNormal, PointNormal>(pcd, result, 1, 0.05); while (!viewer.wasStopped()) { viewer.spinOnce(); } } (d) An implementation based on PCL. Figure 1: Code snippets for a simple 3D data processing workflow. (a) An illustration of the task. (b) An implementation using the Open3D Python interface. (b) An implementation using the Open3D C++ interface. (c) An implementation based on PCL [18]. The implementation using the Open3D Python interface is dramatically shorter and clearer than the implementation based on PCL. 3 Module Functionality Geometry Camera Odometry Registration Integration I/O Visualization Utility Python Data structures and basic processing algorithms Camera model and camera trajectory Tracking and alignment of RGB-D images Global and local registration Volumetric integration Reading and writing 3D data files A customizable GUI for rendering 3D data with OpenGL Helper functions such as console output, file system, and Eigen wrappers Open3D Python binding and tutorials Table 1: Open3D modules. from py3d import * pointcloud = read_point_cloud(’pointcloud.pcd’) mesh = read_triangle_mesh(’mesh.ply’) mesh.computer_vertex_normals() draw_geometries([pointcloud, mesh]) from py3d import * source = read_point_cloud(’source.pcd’) target = read_point_cloud(’target.pcd’) source_down = voxel_down_sample(source, 0.05) target_down = voxel_down_sample(target, 0.05) estimate_normals(source_down, KDTreeSearchParamHybrid(radius = 0.1, max_nn = 30)) estimate_normals(target_down, KDTreeSearchParamHybrid(radius = 0.1, max_nn = 30)) We then compute FPFH features and apply a RANSACbased global registration algorithm [17]: Figure 2: Visualize a mesh and a point cloud using draw geometries(). source_fpfh = compute_fpfh_feature(source_down, KDTreeSearchParamHybrid(radius = 0.25, max_nn = 100)) target_fpfh = compute_fpfh_feature(target_down, KDTreeSearchParamHybrid(radius = 0.25, max_nn = 100)) result_ransac = registration_ransac_based_on_feature_matching (source_down, target_down, source_fpfh, target_fpfh, max_correspondence_distance = 0.075, TransformationEstimationPointToPoint( False), ransac_n = 4, [ CorrespondenceCheckerBasedOnEdgeLength(0.9), CorrespondenceCheckerBasedOnDistance(0.075)], RANSACConvergenceCriteria(max_iteration = 4000000, max_validation = 500)) from py3d import * pointcloud = read_point_cloud(’pointcloud.pcd’) def rotate_view(vis): # Rotate the view by 10 degrees ctr = vis.get_view_control() ctr.rotate(10.0, 0.0) return False draw_geometries_with_animation_callback([ pointcloud], rotate_view) In the backend of Open3D, these functions are implemented using the Visualizer class. This class is also exposed in the Python interface. We used profiling tools to analyze the RANSAC-based algorithm and found that its most time-consuming part is the validation of matching results. Thus, we give the user an option to specify a termination criterion via the RANSACConvergenceCriteria parameter. In addition, we provide a set of functions that prune false matches early, including CorrespondenceCheckerBasedOnEdgeLength and CorrespondenceCheckerBasedOnDistance. The final part of the pairwise registration workflow is ICP refinement [2, 4], applied to the original dense point clouds: 3.3. Registration Open3D provides implementations of multiple stateof-the-art surface registration methods, including pairwise global registration, pairwise local refinement, and multiway registration using pose graph optimization. This section gives an example of a complete pairwise registration workflow for point clouds. The workflow begins by reading raw point clouds, downsampling them, and estimating normals: 4 result_icp = registration_icp(source, target, max_correspondence_distance = 0.02, result_ransac.transformation, TransformationEstimationPointToPlane()) Here TransformationEstimationPointToPlane() invokes a point-to-plane ICP algorithm. Other ICP variants are implemented as well. Intermediate and final results of the demonstrated registration procedure are shown in Figure 3. Figure 4: A scene reconstructed and visualized in Open3D. Global registration analysis accelerated the running time of many functions by multiplicative factors. For example, our optimized implementation of the ICP algorithm is up to 25 times faster than its counterpart in PCL [18]. Our implementation of the reconstruction pipeline of Choi et al. [5] is up to an order of magnitude faster than the original implementation released by the authors. A large number of functions are parallelized with OpenMP. Many functions, such as normal estimation, can be easily parallelized across data samples using “#pragma omp for” declarations. Another example of consequential parallelization can be found in our non-linear least-squares solvers. These functions optimize objectives of the form X L(x) = ri2 (x), (1) Local refinement Figure 3: Intermediate and final results of pairwise registration. 3.4. Reconstruction A sophisticated workflow that is demonstrated in an Open3D tutorial is a complete scene reconstruction system [5, 15]. The system is implemented as a Python script that uses many algorithms implemented in Open3D. It takes an RGB-D sequence as input and proceeds through three major steps. i 1. Build local geometric surfaces {Pi } (referred to as fragments) from short subsequences of the input RGB-D sequence. There are three substeps: matching pairs of RGB-D images, robust pose graph optimization, and volumetric integration. where ri (x) is a residual term. A step in a Gauss-Newton solver takes the current solution xk and updates it to −1 > xk+1 = xk − (J> (Jr r), r Jr ) 2. Globally align the fragments to obtain fragment poses {Ti } and a camera calibration function C(·). There are four substeps: global registration between fragment pairs, robust pose graph optimization, ICP registration, and global non-rigid alignment. (2) where Jr is the Jacobian matrix for the residual vector r, both evaluated at xk . In the Open3D implementation, the most time-consuming part is the evaluation of J> r Jr and J> r. These were parallelized using OpenMP reduction. r A lambda function specifies the computation of J> r Jr and r for each data record. This lambda function is called in J> r a reduction loop that sums over the matrices. The parallelization of the Open3D backend accelerated the most time-consuming Open3D functions by a factor of 3-6 on a modern CPU. 3. Integrate RGB-D images to generate a mesh model for the scene. Figure 4 shows a reconstruction produced by this pipeline for a scene from the SceneNN dataset [10]. The visualization was also done via Open3D. 5. Release 4. Optimization Open3D is released open-source under the permissive MIT license and is available at http://www.open3d. org. Ongoing development is coordinated via GitHub. Code changes are integrated via the following steps. Open3D was engineered for high performance. We have optimized the C++ backend such that Open3D implementations are generally faster than their counterparts in other 3D processing libraries. For each major function, we used profiling tools to benchmark the execution of key steps. This 1. An issue is opened for a feature request or a bug fix. 5 2. A developer starts a new branch on a personal fork of Open3D, writes code, and submits a pull request when ready. [9] G. Guennebaud, B. Jacob, et al. Eigen v3, 2010. [10] B. Hua, Q. Pham, D. T. Nguyen, M. Tran, L. Yu, and S. Yeung. SceneNN: A scene meshes dataset with annotations. In 3DV, 2016. 3. The code change is reviewed and discussed in the pull request. Modifications are made to address issues raised in the discussion. [11] A. Jacobson, D. Panozzo, et al. libigl: A simple C++ geometry processing library, 2016. 4. One of the admins merges the pull request to the master branch and closes the issue. [12] M. Khoury, Q.-Y. Zhou, and V. Koltun. Learning compact geometric features. In ICCV, 2017. The code review process maintains a consistent coding style and adherence to modern C++ programming guidelines. Pull requests are automatically checked by a continuous integration service. We hope that Open3D will be useful to a broad community of developers who deal with 3D data. [13] A. Knapitsch, J. Park, Q. Zhou, and V. Koltun. Tanks and temples: Benchmarking large-scale scene reconstruction. ACM Transactions on Graphics, 36(4), 2017. [14] M. Muja and D. G. Lowe. Scalable nearest neighbor algorithms for high dimensional data. PAMI, 36(11), 2014. References [15] J. Park, Q.-Y. Zhou, and V. Koltun. Colored point cloud registration revisited. In ICCV, 2017. [1] M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, et al. TensorFlow: A system for large-scale machine learning. In OSDI, 2016. [2] P. J. Besl and N. D. McKay. A method for registration of 3-D shapes. PAMI, 14(2), 1992. [3] G. Bradski. The OpenCV library. Dr. Dobb’s Journal, 25(11), 2000. [4] Y. Chen and G. G. Medioni. Object modelling by registration of multiple range images. Image and Vision Computing, 10(3), 1992. [5] S. Choi, Q.-Y. Zhou, and V. Koltun. Robust reconstruction of indoor scenes. In CVPR, 2015. [6] P. Cignoni, M. Callieri, M. Corsini, M. Dellepiane, F. Ganovelli, and G. Ranzuglia. MeshLab: An opensource mesh processing tool. In Eurographics Italian Chapter Conference, 2008. [7] B. Curless and M. Levoy. A volumetric method for building complex models from range images. In SIGGRAPH, 1996. [8] F. D. Davis. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 1989. [16] M. Pauly. Point primitives for interactive modeling and processing of 3D geometry. PhD thesis, ETH Zürich, 2003. [17] R. B. Rusu, N. Blodow, and M. Beetz. Fast point feature histograms (FPFH) for 3D registration. In ICRA, 2009. [18] R. B. Rusu and S. Cousins. 3D is here: Point Cloud Library (PCL). In ICRA, 2011. [19] N. Silberman, D. Hoiem, P. Kohli, and R. Fergus. Indoor segmentation and support inference from RGBD images. In ECCV, 2012. [20] J. Sturm, N. Engelhard, F. Endres, W. Burgard, and D. Cremers. A benchmark for the evaluation of RGBD SLAM systems. In IROS, 2012. [21] J. Xiao, A. Owens, and A. Torralba. SUN3D: A database of big spaces reconstructed using SfM and object labels. In ICCV, 2013. [22] Q.-Y. Zhou, J. Park, and V. Koltun. Fast global registration. In ECCV, 2016. 6
1cs.CV
Formalized Risk Assessment for Safety and Security arXiv:1709.00567v1 [cs.SY] 2 Sep 2017 Joachim Draeger Abstract The manifold interactions between safety and security aspects in embedded systems makes it plausible to handle safety and security risks in a unified way. The paper develops a corresponding risk measure in the context of discrete event systems (DEVS). The chosen approach is based on a simulation of system dynamics, which allows risk assessments even in cases with stepwise system degradation, cascading failures, or cognitive attackers. The plausibility of the proposed risk measure is shown by its consistency with ’classical’ notions of risk. Its non-computability, on the other hand, indicates a realistic behavior in the presence of complex dynamics. Power grids are discussed as an application example and indicate some of the advantages of the proposed method. 1 Introduction 1.1 Safety Risks and Security Risks The notion of risk recaps the expected amount of losses related with the usage of a specific system M . This makes risk an important system property. The notion of risk is not uniquely defined, however. It can be characterized from at least two different perspectives, safety [67] and cyber security [10]. They are distinguished by who is typically acting on whom as given by Axelrod [6], whereby both safety and security usually make individual assumptions about M [5, 25, 29]: Safety requires that the system must not harm the world; all deviations from the intended behavior are caused accidentally. In the contrary, security demands that the world must not harm the system, though intelligent adversaries belonging to the world are acting in an intentionally malicious way. Due to these differences, safety and security risk assessments are typically executed independent from each other. This may be justified in some cases, but may be inappropriate in many others. Let us consider some examples, in which safety and security risks are intertwined. • Let us assume that a decision has to be made whether free resources of system performance should be invested in system monitoring or system defense. Risk assessments from the safety resp. security perspective carried out independently may hot help in finding an answer. • In a cyber attack on a German steel mill in 2014, hackers used social engineering techniques for getting access to the control systems of the production plant. They modified the control systems in a way, that the safety of the plant was compromised. It was not possible anymore to shut down a blast furnace. The resulting damage of the plant was significant [47]. • The Stuxnet worm [40, 53] is an example of a self-propagating malware compromising specific industrial control systems. As a result, uranium enrichment facilities in Iran seem to suffer substantial damage. 1 Without a combined view at safety and security, the situations described above can not be appropriately modeled. Instead, trade-offs and overlaps between safety and security suggest the development of a unified approach to safety and security risk assessments as recommended in e.g. [48]. Knowledge about upcoming events, system characteristics, and system behaviour will contribute significantly to the quality of the intended assessments. The availability of such knowledge can not be taken as granted, however. According to the theorem of Rice [32], it will not be possible to decide about nontrivial properties of a general computable system. Only their enumeration can be realized e.g. by experimenting with simulations [28, 46], which explore the effects of faults and intrusions on the system. Consequently, in this paper a simulation-based risk notion is developed and analyzed. Up to now, the potential of such a risk concept does not seem to be discussed in necessary depth [44]. The basic idea of such an approach was already presented in [20], which can be considered as predecessor of the actual paper. 1.2 Related Work Though the differences between safety and security poses a challenge for a common handling, an unified risk assessment is discussed and judged as possible e.g. in [12, 38]. Concepts of risk, which are applicable to both safety- and security-related situations, can be found in [6, 57]. Corresponding approaches for a common risk assessment process are developed in [51, 52]. Neither the cited notions of risk nor the risk assessment processes are simulation-based. An approach integrating safety and security risks based on fault trees and thus using a much stronger abstraction is given in in [27]. The paper [37] discusses a simulation-based approach to risk assessment for the special case of stochastically varying demands on a production facility. Similar considerations from the security risk point of view were made in [11, 19, 54, 69]. Another special case is considered in [8], wherein the authors are focusing on the Monte-Carlo simulation of air traffic control operations. An application of discrete event simulation as specific simulation paradigm to cyber security problems is discussed in [22], though these considerations are not risk-related. A similar statement can be made about the paper [17], which models cyber attacks based on the DEVS formalism. 1.3 Structure of the Paper Section 2 describes, how the systems under consideration can be formalized using the DEVS formalism. The system extensions, which are necessary for representing faults and threats and thus a off-nominal system behaviour, lead to a so-called risk system, which reproduces the nominal system behavior as a special case. In section 3, a simulation-based risk measure is defined on these risk systems enabling a unified risk assessment. The consistency of the proposed risk measure with classical notions of safety- and security-related risks is shown in section 4, which supports the view that it can be considered as well-defined. This section touches also the (non-)computability of the simulation-based risk measure. The final section 5 demonstrates the advantages of the new simulation-based risk measure using power grids as an example. The paper closes with an outlook. 2 Formalization of Systems For executing the intended risk assessment for the system S, at first a suitable model of S has to be constructed. This is done by representing S using the DEVS 2 formalism [70, 71]. The DEVS formalism developed by Zeigler in 1984 is proposed due to its generality and flexibility. It has the capability to represent all kinds of systems, which have an input/output behavior describable by sequences of events. Despite of the capability to handle many types of discrete systems [73], the DEVS formalism in its original formulation is not able to handle stochastic aspects as they occur in the domain of safety and security quite regularly. This gap was closed by the introduction of the STDEVS formalism, which is an extension of the DEVS formalism. In [43] it is shown that a DEVS model is a special case of a STDEVS model. 2.1 DEVS Models of Systems In the following, the definition of a DEVS model is recapitulated for a better understanding. Doing so, we are following [65, 68]. Being precisely, we are talking about atomic DEVS models in the following. Though coupled DEVS models have been defined as well, which are more general from the structural point of view, it can be shown that coupled and atomic DEVS models have the same expressive power [70, 71]. For reasons of simplicty, we are thus restricting ourselves to atomic models. Definition 1 (DEVS Model). An (atomic) DEVS model is an 8-tupel M “ pX, Y, Q, qstart , δint , σ, δext , λq with • X as set of input events • Y as set of output events • Q as set of states • qstart P Q as initial state • δint : Q ÝÑ Q as the internal transition function • σ : Q ÝÑ R` 0 Y t8u as the time advance function • δext : Q̄ ˆ 2X ÝÑ Q as the external transition function defined on Q̄ “ tpq, tq | q P Q, 0 ď t ď σpqqu as the total set of states • λ : Q ÝÑ Y Y tφu as the output function Remark 1 (DEVS Model). • The time advance function σ gives the lifetime of an internal state q P Q. The internal state q 1 P Q entered after reaching the end of the lifetime σpqq of q is determined by the internal transition function δint via q 1 “ δint pqq. As time in the real world always advances, σpqq must be non-negative. The value σpqq “ 0 indicates an instantaneous transition. If the system is to stay in an internal state q forever, this is modelled by means of σpqq “ 8. • The definition of the set Q̄ of total states is based on the idea to supplement the internal state q P Q by the elapsed time e P r0, σpqqs since the system has entered the state q P Q. • External events influence the system as described by the external transition function δext : Q̄ ˆ 2X ÝÑ Q. This function can handle sets of events representing simultaneously occurring events. Such a capability is necessary, because different events coming from different sources may arrive at the same time. 3 • The output event λpqq is generated when the time e elapsed after entering the state q P Q reaches the lifetime σpqq of the state q, i.e. e “ σpqq. At all other times, the output is equal to the non-event φ. Incoming events can trigger transitions between states. Thus, the dynamics of DEVS models is based on the so-called time-advance function σ and the state transition functions δint and δext . This leads to the following description of the dynamics of a DEVS model M “ pX, Y, Q, qstart , δint , σ, δext , λq [72]. Let q P Q be the actual state of M . We have to distinguish two cases. The first case is that no external event occurs, the second case handles the arrival of events x P 2X . In the first case, the system dynamics is determined by the lifetime σpqq of q and the internal transition function δint , in the second case by the external transition function δext . In the first case — i.e. without the occurrence of external events x P 2X — the system remains in the state q for time σpqq P R` 0 Y t8u. This means: • For σpqq “ 0, the state q is immediately changed to the state q 1 P Q given by q 1 “ δint pqq. This state transition can not be influenced by external events. • For σpqq “ 8, the system stays in state q as long as no external events x occur. • For σpqq P R` , the system outputs the value λpqq after expiration of the lifetime σpqq of the state q. Afterwards, the system state changes to q 1 P Q given by q 1 “ δint pqq. In the second case — i.e. with occurrence of external events x P 2X — the system changes to a new state q 1 “ δext pq, t, xq, whereby pq, tq P Q̄ is the actual total state of M when the set x of events occurs. Summing up, events may trigger state transitions in a DEVS-model M . A state transition may also occur automatically after a certain time. When entering a new state, the model M may generate an output event again. In [31] it is shown that an (atomic) DEVS has the computational power of a Turing machine. This means that everything representable on a common computer will also be representable in the DEVS paradigm. These are good news, since we are aiming at a general method. It is especially helpful for representing cognitive aspects, which may be important for the IT security perspective. 2.2 STDEVS Models of Systems Stochastics is required for representing probabilistically occurring safety faults and security incidents. This is done by replacing the deterministic DEVS formalism by the corresponding probabilistic STDEVS formalism. In effect, an (atomic) STDEVS-model is an (atomic) DEVS model supplemented by mappings Pint , Pext providing transition probability informations for the internal and external transition functions δint , δext . Thus, an (atomic) STDEVS model has the structure [15, 16] M “ pX, Y, Q, qstart , δint , Pint , σ, δext , Pext , λq. In this definition, δint : Q Ñ 2Q is the internal transition function, which describes the set of possible successor states δint pqq Ď 2Q to the actual state q for situations without occurrence of an external event. Thus, δint pqq contains all the subsets of Q that the next state can belong to. The partial function Pint : Q ˆ 2Q Ñ r0, 1s gives the probability Pint pq, Q1 q that the system model M being in state q makes a transition to a state q 1 P Q1 P δint pqq. Concerning the requirements for the well-definedness of the probability spaces, see [15, 16]. X Q Corresponding to δint , δext : QˆR` 0 ˆ2 Ñ 2 is the external transition function. It describes the set of possible successor states q 1 P δext pq, t, xq Ď 2Q for a situation 4 with occurrence of external events x P 2X , when the system model M is in a total X Q state pq, tq P Q̄. Analogous to Pint , the partial function Pext : Q ˆ R` 0 ˆ2 ˆ2 Ñ 1 r0, 1s gives the probability Pext pq, t, x, Q q that the system model M being in the total state pq, tq makes a transition to a state q 1 P Q1 P δext pqq at occurrence of x. For a STDEVS, the lifetime of a state q P Q is defined in the same way as in the case of a DEVS, though concerning e.g. safety problems, a stochastic lifetime function σ would allow a much more canonical representation of stochastically occurring faults. Being more precise, the lifetime of a state q P Q would then become a mapping σ from a state to a random variable with given stochastics. Such an approach is not realized here, however. A straightforward generalization to a stochastic version allowing any time span between two consecutive faults would lead to a tree of simulation traces containing branching points with uncountably many options for a continuation. Definition 2 (Language of a STDEVS system). Let M be a STDEVS model and h P R` 0 be a nonnegative real number. The set of possible simulation traces of M limited to the time interval s0, hs is called the language LpM, hq of M for the (time) horizon h. Formally, a simulation trace is a sequence pρ1 , . . . , ρk q representing the history of the corresponding simulation run consisting of elements ρj “ pqj , tj , Xj q P X Q ˆ R` 0 ˆ 2 . These elements ρj document the start resp. end states of all state transitions qj´1 Ñ qj during the simulation run, eventually triggered by the set Xj of incoming events. In this definition, the start state q0 of the first state transition (i.e. j “ 1) is equal to the initial state q0 :“ qstart of M . The case Xj “ H indicates an internal state transition qj´1 Ñ qj , otherwise an external state transition is represented. The times tj indicate, how long M was in the state qj´1 for j ă k. For j “ k, the time tk is limited by the horizon h. In this way, t1 ` ¨ ¨ ¨ ` tk “ h is assured. The language LpM, hq represents the possible behaviors of the system, which can be produced by different event sequences as input. The informations contained in the elements ρj of a simulation trace τ “ pρ1 , . . . , ρk q P LpM, hq are rich enough for allowing a reconstruction of the probabilities for the occurrence of state transitions qj´1 Ñ qj and of other properties. For a DEVS resp. STDEVS model, an event may arrive anytime and may lead to various state transitions. Though the number of internal states in a DEVS resp. STDEVS model is finite and thus countable, of course, the set of total states described as a combination of internal states and timing informations is not. It can be shown, however, that in a DEVS model these principally uncountable many cases of model behavior will only lead to countably many different state transition sequences [35, 36]. Since a STDEVS model is in essence a DEVS model extended by probabilities of state transitions, the representing state-transition graph remains finite (in an appropriate representation) for a STDEVS as well. As a consequence, the tree of possible state sequences of M has a countable size and each node in the tree has only a finite number of branching options. For a given finite time horizon, the tree of simulation traces is thus finite, too, as long as the state-transition graph does not contain cycles with transition time equal to 0. Since STDEVS models are a generalization of DEVS models and since the expressive power of the DEVS formalism corresponds to that of a Turing machine, the class of systems representable by a STDEVS model includes all Turing computable situations. Additionally, many stochastic discrete systems belong to this class as well. Again, remember that the extension of the modeling paradigm by stochastic aspects results from the requirement to represent faults and secury-related incidences. 5 2.3 Inclusion of Safety and Security Risk Cases The proposed approach of risk assessment is based on a STDEVS model M of the system S under consideration. It can not be expected, however, that an ordinary model M of the system S is suitable from the perspective of the intended risk assessment task. This is due to the fact that an ordinary model usually represents only the nominal behavior of S. A risk assessment will consider off-nominal modes of the system as well, which thus have be represented in the model. As a consequence, we need an extension of M covering safety- and security-related problems like errormodes and vulnerabilities w.r.t. specific threats. This can be realized in a three-step process. In the first step, M is supplemented by components of the system environment U , which are either affecting the system S or affected by S in a safety or security relevant way. Dependent on the situations considered as relevant, this may include components, which are related to safety and security only in an indirect way. Concerning security risk assessments, for example, the criticality of a violation of the system security will sometimes depend on the exploitation of this violation. If sensitive data have been exposed, the attacker may choose the option just to indicate that he has seen these data; but he may also use the option to publish these data. The criticality of the two choices may be very different. In the second step, the safety and security problems themselves are represented in the model as well as components related to problem management. Especially the adversarial scenario given by cyber security can only be handled adequately if both sides — the attacked system S and the attacker — are modeled at a similar level of detail. For example, a cognitive attacker requires a cognitive systems control as counterpart for assuring an appropriate defense. Such a counterpart keeps track on the attack to avoid unnecessary threats, and to organize the defense in an adequate manner. These actions of the defender are contributing to the controllability of a specific risk leading to a mitigation of its criticality. In the third step, finally descriptions of the interactions between the system S and its environment U are added using the new components, which are introduced in the first end second step. These interactions are essential for safety and security considerations as discussed in the introduction. After these extensions, the model M describes both the nominal and off-nominal behavior of the system S. Moreover, M is now necessarily a stochastic model, since e.g. a fault typically occurs with a certain probability. This makes M suitable for the intended risk assessment. The STDEVS formalism seems to be a suitable modeling paradigm for the extended model M . 3 3.1 Principles of a Simulation-Based Risk Measure Advantages of a Simulation-based Approach The model M modified by the extensions made in the last section provides a description of the nominal and off-nominal system behavior. In the following, a risk measure R is defined for an unified assessment of safety and security risks and a simulation-based procedure for calculating R based on M is given. This includes, how specific faults, threats/vulnerabilities, and other off-nominal modes are contributing to the risk R. At first, though, some general remarks are made for safety and security. In ’conventional’ functional safety, a risk assessment is typically restricted to more or less instantaneous effects of a fault or a concurrent combination of faults. Correspondingly, conventional risk measures are usually following a static concept. The main reason for the preference of static methods is their simplicity. Static 6 methods provide results quite fast, they are well applicable to systems of significant size, and in many cases the results are a sufficiently good approximation to the real situation. In other cases, however, neglecting system dynamics will be an oversimplification [18]. Sometimes only the explicit inclusion of system dynamics allows the exploration of the propagation of effects across the system structure over time. This holds especially for the phenomenon of emergence in dynamic systems, i.e. the phenomenon of unexpected global behavior due to the behavior at the microscopic scale. Emergence can of course apply to the effects of faults etc. as well and may thus influence the results of an risk assessment. Indeed, [41] states that static risk measures suffer severe limitations as soon as process safety is considered. For security, the inclusion of dynamics is even more important. Cyber security often assumes the existence of a cognitive attacker. This means that the attacker may follow a long-term strategy, which may correlate the probabilities of problem causes. Concerning risk, specifically the common assumption of statistical independence between consecutive events does no longer hold. These arguments make the inclusion of dynamics in the risk assessment process advisable. Such an inclusion is possible by simulating system dynamics. Though this will make the risk assessment task more complicated, the higher quality — i.e. precision — of the risk assessment and the additional insight seems worth the effort. Taking dynamics into account means keeping track about changes in the system, which may be of importance for the risk assessment task due to modified transition probabilities, system parameters affected by the system evolution, or the occurrence of additional risk cases [42]. Thus, a simulation provides a forecast capability of potential future risks in some way. For providing a notion of risk, which includes the dynamics of the system, we will take a closer look at the course of action after the occurrence of a fault or a realized threat. We start our considerations with a nominally behaving system. If a component of the system starts to behave off-nominal, then the system will usually alter the path of dynamics. In a STDEVS model M “ pX, Y, Q, qstart , δint , Pint , σ, δext , Pext , λq, this is represented as a state transition q1 Ñ q11 , q1 , q11 P Q. The new state q11 P Q may be the first element of a state transition sequence, which transmits the information about the occurrence of the problem cause — in the following called cause for short — to other parts of the system (or its environment). There, the consequences of the cause may become effective by executing another change in the system state, i.e. a state transition q2 Ñ q21 , q2 , q21 P Q2 . Then the new state q21 is the (potentially disadvantageous) effect of the cause q1 Ñ q11 . Interpreting a cause as start point of a certain behavior the effect can be considered as a (disadvantageous) consequence of the behavior resulting from the cause. Such a cause-and-effect resp. causality related perspective of risk is discussed in [23, 21], whereby effects are also called consequences. This kind of perspective is supported in [24] for safety and in [59] for security. Additionally, one has to note that in the description of the general cause-effect relationship given above, the state transitions q1 Ñ q11 and q2 Ñ q21 need not necessarily be different. 3.2 Criticality of a Simulation Trace Main topic of the last section is the structural representation of system faults and threats/vulnerabilities, which may contribute to the risk R, in the model M . This is an important step towards calclulating R, because we are now able to derive the existence of potential problems from the model M . For actually evaluating the contribution of this specific problem to the overall risk quantitatively, attributes have to be added for describing the properties of the problem under consideration. As typical for quantifying a risk, one has to know how frequent and how severe a specific system problem is. The severity is given as criticality c : Q̄ Ñ R` 0 defined on the 7 total states Q̄ of the STDEVS model M . It measures the amount of disadvantages resulting from the occurrence of a specific state q P Q for a certain duration t P R` 0. According to this purpose, cpq, tq P R` will be a nonnegative real number. States 0 with criticality larger than zero are representing modes of the system, which may contribute to the overall risk. Definition 3 (Criticality of an Effect). Let M “ pX, Y, Q, qstart , δint , Pint , σ, δext , Pext , λq be a STDEVS model. Let τ P LpM, hq be an element of the language of M , i.e. a simulation trace of M , for the (time) horizon h. The trace τ “ pρ1 , . . . , ρk q, X k ě 1, with ρj “ pqj , tj , Xj q P Q ˆ R` gives the states qj together with their 0 ˆ2 lifetimes tj and thus the total states q̄j “ pqj , tj q. Then the criticality of a total ` state q̄j “ pqj , tj q is given by cpqj , tj q. Formally, c is a mapping c : Q ˆ R` 0 Ñ R0 . In the realm of criticality, both qj and q̄j “ pqj , tj q are called an effect. A simulation trace τ may contain many effects q̄1 , . . . , q̄k . Since these effects q̄j can at least potentially interact with each other, the overall criticality cpτ q of the simulation trace τ is usually calculated in a more complex way than simple summation of the single criticalities cpq̄j q. Sometimes, an additional problem can be neglected, because it does not influence the overall outcome. It is unimportant, for example, that a leaking fluid creates a hazard to slip, if the area of leakage is located in the center of a large explosion. On the other hand, some combinations of hazards may produce dangers disproportionally high. An example would be the disposal of two irritant chemicals, producing a deadly poison in combination [20]. Hazards and threats can also be uncorrelated with each other. As a conclusion, the criticality measure c for simulation traces has to take the variety of relationships between hazard and threat effects into account. The precise shape of c will depend on the specific application. Definition 4 (Criticality of Effects). Let M “ pX, Y, Q, qstart , δint , Pint , σ, δext , Pext , λq be a STDEVS model. Let τ P LpM, hq be an element of the language of M , i.e. a simulation trace of M , for the (time) horizon. The trace τ “ pρ1 , . . . , ρk q, X k ě 1, with ρj “ pqj , tj , Xj q P Q ˆ R` gives the states qj together with their 0 ˆ2 lifetimes tj and thus the total states q̄j “ pqj , tj q P Q̄. For handling stepwise system degradations and multiple failures, the domain of c has to be extended from a single total state to a (temporally ordered) sequence q̄ “ pq̄1 , . . . , q̄k q. Then, the extended criticality assignment function c has the signature c : Q̄ ˆ ¨ ¨ ¨ ˆ Q̄ Ñ R` 0. The definition above extends the criticality assignment function c in such a way, that criticality correlations can be taken into account (see figure 2). The lifetimes tj of the total states q̄j provide informations about time differences between the effects, which may influence c as well. If the criticality correlation depends on additional parameters, the values of these parameters can typically be coded in the states Q of a STDEVS model. 3.3 Probability of a Simulation Trace The safety and security aspects lead to a probabilistic system S. Accordingly, its overall dynamical behavior displays a tree instead of a single path. The probability of taking a specific branching option in the tree is given at the elementary level by the probability ppγq of the corresponding transition γ in the STDEVS model M of S. For calculating the probability ppτ q of a whole simulation trace τ , which may results from several such branching choices γi , we have to compose the probabilities ppγi q assigned to these choices γi with each other. This can be done in the usual way with help of the Bayes rule (see figure 1). Using Bayes rule has many advantages. Being based on conditional probabilities, it may support the inclusion of uncertainties and soft informations like the subjectivity of risk [9, 41] in the formalism. 8 Ñ q 11 ppq 1 q1 art Ñ q ppq 1 Ñ q1r q q 1q t ppq s τ11 .. q1r τ1r qm1 τm1 .. qstart ppq sta q11 rt Ñ qm 1q Ñ qm ppq m q qm ppq m Ñq ms q .. qms τms Figure 1: The simulation of a determninistic model gives a unique sequence τ of system states. For stochastic models, the state sequence diversifies to a tree of possible simulation traces. The probability of transiting to a specific successor state at a branching point in the tree is determined by the probability Pint pq 1 , tq 2 uq assigned to the corresponding state transition q 1 Ñ q 2 . Let us take a closer look at the simulation trace τ11 representing the state sequence qstart Ñ q1 Ñ q11 . Using the abbreviations T :“ qstart Ñ q1 and T 1 :“ q1 Ñ q11 , the probability ppτ11 q of the occurrence of trace τ11 is equal to the probability ppτ11 q “ ppT ^ T 1 q that both state transitions T, T 1 occur. Applying Bayes rule, it holds ppT ^ T 1 q “ ppT q ¨ ppT | T 1 q. In the example, ppT q “ ppqstart Ñ q1 q is the probability that the state q1 is reached from the start state qstart . The probability ppT | T 1 q on the other hand is the probability that from the state q1 , which have been reached after execution of T , a transition to the state q11 takes place. This means ppT | T 1 q “ ppT 1 q “ ppq1 Ñ q11 q. Definition 5 (Probability of Cause). Let M “ pX, Y, Q, qstart , δint , Pint , σ, δext , Pext , λq be a STDEVS model. Let γ “ pq, t, X 1 , q 1 q be a state transition q Ñ q 1 between states q, q 1 P Q eventually triggered by a set X 1 of external events (X 1 “ H is a valid choice) at lifetime t of state q. Then the probability of executing γ is designated as ppγq. The value of ppγq is given by the internal transition probability Pint pq, tq 1 uq for X 1 “ H and by the external transition probability Pext pq, t, X 1 , tq 1 uq for X 1 ‰ H with the system being in the total state pq, tq. The 4-tupel γ represents a so-called cause. Definition 6 (Probability of a Sequence of Causes). Let M “ pX, Y, Q, qstart , δint , Pint , σ, δext , Pext , λq be a STDEVS model. Let τ P LpM, hq be an element of the language of M , i.e. a simulation trace of M , with (time) horizon h. Assigned to X τ “ pρ1 , . . . , ρk q with ρj “ pqj , tj , Xj q P Q ˆ R` is the (temporally ordered) 0 ˆ2 sequence γ “ pγ1 , . . . , γk q of state transitions. Formally, γj is defined as γj :“ pqj´1 , tj , Xj , qj q. Remember, that it holds q0 :“ qstart . Then the probability of the occurrence of the sequence γ is designated as ppγq and given by ppγq “ ppγ1 q ¨ ppγ1 | γ2 q ¨ ¨ ¨ ¨ ¨ ppγ1 , . . . , γk´1 | γk q 9 according to Bayes rule. The expression ppγ1 , . . . , γj´1 | γj q results from the fact that when the state transition γj is triggered, the state transitions γ1 , . . . , γj´1 were already executed and have set the preconditions for γj . 3.4 A Simulation-Based Risk Measure A specific behavior of the model M corresponds to a specific simulation trace τ “ pρ1 , . . . , ρk q P LpM, hq. Using the causes γ “ pγ1 , . . . , γk q and the effects q̄ “ pq̄1 , . . . , q̄k q belonging to the trace τ , we are now able to assign both a probability and a criticality to τ via the measures ppγq and cpq̄q defined in the last section. Definition 7 (Probability and Criticality of Simulation Traces). Let M be a STDEVS model and h P R` 0 be a nonnegative real number being the horizon of the simulation. Let τ P LpM, hq be an element of the language of M , i.e. a possible simulation trace of M , for the (time) horizon h. The trace τ “ pρ1 , . . . , ρk q is associated with a sequence γ “ pγ1 , . . . , γk q of causes and a sequence q̄ “ pq̄1 , . . . , q̄k q of effects. Then the probability ppτ q and the criticality cpτ q of the trace τ are defined as ppτ q :“ ppγq and cpτ q :“ cpq̄q. The probability ppτ q and criticality cpτ q assigned to a simulation trace τ will depend on the length of τ , i.e. on the given horizon h. If the horizon of the simulation is increased, the extended trace may contain additional causes and may thus have a modified probability ppτ q; similarly, the occurrence of additional effects on the extended trace may change its criticality cpτ q. Using the probability ppτ q and criticality cpτ q of the trace τ we will now define a risk measure R for a trace τ . Definition 8 (Risk Measure for Simulation Traces). Let M be a STDEVS model ` and h P R` 0 be a horizon. Then a risk measure R : LpM, hq ÝÑ R0 can be defined for the simulation traces τ P LpM, hq of M by assigning a nonnegative real value to τ defined by Rpτ q “ ppτ q ¨ cpτ q. The overall behavior of a model M is represented by the set of all possible simulation traces. It is thus plausible to define a risk measure for M as sum over the risk values Rpτ q assigned to the different simulation traces τ P LpM, hq of M . In this way, the risk R assigned to the system model M is the sum of the criticalities cpτ q of the traces τ P LpM, hq weighted by their probabilities ppτ q. This corresponds to the classical form of a risk measure as expectation value of the criticality over all possible cases. Definition 9 (Risk Measure for DEVS Systems). Let us designate the class of all STDEVS models by M. Let M P M be a STDEVS model and h P R` 0 be a horizon. ` parameterized by the horizon h is defined Then a risk measure R : M ˆ R` ÝÑ R 0 0 on M by ÿ ÿ RpM, hq :“ Rpτ q “ ppτ q ¨ cpτ q τ PLpM,hq 4 4.1 τ PLpM,hq Properties of the Simulation-Based Risk Measure Simulation-Based vs. Traditional Approaches The capability of the risk measure R to reproduce classical risk measures of safety and security at least approximatively, provides a good argument for the plausibility of R. Indeed, a very small time horizon h restricts the system dynamics in such a way that LpM, hq is limited to almost trivial sequences consisting typically of just one cause and one effect. Under these conditions, RpM, hq reproduces more 10 q4 p4 p3 q2 p2 q3 p5 q5 p9 p6 q6 p7 q7 p8 q8 q9 p14 q1 p10 p13 q10 q11 q12 q13 q18 p15 q15 p16 q16 c10 q14 q17 p18 p19 q19 p20 c12 c16 q20 τ c20 Figure 2: The figure shows the progressively diversifying state tree produced by the simulation of a stochastic model. The simulation trace τ contains several disadvantageous consequences occurring in the states q10 , q12 , q16 , and q20 . These disadvantages are quantified by the criticalities c10 , c12 , c16 , and c20 . When assessing the overall criticality cpτ q, all the c10 , c12 , c16 , and c20 have to be taken into account and calculated with each other. or less the classical safety risk measure R1 applied e.g. by the FMEA method. In the case of comparatively ’simple’ systems, the errors induced by the simplifying assumption will usually remain small. Then, R1 may be an acceptable replacement for the risk measure RpM, hq. For ’complex’ systems, the simplifications become either unrealistic (e.g. cascading failures in power grids), or insufficient (e.g. nuclear power plants), or will lead to results containing significant errors. Structurally, the risk measure RpM, hq of definition 9 and the classical safety risk measure R1 are similar. According to [39], R1 is the sum of all losses over all potential problems weighted by their likelihoods. Main difference besides of the restriction h Á 0 for R1 is that [39] speaks about likelihood and definition 9 about probability. This is caused by different perspectives. Whereas [39] uses an analytic perspective based on observations identifying equivalent problems in different contexts, the model-based approach proposed here generates all possible evolution paths in an individual way. Though technically, likelihoods and probabilities maybe different, but coincide with respect to their meaning. Summing up, we can state that the classical notion of risk is approximately reproduced by the simulation-based risk measure under the restriction h Á 0 given above. Thus, our risk measure definition seems to be fine for safety risks. Let us now consider the situation from the security risk point of view. The classical risk measure R2 used for security applications depends on another set of parameters than the classical safety risk measure R1 . Whereas safety defines risk as a product of the probability, that a hazard is realized, and its criticality, security takes vulnerability as explicit factor into account [26, 60] according to risk “ threat ˆ vulnerability ˆ criticality Since we already demonstrated the approximate correspondence between the proposed simulation-based risk measure R and the classical safety risk measure R1 under the simplifying assumption h Á 0, it suffices to show the embeddability of the security risk definition R2 in the safety risk definition R1 for indicating an 11 association between R and R2 . Such an embedding can be constructed in the following way. Since both definitions have criticality in common, the attributes of threat and vulnerability have to be put into relation to the probability of safety risks. More precisely, probabilities for the occurrence of specific threat/vulnerability combinations have to be given. Though quantitative risk-based considerations are not very common in IT security, they have been successfully elaborated anyway e.g. in [1, 4, 49, 50, 59, 63]. Indeed, attack methods like social engineering can be described very well by means of success probabilities [56]. As another example, effort measures typically used e.g. for cryptanalysis can be interpreted as probabilities by considering the ratio between successful attacks and overall attack trials [2]. Though this does not show the desired embeddability rigorously, it makes it at least plausible. The paper [64] supports this view by giving an explicit embedding. Additional support for the possibility to assign probabilities to threat-vulnerability pairs is provided by attack trees defining probabilities for the realization of a specific attack [3, 58]. Besides of the construction of the embedding given above, it exists another argument for a close relationship between safety and security risks. The notion of risk used in environmental safety domains like toxicology and ecology is bridging safety and security as well. It is based on the terms of exposure and impact [30, 45], which have a close correspondence to the terms of threats and vulnerabilities used in cyber security. The exposure-impact concept of environmental risk takes external reasons of risks into consideration similar to security and contrary to technical safety. Thus, safety-related impacts correspond to vulnerabilities and safety-related exposures to security threats. In effect, the overall probability of an actually occurring risk may be thought of as a product of the probability, that a specific problem raises and the probability that the problem is indeed able to affect the system. The topic is discussed further e.g. in [56, 59, 61, 66]. 4.2 (Non)Computability of the Simulation-Based Risk Measure We have already mentioned the large computational effort required for calculating RpM, hq. However, there are more fundamental questions to be discussed in this context. For example, it is natural to ask for the computability of RpM, hq for h Ñ 8. As it turns out, the risk measure RpM, 8q is usually enumerable but not decidable due to the infinite size of the language LpM, hq. This is an analogon to the undecidability results of many other questions like the issue whether a piece of code is a self-replicating malware or whether a control process will still terminate after the infection with a specific malware. Since the extrapolation of the system dynamics can lead to evolution paths of infinite length, a criterion has to be given when the ’simulation’ has to stop for assuring decidability. This is done here by using the time horizon h. Its influence on the risk assessment is decisive. If a small h triggers a stop too early, devastating hazards may be missed; if the assessment process stops too late, the determination of the risk may be compromised because too much effort is wasted on unimportant aspects. This reminds at the quiescence search of algorithmic game theory [62]. In effect, no reliable stopping criterion can be formulated in an absolute sense. 12 5 Example Power Grids 5.1 Power Grid Systems and their Faults and Threats The approach for a unified assessment of safety and security risks proposed here has many advantages from the theoretical point of view. At the downside, a systematic processing of all possible evolution paths based on simulation runs requires a significant computational effort. Though this makes an application in practice difficult, some properties of the corresponding system may indicate candidates of suitable application domains. • For providing additional insight compared to classical risk assessment methods, the system should be prone to both safety and security risks. Furthermore, the system dynamics should enable fault and threat propagation. • For assuring a simple systems model, the system should be as homogenous as possible. Furthermore, the risks associated with the system should be easily representable (e.g. by a flag indicating whether a component is working or not). Distribution networks like power grids [55] have the desired properties. At the moment, power grids are intensively studied in Germany due to the intended exit from nuclear and fossil energy sources [13], which is accompanied by a transition from a centralized continuous to a decentralized, more or less fluctuating power supply. This requires corresponding modifications of the power grid itself, which have to be assessed w.r.t. potential safety and security risks. 5.2 Model Structure Using a model of power grids, we demonstrate the principles of a combined simulationbased safety and security risk-assessment. We will not develop the corresponding DEVS model in detail but restrict ourselves to the concept level. The power grid is represented as network pV, Eq with nodes V and edges E between the nodes. Each edge e P E has two attributes, its flow capacity ae and its actual load la . The actual load la is determined by the flow across the network resulting from the supplies and demands Cv P R at the network nodes v P V . The attribute Cv of the nodes v P V indicates a power consumption of an amount |Cv | in the case of Cv ă 0. For Cv ą 0, the node v is producing power with an amount of Cv . The ratio between flow capacity ae and actual load le determines the probability pe that the link e P E will fail in the next time cycle. As far as possible, the node v will try to avoid loads le exceeding the flow capacity ae significantly for keeping the failure probability pe low. The possible failures of the edges e P E represent the safety aspects of the network pV, Eq. Criticalities cv assigned to the nodes v P V quantify the disadvantagous effects of a power loss for the consumers supplied by v. The necessity to consider multiple concurrent failures requires a refined assessment taking correlations between node failures (and thus the corresponding criticalities) into account. Imagine a situation in which a hospital does not accept new patients due to power loss. Then new patients have to be transported to other hospitals located nearby, which may be usually acceptable. If the power loss does not affect a single hospital but all hospitals of a whole region, the situation is much more severe due to the long distances for transports to a region with intact power supply, say, 200 km away. Hence, the criticality c assigned to such a situation may be considerably larger than the sum of the criticalities cj assigned to power-loss situations for single hospitals. As described above, the nodes v P V control the power flow across the network pV, Eq in such a way that the actual loads la on the edges e P E are kept into the 13 limits given by the edge capacities ae in the best possible way. For this purpose, the nodes v P V use informations provided locally by other nodes v 1 P V and are distributed via an information network pV, F q. These informations consist of the states of the edges e P E incident to v 1 (working resp. not working) and of the power consumption or production at v 1 given by Cv1 . They provide (subjective) knowledge about the power grid pV, Eq, which enables v to schedule the power flow incoming at v across the edges carrying the power outflow. As a consequence, every edge f P F of the information network pV, F q is a vulnerability, because a potential attacker may influence the power grid functionality by modifying the transmitted informations. Such a modification may happen intentionally with a certain probability pf , which represents the security part of the model. 5.3 Model Dynamics For assessing the risk of network failure, safety and security aspects have to be taken into account simultaneously. Let us take a look at the risks associated with the simple power grid depicted in figure 3. The components of the given network consist of a single power producing node NP and several nodes consuming power. The nodes are connected with each other by power transmission lines. Let us assume that the control component of the node NC becomes a victim of a cyber attack. The attacker switches off a power transmission line, say the connection e4 between the nodes NC and ND . Now these nodes are not directly connected anymore. The breakdown of this transmission line changes the probabilities of many other potential faults due to the feedback mechanisms contained in the given example. The power supply of the four nodes ND , NE , NF , NG is not provided by the two lines e4 between NC and ND and e5 between NC and NE anymore. Only one of these connecting lines is left. The system tries to preserve the availability of the grid by rescheduling the power flow interrupted by the failure of e4 . The rescheduling leads typically to a higher load for the remaining operational network elements, which in turn leads to an increased probability of failure for them. This may lead to the failure of the next component of the network within short notice. When taking the rescheduling functionality of the network into consideration, an risk resp. reliability assessment considering only the instantaneous situation at the beginning is not valid anymore. In effect, the rescheduling of the power flow may lead to a so-called cascading failure switching off large parts of the network. For the handling of such a cascading failure, the conventional methods of safety risk assessments are inappropriate [14], because this requires the inclusion of fault propagation mechanisms and thus an explicit modeling of system dynamics. The simulation-based risk measure presented here has such a capability and can thus handle a stepwise degradation of system capabilities and functionalities. Simulating system dynamics allows to check whether the effects of a fault or a fault sequence may act as causes of new faults due to overloads of remaining components. Describing the dynamics of such a cascade failure, and even more, predicting it trustworthy, is still a challenge for the reliability theory of networks [7]. The capability of such assessments would be of high interest, however, because the breakdown of the complete power grid (or at least essential parts of it) is a critical risk. Human lifes may depend on a working power supply (hospitals, infrastructure, military defence, etc.). If the initial failure of the connection line of the power grid is caused by a self-replicating malware propagating across the information network pV, F q, the resulting situation is more complicated. Two kinds of dynamics are interacting with each other. First, malware is propagating along control nodes of the power grid. Second, if a power line fault happens, a fault sequence may be the consequence. These two kinds of dynamics are interacting because malware-infected control-nodes 14 NP CP e1 CA NA e2 NC e3 NB CB NE CE e5 e4 CD ND e6 CF CC NF e7 e9 e8 NG CG Figure 3: A simple power grid, represented as a network. An explanation can be found in the text. may not react in the intended fault-mitigating way and instead worsen the problem. Another potential complication concerning the control mechanism would be the arousal of a new fault during the management of the actual fault leading to interferences between the fault propagation mechanism and the problem solution task of the control process. Furthermore, the individual control tasks for managing faults raised concurrently may interfere, too. 6 Outlook The rapid spread of embedded systems lead to the statement that there is no safety without security and no security without safety. Accordingly, the paper develops a unified notion of risk applicable to both safety and security problems. This notion uses a simulation based approach in the context of STDEVS models. Its application to power grids shows that the proposed approach can handle situations, which are not appropriately dealt with conventional risk assessment methods. These advantages results from the inclusion of dynamics, which takes into account that individual risk cases may occur concurrently and consecutively and that errors and other off-nominal behaviors may propagate across the system. The simulation-based approach considers all these effects implicitly; eventually emerging interactions between propagating effects are included as well. Questions of controllability are calculated objectively instead of being estimated based on intuitive guesses. Relying on a simulation model M offers another advantage. Risk cases can be generated and assessed automatically based on M with its probability and criticality attributes. Due to the large number of risk cases — remember that both safety and security risk cases are considered here — the large number of items to be processed makes the classical way of generating and assessing a list of risk cases manually hardly feasible. Thus, an automated model-based risk assessment turns out to be quite useful. The exploration of ways to refine the approach with respect to computational tractability may be the topic of forthcoming research, however. 15 Acknowledgements I would like to offer my special thanks to M. Grössler for many valuable remarks. References [1] Abrahamson, D., A. Sepeda, Expanding Known Process Safety and Risk Analysis Concepts to Manage Security Concerns, in Proceedings of the 40th Loss prevention Symposium, 2006 [2] Alaboodi, Saad Saleh, Model-based Evaluation: from Dependability Theory to Security, Doctoral Thesis, University of Waterloo, 2013 [3] Arnold, Florian, et al., Time-dependent analysis of attacks, International Conference on Principles of Security and Trust, Springer 2014 [4] Aven, Terje, A unified framework for risk and vulnerability analysis covering both safety and security, Reliability Engineering & System Safety 92(6)(2007) 745-754 [5] Avizienis, A., J-C. Laprie et al., Basic concepts and taxonomy of dependable and secure computing, IEEE Trans Depend Secur Comput, 1(2004) 11-33 [6] Axelrod, Warren, Engineering Safe and Secure Software Systems, Artech House 2012 [7] Baldick, R. et al., Vulnerability assessment for cascading failures in electric power systems in Proceedings of Power Systems Conference and Exposition, IEEE 2009 [8] Blom, Henk, et al., Safety risk assessment by Monte Carlo simulation of complex safety critical operations, Developments in Risk-based Approaches to Safety. Springer 2006, pp. 47-67. [9] Bobbio A., et al., Improving the analysis of dependable systems by mapping FTs into Bayesian networks, Journal of Reliability Engineering and System Safety 71(2001) 249-60 [10] Bosworth, Seymour, M. E. Kabay, Computer Security Handbook, Wiley 2002 [11] Branagan, Mark, A risk simulation framework for information infrastructure protection. Dissertation, Queensland University of Technology, 2012. [12] Brewer, DFC, Applying security techniques to achieve safety, in Proceedings of the 3rd safety-critical systems symposium, Bristol, UK, 1993, pp. 246-56. [13] Buchan, David, The Energiewende - Germany’s gamble, The Oxford Institute for Energy Studies, SP 26(2012), online http://www.oxfordenergy.org/ wpcms/wp-content/uploads/2012/07/SP-26.pdf [14] Cadini, Francesco, et al., Using Centrality Measures to Rank the Importance of the Components of a Complex Network Infrastructure, in Roberto Setola & Stefan Geretshuber (Eds.), Critical Information Infrastructures Security, Third International Workshop, Springer 2008 [15] Castro, R., E. Kofman, G. Wainer, A formal framework for stochastic DEVS modeling and simulation, in Hassan Rajaei et al., Proceedings of the 2008 Spring Simulation Multiconference, Ottawa, Canada 2008, pp. 421-428 16 [16] Castro, R., E. Kofman, G. Wainer, A Formal Framework for Stochastic DEVS Modeling and Simulation, in Transactions of the Society for Modeling and Simulation International, 86(2010) 587-611 [17] Chi, S.-D., et al., Network Security Modeling and Cyber Attack Simulation Methodology, in Vijay Varadharajan & Yi Mu, Information Security and Privacy, Proceedings of the 6th Australasian Conference, Sydney, Australia, Lecture Notes in Computer Science 2119(2001) 320-333 [18] Devooght, J., Dynamic Reliability: The Challenges Ahead, Fifth International Workshop on Dynamic Reliability: Future Directions, Greenbelt, Maryland 1998. [19] Dissanayaka, Anuradha, et al., Risk-based dynamic security assessment, IEEE Transactions on Power Systems 26(3)(2011) 1302-1308. [20] Draeger, J., Roadmap to a Unified Treatment of Safety and Security, in Proceedings of System Safety and Cyber Security, Bristol, UK, 2015 [21] Faber, M.H., et al., Principles of risk assessment of engineered systems, in Proceedings of the 10th International Conference on Applications of Statistics and Probability in Civil Engineering, Tokyo, Japan, 2007 [22] Felde, Magnus, Analyzing Security Decisions with Discrete Event Simulation. Master Thesis, Gjøvik University College 2010 [23] Fenton, Norman, and Martin Neil, Measuring your Risks: Numbers that would make sense to Bruce Willis and his crew, available online at http://www. agena.co.uk/resources/white_papers/Measuring_Risks.pdf [24] Fenton, Norman, and Martin Neil, Risk Assessment and Decision Analysis with Bayesian Networks, CRC Press 2012 [25] Firesmith, D.G., Common Concepts Underlying Safety, Security, and Survivability Engineering, Technical Note CMU/SEI-2003-TN-033, Software Engineering Institute 2003 [26] Flammini, Francesco, et al., Optimisation of security system design by quantitative risk assessment and genetic algorithms, Int. J. of Risk Assessment and Management 15(2/3)(2011) 205-221 [27] Fovino, Nai, M. Masera, Integrating Cyber Attacks within Fault Trees, In Reliab. Eng. Syst. Saf. 94(2009) 1394-1402 [28] Gutierrez, Tomas Navarrete, Laurent Ciarletta, Vincent Chevrier, Multi-agent simulation based control of complex systems, in Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, ACM 2014, pp. 1517-1518 [29] StJohn-Green, M., et al., Combined security and safety risk assessment - what needs to be done for ICS and the IOTQ, in Proceedings of the 10th IET System Safety and Cyber Security Conference 2015 [30] Hakkert, A.S., L. Braimaister, The uses of exposure and risk in road safety studies, Report R-2002-12 SWOV Institute for Road Safety Research, Leidschendam 2002 [31] Hernandez, Alejandro, Norbert Giambiasi, State Reachability for DEVS Models, in A. Hernández, N. Giambiasi, Proc. of Argentine Symposium on Software Engineering 2005, pp. 267-277 17 [32] Hopcroft, John E., Rajeev Motwani, Jeffrey D. Ullman, Introduction to Automata Theory, Languages, and Computation, Pearson 2013 [33] Hwang, Moon H., Qualitative Verification of Finite and Real-Time DEVS Networks, in Proceedings of 2012 TMS/DEVS, Orlando, FL, USA [34] Hwang, M.H., Revisit of system variable trajectories, in Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative M&S Symposium, San Diego, CA, USA 2013 [35] Hwang, M.H., & Bernard Zeigler, A Reachable Graph of Finite and Deterministic DEVS Networks, in Proceedings of 2006 DEVS Symposium, Huntsville, Alabama, USA, pp. 48-56 [36] Hwang, M.H., & Bernard Zeigler, Reachability Graph of Finite & Deterministic DEVS, IEEE Transactions on Automation Science and Engineering 6(3)(2009) 454-467 [37] Jithavech, Id, & Krishna Kumar Krishnan, A simulation-based approach for risk assessment of facility layout designs under stochastic product demands, The International Journal of Advanced Manufacturing Technology 49(1-4)(2010) 27-40 [38] Jonsson, E., & T. Olovsson, On the integration of security and dependability in computer systems, in Proceedings of the IASTED international conference on reliability, quality control and risk assessment, Washington, DC, USA 1992, pp. 93-7 [39] Kaplan, S., & B. J. Garrick, On the Quantitavive Definition of Risk, Risk Analysis Journal 1(1)(1981) 11-27 [40] Karnouskos, Stamatis, Stuxnet worm impact on industrial cyber-physical system security, in Proceedings of the 37th Annual Conference on IEEE Industrial Electronics Society, IEEE 2011. [41] Khakzad, Nima, Faisal Khan, Paul Amyotte, Safety analysis in process facilities: Comparison of fault tree and Bayesian network approaches, Reliability Engineering & System Safety 96(8)(2011) 925-932 [42] Khakzad, Nima, Faisal Khan, Paul Amyotte, Dynamic risk analysis using bowtie approach, Reliability Engineering & System Safety 104(2012) 36-44 [43] Kofman, E., & R.D. Castro, STDEVS, A Novel Formalism for Modeling and Simulation of Stochastic Discrete Event Systems, in Proceedings of AADECA, Buenos Aires, Argentina, 2006 [44] Kriaa, S., et al., A Survey of Approaches Combining Safety and Security for Industrial Control Systems, Reliab. Eng. Syst. Safe. 139(2015) 156-178 [45] Kron, W., Keynote lecture: Flood risk = hazard ˆ exposure ˆ vulnerability, in Flood defence, Science Press 2002, pp. 82-97. [46] Law, Averill M., Simulation Modeling and Analysis, Mc Graw Hill 2006 [47] Lee, R., M. Assante, T. Connway, ICS CP/PE (Cyber-to-Physical or Process Effects) case study paper — German Steel Mill Cyber Attack. Technical report, SANS ICS 2014 [48] Leveson, N., Engineering a Safer World, MIT Press 2012 18 [49] Littlewood, B., Dependability assessment of software-based systems: State of the art, in Proceedings of the 27th international conference on software engineering, St.Louis, MO, USA 2005, pp. 6-7 [50] Littlewood, B, et al., Towards operational measures of computer security, Journal of Computer Security 2(1993) 211-29 [51] Mader, R., et al., A framework for model-based safety requirements roundtrip engineering [52] Mohaghegh, Zahra, Reza Kazemi, Ali Mosleh, Incorporating organizational factors into Probabilistic Risk Assessment (PRA) of complex socio-technical systems: A hybrid technique formalization, Reliability Engineering and System Safety 94(2009) 1000-1018 [53] Mueller, Paul, & Babak Yadegari, The Stuxnet Worm, Departement des sciences de l’informatique, Université de l’Arizona 2012, online available at http://www.cs.arizona.edu/~collberg/Teaching/466-566/2012/ Resources/presentations/2012/topic9-final/report.pdf [54] Nejad-Hosseinian, Seyed Hamed, Automatic generation of generalized event sequence diagrams for guiding simulation based dynamic probabilistic risk assessment of complex systems, ProQuest 2007 [55] Pappu, Vijay, Marco Carvalho, Panos Pardalos, Optimization and Security Challenges in Smart Power Grids, Springer 2013 [56] Pieters, Wolter, et al., Reconciling Malicious and Accidental Risk in Cyber Security, Journal of Internet Services and Information Security 4(2)(2014) 4-26 [57] Pietre-Cambacedes, L., & M. Bouissou, Cross-fertilization between safety and security engineering, Reliability Engineering and System Safety 110(2013) 110126 [58] Wang, Ping, et al., Threat Risk Analysis for Cloud Security based on AttackDefense Trees, in Proceedings of the 8th International Conference on Computing Technology and Information Management, Seoul, Korea, IEEE 2012, pp. 106-111 [59] Pirzadeh, Jonsson, E., A Cause and Effect Approach Towards Risk Analysis, in James Walden, Laurie Williams, Proceedings of the Third International Workshop on Security Measurements and Metrics 2011, pp. 80-83 [60] Robbins, Philip, Security Risk Analysis and Critical Information Systems, Master Thesis, Hawaii Pacific University 2011 [61] Rot, Artur, IT Risk Assessment: Quantitative and Qualitative Approach, in Proceedings of the World Congress on Engineering and Computer Science, San Francisco, USA 2008 [62] Russell, Stuart, & Peter Norvig, Artificial Intelligence: A Modern Approach, Prentice Hall 2013 [63] Said, Fadi Haj, Security-based risk assessment for software architecture, Doctoral Dissertation, West Virginia University 2011 [64] Salvati, Domenico, Management of information system risks, Doctoral Thesis, ETH Zürich 2008 19 [65] Solcány, Viliam, Simulation Algorithms for DEVS Models, 2008, available online at http://www2.fiit.stuba.sk/~solcany/files/devs_article.pdf [66] Sørby, Karine, Relationship between safety and security in a safety-security critical system: Safety consequences of security threats, 2003 [67] Spellman, F., & N. Whiting, The Handbook of Safety Engineering: Principles and Applications, Government Institutes 2009 [68] Vangheluwe, H.L.M., DEVS as a common denominator for multi-formalism hybrid systems modelling, in A. Varga, Proceedings of the IEEE International Symposium on Computer-Aided Control System Design 2000, pp. 129-134 [69] Winkelvos, Timo, Carsten Rudolph, Jurgen Repp, A property based security risk analysis through weighted simulation, in Proceedings of Information Security South Africa, IEEE 2011 [70] Zeigler, Bernard, Multifacetted Modeling and Discrete Event Simulation, Academic Press 1984 [71] Zeigler, Bernard, Tag Gon Kim, Herbert Praehofer, Theory of Modeling and Simulation, Academic Press 2000 [72] Zeigler, Bernard, DEVS today: Recent advances in discrete event-based information technology, in Proceedings of the 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, IEEE 2003 [73] Zeigler, B., & S. Vahie, Devs formalism and methodology: unity of conception/diversity of application, in Proceedings of the 25th Winter Simulation Conference, Los Angeles, CA 1993, pp. 573-579 20
3cs.SY
arXiv:1606.08151v1 [math.ST] 27 Jun 2016 Bernoulli 22(4), 2016, 2521–2547 DOI: 10.3150/15-BEJ736 Methods for improving estimators of truncated circular parameters KANIKA* and SOMESH KUMAR** 1 Department of Mathematics, Indian Institute of Technology Kharagpur, Kharagpur-721302, West Bengal, India. E-mail: * [email protected]; ** [email protected] In decision theoretic estimation of parameters in Euclidean space Rp , the action space is chosen to be the convex closure of the estimand space. In this paper, the concept has been extended to the estimation of circular parameters of distributions having support as a circle, torus or cylinder. As directional distributions are of curved nature, existing methods for distributions with parameters taking values in Rp are not immediately applicable here. A circle is the simplest one-dimensional Riemannian manifold. We employ concepts of convexity, projection, etc., on manifolds to develop sufficient conditions for inadmissibility of estimators for circular parameters. Further invariance under a compact group of transformations is introduced in the estimation problem and a complete class theorem for equivariant estimators is derived. This extends the results of Moors [J. Amer. Statist. Assoc. 76 (1981) 910–915] on Rp to circles. The findings are of special interest to the case when a circular parameter is truncated. The results are implemented to a wide range of directional distributions to obtain improved estimators of circular parameters. Keywords: admissibility; convexity; directional data; invariance; projection; truncated estimation problem 1. Introduction Problems of estimation when the parameter space is restricted are encountered often in practice. These restrictions arise due to prior information on parameters and they can be in the form of bounds on the range or equality/inequality constraints of several parameters. For recent developments and discussions on various aspects of estimation procedures in restricted parameter space problems, one may refer to [14, 15, 17, 18, 28] and references therein. Frequently in practical applications, we assume the random observations taking values in Euclidean spaces. However, it sometimes may be more useful to represent them on circles/spheres/cylinders. In such cases, we employ directional distributions. For instance, mortality data due to a specific disease may be better represented as circular data to study the seasonal pattern of the disease. There are numerous situations This is an electronic reprint of the original article published by the ISI/BS in Bernoulli, 2016, Vol. 22, No. 4, 2521–2547. This reprint differs from the original in pagination and typographic detail. 1350-7265 c 2016 ISI/BS 2 Kanika and S. Kumar in biological, meteorological, astronomical applications, where directional data (circular/axial/spherical) arises [1, 8, 19]. However, little attention has been paid to problems of estimating directional parameters under constraints. Rueda, Fernández and Peddada [25] considered the estimation of the circular parameters under order restrictions. There are situations when the parameter may lie on an arc of the circle. For example, the peak of mortality rates due to respiratory diseases occurs during November to February. One major consequence of placing restrictions on the natural parameter space is that estimators derived using standard concepts of maximum likelihood, minimaxity, invariance, etc., become inadmissible. However, existing methods developed for Euclidean spaces Rp are not directly applicable to directions which are represented to lie on unit hypersphere with the center at origin Sp−1 = {x ∈ Rp : kxk = (xT x)1/2 = 1}. Topological properties of Sp−1 depend on the differential geometry of embedding Sp−1 in Rp as x → x/kxk with x ∈ Rp . We need to suitably modify techniques available for Rp to improve standard estimators of directions. In this paper, we consider the case of p = 2 and denote by S a unit circle. The elements of S can be specified by corresponding angles with respect to an arbitrary choice of zero direction and orientation. Let us define by T = [0, 2π) the space of amplitudes of the unit vectors in S. The point on S corresponding to an angle α ∈ T is (cos α, sin α)T and the angle corresponding to a point x = (x1 , x2 )T ∈ S is atan(x2 /x1 ), where the function atan(·) is given in (2.2). Note that S and T are isomorphic. Let random variable Z ∈ Z have an unknown probability distribution Pν , ν ∈ Ω. Let the family {Pν , ν ∈ Ω} be dominated by a measure η. The support Z may be circle T, torus Tk or cylinder R × T, etc.; however, the estimand h(ν) is circular, where h(·) is a measurable function from Ω into T. The problem of estimating h(ν) is considered under a circular loss function: L(ν, δ) = 1 − cos(h(ν) − δ). (1.1) In the case when the parameter space is a subspace of Rp and the loss function is an increasing function of Euclidean distance, the action space is chosen as a convex closure of the range of estimand. Unlike this well-known result, it is demonstrated in Section 3 that analogous result does not necessarily hold for circular parameter h(ν) under the loss L. One of the major contributions was of Moors [22] (see [21], Chapter 3, also) to the estimation problem of truncated parameters of a unknown family of distributions on Rp dominated by a σ-finite measure. Estimators (except the constant ones) taking value near the boundaries of action space with the positive probability turn out to be inadmissible with respect to the squared loss function under certain conditions on the transformation group. He considered invariance under a finite group with measure preserving elements such that induced transformations of the action space satisfy the linearity property and group of these transformations is commutative. Under this scenario, he constructed a subspace of the original action space and proved that any invariant estimator taking values outside this new action space with the positive probability is inadmissible and dominated by its projection on the new action space. Later, Moors and van Houwelingen Truncated circular parameters 3 [23] relaxed conditions of measure preserving and commutativity. Without dropping these conditions, Kumar and Sharma [16] generalized the result of Moors [22] to a locally compact group such that induced transformations on the action space are affine (stronger condition than linear property) and loss function is an increasing function of Euclidean distance. Along with these ideas, an analogous theory for circular parameter h(ν) is developed in Section 4. The outline of the paper is as follows. The concepts of distance formulae, convexity, closure of a set and projections play a prominent role here. Section 2 provides the mathematical background of these concepts for T. In Section 3, we consider the estimation of circular parameter h(ν) when it is restricted to lie on an arc of circle and estimation space A is chosen as the convex closure of h(Ω). A complete class result for this estimation problem is obtained under certain conditions. Then the result is illustrated for several directional distributions. In Section 4, we introduce invariance under a compact group G in the estimation problem such that induced transformations on A satisfy the circular property. Sufficient condition for inadmissibility of an G-equivariant estimator is obtained. Applications of this result are demonstrated for both unrestricted or restricted estimation problems. For restricted estimation problems, improved estimators obtained in Section 3 are further improved using the result of Section 4. 2. Definitions and preliminary results Before we embark on estimation problem, we introduce some preliminary results in this section. For a subset A ⊂ T, Lebesgue measure, interior, convex hull, convex closure and boundary of A are denoted by l(A), int(A), conv(A), cc(A) and bd(A), respectively. 2.1. Convexity It is more convenient to deal with polar coordinates than Cartesian coordinates when observations lie on a unit circle. We summarize the concept of convexity for the circle S and then adopt it for the space T. A geodesic ([27], page 15), on Riemannian manifold generalizes the line in Euclidean space. In the context of Riemannian manifold M equipped with Riemannian metric, a subset A ⊂ M is convex if minimal geodesic with the end points in A belongs to A. In the case of S, great circles are geodesics. Minimal geodesic between any two points on S is unique unless points are antipodal (diametrically opposite). Some concepts of convexity on S were introduced in [4], Section 9.1. Here, we use convexity and strong convexity as given below. Definition 2.1 (Convex). A set A ⊂ S is convex if for any two points in A, there exists a minor arc of great circle lying entirely in A joining them. By convention, this definition allows antipodal points to lie in convex sets. Every segment of a semicircle is a convex subset of S. 4 Kanika and S. Kumar Definition 2.2 (Strongly convex). A subset A of S is strongly convex if A is convex and does not contain antipodal points. In the case of Rp , convex hull of any subset is the collection of all possible weighted arithmetic mean of points in that subset. Analogously for a set A ⊂ S, the convex hull of A is the smallest convex set (not necessarily strong convex) containing A, that is, it consists of (w1 x1 + · · · + wn xn )/kw1 x1 + · · · + wn xn k (2.1) Pn for all nonnegative weights w1 , . . . , wn such that i=1 wi = 1 and for all x1 , . . . , xn ∈ A provided the norm in the denominator is nonzero. The convex hull of two antipodal points of S does not exist ([3], Section 2.3). Polar form of (2.1) is discussed in Section 2.2. Extension of a fundamental theorem of Carathéodory for R2 to S can be stated as below (see [3]). Lemma 2.1. Each point in the convex hull of a set A ⊂ S can be expressed as normalized weighted arithmetic mean of at most 2 points of A. To extend definitions of convex and strong convex sets to the space T, we need certain subsets of T. For α, β ∈ T, definitions for sets of type I, J , K and K1 are stated only for intervals of form (α, β). They may be extended to intervals of other forms (α, β], [α, β) and [α, β]. For α ≤ β, let I(α, β) = (α, β), J(α, β) = [0, α) ∪ (β, 2π),   I(α, β), K(α, β) = I(α, β) or J(α, β),  J(α, β), if 0 ≤ (β − α) < π; if (β − α) = π; if π < (β − α) < 2π. Sets I[α, β] and J[α, β] contain all the angles corresponding to an arc joining two points (cos α, sin α)T and (cos β, sin β)T in the positive and the negative directions, respectively. Moreover, K[α, β] contains angles corresponding to the minor arc joining them. Remark 2.1. Although in definition of I-type set, β is not allowed to take value 2π, intervals (α, 2π) and [α, 2π) can be expressed as J(0, α) and J(0, α], respectively, for all α ∈ T. For any α ∈ T, J(α, α) = T − {α} and J(α, α] = J[α, α) = J[α, α] = T. For defining sets of type I, J and K, we have taken α ≤ β. The following definition for K1 -type subsets of T does not have this restriction.  K(α, β), if α ≤ β, K1 (α, β) = K(β, α), if α > β. Truncated circular parameters 5 Note that set K(α, β) is isomorphic to I(0, γ) with γ ∈ [0, π]. For 0 ≤ (β − α) ≤ π and π < (β − α) < 2π, K(α, β) can be transformed to I(0, β − α) and I(0, 2π − β + α) using rotation by angles 2π − α and 2π − β, respectively. Extending this argument, we have the following result. Lemma 2.2. Sets K1 (α, β), K1 (α, β], K1 [α, β) and K1 [α, β] with α, β ∈ T are isomorphic to I(0, γ), I(0, γ], I[0, γ) and I[0, γ], respectively, with 0 ≤ γ ≤ π. For studying topological properties, we consider the metric space (T, d) with the following definition of metric: d(α, β) = 1 − cos(α − β), α, β ∈ T. √ Here, 2d simply returns lengths of chord between points (cos α, sin α)T and (cos β, sin β)T , respectively. Consider the following classes of subsets of T: C1 = {T} ∪ {K1 (α, β), K1 (α, β], K1 [α, β), K1 [α, β] : α, β, ∈ T}, C2 = {K1 (α, β), K1 (α, β], K1 [α, β) : α, β ∈ T} ∪ {K1 [α1 , β1 ] : α1 , β1 ∈ T and |α1 − β1 | 6= π}, C3 = C1 − C2 = {T} ∪ {K1 [α, β] : α, β, ∈ T and |α − β| = π}, C4 = {∅, T} ∪ {I[α, β], J[α, β] : α, β, ∈ T and α ≤ β}, C5 = C1 ∩ C4 = {∅, T} ∪ {K1 [α, β] : α, β ∈ T and α ≤ β}. Remark 2.2. Classes C1 , C2 and C5 consist of all convex, strongly convex and closed convex subsets of T, respectively. Elements of C3 and C4 are closed subsets of T. Moreover, sets belonging to C3 (except T) and C4 are corresponding to any minor arc and any arc on the unit circle, respectively. 2.2. Circular mean direction Since the arithmetic mean is not a suitable measure of central tendency for the angular data, the circular mean direction is used ([12], page 13). The weighted circular mean direction of the observations φ1 , . . . , φn belonging to T with weights w1 , . . . , wn , wi ≥ 0 P (i = 1, . . . , n) such that ni=1 wi = 1 is defined as   Pn i=1 wi sin φi P , φ̄w = atan n i=1 wi cos φi with the following definition of atan(·)  −1  tan (s/c),      π + tan−1 (s/c), s atan = π/2,  c −1    2π + tan (s/c), not defined, if if if if if c > 0, s ≥ 0; c < 0; c = 0, s > 0; c ≥ 0, s < 0; s = 0, c = 0, (2.2) 6 Kanika and S. Kumar where tan−1 (·) is the standard inverse tangent function taking values in (−π/2, π/2). The definition of atan(·) function ensures the following property. Lemma 2.3. For all φ ∈ T and a ∈ R, we have   tan φ + a atan = {φ + tan−1 (a)} mod (2π). 1 − a tan φ Note that φ̄w is polar form of (2.1) if φi is corresponding angle to xi ∈ S for all i = 1, . . . , n. The following proposition proves that convex combination (weighted circular mean direction) of finite collection of the points in convex subset of T is again in that subset. PropositionP2.1. Let A ∈ C1 (convex), φ1 , . . . , φn ∈ A and w1 , . . . , wn be nonnegative weights with ni=1 wi = 1. Then weighted circular mean direction φ̄w of these observations belongs to A, if it is defined. Circular mean direction of a circular random variable θ is defined as CE(θ) = atan(E sin θ/E cos θ). An elementary result given in [7], page 74, states that if random variable X lies in convex subset of Rp with probability one, E(X) lies in the same subset. An analogous result for T is given below. Proposition 2.2. If A ∈ C1 (convex) and θ is a random angle such that Pr(θ ∈ A) = 1, the mean direction CE(θ) ∈ A if CE(θ) exists. Furthermore, if A ∈ C2 (strongly convex), CE(θ) always exists. If A ∈ C3 (convex but not strongly), CE(θ) does not necessarily exist. 2.3. Projection The concept of projection in Rp is adopted to define projections of angles in T. Definition 2.3. The projection of an angle φ ∈ T on a nonempty set A ∈ C4 (closed) is defined to be the unique point φ0 ∈ A such that d(φ, φ0 ) = inf d(φ, ψ). ψ∈A The case when A = T is trivial. For α, β ∈ T, let γ = (α + β)/2. If A is of from I[α, β], φ0 is given by   if φ ∈ I[α, β]; if φ ∈ I[α, β];  φ,  φ, φ0 = α, if φ ∈ K1 (α, π + γ]; or α, if φ ∈ K1 (α, π + γ);   β, if φ ∈ K1 (β, π + γ); β, if φ ∈ K1 (β, π + γ]. Truncated circular parameters 7 Note that the two definitions are equivalent except when φ = π + γ. For φ = π + γ, first and second ones yield φ0 = α and φ0 = β, respectively. This is so because d(α, π + γ) = d(β, π + γ). If A is the form of J[α, β], φ0 is given by   φ, φ0 = α,  β, if φ ∈ J[α, β]; if φ ∈ I(α, γ]; if φ ∈ I(γ, β); or   φ, α,  β, if φ ∈ J[α, β]; if φ ∈ I(α, γ); if φ ∈ I[γ, β). Once again the two definitions are equivalent except when φ = γ. Let A be a closed convex subset of Rp and x ∈ Rp . The projection x0 of x ∈ / A on A satisfies kx0 − yk < kx − yk for all y ∈ A. An analogous statement holds only for specific closed convex subsets of T. The following result can be easily proved using geometrical arguments. Lemma 2.4. Let φ0 be the projection of an angle φ ∈ / A on a set A ∈ C5 (closed convex). The inequality d(φ0 , ψ) < d(φ, ψ) for all ψ ∈ A holds iff A = I[α, β] with β < α + (2/3)π or A = J[α, β] with β > α + (4/3)π, that is, l(A) < (2/3)π. Moreover, if l(A) = (2/3)π and bd(A) = {b1 , b2 }, the above inequality remains strict for ψ ∈ int(A) and at least one of ψ = bi (i = 1, 2). For remaining sets in C5 , the above result holds for the expected values under certain conditions on the distribution of random variable θ (Lemma 2.5). If the distribution of a circular random variable θ is symmetric about ψ, the density of θ with respect to any measure (measure is always finite as T is a compact space) would be a function of cos(θ − ψ). Further, if this distribution is unimodal, mean direction and mode coincide. Let us denote by f (θ|ψ) = f (cos(θ − ψ)) the density of a symmetric unimodal distribution with mode ψ. Now consider the mixture of two unimodals f (·|ψ) and f (·|ψ + π). This mixture would necessarily not be bimodal. Let θ have a mixture distribution with probability density εf (θ|ψ) + (1 − ε)f (θ|ψ + π), ε ∈ [0, 1]. For this mixture distribution, define ζ(t) = f ′ (t)/f ′ (−t), t ∈ [−1, 1] (2.3) with t = cos(θ − ψ). Maxima and minima of ζ(t) are denoted by ζmax and ζmin , respectively. Distribution of θ would be unimodal with modes ψ and ψ + π for ε ∈ [{1 + ζmin }−1 , 1] and ε ∈ [0, {1 + ζmax }−1 ], respectively. For remaining values of ε, it would be bimodal. 8 Kanika and S. Kumar Lemma 2.5. Suppose that θ is a continuous circular random variable whose distribution is symmetric about one of its mode ψ, where ψ belongs to A ∈ C5 (closed convex) with l(A) ∈ (2π/3, π] such that Pr(θ ∈ / A) > 0. Let θ0 be the projection of θ on A. Then Eθψ {d(θ0 , ψ)} < Eθψ {d(θ, ψ)} if distribution of θ satisfies one of the following conditions: (C1) distribution is unimodal with mode ψ; (C2) distribution is mixture with probability density εf (·|ψ) + (1 − ε)f (·|ψ + π), where ε ≥ 1/2 and ζ(·) defined in (2.3) is an increasing function. It may be noted that the condition (C2) implies (C1) for ε ∈ [{1 + ζ(−1)}−1 , 1]. Remark 2.3. Convexity of density function f (t) in t ∈ [−1, 1] yields increasing nature of the function ζ(t). 3. Improving estimators in restricted parameter spaces In Euclidean spaces, the action space is chosen as a convex closure of the estimand space since estimators outside this space with the positive probability are dominated by their projections on it. An analogous result stated below for estimating the circular parameter h(ν) is an immediate consequence of Lemmas 2.4 and 2.5. Theorem 3.1. Let estimand be h(ν) ∈ Ω1 = h(Ω) ⊂ T and the loss function be L defined in (1.1). Denote the estimation space by A = cc(Ω1 ). Any estimator δ(Z) satisfying Prν (δ(Z) ∈ / A) > 0 for some ν ∈ Ω is inadmissible and dominated by the projection of δ(Z) on A if either of the following conditions holds: (C3) l(A) ≤ (2/3)π; (C4) distribution of δ(Z) is symmetric about h(ν) and with respect to Lebesgue measure, it satisfies one of the conditions (C1) and (C2) with ψ = h(ν). For the sake of clarity, the estimation space A can be called the action space only when its Lebesgue measure is less than or equal to 2π/3. Remark 3.1. Note that when estimand h(ν) is forced to lie on an arc of semicircle, A is strictly a subset of T. If h(ν) does not take value on a semicircle, A = T ([3], Theorem 7). Conditions given in Theorem 3.1 for the inadmissibility of an estimator are sufficient but not necessary. Suppose that θ has a mixture distribution which is generated from distributions CN(ν, κ) and CN(ν + π, κ) with probabilities ε and (1 − ε), respectively, where ν ∈ [0, π], ε = 0.1 and κ = 1. Based on the random sample of size n = 10, risk Truncated circular parameters 9 Figure 1. Risk plot (a) θ̄ (straight line) and (b) projection of θ̄ on [0, π] (dotted line) under the loss L. functions of the sample mean direction θ̄ (straight line) and the projection of θ̄ on [0, π] (dotted line) under the loss L are plotted in Figure 1. Density of CN distribution and θ̄ are defined in the next subsection. It can be seen that for end points of ν ∈ [0, π], θ̄ is not improved by its projection. This demonstration refutes the result stated in Theorem 3.1 for an arbitrary estimator in case l(A) > (2/3)π. If an estimator δ(Z) has a distribution with mixture probability density εf (δ(z)|h(ν))+ (1 − ε)f (δ(z)|h(ν) + π), its mean direction is given by  if ε < 1/2;  h(ν) + π, CE(δ(Z)) = undefined, if ε = 1/2;  h(ν), if ε > 1/2. Therefore, when ε < 1/2, δ(Z) can be treated as an estimator for h(ν) + π. Although Theorem 3.1 is based on a condition (C4) satisfied by the distribution of an estimator when l(A) > (2/3)π, examining the distribution of the estimator can be a complex exercise. We try to simplify these conditions for specific cases. Consider the problem of estimating the location parameter ν ∈ T of a circular random variable θ under the loss L which is invariant under a rotation group G1 = {gα : gα (θ) = (θ + α) mod (2π)}. (3.1) Under L, an G1 -equivariant estimator for ν based on a random sample θ1 , . . . , θn satisfies δ(θ1 , . . . , θn ) = θ1 + ξ(θ2 − θ1 , . . . , θn − θ1 ), where ξ is an arbitrary statistic whose distribution is free from ν. This indicates that distribution of an G1 -equivariant estimator is of the same nature as θ. Using this fact, we deduce the following result from Theorem 3.1. Corollary 3.1. If θ is a continuous circular random variable whose distribution is symmetric about ν ∈ Ω1 and satisfies one of the conditions (C1) and (C2) with ψ = ν such 10 Kanika and S. Kumar that A = cc(Ω1 ) is K1 -type, that is, l(A) ≤ π, any G1 -equivariant estimator δ(θ) lying outside A with the positive probability is inadmissible and dominated by its projection on A under loss L. A similar result can be extended to the torus Tk = T × · · ·× T. A distribution on Tk can be specified as that of k circular random variables, that is, k-tuple vector Z = (θ1 , . . . , θk ) taking values on Z ⊂ Tk . Suppose that all k components are independently distributed and each component has a common location parameter ν. This estimation problem is invariant under a group G2 given by G2 = {gα = (g1α , . . . , gkα ) : giα (θi ) = (θi + α) mod (2π)}. (3.2) Problem of estimating ν can also be thought as multisample problem of estimating common ν. Therefore, we can also draw random samples of different sizes from different components of Z as components are independently distributed. As in Corollary 3.1, we deduce the following result from Theorem 3.1. Corollary 3.2. Let all components of a random variable Z = (θ1 , . . . , θk ) taking value on Tk be independently distributed. If each component has a common location parameter ν ∈ Ω1 and satisfies with respect to Lebesgue measure one of the conditions (C1) and (C2) with ψ = ν, any G2 -equivariant estimator δ(z) lying outside A = cc(Ω1 ) with the positive probability is inadmissible and dominated by its projection on A under loss L when l(A) ≤ π. Corollaries 3.1 and 3.2 enable us to improve various estimators available in the literature for the circular location ν of several directional distributions. Apart from the maximum likelihood estimator (MLE) δml , the following estimators for ν have been proposed on the basis of a random sample θ1 , . . . , θn . Pn (E1) (Watson [29], page 135) Sample direction θ̄ minimizes i=1 d(θi , α) over Pn mean P n α ∈ T and is obtained as θ̄ = atan( i=1 sin θi / i=1 cos θi ). P (E2) (Mardia and Jupp [19], page 167) Circular median δcm minimizes ni=1 d1 (θi , α) over α ∈ T, where d1 (α, β) = π − |π − |α − β|| for α, β ∈ T. P n (E3) (He and Simpson [10]) L1 -estimator δl1 minimizes i=1 {d(θi , α)}1/2 over α ∈ T. (E4) (Ducharme and Milasevic [5]) Normalized spatial median δnsm = (α∗2 /α∗1 ), where (α∗1 , α∗2 ) is the solution of min (α1 ,α2 )∈R n X 1/2 {1 + α21 + α22 − 2(α1 cos θi + α2 sin θi )} . 2 i=1 (Neeman and Chang [24], Tsai [26]) Circular Wilcoxon estimator δcw minimizes P(E5) n R i=1 i d1 (θi , α) over α ∈ T, where Ri (i = 1, . . . , n) is the rank of sin(θi − α) amongst sin(θ1 − α), . . . , sin(θn − α). Except δcm , all other estimators are proposed in their Cartesian forms. All the above mentioned estimators are either M -estimator or restricted M -estimator or R-estimator. Truncated circular parameters 11 Remark 3.2. Due to lack of preference for the zero direction and orientation in the definition of T, rotation-equivariant estimators for circular parameters are preferred. All the above-mentioned estimators enjoy the property of G1 -equivariance when support is T. When support is Tk , these estimators based on sample values θ11 , . . . , θ1n1 , . . . , θk1 , . . . , θknk are also G2 -equivariant. This equivariance property is used in the following section to derive improved estimators. 3.1. Applications of Theorem 3.1 Theorem 3.1 is applicable to a wide variety of estimation problems for directional distributions. In this section, we consider various examples where Theorem 3.1 leads to improvement over traditional estimators. Example 3.1 (Unimodal distributions on circle T). A circular normal distribution CN(ν, κ) is defined by the following density: f2 (θ; ν, κ) = 1 eκ cos(θ−ν) , 2πI0 (κ) θ, ν ∈ T, κ > 0, where Iv is the modified Bessel function of the first kind and order v. It is known a priori that ν ∈ Ω1 such that Ω1 is an arc of the circle. Without loss of generality, we can assume that Ω1 = [0, b], where b ∈ T. The estimation space for ν is A=  [0, b], T, if b ≤ π; if b > π. The unrestricted MLE of ν is δml = θ̄. The circular normal distribution is the only rotationally symmetric distribution for which MLE of the mean direction ν is the sample mean direction θ̄. Maximization of likelihood function over Ω1 yields the restricted MLE δrml as   if θ̄ ∈ [0, b]; if θ̄ ∈ [0, b];  θ̄,  θ̄, δrml = b, or (3.3) if θ̄ ∈ (b, π + b/2); b, if θ̄ ∈ (b, π + b/2];   0, if θ̄ ∈ [π + b/2, 2π); 0, if θ̄ ∈ (π + b/2, 2π). At θ̄ = π + b/2, δrml can take two values. Since Pr(θ̄ = π + b/2) = 0, both estimators are equivalent. Note that when b ≤ π, δrml is also the projection of θ̄ on A. Corollary 3.1 yields that δrml improves θ̄ under the loss L when b ≤ π. When b > π, the projection of θ̄ on A is the same as θ̄. In a similar way, improvements over all other estimators, δcm , δl1 , δnsm and δcw (as defined in (E2), (E3), (E4), (E5)) can be obtained from Corollary 3.1 and Remark 3.2 for ν when ν is restricted to [0, b] and b ≤ π. Other well-known symmetric unimodal distributions are wrapped Cauchy WC(ν, ρ), wrapped normal WN(ν, ρ) and cardioid C(ν, ρ) with the following probability densities 12 Kanika and S. Kumar in terms of t = cos(θ − ν), f3 (t) = (1 − ρ2 ) , (1 + ρ2 − 2ρt) ρ ∈ (0, 1); ∞ f4 (t) = 1 X i2 1 ρ Ti (t), + 2π π i=1 f5 (t) = (2π)−1 + π −1 ρt, ρ ∈ (0, 1); |ρ| < 1/2, respectively, where Tv is a Chebyshev polynomial of first kind of order v. Jones and Pewsey [13] proposed a family of symmetric unimodal distributions on T whose densities are provided in terms of t as f6 (t) = {cosh(κψ)}1/ψ 1/ψ {1 + tanh(κψ)t} , 2πP1/ψ (cosh(κψ)) κ > 0, ψ ∈ R, where Pv is the associated Legendre function of the first kind of degree v and order 0. Here, we exclude the case of κ = 0 since it yields the uniform distribution on T. Circular normal, wrapped Cauchy and cardioid distributions are contained in this family corresponding to ψ = 0, −1 and 1, respectively. Another general family of symmetric unimodal distributions on T contains wrapped α-stable distributions with densities of the following form in terms of t ([19], page 52) ∞ f7 (t) = 1 1 X iα ρ Ti (t), + 2π π i=1 ρ ∈ (0, 1), α = (0, 1) ∪ (1, 2]. For α = 2, it yields wrapped normal distribution. Since the distributions corresponding to densities f6 and f7 satisfy condition (C1) , Corollary 3.1 and Remark 3.2 yield improvements over all estimators θ̄, δml , δcm , δl1 , δnsm and δcw for the mean direction ν when ν is restricted to [0, b] such that b ≤ π. Example 3.2 (Mixture distributions on T). Let random variable θ be generated from CN(ν, κ) and CN(ν + π, κ) with probabilities ε and (1 − ε), respectively. For this distribution, ζ(t) = e2κt which is increasing in t. Thus, Corollary 3.1 and Remark 3.2 yield that all the estimators, θ̄, δml , δcm , δl1 , δnsm and δcw , for ν ∈ Ω1 are improved by their projections on A if l(A) ≤ π and ε ≥ 1/2. For the values of ε < 1/2, improvements are possible when l(A) ≤ (2/3)π. Similar improvements are possible when we mix either two wrapped normal or two distributions with density f6 for same value of ψ ≤ 1 with different mean directions ν and ν + π. To apply Corollary 3.1, we must show that the corresponding function ζ(t) is an increasing function in t. For a general density f6 (t), derivative of ζ(t) with respect to t is obtained as 1/ψ  2(1 − ψ) tanh(κψ) 1 + tanh(κψ)t ζ ′ (t) = , ψ 6= 0, ψ {1 + tanh(κψ)t}2 1 − tanh(κψ)t Truncated circular parameters 13 which is always nonnegative unless ψ > 1. The wrapped normal distribution can be represented by theta function ϑ3 . Using the representation of ϑ3 in terms of infinite products ([9], page 921, equation 8.181.2), we have ∞ 1 Y f4 (t) = (1 − ρ2i )(1 + 2tρ2i−1 + ρ2(i−1) ). 2π i=1 P Second derivative of f4 (t) with respect to t is f4 (t) i6=j ξi (t)ξj (t), where ξ(i) = 2ρ2i−1 /{1 + 2tρ2i−1 + ρ2(i−1) }−1 . Convexity of f4 (t) follows from the positiveness of ξi (t) and increasing nature of ζ(t) follows from the convexity of f4 (t) using Remark 2.3. Example 3.3 (Distributions on T with k-fold rotational symmetry). This distribution is constructed by putting k copies of the original distribution end-to-end ([19], page 53). If we are given a distribution of θ which is unimodal and symmetric about ν, constructed distribution has the density f (cos(k(θ − ν0 ))), θ ∈ T, ν0 ∈ [0, 2π/k). Note that new distribution is k-modal, for example, k-modal circular normal distribution ([12], page 209). For k ≥ 3, condition (C3) of Theorem 3.1 is satisfied and so estimators of ν0 lying outside A with a positive probability can be improved by their projections on A. Note that the results hold when the parameter space is full, that is, [0, 2π/k) or restricted, that is, a subset of [0, 2π/k). For k = 2, the result holds only for restricted parameter space if ν0 ∈ Ω1 ⊂ [0, b] such that b ≤ (2/3)π. Example 3.4 (Distributions on torus Tk ). Suppose that all k components of Z = (θ1 , . . . , θk ) ∈ Z ⊂ Tk are independently distributed and ith component θi follows CN(ν, κi ) with known κi . Consider the estimation of common ν ∈ Ω1 under the loss L. 1, . . . , n). Suppose Let (θi1 , . . . , θini ) be a random sample from the ithPpopulation (i = P ni ni θ̄i denotes the sample mean direction and Ri = {( j=1 sin θij )2 + ( j=1 cos θij )2 }1/2 denotes the sample resultant length for the sample of ith component. The MLE of ν is   Pk i=1 κi Ri sin θ̄i . (3.4) θ̃ = atan Pk i=1 κi Ri cos θ̄i The conditional distribution of θ̃ is again circular normal CN(ν, R∗ ), where ∗ R = ( k X i=1 κi Ri sin θ̄i !2 + k X i=1 κi Ri cos θ̄i !2 )1/2 Holmquist [11]. Since the distribution of R∗ is dependent only on κi , distribution of θ̃ is unimodal and symmetric about its mode ν. Corollary 3.2 yields that θ̃ is dominated by its projection on A under the loss L if l(A) ≤ π. Note that improved estimator of θ̃ is also the restricted MLE for common ν when l(A) ≤ π. Using Corollary 3.2 and Remark 3.2, we can obtain improvements over other estimators θ̄, δcm , δl1 , δnsm and δcw based on random sample θ11 , . . . , θ1n1 , . . . , θk1 , . . . , θknk . 14 Kanika and S. Kumar Remark 3.3. This model can be further extended to the cases where distributions of independent components are not necessarily the same and satisfy conditions (C1) and (C2) with respect to Lebesgue measure, namely, distributions considered in Examples 3.1 and 3.2. Example 3.5 (Distribution on unit sphere S2 ). Point x = (x1 , x2 , x3 )T ∈ S2 can be specified by its geographical coordinates: colatitude θ = cos−1 (x3 ) ∈ [0, π] and longitude φ = atan(x2 /x1 ) ∈ [0, 2π). Hence, sphere S2 is isomorphic to T2 = [0, π] × [0, 2π). The density of Fisher distribution on the support T2 is given by f8 (θ, φ; ν1 , ν2 , κ) = κ sin θ exp{κ(sin θ sin ν1 cos(φ − ν2 ) + cos θ cos ν1 )}, 4π sinh(κ) (ν1 , ν2 ) ∈ T2 , κ > 0, where (ν1 , ν2 ) is the mean direction. On the basis of a random sample of size n, the MLE of ν2 , when κ is known/unknown and ν1 is unknown, is given by   Pn i=1 sin θi sin φi P . δml = atan n i=1 sin θi cos φi It is known that mean direction is restricted to a continuous arc of hemisphere. Without loss of generality, we can assume that ν1 ∈ [0, π] and ν2 ∈ [0, b] with b ≤ π. We can improve the MLE of ν2 by its projection on [0, b] if b ≤ (2/3)π using Theorem 3.1. Example 3.6 (Distribution on cylinder R × T). Mardia and Sutton [20] proposed a distribution on the cylinder R × T. Let (X, θ) have the support R × T where the marginal distribution of θ is CN(ν0 , κ), ν0 ∈ T, κ > 0 and conditional distribution of X|θ is a normal with mean √ µc = µ + σρ κ{cos(θ − ν) − cos(ν0 − ν)}, µ ∈ R, ν ∈ T, 0 ≤ ρ ≤ 1, σ > 0 and variance σ 2 (1 − ρ2 ). Based on a random sample of size n, the MLE of ν is   s2 r23 r12 − r13 , δml = atan s3 r23 r13 − r12 P where for i = 1, 2, 3 and j = 1, . . . , n, x1j = xj , x2j = cos θj , x3j = sin θj , x̄i = j xij /n, P s2i = j (xij − x̄i )2 ; and for i 6= k (i, k = 1, 2, 3), rik = 1 X (xij − x̄i )(xkj − x̄k ). si sk j If ν is restricted to Ω1 such that l(A) ≤ (2/3)π, δml is dominated by its projection on A under the loss L using Theorem 3.1. Note that simulations indicate that this result is also valid for (2/3)π < l(A) ≤ π. Truncated circular parameters 15 4. An inadmissibility result for general equivariant rules Moors [21, 22], Kumar and Sharma [16] gave a general method for obtaining improved equivariant estimators of parameters in Euclidean spaces. In this section, we extend these results for estimating circular parameters. Let the problem of estimating h(ν) ∈ Ω1 under the loss L be invariant under a compact group G of measurable transformations g : Z → Z. There exists a finite and left (right) invariant Haar measure λ on G ([6], Theorem 1.5). Let Ḡ and G̃ be the groups induced by G on parameter space Ω and estimation space A = cc(Ω1 ). Lemma 4.1. For the G-invariant estimation problem defined above, we have: (i) f (z|ḡ(ν)) = f (g−1 (z)|ν) a.e. with respect to measure η; (ii) hḡ(ν) = g̃h(ν) mod (2π) for all ν ∈ Ω; (iii) Let A ∈ C5 (closed convex). If φ0 is the projection of φ ∈ T on A, the projection of g̃(φ) on g̃(A) is g̃(φ0 ). For each z ∈ Z and ν ∈ Ω, define a probability measure on G as f (z|ḡ(ν)) . ∗ (ν)) dλ(g∗ ) f (z|ḡ G τ (z|ḡ(ν)) = R With the help of these measures, for a fixed z ∈ Z, define a function hz : Ω → A as   R Z sin(g̃h(ν))τ (z|ḡ(ν)) dλ(g)  G  R  f (z|ḡ(ν)) dλ(g) > 0; , if atan  G G cos(g̃h(ν))τ (z|ḡ(ν)) dλ(g) hz (ν) = (4.1) Z    h(ν), f (z|ḡ(ν)) dλ(g) = 0. if  G The new estimation space Az is defined as a convex closure of hz (Ω), that is, Az = cc(hz (Ω)). Remark 4.1. In case of hz (ν) can be written as R G f (z|ḡ(ν)) dλ(g) = 0, Az = A. When   E sin(g̃h(ν)) hz (ν) = atan , E cos(g̃h(ν)) R G f (z|ḡ(ν)) dλ(g) > 0, (4.2) where the expectation is taken over g with respect to a probability measure τ (z|ḡ(ν)) dλ(g). If Pr(g̃h(ν) ∈ A) = 1, hz (ν) ∈ A from the convexity of A (see Proposition 2.2). Since Az is the smallest convex set containing hz (ν), we conclude that Az ⊂ A. We assume that every transformation g̃ ∈ G̃ satisfies circular property, that is, for a fixed α and for all φ ∈ A, g̃(φ) is either α + φ or α − φ such that images are in A itself. 16 Kanika and S. Kumar Lemma 4.2. If every induced transformation on A satisfies the circular property, the reduced estimation space Az satisfies Ag(z) = g̃(Az ) for all z ∈ Z and g ∈ G. Lemmas 4.1 and 4.2 are utilized to prove the main result of this section. Theorem 4.1. Consider an G-invariant estimation problem under the loss function L with a compact group G such that elements of induced group G̃ on the estimation space A satisfy the circular property. Any G-equivariant estimator δ satisfying Prν (δ(Z) ∈ / AZ ) > 0 for some ν ∈ Ω is dominated by its projection on AZ provided that l(AZ ) ≤ (2/3)π. This result is applicable to both restricted and unrestricted estimation problems as illustrated in the following subsection. 4.1. Applications of Theorem 4.1 We consider estimation of the location parameter ν ∈ Ω1 of a circular random variable θ under the loss L. Let us denote by fν (θ) the density of θ that would be a function of cos(θ − ν). 4.1.1. Unrestricted estimation problems The estimation problem is invariant under the rotation group G1 . Clearly, the induced group G̃1 on the estimation space A = T is itself G1 and every transformation in G1 satisfies the circular property. Taking G = G1 , we define   R 2π   R 2π sin αfα (θ) dα sin(α + ν)fα+ν (θ) dα = atan R 02π , hθ (ν) = atan R 02π cos(α + ν)f (θ) dα cos αf (θ) dα α+ν α 0 0 or equivalently, hθ (ν) is constant on ν ∈ T. Therefore the following result follows from Theorem 4.1. Corollary 4.1. If θ is a circular random variable with the unrestricted location parameter ν ∈ T, there is only one admissible G1 -equivariant estimator under the loss L which is obtained as   R 2π sin αfα (θ) dα , δad = atan R 02π cos αfα (θ) dα 0 where fν (θ) the density of θ. For CN(ν, κ) distribution, δad = θ̄. All other G1 -equivariant estimators δcm , δl1 , δnsm and δcw for ν ∈ T under the loss L are improved by θ̄ using Corollary 4.1. This result is significant in the sense that so far comparison of θ̄ with δcm , δl1 , δnsm and δcw was done only with respect to asymptotic efficiency and robustness. Truncated circular parameters 17 4.1.2. Restricted estimation problems Let the location ν be restricted to any arc of semicircle. Without loss of generality, we can assume that ν ∈ Ω1 = [0, b] with 0 < b ≤ π. In Example 3.1, the same restricted space estimation problem was considered and we obtained improvements over estimators θ̄, ∗ ∗ ∗ ∗ δml , δcm , δl1 , δnsm and δcw for various distributions. Denote by θ̄∗ , δml , δcm , δl1 , δnsm and ∗ δcw , the dominating estimators of θ̄, δml , δcm , δl1 , δnsm and δcw as their projections on Ω1 = [0, b]. Here, we can further improve upon these improved estimators. We consider the transformation group as G3 = {e, g} where g(θ) = (b − θ) mod (2π) and e is the identity transformation. The estimation problem remains invariant under G3 and the induced group on the estimation space A is G3 . Clearly, elements of G3 satisfy the circular property. Define the following function for a fixed random sample θ1 , . . . , θn as h(θ1 ,...,θn ) (ν) = {b/2 + tan−1 (a(ν))} mod (2π), where after some algebraic computations, a(ν) is derived as Qn Qn   b i=1 fb−ν (θi ) − Qi=1 fν (θi ) Q −ν . tan a(ν) = n n 2 i=1 fb−ν (θi ) + i=1 fν (θi ) Since fν (θ) is a function of cos(θ − ν), h(θ1 ,...,θn ) (ν) is symmetric about ν = b/2. It is sufficient to assume that ν ∈ [0, b/2] to study the behaviour of the function h(θ1 ,...,θn ) (ν). We consider distributions for which a(ν) is monotonic in ν ∈ [0, b/2]. As a(b/2) = 0, monotonic nature of a(ν) is dependent on the sign of a(0). The new estimation space is  ∗ if a(0) < 0;  [b , b/2], A(θ1 ,...,θn ) = cc(h(θ1 ,...,θn ) (Ω1 )) = {b/2}, if a(0) = 0;  [b/2, b∗], if a(0) > 0, where b∗ = h(θ1 ,...,θn ) (0). It may be noted that l(A(θ1 ,...,θn ) ) ≤ b/2 which is a substantial reduction in l(A) = b. ∗ ∗ ∗ ∗ ∗ Since G3 ⊂ G1 , all estimators θ̄, δml , δcm , δl1 , δnsm , δcw , θ̄∗ , δml , δcm , δl1 , δnsm and δcw are also G3 -invariant. For the distributions which satisfy the assumption of monotonicity of a(ν), all these estimators can be improved by their projections on A(θ1 ,...,θn ) using Theorem 4.1. If θ follows a CN(ν, κ) distribution, the function a(ν) is given as        b b b sin −ν tan −ν . a(ν) = tanh κr sin θ̃ − 2 2 2 Monotonicity of a(ν) can be easily observed. The new estimation space is equal to  if θ̄ ∈ J1 ;  [b∗ , b/2], A(θ̄,r) = {b/2}, if θ̄ ∈ {b/2, π + b/2};  [b/2, b∗ ], if θ̄ ∈ I1 , 18 Kanika and S. Kumar where b∗ = b/2 + tan−1 [tan(b/2) tanh{κr sin(θ̄ − b/2) sin(b/2)}], J1 = J(b/2, π + b/2) and I1 = I(b/2, π + b/2). Based on A(θ̄,R) , an estimator δ is dominated by   δ, δI = b ∗ ,  b/2, if θ̄ ∈ J1 and δ ∈ [b∗ , b/2], or, θ̄ ∈ I1 and δ ∈ [b/2, b∗]; if θ̄ ∈ J1 and δ ∈ J(b∗ , γ), or, θ̄ ∈ I1 and δ ∈ (b∗ , γ); if θ̄ ∈ J1 and δ ∈ (b/2, γ], or, θ̄ ∈ I1 and δ ∈ J(b/2, γ], or, θ̄ ∈ {b/2, π + b/2}, where γ = π + b∗ /2 + b/4. In Example 3.1, the estimator δ for ν is dominated by the projection of δ on A. Let us denote by δ ∗ this improved estimator. Based on A(θ̄,R) , improved estimators δI and δI∗ of δ and δ ∗ , respectively, are equivalent except when either δ ∈ [γ, π + b/2] and θ̄ ∈ J1 or δ ∈ [π + b/2, γ] and θ̄ ∈ I1 . If δ = θ̄, both θ̄I and θ̄I∗ are equivalent and given by      ∗   b ,     b/2,    θ̄,  ∗   θ̄ < b and θ̄ ∈ [0, b/2), if θ̄ > b∗ and θ̄ ∈ (b/2, π + b/2),   θ̄ ∈ (π + b/2, 2π), (4.3) if θ̄ = π + b/2, elsewhere. In Figure 2, we have plotted the risk functions of the MLE θ̄, restricted estimator δrml defined in (3.3) and improved estimator θ̄I defined in (4.3) under the loss function L. The risk values have been evaluated using simulations. For this, we have generated 100 000 samples from a CN(ν, κ) distribution for various values of (n, κ, b). The following conclusions can be made from the numerical study. (a) The risk function of θ̄ is constant for a fixed value of (n, κ). The risk functions of δrml and θ̄I are symmetric about b/2. For small values of κ or b, these risk functions are strictly decreasing in ν ∈ [0, b/2]. For higher values of κ or b, behaviour is reverse. (b) For all the values of (n, κ) and ν ∈ [0, b], δrml uniformly improves θ̄ and θ̄I uniformly improves δrml when b ∈ (0, π]. Risk values of δrml and θ̄I are the same when b = π and are less than that of θ̄ for all ν ∈ [0, b]. (c) The amount of relative improvement of δrml over θ̄ is increasing as κ or b decreases. This is seen to be as high as 95%. Similarly, relative improvement of θ̄I over δrml is seen to be up to 75%. Similar observations have been made for various other configurations of (n, κ, b). Simulations for various directional distributions show significant improvements. We omit details here. Remark 4.2. For the support T, both unrestricted and restricted estimation problems discussed in Sections 4.1.1 and 4.1.2 can be easily extendable to the case of support Tk . Truncated circular parameters 19 Figure 2. Risk plots of (a) θ̄ (straight line), (b) δrml (dashed line) and (c) θ̄I (dotted line) under the loss function L when b ∈ (0, π]. 5. Concluding remarks For estimating parameters in Euclidean spaces, with respect to the loss function as an increasing function of distance, the action space is taken to be the smallest convex set containing the estimand space. If an estimator lies outside it with a positive probability, an improvement is obtained by projecting this estimator on the action space. In Section 3, we have extended this concept to the estimation of circular parameters of directional distributions. The result of Theorem 3.1, is not exactly analogous to the result for Euclidean spaces. Further, [16, 22] gave a new technique for improving equivariant estimators in Euclidean spaces. In Section 4, we have developed a theory to extend this technique to circular parameters. The results have been applied to various estimation problems in directional distributions. The resulting estimators are seen to show significant improvements over the usual estimators. It would be interesting to further extend these results to parameters lying in spheres of higher dimensions. 20 Kanika and S. Kumar Appendix A.1. Proof of Proposition 2.1 The statement trivially follows when A = T. From Lemma 2.2, it is sufficient to consider A to be of I-type. First, we assume A = I[0, γ] with γ ∈ (0, π]. Note that for γ = 0, the proof is trivial. Let {φ1 , . . . , φn } be linearly ordered sample of n(≥ 2) observations taking values in A. After rotating sample by an angle 2π − φ1 , modified ordered sample {0, α2 , . . . , αn } takes values in I[0, αn ] ⊂ A with αi = φi − φ1 (i = 2, . . . , n). We have to prove  Pn  wi sin αi i=2 P ᾱw = atan ∈ I[0, αn ], n w1 + i=2 wi cos αi where weights are w1 , . . .P , wn . From (2.2), the lower bound of ᾱw is zero. If αn 6= π, both P n n i=2 wi sin αi and w1 + i=2 wi cos αi cannot be zero simultaneously, that is, ᾱw always exists. When n = 2 and α2 = π, ᾱw does not exist if w1 = w2 . Pn(i) Consider αn < π/2. Since tan(·) is an increasing function in [0, π/2) and w1 + i=2 cos αi is positive, ᾱw ≤ αn is equivalent to ! n−1 n−1 X X (A.1) wi cos αi . wi sin αi ≤ tan αn w1 + i=2 i=2 Induction method is used to prove the inequality (A.1). For n = 2, (A.1) is reduced to w1 tan α2 ≥ 0 which always holds. We will show that (A.1) is true for n = k + 1 after using it for n = k. Thus, ! ! k k k X X X wi sin αi . wi cos αi = wi cos αi ≥ tan αk w1 + tan αk+1 w1 + i=2 i=2 i=1 The above steps follow since tan αk ≤ tan αk+1 and (A.1) is assumed P to be true for n = k. (ii) Now consider the case when π/2 < αn < π. Since w1 + ni=2 wi cos αi < 0 and tan(·) is increasing in (π/2, π], ᾱw ≤ αn is equivalent to the reverse of inequality (A.1). The proof can be completed as above. (iii) Cases when αn = π/2 and αn = π are straightforward. Hence, the proposition is established for A = K1 [α, β] with α, β ∈ T. In a similar manner, it can be proved when A is of types K1 (α, β), K1 (α, β] and K1 [α, β). A.2. Proof of Proposition 2.2 The statement is trivially true when A = T. As in the proof of Proposition 2.1, it is enough to prove the result only for A = [0, γ] with γ ∈ (0, π]. From (2.2), CE(θ) ≥ 0, if it Truncated circular parameters 21 exists. Every interval is convex subset of R. Using the fact that an analogous result is true for the expectation of random variables in R such as sin θ and cos θ ([7], page 74), we can observe ranges of both E sin θ and E cos θ. Suppose that Pr(θ ∈ A) = 1 and so Pr(γ − θ ∈ A) = 1. Since sin(·) is nonnegative in the range [0, π], Pr(sin(γ − θ) ≥ 0) = 1. Thus, E sin(γ − θ) ≥ 0. (A.2) (i) Consider the case 0 < γ < π/2. Since Pr(cos θ > 0) = 1, E cos θ > 0. Dividing both sides of (A.2) by cos θ(E cos θ) (term is positive with probability one), we get (E sin θ/E cos θ) ≤ tan γ. (A.3) Using facts that tan−1 (·) is increasing in [0, ∞) and atan(·) = tan−1 (·) in the range [0, π/2), we obtain CE(θ) ≤ γ. (ii) Consider γ = π/2. Since both E sin θ and E cos θ are nonnegative and cannot be zero simultaneously, CE(θ) ≤ π/2. (iii) If π/2 < γ < π, Pr(cos θ < 0) = 1 and so E cos θ is negative. Dividing both sides of (A.2) by cos θ(E cos θ) (positive quantity), we again obtain (A.3). As tan−1 (·) is increasing in the range (−∞, 0], we have tan−1 (E sin θ/E cos θ) ≤ γ − π. Since atan(·) = tan−1 (·) + π, CE(θ) ≤ γ. (iv) Now consider that γ = π. Both sin θ ∈ [0, 1] and cos θ ∈ [−1, 1] with probability one. Hence CE(θ) ≤ π, if it exists. Existence of CE(θ) is not confirmed only for the case (iv). Suppose that Pr(θ = 0) = Pr(θ = π) = 1/2, both E sin θ and E cos θ are zero, so CE(θ) does not exist. Moreover, if A = T and θ follows uniform distribution on T with the density (2π)−1 , CE(θ) does not exist. A.3. Proof of Lemma 2.5 Using Lemma 2.2, it is enough to consider the case A = [0, b] with b ∈ (2π/3, π]. Decompose the set A as A1 ∪ A2 ∪ A3 , where A1 = [0, 3b/4 − π/2), A2 = [3b/4 − π/2, b/2], A3 = (b/2, b], and complement of A as B1 ∪ B2 , where B1 = (b, π + b/2], B2 = (π + b/2, 2π). We have to show for all ψ ∈ A, a(ψ) = Eθψ {u(θ)} = Z θ∈B1 ∪B2 u(θ)f1 (θ|ψ) dθ > 0, (A.4) 22 Kanika and S. Kumar where f1 (θ|ψ) is the probability density of θ with respect to Lebesgue measure and u(θ) is given by u(θ) = cos(θ0 − ψ) − cos(θ − ψ), θ∈ / A, ψ ∈ A, with θ0 as the projection of θ on A. According to the assumption, the distribution of θ is symmetric about ψ, therefore, we have Eθψ cos(θ0 − ψ) = Eθb−ψ cos(θ0 − b + ψ). Hence, a(ψ) = a(b − ψ) for ψ ∈ A. It is enough to prove that a(ψ) > 0 for ψ ∈ A1 ∪ A2 . Next, we examine the sign of the function u(·). Define u(θ) = u1 (θ) + u2 (θ), where from definition of projection θ0 , u1 (θ) and u2 (θ) are given by      θ+b θ−b  sin −ψ , if θ ∈ B1 ; u1 (θ) = 2 sin 2 2  0, if θ ∈ B2 ;  if θ ∈ B1 ;  0,     u2 (θ) = 2 sin θ sin θ − ψ , if θ ∈ B2 .  2 2 If θ ∈ B1 , (θ − b) ∈ (0, π − b/2] ⊂ (0, 2π/3). Hence, sign of u1 (θ) is only dependent on that of sin((θ + b)/2 − ψ). When ψ ∈ A1 , decompose B1 as B1 = B11 ∪ B12 , where B11 = (b, 2π + 2ψ − b], B12 = (2π + 2ψ − b, π + b/2]. It can be noted that    θ+b (b − ψ, π] ⊂ (2π/3, π], −ψ ∈ (π, π/2 + 3b/4 − ψ] ⊂ (π, 5π/4], 2 if θ ∈ B11 ; if θ ∈ B12 . Thus, when ψ ∈ A1 , u1 (θ) ≥ 0 for θ ∈ B11 and u1 (θ) < 0 for θ ∈ B12 . If θ ∈ B1 and ψ ∈ A2 , ((θ + b)/2 − ψ) ∈ (π/3, π] and so u1 (θ) ≥ 0. Similarly, when θ ∈ B2 , θ/2 ⊂ (2π/3, π), the sign of u2 (θ) is only dependent on that of sin(θ/2 − ψ). If θ ∈ B2 and ψ ∈ A1 ∪ A2 , (θ/2 − ψ) ∈ (π/4, π). This implies that u2 (θ) > 0 when ψ ∈ A1 ∪ A2 . From Table A.1, it is sufficient to prove Z u(θ)f1 (θ|ψ) dθ > 0 for ψ ∈ A1 . (A.5) θ∈B12 ∪B2 Now we examine two cases separately, when distribution of θ is unimodal and bimodal. (i) If density f1 (θ|ψ) is either f (θ|ψ) or εf (θ|ψ) + (1 − ε)f (θ|ψ + π) with ε ≥ (1 + ζmin )−1 , distribution of θ is unimodal with mode at ψ. It means that f1 (θ|ψ) is increasing in θ ∈ [ψ + π, 2π). Write u(θ) = v1 (θ)+ v2 (θ), where for i = 1, 2, vi (θ) = ui (θ), θ ∈ B12 ∪B2 . Truncated circular parameters 23 Table A.1. Behaviour of functions u1 (θ) and u2 (θ) A1 A2 A1 ∪ A2 B1 u1 (θ) ≥ 0 u1 (θ) < 0 u1 (θ) ≥ 0 u2 (θ) = 0 B2 u1 (θ) = 0 u1 (θ) = 0 u2 (θ) > 0 Thus, v1 (θ) = v2 (θ)  −∞, 0, if θ ∈ B12 ; if θ ∈ B2 . Therefore, both v1 (θ)/v2 (θ) and f1 (θ|ψ) are increasing in θ ∈ B12 ∪ B2 . Let φ be a uniform distributed random variable with respect to Lebesgue measure such that Pr(φ ∈ B12 ∪ B2 ) = 1. As Eφ {v2 (φ)f1 (φ|ψ)} > 0, using a result of [2], Theorem 2.1, we have Eφ {v1 (φ)} Eφ {v1 (φ)f1 (φ|ψ)} ≤ . Eφ {v2 (φ)} Eφ {v2 (φ)f1 (φ|ψ)} In order to prove (A.5), it remains to show Eφ {v1 (φ) + v2 (φ)} > 0 for all ψ ∈ A1 . (A.6) The above holds since we have (b − 2ψ)Eφ {v1 (φ) + v2 (φ)} = Z θ∈B12 ∪B2 {cos(φ0 − ψ) − cos(φ − ψ)} dφ > 0. This completes the proof when distribution of θ is unimodal. (ii) Now we assume that θ has a mixture distribution with the probability density f1 (θ|ψ) = εf (θ|ψ) + (1 − ε)f (θ|ψ + π) with 1/2 ≤ ε < (1 + ζmin )−1 , that is, the distribution of θ is bimodal. It has two modes ψ and ψ + π. Antimodes are ψ + w and ψ + 2π − w(= β), where w = cos−1 (ζ −1 ((1 − ε)/ε)). According to condition (C2) , w ∈ [π/2, π). We may note that β ≤ 2π since ψ < π/2 ≤ w as ψ ∈ A1 . This implies that f1 (θ|ψ) is increasing in θ ∈ [β, 2π). If β ≤ 2π + 2ψ − b, (A.5) can be proved following the lines of the above case. When β > 2π + 2ψ − b, decompose the set B12 ∪ B2 = (2π + 2ψ − b, 2π) as C1 ∪ C2 ∪ C3 , where C1 = (2π + 2ψ − b, β], C2 = (β, 2π − 2w + b], C3 = (2π − 2w + b, 2π). Since the probability density f1 (θ|ψ) is symmetric about β, that is, f1 (θ|ψ) = f1 (2β − θ|ψ), we have Z Z Z u(2β − θ)f1 (θ|ψ) dθ. u(2β − θ)f1 (2β − θ|ψ) dθ = u(θ)f1 (θ|ψ) dθ = θ∈C1 θ∈C2 θ∈C2 24 Kanika and S. Kumar Define u3 (θ) =  u(θ) + u(2β − θ), u(θ), if θ ∈ C2 ; if θ ∈ C3 . It may be noted that (A.6) yields the following for ψ ∈ A1 : Z Z u(θ) dθ ≥ 0. u3 (θ) dθ = (A.7) θ∈B12 ∪B2 θ∈C2 ∪C3 Consider the function     θ − θ0 θ + θ0 u(θ) + u(2β − θ) = 4 sin cos − β sin(β − ψ). 2 2 When θ ∈ B12 ∪ B2 , sin((θ − θ0 )/2) > 0. Note that sin(β − ψ) = − sin(w) < 0 as w ∈ [π/2, π). The sign of u(θ) + u(2β − θ) is the opposite of that of cos((θ + θ0 )/2 − β). There are three cases according to π + b/2 ∈ Ci , for i = 1, 2, 3. As in the case when distribution of θ is unimodal, we define two functions v1 (θ) and v2 (θ) for θ ∈ C2 ∪ C3 in all these three cases such that v1 (θ)/v2 (θ) is increasing in θ ∈ C2 ∪ C3 and v2 (θ) is nonnegative for all θ ∈ C2 ∪ C3 . When π + b/2 ∈ C1 , choices are   0, if θ ∈ C2 ; u(θ) + u(2β − θ), if θ ∈ C2 ; v1 (θ) = v2 (θ) = u(θ), if θ ∈ C3 ; 0, if θ ∈ C3 . Now consider π + b/2 ∈ C2 . Decompose the interval C2 = C21 ∪ C22 , where C21 = (β, π + b/2], C22 = (π + b/2, 2π − 2w + b]. In this case, we choose   u(θ) + u(2β − θ), v1 (θ) = 0,  0,   0, v2 (θ) = u(θ) + u(2β − θ),  u(θ), if θ ∈ C21 ; if θ ∈ C22 ; if θ ∈ C3 ; if θ ∈ C21 ; if θ ∈ C22 ; if θ ∈ C3 . When π + b/2 ∈ C3 , decompose the interval C3 = C31 ∪ C32 , where C31 = (2π − 2w + b, π + b/2], In this case, we define   u(θ) + u(2β − θ), v1 (θ) = 0,  u(θ), if θ ∈ C2 ; if θ ∈ C31 ; if θ ∈ C32 ; C32 = (π + b/2, 2π). v2 (θ) = ( 0, −u(θ), 0, if θ ∈ C2 ; if θ ∈ C31 ; if θ ∈ C32 . Truncated circular parameters 25 Since the density f1 (θ|ψ) is increasing in θ ∈ C2 ∪ C3 , Theorem 2.1 of [2] completes the proof when distribution of θ is bimodal. A.4. Proof of Lemma 4.1 See [22], Lemma 2, for the proof of (i). Note that the proof given in [22] utilizes the measure perseverance of the element g ∈ G under the measure η, that is, η(g−1 (B)) 6= η(B) for all B ∈ B(Z), where B(Z) consists of Borel sets of the sample space Z. Later, Moors and van Houwelingen [23] relaxed this condition of measure perseverance. For any g ∈ G, if δ is an G-equivariant estimator, we have L(ḡ(ν), g̃(δ)) = L(ν, δ), that is, cos(hḡ(ν) − g̃(δ)) = cos(h(ν) − δ), (A.8) for all ν ∈ Ω and δ ∈ A. Substituting δ = h(ν), we obtain cos(hḡ(ν) − g̃h(ν)) = 1. Thus, we have hḡ(ν) = g̃h(ν) mod (2π), for all ν ∈ Ω. This proves (ii). Exploiting this result, (A.8) reduces to d(g̃h(ν), g̃(δ)) = d(h(ν), δ), for all ν ∈ Ω and δ ∈ h(Ω). This implies that g̃(·) is distance-preserving map on A. Let ψ be the projection of g̃(φ) on g̃(A). Since g̃(·) is injective, we have d(g̃(φ), ψ) = d(φ, φ0 ) = d(g̃(φ), g̃(φ0 )). From the uniqueness of projection, ψ = g̃(φ0 ). This proves (iii). A.5. Proof of Lemma 4.2 First, we show that for all g ∈ G and ν ∈ Ω, new estimand hz (ν) satisfies hg(z) ḡ(ν) = g̃hz (ν) for all ν ∈ Ω. Note that Z Z ∗ ∗ f (z|ḡ−1 ḡ∗ ḡ(ν)) dλ(g∗ ) f (g(z)|ḡ ḡ(ν)) dλ(g ) = (A.9) (from Lemma 4.1(i)) G G = Z G f (z|ḡ∗ (ν)) dλ(g∗ ) (using transformation g∗ → gg∗ g−1 ). R This implies that for G f (z|ḡ∗ (ν)) dλ(g∗ ) = 0, (A.9) follows from Lemma 4.1(ii). In the R case of G f (z|ḡ∗ (ν)) dλ(g∗ ) > 0, for any g ∈ G, we have  R sin(g̃ ∗ hḡ(ν))τ (g(z)|ḡ∗ ḡ(ν)) dλ(g∗ ) hg(z) ḡ(ν) = atan R G ∗ ∗ ∗ G cos(g̃ hḡ(ν))τ (g(z)|ḡ ḡ(ν)) dλ(g ) 26 Kanika and S. Kumar  R ∗ −1 ∗ ḡ ḡ(ν)) dλ(g∗ ) G sin(hḡ ḡ(ν))τ (z|ḡ R = atan cos(hḡ∗ ḡ(ν))τ (z|ḡ−1 ḡ∗ ḡ(ν)) dλ(g∗ ) G R   sin(g̃g̃ ∗ h(ν))τ (z|ḡ∗ (ν)) dλ(g∗ ) = atan R G ∗ ∗ ∗ G cos(g̃g̃ h(ν))τ (z|ḡ (ν)) dλ(g )   R sin(g̃ ∗ h(ν))τ (z|ḡ∗ (ν)) dλ(g∗ ) G = g̃ atan R cos(g̃ ∗ h(ν))τ (z|ḡ∗ (ν)) dλ(g∗ ) G = g̃hz (ν) for all ν ∈ Ω. The above equalities utilize Lemmas 4.1 and 2.3, the transformation g∗ → gg∗ g−1 and the circular property of g̃. Therefore, the surjection property of ḡ and (A.9) imply that g̃hz (Ω) = hg(z) (Ω), (A.10) or equivalently, cc(g̃hz (Ω)) = cc(hg(z) (Ω)) = Ag(z) . Clearly, g̃-image of a closed convex set is again a closed convex set. Therefore, g̃(cc(hz (Ω))) is also a closed convex and g̃hz (Ω) ⊂ g̃(cc(hz (Ω))). This implies that Ag(z) = cc(g̃hz (Ω)) ⊂ g̃(cc(hz (Ω))) = g̃(Az ) as cc(g̃hz (Ω)) is the smallest convex set containing g̃hz (Ω). Next, we show that g̃(Az ) ⊂ Ag(z) . As φ ∈ Az = conv(hz (Ω)) ∪ bd(hz (Ω)), there can be the following two cases: (i) Suppose φ ∈ conv(hz (Ω)). From Proposition 2.1, there exists φ1 , φ2 ∈ hz (Ω) such that   w sin φ1 + (1 − w) sin φ2 . φ = atan w cos φ1 + (1 − w) cos φ2 Operating g̃ on the both sides of the above equation and using the circular property, we get   w sin g̃(φ1 ) + (1 − w) sin g̃(φ2 ) . g̃(φ) = atan w cos g̃(φ1 ) + (1 − w) cos g̃(φ2 ) Note that g̃(φ1 ), g̃(φ2 ) ∈ g̃hz (Ω). Using (A.10), both belong to hg(z) (Ω). Therefore, g̃(φ) ∈ conv(hg(z) (Ω)) ⊂ Ag(z) . (ii) Any φ ∈ bd(hz (Ω)) is the limit point of a series of points {φn } with φn ∈ conv(hz (Ω)). Since g̃ is circular so is continuous, g̃(φ) is the limit point of the series {g̃(φn )} in conv(g̃hz (Ω)) = conv(hg(z) (Ω)). Hence, g̃(φ) ∈ bd(hg(z) (Ω)) ⊂ Ag(z) . A.6. Proof of Theorem 4.1 Since risk of an equivariant estimator δ(Z) is constant on the orbits of ν ([7], page 149), risk of the G-equivariant estimator δ(Z) under the loss function L satisfies R(ν, δ) = Truncated circular parameters R G 27 R(ḡ(ν), δ) dλ(g). Using this, the risk of δ(Z) is given by R(ν, δ) = Z Z Z {1 − cos(δ(z) − hḡ(ν))}f (z|ḡ(ν)) dη(z)) dλ(g) Z Z G {1 − cos(δ(z) − g̃h(ν))}f (z|ḡ(ν)) dλ(g) dη(z). G = Z In the above step, we utilize the interchange in order of integration and Lemma 4.1(ii). Note that δ0 (g(z)) is the projection of δ(g(z)) on Ag(z) , that is, δ0 (g(z)) is the projection of g̃(δ(z)) on g̃(Az ) from invariance of δ(z) and Lemma 4.2. From Lemma 4.1(iii), δ0 (g(z)) = g̃(δ0 (z)), or equivalently, δ0 (z) is also G-equivariant estimator. Therefore, the above risk expression is also valid for δ0 (z). The difference R(ν, δ) − R(ν, δ0 ) is given by Z Z u= {cos(δ0 (z) − g̃h(ν)) − cos(δ(z) − g̃h(ν))}f (z|ḡ(ν)) dλ(g) dη(z) δ(z)∈A / z = Z δ(z)∈A / z G  g E {cos(δ0 (z) − g̃h(ν)) − cos(δ(z) − g̃h(ν))} Z G  f (z|ḡ(ν)) dλ(g) dη(z), R if G f (z|ḡ(ν)) dλ(g) > 0, where the expectation is taken over g with respect to a probability measure τ (z|ḡ(ν)) dλ(g). Using the representation of hz (ν) given in (4.2) and denoting by vz (ν) = [{E sin(g̃h(ν))}2 + {E sin(g̃h(ν))}2 ]1/2 , we have sin hz (ν) = E sin(g̃h(ν))/vz (ν), cos hz (ν) = E cos(g̃h(ν))/vz (ν), the risk difference is given by Z Z vz (ν){cos(δ0 (z) − hz (ν)) − cos(δ(z) − hz (ν))} f (z|ḡ(ν)) dλ(g) dη(z). u= δ(z)∈A / z G If l(Az ) ≤ (2/3)π, the above integrand is positive since cos(δ(z) − hz (ν)) ≤ cos(δ0 (z) − hz (ν)) from Lemma 2.4. This completes the proof. Acknowledgements The authors are thankful to the two referees and an associate editor for their constructive comments and suggestions which have substantially improved the paper. References [1] Batschelet, E. (1981). Circular Statistics in Biology. London: Academic Press. MR0659065 28 Kanika and S. Kumar [2] Bhattacharya, C.G. (1984). Two inequalities with an application. Ann. Inst. Statist. Math. 36 129–134. MR0752011 [3] Buss, S.R. and Fillmore, J.P. (2001). Spherical averages and applications to spherical splines and interpolation. ACM Trans. Graph. 20 95–126. [4] Danzer, L., Grünbaum, B. and Klee, V. (1963). Helly’s theorem and its relatives. In Proc. Sympos. Pure Math., Vol. VII 101–180. Providence, RI: Amer. Math. Soc. MR0157289 [5] Ducharme, G.R. and Milasevic, P. (1987). Spatial median and directional data. Biometrika 74 212–215. MR0885936 [6] Eaton, M.L. (1989). Group Invariance Applications in Statistics. Regional Conference Series in Probability and Statistics. Hayward, CA: IMS. [7] Ferguson, T.S. (1967). Mathematical Statistics: A Decision Theoretic Approach. New York: Academic Press. MR0215390 [8] Fisher, N.I. (1993). Statistical Analysis of Circular Data. Cambridge: Cambridge Univ. Press. MR1251957 [9] Gradshteyn, I.S. and Ryzhik, I.M. (1965). Table of Integrals, Series and Products. New York: Academic Press. [10] He, X. and Simpson, D.G. (1992). Robust direction estimation. Ann. Statist. 20 351–369. MR1150348 [11] Holmquist, B. (1991). Estimating and testing the common mean direction of several von Mises–Fisher populations with known concentrations. Statistics 22 369–378. MR1108133 [12] Jammalamadaka, S.R. and SenGupta, A. (2001). Topics in Circular Statistics 5. River Edge, NJ: World Scientific. MR1836122 [13] Jones, M.C. and Pewsey, A. (2005). A family of symmetric distributions on the circle. J. Amer. Statist. Assoc. 100 1422–1428. MR2236452 [14] Kubokawa, T. (2004). Minimaxity in estimation of restricted parameters. J. Japan Statist. Soc. 34 229–253. MR2116757 [15] Kubokawa, T. (2005). Estimation of bounded location and scale parameters. J. Japan Statist. Soc. 35 221–249. MR2328426 [16] Kumar, S. and Sharma, D. (1992). An inadmissibility result for affine equivariant estimators. Statist. Decisions 10 87–97. MR1165706 [17] Marchand, E. and Strawderman, W.E. (2004). Estimation in restricted parameter spaces: A review. In A Festschrift for Herman Rubin. Institute of Mathematical Statistics Lecture Notes – Monograph Series 45 21–44. Beachwood, OH: IMS. MR2126884 [18] Marchand, É. and Strawderman, W.E. (2012). A unified minimax result for restricted parameter spaces. Bernoulli 18 635–643. MR2922464 [19] Mardia, K.V. and Jupp, P.E. (2000). Directional Statistics. Wiley Series in Probability and Statistics. Chichester: Wiley. MR1828667 [20] Mardia, K.V. and Sutton, T.W. (1978). A model for cylindrical variables with applications. J. Roy. Statist. Soc. Ser. B 40 229–233. [21] Moors, J.J.A. (1985). Estimation in truncated parameter space. Ph.D. dissertation, Tilburg Univ., The Netherlands. [22] Moors, J.J.A. (1981). Inadmissibility of linearly invariant estimators in truncated parameter spaces. J. Amer. Statist. Assoc. 76 910–915. MR0650903 [23] Moors, J.J.A. and van Houwelingen, J.C. (1993). Estimation of linear models with inequality restrictions. Stat. Neerl. 47 185–198. MR1243854 Truncated circular parameters 29 [24] Neeman, T. and Chang, T. (2001). Rank score statistics for spherical data. Contemp. Math. 287 241–254. [25] Rueda, C., Fernández, M.A. and Peddada, S.D. (2009). Estimation of parameters subject to order restrictions on a circle with application to estimation of phase angles of cell cycle genes. J. Amer. Statist. Assoc. 104 338–347. MR2504381 [26] Tsai, M.-T. (2009). Asymptotically efficient two-sample rank tests for modal directions on spheres. J. Multivariate Anal. 100 445–458. MR2483430 [27] Udrişte, C. (1994). Convex Functions and Optimization Methods on Riemannian Manifolds. Mathematics and Its Applications 297. Dordrecht: Kluwer Academic. MR1326607 [28] van Eeden, C. (2006). Restricted Parameter Space Estimation Problems. New York: Springer. MR2265239 [29] Watson, G.S. (1983). Statistics on Spheres. New York: Wiley. MR0709262 Received January 2015
10math.ST
Lower Bounds for Differential Privacy from Gaussian Width Assimakis Kattis arXiv:1612.02914v1 [cs.DS] 9 Dec 2016 1,2 ∗1 and Aleksandar Nikolov †2 Department of Computer Science, University of Toronto. Abstract We study the optimal sample complexity of a given workload of linear queries under the constraints of differential privacy. The sample complexity of a query answering mechanism under error parameter α is the smallest n such that the mechanism answers the workload with error at most α on any database of size n. Following a line of research started by Hardt and Talwar [STOC 2010], we analyze sample complexity using the tools of asymptotic convex geometry. We study the sensitivity polytope, a natural convex body associated with a query workload that quantifies how query answers can change between neighboring databases. This is the information that, roughly speaking, is protected by a differentially private algorithm, and, for this reason, we expect that a “bigger” sensitivity polytope implies larger sample complexity. Our results identify the mean Gaussian width as an appropriate measure of the size of the polytope, and show sample complexity lower bounds in terms of this quantity. Our lower bounds completely characterize the workloads for which the Gaussian noise mechanism is optimal up to constants as those having asymptotically maximal Gaussian width. Our techniques also yield an alternative proof of Pisier’s Volume Number Theorem which also suggests an approach to improving the parameters of the theorem. 1 Introduction The main goal of private data analysis is to estimate aggregate statistics while preserving individual privacy guarantees. Intuitively, we expect that, for statistics that do not depend too strongly on any particular individual, a sufficiently large database allows computing an estimate that is both accurate and private. A natural question then is to characterize the sample complexity under privacy constraints: the smallest database size for which we can privately estimate the answers to a given collection of queries within some allowable error tolerance. Moreover, it is desirable to identify algorithms that are simple, efficient, and have close to the best possible sample complexity. In this work, we study these questions for collections of linear queries under the constraints of approximate differential privacy. We model a database D of size n as a multiset of n elements (counted with repetition) from an arbitrary finite universe U . Each element of the database corresponds to the data of a single individual. To define a privacy-preserving computation on D, we use the strong notion of differential privacy. Informally, an algorithm is differentially private if it has almost identical behavior on any two databases D and D ′ that differ in the data of a single individual. To capture this concept formally, let us define two databases to be neighboring if they have symmetric difference of size at most 1 (counted with multiplicity). Then differential privacy is defined as follows: ∗ † Email:[email protected] Email:[email protected] 1 Definition 1 ([DMNS06]). A randomized algorithm A that takes as input a database and outputs a random element from the set Y satisfies (ε, δ)-differential privacy if for all neighboring databases ′ D, D and all measurable S ⊆ Y we have that: ′ P[A(D) ∈ S] ≤ eε P[A(D ) ∈ S] + δ, where probabilities are taken with respect to the randomness of A. One of the most basic primitives in private data analysis, and data analysis in general, are counting queries and, slightly more generally, linear queries. While interesting and natural in themselves, they are also quite powerful: any statistical query (SQ) learning algorithm can be implemented using noisy counting queries as a black box [Kea98]. In our setting, we specify a linear query by a function q : U → [0, 1] (given by its truth table). Slightly abusing notation, we 1 P define the value of the query as q(D) = n e∈D q(e), where the elements of D are counted with multiplicity. For example, when q : U → {0, 1}, we can think of q as a property defined on U and q(D) as the fraction of elements of D that satisfy the property: this is a counting query. We call a set Q of linear queries a workload and an algorithm that answers a query workload a mechanism. We denote by Q(D) = (q(D))q∈Q the vector of answers to the queries in Q. Throughout the paper, we will use the letter m for the size of a workload Q. Starting from the work of Dinur and Nissim [DN03], it is known that we cannot hope to answer too many linear queries too accurately while preserving even a very weak notion of privacy. For this reason, we must allow our private mechanisms to make some error. We focus on average error (in an L2 sense). We define the average error of an algorithm A on a query workload Q and databases of size at most n as: 1/2  1/2  X (A(D)q − q(D))2 1 2   , = max E kA(D) − Q(D)k2 err(Q, A, n) = max E D D |Q| m q∈Q where the maximum is over all databases D of size at most n, A(D)q is the answer to query q given by the algorithm A on input D, and expectations are taken with respect to the random choices of A. This is a natural notion of error that also works particularly well with the geometric tools that we use. In this work we study sample complexity: the smallest database size which allows us to answer a given query workload with error at most α. The sample complexity of an algorithm A with error α is defined as: sc(Q, A, α) = min{n : err(Q, A, n) ≤ α}. The sample complexity of answering the linear queries Q with error α under (ε, δ)-differential privacy is defined by: scε,δ (Q, α) = inf{sc(Q, A, α) : A is (ǫ, δ)-differentially private}. The two main questions we are interested in are: 1. Can we characterize scε,δ (Q, α) in terms of a natural property of the workload Q? 2. Can we identify conditions under which simple and efficient (ε, δ)-differentially private mechanisms have nearly optimal sample complexity? 2 We make progress on both questions. We identify a geometrically defined property of the workload that gives lower bounds on the sample complexity. The lower bounds also characterize when one of the simplest differentially private mechanisms, the Gaussian noise mechanism, has nearly optimal sample complexity in the regime of constant α. Before we can state our results, we need to define a natural geometric object associated with a workload of linear queries. This object has been important in applying geometric techniques to differential privacy [HT10, BDKT12, NTZ13, Nik15]. Definition 2. The sensitivity polytope K of a workload Q of m linear queries is equal to K = conv{±Q(D) : D is a database of size 1}. From the above definition, we see that K is a symmetric (i.e. K = −K) convex polytope in Rm . The importance of K lies in the fact that it captures how query answers can change between neighboring databases: for any two neighboring databases D and D ′ of size n and n′ respectively, nQ(D) − n′ Q(D ′ ) ∈ K. This is exactly the information that a differentially private algorithm is supposed to hide. Intuitively, we expect that the larger K is, the larger scε,δ (K, α) should be. We give evidence for the above intuition, and propose the width of K in a random direction as a measure of its “size”. Let hK be the support function of K: hK (y) = maxx∈K hx, yi. For a unit vector y, hK (y) + hK (−y) is the width of K in the direction of y; for arbitrary y, hK (ty) scales linearly with t (and is, in fact, a norm). We define the ℓ∗ -norm of K, also known as its Gaussian mean width, as ℓ∗ (K) = E[hK (g)], where g is a standard Gaussian random vector in Rm . The following theorem captures our main result. Theorem 1. Let Q be a workload of m linear queries, and let K be its sensitivity polytope. The ℓ∗ (K) , where C is an following holds for all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , and any α ≤ Cm(log 2m)2 p √ absolute constant, and σ(ε, δ) = (0.5 ε + 2 log (1/δ))/ε:  n σ(ε, δ)ℓ∗ (K) σ(ε, δ)√m o √ scε,δ (Q, α) = O min ; , α mα2   σ(ε, δ)ℓ∗ (K)2 . scε,δ (Q, α) = Ω m3/2 (log 2m)4 α The upper bound on sample complexity is achieved by a mechanism  running in time polynomial in √  m m, n, and |U |. Moreover, if ℓ∗ (K) = Ω(m), then scε,δ (Q, α) = Θ σ(ε,δ) for any α ≤ 1/C, α where C is an absolute constant. The sample complexity upper bounds in the theorem above are known from prior work: one is given by the projection mechanism from [NTZ13], with the sample complexity upper bound in terms of ℓ∗ (K) shown in [DNT14]; the other upper bound is given by the Gaussian noise mechanism [DN03, DN04, DMNS06]. The main new contribution in this work are the lower bounds on sample complexity. The gap between upper and lower bounds is small when ℓ∗ (K) is close to its maximal value of m. Indeed, when ℓ∗ (K) = Θ(m), our results imply that the Gaussian noise mechanism has optimal sample complexity up to constants. This is, to the best of our knowledge, the first example of a general geometric condition under which a simple and efficient mechanism has optimal sample complexity up to constant factors. Moreover, in the constant error regime this condition is also necessary for the Gaussian mechanism to be optimal up to constants: when ℓ∗ (K) = o(m) and α = Ω(1), the projection mechanism has asymptotically smaller sample complexity than the Gaussian mechanism. We can prove somewhat stronger results for another natural problem in private data analysis, which we call the mean point problem. In this problem, we are given a closed convex set K ⊂ Rm , 3 and we are asked to approximate P the mean D of the database D, where D = {x1 , . . . , xn } is a 1 multiset of points in K and D = n ni=1 xi . This problem, which will be the focus for most of this paper, has a more geometric flavor, and is closely related to the query release problem for linear queries. In fact, Theorem 1 will essentially follow from a reduction from the results below for the mean point problem. With respect to the mean point problem, we define the error of an algorithm A as: err(K, A, n) = sup(EkA(D) − Dk22 )1/2 , D where the supremum is over databases D consisting of at most n points from K, and the expectation is over the randomness of the algorithm. The sample complexity of an algorithm A with error α is defined as: sc(K, A, α) = min{n : err(K, A, n) ≤ α}. The sample complexity of solving the mean point problem with error α over K is defined by: scε,δ (K, α) = min{sc(K, A, α) : A is (ǫ, δ)-differentially private}. Our main result for the mean point problem is given in the following theorem: Theorem 2. Let K be a symmetric convex body contained in the unit Euclidean ball B2m in Rm . ℓ∗ (K) The following holds for all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , and any α ≤ C √m(log , where C 2m)2 p √ is an absolute constant, and σ(ε, δ) = (0.5 ε + 2 log (1/δ))/ε:  n σ(ε, δ)ℓ∗ (K) σ(ε, δ)√ m o ; , scε,δ (K, α) = O min α2 α   σ(ε, δ)ℓ∗ (K) scε,δ (K, α) = Ω . (log 2m)2 α The upper bound on sample complexity is achieved by a mechanism running in time polynomial in  √  √ m m, n, and |U |. Moreover, when ℓ∗ (K) = Ω( m), then scε,δ (Q, α) = Θ σ(ε,δ) for any α ≤ 1/C, α where C is an absolute constant. The upper bounds again follow from prior work, and in fact are also given by the projection mechanism and the Gaussian noise mechanism, which can be defined for the mean point problem 2 as well. Notice that the gap between the upper and the lower bound is on the order (log α2m) . If the lower bound ∗was valid for all values of the error parameter α less than a fixed constant, rather than ℓ (K) , Theorem 2 would nearly characterize the optimal sample complexity for the for α ≤ C √m(log 2m)2 mean point problem for all constant α. Unfortunately, the restriction on α is, in general, necessary (up to the logarithmic terms) for lower bounds on sample complexity in terms of ℓ∗ (K). For √ example, we can take K = γB2m , i.e. a Euclidean ball in Rm with radius γ. Then, ℓ∗ (K) = Θ(γ m), but the sample complexity is 0 when α > γ, since the trivial algorithm which ignores the database and outputs 0 achieves error γ. Thus, a more sensitive measure of the size of K is necessary to prove optimal lower bounds. We do, nevertheless, trust that the techniques introduced in this paper bring us closer to this goal. We conclude this section with a high-level overview of our techniques. Our starting point is a recent tight lower bound on the sample complexity of a special class of linear queries: the 1-way marginal queries. These queries achieve the worst case sample complexity for a family of m linear √ queries: Ω( m/α) [BUV14, SU15]. The sensitivity polytope of the 1-way marginals is the cube 4 [−1, 1]m , and it can be shown that the lower bound on the sample complexity of 1-way marginals implies an analogous lower bound on the sample complexity of the mean point problem with √ √ K = Qm = [−1/ m, 1/ m]m . For the mean point problem, it is easy to see that when K ′ ⊆ K, the sample complexity for K ′ is no larger than the sample complexity for K. Moreover, we can show that the sample complexity of any projection of K is no bigger than the sample complexity ′ of K itself. So, our strategy then is to find a large scaled copy of Qm , m′ ≤ m, inside a projection of K onto a large dimensional subspace whenever ℓ∗ (K) is large. We solve this geometric problem using deep results from asymptotic convex geometry, namely the Dvoretzky criterion, the low M ∗ estimate, and the M M ∗ estimate. Our techniques also yield an alternative proof of the volume number theorem of Milman and Pisier [MP87]. Besides avoiding the quotient of subspace theorem, our proof yields an improvement in the volume number theorem, conditional on the well-known conjecture that√ any symmetric convex ∗ body K has a position (affine image) T K for which ℓ (T K)ℓ(T K) = O(m log 2m), where ℓ(K) is the expected K-norm of a standard Gaussian. More details about this connection are given in Section 7. 1.1 Prior Work Most closely related to our work are the results of Nikolov, Talwar, and Zhang [NTZ13], who gave a private mechanism (also based on the projection mechanism, but more involved) which has nearly optimal sample complexity (with respect to average error), up to factors polynomial in log m and log |U |. This result was subsequently improved by Nikolov [Nik15], who showed that the log m factors can be replaced by log n. While these results are nearly optimal for subconstant values of the error parameter α, i.e. the optimality guarantees do not depend on 1/α, factors polynomial in log |U | can be prohibitively large. Indeed, in many natural settings, such as that of marginal queries, |U | is exponential in the number of queries m, so the competitiveness ratio can be polynomial in m. The line of work that applies techniques from convex geometry to differential privacy started with the beautiful paper of Hardt and Talwar [HT10], whose results were subsequently strengthened in [BDKT12]. These papers focused on the “large database” regime (or, in our language, the setting of subconstant error), and pure differential privacy (δ = 0). 2 Preliminaries We begin with the introduction of some notation. Throughout the paper we use C, C1 , etc., for absolute constants, whose value may change from line to line. We use k · k2 for the Euclidean norm, and k · k1 for the ℓ1 norm. We define B1m and B2m to be the ℓ1 and ℓ2 unit balls in Rm respectively, while Qm = [− √1m , √1m ]m ⊆ Rm will refer to the m-dimensional hypercube, normalized to be contained in the unit Euclidean ball. We use Im for the identity operator on Rm , as well as for the m × m identity matrix. For a given subspace E, we define ΠE : Rm → Rm as the orthogonal projection operator onto E. Moreover, when T : E → F is a linear operator between the subspaces E, F ⊆ Rm , we define kT k = max{kT xk2 : kxk2 = 1} as its operator norm, which is also equal to its largest singular value σ1 (T ). For the diameter of a set K we use the nonstandard, but convenient, definition diam K = max {kxk2 : x ∈ K}. For sets symmetric around 0, this is equivalent to the standard definition, but scaled up by a factor of 2. We use N (µ, Σ) to refer to the Gaussian distribution with mean µ and covariance Σ, and we use the notation x ∼ N (µ, Σ) to denote that x is distributed as a Gaussian random variable with mean µ and covariance Σ. For a m×m matrix (or 5 m equivalently an operator from ℓm 2 to ℓ2 ) A we use A  0 to denote that A is positive semidefinite. For positive semidefinite matrices/operators A, B, we use the notation A  B to denote B − A  0. 3 Probability Theory We make use of some basic comparison theorems from the theory of stochastic processes. First we state the well-known symmetrization lemma. We also give the short proof for completeness. Recall that ξ1 , . . . , ξn are a sequence of Rademacher random variables if each ξi is uniformly and independently distributed in {−1, 1}. Lemma 1 (Symmetrization). Let p > 1, and let k · k be a norm on Rm . Then, for any sequence x1 , . . . , xn of independent random variables in Rm such that Ekxi kp is finite for every i, we have X X X p p ξ i xi , xi − E xi ≤ 2p E E i i i where ξ1 , . . . , ξn are Rademacher random variables, independent of x1 , . . . , xn . Each expectation above is with respect to all random variables involved. P P Proof. Let x′1 , . . . , x′n be independent copies of x1 , . . . , xn . Then, E i xi = E i x′i , and, by convexity of the function k · kp and Jensen’s inequality, X X X X X p p p xi − E x′i ≤ E xi − x′i . xi − E xi = E E i i i i i Because xi and x′i are independent and identically distributed, the random x′i and P Pvariables x′ i − ′ ′ p p xi − xi are also identically distributed. Therefore, Ek i xi − xi k = Ek i ξi (xi − xi )k , where ξ1 , . . . , ξn are independent Rademacher random variables, as in the statement of the lemma. Finally, by Minkowski’s inequality (i.e. triangle inequality for Lp ), we have ! 1/p p  X  X X X p 1/p p p ξi (xi − x′i ) ≤ ξ i xi + Ek ξi x′i kp E E ξ i xi , = 2p E i i i i as desired. Next we state a simple comparison theorem for Gaussian random variables. Lemma 2. Let x ∼ N (0, Σ) and x′ ∼ N (0, Σ′ ) be Gaussian random variables in Rm , and assume Σ  Σ′ . Then, for any norm k · k on Rm , we have: Ekxk ≤ Ekx′ k. Proof. Couple x and x′ so that they are independent, and define a new random variable y ∼ N (0, Σ′ − Σ), independent of x and x′ . Then the random variables x + y and x − y are distributed identically to x′ , and, by linearity of expectation and the triangle inequality we have   kx + yk + kx − yk ′ ≥ Ekxk. Ekx k = E 2 This completes the proof. Note that the same conclusion follows under weaker assumptions from Slepian’s lemma. 6 3.1 Convex Geometry In this section, we outline the main geometric tools we use in later sections. For a more detailed treatment, we refer to the lecture notes by Vershynin [Ver09] and the books by Pisier [Pis89] and Artstein-Avidan, Giannopoulos, and Milman [AAGM15]. Throughout, we define a convex body K as a compact subset of Rm with non-empty interior. A convex body K is (centrally) symmetric if and only if K = −K. We define the polar body K ◦ of K as: K ◦ = {y : hx, yi ≤ 1 ∀x ∈ K}. The following basic facts are easy to verify and very useful. Fact 1. For convex bodies K, L ⊆ Rm , K ⊆ L ⇔ L◦ ⊆ K ◦ . Fact 2 (Section/Projection Duality). For a convex body K ⊆ Rm and a subspace E ⊆ Rm : 1. (K ∩ E)◦ = ΠE (K ◦ ); 2. (ΠE (K))◦ = K ◦ ∩ E. In both cases, the polar is taken in the subspace E. Fact 3. For any invertible linear map T and any convex body K, T (K)◦ = T −∗ (K ◦ ), where T −∗ is the inverse of the adjoint operator T ∗ . A simple special case of Fact 3 is that, for any convex body K, (rK)◦ = property alongside Fact 1, we have the following useful corollary. 1 ◦ rK . Using this Corollary 1. For a convex body K ⊆ Rm and E ⊆ Rm a subspace with k = dim E, the following two statements are equivalent: 1. ΠE (rB2m ) ⊆ ΠE (K); 2. K ◦ ∩ E ⊆ 1r (B2m ∩ E), where, as before, taking the polar set is considered in the subspace E. Notice that the second statement is also equivalent to diam(K ◦ ∩ E) ≤ 1r . Our work relies on appropriately quantifying the “size” of (projections and sections of) a convex body. It turns out that, for our purposes, the right measure of size is related to the notion of width, captured by the support function. Recall from the introduction that the support function of a convex body K ⊂ Rm is given by hK (y) = maxx∈K hx, yi for every y ∈ Rm . The support function is intimately related to the Minkowski norm k · kK , defined for a symmetric convex body K ⊆ Rm by kxkK = min {r ∈ R : x ∈ rK}, for every x ∈ Rm . It is easy to verify that k · kK is indeed a norm. The support function hK is identical to the Minkowski norm of the polar body K ◦ (which is also the dual norm to k · kK ): hK (y) = kykK ◦ for every y ∈ Rm . Now we come to the measure of the “size” of a convex body which will be central to our results: the Gaussian mean width of the body, defined next. Definition 3. The Gaussian mean width and Gaussian mean norm of a symmetric convex body K ⊆ Rm are defined respectively as: ℓ∗ (K) = EkgkK ◦ = E[hK (g)], ℓ(K) = EkgkK , where g ∼ N (0, Im ) is a standard Gaussian random variable. 7 The next lemma gives an estimate of how the mean width changes when applying a linear transformation to K. m Lemma 3. For any symmetric convex body K ⊂ Rm , and any linear operator T : ℓm 2 → ℓ2 : ℓ∗ (T (K)) ≤ kT kℓ∗ (K). Proof. Notice that, for a standard Gaussian g ∼ N (0, Im ), ℓ∗ (T (K)) = E sup hT (x), gi = E sup hx, T ∗ (g)i = EkT ∗ (g)kK ◦ . x∈K x∈K Treating T ∗ T as an m × m matrix in the natural way, we see that T ∗ (g) ∼ N (0, T ∗ T ). By applying Lemma 2 to Σ = T ∗ T and Σ′ = kT k2 Im , we have that ℓ∗ (T (K)) = EkT ∗ (g)kK ◦ ≤ kT k · EkgkK ◦ = kT kℓ∗ (K). This finishes the proof of the lemma. Similar to approaches in previous works ([HT10], [NTZ13]), we exploit properties inherent to a specific position of K to prove lower bounds on its sample complexity. Definition 4 (ℓ-position). A convex body K ⊆ Rm is in ℓ-position if for all linear operators m T : ℓm 2 → ℓ2 : ℓ∗ (K) · ℓ(K) ≤ ℓ∗ (T (K)) · ℓ(T (K)). Clearly, K is in ℓ-position if and only if K ◦ is in ℓ-position, since ℓ∗ (K) = ℓ(K ◦ ) for any convex body K. Note further that the product ℓ∗ (K) · ℓ(K) is scale-invariant, in the sense that ℓ∗ (rK) · ℓ(rK) = ℓ∗ (K) · ℓ(K) for any real r. This is because, for any x, y ∈ Rm , kxkrK = 1r kxkK , and hrK (y) = rhK (y), so ℓ∗ (rK) = rℓ∗ (K) and ℓ(rK) = 1r ℓ(K). We will relate the Gaussian mean width of K to another measure of its size, and the size of its projections and sections, known as Gelfand width. A definition follows. Definition 5 (Gelfand width). For two symmetric convex bodies K, L ⊂ Rm , the Gelfand width of order k of K with respect to L is defined as: ck (K, L) = inf inf{r : K ∩ E ⊆ r(L ∩ E)} = inf sup{kxkL : x ∈ K ∩ E}, E E where the first infimum is over subspaces E ⊆ Rm of co-dimension at most k − 1 (i.e. of dimension at least m − k + 1). When k > m, we define ck (K, L) = 0. We denote ck (K) = ck (K, B2m ), and we call ck (K) simply the Gelfand width of K of order k. Note that ck (K) = inf E diam(K ∩ E), where the infimum is over subspaces E ⊆ Rm of codimension at most k − 1. Observe also that for any K and L, ck (K, L) is non-increasing in k. It is well-known that the infimum in the definition is actually achieved [Pin85]. 3.2 Composition of Differential Privacy One of the most important properties of differential privacy is that it behaves nicely under (adaptively) composing mechanisms. Lemma 4 (Composition). For randomized algorithms A1 and A2 satisfying (ε1 , δ1 )- and (ε2 , δ2 )differential privacy respectively, the algorithm A(D) = (A1 (D), A2 (A1 (D), D)) satisfies (ε1 +ε2 , δ1 + δ2 )-differential privacy. 8 3.3 Known Bounds In this section, we recall some known differentially private mechanisms, with bounds on their sample complexity, as well as a lower bound on the optimal sample complexity. We start with the lower bound: Theorem 3 ([BUV14, SU15]). For all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) and α ≤ 1/10: ! p m log 1/δ m . scε,δ (Q , α) = Ω αε (1) Next we recall one of the most basic mechanisms in differential privacy, the Gaussian mechanism. A proof of the privacy guarantee, with the constants given below, can be found in [NTZ13]. Theorem 4 (Gaussian Mechanism [DN03, DN04, DMNS06]).p Let D = {x1 , . . . , xn } be such that √ ∀i : kxi k2 ≤ σ. If w ∼ N (0, σ(ε, δ)2 σ 2 Im ), σ(ε, δ) = (0.5 ε + 2 log (1/δ))/ε and Im ∈ Rm×m is the identity matrix, then the algorithm AGM defined by AGM (D) = D + n1 w is (ε, δ)-differentially private. Corollary 2. For any symmetric convex K ⊆ B2m : p scε,δ (K, α) = O m log 1/δ αε ! . √ √ 0.5 ε+ 2 log (1/δ) In the rest of the paper we will use the notation σ(ε, δ) = from the theorem ε statement above. Finally, we also present the projection mechanism from [NTZ13], which post-processes the output of the Gaussian mechanism by projecting onto K. Theorem 5 (Projection Mechanism [NTZ13, DNT14]). Let K ⊆ B2m be a symmetric convex body, and define AP M to be the algorithm that, on input D = {x1 , . . . , xn } ⊂ K, outputs: ŷ = arg min{kŷ − ỹk22 : ŷ ∈ K}, where ỹ = D + n1 w, w ∼ N (0, σ(ε, δ)2 Im ). Then AP M satisfies (ε, δ)-differential privacy and has sample complexity:   σ(ε, δ)ℓ∗ (K) sc(K, AP M , α) = O . α2 Corollary 3. For any symmetric convex K ⊆ B2m :   σ(ε, δ)ℓ∗ (K) . scε,δ (K, α) = O α2 4 Basic Properties of Sample Complexity In this section, we prove some fundamental properties of sample complexity that will be extensively used in later sections. Lemma 5. L ⊆ K ⇒ ∀α ∈ (0, 1) : scε,δ (L, α) ≤ scε,δ (K, α). 9 Proof. Observe first that for any algorithm A and any n, err(L, A, n) ≤ err(K, A, n), because err(K, A, n) is a supremum over a larger set than err(L, A, n). This implies that sc(K, A, α) ≤ sc(L, A, α) holds for any algorithm A, and, in particular, for the (ε, δ)-differentially private algorithm A∗ that achieves scε,δ (K, α). Then, we have: scε,δ (L, α) ≤ sc(L, A∗ , α) ≤ sc(K, A∗ , α) = scε,δ (K, α), as desired. Corollary 4. For all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) and α ≤ 1/10: ! p m log 1/δ . scε,δ (B2m , α) = Ω αε Proof. Since Qm ⊆ B2m , this follows directly from Lemma 5 and Lemma 3. Lemma 6. For any α ∈ (0, 1), any linear operator T : Rm → Rm and any symmetric convex body K ⊂ Rm : scε,δ (K, α) ≥ scε,δ (T (K), α · kT k). Proof. Let A be an (ε, δ)-differentially private algorithm that achieves scε,δ (K, α). Fix a function f : T (K) → K so that for every x′ ∈ T (K), f (x′ ) ∈ T −1 (x′ ) ∩ K. We define a new algorithm A′ that takes as input D ′ = {x′1 , ..., x′n } ⊂ T (K) and outputs A′ (D ′ ) = T (A(D)), where D = f (D ′ ) = {f (x′1 ), . . . , f (x′n )}. We claim that A′ is (ε, δ)-differentially private and that err(T (K), A′ , n) ≤ kT k · err(K, A, n) holds for every n. This claim is sufficient to prove the lemma, because it implies: scε,δ (T (K), α · kT k) ≤ sc(T (K), A′ , α · kT k) ≤ sc(K, A, α) = scε,δ (K, α). To show the claim, first observe that, by linearity, D ′ = T (D). We get: EkA′ (D ′ ) − D ′ k22 = EkT (A(D)) − T (D)k22 = EkT (A(D) − D)k22 ≤ kT k2 · EkA(D) − Dk22 ≤ kT k2 err(K, A, n)2 , where the first inequality follows by the definition of the operator norm. Since this holds for arbitrary n and D ′ ⊂ T (K) of size n, it implies the claim on the error bound of A′ . It remains to show that A′ is (ε, δ)-differentially private. Note that for every two neighboring databases D1′ and D2′ of points in T (K),the corresponding databases D1 = f (D1′ ) and D2 = f (D2′ ) of points in K are also neighboring. Then A(D) = A(f (D ′ )) is (ε, δ)-differentially private as a function of D ′ , and the privacy of A′ follows from Lemma 4. Corollary 5. For any t > 0: scε,δ (tK, tα) = scε,δ (K, α). Proof. Taking T = tIm in Lemma 6, where Im is the identity on Rm , the lemma implies scε,δ (tK, tα) ≤ scε,δ (K, α). Since this inequality holds for any t and K, we may apply it to K ′ = tK and t′ = 1/t, and we get scε,δ (K, α) = scε,δ ((1/t)tK, (1/t)tα) ≤ scε,δ (tK, tα). Since for any subspace E of Rm , the corresponding orthogonal projection ΠE has operator norm 1, we also immediately get the following corollary of Lemma 6: 10 Corollary 6. For any subspace E: scε,δ (K, α) ≥ scε,δ (ΠE (K), α). In the next theorem, we combine the lower bound in Corollary 4 and the properties we proved above in order to give a lower bound on the sample complexity of an arbitrary symmetric convex body K in terms of its geometric properties. In the following sections we will relate this geometric lower bound to the mean Gaussian width of K. Theorem 6 (Geometric Lower Bound). For all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , any convex symmetric body K ⊆ Rm , any 1 ≤ k ≤ m and any α ≤ 1/(10ck (K ◦ )): ! p √ log 1/δ m−k+1 . · scε,δ (K, α) = Ω αε ck (K ◦ ) Proof. Let us fix k and let E be the subspace that achieves ck (K ◦ ), i.e. diam(ΠE (K ◦ )) = ck (K ◦ ) and dE = dim E ≥ m − k + 1. By Corollary 1, we have ck (K ◦ )−1 ΠE (B2m ) ⊆ ΠE (K). Applying Corollary 6, Lemma 5, and Corollary 5 in sequence, we get: scε,δ (K, α) ≥ scε,δ (ΠE (K), α) ≥ scε,δ (ck (K ◦ )−1 ΠE (B2m ), α) = scε,δ (Π(B2m ), αck (K ◦ )). Notice that ΠE (B2m ) is the Euclidean unit ball in the subspace E, and, therefore: scε,δ (Π(B2m ), αck (K ◦ )) = scε,δ (B2dE , αck (K ◦ )). Finally, by Corollary 4, we get the following lower bound, as long as αck (K ◦ ) ≤ 1/10: ! ! p p √ d log 1/δ log 1/δ m − k + 1 E =Ω . · scε,δ (B2dE , αck (K ◦ )) = Ω αck (K ◦ )ε αε ck (K ◦ ) Combining the inequalities completes the proof. 5 Optimality of the Gaussian Mechanism In this section, we present the result that the Gaussian mechanism is optimal, up to constant factors, when K ⊆ B2m is sufficiently large. More specifically, if the Gaussian mean width of K is asymptotically maximal, then we can get a tight lower bound on the sample complexity of the Gaussian mechanism. This is summarized in the theorem below. Theorem 7. For all ε < O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , sufficiently small constant α, and any symmetric convex body K ⊆ B2m , if √ ℓ∗ (K) = Ω( m), then: scε,δ (K, α) = Θ p ! m log 1/δ , αε and scε,δ (K, α) is achieved, up to constants, by the Gaussian mechanism. 11 By Corollary 2 we have an upper bound for the Gaussian mechanism defined previously. To prove its optimality, we use a classical result from convex geometry, known as Dvoretzky’s criterion, to show a matching lower bound for the sample complexity. This result relates the existence of a nearly-spherical section of a given convex body to the Gaussian mean norm. It was a key ingredient in Milman’s probabilistic proof of Dvoretzky’s theorem: see Matoušek’s book [Mat02] for an exposition. Theorem 8 ([Mil71]; Dvoretzky’s Criterion). For every symmetric convex body K ⊆ Rm such that B2m ⊆ K, and every β < 1, there exists a constant c(β) and a subspace E with dimension dim E ≥ c(β)ℓ(K)2 for which: ℓ∗ (K) ℓ(K) (1 − β) √ B2m ∩ E ⊆ K ∩ E ⊆ (1 + β) √ B2m ∩ E. m m Proof of Theorem 7. Given the matching upper bound on sample complexity in Corollary 2, it suffices to show the equivalent lower bound, namely that: ! p m log 1/δ scε,δ (K, α) = Ω . αε To this end, we will show that there exists a k ≤ (1 − c)m + 1, for an absolute constant c, so that ck (K ◦ ) = O(1). Then the lower bound will follow directly from Theorem 6. We will prove the claim above by applying Dvoretzky’s criterion to K ◦ . By Fact 1, K ⊆ B2m ⇒ B2m ⊆ K ◦ . We can then apply Dvoretzky’s criterion with β = 1/2, ensuring that there exists a subspace E of dimension dim E ≥ c(1/2)ℓ(K ◦ )2 for which: K◦ ∩ E ⊆ ℓ(K ◦ ) m √ B ∩ E. 2 m 2 Let us define k = m − dim E + 1; then k ≤ m − c(1/2)ℓ(K ◦ )2 + 1 = m − c(1/2)ℓ∗ (K)2 + 1. Since, by assumption ℓ(K ∗ ) = Ω(m), there exists a constant c so that k ≤ (1 − c)m + 1. Finally, by the ◦ √ ) = O(1), as desired. This completes the proof. definition of Gelfand width, ck (K ◦ ) ≤ ℓ(K 2 m 6 Gaussian Width Lower Bounds in ℓ-position In Section 5 we showed that the Gaussian Mechanism is optimal when the Gaussian mean width of K is asymptotically as large possible. Our goal in this and the following section is to show general lower bounds on sample complexity in terms of ℓ∗ (K). This is motivated by the sample complexity upper bound in terms of ℓ∗ (K) provided by the projection mechanism. It is natural to follow the strategy from Section 5: use Dvoretzky’s criterion to find a nearlyspherical projection of K of appropriate radius and dimension. An inspection of the proof of 7 shows  ℓ∗√ (K)2 (ignoring the dependence on that the sample complexity lower bound we get this way is Ω m ε, δ, and α here, and in the rest of this informal discussion). Recall that we are aiming for a lower ∗ bound of of Ω(ℓ∗ (K)), so we are off by a factor of ℓ√(K) . Roughly speaking, the problem is that m Dvoretzky’s criterion does too much: it guarantees a spherical section of K ◦ , while we only need a bound on the diameter of the section. In order to circumvent this difficulty, we use a different result from asymptotic convex geometry, the low M ∗ -estimate, which bounds the diameter of a random section of K ◦ , without also producing a large ball contained inside the section. A technical difficulty is that the resulting upper bound on the diameter is in terms of the Gaussian mean K-norm, rather 12 than the (reciprocal of the) mean width. When K is in ℓ-position, this is not an issue, because results of Pisier, Figiel, and Tomczak-Jaegermann show that in that case ℓ(K)ℓ∗ (K) = O(log m). In this section we assume that K is in ℓ-position, and we remove this requirement in the subsequent section. The main result of this section is summarized below. Theorem 9. For all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , all symmetric convex bodies K ⊆ Rm in ∗ , where C is an absolute constant: ℓ-position, and for α ≤ C √ℓm(K) log 2m scε,δ (K, α) = Ω p ! log 1/δ ℓ∗ (K) . · αε log 2m The following two theorems are the main technical ingredients we need in the proof of Theorem 9. Theorem 10 ([FTJ79], [Pis80]; M M ∗ Bound). There exists a constant C such that for every symmetric convex body K ⊂ Rm in ℓ-position: ℓ(K) · ℓ∗ (K) ≤ C · m log 2m. √ It is an open problem whether this bound can be improved to m log 2m. This would be tight for the cube Qm . This improvement would lead to a corresponding improvement in our bounds. Theorem 11 ([PTJ86]; Low M ∗ estimate). There exists a constant C such that for every symmetric convex body K ⊂ Rm there exists a subspace E ⊆ Rm with dim E = m − k for which: ℓ∗ (K) diam (K ∩ E) ≤ C · √ . k Combining Theorems 10 and 11, we get the following key lemma. Lemma 7. There exists a constant C such that for every symmetric convex body K ⊂ Rm in ℓposition, and every β ∈ (0, 1 − 1/m), there exists a subspace E of dimension at least βm satisfying: √ m log 2m . diam(K ∩ E) ≤ C √ 1 − β · ℓ(K) Proof. Let k = ⌊(1 − β)m⌋ ≥ 1. Using the low M ∗ estimate on K, there exists a subspace E with dim E = m − k = ⌈βm⌉ for which: ℓ∗ (K) diam (K ∩ E) ≤ C1 · √ . k By the M M ∗ upper bound, since K is in ℓ-position, we have that: ℓ∗ (K) ≤ C2 · m log 2m , ℓ(K) and, combining the two inequalities, we get that: √ m log 2m m log m , diam(K ∩ E) ≤ C1 C2 √ ≤ C√ 1 − β · ℓ(K) k · ℓ(K) for an appropriate constant C. This completes the proof. 13 The proof of the desired lower bound now follows easily from this lemma. Proof of Theorem 9. By Theorem 6, it suffices to show that √  ∗  ℓ (K) m−k+1 m max =Ω . k=1 ck (K ◦ ) log 2m (2) Indeed, if k∗ is the value of k for which the maximum on the left hand side is achieved, then √ ∗ m−k +1 ◦ ∗ c ∗ (K ◦ ) is a lower bound on the sample complexity for all α ≤ 1/(10ck (K )), and by (2): k 1 =Ω 10ck∗ (K ◦ )  ℓ∗ (K) √ m − k + 1 · log 2m  =Ω  ℓ∗ (K) √ m · log 2m  . In the rest of the proof, we establish (2). Since K (and thus also K ◦ ) are in ℓ-position by assumption, from Lemma 7 applied to K ◦ we have that there exists a subspace E such that dim E ≥ m/2 and:  √  √ m log 2m m log 2m = O . diam(K ◦ ∩ E) = O ℓ(K ◦ ) ℓ∗ (K) Setting kE = m − dim E + 1 ≤ m/2 + 1, and because ckE (K ◦ ) ≤ diam(K ◦ ∩ E) by definition, we get that: √ √  ∗  m−k+1 dim E ℓ (K) m max ≥ =Ω , k=1 ck (K ◦ ) diam(K ◦ ∩ E) log 2m as desired. 7 Gaussian Width Lower Bounds for Arbitrary Bodies In this section, we remove the assumption that K is in ℓ-position from the previous section. Instead, we use a recursive charging argument in order to reduce to the ℓ-position case. The resulting guarantee is worse than the one we proved for bodies in ℓ-position by a logarithmic factor. The main lower bound result of this section is the following theorem. Theorem 12. For all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , any symmetric convex body K ⊂ Rm , ℓ∗ (K) , where C is an absolute constant: and any α ≤ C √m(log 2m)2 scε,δ (K, α) = Ω  σ(ε, δ)ℓ∗ (K) (log 2m)2 α  . The lower bound follows from the geometric lemma below, which is interesting in its own right. Lemma 8. There exists a constant C such that, for any symmetric convex body K ⊂ Rm , ! m X 1 ∗ √ ℓ (K) ≤ C(log 2m) . i · cm−i+1 (K ◦ ) i=1 14 (3) Lemma 8 is closely related to the volume number theorem of Milman and Pisier [MP87], which 1 states that the inequality (3) holds with cm−i+1 (K ◦ ) replaced by the volume number vi (K), defined as: vol(ΠE (K))1/i , vi (K) = sup m 1/i E:dim E=i (vol(ΠE (B2 )) where the supremum is over subspaces E of Rm . Inequality (3) is stronger than the volume 1 1 number theorem, because cm−i+1 (K ◦ ) ≤ vi (K). Indeed, setting r = cm−i+1 (K ◦ ) , by Corollary 1 and the definition of Gelfand width we have that there exists a subspace E of dimension i such that rΠE (B2m ) ⊆ ΠE K. Therefore, vol(ΠE (K)) ≥ r i vol(ΠE (B2m )), which implies the desired inequality. Even though the volume number theorem is weaker than (3), the proof given by Pisier in his book [Pis89], with minor modifications, appears to yield the stronger inequality we need. Rather than repeat this argument, we give a self-contained and slightly different proof below. Our proof only uses the low M ∗ estimate, the M M ∗ estimate, and elementary linear algebra, while Pisier’s ∗ proof uses √ Milman’s quotient of subspace theorem. Moreover, if the M M estimate can be improved would imply a corresponding improvement of the logarithmic factor to O(m log 2m), our argument √ in (3) from log 2m to log 2m. This does not appear to be the case in Pisier’s proof, where the logarithmic factor comes from the (tight) upper estimate of the K-convexity constant of mdimensional Banach spaces. To prove Lemma 8 we will first establish an auxiliary lemma. Lemma 9. There exists a constant C such that, for any symmetric convex body K ⊂ Rm and m ≥ 4, there exists a subspace E ⊆ Rm such that dim E ≥ ⌊m/4⌋ and: √ m ∗ . ℓ (ΠE (K)) ≤ C(log 2m) c2⌊m/4⌋+1 (K ◦ ) Proof. Let T be a linear operator such that T (K) is in ℓ-position. By the rotational invariance of Gaussians, ℓ∗ (U T (K)) = ℓ∗ (T (K)) and ℓ(U T (K)) = ℓ(T (K)) for any orthogonal transformation U ; so, we may assume that T is self-adjoint and positive definite. Let λ1 ≥ . . . ≥ λm > 0 be the eigenvalues of T . Let us set k = ⌊m/4⌋ and define E to be the subspace spanned by the eigenvectors of T corresponding to λ1 , . . . , λk . Observe that ΠE and T commute because they are simultaneously diagonalized by the eigenvectors of T . Using Lemma 3, we calculate: ℓ∗ (ΠE (K)) = ℓ∗ (ΠE T −1 T (K)) ≤ kΠE T −1 kℓ∗ (T (K)). By the definition of E, the singular values of ΠE T −1 are λ−1 ≥ . . . ≥ λ−1 1 , and therefore the k operator norm of ΠE T −1 is kΠE T −1 k = λ−1 . Thus we have: k ℓ∗ (ΠE (K)) ≤ ℓ∗ (T (K)) . λk Since T (K), and thus T (K)◦ , is in ℓ-position, we can apply Lemma 7 to T (K)◦ and β = and get that there exists a subspace F of dimension at least m − k so that: √ m ℓ∗ (T (K)) ≤ C1 (log 2m) , diam(T (K)◦ ∩ F ) where C1 is an absolute constant. 15 (4) m−k m ≥ 1 4 Let G = E ⊥ be the orthogonal complement of the subspace E, i.e. the space spanned by the eigenvectors of T corresponding to the eigenvalues λk+1 , . . . , λm . The restriction T |G : G → Rm of T to G has eigenvalues λk+1 ≥ . . . ≥ λm . Therefore kT |G k ≤ λk+1 ≤ λk . Because G is spanned by eigenvectors of T , it is invariant under action by T , i.e. T (G) = G, and, equivalently, T −1 (G) = G. Therefore T −1 (K ◦ ) ∩ G = T −1 (K ◦ ∩ G) and K ◦ ∩ G = (T |G )T −1 (K ◦ ∩ G). It follows that: diam(K ◦ ∩ F ∩ G) = diam((T |G )T −1 (K ◦ ∩ G) ∩ F ) ≤ kT |G k diam(T −1 (K ◦ ∩ G) ∩ F ) ≤ λk diam(T −1 (K ◦ ) ∩ F ) = λk diam(T (K)◦ ∩ F ). Setting H = F ∩ G and combining the inequalities, we get that: √ √ λk m λk m ≤ C (log 2m) , ℓ∗ (T (K)) ≤ C1 (log 2m) 1 diam(K ◦ ∩ H) c2k+1 (K ◦ ) where the final inequality follows from the definition of Gelfand width, since the co-dimension of H is at most 2k. Sibstituting this inequality into the right hand side of (4) finishes the proof of the lemma. We are now ready to prove Lemma 8. Proof of Lemma 8. Let us first establish the lemma for m ≤ 16. Notice that: cm (K ◦ ) = min diam(K ◦ ∩ {tθ : t ∈ R}). θ:kθk2 =1 But diam(K ◦ ∩ {tθ : t ∈ R}) = kθk1 ◦ for any unit vector θ, by the definition of Minkowski norm. K Therefore, 1/cm (K ◦ ) = max{kθkK ◦ : kθk2 = 1}. It follows that, for a standard Gaussian g in Rm : √ (Ekgk22 )1/2 4 m Ekgk2 ∗ ◦ ≤ = ≤ . (5) ℓ (K) = EkgkK ≤ cm (K ◦ ) cm (K ◦ ) cm (K ◦ ) cm (K ◦ ) This establishes the lemma for m ≤ 16. For m > 16, we will use an induction argument. We will strengthen the induction hypothesis to:   ⌈k/2⌉ X 1 . √ ℓ∗ (K) ≤ C(log 2k)  (6) ◦) i · c (K k−i+1 i=1 Assume the inequality holds for a sufficiently large absolute constant C and all symmetric convex bodies K ⊆ Rk , in any dimension k < m. We will show that the inequality then holds in dimension k = m as well. The inequality (5), provides the base case for the induction (k ≤ 16). We proceed with the inductive step. By Lemma 9 there exists a subspace E of dimension at least ⌊m/4⌋ such that: √ m ∗ . ℓ (ΠE (K)) ≤ C1 (log 2m) c2⌊m/4⌋+1 (K ◦ ) Observe that, since 2⌊m/4⌋ ≤ ⌊m/2⌋, and cj (K ◦ ) is monotone non-increasing in j, we have that c2⌊m/4⌋+1 (K ◦ ) ≥ cm−i+1 (K ◦ ) for any i ≤ ⌈m/2⌉. Moreover, ⌈m/2⌉ 1 √ 1 √ ≥ m, C2 i i=⌈3m/8⌉+1 X 16 for all m > 16 and an absolute constant C2 . These observations together imply that ∗ ℓ (ΠE (K)) ≤ C1 (log 2m) √ m c2⌊m/4⌋+1 (K ◦ ) ≤ C1 C2 (log 2m) ⌈m/2⌉ X i=⌈3m/8⌉+1 √ 1 i · cm−i+1 (K ◦ ) . (7) For a standard Gaussian g ∼ N (0, Im ), using the triangle inequality and the fact that Im = ΠE + ΠE ⊥ , we have: ℓ∗ (K) = E max |hx, gi| x∈K = E max |hΠE x, gi + ΠE ⊥ x, gi| x∈K ≤ E max |hΠE x, gi| + E max |hΠE ⊥ x, gi| x∈K ∗ x∈K ∗ = ℓ (ΠE K) + ℓ (ΠE ⊥ K). Then, the inductive hypothesis follows by (7) and by the inductive hypothesis (6) applied to ℓ∗ (ΠE ⊥ ). This finishes the proof of the lemma. Proof of Theorem 12. As in the proof of Theorem 9, it is sufficient to prove that: √  ∗  ℓ (K) m−k+1 m =Ω . max k=1 ck (K ◦ ) (log 2m)2 (8) But this inequality follows easily from Lemma 8 and the trivial case of Hölder’s inequality: ! ! ! √ m m X X 1 1 i m ∗ √ ℓ (K) ≤ C(log 2m) · max ≤ C(log 2m) ◦) i=1 cm−i+1 (K ◦ ) i i · c (K m−i+1 i=1 i=1 ! √ i m = O((log 2m)2 ) · max . i=1 cm−i+1 (K ◦ ) Then, the proof of the theorem follows from (8) analogously to the proof of Theorem 9. We now have everything in place to prove our main result for the mean point problem. Proof of Theorem 2. The upper bounds on sample complexity follow from Theorem 4, Corollary 2, Theorem 5, and Corollary 3. The lower bounds follow from Theorem 12. The statement after “moreover” follows from Corollary 2 and Theorem 7. 8 From Mean Point to Query Release All the bounds we proved so far were for the mean point problem. In this section we show reductions between this problem, and the query release problem, which allow us to translate our lower bounds to the query release setting and prove Theorem 1. We will show that the problem of approximating Q(D) for a query workload Q under differential privacy is nearly equivalent to approximating the mean point problem with universe K ′ = √1m K, where K is the sensitivity polytope of Q. The main technical lemma follows. 17 Lemma 10. Let Q be a workload of m linear queries over the universe U with sensitivity polytope K. Define K ′ = √1m K. Then, we have the inequalities: scε,δ (Q, α) ≤ scε,δ (K ′ , α);   16 diam(K ′ ) ′ scε,δ (K , α) ≤ max sc2ε,2δ (Q, α/4), . α2 (9) (10) Moreover, we can use an (ε, δ)-differentially private algorithm A′ as a black box to get an (ε, δ)differentially private algorithm A such that sc(Q, A, α) = sc(K ′ , A′ , α). A makes a single call to A′ , and performs additional computation of worst-case complexity O(mn), where n is the size of the database. Proof. Note that inequality (9) is implied by the statement after “moreover”. We prove this claim first. The algorithm A uses D to form a database D ′ of elements from K ′ which contains, for each e ∈ D, a copy of √1m Q({e}). This transformation clearly takes time O(mn). Then A √ simply outputs mA′ (D ′ ). Because any two neighboring databases D1 , D2 drawn from U are transformed into neighboring databases D1′ , D2′ of points from K ′ , and A′ was assumed to be ′ (ε, δ)-differentially private, we have that A is (ε, δ)-differentially private as well. Also, since D = √1 Q(D), err(Q, A, n) = err(K ′ , A, n) by definition, which implies that sc(Q, A, α) = sc(K ′ , A′ , α). m The second inequality (10) is more challenging. We will show that for any (ε, δ)-differentially private algorithm A there exists an (2ε, 2δ)-differentially private algorithm A′ such that: err(K ′ , A′ , n) ≤ 2 err(Q, A, n) + 2 diam(K ′ ) √ . n A simple calculation then shows that this implies the desired inequality. In constructing A′ we will run A on a database formed by sampling from the vertices of K ′ (which correspond to universe elements) so that the true query answers are preserved in expectation. The analysis uses symmetrization. Let A′ be given the input D ′ = {x1 , . . . , xn }, which is a multiset of points from K ′ . A′ will randomly construct two databases D+ and D− (i.e. multisets of elements from U ), and output √1 (A(D+ ) − A(D− )). m Next we describe how D+ and D− are sampled. Observe that, for each i, xi is a convex combination of vertices of K ′ . Therefore, by Caratheodory’s theorem, there exist universe elements 1 Pk i √ ei,1 , . . . , ei,ki ∈ U , where ki ≤ m + 1, such that xi = m j=1 αi,j Q(ei,j ) for some αi,1 , . . . , αi,ki ∈ P i [−1, 1] satisfying kj=1 |αi | = 1. We would like to fix a unique way to pick the ei,j and αi,j for each xi , and indeed for any point in K ′ . To this end, fix an arbitrary order on U , and for each xi choose a minimal sequence ei,1 , . . . , ei,ki that satisfies the conditions above and which comes earliest in the lexicographic order induced by the order on U . Once we have chosen the ei,j and αi,j , we construct D+ and D− using the following sampling procedure: for each i ∈ [n], we independently sample ji from [ki ], s.t. P[ji = j] = |αi,j |; we add ei,ji to D+ if αi,ji ≥ 0, and to D− otherwise. Then, as mentioned above, A′ outputs √1m (A(D+ ) − A(D− )). First, we show that A′ is (2ε, 2δ)-differentially private. Let D1′ = {x1 , . . . , xn } and D2′ = {x1 , . . . , xn , xn+1 } be two neighboring databases and let {ei,j } and {αi,j } be defined as above, (1) (1) where 1 ≤ i ≤ n + 1 and for each i, 1 ≤ j ≤ ki . Let D+ , D− be the random databases sampled by (2) (2) A′ on input D1′ , and let D+ , D− be the random databases sampled on input D2′ . Let us couple (1) (2) (2) (1) D+ and D+ so that they have symmetric difference at most 1 and D+ is a superset of D+ . We 18 (1) can achieve this by sampling ji ∈ [ki ] as described above for 1 ≤ i ≤ n and adding ei,ji to both D+ (2) and D+ if αi,ji ≥ 0 (or to neither otherwise) and sampling jn+1 ∈ [kn+1 ] and adding en+1,jn+1 to (2) (1) (2) D+ if αn+1,jn+1 ≥ 0. Because, with this coupling, D+ and D+ are always neighboring, by the (ε, δ)-differential privacy guarantee for A we have that, for any measurable S in the range of A: (2) (1) P[A(D+ ) ∈ S] ≤ eε P[A(D+ ) ∈ S] + δ, (2) (1) P[A(D+ ) ∈ S] ≥ e−ε P[A(D+ ) ∈ S] − δ, (2) (1) where the probabilities are taken over the random choices of D+ and D+ , and over the randomness (2) (1) of A. An analogous argument holds for D− and D− . Therefore, each of the two calls of A made by A′ , composed with the sampling procedure that produces the input to A, is (ε, δ)-differentially private with respect to the input to A′ . The privacy claim follows by composition (Lemma 4). Finally we analyze the error of A′ . By Minkowski’s inequality, we have:   2 1/2 2 1/2 1 1 ′ (EkA′ (D ′ ) − D k22 )1/2 ≤ E A(D+ ) − √ Q(D+ ) + E A(D− ) − √ Q(D− ) 2 2 m m   1/2 2 1 ′ + E √ (Q(D+ ) − Q(D− )) − D m 2   1 ′ 2 1/2 . ≤ 2 err(Q, A, n) + E √ (Q(D+ ) − Q(D− )) − D m 2 We proceed to bound the second term on the right hand side. Observe that, by the way we sample ′ D+ and D− , linearity of expectation, and the linearity of Q(·), D = E √1m (Q(D+ ) − Q(D− )). Let, for each i ∈ [n], ji ∈ [ki ] be sampled as above, and let yi = √1m sign(αi,j )Q(ei,ji ). Then Pn ′ 1 Pn √1 (Q(D+ ) − Q(D− )) = 1 i=1 yi , so E n i=1 yi = D . The vectors y1 , . . . , yn are independent n m and all belong to K ′ ⊆ R · B2m , where R = diam(K ′ ). Let ξ1 , . . . , ξn be Rademacher random variables, independent from everything else; by Lemma 1 and the parallelogram identity: 1 ′ E √ (Q(D+ ) − Q(D− )) − D m 2 2 n n 1X 1X =E yi − E yi n n ≤ 4 E n2 i=1 n X i=1 i=1 ξi y i 2 2 = 4 n2 2 2 n X i=1 kyi k22 ≤ 4R2 . n With this, we have established the desired bound on err(K ′ , A′ , n), and, therefore, the lemma. We will also use a simple lemma that relates the sample complexity at an error level α to the sample complexity at a lower error level α′ < α. The proof is a padding argument and can be found in [SU15]. Lemma 11. For any workload Q, any 0 < α′ < α < 1, and any privacy parameters ε, δ, we have  α  · scε,δ (Q, α), scε,δ (Q, α′ ) = Ω Cα′ for an absolute constant C. We are now ready to finish the proof of our main result for query release. 19 Proof of Theorem 1. The upper bounds on sample complexity follow from the upper bounds in Theorem 2 together with Lemma 10. ℓ∗ (K) ℓ∗ (K ′ ) = Cm(log be the smallest error parameter Denote K ′ = √1m K, and let α0 = C √m(log 2m)2 2m)2 for which Theorem 12 holds. Then, by Theorem 12 and Lemma 10:     σ(ε, δ)ℓ∗ (K) diam(K) √ √ = Ω max scε,δ (Q, α0 ), . m(log 2m)2 α0 mα20 √ It is easy to show that scε,δ (Q, α0 ) = Ω(diam(K)/(α0 m)) for all sufficiently small ε and δ. Therefore, we have:   σ(ε, δ)ℓ∗ (K) . scε,δ (Q, α0 ) = Ω √ m(log 2m)2 By Lemma 11, we get that for any α ≤ α0 the sample complexity is at least:     σ(ε, δ)ℓ∗ (K)α0 σ(ε, δ)ℓ∗ (K)2 scε,δ (Q, α) = Ω √ . = Ω m(log 2m)2 α m3/2 (log 2m)4 α An analogous proof, with α0 = 1/C set to the smallest error parameter for which Theorem 7 holds, establishes the statement after “moreover”. References [AAGM15] Shiri Artstein-Avidan, Apostolos Giannopoulos, and Vitali D. Milman. Asymptotic geometric analysis. Part I, volume 202 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2015. [BDKT12] Aditya Bhaskara, Daniel Dadush, Ravishankar Krishnaswamy, and Kunal Talwar. Unconditional differentially private mechanisms for linear queries. In Proceedings of the 44th symposium on Theory of Computing, STOC ’12, pages 1269–1284, New York, NY, USA, 2012. ACM. [BUV14] Mark Bun, Jonathan Ullman, and Salil Vadhan. Fingerprinting codes and the price of approximate differential privacy. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing, pages 1–10. ACM, 2014. [DMNS06] Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference, pages 265–284. Springer, 2006. [DN03] Irit Dinur and Kobbi Nissim. Revealing information while preserving privacy. In Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 202–210. ACM, 2003. [DN04] Cynthia Dwork and Kobbi Nissim. Privacy-preserving datamining on vertically partitioned databases. In Annual International Cryptology Conference, pages 528–544. Springer, 2004. [DNT14] Cynthia Dwork, Aleksandar Nikolov, and Kunal Talwar. Using convex relaxations for efficiently and privately releasing marginals. In 30th Annual Symposium on Computational Geometry, SOCG’14, Kyoto, Japan, June 08 - 11, 2014, page 261. ACM, 2014. 20 [FTJ79] T. Figiel and Nicole Tomczak-Jaegermann. Projections onto Hilbertian subspaces of Banach spaces. Israel J. Math., 33(2):155–171, 1979. [HT10] Moritz Hardt and Kunal Talwar. On the geometry of differential privacy. In Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC ’10, pages 705–714, New York, NY, USA, 2010. ACM. [Kea98] Michael Kearns. Efficient noise-tolerant learning from statistical queries. J. ACM, 45(6):983–1006, 1998. [Mat02] Jiřı́ Matoušek. Lectures on discrete geometry, volume 212 of Graduate Texts in Mathematics. Springer-Verlag, New York, 2002. [Mil71] V. D. Milman. A new proof of A. Dvoretzky’s theorem on cross-sections of convex bodies. Funkcional. Anal. i Priložen., 5(4):28–37, 1971. [MP87] V. D. Milman and G. Pisier. Gaussian processes and mixed volumes. Ann. Probab., 15(1):292–304, 1987. [Nik15] Aleksandar Nikolov. An improved private mechanism for small databases. In Automata, Languages, and Programming - 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I, volume 9134 of Lecture Notes in Computer Science, pages 1010–1021. Springer, 2015. [NTZ13] Aleksandar Nikolov, Kunal Talwar, and Li Zhang. The geometry of differential privacy: the sparse and approximate cases. In Symposium on Theory of Computing Conference, STOC’13, Palo Alto, CA, USA, June 1-4, 2013, pages 351–360. ACM, 2013. [Pin85] Allan Pinkus. n-widths in approximation theory, volume 7 of Ergebnisse der Mathematik und ihrer Grenzgebiete (3) [Results in Mathematics and Related Areas (3)]. SpringerVerlag, Berlin, 1985. [Pis80] G. Pisier. Sur les espaces de Banach K-convexes. In Seminar on Functional Analysis, 1979–1980 (French), pages Exp. No. 11, 15. École Polytech., Palaiseau, 1980. [Pis89] Gilles Pisier. The volume of convex bodies and Banach space geometry, volume 94 of Cambridge Tracts in Mathematics. Cambridge University Press, Cambridge, 1989. [PTJ86] Alain Pajor and Nicole Tomczak-Jaegermann. Subspaces of small codimension of finitedimensional Banach spaces. Proc. Amer. Math. Soc., 97(4):637–642, 1986. [SU15] Thomas Steinke and Jonathan Ullman. Between pure and approximate differential privacy. CoRR, abs/1501.06095, 2015. [Ver09] R. Vershynin. Lectures in geometric functional analysis. personal.umich.edu/ romanv/papers/GFA-book/GFA-book.pdf, 2009. 21 http://www-
8cs.DS
arXiv:1404.3790v1 [math.AC] 15 Apr 2014 n-COHERENCE AND (n, d)-PROPERTIES IN AMALGAMATED ALGEBRA ALONG AN IDEAL KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU Abstract. Let f : A → B be a ring homomorphism and let J be an ideal of B. The purpose of this article is to examine the transfer of the properties of n-coherence and strong n-coherence from a ring A to his amalgamated algebra A ⊲⊳f J. Also, we investigate the (n, d)-property of the amalgamated algebra A ⊲⊳f J, to resolve Costa’s first conjecture. 1. Introduction Throughout this paper, all rings are commutative with identity element, and all modules are unitary. Let A and B be two rings, let J be an ideal of B and let f : A → B be a ring homomorphism. In this setting, we can consider the following subring of A × B: A ⊲⊳f J = {(a, f (a) + j)a ∈ A, j ∈ J} called the amalgamation of A with B along J with respect to f (introduced and studied by D’Anna, Finocchiaro, and Fontana in [9, 10]). This construction is a generalization of the amalgamated duplication of a ring along an ideal (introduced and studied by D’Anna and Fontana in [11, 12, 13] and denoted by A ⊲⊳ I). Moreover, other classical constructions (such as the A + XB[X], A + XB[[X]], and the D + M constructions) can be studied as particular cases of the amalgamation [9, Examples 2.5 & 2.6] and other classical constructions, such as the Nagata’s idealization and the CPI extensions (in the sense of Boisen and Sheldon [4]) are strictly related to it (see [9, Example 2.7 & Remark 2.8]). Let R be a commutative ring. For a nonnegative integer n, an R-module E is called n-presented if there is an exact sequence of R-modules: Fn → Fn−1 → . . . F1 → F0 → E → 0 where each Fi is a finitely generated free R-module. In particular, 0presented and 1-presented R-modules are, respectively, finitely generated and finitely presented R-modules. 2000 Mathematics Subject Classification. 13D05, 13D02. Key words and phrases. Amalgamated algebra, amalgamated duplication, strong ncoherent ring, n-coherent ring, (n, d)-ring, n-finitely presented module. 1 2 KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU The ring R is n-coherent if each (n−1)-presented ideal of R is n-presented, and R is strong n-coherent ring if each n-presented R-module is (n + 1)presented [14, 15] (This terminology is not the same as that of Costa (1994) [7], where Costa’s n-coherence is our strong n-coherence). In particular, 1-coherence coincides with coherence, and one may view 0-coherence as Noetherianity. Any strong n-coherent ring is n-coherent, and the converse holds for n = 1 or for coherent rings [15, Proposition 3.3]. In 1994, Costa [7] introduced a doubly filtered set of classes of rings in order to categorize the structure of non-Noetherian rings: for non-negative integers n and d, we say that a ring R is an (n, d)-ring if pdR (E) ≤ d for each n-presented R-module E (as usual, pdR (E) denotes the projective dimension of E as an R-module). An integral domain with this property will be called an (n, d)-domain. For example, the (n, 0)-domains are the fields, the (0, 1)-domains are the Dedekind domains, and the (1, 1))-domains are the Prüfer domains [7]. Every (n, d)-ring is strong (sup{n, d})-coherent and every (n, d)-domain is strong (sup{n, d − 1})-coherent [7, Theorem 2.2]. We call a commutative ring an n-Von Neumann regular ring if it is an (n, 0)-ring. Thus, the 1-Von Neumann regular rings are the Von Neumann regular rings [7, Theorem 1.3]. In [7], Costa asks whether there is an (n, d)-ring which is neither an (n, d − 1)-ring nor an (n − 1, d)-ring for each integers n, d ≥ 0. The answer is affirmative for (0, d)-ring and (1, d)-ring for each integer d ≥ 0 ([7]). Again in [7], Costa gives examples of (2, 1)-domains which are neither (2, 0)-domains (fields) nor (1, 1)-domains (Prüfer), and in [8], Costa and Kabbaj give examples of (2, 2)-domains which are neither (2, 1)-domains nor (1, 2)-domains. Later, in [21, 23], the author gives a class of (2, d)domains which are neither (2, d − 1)-domains nor (1, d)-domains for each integer d ≥ 1, and a class of (2, d)-rings (not domains) which are neither (2, d − 1)-rings (for d ≥ 1) nor (1, d)-rings for each integer d ≥ 0. Next, in [19], the authors construct a class of (3, d)-rings which are neither (3, d − 1)rings (for d ≥ 1) nor (2, d)-rings for each integer d ≥ 0. Finally, in [22], the author gives a sufficient condition to resolve Costa’s first conjecture for each positive integer n and d with n ≥ 4. The second main goal of this paper is the constructions of the second class of (3, d)-rings for each integer d ≥ 0, and (2, d)-rings for d ≤ 2, after the first class of cost’s conjecture given by the authors in [19, 21, 23]. Let A be a ring, E be an A-module, and R := A ∝ E be the set of pairs (a, e) with pairwise addition and multiplication given by (a, e)(b, f ) = (ab, af + be). R is called the trivial ring extension of A by E (also called the idealization of E over A). Considerable work, part of it summarized in Glaz [17] and Huckaba [18], has been concerned with trivial ring extensions. These have proven to be useful in solving many open problems and conjectures for various contexts in (commutative and noncommutative) ring theory. See for instance [2, 3, 17, 18, 19, 20, 24]. N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA 3 The first section of this work examines the transfer of the properties of n-coherence and strong n-coherence to the amalgamated algebra A ⊲⊳f J. Thereby, new examples are provided which, particularly, enriches the current literature with new classes of n-coherent rings (n ≥ 2) that are non-coherent rings. 2. Transfer of the properties of (strong) n-coherence (n ≥ 1) The first main result of this section (Theorem 2.2) examines the transfer of the properties of strong n-coherence and n-coherence (n ≥ 1) to the amalgamation algebra along an ideal A ⊲⊳f J issued from local rings. First, it is worthwhile recalling that the function f n : An → B n defined by fn Jn n i=n f n ∼ n f ((αi )i=n i=1 ) = (f (αi ))i=1 is a ring homomorphism, (A ⊲⊳ J) = A ⊲⊳ and f n (αa) = f (α)f n (a) for all α ∈ A and a ∈ An (see [1]). Next, before we announce the main result of this section (Theorem 2.2), we make the following useful remark. Remark 2.1. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J 2 = 0. Then A ⊲⊳f J is a local ring and M ⊲⊳f J is its maximal ideal. Indeed, by [10, Proposition 2.6 (5)], M ax(A ⊲⊳f J) = {m ⊲⊳f Jm ∈ M ax(A)}∪{Q} with Q ∈ M ax(B) not containing V (J) and Q := {(a, f (a)+ j)a ∈ A, j ∈ J, f (a) + j ∈ Q}. Since J 2 = 0, then J ⊆ Rad(B), and then J ⊆ Q for all Q ∈ M ax(B). So, M ax(A ⊲⊳f J) = {m ⊲⊳f Jm ∈ M ax(A)} = M ⊲⊳f J since (A, M ) is a local ring. Therefore (A ⊲⊳f J, M ⊲⊳f J) is a local ring, as desired.  Theorem 2.2. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J is a finitely generated ideal of (f (A) + J), J 2 = 0 and f (M )J = 0. Then: (1) A ⊲⊳f J is strong n-coherent ring if and only if so is A. (2) A ⊲⊳f J is n-coherent ring if and only if so is A. The proof of Theorem 2.2 draws on the following results. 4 KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU Lemma 2.3. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J 2 = 0 and f (M )J = 0. p Let p, n ∈ N, and let U be a sub-module of M p . Then U ⊲⊳f J p is a nfinitely presented (A ⊲⊳f J)-module if and only if U is a n-finitely presented A-module, and J is a finitely generated ideal of f (A) + J. Proof. Proceed by induction on n. The property is true for n = Indeed, P0. p i=r f by [1, Lemma 2.4], it remains to show that if U ⊲⊳f J p := i=1 (A ⊲⊳ J)(ui , f p (ui ) + ki ) is a finitely generated ideal of A ⊲⊳f J, where, ui ∈ U and ki ∈ J p for all 1P ≤ i ≤ r, then J is a finitely generated ideal i=r p p of (f (A) + J). Clearly, i=1 (f (A) + J)ki ⊆ J . Let k ∈ J . Then, Pi=r (0, k) = i=1 (αi , f (αi ) + ji )(ui , f p (ui ) + ki ) for some αi ∈ A and ji ∈ J. So Pi=r Pi=r P αi ui = 0, and k = i=1 (f (αi )+ji )(f p (ui )+ki ) = i=r (αi )+ji )ki ∈ i=1 (fP Pi=1 i=r i=r p (U )J ⊆ f p (M p )J = 0). Thus J p ⊆ (f (A)+ J)k (since f i i=1 i=1 (f (A)+ P i=r p J)ki . Therefore, J = i=1 (f (A) + J)ki , and then J is a finitely generated ideal of f (A) + J. Assume that the property is true for n, and assume that P p f p U ⊲⊳f J p = i=r i=1 A ⊲⊳ J(ui , f (ui ) + ki ) is a (n + 1)-finitely presented f (A ⊲⊳ J)-module, where ui ∈ U and ki ∈ J p for all i ∈ {1, .....r}. Clearly, Pi=r U = assume that {(ui , f p (ui ) + ki )i=r i=1 } is a minimal i=1 Aui . We may p p f generating set of U ⊲⊳ J . Consider the exact sequence of A-modules: 0 → Kerv → Ar → U → 0 (1) Pi=r i=r where v((αi )i=1 ) = i=1 αi ui . On the other hand consider the exact sequence of (A ⊲⊳f J)-modules: p (2) 0 → Keru → (A ⊲⊳f J)r → U ⊲⊳f J p → 0 where i=r X i=r (αi , f (αi ) + ji )(ui , f p (ui ) + ki ) u((αi , f (αi ) + ji )i=1 ) = i=1 i=r X = ( αi ui , i=r X i=1 i=1 f (αi )(f p (ui ) + ki )). P Pi=r p Then Keru = ∈ (A J)r  i=r i=1 αi ui = 0, i=1 f (αi )(f (ui )+ ki ) = 0}. Pi=r r i=r i=r r fr J r So, Keru = {((αi )i=r i=1 , f ((αi )i=1 ) + (ji )i=1 ) ∈ A ⊲⊳ i=1 αi ui = Pi=r 0, i=1 f (αi )ki = 0}. Since A ⊲⊳f J is a local ring by Remark 2.1 and p {(ui , f p (ui ) + ki )i=r } is a minimal generating set of U ⊲⊳f J p , then Keru ⊆ i=1 r r i=r i=r r f r J r (α )i=r ∈ M r ⊲⊳f J r . So, Keru = {((αi )i=r i i=1 i=1 , f r ((αi )i=1 )+(ji )i=1 ) ∈ A ⊲⊳ Kerv}. Therefore Keru = Kerv ⊲⊳f J r . p Since U ⊲⊳f J p is a (n + 1)-finitely presented (A ⊲⊳f J)-module, then Keru is a n-finitely presented (A ⊲⊳f J)-module (by a sequence (2)). So, Kerv is a n-finitely presented A-module and J is a finitely generated ideal of (f (A) + J) by induction (since Kerv ⊆ M r ). Thus, U is a (n + 1)-finitely presented A-module (by a sequence (1)). Conversely, assume that U is a {(αi , f (αi )+ji )i=r i=1 ⊲⊳f N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA 5 (n + 1)-finitely presented A-module and J is a finitely generated ideal of p (f (A) + J), then U ⊲⊳f J p is a finitely generated (A ⊲⊳f J)-module by inP p f p k ), where ui ∈ U duction, and then U ⊲⊳f J p = i=r i=1 A ⊲⊳ J(ui , f (ui ) + Pi p and ki ∈ J for all i ∈ {1, .....r}. It is obvious that U = i=r i=1 Aui . Since U is a (n + 1)-finitely presented A-module, then Kerv is a n-finitely presented r A-module (by a sequence (1)). So, Keru(= Kerv ⊲⊳f J r ) is a n-finitely p generated (A ⊲⊳f J)-module by induction, and then U ⊲⊳f J p is a (n + 1)finitely presented (A ⊲⊳f J)-module (by a sequence (2)), as desired.  Lemma 2.4. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J 2 = 0 and f (M )J = 0. P f p p p Let p, n ∈ N∗ , W := i=r i=1 (A ⊲⊳ J)(ui , f (ui )+ki ) where, ui ∈ M , ki ∈ J , Pi=r f and let U = i=1 Aui . Then W is a n-finitely presented (A ⊲⊳ J)-module if and only if U is a n-finitely presented A-module and J is a finitely generated ideal of f (A) + J. P Pi=r f p Proof. Let W := i=r i=1 (A ⊲⊳ J)(ui , f (ui ) + ki ) and U = i=1 Aui . We may assume that {(ui , f p (ui ) + ki )i=r } is a minimal generating set of W . i=1 Consider the exact sequence of A-modules: 0 → Kerv → Ar → U → 0 (1) Pi=r i=r where v((αi )i=1 ) = i=1 αi ui . On the other hand consider the exact sequence of (A ⊲⊳f J)-modules: 0 → Keru → (A ⊲⊳f J)r → W → 0 (2) where i=r X i=r (αi , f (αi ) + ji )(ui , f p (ui ) + ki ) u((αi , f (αi ) + ji )i=1 ) = i=1 i=r X = ( i=1 αi ui , i=r X f (αi )(f p (ui ) + ki )) i=1 Pi=r Pi=r f p Then Keru = {(αi , f (αi )+ji )i=r i ui = 0, i=1 ∈ (A ⊲⊳ J)  i=1 α i=1 f (αi )ki = r r 0}. Since Keru ⊆ M r ⊲⊳f J r , then Keru = Kerv ⊲⊳f J r . By Lemma 2.3, Keru is a n-finitely presented (A ⊲⊳f J)-module if and only if Kerv is a n-finitely presented A-module and J is a finitely generated ideal of f (A) + J (since Kerv ⊆ M r ). So, W is a (n + 1)-finitely presented (A ⊲⊳f J)-module if and only if U is a (n + 1)-finitely presented A-module and J is a finitely generated ideal of f (A) + J, as desired.  Proof of Theorem 2.2. (1) Recall that R is a strong n-coherent ring if and only if every (n − 1)presented submodule of a finitely generated free R-module is Pn-presented. Assume that A ⊲⊳f J is strong n-coherent ring and let U := i=r i=1 Aui be a 6 KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU P f (n − 1)-finitely presented A-module, where ui ∈ M p , then W : i=r i=1 (A ⊲⊳ J)(ui , f p (ui )) is a (n − 1)-finitely presented (A ⊲⊳f J)-module by Lemma 2.4. So, W is n-finitely presented (A ⊲⊳f J)-module since A ⊲⊳f J is strong n-coherent ring. Therefore U is n-finitely presented A-module by Lemma 2.4. Thus, A is strong n-coherent ring. Conversely, assume that A is strong Pi=r n-coherent ring and let W := i=1 A ⊲⊳f J(ui , f p (ui ) + ki ) be a (n − 1)finitely presented (A ⊲⊳f J)-module, where ui ∈ M p , and ki ∈ J p . Then P U := i=r i=1 Aui is a (n − 1)-finitely presented A-module by Lemma 2.4. So, U is n-finitely presented A-module since A is strong n-coherent ring, and then W is a n-finitely presented (A ⊲⊳f J)-module by Lemma 2.4. Hence, A ⊲⊳f J is strong n-coherent ring. (2) The same reasoning as in the proof of (1) shows that A ⊲⊳f J is ncoherent ring if and only if so is A.  The following corollaries are an immediate consequence of Theorem 2.2. Corollary 2.5. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J is a finitely generated ideal of (f (A) + J), J 2 = 0 and f (M )J = 0. Then, A ⊲⊳f J is a (strong) n-coherent ring which is non-(strong) (n − 1)-coherent if and only if so is A. Corollary 2.6. Let (A, M ) be a local ring and I be a finitely generated ideal of A such that M I = 0. Then: (1) A ⊲⊳ I is a strong n-coherent ring if and only if so is A. (2) A ⊲⊳ I is a n-coherent ring if and only if so is A. In particular, Theorem 2.2 enriches the literature with new examples of 2-coherent rings which are non-coherent rings. Example 2.7. Let k be a field, K be a field containing k as a subfield such that [K : k] = ∞, T = K[[X]] = K + M , where X is an indeterminate over K and M = XT be the maximal ideal of T , A = k + M . Set B := A/M 2 , J := Bf (m) be an ideal of B, where m ∈ M such that f (m) 6= 0, and consider the canonical ring homomorphism f : A → B (f (x) = x). Then: (1) By Theorem 2.2, A ⊲⊳f J is 2-coherent ring since A is by [7, Corollary 5.2]. (2) By [17, Theorem 4.1.5], A ⊲⊳f J is non-coherent ring since A is non-coherent domain by [7, Corollary 5.2]. N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA 7 Example 2.8. Let K be a field and E be a K-vector space of infinite dimen′ sion. Let A := K ∝ E be trivial extension ring of K by E. Set I := 0 ∝ E , ′ where E is a finitely generated K-subspace of E. Then: (1) By Corollary 2.6, A ⊲⊳ I is a 2-coherent ring since A is by [21, Theorem 3.4]. (2) By [17, Theorem 4.1.5] A ⊲⊳ I is non-coherent ring since A is noncoherent ring by [20, Theorem 2.6]. 3. Transfer of the (n, d)-property For integers n, d ≥ 0, Costa asks in [7] whether there is an (n, d)-ring which is neither an (n, d − 1)-ring nor an (n − 1, d)-ring? The answer is affirmative for (0, d)-rings, (1, d)-rings, (2, d)-rings, (3, d)-rings, and (n + 4, d)-rings for all integers n, d (See for instance [7, 8, 19, 20, 21, 23, 25, 22]). The goal of This section is to give a second class of cost’s conjecture after the first given by the authors in [19, 21, 23]. At the end of this work, we will be able to give examples of (2, d)-rings which is neither a (1, d)-ring (d = 0, 1, 2) nor a (2, d − 1)-ring (d = 1, 2), and examples of (3, d)-rings which is neither a (2, d)-ring (d ≥ 0) nor a (3, d − 1)-ring ( for each integer d). The following Theorem 3.1 allows us to provide new examples of (2, 0), (2, 1), and (2, 2)-ring, to resolve cost’s conjecture. Theorem 3.1. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that f (M )J = 0 and J 2 = 0. Then: (1) (a) A ⊲⊳f J is a (2, 0)-ring provided J is a not finitely generated ideal of f (A) + J. (b) If A ⊲⊳f J is a (2, 0)-ring, then M is not a finitely generated ideal of A or J is not a finitely generated ideal of f (A) + J. (c) Assume that M is a finitely generated ideal of A. Then A ⊲⊳f J is a (2, 0)-ring if and only if J is a not finitely generated ideal of f (A) + J. (2) A ⊲⊳f J is a non-(1, 2)-ring. In particular, A ⊲⊳f J is a non-von Neumann regular ring. Proof of Theorem 3.1 (1) (a) Let K be a 2-finitely presented (A ⊲⊳f J)-module, and let {(ki )i=p i=1 } be a minimal generating set of K. We want to show that K is a projective (A ⊲⊳f J)-module. For this, consider the exact sequence of (A ⊲⊳f J)modules: 0 → Keru(= H) → (A ⊲⊳f J)p → K → 0 8 KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU Pi=p where u((αi )i=1,.....,p) = i=1 αi ki . Then H ⊂ (M ⊲⊳f J)p since {(ki )i=p i=1 } f is a minimal generating set of K, A ⊲⊳ J is a local ring with maximal ideal M ⊲⊳f J by Remark 2.1. We prove that H = 0. Otherwise, H 6= 0. Let (mi , f p (mi ) + ki ){i=1,...,r} be a minimal generating set of H, where mi ∈ M p , ki ∈ J p for each i = 1, ......., r. Consider the exact sequence of (A ⊲⊳f J)-modules 0 → Kerv → (A ⊲⊳f J)r → H → 0 P p where v((αi , f (αi ) + ji )i=1,.....,r ) = i=r i=1 (αi mi , (f (αi ) + ji )(f (mi ) + ki )) = Pi=r Pi=r ( i=1 αi mi , i=1 f (αi )(f p (mi ) + ki )). But Kerv ⊂ (M ⊲⊳f J)r . Hence P r Kerv = U ⊲⊳f J r . Where U = {(αi )i=1,...,r ∈ Ar  i=r i=1 αi mi = 0}. Since K is a 2-presented (A ⊲⊳f J)-module, then Kerv is a finitely generated (A ⊲⊳f J)-module. So, J is a finitely generated ideal of (f (A) + J) by Lemma 2.3 (since U ⊆ M r ). A contradiction since J is a not finitely generated ideal of f (A) + J by hypothesis. So H = 0. Hence, K ∼ = (A ⊲⊳f J)p is f a projective (A ⊲⊳ J)-module. (b) Let k(6= 0) ∈ J, I = (A ⊲⊳f J)(0, k), and consider the exact sequence of (A ⊲⊳f J)-modules: 0 → Keru → A ⊲⊳f J → I → 0 where u(α, f (α) + j) = (0, f (α)k). So, Keru = M ⊲⊳f J is a not finitely generated ideal of A ⊲⊳f J since A ⊲⊳f J is a (2, 0)-ring, and I is not projective ideal of A ⊲⊳f J (otherwise, I is a free ideal of A ⊲⊳f J since A ⊲⊳f J is a local ring, absurd since (0, k)I = 0). Therefore, M is a not finitely generated ideal of A or J is a not finitely generated ideal of f (A)+J by Lemma 2.3. (c) Follows immediately from (a) an (b). (2) Let I = (A ⊲⊳f J)(0, k), where k(6= 0) ∈ J, and consider the exact sequence of (A ⊲⊳f J)-modules: 0 → M ⊲⊳f J → A ⊲⊳f J → I → 0 Since A ⊲⊳f J is a local ring and M ⊲⊳f J is not a free ideal of A ⊲⊳f J (since (0, k)(M ⊲⊳f J) = 0), then M ⊲⊳f J is not a projective ideal of A ⊲⊳f J. So, f pdA⊲⊳f J ( A⊲⊳I J ) > 2 (i.e. A ⊲⊳f J is a not a (1, 2)-ring), and this completes the proof of Theorem 3.1.  The next corollary is an immediate consequence of Theorem 3.1. Corollary 3.2. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that f (M )J = 0 and J 2 = 0. Let A1 = A ⊲⊳f J, d ≤ 2 be an integer, A2 be a Noetherian ring of global dimension d, and let C = A1 × A2 the direct product of A1 and A2 . Assume that J is a not finitely generated ideal of f (A) + J. Then C is a N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA 9 (2, d)-ring which is neither a (1, d)-ring (d = 0, 1, 2) nor a (2, d − 1)-ring (d = 1, 2). Proof. Let d ≤ 2 be an integer. By [21, Theorem 2.4], C = A1 × A2 is a (2, d)-ring since Ai is a (2, d)-ring for each i = 1, 2, and C is not (1, d)-ring since A1 is not (1, d)-ring by Theorem 3.1 (2). It remains to show that C is not a (2, d − 1)-ring for 1 ≤ d ≤ 2. Assume that C is a (2, d − 1)-ring. By [21, theorem 2.4], A2 is also a (2, d − 1)-ring and then is a (0, d − 1)-ring by [7, Theorem 2.4] since A2 is a Noetherian ring. Thus, gldim(A2 ) ≤ d − 1, but this is a contradiction since gldim(A2 ) = d, as desired.  Now, we are able to give a new examples of (2, 0), (2, 1), and (2, 2)-ring, to resolve cost’s conjecture. Example 3.3. Let (R, m) be a local ring such that m is a finitely generated R Z 2Z , 4Z )), E be an m -vector ideal of R and m2 = 0 (for instance ((R, m) = ( 4Z ′ space with finite rank, and let A := R ∝ E and M := m ∝ E. Let E be ′ ′ A -vector space of infinite dimension, B := A ∝ E , J := 0 ∝ E , and a M consider the ring homomorphism f : A → B (f (a) = (a, 0)). Let K be a field, A1 = A ⊲⊳f J, and let A2 := K[X1 ] and A3 := K[X1 , X2 ] where X1 , X2 are indeterminate over K. Then, by Corollary 3.2: (1) A1 is a (2, 0) ring that is not a (1, 0)-ring. (2) A1 ×A2 is a (2, 1)-ring which is neither a (1, 1)-ring nor a (2, 0)-ring. (3) A1 ×A3 is a (2, 2)-ring which is neither a (1, 2)-ring nor a (2, 1)-ring. The aim of Theorem 3.4 is to construct a class of (3, d)-rings which are neither (3, d − 1)-rings (for each positive integer d) nor (2, d)-rings for each integer d ≥ 0. Theorem 3.4. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that f (M )J = 0 and J 2 = 0. (1) A ⊲⊳f J is a (3, 0)-ring provided M is not a finitely generated ideal of A. (2) Assume that J is a finitely generated ideal of f (A) + J and M contains a regular element. Then: (a) A ⊲⊳f J is not a (2, d)-ring for each positive integer d. (b) Let A1 = A ⊲⊳f J, d be an integer, A2 be a Noetherian ring of global dimension d, and let C = A1 × A2 the direct product of A1 and A2 . Assume that M is not finitely generated ideal of A. Then C is a (3, d)-ring which is neither a (2, d)-ring (d ≥ 0) nor a (3, d − 1)-ring (d ≥ 1). 10 KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU The proof of this theorem requires the next result. Lemma 3.5. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J is a finitely generated ideal of f (A) + J, f (M )J = 0 and J 2 = 0. Then pdA⊲⊳f J (M ⊲⊳f J) and pdA⊲⊳f J ({0} × J) are infinite. Proof. Consider the exact sequence of (A ⊲⊳f J)-modules 0 → M ⊲⊳f J → A ⊲⊳f J → A⊲⊳f J M ⊲⊳f J →0 A⊲⊳f J We claim that M ⊲⊳f J is not projective. Otherwise, the sequence splits. Hence, M ⊲⊳f J is generated by an idempotent element (m, f (m) + k) = (m, f (m)+k)(m, f (m)+k) = (m2 , f (m2 )). So M ⊲⊳f J = (A ⊲⊳f J)(m, f (m)) = Am ⊲⊳f 0, the desired contradiction (since J 6= 0). It follows from the above sequence that f A⊲⊳ J pdA⊲⊳f J (M ⊲⊳f J) + 1 = pdA⊲⊳f J ( M ) (1) ⊲⊳f J Let {(mi )i∈I } be a set of generators of M , where mi ∈ M for all i ∈ I, and let {(gi )i=p i=1 } be a minimal generating set of J. Consider the exact sequence f of (A ⊲⊳ J)-modules L 0 → Keru → (A ⊲⊳f J)I (A ⊲⊳f J)p → M ⊲⊳f J → 0 where X u((αi , f (αi ) + ji )i∈I , (βi , f (βi ) + ki )i=p (αi , f (αi ) + ji )(mi , f (mi )) i=1 ) = i∈I + i=p X (βi , f (βi ) + ki )(0, gi ) i=1 i=p X X (0, f (βi )gi ) = (αi mi , f (αi mi )) + i=1 i∈I L P Keru = U ⊲⊳ J I (M ⊲⊳f J)p . Where U = {(αi )i∈I ∈ AI  i∈I αi mi = 0} (since {(gi )i=p i=1 } be a minimal generating set of J). Therefore, we have the isomorphism of (A ⊲⊳f J)-modules (A⊲⊳f J)I L (A⊲⊳f J)p M ⊲⊳f J ∼ = I f p fI U ⊲⊳f J I (M ⊲⊳ J) It follows that A⊲⊳f J ) ≤ pdA⊲⊳f J (M ⊲⊳f J) pdA⊲⊳f J ( M ⊲⊳f J ⊲⊳f (2) Clearly, (1) and (2) force pdA⊲⊳f J (M J) to be infinite. Now the exact f sequence of (A ⊲⊳ J)-modules 0 → M ⊲⊳f J → A ⊲⊳f J → {0} × J → 0 where v(α, f (α)+j) = (α, f (α)+j)(0, k) = (0, f (α)k), easily yields pdA⊲⊳f J ({0}× J) = ∞, as desired.  N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA 11 Proof of Theorem 3.4 (1) Let K3 be a 3-finitely presented (A ⊲⊳f J)-module, and let {(ki )i=p i=1 } be a minimal generating set of K3 . We want to show that K3 is a projective (A ⊲⊳f J)-module. For this, consider the exact sequence of (A ⊲⊳f J)modules: 0 → Keru(= K2 ) → (A ⊲⊳f J)p → K3 → 0 P i=p f p where u((αi )i=1,.....,p) = i=p i=1 αi ki . Then K2 ⊂ (M ⊲⊳ J) since {(ki )i=1 } is a minimal generating set of K3 , A ⊲⊳f J is a local ring with maximal ideal M ⊲⊳f J. We prove that K2 = 0. Otherwise, K2 6= 0. Let (mi , f p (mi ) + ki ){i=1,...,r} be a minimal generating set of K2 , where mi ∈ M p , ki ∈ J p for each i = 1, ......., r. Consider the exact sequence of (A ⊲⊳f J)-modules 0 → Kerv(= K1 ) → (A ⊲⊳f J)r → K2 → 0 Pi=r where v((αi , f (αi ) + ji )i=1,.....,r ) = i=1 (αi mi , (f (αi ) + ji )(f p (mi ) + ki )) = Pi=r Pi=r p ( i=1 αi mi , i=1 f (αi )(f (mi ) + ki )). But K1 ⊂ (M ⊲⊳f J)r . Hence K1 = P r U ⊲⊳f J r . Where U = {(αi )i=1,...,r ∈ Ar  i=r i=1 αi mi = 0}. Since K3 is f a 3-presented (A ⊲⊳ J)-module, then K1 is a finitely presented (A ⊲⊳f J)module. By Lemma 2.3, U is a finitely generated A-module and J is a finitely generated ideal of f (A) + J. Let {(ui )i=s i=1 } be a set of generators of U , and let {(gi )i=s+t } be a minimal generating set of J r , where ui ∈ M r , gi ∈ J r . i=s+1 Consider the exact sequence of (A ⊲⊳f J)-modules 0 → Kerw(= K0 ) → (A ⊲⊳f J)s+t → K1 → 0 P P (αi , f (αi )+ (αi , f (αi )+ji )(ui , f r (ui ))+ i=s+t where w((αi , f (αi )+ji )i=1,.....,s+t) = i=s i=1 Pi=s Pi=s+t Pi=s Pi=s+1 i=s r r ji )(0, gi ) = i=1 (αi ui , f (αi ui ))+ i=s+1 (0, f (αi )gi )) = ( i=1 αi ui , i=1 f (αi ui )+ L Pi=s+t t s that K0 ∼ = W ⊲⊳f J s M t ⊲⊳f J t , where i=s+1 f (αi )gi ). It follows P i=s+t W = {(αi )i=1,...,s ∈ As  i=s i=1 αi ui = 0} (since {(gi )i=s+1 } is a minimal r generating set of J ). By the above sequence K0 is a finitely generated (A ⊲⊳f J)-module. So M is a finitely generated ideal of A, the desired contradiction. (2) (a) Assume that M contains a regular element m and J is a finitely generated ideal of (f (A) + J). We must show that A ⊲⊳f J is not a (2, d)ring, for each integer d > 0. Let K = (A ⊲⊳f J)(m, f (m)) and consider the exact sequence of (A ⊲⊳f J)-modules 0 → Kerv → A ⊲⊳f J → K → 0 (∗) where v(α, f (α) + j) = (α, f (α) + j)(m, f (m)) = (αm, f (αm)). Clearly Kerv = {0} × J that is a finitely generated ideal of (A ⊲⊳f J) and hence K is a finitely presented ideal of (A ⊲⊳f J) by a sequence (∗). On the other hand, pdA⊲⊳f J (Ker(v)) = pdA⊲⊳f J ({0} × J) = ∞ by Lemma 3.5. So pdA⊲⊳f J (K) = ∞. Finally, the exact sequence of (A ⊲⊳f J)-modules 0 → K → A ⊲⊳f J → A⊲⊳f J K →0 12 KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU f yields A⊲⊳K J a 2-presented (A ⊲⊳f J)-module with infinite projective dimension (i.e., A ⊲⊳f J is not a (2, d)-ring, for each d > 0). (b) The same reasoning as in the proof of Corollary 3.2 shows that C is a (3, d)-ring which is neither a (2, d)-ring (d ≥ 0) nor a (3, d − 1)-ring (d ≥ 1), and this completes the proof of Theorem 3.4.  The following Corollary is an immediate consequence of Theorem 3.4. Corollary 3.6. Let (A, M ) be a local domain such that M is not finitely generated ideal of A, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J is a finitely generated ideal of f (A) + J, f (M )J = 0 and J 2 = 0. Then: (1) A ⊲⊳f J is a (3, 0)-ring which is not a (2, 0)-ring. (2) Let A1 = A ⊲⊳f J, d be an integer, A2 be a Noetherian ring of global dimension d, and let C = A1 × A2 the direct product of A1 and A2 . The ring C is a (3, d)-ring which is neither a (2, d)-ring nor a (3, d − 1)-ring. Theorem 3.4 enriches the literature with new examples of (3, d)-rings which are neither a (2, d)-ring (d ≥ 0) nor a (3, d − 1)-ring (d ≥ 1), as shown below. Example 3.7. Let k be any field and X1 , X2 , ..., Xn , ... be indeterminate over K. Let A = K[[X1 , X2 , .., Xn , ..]] the power series ring in infinite variables over K, and Let M be its maximal ideal. Set B := A/M 2 , J := Bf (m) be an ideal of B, where m ∈ M such that f (m) 6= 0, and consider the canonical ring homomorphism f : A → B (f (x) = x). Let C = Z[X1 , X2 , ..., Xd−1 ], where d ≥ 1. Then by Corollary 3.6, (A ⊲⊳f J) × C is a (3, d)-ring which is neither a (2, d)-ring nor a (3, d − 1)-ring. Example 3.8. Let k be a field and let A = K[[X]] = K + M , where M = XA. Set B := A/M 2 , J := Bf (m) be an ideal of B, where m ∈ M such that f (m) 6= 0, and consider the canonical ring homomorphism f : A → B (f (x) = x). Then A ⊲⊳f J is not an (n, d)-ring, for any integers n, d ≥ 0. Proof. A ⊲⊳f J is Noetherian ring since A is by [9, Proposition 5.6] and by Lemma 3.5, pdA⊲⊳f J ({0} × J) = ∞, whence gldim(A ⊲⊳f J) = ∞. Then by [7, Theorem 1.3], A ⊲⊳f J is not an (n, d)-ring, for any integers n, d ≥ 0, as desired.  N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA 13 References 1. K. Alaoui and N. Mahdou, Coherence in amalgamated algebra along an ideal, Bulletin of the Iranian Mathematical Society, Accepted for publication. See: arXiv: submit/0631069 [math.AC] 12 Jan 2013. 2. C. Bakkari, S. Kabbaj and N. Mahdou, Trivial extention defined by Prüfer conditions, J. Pure. Appl. Algebra 214 (2010), 53-60. 3. S. Bazzoni and S. Glaz, Gaussian properties of total rings of quotients, J. Algebra 310 (2007), 180-193. 4. M. B. Boisen and P. B. Sheldon, CPI-extension: Over rings of integral domains with special prime spectrum, Canad. J. Math. 29 (1977), 722-737. 5. N. Bourbaki, Algèbre Commutative, chapitres 1-4, Masson: Paris, 1985. 6. W. Brewer and E. Rutter, D + M constructions with general overrings, Michigan Math. J. 23 (1976), 33–42. 7. D. Costa, Parameterizing families of non-Noetherian rings, Comm. Algebra 22 (1994), 3997–4011. 8. D. Costa and S. Kabbaj, Classes of D+M rings defined by homological conditions, Comm. Algebra (1996), 24, 8917906. 9. M. D’Anna, C. A. Finocchiaro and M. Fontana, Amalgamated algebras along an ideal, in: Commutative Algebra and Applications, Proceedings of the Fifth International Fez Conference on Commutative Algebra and Applications, Fez, Morocco, 2008, W. de Gruyter Publisher, Berlin (2009), 155–172. 10. M. D’Anna, C. A. Finocchiaro and M. Fontana, Properties of chains of prime ideals in amalgamated algebras along an ideal, J. Pure Applied Algebra 214 (2010), 16331641. 11. M. D’Anna, A construction of Gorenstein rings, J. Algebra 306 (2) (2006), 507-519. 12. M. D’Anna and M. Fontana, Amalgamated duplication of a ring along a multiplicative-canonical ideal, Ark. Mat. 45 (2) (2007), 241-252. 13. M. D’Anna and M. Fontana, An amalgamated duplication of a ring along an ideal: the basic properties, J. Algebra Appl. 6 (3) (2007), 443-459. 14. D. E. Dobbs, S. Kabbaj and N. Mahdou, n-coherent rings and modules, Lecture Notes in Pure and Appl. Math., Dekker, 185 (1997), 269–281. 15. D. E. Dobbs, S. Kabbaj, N. Mahdou and M. Sobrani, When is D + M n-coherent and an (n, d)-domain?, Lecture Notes in Pure and Appl. Math., Dekker, 205 (1999), 257–270. 16. D. E. Dobbs and I. Papick, When is D + M coherent?, Proc. Amer. Math. Soc. 56 (1976), 51–54. 17. S. Glaz, Commutative coherent rings, Lecture Notes in Mathematics, 1371, SpringerVerlag, Berlin, 1989. 18. J. A. Huckaba, Commutative rings with zero divisors, Marcel Dekker, New YorkBasel, 1988. 19. S. Kabbaj and N. Mahdou, Trivial extensions of local rings and a conjecture of Costa, Lecture Notes in Pure and Appl. Math., Dekker, 231 (2003), 301–311. 20. S. Kabbaj and N. Mahdou, Trivial extensions defined by coherent-like conditions, Comm. Algebra 32 (10) (2004), 3937–3953. 21. N. Mahdou, On Costa’s conjecture, Comm. Algebra 29 (2001), 2775–2785. 22. N. Mahdou, Sufficient Condition to Resolve Costa’s First Conjecture,....... 23. N. Mahdou, On 2-Von Neumann regular rings, Comm. Algebra 33 (10) (2005): 34893496. 24. I. Palmér and J. Roos, Explicit formulae for the global homological dimensionsof trivial extensions of rings, J. Algebra 27 (1973), 380-413. 25. D. Zhou, On n-coherent rings and (n, d)-rings. Comm. Algebra 32 (2004), 2425-2441. 14 KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU Karima Alaoui Ismaili, Department of Mathematics, Faculty of Science and Technology of Fez, Box 2202, University S.M. Ben Abdellah Fez, Morocco. E − mail address : [email protected] r Najib Mahdou, Department of Mathematics, Faculty of Science and Technology of Fez, Box 2202, University S.M. Ben Abdellah Fez, Morocco. E − mail address : [email protected]
0math.AC
1 Real-Time Residential-Side Joint Energy Storage Management and Load Scheduling with Renewable Integration arXiv:1511.08585v2 [cs.SY] 13 Apr 2016 Tianyi Li, Student Member, IEEE, and Min Dong, Senior Member, IEEE Abstract—We consider joint energy storage management and load scheduling at a residential site with integrated renewable generation. Assuming unknown arbitrary dynamics of renewable source, loads, and electricity price, we aim at optimizing the load scheduling and energy storage control simultaneously in order to minimize the overall system cost within a finite time period. Besides incorporating battery operational constraints and costs, we model each individual load task by its requested power intensity and service durations, as well as the maximum and average delay requirements. To tackle this finite time horizon stochastic problem, we propose a real-time scheduling and storage control solution by applying a sequence of modification and transformation to employ Lyapunov optimization that otherwise is not directly applicable. With our proposed algorithm, we show that the joint load scheduling and energy storage control can in fact be separated and sequentially determined. Furthermore, both scheduling and energy control decisions have closed-form solutions for simple implementation. Through analysis, we show that our proposed real-time algorithm has a bounded performance guarantee from the optimal T -slot look-ahead solution and is asymptotically equivalent to it as the battery capacity and time period goes to infinity. The effectiveness of joint load scheduling and energy storage control by our proposed algorithm is demonstrated through simulation as compared with alternative algorithms. Index Terms—Load scheduling, energy storage, renewable generation, real-time algorithm, stochastic optimization, finite time horizon I. I NTRODUCTION The rising global demand of energy has resulted in high prices for electricity and also caused the growing environmental concern due to excess carbon emission from power generation. Integrating renewable energy sources into the grid system has become a vital green energy solution to reduce the energy cost and build a sustainable society and economy. Although promising, renewable energy is often intermittent and difficult to predict, making it less reliable for both gridlevel operation and as a local energy source for consumers. Energy storage and flexible loads are considered as two promising management solutions to mitigate the randomness of renewable generation, as well as to reduce electricity cost [2], [3]. In particular, energy storage can be exploited to shift energy across time, while flexible loads can be controlled to This work was supported by the National Sciences and Engineering Research Council (NSERC) of Canada under Discovery Grant RGPIN-201405181. A preliminary version of this work [1] was presented at the 41st IEEE International Conference on Acoustic Speech and Signal Processing (ICASSP), Shanghai, China, March 2016. The authors are with Department of Electrical, Computer, and Software Engineering, University of Ontario Institute of Technology, Oshawa, Ontario, Canada L1H 7K4 (email: [email protected], [email protected]). shift demand across time. For grid operators, they can be utilized to counter the fluctuation in renewable generation and to increase reliability. For consumers, energy storage and load scheduling can provide effective means for energy management to reduce electricity cost. As renewable penetration into the power supply increases, the renewable generation with storage solutions at residential homes (such as roof-top solar panels) will become increasingly popular. Thus, developing a cost effective energy storage management system to maximally harness energy from renewable sources is of critical importance. At the same time, many smart appliances have been developed, creating more controllable loads at the consumer side. They can be controlled to benefit from the dynamic price set at the utility, and help shift the energy demand from high-peak to low-peak periods to reduce energy bills. Providing effective management solution that combines both energy storage and load scheduling will be the most promising future solution for consumers to reduce energy costs and is the goal of this paper. Developing an effective joint energy storage management and load scheduling solution is important, but faces unique challenges. For energy storage, the cost reduction by storage comes with an additional cost from battery degradation due to charging and discharging; finite battery capacity makes the storage control decisions coupled over time which are difficult to optimize. For load scheduling, while minimizing the electricity cost, it needs to ensure the delay requirements for each load and for the overall service are met. In particular, load scheduling decision affects the energy usage and storage and vise versa. Thus, storage control and load scheduling decisions are coupled with each other and over time, making it especially challenging for a joint design. Energy storage management alone has been considered for power balancing to counter the fluctuation of renewable generation and increase grid reliability [4]–[6], and for consumers to reduce electricity costs [7]–[14]. Off-line storage control strategies for dynamic systems have been proposed [4], [7], [8]. In these works, renewable energy arrivals are assumed known ahead of time and the knowledge of load statistics is assumed. For real-time storage management design, [9] has formulated the storage management control as a Markov Decision Process (MDP) and solved it by Dynamic Programming (DP). Lyapunov optimization technique [15] has been recently employed for designing real-time storage control at either grid operator side or consumer side under different system models and optimization goals [5], [6], [10]–[14]. Among these works, [11], [12] have considered renewable generation without modeling the battery operational cost. Both renewable 2 generation and battery operation cost have been modeled in [5], [6], [13], [14]. Except for [14], which considers the storage management design within a finite time period, all the above works consider the long-term average system cost. Load (demand) scheduling through demand side management has been studied by many for shaping the aggregate load at utility through direct load control [16]–[18] or pricing optimization [19], [20], and at consumer through load scheduling to reduce electricity bill in response to the dynamic price [21]–[26]. With the electricity price known ahead of time, linear programming [21], [22] and DP [23] techniques are applied for load scheduling. Without assuming known future prices, MDP formulation has been considered in [24], [25], and opportunistic load scheduling based on optimal stopping rule has been proposed in [26]. Combining both utility side and demand side management is also considered in [27], [28], where game theoretic approach is applied for distributed energy management. Few existing works consider joint optimization of energy storage management and load scheduling. A joint design has been developed in [29], in which the electricity price is assumed to be known ahead of time and the storage model is simplified without the battery operational cost. Real-time energy storage management with flexible loads has been considered in [30] and [31]. While [30] focuses on local demand side, [31] combines both grid operator and demand side management using distributed storage. In these works, flexible loads are only modeled in terms of the aggregated energy request; There is no individual task modeling or scheduling being conducted. Furthermore, in these works, renewable generation, loads, and electricity price are assumed to be independent and identically distributed. With the increasing penetration of renewable generation and energy storage in the grid, future energy demand and supply are expected to be quite dynamic. Renewable generation, loads, and electricity price may all fluctuate randomly1 with their statistics likely being non-stationary, making them difficult to predict accurately. However, most of existing works design solutions assuming either the future values or statistical knowledge of them to be known. In addition, although long-term time averaged cost is typically considered in these existing works, the consumers may prefer a cost saving solution in a period of time defined by their own needs. It is important to provide a solution to meet such need. We aim at proposing a real-time algorithm for joint energy storage and load scheduling to address these issues. In this paper, we consider joint energy storage management and load scheduling at a residential site equipped with a renewable generator and a storage battery. For renewable source, loads, and electricity price, we assume their dynamics to be arbitrary which can be non-stationary and their statistics are unknown. For the residential load, we characterize each individual load task with its own requested power intensity and service duration, and consider both per load maximum delay and average delay requirements. For battery storage, we 1 Energy pricing design is considered to respond to the energy demand and supply status and to shape the load for demand management. As a result, the real-time price in the future grid could fluctuate much more randomly and quickly, and likely to have complicated statistical behaviors. actively model the battery operational constraints and cost due to charging and discharging activities. We aim at designing a real-time solution for joint energy storage management and load scheduling to minimize the overall system cost over a finite time period, subject to battery operation and load delay constraints. The interaction of load scheduling and energy storage, the finite battery capacity, and finite time period for optimization complicate the scheduling and energy control decision making over time. To tackle this difficult stochastic problem, we develop techniques through a sequence of problem modification and transformation which enable us to employ Lyapunov optimization to design a realtime algorithm that otherwise is not directly applicable. Interestingly, we show that the joint load scheduling and energy storage control can be separated and sequentially determined in our real-time optimization algorithm. Furthermore, both load scheduling and energy control decisions have closed-form solutions, making the real-time algorithm simple to implement. We further show that our proposed real-time algorithm not only provides a bounded performance guarantee to the optimal T -slot look-ahead solution which has full future information available, but is also asymptotically equivalent to it as the battery capacity and the considered time period for design go to infinity. Simulation results demonstrate the effectiveness of joint load scheduling and energy storage control by our proposed algorithm as compared with alternative solutions considering neither storage nor scheduling, or storage only. Different from our recent work [14], in which the energy storage problem without flexible loads has been considered, in this work, we explore both energy storage and flexible load scheduling to reduce system cost. Given the individual load modeling, load delay requirements imposed, and the load interaction with energy usage over time, it is highly non-trivial to formulate the joint design problem, develop techniques for a real-time solution, and provide performance analysis. Through our developed techniques, we show that the joint optimization of load scheduling and storage control can in fact be separated and sequentially solved. Thus, we are able to obtain the load scheduling solution in closed-form and apply the result in [14] for the storage control. Furthermore, we demonstrate that a lower system cost can be achieved with joint load scheduling and energy storage control than with just energy storage alone. Comparing with existing works, our proposed algorithm has the following features and advantages: 1) The battery storage operation and associated cost, as well as individual load and its quality of service, are thoroughly modeled; 2) The algorithm provides a real-time joint solution for both energy storage control and load task scheduling; 3) The solution only relies on the current price, renewable generation, or loads, and does not require any statistical knowledge of them; 4) The solution is designed for a specified period of time which may be useful for practical needs; 5) The solution is provided in closed-form requiring minimum complexity for practical implementation. The rest of this paper is organized as follows. In Section II, we describe the system model. In Section III, we formulate the joint energy management and load scheduling problem. In Section IV, we propose a real-time algorithm for our joint optimization problem. In Section V, we analyze the performance of algorithm. After presenting our simulation 3 TABLE I L IST OF MAIN SYMBOLS Et − Qt Pt Grid Et − Qt Battery Dt + Loads Wt user’s load arriving at time slot t (kWh) ρt load intensity (kWh) λt load duration (number of slots) dt delay incurred for Wt before it is served (number of slots) dmax t maximum delay allowed for Wt before it is served (number of slots) dw average delay of all arrived loads within the To -slot period (number of slots) dmax maximum average delay (number of slots) for the loads within the To -slot period Cd (·) cost function associated with the average delay dw Et energy purchased from conventional grid at time slot t (kWh) Emax maximum amount of energy that can be bought from the grid per slot (kWh) Pt unit price of buying energy at time slot t ($/kWh) Pmax maximum unit energy price ($/kWh) Pmin minimum unit energy price ($/kWh) St renewable energy harvested at time slot t (kWh) A. Load Scheduling Sw,t amount of renewable energy directly supplied user’s loads to be served at time slot t (kWh) Sr,t amount of renewable energy stored into battery at time slot t (kWh) Qt portion of Et stored into battery at time slot t (kWh) Rmax maximum charging amount (kWh) per slot allowed for the battery Dt amount of energy discharged from the battery at time slot t (kWh) Dmax maximum discharging amount per slot allowed from the battery (kWh) We assume the user has load tasks in various types arriving over time slots. An example of the scheduling time line of two loads is shown in Fig. 2. Let Wt denote the load arriving at the beginning of time slot t. It is given by Wt = ρt λt , where ρt and λt are the load intensity and duration for Wt , respectively. We assume λt is an integer multiple of time slots, and the minimum duration for any load is 1, i.e., λt ∈ {1, 2, . . .}. Let dmax denote the maximum delay allowed for Wt before it is t served (multiple of time slots), and let dt denote the actual delay incurred for Wt before it is served. We have Bt battery energy level at time slot t (kWh) Bmin minimum energy level required in the battery (kWh) Bmax maximum energy level allowed in the battery (kWh) Crc entry cost for battery due to each charging activity ($) Cdc entry cost for battery due to each discharging activity ($) xe,t entry cost for battery at time slot t as xe,t = 1R,t Crc + 1D,t Cdc ($) xu,t net amount of energy change in battery at time slot t, as xu,t = |Qt + Sr,t − Dt | (kWh) xe average entry cost for battery over the To -slot period ($) xu average net amount of energy change in battery over the To slot period (kWh) Cu (·) cost function associated with average usage amount xu ($) α weight for the cost of scheduling delay at energy storage control action vector at time slot t ∆u desired change of battery energy level within To slots (kWh) µ weight for delay related queues in Lyapunov function studies in Section VI, we conclude our paper in Section VII. Notations: The main symbols used in this paper are summarized in Table I. II. S YSTEM M ODEL We consider a residential-side electricity consuming entity powered by the conventional grid and a local renewable generator (RG) (e.g., wind or solar generators). An energy storage battery is co-located with RG to store energy from both power Sr,t Renew. St Gen. Fig. 1. − Contrl. t X τ =0 Sw,t ρτ 1S,t (dτ ) 00 11 00 11 00 11 11111 00000 00 11 0000000000 1111111111 00000 11111 0000000000 1111111111 t The residential energy storage management system. sources and supply power to the user. The energy storage management (ESM) system is shown in Fig. 1. As a part of the ESM system, a load scheduling mechanism is implemented to schedule each load task to meet its delay requirements. We assume the ESM system operates in discrete time slots with t ∈ {0, 1, · · · }, and all operations are performed per time slot t. Each component of the EMS system is described below. dt ∈ {0, 1 . . . , dmax }, ∀t. t (1) Thus, the earliest serving time duration for Wt is [t, t + λt ], and the latest serving time duration is [t+dmax , t+dmax +λt ]. t t We define an indicator function 1S,t (dτ ) , {1 : if t ∈ [τ + dτ , τ + dτ + λτ ); 0 : otherwise}, for ∀τ ≤ t. It indicates whether or not the load Wτ is being served at time slot t. Consider a To -slot period. We define dw as the average delay of all arrived loads within this To -slot period, given by2 dw , To −1 1 X dτ . To τ =0 (2) Besides the per load maximum delay dmax constraint in (1), t we impose a constraint on the average delay dw as dw ∈ [0, dmax ] (3) where dmax is the maximum average delay for the loads within the To -slot period. It is straightforward to see that for constraint (3) to be effective, we have dmax ≤ maxt∈[0,To −1] {dmax }, for ∀t. The average delay dw reflects t the average quality of service for the loads within the To slot period. We define a cost function Cd (dw ) associated with dw . A longer delay reduces the quality of service and incurs a higher cost. Thus, we assume Cd (·) to be a continuous, convex, non-decreasing function with derivative Cd′ (·) < ∞. 2 Without loss of generality, we start the To -period at time slot t = 0. 4 Wt1 ... 0 t1 dmax t1 Wt2 ... ... t 2 dt1 ρt 1110101011 00 00 10 00 00 . . . 11 11 001001. .0. 11 11 00 11 1000 11 ρt1 dt2 Let Bt denote the battery energy level at time slot t. With a finite capacity, Bt is bounded by dmax t2 2 λt1 ... To − 1 λt2 Fig. 2. An example of load scheduling for two arrival loads Wt1 and Wt2 . B. Energy Sources and Storage 1) Power Sources: The user can purchase energy from the conventional grid with a real-time price. Let Et denote the amount of energy bought in time slot t. It is bounded by Et ∈ [0, Emax ] (4) where Emax is the maximum amount of energy that can be bought from the grid per slot. This amount can be used to directly supply the user’s loads and/or be stored into the battery. Let Pt denote the unit price of buying energy at time slot t. It is bounded as Pt ∈ [Pmin , Pmax ], where Pmin and Pmax are the minimum and maximum unit energy prices, respectively. We assume Pt is known to the user at time slot t and is kept unchanged within the slot duration. The average cost for the purchased energy from the grid over a To -slot PTo −1 ∆ Et Pt . period is defined by J = T1o t=0 Renewable generator: An RG is used as an alternative energy source in the ESM system. Let St denote the amount of renewable energy harvested at time slot t. We assume St is first used to supply the loads scheduled to be served at time slot t. Denote this portion by Sw,t , we have ( t ) X Sw,t = min (5) ρτ 1S,t(dτ ), St τ =0 where the first term in (5) represents the total energy over those scheduled loads that need to be served at time slot t. The remaining portion of St , if any, can be stored into the battery. Since there is a cost associated to the battery charging activity, we use a controller to determine whether or not to store the remaining portion into the battery. Let Sr,t denote the amount of renewable energy charged into the battery at time slot t. It is bounded by Sr,t ∈ [0, St − Sw,t ] . (6) 2) Battery Operation: The battery can be charged from either the grid, the renewable generator, or both at the same time. Let Qt denote the portion of Et from the grid that is stored into the battery at time slot t. The total charging amount at time slot t is bounded by Qt + Sr,t ∈ [0, Rmax ] (7) where Rmax is the maximum charging amount per slot for the battery. Similarly, let Dt denote the discharging amount from the battery at time slot t, bounded by Dt ∈ [0, Dmax ] (8) where Dmax is the maximum discharging amount per slot allowed from the battery. We assume there is no simultaneous charging and discharging activities at the battery, i.e., (Qt + Sr,t ) · Dt = 0. (9) Bt ∈ [Bmin , Bmax ] (10) where Bmin and Bmax are the minimum energy required and maximum energy allowed in the battery, respectively. The dynamics of Bt over time due to charging and discharging activities are given by3 Bt+1 = Bt + Qt + Sr,t − Dt . (11) It is known from battery technology that frequent charging/discharging activities cause a battery to degrade over time [32]–[34].4 Both the frequency of charging or discharging and the amount that is charged or discharged affect the battery lifetime. Given this, we model two types of battery operational costs associated with the charging/discharging activities: entry cost and usage cost. The entry cost is a fixed cost incurred due to each charging or discharging activity. Define two indicator functions to represent charging and discharging activities as 1R,t , {1 : if Qt + Sr,t > 0; 0 : otherwise} and 1D,t , {1 : if Dt > 0; 0 : otherwise}, respectively. Let Crc denote the entry cost for each charging activity and Cdc for that of the discharging activity. Let xe,t denote the entry cost at time slot t. It is given by xe,t , 1R,t Crc + 1D,t Cdc . We define thePtime-averaged entry cost over the To -slot period as To −1 xe,t . xe , T1o t=0 The usage cost is defined as the cost associated with the ∆ battery charging and discharging amount. Let xu,t = |Qt + Sr,t − Dt | denote the net amount of energy change in battery at time slot t due to charging or discharging. From (7) and (8), it follows that xu,t is bounded by xu,t ∈ [0, max {Rmax , Dmax }] . (12) In general, the battery usage cost is associated with charge cycles5 . Each charge cycle typically lasts for a period of time in a day [35]. To approximate this, we consider the average net amount of energy change inPthe battery over To −1 the To -slot period, defined as xu , T1o t=0 xu,t . From (12), it is straightforward to see that xu is bounded by xu ∈ [0, max {Rmax , Dmax }]. We model the usage cost as a function of xu , denoted by Cu (xu ). It is known that faster charging/discharging within a fix period has a more detrimental effect on the life time of the battery. Thus, we assume Cu (xu ) is a continuous, convex, non-decreasing function with derivative Cu′ (xu ) < ∞.6 Based on the above, the average battery operational cost over the To -slot period due to charging/discharging activities is given by xe + Cu (xu ). 3 We consider an ideal battery model with no leakage of stored energy over time and full charging/discharging efficiency. 4 The lifetime of battery can be coarsely measured by the number of full charge cycles. 5 Charging the battery and then discharging it to the same level is considered a charge cycle. 6 Such a convex cost function has also been adopted in literature [36], [37]. 5 C. Supply and Demand Balance For each load Wτ arrived at time slot τ , if it is scheduled to be served at time slot t (≥ τ ), the energy supply needs to meet the amount ρτ scheduled for Wτ . The overall energy supply must be equal to the total demands from those loads which need to be served at time slot t. Thus, we have supply and demand balance relation given by Et − Qt + Sw,t + Dt = t X ρτ 1S,t (dτ ), ∀t. (13) τ =0 A. Problem Modification Due to the finite battery capacity constraint, the control actions {at } are coupled over time. To remove the time coupling, similar to the technique used in our previous work [14] for energy storage only problem, we remove the finite battery capacity constraint, and instead we impose a constraint on the change of battery energy level over the To -slot period. Specifically, by (11), the change of P battery energy level over o −1 (Qt + Sr,t − Dt ). the To -slot period is BTo − B0 = Tt=0 We now set this change to be a desired value ∆u , i.e., To −1 ∆u 1 X (Qt + Sr,t − Dt ) = . To t=0 To III. J OINT E NERGY S TORAGE M ANAGEMENT AND L OAD S CHEDULING : P ROBLEM F ORMULATION Our goal is to jointly optimize the load scheduling and energy flows and storage control for the ESM system to minimize an overall system cost over the To -slot period. The loads, renewable generation, and price {Wt , St , Pt } have complicated statistical behaviors which may be non-stationary and thus are often difficult to acquire or predict in practice. In our design, we assume arbitrary dynamics for {Wt , St , Pt } and do not assume their statistical knowledge being known. We intend to develop a real-time control algorithm that is capable to handle such arbitrary and unknown system inputs. We model the overall system cost as a weighted sum of the cost from energy purchase and battery degradation, and the cost of scheduling delay. Define at , [Et , Qt , Dt , Sw,t , Sr,t ] as the control action vector for the energy flow in the ESM system at time slot t. Our goal is to find an optimal policy {at , dt } that minimizes the time-averaged system cost. This optimization problem is formulated as follows P1: min {at ,dt } J + xe + Cu (xu ) + αCd (dw ) s.t. (1), (3), (4), (6), (9), (13), and 0 ≤ Sr,t + Qt ≤ min {Rmax , Bmax − Bt } (14) 0 ≤ Dt ≤ min {Dmax , Bt − Bmin } (15) where α is the positive weight for the cost of scheduling delay; It sets the relative weight between energy related cost and load delay incurred by scheduling in the joint optimization. Note that in P1, {Wt , St , Pt } are random, and their future values are unknown at time slot t. Thus, P1 is a finite time horizon joint stochastic optimization problem which is difficult to solve. Joint energy storage control and load scheduling complicates the problem, making it much more challenging than each separate problem alone. The finite battery capacity imposes a hard constraint on the control actions {at }, making {at } correlated over time, due to the time-coupling dynamics of Bt in (11). Furthermore, the finite time horizon problem is much more difficult to tackle than the infinite time horizon problem as considered in most existing energy storage works. New techniques need to be developed for a real-time control solution. In the following, we focus on proposing a real-time algorithm to provide a suboptimal solution to P1 with a certain performance guarantee. To do this, we first modify P1 to allow us to design a real-time algorithm for joint energy storage control and load scheduling at every time slot. We later discuss how our solution can meet the constraints of P1. (16) Note that, ∆u is only a desired value we set, which may not be achieved by a control algorithm at the end of To -slot period. We will quantify the amount of mismatch with respect to ∆u under our proposed control algorithm in Section V. By the battery capacity and (dis)charging constraints, it is easy to see that ∆ |∆u | ≤ ∆max = min{Bmax − Bmin , To max{Rmax , Dmax }}. We now modify P1 to the follow optimization problem by adding the new constraint (16), and removing the battery capacity constraint (10) P2: min {at ,dt } J + xe + Cu (xu ) + αCd (dw ) s.t. (1), (3) − (9), (13), (16). Note that by removing the battery capacity constraint (10), we remove the dependency of per-slot charging/discharging amount on Bt in constraints (14) and (15), and replace them by (7) and (8), respectively. B. Problem Transformation In P2, both battery average usage cost Cu (xu ) and scheduling delay cost Cd (dw ) are functions of time-averaged variables, which complicates the problem. Using the technique introduced in [38], we now transform the problem into one that only contains the time-average of the functions. Specifically, we introduce auxiliary variables γu,t and γd,t for xu,t and dt , respectively, and impose the following constraints ∆ 0 ≤ γu,t ≤ max{Rmax , Dmax }, ∀t γu = xu (17) (18) 0 ≤ γd,t ≤ min{dmax , dmax }, ∀t t (19) γd = dw 1 PTo −1 (20) where γi = To τ =0 γi,t , for i = u, d. The above constraints ensure that each auxiliary variable lies in the same range as its original variable, and its time average is the as that PTsame o −1 Ci (γi,t ) of its original variable. Define Ci (γi ) , T1o t=0 as the time average of Ci (γi,t ) over To slots, for i = u, d. Applying (18) and (20) to the objective of P2, and defining π t , [at , dt , γu,t , γd,t ], we transform P2 into the following optimization problem P3: min J + xe + Cu (γu ) + αCd (γd ) {π t } s.t. (1), (3) − (9), (13), (16) − (20) where the terms in the objective are all To -slot time-averaged cost functions. We can show that P2 and P3 are equivalent, 6 i.e., they have the same optimal control solution {a∗t , d∗t } (See Appendix A). Although P3 is still difficult to solve, it enables us to design a dynamic control and scheduling algorithm for joint energy storage control and load scheduling by adopting Lyapunov optimization technique [15]. In the following, we propose our real-time algorithm for P3, and then design parameters to ensure the proposed solution meets the battery capacity constraint in the original P1 which is removed in P2. IV. J OINT E NERGY S TORAGE M ANAGEMENT AND L OAD S CHEDULING : R EAL -T IME A LGORITHM By Lyapunov optimization, we first introduce virtual queues for each time-averaged inequality and equality constraints of P3 to transform them into queue stability problems. Then, we design a real-time algorithm based on the drift of Lyapunov function defined on these virtual queues. A. Virtual Queues We introduce a virtual queue Xt to meet constraint (3), evolving as follows Xt+1 = max (Xt + dt − dmax , 0) . (21) From (2), the above results in dw ≤ dmax + (XTo − X0 )/To . Thus, formulating the virtual queue Xt in (21) will guarantee to meet the average delay constraint (3) with a margin (XTo − X0 )/To . In Section V, we will further discuss this constraint under our proposed algorithm. For constraint (16), dividing both sides by To gives the timeaveraged net change of battery energy level per slot being ∆u /To . To meet this constraint, we introduce a virtual queue Zt , evolving as follows Zt+1 = Zt + Qt + Sr,t − Dt − ∆u . To ∆ ∆u t. To L(Θt ) ,  1 2 2 2 Zt + Hu,t + µ Xt2 + Hd,t 2 (26) where µ is a positive weight to adjust the relative importance of load delay related queues in the Lyapunov function. We define a one-slot sample path Lyapunov drift as ∆(Θt ) , L (Θt+1 ) − L(Θt ), which only depends on the current system inputs {Wt , St , Pt }. Instead of directly minimizing the system cost objective in P3, we consider the drift-plus-cost metric given by ∆(Θt ) + V [Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )]. It is a weighted sum of the drift ∆(Θt ) and the system cost at time slot t with V > 0 being the relative weight between the two terms. Directly using the drift-plus-cost function to determine control action π t is still challenging. In the following, we use an upper bound of this drift-plus-cost function to design our real-time algorithm. The upper bound is derived in Appendix B as (34). Using this upper bound, we formulate a per-slot real-time optimization problem and solve it at every time slot t. By removing all the constant terms independent of control action πt , we arrive at the following optimization problem P4 : min Zt [Et + Sr,t + Sw,t − ρt 1S,t (dt )] − |Hu,t | Sw,t πt + Hu,t [γu,t − (Et + Sr,t )] + |Hu,t | ρt 1S,t (dt ) + µXt dt + µHd,t (γd,t − dt ) + V [Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )] s.t. (1), (4) − (9), (13), (17), (19). (23) u The linear time function ∆ To t in At is to ensure that constraint (16) is satisfied. Due to this shift At , the range of Zt is expanded to the entire real line, i.e., Zt ∈ R for Bt ∈ R+ . Note that Ao is a design parameter. Later, we design Ao to ensure that our control solution {at } for the energy flows in our proposed algorithm satisfies the battery capacity constraint (10) imposed in P1. Finally, to meet constraints (18) and (19), we establish virtual queues Hu,t and Hd,t , respectively, as follows Hu,t+1 = Hu,t + γu,t − xu,t Hd,t+1 = Hd,t + γd,t − dt . Note that Zt and Hu,t are the virtual queues related to the battery operation, while Xt and Hd,t are those related to the scheduling delay. Let Θt , [Zt , Hu,t , Xt , Hd,t ] denote the virtual queue vector. We define the quadratic Lyapunov function L(Θt ) for Θt as follows (22) From Bt in (11) and Zt above, we can show that they are different by a time-dependent shift as follows Zt = Bt − At , where At = Ao + B. Real-Time Algorithm (24) (25) From Lyapunov optimization, it can be shown that satisfying constraints (3), (16), (18), and (19) is equivalent to maintaining the stability of queues Xt , Zt , Hu,t , and Hd,t , respectively [15]. Pt Note that the term τ =0 ρτ 1S,t (dτ ) in the upper bound (34) is the total energy demand from the scheduled loads at time slot t. Since delay dτ for τ ∈ {0, 1, . . . , t − 1} are determined in previous time slot τ ≤ t − 1 by solving P4, only ρt 1S,t (dt ) is a function of π t at time slot t, and is part of the objective of P4. Denote the optimal solution of P4 by π ∗t , ∗ ∗ ∗ ∗ , γd,t ]. After regrouping the terms in the objective [at , dt , γu,t of P4 with respect to different control variables, we show that P4 can be separated into four sub-problems to be solved sequentially and variables in π ∗t can be determined separately. The steps are described below. ∗ S1) Determine d∗t and γd,t by solving the following P4a1 and P4a2 , respectively. P4a1 : min µdt (Xt − Hd,t ) − ρt 1S,t (dt ) (Zt − |Hu,t |) dt s.t. (1). P4a2 : min µHd,t γd,t + V αCd (γd,t ) s.t. (19). γd,t ∗ S2) Determine Sw,t in (5) using d∗t obtained in S1). ∗ ∗ S3) Using Sw,t obtained in S2) in (13), determine γu,t and 7 a∗t by solving the following P4b1 and P4b2 , respectively. P4b1 : min Hu,t γu,t + V Cu (γu,t ) s.t. (17). γu,t P4b2 : min Et (Zt − Hu,t + V Pt ) + Sr,t (Zt − Hu,t ) at + V (1R,t Crc + 1D,t Cdc ) s.t. (4) − (9), (13). Remark: An important and interesting observation of the above is that the joint optimization of load scheduling and energy storage control can in fact be separated: The scheduling decision d∗t is determined first in P4a1 . Based on the resulting energy demand in the current time slot t, energy storage control decision a∗t is then determined in P4b2 . Note that the two sub-problems are interconnected through the current virtual queue backlogs Zt and Hu,t for the battery energy level Bt and battery energy net change xu,t , respectively. The storage control decision a∗t will further change the battery energy level and affect Hu,t at the next time slot. Thus, although the scheduling and storage decisions are separately determined, they are interconnected through battery energy level and usage, and sequentially influence each other. In the following, we solve each subproblem and obtain a closed-form solution. As a result, the optimal solution π ∗t is obtained in closed-form. 1) The optimal d∗t : The optimal scheduling delay d∗t for P4a1 is given below. Proposition 1: Let ωo , −ρt (Zt − |Hu,t |), ω1 , (Xt − Hd,t ). , µdmax µ (Xt − Hd,t ), and ωdmax t t ( 0 if ωo ≤ ω1 1) If Xt − Hd,t ≥ 0, then d∗t = 1 otherwise; ( 0 if ωo ≤ ωdmax t 2) If Xt − Hd,t < 0, then d∗t = max dt otherwise. ∗ Lemma 1: The optimal γi,t , for i = d, u, is given by   if Hi,t ≥ 0  0 ′ ∗ γi,t = Γi  (27)  if Hi,t < −V βi Ci (Γi )  H  Ci′−1 − i,t otherwise. V βi where βu = 1, βd = α/µ, Γu , max{Rmax , Dmax }, and Γd , min{dmax , dmax }. t Proof: See Appendix D. 3) The optimal a∗t : Once the scheduling decision d∗t for Wt is determined, the total energy demand from the scheduled P loads, i.e., tτ =0 ρτ 1S,t(d∗τ ), is determined. Given this energy demand, P4b2 is solved to obtain the optimal control solution ∗ [Et∗ , Q∗t , Dt∗ , Sr,t ] in a∗t . This subproblem for energy storage and control is essentially the same as in [14], where the energy storage only problem is considered. Thus, the closed-form solution can be readily obtained from [14]. Here we directly state the result. Pt ∗ Define L∗t , τ =0 ρτ 1S,t (dτ ) as the current energy demand at time slot t. Define the idle state of the battery as the state where there is no charging or discharging activity. The control solution under this idle state is denoted id id by [Etid , Qid t , Dt , Sr,t ]. By supply-demand balancing equation ∗ id id (13), it is given by Etid = L∗t − Sw,t , Qid t = Dt = Sr,t = 0. Let ξt denote the objective value in P4b2 for the battery being ∗ in the idle state. We have ξt = (L∗t − Sw,t )(Zt − Hu,t + V Pt ). ′ ∗ ′ ′ ′ ′ Denote at = [Et , Qt , Dt , Sw,t , Sr,t ]. The optimal control solution a∗t of P4b2 is given in three cases below. i ) For Zt − Hu,t + V Pt ≤ 0: The battery is in either charging or idle state. The solution a′t in charging state is given by  Dt′ = 0,    S ′ = min S − S ∗ , R max r,t w,t  t . ∗ ∗ ′ Q′t = min Rmax − Sr,t , E max − Lt + Sw,t     ′ ∗ ′ Et = min L∗t + Rmax − Sw,t − Sr,t , Emax ′ If Et′ (Zt −Hu,t +V Pt )+(Zt −Hu,t )Sr,t +V Crc 1R,t < ξt , then a∗t = a′t ; Otherwise, a∗t = aid . t ii ) For Zt − µu Hu,t < 0 ≤ Zt − Hu,t + V Pt : The batProof: See Appendix C. tery is either in charging, discharging, or idle state. The are the objective Remark: Note that ωo , ω1 , and ωdmax t or discharging state is given by solution a′t in max   charging values of P4a1 when dt = 0, 1, and dt , respectively. ∗ ′ ∗ = min L − S , Dmax D  t w,t t  Furthermore, wo depends on the virtual queue backlogs (Zt  S ′ = min S − S ∗ , R t max and Hu,t ) related to the battery energy level, while ω1 and r,t w,t . ′  depend on the virtual queue backlogs (X and H ) ωdmax = 0, Q t d,t  t t  +  ′  ∗ ∗ related to load delay. Proposition 1 shows that the scheduling − Dmax Et = Lt − Sw,t ∗ ′ decision for load Wt is to either immediately serve it (dt = 0) If Et′ (Zt − Hu,t + V Pt ) + (Zt − Hu,t )Sr,t + V (Crc 1R,t + ∗ ′ or delay its serving time (d∗t = 1 or dmax ). This decision t Cdc 1D,t ) < ξt , then at = at ; Otherwise, a∗t = aid t . depends on whether the battery energy is high enough (so Wt will be served immediately) or the delays for the scheduled iii ) For 0 ≤ Zt − Hu,t < Zt − Hu,t + V Pt : The′ battery is in either discharging or idle  state. Thesolution at in dischargloads so far are low enough (so Wt will be delayed). When the ′ ∗ ∗  Dt = min Lt − Sw,t , Dmax load is delayed to serve, the delay should be either minimum ′ . ing state is given by Sr,t = Q′t = 0, or maximum depending on the existing scheduling delays of   ∗ +  ′ ∗ the past loads. Et = Lt − Sw,t − Dmax ′ ∗ ∗ If E (Z − H + V P ) + V Cdc 1D,t < ξt , then a∗t = a′t ; t u,t t t 2) The optimal γd,t and γu,t : Since Cd (·) and Cu (·) are ∗ id Otherwise, at = at . both convex, the objectives of P4a2 and P4b1 are convex. Let ′−1 ′ Ci (·) denote the first derivative of Ci (·), and Ci (·) denote In each case above, the cost of charging or discharging is the inverse function of Ci′ (·), for i = d, u. We obtain the compared with the cost ξt of being in an idle state, and the ∗ , i = d, u, for P4a2 and P4b1 as follows. control solution of P4b2 is the one with the minimum cost. optimal solutions γi,t The condition for each case depends on Zt , Hu,t and Pt , where 8 Algorithm 1 Real-Time Joint Load Scheduling and Energy Storage Management Set the desired value of ∆u . Set Ao and V as in (28) and (29), respectively. At time slot 0: Set Z0 = X0 = Hu,0 = Hd,0 = 0. At time slot t: Obtain the current values of {Wt , St , Pt } 1) Load scheduling: Determine d∗t according to Proposi∗ tion 1 and γd,t according to (27), respectively. 2) Energy Storage Control: ∗ a) Renewable contribution: Determine Sw,t in (5) using d∗t obtained above. ∗ b) Energy purchase and storage: Determine γu,t according to (27) and a∗t according to Cases i)-iii) in Section IV-B3. 3) Updating virtual queues: Use π ∗t to update Bt based on (11), and Xt , Zt , Hu,t , Hd,t based on (21)−(25). Zt and Hu,t are rated to battery energy level Bt and usage cost xu,t , respectively. Thus, Cases i)-iii) represent the control actions at different battery energy levels (i.e., low, moderate, or high) and electricity prices. 4) Feasibility of a∗t to P1: Recall that we have removed the battery capacity constraint (10) when modifying P1 to P2. Thus, this constraint is no longer imposed in P4b2 , and our real-time algorithm may not provide feasible control solutions {a∗t } to P1. To ensure the solution is still feasible to the original problem P1, we design our control parameters Ao and V . The result readily follows [14, Proposition 2]. We omit the details and only state the final result below. Proposition 2: For the optimal solution a∗t of P4b2 , the resulting Bt satisfies the battery capacity constraint (10), and {a∗t } is feasible to P1, if Ao in (23) is given by ( A′o if ∆u ≥ 0 Ao = (28) A′o − ∆u if ∆u < 0 where A′o = Bmin + V Pmax + V Cu′ (Γu ) + Γu + Dmax + and V ∈ [0, Vmax ] with Vmax = ∆u To , Bmax − Bmin − Rmax − Dmax − 2Γu − |∆u | . (29) Pmax + Cu′ (Γu ) C. Discussions We summarize the proposed real-time joint load scheduling and energy storage control in Algorithm 1. Due to the separation of joint optimization, the algorithm provides a clear sequence of control decisions at each time slot t. Recall that we modify the original joint optimization problem P1 to P3, and apply Lyapunov optimization to propose a real-time algorithm for P3 which is to solve the per-slot optimization problem P4. We then design system parameters Ao and Vmax to ensure our solution satisfies the battery capacity constraint, which is removed when we modify P1 to P4. As a result, our proposed solution by Algorithm 1 is feasible to P1. Furthermore, we have the following discussions. 1) In modifying P1, we remove the battery capacity constraint (10) and instead impose a new constraint (16) on the overall change of battery energy level over To slots to be ∆u . Note that this constraint is set as a desired outcome, i.e., ∆u is a desired value. The actual solution a∗t in the proposed algorithm may not satisfy this constraint at the end of the To -slot period, and thus may not be feasible to P3. Nonetheless, setting Ao and V as in (28) and (29) guarantees that {a∗t } satisfy the battery capacity constraint (10) and therefore are feasible to P1. 2) In designing the real-time algorithm by Lyapunov framework, virtual queue Xt in (21) which we introduce for the average delay constraint (3) can only ensure the constraint is satisfied with a margin as indicated below (21). As a result, constraint (3) can only be approximately satisfied. However, this relaxation is mild in practice for the average delay performance. Note that the per-load maximum delay constraint (1) is strictly satisfied for d∗t by Algorithm 1. We will show in simulation that the achieved average delay dw by Algorithm 1 in fact meets constraint (3). 3) We point out that the load scheduling and energy storage control decisions are provided in closed-form by Algorithm 1. Thus, the algorithm is particularly suitable for real-time implementation with a constant computational complexity O(1). Furthermore, no statistical assumptions on the loads, renewable source, and pricing {Wt , St , Pt } are required in the algorithm. They can be non-stochastic or stochastic with arbitrary dynamics (including non-stationary processes). This allows the algorithm to be applied to general scenarios, especially when these statistics are difficult to predict. Finally, despite that Algorithm 1 is a suboptimal solution for P1, we will show in the following that it provides a provable performance guarantee. V. P ERFORMANCE A NALYSIS In this section, we analyze the performance of Algorithm 1 and discuss the mismatch involved in some constraints as a result of the real-time algorithm design. A. Algorithm Performance To evaluate the proposed algorithm, we consider a T -slot look-ahead problem. Specifically, we partition To slots into T frames with To = M T , for M, T ∈ N+ . For each frame, we consider the same problem as P1 but the objective is the T slot averaged cost within the frame and the constraints are all related to time slots within the frame. In addition, we assume {Wt , St , Pt } for the entire frame are known beforehand. Thus, the problem becomes a non-causal static optimization problem and we call it a T -slot lookahead problem. Let uopt m be the corresponding minimum objective value achieved by a T -slot look-ahead optimal solution over the mth frame. We intend to bound the performance of Algorithm 1 (with no knowledge of future values of {Wt , St , Pt }) to the optimal T -slot lookahead performance (with full knowledge of {Wt , St , Pt } in a frame). We denote the objective value of P1 achieved by Algorithm 1 over To -slot period by u∗ (V ), where V is the weight value used in Algorithm 1. The following theorem provides a bound of the cost performance under our proposed real-time algorithm to uopt m under the T -slot lookahead optimal solution. Theorem 1: Consider {Wt , St , Pt } being any arbitrary processes over time. For any M, T ∈ N+ satisfying To = M T , 1 M uopt m ≤ m=0 L(Θ0 ) − L(ΘTo ) GT + V V To C ′ (Γu )(Hu,0 − Hu,To ) + αCd′ (Γd )(Hd,0 − Hd,To ) (30) + u To where G is given in (43) and the upper bound is finite. In particular, as To → ∞, we have 1 lim u∗ (V ) − lim To →∞ To →∞ M M−1 X m=0 uopt m GT . ≤ V (31) B. Design Approximation 1) Average scheduling delay dmax : Recall that, by Algorithm 1, using the virtual queue Xt in (21), the average delay constraint (3) is approximately satisfied with a margin, i.e., dw ≤ dmax + ǫd , where ǫd , (XTo − X0 )/To is the margin. We now bound ǫd below. Proposition 3: Under Algorithm 1, the margin ǫd for constraint (3) is bounded as follows s L(Θo ) |X0 | 2G + + . (32) |ǫd | ≤ µTo µTo To Proof: See Appendix F. Proposition 3 indicates that the margin ǫd → 0 as To → ∞. Thus, the average delay is asymptotically satisfied. Note that, for X0 = 0, ǫd ≥ 0. If X0 > 0, it is possible that ǫd < 0 and constraint (3) is satisfied with a negative margin. However, this will drive d∗t to be smaller which may cause higher system cost. Thus, we set X0 = 0 in Algorithm 1. 2) Mismatch of ∆u : In our design, we set ∆u to be a desired value for the change of battery energy level over To -slot period as in new constraint (16). This value may not bePachieved by Algorithm 1. Define the mismatch by o −1 ǫu , τT=0 (Qτ +Sr,τ −Dτ )−∆u . The bound for ǫu follows the result in [14, Proposition 3] and is shown below. (33) Note that Vmax in (29) increases as |∆u | decreases, and a larger Vmax is preferred for better performance by Theorem 1. PTo −1 To → ∞, constraint (16) becomes limTo →∞ T1 τ =0 (Qτ + o − Dτ ) = 0 as in the infinite time horizon problem [39]. 7 As Sr,τ 0.05 0 5 10 15 20 15 20 25 Hour 0.2 Sm St 0.1 Sl Sh 0 0 5 10 25 Hour 0.2 0 Wm Wt 0.1 Wl Wh 0 5 10 15 20 25 Hour Proof: See Appendix E. Remark: Theorem 1 shows that our proposed algorithm is able to track the “ideal” T -slot lookahead optimal solution with a bounded gap, for all possible M and T . Also, for the best performance, we should always choose V = Vmax . The bound in (31) gives the asymptotic performance as To increase. Since Vmax in (29) increases with Bmax , it follows that Algorithm 1 is asymptotically equivalent to the optimal T -slot look-ahead solution as the battery capacity and To go to infinity. Note that, as To → ∞, P1 becomes an infinite time horizon problem with average sample path cost objective7. The bound in (31) provides the performance gap of long-term timeaveraged sample-path system cost of our proposed algorithm to the T -slot look-ahead policy. |ǫu | ≤ 2Γu + Rmax + V Pmax + V Cu′ (Γu ) + Dmax . Pt 0.1 Energy (kWh) u∗ (V ) − M−1 X Load (kWh) the To -slot average system cost under Algorithm 1 is bounded by Unit price (CAD) 9 Fig. 3. Mean load W t , mean renewable generation S t , and real-time price Pt over 24 hours. Thus, a smaller |∆u | is preferred. Note also that our simulation study shows that the actual mismatch ǫu is much smaller than this upper bound. VI. S IMULATION R ESULTS We set each slot to be 5 minutes and consider a 24-hour duration. Thus, we have To = 288 slots for each day. We assume Pt , St and Wt do not change within each slot. We collect data from Ontario Energy Board [40] to set the price Pt . As shown Fig. 3 top, it follows a three-stage price pattern as {Ph , Pm , Pl } = {$0.118, $0.099, $0.063} and is periodic every 24 hours. We assume {St } to be solar photovoltaic energy. It is a non-stationary process, with the mean amount S t = E[St ] changing periodically over 24 hours, and having threestage values as {S h , S m , S l } = {1.98, 0.96, 0.005}/12 kWh per slot8 and standard deviation as σSi = 0.4S i , for i = h, m, l, as shown in Fig. 3 middle. We assume the load {Wt } is a non-stationary process, having three-stage mean values W t = E[Wt ] as {W h , W m , W l } = {2.4, 1.38, 0.6}/12 kWh per slot9 with standard deviation as σWi = 0.2W i , for i = h, m, l, as shown in Fig. 3 bottom. For each load Wt , we generate λt from a uniform distribution with interval [1, 12], and ρt = Wt /λt . We set dmax in (1) to be identical for all t. t We set the battery related parameters as follows: Rmax = Dmax = 0.165 kWh10 , Crc = Cdc = 0.001, Bmin = 0, and the battery initial energy level B0 = 0. Unless specified, we set Bmax = 3 kWh. We set Emax = 0.3 kWh. Also, we set the weights α = 1 and µ = 1 as the default values. Since Vmax increases as |∆u | decreases, to achieve best performance11, we set ∆u = 0 and V = Vmax . We consider an exemplary case where the battery usage cost and the delay cost are both quadratic functions, given 8 We set the mean renewable amount to be {S , S , S } = m h l {1.98, 0.96, 0.005} kWh per hour. Converting to per slot energy amount with 5 minutes duration, we have {1.98, 0.96, 0.005}/12 kWh per slot. We set these values based on that the average energy harvested by photovoltaic is about 20 kWh within a day for a residential home. 9 Similar as S , the mean load is converted from energy amount per hour to t per slot. The mean values are set based on that the each residential household on average consumes 1 ∼ 2 kWh per hour. 10 Assuming a household consumes 1 ∼ 2 kWh per hour on average, we set the values of Rmax and Dmax to be in the same range for load supply. Thus, per slot, we have Rmax = Dmax = 1.98 kWh/12 = 0.165 kWh. 11 A detailed study of ∆ can be found in [14]. u 10 2 by Cu (xu ) = ku xu 2 and Cd (dw ) = kd dw . The constant ku > 0 is a battery cost coefficient depending on the battery characteristics. We set it as ku = 0.2.12 The constant kd > 0 is a normalization factor based on the desired maximum average delay dmax in (3). It is set as kd = 1/(dmax )2 , such that the cost for an average delay dw = dmax is normalized to 1.13 The ∗ ′ optimal γi,t  can be determined with Ci (Γi ) = 2ki Γi ,  in (27) H and Ci′−1 − V i,t βi Loads Serving Delay Empty H = − 2βi ki,ti V , for i = u, d. } ρt A. An Example of Load Scheduling 305 12 The value of k depends on the type of battery and current battery u technology. We have tested a range of values for ku and studied the effect of ku on the system cost performance in our previous work [14]. 13 The normalization by k ensures the delay cost is properly defined. d Intuitively, a longer delay is encouraged in order to allow more energy cost saving, as long as the desired maximum average delay is satisfied. Thus, the cost Cd (dw ) should not be affected by the absolute delay value dw , but rather 2 its relative value to dmax , i.e., dw /(dmax )2 . 14 We set the value of α to ensure that the weighted delay cost αC (d ) is d w comparable to the other two costs in the objective of P1. Thus, both delay and energy cost are active factors in making the storage and scheduling decision in simulation. 315 320 325 330 335 340 345 350 Fig. 4. A trace of load scheduling results over (dmax = dmax = 18, t α = 0.005). 5.2 ×10 -3 α=0.001 α=0.005 5 4.8 B. Effect of Scheduling Delay Constraints 1) Effect of dmax and dmax : We study how the average t system cost objective of P1 under our proposed algorithm varies with different delay requirements. We set dmax = dmax , t max ∀t, and plot the average system cost vs. dt in Fig. 5, for different values of weight α in the cost objective. As can be seen, the system cost decreases as dmax (dmax ) increases. t This shows that relaxing the average delay constraint gives more flexibility to load scheduling, where each load can be scheduled at lower electricity price, resulting in lower system cost. This demonstrates that flexible load scheduling is more beneficial to the overall system cost. In addition, we see that a larger value α gives more weight on minimizing the delay in the objective, resulting in a higher system cost. Next, we study the effect of load delay constraints on the monetary cost, i.e., the cost of energy purchasing and battery degradation, given by J + xe + Cu (xu ) in the objective of P1. The monetary cost indicates how much saving a consumer could actually have, by allowing longer service delay. In Fig. 6, we plot the monetary cost vs. dmax for dmax = 216. We t see a clear trade-off between the monetary cost and the load delay. The trade-off curve can be used to determine the desired operating point. For comparison, we also consider the case in which all loads are served immediately after arrival, i.e., dmax = 0. This is essentially the case with only energy storage t 310 Time slot t Avg. sys. cost In Fig. 4, we show a fraction of the load scheduling results by Algorithm 1, where we set dmax = dmax = 18 slots and t 14 α = 0.005. Each horizontal bar represents a scheduled load Wt with the width representing the load intensity ρt and the length representing the total duration from arrival to service being completed. For a delayed load, the delay is indicated in different color before the load is scheduled. In this example, we see some loads are immediately scheduled, while others are scheduled at dmax . The total energy demand at each time t slot is the vertical summation over all loads that are scheduled in this time slot. 4.6 4.4 4.2 4 3.8 3.6 3.4 60 80 100 120 140 160 180 200 220 dmax (dmax ) t Fig. 5. Average system cost vs. dmax (dmax = dmax ). t t but no load scheduling. Thus, the monetary cost is independent of dmax . We see a substantial gap between the two curves and the gap increases with dmax . This clearly shows the benefit of joint load scheduling and energy storage management. 2) Average delay dw : We now study the average delay dw achieved by our proposed algorithm vs. dmax for various dmax t in Fig. 7. As we see, the actual averaged delay dw increases with the average delay dmax requirement. This is because, with a more relaxed constraint on the delay, loads can be shifted to a later time in order to reduce the system cost, resulting in larger average delay. However, the increase is sublinear with respect to dmax . Similarly, we observe that increasing the per load maximum delay dmax increases dw . Finally, recall that t we study the margin for average delay constraint (3) under our proposed algorithm in Proposition 3. To see how the resulting dw meets constraint (3), we plot the line dmax in Fig. 7. As we see, dw is below dmax for all values of dmax and dmax . t 3) Effect of µ: Weight µ is used to control the relative importance of virtual queues related to the battery and those to delay in Lyapunov function L(Θt ) in (26) and Lyapunov drift ∆(Θt ). For Lyapunov drift ∆(Θt ), if µ is large, the two queues Xt and Hd,t related to the load delay will dominate the drift. This will affect the drift-plus-cost objective considered in our proposed algorithm and thus the performance. To study the effect of µ on the performance, in Fig. 8, we evaluate the average system cost for different values of µ. We see that a lower system cost is achieved by smaller value of µ. This is 11 −3 ×10 -3 5.4 5.2 5 3.7 dmax =0 t dmax =216 t 3.6 3.5 4.8 4.6 µ=1 µ=0.00001 4.4 4.2 4 3.4 3.8 3.6 60 3.3 0 50 100 150 d Fig. 6. x 10 3.8 Avg. sys. cost Avg. monetary cost ($/slot) 3.9 200 250 80 100 120 140 160 180 200 220 dmax (dmax) max t Monetary cost vs. dmax (α = 0.005). Fig. 8. Average system cost vs. dmax (dmax = dmax ). t 4.8 150 ×10 -3 4.6 max d Avg. sys. cost 4.4 dw 100 max dt =72 dmax=144 t dmax=216 t max dt =288 50 0 0 50 100 150 200 250 Algorithm 1 4 3.8 3.6 3.4 3.2 1 300 dw vs. dmax (α = 0.005). because, with smaller µ, the drifts of Xt related to delay is less significant in the overall drift. This allows wider difference between dw and dmax , i.e., smaller dw and lower delay cost. C. Performance vs. Battery Capacity We consider two other algorithms for comparison: A) No storage or scheduling: In this case, neither energy storage nor load scheduling is considered. Each load is served immediately using energy purchased from the conventional grid and/or renewable generator. B) Storage only: In this method, only battery storage is considered but every load is served immediately without a delay. This is essentially the algorithm provided in [14]. In Fig. 9, we compare our proposed algorithm to the above two alternative algorithms under various battery capacity Bmax . Since algorithm A does not use a battery, the system cost is unchanged over Bmax and is 0.01. We do not plot the curve as the cost is much higher than the rest of two algorithms we considered. For algorithm B and our proposed Algorithm 1, as can be seen, the system costs reduces as Bmax increases. This is because a larger battery capacity allows charging/discharging to be more flexible based on the current demand and electricity price, resulting in a lower system cost. Comparing the two, we see that joint load scheduling and energy storage control provides further reduction in system cost. 2 3 4 5 6 7 8 9 10 B max (kWh) max d Fig. 7. Storage only 4.2 Fig. 9. Average system cost vs. Bmax (α = 0.001). VII. C ONCLUSION In this work, we have considered joint energy storage management and load scheduling for the ESM system, where renewable source, loads, and price may be non-stationary and their statistics are unknown. For load scheduling, we have characterized each load task by its power intensity and service duration, and have considered the maximum per load delay and maximum average delay requirements. For storage control, our storage model includes details of the battery operational constraints and cost. Aiming at minimizing the overall system cost over a finite period of time, we have designed a real-time algorithm for joint load scheduling and energy storage control, where we have provided a closed-form per slot scheduling and energy storage decisions. As a result, we have shown that the joint load scheduling and energy storage control can in fact be separately and sequentially determined in our real-time algorithm. Furthermore, we have shown that our proposed realtime algorithm has a bounded performance guarantee from an optimal T -slot look-ahead solution and is asymptotically equivalent to the optimal T -slot look-ahead solution, as the battery capacity and time period go to infinity. Simulation results have demonstrated the gain of joint load scheduling and storage control provided by our proposed algorithm over other real-time schemes which consider neither storage nor scheduling, or with storage only. 12 P ROOF OF A PPENDIX A E QUIVALENCE OF P2 AND P3 Proof: The proof follows the same approach as in [14, Lemma 1]. Let uo2 and uo3 denote the minimum objective values of P2 and P3, respectively. Since the optimal solution of P2 satisfies all constraints of P3, it is a feasible solution of P3. Thus, we have uo3 ≤ uo2 . By Jensen’s inequality and convexity of Ci (·) for i = d, u, we have Cd (γd ) ≥ Cd (γd ) = Cd (dw ) and Cu (γu ) ≥ Cu (γu ) = Cu (xu ). This means uo3 ≥ uo2 . Hence, we have uo2 = uo3 and P3 and P2 are equivalent. U PPER B OUND A PPENDIX B D RIFT-P LUS -C OST F UNCTION ON The following lemma presents an upper bound on the drift ∆(Θt ). Lemma 2: The one-slot Lyapunov drift ∆(Θt ) is upper bounded by ! t X ∆u ρτ 1S,t (dτ ) − ∆(Θt ) ≤ Zt Et + Sr,t + Sw,t − To τ =0 + Hu,t γu,t − Hu,t (Et + Sr,t ) + µXt (dt − dmax ) + G ! t X − |Hu,t | Sw,t − ρτ 1S,t (dτ ) + µHd,t (γd,t − dt ) (34) τ =0  2  2  ∆u u where G = 12 max + , D + Rmax − ∆ max To To  µ 1 2 2 max 2 ) , (dmax − dmax )2 + t 2 max{Rmax , Dmax } + 2 max (d µ max 2 ) . 2 (dt Proof: From the definition of ∆(Θt ), we have ∆(Θt ) , L(Θt+1 ) − L(Θt ) 1 2 2 2 = [Zt+1 − Zt2 + (Hu,t+1 − Hu,t )] 2  µ 2 2 2 (Xt+1 − Xt2 + Hd,t+1 − Hd,t ) (35) + 2 2 where from queue (22), Zt+1 − Zt2 can be presented by   2 Zt+1 − Zt2 ∆u = Zt Qt + Sr,t − Dt − 2 To u 2 (Qt + Sr,t − Dt − ∆ To ) + . (36) 2 u Note that from (16), we have ∆ To ≤ max{Rmax , Dmax }. For u 2 a given value of ∆u , byn (7) and (8), (Qt + Sr,t − Dt − o∆ To ) ∆u 2 u 2 is upper bound by max (Rmax − ∆ . By To ) , (Dmax + To ) the supply-demand balance (13), the first term on RHS of (36) can be replaced by   ∆u Zt Qt + Sr,t − Dt − To ! t X ∆u ρτ 1S,t (dτ ) − = Zt Et + Sr,t + Sw,t − . (37) To τ =0 2 2 From (24), Hu,t+1 − Hu,t in (35) can be presented by 2 2 Hu,t+1 − Hu,t (γu,t − xu,t )2 = Hu,t (γu,t − xu,t ) + . (38) 2 2 Note that from (12) and (17), the second term of RHS in (38) 2 2 is upper bounded by (γu,t − xu,t )2 ≤ max{Rmax , Dmax }. We now find the upper bound for −Ht xu,t in the first term on RHS of (38). By the supply-demand balance (13), −Ht xu,t can be replaced by −Ht xu,t = −Hu,t (|Qt + Sr,t − Dt |) ! t X ρτ 1S,t(dτ ) . (39) = −Hu,t Et + Sr,t + Sw,t − τ =0 The upper bound of −Ht xu,t in (39) is obtained as follows. 1 ) For Hu,t ≥ 0: We have ! t X ρτ 1S,t (dτ ) − Hu,t Et + Sr,t + Sw,t − τ =0 t X ≤ −Hu,t Et + Sr,t + Sw,t − ! ρτ 1S,t (dτ ) τ =0 = −Hu,t (Et + Sr,t ) − Hu,t Sw,t − t X ! ρτ 1S,t (dτ ) . τ =0 2 ) For Hu,t < 0: We have − Hu,t Et + Sr,t + Sw,t − t X ρτ 1S,t (dτ ) τ =0 ≤ −Hu,t |Et + Sr,t | + Sw,t − t X ! ρτ 1S,t (dτ ) τ =0 ≤ −Hu,t Et + Sr,t + t X ρτ 1S,t (dτ ) − Sw,t τ =0 = −Hu,t (Et + Sr,t ) + Hu,t Sw,t − t X ! ! ! ρτ 1S,t (dτ ) . τ =0 Combine the above cases for Hu,t , we have −Ht xu,t in (39) upper bounded by ! t X − Hu,t Et + Sr,t + Sw,t − ρτ 1S,t (dτ ) τ =0 ≤ −Hu,t (Et + Sr,t ) − |Hu,t | Sw,t − t X ! ρτ 1S,t (dτ ) . τ =0 2 2 From (21), we have Xt+1 ≤ (Xt + dt − dmax ) . Thus, 2 2 (Xt+1 − Xt ) in (35) is bounded by 2 Xt+1 − Xt2 1 2 ≤ Xt (dt − dmax ) + (dt − dmax ) (40) 2 2 where by (1), the last term n in RHS of (40) is upperobounded 2 2 max 2 by (dt − d ) ≤ max (dmax ) , (dmax − dmax ) . t 2 2 From (25), Hd,t+1 − Hd,t in (35) can be presented by 2 2 Hd,t+1 − Hd,t (γd,t − dt )2 = Hd,t (γd,t − dt ) + 2 2 1 max 2 (41) ≤ Hd,t (γd,t − dt ) + (dt ) 2 where the last inequality is derived from the bounds of γd in (19) and dt in (1). We give the upper bond of (35) as follows ∆(Θt ) , L(Θt+1 ) − L(Θt ) ! t X ∆u ρτ 1S,t (dτ ) − ≤ Zt Et + Sr,t + Sw,t − To τ =0 13 − |Hu,t | Sw,t − t X ! ρτ 1S,t (dτ ) τ =0 + Hu,t γu,t − Hu,t (Et + Sr,t ) + µXt (dt − dmax ) (42) where G includes all constant terms from the upper bounds of (36), (38), (40) and (41), and is defined as ( 2  2 ) 1 ∆u ∆u G , max Rmax − , Dmax + 2 To To µ 1 2 2 max{Rmax , Dmax } + (dmax )2 2 2 t  µ − dmax )2 . + max (dmax )2 , (dmax t 2 + P ROOF A PPENDIX E P ROOF OF T HEOREM 1 + µHd,t (γd,t − dt ) + G (43) A PPENDIX C OF P ROPOSITION 1 Proof: To determine the optimal scheduling delay d∗t , we need to compare the objective values of P4a1 under all serving options. The optimal delay d∗t is the one that achieves the minimum objective value. Because dt · 1S,t(dt ) = 0, we have the following cases: 1) If the load is immediately served, we have 1S,t (dt ) = 1 and dt = 0. The objective value becomes ωo ; 2) If the load is delayed, we have dt > 0 and 1S,t (dt ) = 0. The objective function is reduced to µdt (Xt −Hd,t ). For Xt − Hd,t ≥ 0, the objective value is ω1 ; Otherwise, the . value is ωdmax t , we obtain d∗t . Comparing ωo to ω1 or ωdmax t Proof: A T -slot sample path Lyapunov drift is defined by ∆T (Θt ) , L(Θt+T ) − L(Θt ). We upper bound it as follows  2 2 2 Zt+T − Zt2 + Hu,t+T − Hu,t ∆T (Θt ) = 2   2 2 2 µ Xt+T − Xt2 + Hd,t+T − Hd,t + 2  t+T X−1  ∆u ≤ Zt Qτ + Sr,τ − Dτ − To τ =t "t+T −1  #2 ∆u 1 X Qτ + Sr,τ − Dτ − + 2 τ =t To " #2 t+T t+T −1 X−1 1 X + Hu,t (γu,τ − xu,τ ) + (γu,τ − xu,τ ) 2 τ =t τ =t "t+T −1 #2 t+T X−1 µ X max max (dt − d ) + Xt (dτ − d )+ 2 τ =t τ =t "t+T −1 #2 t+T X−1 µ X + Hd,t (γd,τ − xd,τ ) + (γd,τ − xd,τ ) 2 τ =t τ =t  t+T X−1  ∆u ≤ Zt Qτ + Sr,τ − Dτ − To τ =t + Hu,t + Hd,t A PPENDIX D P ROOF OF L EMMA 1 t+T X−1 (γτ − xu,τ ) + Xt τ =t t+T X−1 t+T X−1 (dτ − dmax ) τ =t (γd,τ − xd,τ ) + GT 2 (44) τ =t Proof: Since µ, α and V are all positive weights, and Ci (γt )’s are assumed to be continuous, convex and nondecreasing functions with respect to γi,t with maximum ∗ derivatives Ci′ (Γi ) < ∞, for i = d, u, the optimal γi,t ’s are determined by examining the derivatives of the objective functions of P4a2 and P4b1 . Note that, given γu,t in (17) and γd,t in (19), Ci′ (γi,t ) ≥ 0 and increases with γi,t for i = d, u. For βi defined in Lemma 1, we have 1 ) For Hi,t ≥ 0: We have µd Hd,t + V αCd′ (γd,t ) > 0 and Hu,t +V Cu′ (γu,t ) > 0. Thus, the objectives of P4a2 and P4b1 are both monotonically increasing functions, and the minimum ∗ values are obtained with γi,t = 0 for i = d, u. ′ 2 ) For Hi,t < −V βCi (Γi ): Since V Ci′ (Γi ) ≥ V Ci′ (γi,t ) for i = d, u, we have µd Hd,t + V αCd′ (γd,t ) < 0 and Hu,t + V Cu′ (γu,t ) < 0. The objectives of P4a2 and P4b1 are both monotonically decreasing functions. From (19), the ∗ minimum objective value of P4a2 is reached with γd,t = Γd max max where Γd , min{dt , d }; The minimum objective value ∗ of P4b1 is reached with γu,t = Γu where by (17), we have Γu , min{Rmax , Dmax }; ∗ 3 ) For −V βi Ci′ (Γi ) ≤ Hi,t ≤ 0: In this case, γd,t and ′ ∗ γu,t are the roots of µd Hd,t + V αCd (γd,t ) = 0 and Hu,t +  where G is defined in Lemma 2. Assume To = M T . We consider a per-frame optimization problem below, with the objective of minimizing the timeaveraged system cost within the mth frame of length T time slots. 1 {at ,γt } T Pf : min (m+1)T −1 X [Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )] t=mT s.t (1), (4), (6), (9), (13) − (15), (17) − (20). We show that Pf is equivalent to P1 in which To is replaced by T . Let ufm denote the minimum objective value of Pf . The optimal solution of P1 satisfies all constraints of Pf and opt therefore is feasible to Pf . Thus, we have ufm ≤ um . By Jensen’s inequality and convexity of Ci (·) for i = d, u, we have Cd (γd ) ≥ Cd (γd ) = Cd (dw ) and Cu (γu ) ≥ Cu (γu ) = Cu (xu ). Note that introducing the auxiliary variables γu,t with constraints (17) and (18), and γd,t with constraints (19) and (20) does not modify the problem. This means ufm ≥ uopt m. Hence, we have ufm = uopt and P and P1 are equivalent. m f From (44) and the objective of Pf , we have the T -slot driftplus-cost metric for the mth frame upper bounded by H ∗ = Ci′−1 − V i,t V Cu′ (γu,t ) = 0, respectively. We have γi,t βi for i = d, u. ∗ Thus, we have γi,t for i = d, u as in (27). (m+1)T −1 ∆T (Θt ) + V X [Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )] t=mT 14 (m+1)T −1 ≤ Zt X ∆u Qt + Sr,t − Dt − To t=mT t+T X−1 + Hu,t  X + Xt Similarly, we have max (dτ − d ) τ =t t+T X−1 (γu,τ − xu,τ ) + GT 2 + Hd,t τ =t (m+1)T −1 +V t+T X−1 (γd,τ − xd,τ ) τ =t [Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )] . (45) t=mT Let {π̃t } denote a set of feasible solutions of Pf , satisfying the following relations  (m+1)T −1   (m+1)T X X −1  ∆u Q̃t + S̃r,t = D̃t + (46) To t=mT (m+1)T −1 (m+1)T −1 X γ̃i,t = X X d˜t ≤ t=mT t=mT (m+1)T −1 x̃i,t , for i = u, d (47) t=mT (m+1)T −1 t=mT X dmax (48) t=mT with the corresponding objective value denoted as ũfm . Note that comparing with P1, we impose per-frame constraints (46)-(48) as oppose to (16), (18), (20) and (3) for the To -slot period, respectively. Let δ ≥ 0 denote the gap of ũfm opt f to the optimal objective value uopt m , i.e., ũm = um + δ. Among all feasible control solutions satisfying (46)-(48), there exists a solution which leads to δ → 0. The upper bound in (45) can be rewritten as   (m+1)T −1 X ∆T (Θt ) + V  [Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )] t=mT  2 opt ≤ GT 2 + V T lim uopt m + δ = GT + V T um . δ→0 (49) Summing both sides of (49) over m for m = 0, . . . , M − 1, and dividing them by V M T , we have M−1 (m+1)T X −1 1 X [Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )] M T m=0 t=mT + M−1 GT 1 X opt L(ΘTo ) − L(Θ0 ) ≤ + u . V MT V M m=0 m (50) Since P Ci (γi ) ≤ Ci (γi ) for the convex function Ci (·) where To −1 γi,t for i = u, d, from (50), we have γi , T1o t=0 ! To −1 1 X Et Pt + xe + Cu (γu ) + αCd (γd ) To t=0 To −1 1 X [Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )] ≤ To t=0 (51) For a continuously differentiable convex function f (·), it satisfies f (x) ≥ f (y) + f ′ (y)(x − y). Applying this to Cu (xu ) and Cu (γu ), we have Cu (xu ) ≤ Cu (γu ) + Cu′ (xu )(xu − γu ) ≤ Cu (γu ) + Cu′ (Γu )(xu − γu ) Hu,To − Hu,0 = Cu (γu ) − Cu′ (Γu ) To (52) Cd (dw ) ≤ Cd (γd ) − Cd′ (Γd ) Hd,To − Hd,0 . To (53) Apply the inequalities in (52) and (53) to Cu (γu ) and Cd (γd ) respectively at LHS of (51), and combining (50) and (51), we have the bound of the objective value u∗ (V ) of P1 in (30) achieved by our proposed algorithm. To show the bound in (31), as To → ∞, it is suffice to show that both Hu,t and Hd,t in (30) are bounded. To show these bounds, we need to show that the one-slot Lyapunov drift in (35) is upper bounded as follows L(Θt+1 ) − L(Θt ) ≤ G. (54) To show the above bound for the drift, we choose an alternative feasible solution π̃ t satisfying the following per slot relations: u i) Q̃t + S̃r,t = D̃t + ∆ To ; ii) γ̃i,t = x̃i,t , for i = u, d; and iii) d˜t ≤ dmax . With these relations, and by choosing d˜t = dmax , the terms at RHS of (36), (38), (40) and (41) become zeros, and we have (54). Averaging (54) over To -slot period, we have T1o [L(ΘTo ) − L(Θ0 )] ≤ G. For any initial value of L(Θ0 ) < +∞, by (26), we have  1  2 L(Θ0 ) 2 2 . (55) + µ XT2o + Hd,T Z + Hu,T ≤G+ o o 2To To To p 2Tp It follows that Hu,To ≤ o G + 2L(Θ0 ) and Hd,To ≤ p (2To G + 2L(Θ0 ))/µ. Since 2To G + 2L(Θ0 )/To → 0 as To → ∞, for any initial values of Hu,0 and Hd,0 , the third term in RHS of (30) goes to zero. Thus, we have (31). P ROOF A PPENDIX F OF P ROPOSITION 3 Proof: To prove ǫd is bounded, we note that |XTo | + |X0 | |XTo − X0 | ≤ . (56) T0 T0 p From (55), it follows that |XTo | ≤ (2To G + 2L(Θ0 ))/µ. Substituting the above upper bound of |XTo | in (56), we have (32). |ǫd | = R EFERENCES [1] T. Li and M. Dong, “Real-time joint energy storage management and load scheduling with renewable integration,” in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), Mar. 2016. [2] A. Castillo and D. F. Gayme, “Grid-scale energy storage applications in renewable energy integration: A survey,” Energy Convers. Manag., vol. 87, pp. 885–894, Nov. 2014. [3] D. Callaway and I. Hiskens, “Achieving controllability of electric loads,” Proc. IEEE, vol. 99, pp. 184–199, Jan. 2011. [4] H.-I. Su and A. El Gamal, “Modeling and analysis of the role of energy storage for renewable integration: Power balancing,” IEEE Trans. Power Syst., vol. 28, no. 4, pp. 4109–4117, Nov. 2013. [5] S. Sun, M. Dong, and B. Liang, “Real-time welfare-maximizing regulation allocation in dynamic aggregator-EVs system,” IEEE Trans. Smart Grid, vol. 5, no. 3, pp. 1397–1409, May 2014. [6] ——, “Real-time power balancing in electric grids with distributed storage,” IEEE J. Sel. Topics Signal Process., vol. 8, no. 6, pp. 1167– 1181, Dec. 2014. [7] Y. Wang, X. Lin, and M. Pedram, “Adaptive control for energy storage systems in households with photovoltaic modules,” IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 992–1001, Mar. 2014. [8] M. Lin, A. Wierman, L. L. H. Andrew, and E. Thereska, “Dynamic rightsizing for power-proportional data centers,” IEEE/ACM Trans. Netw., vol. 21, no. 5, pp. 1378–1391, Oct. 2013. 15 [9] Y. Zhang and M. van der Schaar, “Structure-aware stochastic storage management in smart grids,” IEEE J. Sel. Topics Signal Process., vol. 8, no. 6, pp. 1098–1110, Dec. 2014. [10] R. Urgaonkar, B. Urgaonkar, M. J. Neely, and A. Sivasubramaniam, “Optimal power cost management using stored energy in data centers,” in Proc. ACM SIGMETRICS, Jun. 2011, pp. 115–120. [11] L. Huang, J. Walrand, and K. Ramchandran, “Optimal demand response with energy storage management,” in Proc. 3rd IEEE Int. Smart Grid Commun. (SmartGridComm), Nov. 2012, pp. 61–66. [12] S. Salinas, M. Li, P. Li, and Y. Fu, “Dynamic energy management for the smart grid with distributed energy resources,” IEEE Trans. Smart Grid, vol. 4, no. 4, pp. 2139–2151, Dec. 2013. [13] T. Li and M. Dong, “Online control for energy storage management with renewable energy integration,” in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), May 2013, pp. 5248–5252. [14] ——, “Real-time energy storage management with renewable integration: Finite-time horizon approach,” IEEE J. Select. Areas Commun., vol. 33, no. 12, pp. 2524–2539, Dec. 2015. [15] M. J. Neely, Stochastic Network Optimization with Application to Communication and Queueing Systems. USA: Morgan & Claypool, 2010. [16] C. Chen, J. Wang, and S. Kishore, “A distributed direct load control approach for large-scale residential demand response,” IEEE Trans. Power Syst., vol. 29, no. 5, pp. 2219–2228, Sep. 2014. [17] M. He, S. Murugesan, and J. Zhang, “A multi-timescale scheduling approach for stochastic reliability in smart grids with wind generation and opportunistic demand,” IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 521–529, Mar. 2013. [18] I. Koutsopoulos and L. Tassiulas, “Optimal control policies for power demand scheduling in the smart grid,” IEEE J. Sel. Areas Commum., vol. 30, no. 6, pp. 1049–1060, Jul. 2012. [19] C. Joe-Wong, S. Sen, S. Ha, and M. Chiang, “Optimized day-ahead pricing for smart grids with device-specific scheduling flexibility,” IEEE J. Sel. Areas Commum., vol. 30, no. 6, pp. 1075–1085, Jul. 2012. [20] P. Samadi, A. H. Mohsenian-Rad, R. Schober, V. W. S. Wong, and J. Jatskevich, “Optimal real-time pricing algorithm based on utility maximization for smart grid,” in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Oct. 2010, pp. 415–420. [21] A. H. Mohsenian-Rad and A. Leon-Garcia, “Optimal residential load control with price prediction in real-time electricity pricing environments,” IEEE Trans. Smart Grid, vol. 1, no. 2, pp. 120–133, Sep. 2010. [22] P. Du and N. Lu, “Appliance commitment for household load scheduling,” IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 411–419, Jun. 2011. [23] S. Kishore and L. V. Snyder, “Control mechanisms for residential electricity demand in smartgrids,” in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Oct. 2010, pp. 443–448. [24] T. T. Kim and H. V. Poor, “Scheduling power consumption with price uncertainty,” IEEE Trans. Smart Grid, vol. 2, no. 3, pp. 519–527, Sep. 2011. [25] T. H. Chang, M. Alizadeh, and A. Scaglione, “Real-time power balancing via decentralized coordinated home energy scheduling,” IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1490–1504, Sep. 2013. [26] P. Yi, X. Dong, A. Iwayemi, C. Zhou, and S. Li, “Real-time opportunistic scheduling for residential demand response,” IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 227–234, Mar. 2013. [27] A. H. Mohsenian-Rad, V. W. S. Wong, J. Jatskevich, R. Schober, and A. Leon-Garcia, “Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid,” IEEE Trans. Smart Grid, vol. 1, no. 3, pp. 320–331, Dec. 2010. [28] B. G. Kim, S. Ren, M. van der Schaar, and J. W. Lee, “Bidirectional energy trading and residential load scheduling with electric vehicles in the smart grid,” IEEE J. Select. Areas Commun., vol. 31, no. 7, pp. 1219–1234, Jul. 2013. [29] S. Chen, N. B. Shroff, and P. Sinha, “Heterogeneous delay tolerant task scheduling and energy management in the smart grid with renewable energy,” IEEE J. Sel. Areas Commum., vol. 31, no. 7, pp. 1258–1267, Jul. 2013. [30] Y. Huang, S. Mao, and R. M. Nelms, “Adaptive electricity scheduling in microgrids,” IEEE Trans. Smart Grid, vol. 5, no. 1, pp. 270–281, Jan. 2014. [31] S. Sun, M. Dong, and B. Liang, “Distributed real-time power balancing in renewable-integrated power grids with storage and flexible loads,” IEEE Trans. Smart Grid, vol. PP, no. 99, pp. 1–1, 2015. [32] P. Ramadass, B. Haran, R. White, and B. N. Popov, “Performance study of commercial licoo2 and spinel-based li-ion cells,” J. Power Sources, vol. 111, pp. 210–220, Sep. 2002. [33] Z. Ma, S. Zou, and X. Liu, “A distributed charging coordination for large-scale plug-in electric vehicles considering battery degradation [34] [35] [36] [37] [38] [39] [40] cost,” IEEE Trans. Control Syst. Technol., vol. 23, no. 5, pp. 2044–2052, Sep. 2015. N. Michelusi, L. Badia, R. Carli, L. Corradini, and M. Zorzi, “Energy management policies for harvesting-based wireless sensor devices with battery degradation,” IEEE Trans. Commun., vol. 61, no. 12, pp. 4934– 4947, Dec. 2013. I. Duggal and B. Venkatesh, “Short-term scheduling of thermal generators and battery storage with depth of discharge-based cost model,” IEEE Trans. Power Syst., vol. 30, no. 4, pp. 2110–2118, Jul. 2015. Y. Guo, M. Pan, Y. Fang, and P. P. Khargonekar, “Decentralized coordination of energy utilization for residential households in the smart grid,” IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1341–1350, Sep. 2013. Z. Ma, S. Zou, and X. Liu, “A distributed charging coordination for large-scale plug-in electric vehicles considering battery degradation cost,” IEEE Trans. Control Syst. Technol., vol. 23, no. 5, pp. 2044–2052, Sep. 2015. M. J. Neely, “Universal scheduling for networks with arbitrary traffic, channels, and mobility,” Tech. Rep. arXiv: 1001.0960v1, Jan. 2010. T. Li and M. Dong, “Real-time energy storage management with renewable energy of arbitrary generation dynamics,” in Proc. of Asilomar Conf. on Signals, Systems and Computers, Nov. 2013, pp. 1714–1718. Ontario Energy Board (2012). Electricity Price. [Online]. Available: http://www.ontarioenergyboard.ca/OEB/Consumers/Electricity Tianyi Li (S’11) received the B.S degrees in communication engineering from North China University of Technology, Beijing, China, and in telecommunication engineering technology from Southern Polytechnic State University, Marietta, GA, USA both in 2009, and the M.Sc degree in electrical engineering from Northwestern University, Evanston, IL, USA in 2011. He obtained his Ph.D degree in 2015 from the Department of Electrical, Computer and Software Engineering, University of Ontario Institute of Technology, Oshawa, Ontario, Canada, and currently is a research associate in the same university. He received the best student paper in the Technical Track of Signal Processing for Communications and Networking (SP-COM) at IEEE ICASSP in 2016. His research interests include stochastic optimization and control in energy storage management and demand side management of smart grid. Min Dong (S’00-M’05-SM’09) received the B.Eng. degree from Tsinghua University, Beijing, China, in 1998, and the Ph.D. degree in electrical and computer engineering with minor in applied mathematics from Cornell University, Ithaca, NY, in 2004. From 2004 to 2008, she was with Corporate Research and Development, Qualcomm Inc., San Diego, CA. In 2008, she joined the Department of Electrical, Computer and Software Engineering at University of Ontario Institute of Technology, Ontario, Canada, where she is currently an Associate Professor. She also holds a status-only Associate Professor appointment with the Department of Electrical and Computer Engineering at University of Toronto. Her research interests are in the areas of statistical signal processing for communication networks, cooperative communications and networking techniques, and stochastic network optimization in dynamic networks and systems. Dr. Dong received the Early Researcher Award from Ontario Ministry of Research and Innovation in 2012, the Best Paper Award at IEEE ICCC in 2012, and the 2004 IEEE Signal Processing Society Best Paper Award. She is a co-author of the best student paper in the Technical Track of Signal Processing for Communications and Networking (SP-COM) at IEEE ICASSP in 2016. She served as an Associate Editor for the IEEE TRANSACTIONS ON SIGNAL PROCESSING (2010-2014), and as an Associate Editor for the IEEE SIGNAL PROCESSING LETTERS (2009-2013). She was a symposium lead co-chair of the Communications and Networks to Enable the Smart Grid Symposium at the IEEE International Conference on Smart Grid Communications (SmartGridComm) in 2014. She has been an elected member of IEEE Signal Processing Society Signal Processing for Communications and Networking (SP-COM) Technical Committee since 2013.
3cs.SY
Suelen Gasparin Pontifical Catholic University of Paraná, Brazil Julien Berger Pontifical Catholic University of Paraná, Brazil Denys Dutykh arXiv:1701.07059v3 [cs.CE] 28 Mar 2017 CNRS, Université Savoie Mont Blanc, France Nathan Mendes Pontifical Catholic University of Paraná, Brazil Stable explicit schemes for simulation of nonlinear moisture transfer in porous materials arXiv.org / hal Last modified: March 29, 2017 Stable explicit schemes for simulation of nonlinear moisture transfer in porous materials Suelen Gasparin∗, Julien Berger, Denys Dutykh, and Nathan Mendes Abstract. Implicit schemes have been extensively used in building physics to compute the solution of moisture diffusion problems in porous materials for improving stability conditions. Nevertheless, these schemes require important sub-iterations when treating nonlinear problems. To overcome this disadvantage, this paper explores the use of improved explicit schemes, such as Dufort–Frankel, Crank–Nicolson and hyperbolisation approaches. A first case study has been considered with the hypothesis of linear transfer. The Dufort–Frankel, Crank–Nicolson and hyperbolisation schemes were compared to the classical Euler explicit scheme and to a reference solution. Results have shown that the hyperbolisation scheme has a stability condition higher than the standard Courant-Friedrichs-Lewy (CFL) condition. The error of this schemes depends on the parameter τ representing the hyperbolicity magnitude added into the equation. The Dufort–Frankel scheme has the advantages of being unconditionally stable and is preferable for nonlinear transfer, which is the three others cases studies. Results have shown the error is proportional to O(∆t) . A modified Crank–Nicolson scheme has been also studied in order to avoid sub-iterations to treat the nonlinearities at each time step. The main advantages of the Dufort–Frankel scheme are (i) to be twice faster than the Crank–Nicolson approach; (ii) to compute explicitly the solution at each time step; (iii) to be unconditionally stable and (iv) easier to parallelise on high-performance computer systems. Although the approach is unconditionally stable, the choice of the time discretisation ∆t remains an important issue to accurately represent the physical phenomena. Key words and phrases: moisture diffusion; numerical methods; finite differences; explicit schemes; CFL condition; Dufort–Frankel scheme MSC: [2010] 35R30 (primary), 35K05, 80A20, 65M32 (secondary) PACS: [2010] 44.05.+e (primary), 44.10.+i, 02.60.Cb, 02.70.Bf (secondary) Key words and phrases. moisture diffusion; numerical methods; finite differences; explicit schemes; CFL condition; Dufort–Frankel scheme. ∗ Corresponding author. Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2 Moisture transfer in porous materials . . . . . . . . . . . . . . . . . . . . . . . 6 3 Numerical schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.1 The Crank–Nicolson scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2 The Euler explicit scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.3 Improved explicit scheme: Dufort–Frankel method . . . . . . . . . . . . . . . . . . . . . . . 10 3.4 Hyperbolisation scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Dispersion relation analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Error estimate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Discretisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.5 Validation of the numerical solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 4 Numerical application: linear transfer . . . . . . . . . . . . . . . . . . . . . . 14 5 Extension for nonlinear transfer . . . . . . . . . . . . . . . . . . . . . . . . . . 16 5.1 The modified Crank–Nicolson scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 5.2 The Dufort–Frankel scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 5.3 Numerical application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 5.4 Further nonlinear case studies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Driving rain case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Capillary adsorption case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Results and discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 A Stability analysis of the Dufort–Frankel scheme . . . . . . . . . . . . . . . . 30 B Dimensionless parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 B.1 Case from Section 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 B.2 Case from Section 5.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 B.3 Case from Section 5.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 S. Gasparin, J. Berger, D. Dutykh & N. Mendes References 4 / 34 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 5 / 34 Stable explicit schemes 1. Introduction Excessive levels of moisture may lead to mould growth and may affect the indoor air quality, the thermal comfort of the occupants and HVAC energy consumption and demand. Moreover, it can deteriorate building façades and decrease envelope durability [3, 11]. Assessment of relative humidity in constructions is also important for management and performance of HVAC systems. Models for moisture transfer in porous building materials have been implemented as building simulation tools since the nineties in software such as Delphin [2], MATCH [25], MOIST [4], WUFI [9] and UMIDUS [17, 19] among others. Moisture models have also been implemented in whole-building simulation tools and tested in the frame of the International Energy Agency Annex 41, which reported on most of detailed models and their successful applications for accurate assessment of hygrothermal transfer in buildings [32]. Moisture transfer is represented by a diffusion equation, formulated as: ∂u = ∇ · ( ν ∇u ) , ∂t associated to boundary and initial conditions, where ν is the diffusion of the material and where u (x, t) is the moisture potential being diffused in the spatial domain Ω x during the time interval Ω t .We denote ∆x and ∆t the spatial and time discretisation within those the domains. Due to the nonlinearities of the material properties and due to the nonperiodicity of the boundary conditions, the models use numerical techniques to compute the moisture content from the partial differential governing equation. Due to its property of unconditional stability, the Euler implicit scheme has been used in many works reported in the literature [2, 9, 12, 13, 18, 26, 28]. However, it has the order of accuracy O (∆t + ∆x 2 ) , while the Crank–Nicolson scheme can be used to increase the accuracy to O (∆t 2 + ∆x 2 ) . For the same time and space discretisation, numerical results obtained with this scheme are more accurate than those obtained from Euler implicit scheme. The Crank–Nicolson scheme has been implemented for instance in [31]. Nevertheless, at every time step, one has to use a tridiagonal solver to invert the linear system of equations to determine the solution value at the following time layer. For instance in [18], a multi-tridiagonal matrix algorithm has been developed to compute the solution of coupled equations of nonlinear heat and moisture transfer, using an Euler implicit scheme. Furthermore, when dealing with nonlinearities of the material properties for instance, one has to perform sub-iterations to linearise the system, increasing thus the total number of iterations. In [12], thousands of iterations are required to converge to the solution of a mass diffusion problem. On the other hand, an explicit scheme enables a direct computation of the the solution at the following time layer. Some examples of works based on explicit schemes can be found in the literature as [16, 29]. Nevertheless, this scheme is conditionally stable under S. Gasparin, J. Berger, D. Dutykh & N. Mendes 6 / 34 the Courant–Friedrichs–Lewy (CFL) condition: 1 ∆t 6 ∆x 2 . 2ν The CFL condition is restrictive for fine discretisations, explaining why few works have used this approach in building physics. This paper is devoted to explore the use of improved explicit schemes to overcome the instability limitation of the standard explicit scheme. The proposed schemes are evaluated to solve nonlinear transfer of moisture in porous material. The advantages and drawbacks are discussed for two numerical applications. Next Section aims at describing the physical phenomena of moisture transfer in porous material. In Section 3, basics of the Dufort–Frankel and the hyperbolisation explicit schemes, are detailed. Then, linear and nonlinear moisture transfer cases are considered to verify the features of the proposed approaches. 2. Moisture transfer in porous materials The physical problem involves one-dimension moisture diffusion through a porous material defined by the spatial domain Ω x = [ 0, L ]. The moisture transfer occurs according to the liquid and vapour diffusion. The physical problem can be formulated as [12]:   ∂P c ∂ ∂P v ∂ρ l+v kl , (2.1) = + kv ∂t ∂x ∂x ∂x where ρ l+v is the volumetric moisture content of the material and k v and k l , the vapour and liquid permeabilities. Eq. (2.1) can be written using the vapour pressure P v as the driving potential. For this, we consider the physical relation, known as the Kelvin equation, between P v and P c :   Pv P c = R v · T · ln P s (T ) Rv T ∂P c = . ∂P v Pv Thus we have: ∂P c ∂P v ∂P c ∂T ∂P c = · + · . ∂x ∂P v ∂x ∂T ∂x As we consider the mass transfer under isothermal conditions, the second term vanishes and we obtain: ∂P c R v T ∂P v = · . ∂x Pv ∂x In addition, we have: ∂ρ l+v ∂φ ∂P v ∂ρ l+v ∂T ∂ρ l+v ∂φ ∂P v ∂ρ l+v = · · + · ≃ · · . ∂t ∂φ ∂P v ∂t ∂T ∂t ∂φ ∂P v ∂t 7 / 34 Stable explicit schemes Considering the relation ρ l+v = f(φ) = f(P v , T ) , obtained from material properties and from the relation between the vapour pressure P v and the relative humidity φ , we get: ∂ρ l+v 1 ∂P v = f ′ (P v ) . ∂t P s ∂t Eq. (2.1) can be therefore rewritten as:   ∂P  1 ∂P v ∂  Rv T v f (P v ) kl . = + kv P s ∂t ∂x Pv ∂x ′ (2.2) The material properties f ′ (P v ), k l and k v depend on the vapour pressure P v . At the material bounding surfaces, Robin-type boundary conditions are considered:   Rv T kl + kv Pv   Rv T + kv − kl Pv  ∂P v = h vL · P v − P vL − g lL , ∂x  ∂P v = h vR · P v − P vR − g lR , ∂x x = 0, (2.3) x = L, (2.4) where P vL and P vR are the vapour pressure of the ambient air, g lL and g lR are the liquid flow (driving rain) at the two bounding surfaces. We consider a uniform vapour pressure distribution as initial condition: P v = P vi , t = 0. (2.5) While performing a mathematical and numerical analysis of a given practical problem, it is of capital importance to obtain a unitless formulation of governing equations, due to a number of good reasons. First of all, it enables to determine important scaling parameters (Biot numbers for instance). Henceforth, solving one dimensionless problem is equivalent to solve a whole class of dimensional problems sharing the same scaling parameters. Then, dimensionless equations allow to estimate the relative magnitude of various terms, and thus, eventually to simplify the problem using asymptotic methods [21]. Finally, the floating point arithmetics is designed such as the rounding errors are minimal if you manipulate the numbers of the same magnitude [15]. Moreover, the floating point numbers have the highest density in the interval (0, 1) and their density decays exponentially when we move further away from zero. So, it is always better to manipulate numerically the quantities at the order of O(1) to avoid severe round-off errors and to likely improve the conditioning of Rv T + k v as a global moisture the problem in hands. Therefore, we denote d m = k l · Pv 1 as the moisture storage coefficient and define the transport coefficient, c m = f ′ (P v ) Ps 8 / 34 S. Gasparin, J. Berger, D. Dutykh & N. Mendes following dimensionless quantities: u = Pv , P vi uR = P vR , P vi uL = P vL , P vi x⋆ = t⋆ = t , t0 ⋆ cm = c m · L2 , d 0m · t 0 ⋆ dm = dm , d 0m Bi Lv = Bi R v = hR v ·L , d 0m g l,⋆ L = g lL · L , 0 ·Pi dm v g l,⋆ R = x , L h Lv · L , d 0m g lR · L . 0 ·Pi dm v In this way, the dimensionless governing equations are then written as: c ⋆m ⋆ dm −d ⋆m ∂ ∂u = ⋆ ∂t ∂x ⋆  d ⋆m ∂u ∂x ⋆  ,  ∂u L L = Bi · u − u − g l,⋆ L , v ⋆ ∂x  ∂u R R = Bi · u − u − g l,⋆ R , v ⋆ ∂x u = 1, t⋆ > 0 , x⋆ ∈ t⋆ > 0 , x⋆ = 0 , (2.6b) t⋆ > 0 , x⋆ = 1 ,   x ⋆ ∈ 0, 1 . (2.6c) t⋆ = 0 ,   0, 1 , (2.6a) (2.6d) 3. Numerical schemes In order to describe numerical schemes, let us consider a uniform discretisation of the interval Ω x Ωh : Ωh = N −1 [ [ x j , x j+1 ] , j =0 xj+1 − x j ≡ ∆x , ∀j ∈  0, 1, . . . , N − 1 . The time layers are uniformly spaced as well t n = n ∆t , ∆t = const > 0 , n = def 0, 1, 2, . . . , N t The values of function u(x, t) in discrete nodes will be denoted by u jn := u (x j , t n ) . For the sake of simplicity and without loosing the generality, the numerical schemes are d⋆ explained considering d ⋆m and c ⋆m as constant, noting ν = ⋆m and the linear diffusion cm equation: ∂u = ∇ · ( ν ∇u ) . ∂t (3.1) 9 / 34 Stable explicit schemes (a) Euler Explicit (b) Crank–Nicolson (c) Dufort–Frankel (d) Hyperbolisation Figure 1. Stencils of the numerical schemes. 3.1. The Crank–Nicolson scheme A very useful method was proposed by Crank & Nicolson (CN) and it can be successfully applied to the diffusion equation (3.1) as well: n+1 n+1 n u j−1 − 2 u jn + u nj+1 u j−1 − 2 u jn+1 + u j+1 u jn+1 − u jn = ν + ν , ∆t 2 ∆x 2 2 ∆x 2 j = 1, . . . , N − 1 , n ≥ 0 . (3.2) This scheme is O(∆t2 + ∆x 2 ) accurate and unconditionally stable. That is why numerical results obtained with the CN scheme will be more accurate than implicit scheme predictions. The stencil of this scheme is depicted in Figure 1(b). The CN scheme has all advantages and disadvantages (except for the order of accuracy in time) of the implicit scheme. At every time step one has to use a tridiagonal solver to invert the linear system of equations to determine solution value at the following time layer t = t n+1 . S. Gasparin, J. Berger, D. Dutykh & N. Mendes 10 / 34 3.2. The Euler explicit scheme The standard explicit scheme can be written as: n u jn+1 − u nj u j−1 − 2 u jn + u nj+1 = ν , j = 1, . . . , N − 1 , n > 0 . (3.3) ∆t ∆x 2 The stencil of this scheme is depicted in Figure 1(a). This discretisation is completed using the two boundary conditions: u 0n+1 = ψ L (t n+1 , u n+1 , ...), 1 n+1 n+1 uN = ψ R (t n+1 , u N −1 , . . . ) , where functions ψ l, r ( • ) may depend on adjacent values of the solution whose number depends on the approximation order of the scheme (here we use the second order in space). For instance, for the left boundary conditions, we have  −3 u 0n+1 + 4 u 1n+1 − u 2n+1 d ⋆m = Bi Lv · u 0n+1 − u L − g l,⋆ L . 2 ∆x By solving Eq. (3.3) with respect to u jn+1, we obtain a discrete dynamical system  ∆t n n n u − 2 u + u , u jn+1 = u nj + ν j−1 j j+1 ∆x 2 whose starting value is directly obtained from the initial condition: u j0 = 1 . It is well-known that scheme (3.3) approximates the continuous operator to order O(∆t + ∆x 2 ) . The explicit scheme is conditionally stable under the following CFL-type condition: 1 ∆t 6 ∆x 2 . (3.4) 2ν Unfortunately, this condition is too restrictive for sufficiently fine discretisations. 3.3. Improved explicit scheme: Dufort–Frankel method Using the so-called Dufort–Frankel method, the numerical scheme is expressed as:  n n u jn+1 − u jn−1 u j−1 − u jn−1 + u jn+1 + u j+1 = ν , j = 1, . . . , N − 1 , n > 0, 2 ∆t ∆x 2 (3.5) where the term 2 u jn is replaced by u jn−1 + u jn+1. The scheme (3.5) has the stencil depicted in Figure 1(c). At first glance, the scheme (3.5) looks like an implicit scheme, however, it is not truly the case. Eq. (3.5) can be easily solved for u jn+1 to give the following discrete dynamical system:  1 − λ n−1 λ n u jn+1 = u nj+1 + u j−1 , uj + 1 + λ 1 + λ 11 / 34 Stable explicit schemes where: ∆t . ∆x 2 The standard von Neumann stability analysis (detailed in the Appendix) shows that the Dufort–Frankel scheme is unconditionally stable. The consistency error analysis of the scheme (3.5) shows the following result: def λ := 2 ν L nj = ν where 3 ∆t 2 ∂ 2 u ∂u ∂2u 2 ∂ u 1 ∆t + − ν + 6 ∆x 2 ∂t2 ∂t ∂x2 ∂t3  ∆t 4  4 ∂3 ∂2u 2 ∂ u 2 1 1 − 12 ν ∆t ∆x 3 2 + O , (3.6) − 12 ν ∆x ∂x4 ∂x ∂t ∆x 2  n u nj−1 − u jn−1 + u n+1 + u j+1 u jn+1 − u jn−1 j − ν . 2 ∆t ∆x 2 So, from the asymptotic expansion for L nj we obtain that the Dufort–Frankel scheme is second order accurate in time and: • First order accurate in space if ∆t ∝ ∆x 3/2 • Second order accurate in space if ∆t ∝ ∆x 2 It is important to note that the boundary condition have to be discretised to the second order of accuracy O(∆x 2 ) to maintain the method features uniformly. def L nj := 3.4. Hyperbolisation scheme From Eq. (3.6), it can be noted that the Dufort–Frankel scheme is unconditionally consistent with the so-called hyperbolic heat conduction equation. Thus, the scheme is a hidden way to add a small amount of ’hyperbolicity’ into the model (3.1). In this Section we shall invert the order of operations: first, we perturb Eq. (3.1) in an ad-hoc way and only after we discretise it with a suitable method. We consider the 1−dimension Eq. (3.1) perturbed by adding a low magnitude term containing the second derivative in time: ∂u ∂2u ∂2u + = ν . (3.7) ∂t2 ∂t ∂x2 This is the hyperbolic diffusion equation already familiar to us since it appeared in the consistency analysis of the Dufort–Frankel scheme. Here we perform a singular perturbation by assuming that τ ∂2u ∂u k ≪ k k. ∂t2 ∂t The last condition physically means that the new term has only limited influence on the solution of Eq. (3.7). Here τ is a small ad-hoc parameter whose value is in general related to physical and discretisation parameters τ = τ (ν, ∆x, ∆t) . One can notice Eq. (3.7) requires two initial conditions to obtain a well-posed initial value problem. However, the parabolic Eq. (3.1) is only first order in time and it only kτ 12 / 34 S. Gasparin, J. Berger, D. Dutykh & N. Mendes requires the knowledge of the initial temperature field distribution. When we solve the hyperbolic Eq. (3.7), the missing initial condition is simply chosen to be ∂u = 0, ∂t t = 0. 3.4.1 Dispersion relation analysis The classical dispersion relation analysis looks at plane wave solutions: u(x, t) = u 0 e i (κ x − ω t) . (3.8) By substituting this solution ansatz into Eq. (3.1) we obtain the following relation between wave frequency ω and wavenumber k : ω(κ) = − i ν κ 2 . (3.9) The last relation is called the dispersion relation even if the diffusion Eq. (3.1) is not dispersive but dissipative. The real part of ω contains information about wave propagation properties (dispersive if Re ω(κ) 6= const and non-dispersive otherwise) while the imaginary κ part describes how different modes κ dissipate (if Im ω(κ) < 0) or grow (if Im ω(κ) > 0 ). The dispersion relation (3.9) gives the damping rate of different modes. The same plane wave ansatz (3.8) can be substituted into the hyperbolic heat Eq. (3.7) as well to give the following implicit relation for the wave frequency ω : − τ ω2 − i ω + ν κ2 = 0 . By solving this quadratic equation with complex coefficients for ω , we obtain two branches: √ − i ± 4 ν κ2 τ − 1 ω ± (κ) = . 2τ This dispersion relation will be analysed asymptotically with τ ≪ 1 being the small parameter. The branch ω − (κ) is not of much interest to us since it is constantly damped, i.e. i + O(1) . ω − (κ) = − τ It is much more instructive to look at the positive branch ω + (κ) :   ω + (κ) = − i ν κ 2 1 + ν κ 2 τ + 2 ν 2 κ 4 τ 2 + O(τ 3 ) . The last asymptotic expansion shows that for small values of parameter τ , we obtain a valid asymptotic approximation of the dispersion relation (3.9) for the diffusion equation (3.1). 13 / 34 Stable explicit schemes 3.4.2 Error estimate It is legitimate to ask the question how far the solutions u h (x, t) of the hyperbolic equation (3.7) are from the solutions u p (x, t) of the parabolic diffusion equation (3.1) (for the same initial condition). This question for the initial value problem was studied in [20] and we shall provide here only the obtained error estimate. Let us introduce the difference between two solutions: def δu (x, t) := u h (x, t) − u p (x, t) . Then, the following estimate holds √   4  √ 2  2 π2 | δu (x, t) | ≤ τ M 1 + √ 8 2τ + T , π 2 where T > 0 is the time horizon and ∂ 2u p def (ξ, ζ) , M := sup ∂ t2 Ω ξ, ζ and the domain Ω ξ, ζ is defined as n def Ω ξ, ζ := (ξ, ζ) : 0 ≤ ζ ≤ t , t − ζ t − ζo x − √ . ≤ ξ ≤ x + √ τ τ 3.4.3 Discretisation Eq. (3.7) is discretised on the stencil depicted in Figure 1(d): def L nj := τ n n u jn+1 − u jn−1 u jn+1 − 2 u jn + u jn−1 u j+1 − 2 u jn + u j−1 + − ν = 0, ∆t 2 2 ∆t ∆x 2 j = 1, . . . , N − 1 , n > 0 , (3.10) Using the standard Taylor expansions, it can be proven that the scheme is consistent with hyperbolic heat Eq. (3.7) to the second order in space and in time O(∆t 2 + ∆x 2 ) . The stability of the scheme (3.10) was studied in [7] and the following stability condition was obtained: r ∆t τ 6 . (3.11) ∆x ν The choice of parameter τ is therefore an important issue and will be discussed in next Sections. 3.5. Validation of the numerical solution One possible comparison of the numerical schemes can be done by computing the L ∞ error between the solution u num and a reference solution u ref : def ε := u ref − u num ∞ (3.12a) S. Gasparin, J. Berger, D. Dutykh & N. Mendes 14 / 34 The computation of the reference solution is detailed in further Sections. 4. Numerical application: linear transfer A first case of linear moisture transfer is considered. From a physical point of view, the numerical values correspond to a material length L = 0.1 m. The moisture properties are d m = 1.97 · 10−10 s and c m = 7.09 · 10−3 kg/m3 /Pa. The initial vapour pressure in the material is considered uniform P vi = 1.16 · 103 Pa , corresponding to a relative humidity of 50%. The reference time is t 0 = 1 h, thus the total time of simulation corresponds to 120 hours, or five days. The boundary conditions, represented by the relative humidity φ are given in Figure 2. The sinusoidal variations oscillates between dry and moist state during the 120 hours. The convective vapour coefficients are set to 2 · 10−7 s/m and 3 · 10−8 s/m for the left and right boundary conditions, respectively. As the readers may be interested in testing the numerical schemes proposed, in the present paper dimensionless values are provided in Appendix B. The solution of the problem has been first computed for a discretisation ∆x = 10−2 and ∆t = 10−4 , respecting the CFL condition ∆t 6 4.3 · 10 −4. For the hyperbolisation scheme, τ = ∆t. The physical phenomena are thus well represented, as illustrated in Figure 3(a) with the time evolution of the vapour pressure at x = 0. The variations follow the ones of the left boundary conditions. It can be noted a good agreement between the four numerical schemes. Furthermore, the vapour pressure profile is shown in Figure 3(b) for t = 19 h and t = 52 h , corresponding to the highest and lowest vapour pressure values. All the numerical methods give accurate results as illustrated with the L2 error calculated as a function of x in Figure 4. The error for the hyperbolisation method is lower than the others. Indeed the hyperbolisation numerical scheme is of the order O(∆t2 ) and the numerical solution is therefore more accurate. A numerical analysis of the behaviour of the four numerical schemes has been carried out for different values of the temporal discretisation ∆t. The spatial discretisation is maintained to ∆x = 10−2 and τ = ∆t for the hyperbolisation scheme. The reference solution has been computed using the Matlab open source package Chebfun [8]. Using the function pde23t, it enables to compute a numerical solution of a partial derivative equation using the Chebyshev functions. Results of the L 2 error ε are shown in Figure 5(a). Before the CFL limit, the errors of the Euler, Dufort–Frankel and hyperbolisation schemes are proportional to O(∆t). As expected, the Euler scheme enables to compute the solution as far the CFL condition is respected. Above this limit, the solution diverges. After the CFL limit, as unconditionally stable, the Dufort–Frankel scheme computes the solution. An interesting point is that the error is proportional to O(∆t2 ). The error of the Dufort–Frankel scheme computed solution becomes too high for ∆t > 3 · 10 −2 . 3 For this case, ∆t ∝ ∆x 2 , therefore, the Dufort–Frankel scheme is first order accurate in space O(∆x), explaining why the error is lower for the hyperbolisation scheme. As the Euler scheme, the hyperbolisation scheme has a stability condition to respect as reported in Eq. (3.11). For the case τ = ∆t, it corresponds to ∆t 6 9 · 10 −4 . This limit 15 / 34 Stable explicit schemes lef t right 1.2 Φ (-) 1 0.8 0.6 0.4 0.2 0 0 20 40 60 t (h) 80 100 120 Figure 2. Boundary conditions. 3500 C heb. Euler Duf ort H yp. 3000 2000 t = 19h 2500 P v (Pa) P v (Pa) 1500 2000 1500 1000 C heb. Euler Duf ort H yp. 1000 500 t = 53h 500 0 0 20 40 60 t (h) (a) 80 100 120 0 0 0.02 0.04 0.06 x (m) 0.08 0.1 (b) Figure 3. Vapour pressure time evolution at x = 0 m (a) and profiles for t ∈ {19, 53} h (b). is higher than the CFL condition for the Euler scheme. The error of the hyperbolisation scheme varies with the choice of the parameter τ . Figure 5(b) gives the variation of the error ε, for the hyperbolisation scheme, as a function of ∆t, for different values of parameter τ . The error ε reaches a limit lower than the parameter τ . It can be verified that for the 3 choice τ = ν ∆x , the stability condition corresponds to ∆x 2 . For this case, the choice τ 6 ∆t permits to compute the solution with the best accuracy. 16 / 34 S. Gasparin, J. Berger, D. Dutykh & N. Mendes −2 10 ε (-) Euler Duf ort H yp. −3 10 −4 10 0 0.02 0.04 0.06 x (m) 0.08 0.1 Figure 4. L 2 error for fixed ∆t = 10 −4 . −1 10 1 10 -1 Euler Dufort Hyp. Crank O(∆t2 ) O(∆t) −2 10 10 -2 ε (-) ε (-) 10 0 10 CF L −3 10 10 -3 τ = 5 · 10 −2 τ = 5 · 10 −3 τ = 10 −3 τ = 10 −4 τ = ∆t O(∆t) −4 10 10 -4 10 -5 10 -4 C F L = ∆x3/2 10 -3 10 -2 ∆t (-) (a) 10 -1 10 0 −4 10 −3 10 ∆t (-) −2 10 (b) Figure 5. L 2 error as a function of ∆t for the Euler, Dufort–Frankel and hyperbolisation schemes (∆x = 10−2 , τ = ∆t) (a) and for the hyperbolisation scheme (∆x = 10−2 ). 5. Extension for nonlinear transfer The previous case study investigated the use of three numerical schemes for computing the solution of a linear problem of moisture diffusion. This second case study considers now nonlinear diffusion, due to material properties depending on the moisture content 17 / 34 Stable explicit schemes ⋆ ⋆ dm ( u ) and c m ( u ). This case will be investigated via the Dufort–Frankel and the improved Crank–Nicolson schemes. The hyperbolisation approach is not considered, as a stability condition was observed previously in the linear case. First, the Dufort– Frankel and Crank–Nicolson schemes are detailed for the nonlinear case. For this, Eq. (2.6) is re-called with a simplified notation: " # ∂u ∂u ∂ c(u) d(u) . (5.1) = ∂t ∂x ∂x 5.1. The modified Crank–Nicolson scheme The straightforward application of the Crank–Nicolson scheme to Eq. (5.1) yields the following scheme: "  n+ 1  n+ 1 #  n+1 n 2 2 u − u ∂u ∂u 1 j j c nj d − d , (5.2) = ∆t ∆x ∂x j+ 1 ∂x j− 1 2 2 with  d ∂u ∂x  n+ 1 2 1 j+ 2 = 1 2 " d ∂u ∂x  n+1 1 j+ 2 +  d ∂u ∂x n j+ 1 2 # # "     1 n+1 . = d n+1 u j+1 − u jn+1 + d n 1 u nj+1 − u jn j+ 2 ∆x j+ 21 2 However, this approach leads to deal with nonlinearities due to the evaluation of quantities (as d n+11 ) at the upcoming time layer t = t n+1 . To deal with this issue, linearisation j+ 2 techniques as Picard or Newton–Raphson ones [5, 23], requiring a high number of subiterations. To overcome these difficulties, it is possible to evaluate the diffusion coefficient at the actual time layer instead of the upcoming [1]. Thus, the diffusion flux at the interface becomes: " #  n+ 1      2 1 ∂u n+1 n = d n 1 u n+1 d . + d n 1 u j+1 − u jn j+1 − u j j+ ∂x j+ 1 2 ∆x j+ 2 2 2 Finally, the modified Crank–Nicolson schemes yields to: " #  ∆t ∆t ∆t n+1 u jn+1 − − dn 1 + dn 1 d n 1 u j+1 d n u n+1 1 + 2 2 2 j− 1 j−1 j− j+ j+ 2 ∆x 2 ∆x 2 ∆x 2 2 2 2 "  # ∆t ∆t ∆t n = 1 − dn 1 + dn 1 d n 1 u j+1 dn un . u jn + + 2 2 2 j− 1 j−1 j+ j+ j− 2 ∆x 2 ∆x 2 ∆x 2 2 2 2 18 / 34 S. Gasparin, J. Berger, D. Dutykh & N. Mendes The combination of implicit-explicit (IMEX) approaches clearly appear in this formulation. The major advantage over the classical Crank–Nicolson scheme is to avoid sub-iterations in the solution procedure, without loosing the accuracy and the stability. 5.2. The Dufort–Frankel scheme In the nonlinear case, the Dufort–Frankel numerical schemes is written as: "  n n # n+1 n−1 u − u ∂u ∂u 1 j j c nj d − d . = 2 ∆t ∆x ∂x j+ 1 ∂x j− 1 2 (5.3) 2 The right-hand side term can be expressed as:  n n !      ∂u ∂u 1 1 n n n n n n d d 1 u j+1 + d 1 u j−1 − d 1 + d 1 u jn − d = j+ j− j+ j− ∆x ∂x j+ 1 ∂x j− 1 ∆x2 2 2 2 2 2 2 (5.4) u n+1 + u jn−1 j . 2 Thus, considering Eq. (5.3), the Dufort–Frankel schemes can be expressed as an explicit scheme: Using the Dufort–Frankel stencil (see Figure 1(c)), the term u jn is replaced by u n+1 = j λ2 λ0 − λ3 λ1 n n · u j+1 + · u j−1 + · u jn−1 , λ0 + λ3 λ0 + λ3 λ0 + λ3 with def def λ 2 := 2 ∆t n d 1, ∆x2 j+ 2   ∆t def n n := d 1 +d 1 . j− j+ ∆x2 2 2 def λ 0 := c nj , λ 1 := 2 ∆t n d 1, ∆x2 j− 2 λ3 When dealing with the nonlinearities of the material properties, an interesting feature of explicit schemes is that it does not require any sub-iterations (using Newton–Raphson approach for instance). At the time iteration n, the material properties c j , dj+ 1 , dj− 1 are 2 2 explicitly calculated at t n . It should be noted that the material properties evaluated at j + 21 is formulated as:   uj + uæ+1 dj+ 1 = d . 2 2 5.3. Numerical application From a physical point of view, the storage and diffusion coefficients are given in Figures 6(a) and 6(b). Their variations with the relative humidity are similar to the load bearing material from [12]. The initial vapour pressure is uniform P vi = 1.16 · 10 3 Pa. No 19 / 34 Stable explicit schemes moisture flow is taken into account at the boundaries. The ambient vapour pressure at the boundaries are illustrated in Figure 7. At the left boundary, it has a fast drop until the saturation state and at the right boundary, it has a sinusoidal variation. The material is thus excited until the capillary state. The convective vapour transfer coefficients are set to 2 · 10−7 s/m and 3 · 10−8 s/m for the left and right boundary conditions, respectively. The final simulation time is also fixed to 120 hours. As in the previous case study, the dimensionless values can be found in Appendix B. The solution of the problem has been computed with the following discretisation parameters: ∆t = 10 −4 and ∆x = 10 −2 . For this, the Dufort–Frankel, the modified Crank–Nicolson and the standard Crank–Nicolson numerical schemes have been used. A sufficiently converged solution, computed with a Euler explicit scheme, is taken as reference. For the latter, the tolerance is set to ǫ 6 0.01 · ∆t2 to ensure the convergence of the sub-iterations. The time variation of the vapour pressure according for the bounding points is given in Figure 8(a). The vapour pressure in the material is increasing according to the variation at the left boundary condition. There is a delay between the vapour pressure at the left (x = 0 m) and right (x = 0.1 m) bounding points. This increase can also be observed on the four profiles of vapour pressure illustrated in Figure 8(b). Furthermore, a break in the slope of the increase of the vapour pressure can be noticed at t = 12 h , due to the nonlinear behaviour of the material. The vapour pressure at x = 0.1 m slowly oscillated according to the right boundary condition. All the solutions, computed with each different numerical schemes, have good agreement to represent the physical phenomena and their L 2 error with the reference solution is lower than 10 −3 , as reported in Figure 9. The solution has been computed for different values of ∆t, maintaining ∆x = 10 −2 . For each value of ∆t, the L2 error has been computed between the numerical and a sufficiently converged reference solution. Results are given in Figure 10. The equivalent CFL condition has been computed as: ∆t 6 ∆x2 .  ⋆ 2 max dc ⋆m(( uu )) m As for the linear case, the Euler explicit scheme enables to compute the solution while the CFL condition is respected. The Dufort–Frankel and modified Crank– Nicolson numerical schemes are unconditionally stable. An interesting observation is that the error of the Dufort–Frankel and modified Crank–Nicolson schemes are proportional to O(∆t). The modification of the Crank–Nicolson scheme, in order to avoid the sub-iterations due to nonlinearities, loose the O(∆t2 ) accuracy. Even with ∆t increasing, the schemes are able to compute a solution. However, the choice of the time discretisation is an important issue to represent accurately the physical phenomenon. Figures 11(a) and 11(b) show the vapour pressure evolution computed with ∆t = 10 −1 . The solution lacks of accuracy comparing to the reference solution. For instance, at t = 40, the solution does not represent accurately the decrease of the vapour pressure. At x = 0.1 m , ∆t is too large to follow the dynamic of the boundary condition. The error due to the time discretisation of a sinusoidal boundary condition can be expressed 20 / 34 S. Gasparin, J. Berger, D. Dutykh & N. Mendes as: ǫ = A ω cos ( ωn∆t ) − A sin ( ω ( n + 1 ) ∆t ) − sin ( ωn∆t ) , ∆t where A and ω are the amplitude and the frequency of the signal. The error ǫ is given in Figure 12 as a function of ∆t for this case study. If an accuracy of ǫ 6 10 −1 is required, a time discretisation lower than ∆t 6 2 · 10 −2 is needed. Therefore, for an unconditionally stable scheme, the choice of the time discretisation depends on the variation of the boundary conditions, as well as the diffusion time in the material, in order to compute a solution representing accurately the physical phenomenon. With N, the number points due to spatial discretisation, at each time iteration t n the numbers of operations for each schemes scales with: Euler implicit: Crank–Nicolson: Euler explicit: O(N NL · N) , O(N NL · 2 · N) , O(N) , Dufort–Frankel O(N) , modified Crank–Nicolson: O(2 · N) . The standard Euler implicit and Crank–Nicolson schemes require N NL sub-iterations to treat the nonlinearities (using Newton–Raphson approach for instance). The Crank– Nicolson approach needs twice more operations as it combines explicit and implicit approaches. The number of operations of the explicit schemes, as Euler and Dufort– Frankel, scales with the direct computation of the solution u n . The modified Crank– Nicolson does not require sub-iterations as the coefficients are expressed at the current time layer. Thus, the number of operations required is O(2 · N). Generally O(N NL ) ≫ 1, as reported in [12] where the number of sub-iterations scales between 10 to 30 . Therefore, for the same discretisation, the Crank–Nicolson scheme requires much more operations per time step than Dufort–Frankel or modified Crank–Nicolson. For this numerical application, the CPU time of each approach, using ∆t = 10 −4 , has been evaluated using Matlab platform on a computer with Intel i7 CPU and 8GB of RAM and reported in Table 1. It has been preferred to focus on the ratio of computer run time rather than on absolute values, that are system-dependent. However as expected, the Dufort– Frankel scheme is twice faster than the modified Crank–Nicolson one. The average number of sub-iterations is O(N NL ) = 3 and as expected, the CPU time of the standard Crank–Nicolson scheme is six time longer. In addition, another computational advantage of explicit schemes over the implicit ones is their ease to be parallelised. They allow to achieve almost perfect scaling on high-performance computer systems [7]. Resuming these results, the main advantages of the Dufort–Frankel schemes are (i) to avoid sub-iterations to treat the nonlinearities and thus be faster than the Crank– Nicolson approach, (ii) to compute explicitly the solution at each time step, (iii) to be unconditionally stable, as well as (iv) the ease to be parallelised. 21 / 34 Stable explicit schemes 0 10 −7 10 −8 dM (s) cM (kg/m3 /s) 10 −1 10 −9 10 −10 10 −11 −2 10 10 0 0.2 0.4 0.6 φ (-) 0.8 (a) 0 0.2 0.4 φ (-) 0.6 0.8 (b) Figure 6. Variation of the moisture storage c m (a) and diffusion d m (b) as a function of the relative humidity φ . Uniform discretization approaches are commonly used in building simulation codes such as Delphin [2] or WUFI [9] to name a few. They allow to meet a prescribed tolerance parameter. In the case of a conditionally stable scheme, the time step limitation is imposed by a CFL-type condition to be met. In other cases, the constraint is imposed by the sharp variations of the field, which has been illustrated in Figs. 5(a) with the choice of the time step according to the variation of the boundary condition. This limitation comes indirectly from the solution accuracy requirement. Comparing it to a scheme with a uniform grid (in space), it might allow to reduce the CPU-time of the code by redistributing the nodes. On the other hand, non-uniform grids might degrade the solution accuracy as illustrated in [14]. Non-uniform grids can be also combined with the Dufort–Frankel numerical scheme. However, their implementation requires further development in order to not reduce the order of accuracy, which is certainly an interesting theme for further investigation. 5.4. Further nonlinear case studies Previous subsection illustrated the relevancy of using the explicit Dufort–Frankel scheme to compute the solution of moisture transfer through porous material. The purpose is now to explore the use of this numerical scheme for further case studies, typical cases of moisture transfer in building materials [12]. The length of the material is fixed to L = 0.1 m . The initial vapour pressure is P vi = 1.16 · 10 3 Pa , equivalent to a relative humidity φ = 0.5. To test the robustness of the scheme, with strong nonlinearities, the properties 22 / 34 S. Gasparin, J. Berger, D. Dutykh & N. Mendes lef t right 1.2 Φ (-) 1 0.8 0.6 0.4 0.2 0 0 20 40 60 t (h) 80 100 120 Figure 7. Boundary conditions. 1600 1550 Euler Duf ort mod. C rank C rank x = 0m 1500 1600 t = 40 h 1550 1500 1450 1400 P v (Pa) P v (Pa) 1450 1350 1300 1510 t = 50 h 1400 1350 1300 t = 20 h 1500 1250 1250 1490 1200 1150 0 1200 1480 x = 0.1m 20 1470 40 40 45 60 t (h) 80 (a) 1150 50 100 120 0 Euler Duf ort mod. C rank C rank 0.02 t = 10 h 0.04 0.06 x (m) 0.08 0.1 (b) Figure 8. Vapour pressure time evolution at x ∈ {0, 0.1} m (a) and profiles for t ∈ {10, 20, 40, 50} h (b). of a load bearing material are taken from the HAMSTAD benchmark 4 [10] and are considered for both cases. For each one, the solution is compared to a sufficiently converged solution obtained with an Euler explicit scheme. Dimensionless values for each case can also be found in Appendix B. 23 / 34 Stable explicit schemes Duf ort mod. C rank C rank −3 ε (-) 10 −4 10 0 0.02 0.04 0.06 x (m) 0.08 0.1 Figure 9. L 2 error for a fixed ∆t = 6 · 10 −6 . 1 10 0 10 −1 CFL ε (-) 10 −2 10 −3 10 Duf ort Euler C rank O(∆t) −4 10 −4 10 −3 10 −2 10 −1 10 0 10 ∆t (-) Figure 10. L 2 error (a) as a function of ∆t . 5.4.1 Driving rain case The first additional case represents the increase of moisture in the material caused by driving rain at one of the bounding surfaces. For this, at x = 0 m a moisture flux g lL = 3.4 kg/m2 /s is imposed and there is no transfer with the ambient air. The relative humidity of the ambient air varies according to a sinusoidal variation, with an amplitude of 24 / 34 S. Gasparin, J. Berger, D. Dutykh & N. Mendes 1300 1600 Duf ort mod. C rank Ref. 1250 1400 P v (Pa) P v (Pa) 1500 1300 1200 1150 Duf ort mod. C rank Ref. 1100 0 1200 20 40 60 t (h) 80 1100 0 100 (a) 5 10 t (h) 15 20 (b) Figure 11. Comparison of reference solution and the one computed with Dufort–Frankel and modified Crank–Nicolson schemes for ∆t = 10 −1 at x = 0 m (a) and x = 0.1 m (b). 1 10 Error ∆t = 0.025 0 10 −1 ǫ (-) 10 −2 10 −3 10 −3 10 −2 10 ∆t (-) −1 10 Figure 12. Error due to time discretisation for the right boundary condition u R (A = 0.8 and ω = 2π). 0.2, a frequency of 1h and a mean of 0.5, at x = 0.1 m. The convective vapour coefficient equals 3 · 10−8 s/m and the final simulation time is 30 h. 25 / 34 Stable explicit schemes 5.4.2 Capillary adsorption case This case simulates a capillary adsorption of the material. Thus, the left bounding surface of the material is maintained at a saturated state (φ = 1). In such case, the Robin type boundary condition Eq. (2.3) is modified in order to get a Dirichlet one: P v = P vL . Here, P vL = 2.33 · 10 3 Pa. The vapour pressure of the ambient air is maintained constant at P vR = 1.16 · 10 3 Pa, at x = 0.1 m, with a convective vapour coefficient set to 3 · 10−8 s/m. The solution is computed for a final simulation time of 1 h. 5.4.3 Results and discussion The discretisations used to compute the solution of both cases are ∆x = 0.01 and ∆t = 10−5 . The evolution of the vapour pressure at x = 0 m and x = 0.1 m is given in Figure 13(a) for the driving rain benchmark. At x = 0 m, the vapour pressure increases due to the constant rain flux g lL imposed at the surface. At x = 0.1 m, for t 6 5 h, the vapour pressure varies according to the sinusoidal fluctuations of the boundary conditions. Then, as the moisture from the rain flux has diffused through the material, the vapour pressure starts increasing after t = 5 h. By t = 30 h, the whole material is saturated. The vapour pressure profiles at different times are illustrated in Figure 13(b) for the capillary adsorption benchmark. At x = 0 m, the vapour pressure is fixed to the saturation state. The pressure diffuses in the material along the time until reaching the saturation state in the whole material at t = 0.3 h. The dimensionless moisture transfer coefficient ⋆ dm , represented in Figure 14, highlights the nonlinearities of the material properties. The coefficient has O(103 ) orders of variation during the simulation. The L 2 error has been computed between the numerical solution obtained with the Dufort–Frankel scheme and the reference one for both cases and illustrated in Figure 15. The error is of the order O(10−6 ) and proves the high accuracy of the solution computed with the explicit Dufort–Frankel scheme. Furthermore, the solution has been computed using the standard Crank–Nicolson scheme, with a tolerance set to ǫ 6 10 −2 · ∆t2 , and the CPU times of the schemes are given in Table 1. For both cases, the algorithm using the Crank–Nicolson scheme requires around 5 sub-iterations per time step to meet the tolerance. The Dufort–Frankel scheme computes the solution almost ten time faster. These additional results enhance the relevance of using the explicit Dufort–Frankel scheme to compute the solution of moisture transfer problems. 6. Conclusion Most of the Numerical methods applied to mathematical models used in building physics are commonly based on implicit schemes to compute the solution of diffusion problems. The main advantage is due to the stability conditions for the choice of the time discretisation ∆t. 26 / 34 S. Gasparin, J. Berger, D. Dutykh & N. Mendes 2600 2200 Euler Duf ort t = 0.3 h 2400 x = 0m 2200 2000 1800 P v (Pa) P v (Pa) 2000 1600 1400 1800 1600 t = 0.1 h 1400 1200 1200 x = 0.1m Euler Duf ort 1000 0 10 20 1000 0 30 t = 0.01 h 0.02 t = 0.05 h 0.04 0.06 x (m) t (h) (a) 0.08 0.1 (b) Figure 13. Vapour pressure time evolution for the driving rain benchmark (a) and profiles for the capillary adsorption benchmark (b). t ⋆ = 0.3 3 10 2 d ⋆m (-) 10 1 10 0 10 t ⋆ = 0.01 0 0.2 t ⋆ = 0.05 0.4 0.6 t ⋆ = 0.1 0.8 1 x ⋆ (-) Figure 14. Profiles of the dimensionless moisture transfer coefficient d ⋆m for the capillary adsorption benchmark. However, implicit schemes require important sub-iterations when treating nonlinear problems. This work was therefore devoted to explore some improved schemes and more specifically, the Dufort–Frankel, the Crank–Nicolson and the hyperbolisation schemes. The first one is first- or second-order accurate in space, depending on the choice of ∆t and has the advantage of being unconditionally stable. The second one is also unconditionally 27 / 34 Stable explicit schemes −4 10 Rain benchm. C apillary adsorption benchm. −5 ε (-) 10 −6 10 −7 10 0 0.02 0.04 0.06 x (m) 0.08 0.1 Figure 15. L 2 error for the driving rain and the capillary adsorption benchmarks. Table 1. Computational time required for the numerical schemes. Hygroscopic adsorption Numerical Scheme CPU time (s) Average number of iterations Dufort–Frankel 87 0 modified Crank–Nicolson 190 0 Crank–Nicolson 550 3 Driving rain Numerical Scheme CPU time (s) Average number of iterations Dufort–Frankel 284 0 Crank–Nicolson 2220 5 Capillary adsorption Numerical Scheme CPU time (s) Average number of iterations Dufort–Frankel 180 0 Crank–Nicolson 1410 5 stable and second-order accurate in space and time. The latter is second-order accurate in time and in space O(∆t2 ) and consistent with the hyperbolic diffusion equation. The first case study considered a linear diffusive transfer through a porous material. The Dufort–Frankel, Crank–Nicolson and hyperbolisation schemes were compared to the classical Euler explicit scheme and to a reference solution obtained using Chebyshev S. Gasparin, J. Berger, D. Dutykh & N. Mendes 28 / 34 functions. Results have shown that the hyperbolisation scheme has a stability condition higher than the standard CFL. The error of this scheme depends on parameter τ representing the amount of hyperbolicity added in the equation. An optimal choice seems to be τ = ∆t . As expected, the Dufort–Frankel and Crank–Nicolson schemes are unconditionally stable and enable to compute the solution for any choice of the time discretisation ∆t . In addition, for ∆t 6 10−3 , the error of the Dufort–Frankel scheme is first-order accurate in time, and for ∆t > 10−3 second-order accurate in time. The first ∆x 2 conclusions revealed that for ∆t 6 , it is preferable to use the hyperbolisation scheme, 2ν for its accuracy. For larger ∆t values, or for nonlinear cases, the Dufort–Frankel and Crank–Nicolson schemes are preferable due to their stability. The second case study focused on nonlinear transfer model, with material properties strongly dependent on the vapour pressure field. The extension of the Dufort–Frankel and Crank–Nicolson schemes were given specially to treat the nonlinearities of the problem. A modified Crank–Nicolson was proposed in order to avoid sub-iterations at each time step of the algorithm. Both Dufort–Frankel and modified Crank–Nicolson schemes were used to compute the solution of the problem. Results have shown that the error is proportional to O(∆t). The modified Crank–Nicolson is twice longer than the Dufort– Frankel to compute the solution, due to the operations required to compute the implicit and explicit parts of the scheme. The main advantages of the Dufort–Frankel schemes is (i) to avoid sub-iterations to treat the nonlinearities, (ii) to compute explicitly the solution at each time step, (iii) the unconditionally stable property, as well as (iv) the ease to be parallelised. Additional case-studies with stronger nonlinearities and sharper profiles were analysed, enhancing the advantages of such approach. Attention should be paid for every scheme unconditionally stable because the choice of the time discretisation ∆t is an important issue to represent accurately the physical phenomena. As mentioned in [22]: An inexperienced user often interprets this [the unconditionally stable property] to imply that a physically realistic solution will result no matter how large is the time step, and such user is, therefore surprised to encounter oscillatory solutions. The ’stability’ in a mathematical sense simply ensures that these oscillations will eventually die out, but it does not guarantee physically plausible solutions. Some examples of unrealistic solutions and some advices on the choice of ∆t, considering the time variations of the boundary conditions, were provided in this study. Keeping this in mind, the Dufort–Frankel scheme is a valuable option to compute the solution of nonlinear problems of moisture diffusion in porous materials. Results are encouraging for the use of this approach for treating problems of coupled heat and moisture transfer in two- or three-dimensions and explore other methods such as proposed by Saulyev in [27] to integrate parabolic equations. 29 / 34 Stable explicit schemes Acknowledgements The authors acknowledge the Brazilian Agencies CAPES of the Ministry of Education and CNPQ of the Ministry of Science, Technology and Innovation, for the financial support. Nomenclature cm g hv k L Pc Ps Pv Rv T φ ρ Latin letters moisture storage capacity liquid flux vapour convective transfer coefficient permeability length capillary pressure saturation pressure vapour pressure water gas constant temperature Greek letters relative humidity specific mass [kg/m3 /Pa] [kg/m2 /s] [s/m] [s] [m] [Pa] [Pa] [Pa] [J/(kg · K)] [K] [−] [kg/m3 ] 30 / 34 S. Gasparin, J. Berger, D. Dutykh & N. Mendes A. Stability analysis of the Dufort–Frankel scheme The stability analysis is performed for the Initial Value Problem of the linear diffusion equation: ∂u ∂ 2u − ν = 0, x ∈ R, ∂t ∂x 2 The Dufort–Frankel numerical scheme yields to:  n u j−1 − u jn−1 + u jn+1 + u nj+1 u jn+1 − u jn−1 = ν , 2 ∆t ∆x 2 ν > 0. j ∈ Z, (A.1) n > 0. (A.2) Using the von Neumann’s stability analysis [6], we seek for discrete plane wave solutions of the form: u nj = α u 0 e i j k ∆x , (A.3) where k ∆x is the wave length (k > 1), u 0 is the initial wave amplitude (t = 0) and α is the amplification factor between two successive time layers. In general α = α( k ∆x ) and we shall compute this factor for the Dufort–Frankel scheme, knowing that: 1 n n u jn+1 = α u jn , u jn−1 = u , u j±1 = e ± i k ∆x u nj . α j Thus, Eq. (A.2) becomes:     1 1 α − = µ 2 cos(σ) − α − , (A.4) α α def def 2 ν ∆t . ∆x2 where σ := k ∆x and µ := α+ α− Eq. (A.4) admits two roots: p 1 − µ 2 sin 2 (σ) µ cos(σ) + , = 1 + µ p µ cos(σ) − 1 − µ 2 sin 2 (σ) = , 1 + µ In Figures 16(a) and 16(b), we show the dependence of the absolute value of the amplification factors α ± on cos(σ) for two fixed values of the parameter µ — one below and one above the critical CFL value µ = 1 . It is important to notice that α ± 6 1 for all values of the parameter σ . It can be shown (see [24]) that this property holds for all values of µ . This observation completes the proof of the unconditional stability of the DF scheme. The Boundary Value Problem (BVP) for equation Eq. (A.1) was studied in [30]. Namely, it was shown that the same conclusions on the unconditional stability of the Dufort–Frankel scheme hold for BVP demonstrated that the boundary conditions are appropriately discretised. 31 / 34 Stable explicit schemes 1 1 - -α 2 - 0.8 - -α 1 - - -α 2 - 0.8 - -α- 0.6 - -α- 0.6 - -α 1 - 0.4 0.4 0.2 0.2 0 0 -1 -0.5 0 cos(σ) 0.5 1 -1 -0.5 (a) 0 cos(σ) 0.5 1 (b) Figure 16. Amplification factors for the Dufort–Frankel scheme for µ = 0.95 (a) and µ = 1.125 (b). B. Dimensionless parameters B.1. Case from Section 4 Problem (2.6) is considered with g l,⋆ L = g l,⋆ R = 0 . The dimensionless properties of the material are equal to d ⋆m = 1 and c ⋆m = 8.6 . The final simulation time is fixed to τ ⋆ = 120, while Biot numbers are Bi Lv = 101.5 and Bi R v = 15.2 . The boundary conditions are expressed as:     1 1 2π t ⋆ 2π t ⋆ L ⋆ u (t ) = 1 + + , sin sin 2 24 2 4   2π t ⋆ 4 R ⋆ . sin u (t ) = 1 + 5 12 B.2. Case from Section 5.3 The dimensionless properties of the materials are: h 2 i , d ⋆m = 1 + 0.91 u + 600 · exp −10 u − 1.9 i h 2 . c ⋆m = 900 − 656 u + 104 · exp −5 u − 1.9 The Biot numbers are also assumed to be Bi Lv = 101.5 and Bi R v = 15.2 . The ambient water vapour pressure at the boundaries are different from the previous case study. At the 32 / 34 S. Gasparin, J. Berger, D. Dutykh & N. Mendes   left boundary, u L has a fast drop until the saturation state u L = 2, ∀t ∈ 10, 40 and at the right boundary, u R = 1 + 0.8 sin ( 2π t ⋆ ) . B.3. Case from Section 5.4 For both case-studies, an analytic expression of the material properties has been fitted, which dimensionless formulation is: h 2 i ⋆ dm = 0.85 u −0.71 + 900 exp −8 u − 2 , h 2 i ⋆ 2 −0.53 c m = 1.69 · 10 u + 3 exp −9 u − 1.3 . The dimensionless parameters for the driving rain case (Section 5.4.1) are:  g l,⋆ L = 14.7 , Bi Lv = 0 , Bi R u R = 1 + 0.4 sin 2 π t ⋆ , τ ⋆ = 30 , v = 15.2 , while, for the capillary adsorption case (Section 5.4.2), they are: uL = 2 , Bi R v = 15.2 , uR = 1 , τ ⋆ = 1. References [1] U. M. Ascher, S. J. Ruuth, and B. T. R. Wetton. Implicit-Explicit methods for timedependent partial differential equations. SIAM J. Numer. Anal., 32(3):797–823, 1995. 17 [2] B. Bauklimatik Dresden. Simulation program for the calculation of coupled heat, moisture, air, pollutant, and salt transport. http://www.bauklimatikdresden.de/delphin/index.php?aLa=en, 2011. 5, 21 [3] J. Berger, S. Guernouti, M. Woloszyn, and C. Buhe. Factors governing the development of moisture disorders for integration into building performance simulation. J. Building Eng., 3:1–15, sep 2015. 5 [4] D. M. Burch. An Analysis of Moisture Accumulation in Walls Subjected to Hot and Humid Climates. ASHRAE Transactions, 93(16):429–439, 1993. 5 [5] E. Cajori. Historical note on the Newton-Raphson method ofapproximation. Amer. Math., 18:29–32, 1911. 17 [6] J. G. Charney, R. Fjörtoft, and J. Neumann. Numerical Integration of the Barotropic Vorticity Equation. Tellus, 2(4):237–254, nov 1950. 30 [7] B. N. Chetverushkin and A. V. Gulin. Explicit schemes and numerical simulation using ultrahigh-performance computer systems. Doklady Mathematics, 86(2):681–683, sep 2012. 13, 20 [8] T. A. Driscoll, N. Hale, and L. N. Trefethen. Chebfun Guide. Pafnuty Publications, Oxford, 2014. 14 [9] I. Fraunhofer. Wufi. http://www.hoki.ibp.fhg.de/wufi/wufi_frame_e.html, 2005. 5, 21 [10] C.-E. Hagentoft, A. S. Kalagasidis, B. Adl-Zarrabi, S. Roels, J. Carmeliet, H. Hens, J. Grunewald, M. Funk, R. Becker, D. Shamir, O. Adan, H. Brocken, K. Kumaran, and R. Djebbar. Assessment Method of Numerical Prediction Models for Combined Heat, Air Stable explicit schemes [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] 33 / 34 and Moisture Transfer in Building Components: Benchmarks for One-dimensional Cases. J. Building Phys., 27(4):327–352, apr 2004. 22 S. Y. Harris. Building Pathology: Deterioration, Diagnostics, and Intervention. Wiley, New York, 2001. 5 H. Janssen. Simulation efficiency and accuracy of different moisture transfer potentials. Journal of Building Performance Simulation, 7(5):379–389, sep 2014. 5, 6, 18, 20, 21 H. Janssen, B. Blocken, and J. Carmeliet. Conservative modelling of the moisture and heat transfer in building components under atmospheric excitation. Int. J. Heat Mass Transfer, 50(5-6):1128–1140, mar 2007. 5 L. Jianchun, G. A. Pope, and K. Sepehrnoori. A high-resolution finite-difference scheme for nonuniform grids. Appl. Math. Model., 19(3):162–172, mar 1995. 21 W. Kahan and J. Palmer. On a proposed floating-point standard. ACM SIGNUM Newsletter, 14(si-2):13–21, oct 1979. 7 A. S. Kalagasidis, P. Weitzmann, T. R. Nielsen, R. Peuhkuri, C.-E. Hagentoft, and C. Rode. The International Building Physics Toolbox in Simulink. Energy and Buildings, 39(6):665– 674, jun 2007. 5 N. Mendes. Models for prediction of heat and moisture transfer through porous building elements. PhD thesis, Federal University of Santa Catarina - UFSC, 1997. 5 N. Mendes and P. C. Philippi. A method for predicting heat and moisture transfer through multilayered walls based on temperature and moisture content gradients. Int. J. Heat Mass Transfer, 48(1):37–51, 2005. 5 N. Mendes, I. Ridley, R. Lamberts, P. C. Philippi, and K. Budag. Umidus: A PC program for the Prediction of Heat and Mass Transfer in Porous Building Elements. In IBPSA 99, pages 277–283, Japan, 1999. International Conference on Building Performance Simulation. 5 E. E. Myshetskaya and V. F. Tishkin. Estimates of the hyperbolization effect on the heat equation. Comp. Math. Math. Phys., 55(8):1270–1275, aug 2015. 13 A. Nayfeh. Perturbation Methods. Wiley-VCH, New York, 1 edition, 2000. 7 S. V. Patankar. Numerical Heat Transfer and Fluid Flow. CRC Press, United States of America, 1980. 28 J. Raphson. Analysis aequationum universalis seu adaequationes algebraicas resolvendas methodus generalis, et expedita, ex nova infinitarum serierum doctrina deducta ac demonstrata. Microfilm copy: University Microfilms, Ann Arbor(MI), 1690. 17 R. D. Richtmyer and K. W. Morton. Difference Methods for Initial-Value Problems. Interscience Publishers, New York, 1967. 30 C. Rode and K. Grau. Whole Building Hygrothermal Simulation Model. ASHRAE Transactions, 109(1):572–582, 2003. 5 S. Rouchier, M. Woloszyn, G. Foray, and J.-J. Roux. Influence of concrete fracture on the rain infiltration and thermal performance of building facades. Int. J. Heat Mass Transfer, 61:340–352, jun 2013. 5 V. K. Saulyev. Integration of parabolic equations by the grid method. Fizmatgiz, Moscow, 1960. 28 H.-J. Steeman, M. Van Belleghem, A. Janssens, and M. De Paepe. Coupled simulation of heat and moisture transport in air and porous materials for the assessment of moisture related damage. Building and Environment, 44(10):2176–2184, oct 2009. 5 S. Gasparin, J. Berger, D. Dutykh & N. Mendes 34 / 34 [29] F. Tariku, K. Kumaran, and P. Fazio. Transient model for coupled heat, air and moisture transfer through multilayered porous media. Int. J. Heat Mass Transfer, 53(15-16):3035– 3044, jul 2010. 5 [30] P. J. Taylor. The stability of the Du Fort-Frankel method for the diffusion equation with boundary conditions involving space derivatives. The Computer Journal, 13(1):92–97, jan 1970. 30 [31] M. T. van Genuchten. A comparison of numerical solutions of the one-dimensional unsaturated - saturated flow and mass transport equations. Adv. in Water Ressources, 5(1):47–55, mar 1982. 5 [32] M. Woloszyn and C. Rode. Tools for performance simulation of heat, air and moisture conditions of whole buildings. Building Simulation, 1(1):5–24, mar 2008. 5 S. Gasparin: Thermal Systems Laboratory, Mechanical Engineering Graduate Program, Pontifical Catholic University of Paraná, Rua Imaculada Conceição, 1155, CEP: 80215-901, Curitiba – Paraná, Brazil E-mail address: [email protected] URL: https://www.researchgate.net/profile/Suelen_Gasparin/ J. Berger: Thermal Systems Laboratory, Mechanical Engineering Graduate Program, Pontifical Catholic University of Paraná, Rua Imaculada Conceição, 1155, CEP: 80215901, Curitiba – Paraná, Brazil E-mail address: [email protected] URL: https://www.researchgate.net/profile/Julien_Berger3/ D. Dutykh: LAMA, UMR 5127 CNRS, Université Savoie Mont Blanc, Campus Scientifique, 73376 Le Bourget-du-Lac Cedex, France E-mail address: [email protected] URL: http://www.denys-dutykh.com/ N. Mendes: Thermal Systems Laboratory, Mechanical Engineering Graduate Program, Pontifical Catholic University of Paraná, Rua Imaculada Conceição, 1155, CEP: 80215-901, Curitiba – Paraná, Brazil E-mail address: [email protected] URL: https://www.researchgate.net/profile/Nathan_Mendes/
5cs.CE
arXiv:1608.06012v1 [cs.PL] 21 Aug 2016 A Vision for Online Verification-Validation Matthew A. Hammer Bor-Yuh Evan Chang David Van Horn University of Colorado Boulder [email protected] University of Colorado Boulder [email protected] University of Maryland, College Park [email protected] Abstract 1 2 Today’s programmers face a false choice between creating software that is extensible and software that is correct. Specifically, dynamic languages permit software that is richly extensible (via dynamic code loading, dynamic object extension, and various forms of reflection), and today’s programmers exploit this flexibility to “bring their own language features” to enrich extensible languages (e.g., by using common JavaScript libraries). Meanwhile, such librarybased language extensions generally lack enforcement of their abstractions, leading to programming errors that are complex to avoid and predict. To offer verification for this extensible world, we propose online verification-validation (OVV), which consists of language and VM design that enables a “phaseless” approach to program analysis, in contrast to the standard static-dynamic phase distinction. Phaseless analysis freely interposes abstract interpretation with concrete execution, allowing analyses to use dynamic (concrete) information to prove universal (abstract) properties about future execution. In this paper, we present a conceptual overview of OVV through a motivating example program that uses a hypothetical database library. We present a generic semantics for OVV, and an extension to this semantics that offers a simple gradual type system for the database library primitives. The result of instantiating this gradual type system in an OVV setting is a checker that can progressively type successive continuations of the program until a continuation is fully verified. To evaluate the proposed vision of OVV for this example, we implement the VM semantics (in Rust), and show that this design permits progressive typing in this manner. 1. let authors let authorsUS = openDb("authors.csv") = filterDb(authors, (author) => author.citizenship === "US") (a) Open a database with an implicit schema and filter the content. name, citizenship, institution Evan Chang, US, University of Colorado Roly Perera, UK, University of Glasgow Matthew Hammer, US, University of Colorado David Van Horn, US, University of Maryland (b) File authors.csv, example content. Figure 1. Programming with dynamically-determined tables and objects in JavaScript of field value—see Figure 1b for example content. In line 1 of Figure 1a, the programmer filters the author list down to those that have US citizenship using the field projection author.citizenship. Suppose the programmer merely wants to know that their code will not access undefined fields—-that, in this respect, the program is well-typed. Given that these object fields are defined by the dynamic-generation of data structures via openDb, the validity of this field projection author.citizenship is generally unknowable until after line 1 when the structure of the authors table is defined based on the contents of authors.csv. At the same time, this field projection is clearly valid because of the special first line in specifically this authors.csv shown in Figure 1b. There is a tension here between static and dynamic checking. On one hand, once the authors table has been determined, the programmer would like the field projections from the rows to be statically verified. But on other hand, how would static checking be feasible if the schema of authors database is dynamically-determined—what would be the type of the openDb function? To resolve this tension, our key insight is to imagine pausing the concrete execution of Figure 1a right after line 1 and before line 2. Then, imagine reflecting the continuation of the program’s execution to apply abstract interpretation or other static techniques to prove the validity of all subsequent field projections on the rows of the authors table. Our vision centers around a new paradigm for verification and validation that we call online verification-validation Introduction We consider the problem of typing unknown, dynamicallydetermined data obtained from the environment. To illustrate what we mean by unknown, dynamically-determined data, consider the code in Figure 1a that loads a comma-separated value (CSV) file authors.csv using the openDb("authors.csv") call on line 1. The contents of this file are organized into lines, where each line is a row of field values. The first line of the file is special and contains a list of field names instead 1 2016/8/23 (OVV). In contrast to today’s phasic analysis techniques, OVV is phaseless: “static” analysis is freely interposed with “dynamic” execution. By virtue of this mixed approach, OVV transcends the conventional phase distinctions of “static” and “dynamic” analysis. To avoid confusion in this phaseless setting, we refer to static analysis techniques as those for ∀-analysis, since they demonstrate universal properties of future program’s states. Likewise, we refer to the techniques used in dynamic analysis as those for ∃analysis, since they demonstrate existential properties about the past program’s states. In this paper, we make the following contributions: 1 2 3 4 let authors let authorsUS = openDb("authors.csv") = filterDb(authors, (author) => author.citizenship === "US") let books = openDb("books.csv") let authbooksUS = joinDb(authorsUS, "name", books, "author") (a) The joinDb(db1,key1,db2,key2) library function accesses the key fields using run-time reflection (e.g., db1[i][key1]). author, title, year, publisher ... (b) File books.csv, example content. Figure 2. Continuing the example from Figure 1a with subsequent dynamically-determined data. • We define λ-VMF, an abstract machine semantics that enables a form of phaseless, online verification-validation (Section 3). The key idea is annotating potentially faulting operations (e.g., field projection) with a certain (!) or uncertain (?) flag, indicating whether or not that operation can be verified. Executing uncertain operations gets stuck, so it is up to the OVV program to progressively rewrite uncertain operations into certain ones by proving the safety of the potentially faulting operation. State State Set Dynamic / Concrete Initial state • We present a case study of instantiating online verifica- tion-validation with a simple, bidirectional gradual type system for dynamic field projection and databases with dynamic schemas (Section 4). The result of instantiating a gradual type system in an online verification-validation setting is a checker that can progressively type successive continuations of the program until a continuation is fully verified (i.e., “statically” typed). Line 1 Line 2 2 3 4 1 e e ne ine in Lin Li L Static Phase L Initial States Line 3 Dynamic Phase Line 4 (a) Phaseless, online verificationvalidation. Initial State (b) Phasic, offline verification and online validation. Figure 3. Typical type checkers are phasic with an offline static verifier and an online dynamic validator. steps that compute over previously-defined data types (the filtering and joining steps in lines 2 and 4). • We implement the proposed design for λ-VMF in Rust Phaseless Analysis. The essence of online verificationvalidation is pausing concrete execution to interleave it with abstract interpretation. Pictorially, this interleaving of concrete and abstract execution can be visualized as a twodimensional grid, as in Figure 3a. The vertical axis represents the extent of concrete execution and dynamic, ∃analysis (measured by program line), and for each such point, the horizontal axis represents the extent of abstract interpretation and static, ∀-analysis performed at this dynamic execution point. As shown, abstract interpretation explores the states after lines 2–4 after pausing at line 1, but revisits the state after line 4 again after pausing at line 3. That is, we imagine suspending the concrete execution of the program in Figure 2a after the openDb call on line 1 and then interpreting the continuation to statically compute, under an abstraction, the set of reachable future states from this suspended current state (the horizontal axis). This online look-ahead would permit us to check the projections of author.citizenship and db1[i]["name"] (on lines 2 and 4, respectively) before the running program executes them concretely. However, the other projection in the joinDb call on line 4—the projection of the author field (i.e., db2[j]["author"])—cannot be proven valid in this continua- to demonstrate that the proposed instantiation of OVV indeed realizes progressive typing. Our implementation is public: https://github.com/cuplv/vmfuture. In the next section, we dig deeper into what we term online verification-validation by following the progressive typing of the example program from Figure 1a. 2. Static / Abstract 2 3 4 1 ne ne ine Li Li L Li ne Overview In Figure 2a, consider an extension of the example from Figure 1a with two additional lines. The file books.csv is opened on line 3 and contains a CSV file with book information (shown in Figure 2b). The final line (line 4) creates a table of books written by US authors, along with the information about those authors. Observe that this code alternates between dynamically determining the types of the rows and tables (by reading the two files authors.csv and books.csv on lines 1 and 3) and computing over those tables (on lines 2 and 4). This example is a simple version of a pervasive pattern in dynamic languages, where execution interleaves dynamic steps that create new data types (the tables loaded in lines 1 and 3) and 2 2016/8/23 tion because the books.csv database has not yet been loaded. But imagine similarly suspending the concrete execution again after line 3 (shown as the bottom horizontal execution in Figure 3a). Now in this continuation, an abstract interpretation can easily verify this last remaining projection on all future concrete executions from this point. For exposition, this example is short, and the distance between the concrete points for static checks and the future concrete points of potential failure (a bad projection) are tiny: they only consist of one or two lines. In the general case, however, the distance between these points can be arbitrarily large. For instance, a long-running scientific workload may last days or weeks, and in these cases, it is critical to know about possible future execution failures as soon as possible, to minimize interruption due to programming errors. 1 2 3 4 function openDb(file) { var table = openDbInternal(file) {{ reflect/cc (chk_state, return table) }} } Figure 4. The openDb library function synthesizes a type for the loaded table before returning via reflect/cc. Online Verification-Validation. OVV programs consist of two stratified layers that interact during execution. First, the object layer expresses ordinary execution. Execution can escape into the meta layer, which is capable of inspecting the run-time representation of the object layer. Code at the meta layer expresses ∀-analysis and ∃-analysis over object programs. During ordinary execution, the meta layer plays a passive role until special primitives transfer control. In particular, reflect/cc transfers control, along with a reflected view of the current (object layer) continuation. Further, the meta layer has access to read and write hidden annotations on object layer values (e.g., to store program facts, such as types). Collectively, these hidden annotations can be viewed as providing a “shadow heap” for tracking dynamic, metalevel information, in the service of performing ∃-analyses. For maximum extensibility, the object layer lacks a static type system, relying on checking at the other layer. For convenience in expressing analysis over object programs, the meta layer may employ a language that employs a static type system (a la ML), but this is not a requirement. For concreteness in presentation, we use JavaScript syntax for object layer code and Rust-like syntax for meta layer code, and we may consider language choice as an orthogonal concern. Related Work: Traditional Analyses are Phasic. Typical, existing program analyses impose phase distinctions between static and dynamic steps, forcing each phase to use one approach or the other. At one extreme, today’s techniques for static verification explore all possible execution paths, but have no knowledge of the dynamic execution environment. At the other extreme, dynamic validation explores one path of execution: the path determined by concrete execution. Type system design is, in general, a tradeoff in checking in an offline, static phase (e.g., are function application expressions well-typed?) and checking in the online, dynamic phase (e.g., is an array-index in bounds?). We illustrate this phasic architecture in Figure 3b where the static and dynamic phases are sequenced and independent. Some techniques attempt to “blend” these static and dynamic phases, so that information gleaned from one phase feeds into the other. For instance, gradual typing [35, 36] enables shifting type checking between the static and dynamic phases. Or, the notion of using a set of dynamic runs to glean information before static verification appears several times in the literature for call resolution [15], reflection instantiation [9] and for eval [20, 40]. We consider such techniques phasic if there is some sequencing (rather than interleaving) of static, ∀-analysis and dynamic, ∃-analysis phases. While phasic analyses dominate the literature, there exist some non-phasic analysis techniques, such as the “proofsfrom-tests” approach [6], that mix ∃-analysis information during ∀-analysis (e.g., via directed-random automated testing [22]). In these works, the goal is to perform offline static verification whose abstraction selection leverages ∃-analysis information from testing. This is distinct from our vision, where concrete execution is interposed with analyses (not vice versa). However, this work shares our concern with incremental exploration of a state space, and it possible that our proposed incremental substrate would also be beneficial in the context of “proofs-from-tests.” reflect/cc. The implementor of openDb uses reflect/cc to mediate between concrete execution in the object layer, and interposed code in the meta layer that performs online ∀-analysis (shown in Figure 4). First, openDb uses openDbInternal to load the given file and construct a table from its CSV content (line 2). Next, line 3 uses reflect/cc to invoke the meta-level function chk_state, which determines types for the table’s content (failing with an error if this content is malformed). As a side effect, it writes to a meta layer field on the table variable to record the type of the rows of the table so that it can be consumed in a subsequent meta layer execution. In particular, the reflect/cc primitive pauses the execution of the object program, giving control to a meta language function, here chk_state. Before transferring control, the primitive reflects the current continuation as a first-class data structure and uses it as an argument to the given meta language code, here chk_state, as we illustrate in Figure 5. By using this reflected structure, the meta language code can perform arbitrarily complex ∀-analysis. When it finishes, it returns control to the object program by returning a transformed program state. In this case, openDb uses chk_stk to type-check the program’s continuation at each call, given 3 2016/8/23 State State Set Object Language reflect/cc (either ∀-analysis or ∃-analysis). In particular, meta layer function chk_stk performs a ∀-analysis (type-inference and checking), and uses these universal program facts to improve the efficiency of ∃-analyses that will occur in the future. At a high level, chk_stk traverses the frames of a VM stack (from top to bottom), and checks whether the form of the frame is consistent with the given computation type ct. There are three cases to consider, depending on whether the stack is empty (Halt), or has a top-most frame for a let binding or function application. The computation type Ret(vt) indicates that the local continuation will return a value of type vt, and that the stack should contain a let body that is expecting to bind this value. The frame FrLet(env,x,e) consists of a saved VM environment env (mapping local variables to values), a variable to let-bind x, and a body e in which the variable is scoped. To check this case, the code first attempts to synthesize a typing environment from env; if this fails, the stack does not check, and verification fails. Otherwise, the meta-level function syn_tenv synthesizes a typing environment and returns an annotated version of the given environment, env2. Next, the case attempts to synthesize a type et for the let body, e. When successful, synthesis produces a type et and an annotated term e. Finally, the case checks the recursive structure of the stack; when successful, it returns a transformed stack, whose environments, terms and values are annotated. The computation type Arr(vt,ct2) indicates that the local continuation is a function abstraction that will consume a value of type vt, and that the stack should contain an argument value with this type. Similar to above, the case checks the value has the correct type vt, and checks the stack recursively; when successful, it returns a transformed (annotated) stack. Meta Language 2 3 4 1 e ne ne ine n Li Li L Li Line 1 Line 2 1 2 3 4 Line 3 Line 4 (a) The transfer of control moves from the object program to the meta program via reflect/cc. let let let let ... ... ... ... = = = = openDb(. . .) filterDb(. . .) openDb(. . .) joinDb(. . .) (b) Sketch of the example code from Figure 2a. Figure 5. Illustrating online verification-validation. enum Stk { Halt, FrLet(Env,Var,Exp,Stk), FrApp(Val,Stk) } enum CTyp { Ret(VTyp), Arr(VTyp, CTyp) } meta chk_stk (st:StTyp, stk:Stk, ct:CTyp) -> Option<Stk> { match (ct, stk) { _, Halt => Some(stk), Ret(vt), FrLet(env, x, e, stk2) => { match syn_tenv(st, env) { None => None, Some(tenv,env2) => { let tenv = tenv_ext(tenv, x, vt) ; match syn_exp(st, tenv, e) { None => None, Some(et, e2) => { match chk_stack (st, stk2, et) { None => None, Some(stk3) => Some(FrLet(env2, x, e2, stk3)) }} }} }} Arr(vt,ct), FrApp(v,stk2) => { match ( check_value(st, emp, v, vt), check_stack(st, stk2, c) ) { (Some(v3), Some(stk3)) => Some(App(v3,stk3)), _ => None, }} }} Defining and using OVV. Below, Section 3 defines the syntax and dynamic semantics of λ-VMF in detail; building on these definitions, Section 4 revisits the algorithm shown in Figure 6, showing it in the context of a larger system for gradually-typing programs that compute with databases, like the one shown in Figure 5. Figure 6. Type checking continuations. the type of the loaded table. Based on this type information, openDb either signals errors (if there is a type error), or transforms future validation checks (if type analysis succeeds in proving that these validation checks are redundant). 3. OVV Machine Semantics We present λ-VMF, an abstract machine semantics for libraries and programs that employ OVV. In Section 4, we instantiate this OVV framework with a gradual type system for checking programs that compute with simple databases. The Meta Program Expresses Online Meta Theory. Figure 6 lists the meta-layer function chk_stk, which checks a VM stack against a store typing and computation type. We adopt Rust-like syntax (a recent dialect of ML). In particular, this meta-level code interacts with the store typing, stack and computation types as values, as if they are persistent (purely functional, applicative) inductively-defined structures, a la ordinary ML. (The top of Figure 6 defines these structures in Rust-like syntax). Because the meta layer has meta-level access to the semantic structures of the object layer, it is sufficiently powerful to compute meta-theoretical properties Program Syntax. Figure 7 gives the syntax for λ-VMF programs. To streamline the definition of analyses and dynamic interpretation, λ-VMF syntactically separates program structure into expressions e and values v . Further, to permit a meta-layer, extension-defined analysis to annotate λ-VMF programs (as illustrated in Section 4), the recursive syntax of expressions and values consists of annotated preexpressions ė and annotated pre-values v̇, respectively. The 4 2016/8/23 operational semantics of λ-VMF programs, defined below, does not directly depend on these annotations. However, an extension may use its annotations to prove properties that verify sound online program transformations. In these cases, the annotations can indirectly impact program behavior, i.e., by aiding a meta-level program transformation. Pre-values consist of open and closed thunks, which represent suspended expressions, including all higher-order data (othunk e and thunk ρ e); closed thunks employ a closing environment ρ that maps the free variables of e to (closed) values. Base types consist of numbers (num n), strings (str s), boolean bits (bool b) and reference cells (loc `). Dictionaries map values to values (dict δ), modeling a row of a database, or a record, where the typical notion of a field name is generalized to any value in λ-VMF. Pre-expressions consist of forcing a suspended expression (force v ), function abstraction (λx.e), function application (e v ), let-binding a returned value (let x = e1 in e2 ), returning a value (ret v ), allocating, mutating and accessing mutable storage (ref v , set v1 v2 , get v , respectively), updating the field of a record (ext v1 v2 v3 ), projecting the field of a record (v1 [v2 ]aop ). Finally, λ-VMF includes special forms for ascribing a sub-expression with a manual annotation (e ?: ae ), and reflectively inspecting (and transforming) the current continuation via reflect/cc as core primitive, rcc em e. Notably, execution pauses before executing the local continuation e, and a common idiom consists of using a manual ascription there, to be discharged via the use of rcc. As explained below, using rcc to prove and discharge ascriptions is actually necessary in λ-VMF, since they have no other form of dynamic semantics. For this purpose, the meta-level program em transforms the program state before its continuation resumes. We do not model the modellevel programming language here; our current implementation uses Rust. VM State syntax. Figure 8 defines the global state of the λ-VMF program: It consists of a store, mapping locations to mutable values (µ); a stack of evaluation context frames (κ), an environment mapping variables to values (ρ), and a preexpression ė that gives the current local continuation. Nonempty stacks give evaluation contexts for let bodies (κ :: (ρ, x.e)) and function application (κ :: v ). v ::= v̇ @: av v̇ ::= othunk e | thunk ρ e | dict δ | num n | str s | bool b | loc ` | () |x δ ::= ε | δ, v1 7→ v2 Value Pre-Val. Dict. e ::= ė @: ae ė ::= force v | λx.e |ev | let x = e1 in e2 | ret v | ref v | set v1 v2 | get v | ext v1 v2 v3 | v1 [v2 ]aop | e ?: ae | rcc em e aop ::= ? | ! av ::= · · · ae ::= · · · em ::= · · · Expr. Pre-Expr. Annot. Meta Expr. Annotated pre-value Open thunk Closed thunk Dictionary Number String Boolean Store location Unit value Value variable Dictionaries of values Annotated pre-expression Unsuspend (force) thunk Function abstraction Function application Bind computed value Produce a value Allocate store reference Store mutation Store projection Dictionary extension Dictionary projection Annotation ascription Reflect current continuation Uncertain vs. certain Value annotation Expression annotation Meta-level programs Figure 7. Syntax of λ-VMF Programs State Store Stack Environment σ ::= hµ; κ; ρ; ėi µ ::= ε | µ, ` 7→ v κ ::= halt | κ :: (ρ, x.e) | κ :: v ρ ::= ε | ρ, x 7→ v Maps locations to values Empty stack Waiting for return Fun. application argument Maps variables to values Figure 8. VM State: The store, stack and environment. a (possibly empty) dictionary; and dictionary projection selects a given field’s associated value, returning it. What makes λ-VMF particularly interesting is that there are no stepping rules for ?-mode field projection or for ascription. To avoid getting stuck at these operations, these operations should be either verified progressively or validated, perhaps immediately before executing, when all relevant information is available. To do so, the program uses rcc em e, which runs the meta-level program em on a reflected version of the current VM state: the rule constructs the current continuation, reflects this program state into a data structure, runs the meta-level term em , and then injects the resulting program state into a transformed continuation σ 0 . In OVV, this step sometimes verifies and validates operations before the program attempts to execute them, transforming Dynamics of λ-VMF Programs. Figure 9 defines a smallstep operational semantics over λ-VMF states. The rules for let and function application each push the stack with a frame that is eliminated by the rules for ret and function abstraction, respectively. In both cases, eliminating the frame consists of binding a value to a variable, and continuing the program. Forcing a thunk consists of unpacking its environment and expression, and continuing execution with them. Rules for allocating, mutating and accessing a reference cell in the store are each standard. Dictionary extension adds a field to 5 2016/8/23 σ −→ σ 0 λ-VMF state σ steps to state σ0 . hµ; κ; ρ hµ; κ; ρ hµ; κ :: (ρ, x.(ė @: )); ρ0 hµ; κ :: v ; ρ hµ; κ; ρ hµ; κ; ρ hµ; κ; ρ hµ, ` 7→ v2 ; κ; ρ hµ; κ; ρ hµ; κ; ρ let x = (ė1 @: ) in e2 i (ė @: ) v i ret v i λx.(ė @: )i force v i ref v i set v1 v2 i get v1 i ext v1 v2 v3 i v1 [v2 ]! −→ −→ −→ −→ −→ −→ −→ −→ −→ −→ hµ; κ :: (ρ, x.e2 ); ρ; ė1 i hµ; κ :: ρ(v ); ρ; ėi hµ; κ; ρ, x 7→ ρ(v ); ėi hµ; κ; ρ, x 7→ v ; ėi hµ; κ; ρ0 ; ėi hµ, ` 7→ v ; κ; ρ; ret (loc ` @: ?)i hµ, ` 7→ ρ(v2 ); κ; ρ; ret (() @: ?)i hµ, ` 7→ v2 ; κ; ρ; ret v2 i hµ; κ; ρ; ret (dict (δ, ρ(v2 ) 7→ ρ(v3 )) @: ?)i hµ; κ; ρ; ret v3 i hµ; κ; ρ hµ; κ; ρ v1 [v2 ]? e ?: ae i no stepping rule no stepping rule hµ; κ; ρ rcc em (ė @: )i −→ σ0 when when when when when when ρ(v ) = (thunk ρ0 (ė @: ) @: ) ` 6∈ µ ρ(v1 ) = (loc ` @: ) ρ(v1 ) = (loc ` @: ) ρ(v1 ) = (dict δ @: ) ρ(v1 ) = (dict (δ, ρ(v2 ) 7→ v3 ) @: ) when em ([[hµ; κ; ρ; ėi]]) ⇓meta [[σ 0 ]] Figure 9. Small-step, abstract machine semantics of λ-VMF e ::= · · · | openDbaop v | filterDbaop v1 v2 | joinDbaop v1 v2 v3 v4 Existing forms (Figure 7) Open database by file path Filter DB by predicate Join DBs using keys’ value Annotations Value Types Figure 10. Database Library Forms the program to remove or modify them. In contrast to traditional phasic static verification or dynamic validation (cf. Figure 3b), this step does not need to be either eagerly before the entire execution or lazily just before the potentially faulting operation. By choosing the placement of rcc, the program can choose how eager or lazy the checking should be anywhere between these two extremes. We give a detailed example below. 4. Dictionary Computation Types av ::= A ae ::= C A, B ::= U C | Dict ∆ | Num | Str | Bool | Ref A |1 |? | Db A ∆ ::= Value annotation Expression annotation Thunked computation Dictionary Number String Boolean Reference cell Unit Unknown value type Database; multiset of As ε | ∆, v 7→ A Maps values to types C , D ::= A → C | FA Function abstraction Value production Figure 11. Type Syntax: Annotations for Values and Expressions Gradual Typing for Simple Databases Types for λ-VMF and libDb. Figure 11 instantiates the λ-VMF framework for a gradual type system. This system has (bidirectional, algorithmic) rules to reason about λ-VMF code as well as the libDb extension. Value types consist of types for thunked computations (U C ) 1 , dictionaries (Dict ∆, where ∆ maps field values to field types), numbers (Num), strings (Str), booleans (Bool), reference cells (Ref A), unit (1), unknown (?) and databases (Db A). Computation types consist of the arrow type for functions (A → C ) and value types for value-producing computations (F A). In this section we present a gradual type system for λVMF and libDb, an extension that permits us to express the motivating example from Figure 2a. We tour the type system and illustrate how OVV progressively types and validates the operations in this example. Syntax for libDb. Figure 10 extends the syntax from Figure 7 with the three operations implemented by libDb, for opening databases, filtering them with a predicate, and joining them using named fields. Each operation is parameterized by one or more argument values, and an operation annotation aop that determines how to type operation. As with record field projection, this annotation determines whether the operation’s pre-conditions for success have been fully verified via OVV. The gradual type system for libDb presented here uses different rules for certain (!) versus uncertain (?) reasoning modes. Typing λ-VMF program states. Figure 12 lists typing judgement forms for λ-VMF program states and for stacks. 1 We follow conventions from the literature on call-by-push-value (CBPV) in our type syntax for thunked and value-returning computations, which uses special letters U and F, respectively [29, 30]. 6 2016/8/23 hold, in the case of true, we also construct an annotated term, possibly with transformations (e.g., changing operation annotations from uncertain ? to certain !). |µ| ` ρ ⇒ Γ |µ| , Γ ` ė ⇒ C |µ| ` κ ⇐ C state For instance, we implement the type relation for program hµ; κ; ρ; ėi ok states as a total function from program states to (optional) Γ ` κ ⇐ C Under Γ, stack κ eliminates a computation of type C . program states with annotations; and when the algorithm fails, it returns None: Furthermore, this algorithm plays the role of em in libDb’s use of rcc em e. Γ1 ` ρ ⇒ Γ2 The ability to phrase the typing relations as functional alΓ2 , x : A ` e ⇒ C Γ1 ` κ ⇐ C gorithms stems the fact that the rules treat certain positions k-emp k-let of their (bidirectional) relations consistently as inputs and Γ ` halt ⇐ C Γ1 ` κ :: (ρ, x.e) ⇐ F A outputs, and that outputs are determined functionally from Γ`v ⇐A inputs. As an example, Figure 6 gives the algorithmic verΓ`κ⇐C sion of the stack-checking relation Γ ` κ ⇐ C , which rek-app Γ ` κ :: v ⇐ A → C sembles an ordinary function in ML. The remainder of the rules transform in a similar manner, so that checking relations produce an optional, annotated term structure, while Figure 12. Stack typing and State typing synthesizing relations produce an optional pair of annotated term structure and synthesized type. When these functions produce None, the corresponding typing relation is not derivTo type a program state, we assume that the stored values able. The dynamic semantics of λ-VMF do not permit exeare annotated, and we use these annotations as a store typcution to continue when this occurs. ing, written |µ|, which maps reference locations to values types. To type a program state, we assume this store typTyping core λ-VMF terms bidirectionally. For simplicity, ing |µ| and attempt to verify the the other VM machinery, we use a bidirectional type system to encode the gradual type consisting of the current environment ρ, program term ė, systems of the λ-VMF core calculus and its libDb extension. and stack κ. Three judgements compute type properties for Figure 13 defines type checking (above) and synthesis (bethese components: Assuming a store typing Γ, the judgelow) for program terms. For space reasons, we elide some 0 ment Γ ` ρ ⇒ Γ computes from an environment (mapsynthesis cases, as well as the checking and synthesis judge0 ping variables to values), a typing context Γ (mapping variments for value forms; the rules shown give a representative ables to types). Assuming a typing context Γ, the judgement flavor for the complete definition. Γ ` e ⇒ C computes a type from a term e. Assuming The analytical (checking) judgement form Γ ` e ⇐ C a typing context Γ and computation type C for a terminal can be read as, “Under typing context Γ, term e checks computation, the judgement Γ ` κ ⇐ C checks that the against computation type C .” Specifically, the type C is stack κ either correctly continues execution or halts. given as an input to the checking judgement, when viewed as The remainder of the figure gives three rules for typean algorithm. The synthesizing judgement form Γ ` e ⇒ C checking the stack. First, k-emp says that halting stacks are can be read as, “the typing context Γ and term e synthesize always permitted. Next, k-let and k-app handle the recursive the computation type C .” Specifically, the algorithm comcases of the stack, where the topmost frame can be viewed as putes the type C , when given Γ and e. For the core forms eliminating the terminal computation type, call it D. In the of λ-VMF, the bidirectional rules for values and computacase of k-let, we have that D is F A, which types the terminal tions follow the usual patterns found in bidirectional type computation that returns a value of type A; we check that the systems [10, 16]. We show several standard-looking rules, top of the stack holds the body of the let, which can use the sub, lam, app and annot. In particular, the annotation form of let-bound variable (of type A), for which we can synthesize e λ-VMF, e ?: a , which asserts the annotation ae correctly another computation type C that checks against the rest of describes the program e, plays the role of type ascription the stack. In the case of k-app, we have that D is A → C , in the bidirectional rules; the annot rule says that terms are the type of a function abstraction; we check that the top of checked against their type annotations, and these annotated the stack is an argument value of type A, and the rest of the terms synthesize the annotation type. Because it has no dystack checks against the type of the abstraction’s body, C . namic semantics, λ-VMF uses OVV to prove and discharge Transforming λ-VMF program states. Though the gradthis form earlier by rewriting it to e sometime before evalual type system defined here is stated propositionally, it conuation; if this rewrite fails, then the program terminates (by stitutes an algorithm, and we demonstrate this fact by implefailing) early, as a result of OVV failing, not execution. menting these relational definitions as a (mutually) recursive As is customary in bidirectional systems, type annotatotal functions. However, instead of merely returning true tions mediate between synthesizing and checking. This proor false to indicate the success or failure of the relation to vides one the ability to place checking-only terms (such as σ ok State σ is well-typed. 7 2016/8/23 lambda abstractions) in positions that require the sub-term synthesize a type (such as the abstraction position of an application). See typing rules lam and app, respectively, to see the details; both are standard. Finally, as is customary, type subsumption allows less specific types to check against terms that synthesize more specific types. Rule sub uses a definition of type consistency (written C ≈? D), which behaves like type equality, modulo the uncertain type ?, which is consistent with all other types. This notion of consistency is standard in some gradual typing literature [35]. Γ ` e ⇐ C Under Γ, expression e checks against type C . Γ`e⇒C C ≈? D Γ`e⇐D Γ, x : A ` e ⇐ C sub Γ ` λx.e ⇐ A → C lam Γ ` e ⇒ C Under Γ, expression e synthesizes type C . Γ`e⇐C Γ ` e ?: C ⇒ C Γ ` v1 ⇒ ? Γ ` v2 ⇒ B Γ ` v1 [v2 ]? ⇒ F ? Γ`e⇒A→C Γ`v ⇐A annot p? Γ`ev ⇒C Γ ` v1 ⇒ Dict (∆, v2 7→ A) Γ ` v2 ⇒ B Γ ` v1 [v2 ]! ⇒ F A Γ ` v ⇒ Str Γ ` openDb? v ⇒ F (Db ?) Gradual typing for dictionary projection. The typing rules for uncertain and certain projection differ in what is known about the record and field values, and illustrate a form of gradual typing. In the uncertain case, rule p? synthesizes return type ?, since nothing is known about the dictionary of values being projected. By contrast, in the certain case, the dictionary type is known to rule p!, and this dictionary maps the given field value to a corresponding field type. In this case, the soundness of the type system means that the projection must succeed in all possible future program states, and moreover, that the projected value has the given type. p! openDb? Γ ` v1 ⇒ Db ? Γ ` v2 ⇐ U (? → F Bool) Γ ` filterDb? v1 v2 ⇒ F (Db ?) Γ ` v1 ⇒ Db A ?∈ /A Γ ` v2 ⇐ U (A → F Bool) Γ ` filterDb! v1 v2 ⇒ F (Db A) Γ ` v1 ⇒ Db ? Γ ` v3 ⇒ Db ? app filterDb? Typing the libDb operations. The rule openDb? is uncertain and has no certain counterpart: The type of the database is not known until after the operation completes, just before execution resumes with its continuation; before then, the database could hold any type, so the rule types the returned database as Db ?. Following similar reasoning, since filtering and joining databases occur after a database is loaded, it is possible to type these operations in both uncertain and certain modes. The rule filterDb? says that filtering a database of uncertain values leads to another database of values with an uncertain type; since it merely assumes the type of the database is ?, it does not prove that the predicate will not “go wrong”, e.g., by projecting the wrong field from its argument. By contrast, the rule filterDb! says that filtering a database of known type using a predicate that checks against this type leads to a database with the same known type; in this case, the soundness of the type system means that the predicate must always succeed. Similarly, the rules for joinDb? and joinDb! follow the pattern set above: the uncertain rule assumes nothing about the argument values, beyond the arguments actually consisting of databases. The certain rule assumes that the database arguments’ types are fully known, that the chosen field values are mapped in these types, and that the chosen fields share a common type (we want to compare values of this field for equality to perform the join). filterDb! Γ ` v2 ⇒ B 2 Γ ` v4 ⇒ B 4 Γ ` joinDb? v1 v2 v3 v4 ⇒ F (Db ?) joinDb? ∆ = ∆1 , v2 7→ A, ∆3 , v4 7→ A Γ ` v1 ⇒ Db (Dict (∆1 , v2 7→ A)) Γ ` v2 ⇒ B2 Γ ` v3 ⇒ Db (Dict (∆3 , v4 7→ A)) Γ ` v4 ⇒ B4 Γ ` joinDb! v1 v2 v3 v4 : F (Db (Dict ∆)) joinDb! Figure 13. Selected typing rules for computation typing (checking and synthesis). Typing (horizontal) across Execution (vertical). Line 1 Line 2 Line 3 Line 4 openDb filterDb openDb joinDb 1: openDb ? ? ? ? 2: filterDb — ! ? ? 3: openDb — — ? ? 4: joinDb — — — ! ··· — ? !/? !/? ! Figure 14. Progressive typing for Figure 2a: As execution progresses (vertically) over Lines 1 and 3, the continuation’s typing becomes more certain: After Line 1 executes, Line 2 types in the certain modality (!) instead of the uncertain modality (?); similarly, after Line 3, Lines 4 onward type using the certain modality. (The dashed horizontal lines indicate these progressions). Gradual Typing, Progressively via OVV. Figure 14 illustrates using the typing rules of Figure 13 to perform progressive typing our four-line motivating example (Figure 2a). The vertical and horizontal dimensions of the table list each of the four lines; the vertical axis represents concrete ex8 2016/8/23 ecution, and the horizontal axis represents typing the four right-hand-sides of the program’s four let-bindings, and in particular, for filterDb (on Line 2) and joinDb (on Line 4), the table indicates whether the operation was typed in the uncertain or certain modality. As execution progresses (vertically) over Lines 1 and 3, the typing of the program continuation’s becomes more certain: After Line 1 executes, Line 2 types in the certain modality (!) instead of the uncertain modality (?); similarly, after Line 3, Lines 4 onward type using the certain modality. As the final column shows, the certainty of code using these tables in the remainder of the program (Line 5 onwards) increases after each of the two calls to openDb. Between the two calls, some information is known (relating to the first two tables defined on Lines 1 and 2), but some information is still missing (relating to the two tables defined in Lines 3 and 4). Our current Rust-based prototype of λ-VMF is powerful enough to express this example, including the progressive typing discussed above. In Section 5, we discuss the potential to use incremental computation in the context of such progressive typing; the goal is to improve performance by exploiting the redundancy of re-typing the program’s continuation. 5. State State Set Concrete Execution reflect/cc State Abstract Execution 2 3 4 1 ne ine ne ine L Li L Li reflect/cc Abstract Execution 2 3 4 1 ne ine ne ine L Li L Li Validate Residual Line 1 Line 2 State Set Progressive Verification δ Line 3 Line 4 (a) Progressive verification Regressive Validation Program Transform (b) Regressive validation Figure 15. Progressive verification and regressive validation are complementary ways of seeing the interplay between ∀-analysis and ∃-analysis enabled by online verification-validation. be used to elide run-time ∃-analysis checks that concern the authors table, including the asserts for the projections of author.name. Pictorially, we think of regressive validation as introducing a third dimension that consists of all possible outcomes of a program transformation on the object program (shown in Figure 15b). After performing an online verification, the meta layer transforms the continuation, either eliding certain downstream validation checks (labeled validate), or introducing residual checks that reduce the original checks’ complexity (labeled residual). As illustrated in Section 4, progressive typing can, before executing the operation, eliminate residual checks by rewriting uncertain operations to certain operations (which require no run-time type checks). More aggressive verification techniques can hope to regress even more aggressive validation checks to simpler forms. For instance, global heap-based properties present an interesting challenge. Discussion In this section, we discuss future challenges and directions for the vision of OVV presented in this paper. Specifically, we discuss the design of the meta-level programming language, and its use in expressing progressive verification and regressive validation. Incremental Computation for Progressive Verification. In the motivating example from Section 2, the chk_stk calls performed by openDb use progressive typing to check their continuations. In fact, these two continuations are related: The earlier version lacks type information about the table loaded in line 3, whereas the later version has access to this type information. Progressive typing could exploit this incremental relationship to avoid re-computing all of the typing facts about the program state that have not changed. Progressive typing is a specific instance of progressive verification. Pictorially, progressive verification relates distinct abstract executions (shown horizontally in Figure 15a), by exploiting their similarity (a small change, depicted as δ, extending vertically). The task of a progressive verifier is a ∀-analysis, just like a classical static verifier, which attempts to prove that all executions to an assertion satisfy a particular safety property. Implicitly-Incremental Meta-Level Computation. In sum, the example chk_stk above encodes a theory about online typing, along with a mechanism for using this type information to optimize the dynamic run-time checks that would otherwise be used. The meta layer should have an in-built ability to implicitly express progressive verification as ordinary verification, so that the system, not the programmer, takes into account execution environment changes across these progressive stages. Further, when the meta layer uses this progressive verification to enable regressive validation in the future execution down stream, the system, not the programmer, accounts for these changes when doing future stages of progressive verification. In other words, the VM that runs the meta language and object language should have an in-built ability to express interaction among the levels in terms of implicitly-incremental computation. In Section 6, we discuss the challenges that OVV poses to work on general-purpose incremental computation. More Aggressive Regressive Validation. After type checking the continuation for line 1, regressive validation consists of eliminating dynamic checks within the library calls of lines 2 and 4 (filterDb and joinDb, respectively). In particular, if the continuation type-checks under the partiallyknown type information, the known type information can 9 2016/8/23 6. and implement reflective towers in simpler terms; these efforts are named after various hair colors: Brown [19, 39], Blond [13] and most recently, Black [3, 4]. Compared to the impressive and mind-bending work on metacircular interpreters, the vision for λ-VMF is more modest: Two levels suffice to perform OVV. Having said that, if meta-level programmers want to verify their metalevel programs as object programs (to “bootstrap” a typed meta level), the work mentioned above will likely provide further insights. Related Work This section supplements the related work in Section 2. General-Purpose Incremental Computation. Section 5 proposes an implicitly incremental meta-level language for λ-VMF, which challenges current research on (generalpurpose, programming language-based) incremental computation (IC). Consider the desired incremental behavior of chk_stk in the motivating example, where it occurs after lines 1 and 3, when the program states are similar, but not identical. In particular, both continuations include the AST of the call in line 4, and onward, which chk_stk will process in both verification stages. The central challenge is reusing the redundant work performed by chk_stk, despite the fact that the AST and store typing are not equal to that in the prior stage, which creates challenges for incremental computing via memoization, a key implementation mechanism used across many specific IC approaches. To understand why these “small” changes are challenging for typical memoization, consider the structural recursion of the chk_stk function from Figure 6. One approach to memoization identifies each saved invocation by the entire store typing st and entire stack stk, including all of their recursive sub-structure, e.g., via hash-consing [18]. This approach is commonly taken by past work on incremental computation [7, 8, 17, 23, 24, 32, 33, 33], however, it is brittle and overly sensitive to small changes, since they alter the identity of the whole recursive structure. Recent work addresses this shortcoming by introducing unique names that are special to incremental computing [25]. This naming mechanism can overcome the challenges outlined above for chk_stk, since the presence of names isolates changed components of the store typing, stack and local environments. However, several key challenges remain before these techniques can fully realize OVV: We want to use these names correctly (to avoid unsound incremental results), use them efficiently (to isolate changes and avoid sub-redundant computations) and use them implicitly (so that the meta-level programs look like ML). Further, we may want to control how fine-grained the IC techniques track program dependencies, to reduce constant-factor overhead. Program Analysis for Dynamic Languages. The ultimate aim of online verification-validation is offer “strong checking” in an extensible, dynamic language environment. And thus we seek to build on the substantial amount of research activity on program analysis for dynamic languages. Since by definition, dynamic languages lack a built-in static typing discipline, much of the static verification work focuses on either retrofitting rich typing or specification disciplines [11, 12, 21] or applying whole-program flow analysis for inferring and checking type properties (e.g., for JavaScript [5, 26, 27] or for Ruby [1]). The dynamic language features that make widely-used libraries like jQuery possible also make retrofitting static techniques incredibly challenging [2, 28, 34, 38]. Much of this work focuses on finding the right kinds of context-sensitivity to try to more precisely resolve the flow of values to dynamic features like dynamic property read in a static analysis [2, 31, 38] or to determine when dynamically-observed information is sufficient to apply in a static verification [34]. We expect such techniques to be not only applicable and useful but strengthened in an OVV context. In the end, static techniques in a phasic setting are limited by what is indeed available statically, and dynamic techniques are limited by what can be observed in testing runs. As exhibited in Section 2, the vision of OVV enables these techniques to be strengthened with a flexible interleaving of “static” and “dynamic” analysis (i.e., ∀-analysis and ∃-analysis). 7. Conclusion This paper presents a vision for online verificationvalidation (OVV), an approach to ease the tension between extensibility (of dynamic languages) and safety (of static languages). The key insight of OVV is that analysis in a VM can be phaseless, allowing analyses to run progressively on the object program by pausing execution, reflecting on the current continuation, and transforming the continuation to replace uncertain (?) operations with certain (!) ones. In this paper, we formalize an approach for OVV as a language semantics and Rust-based implementation called λVMF. We explore a proof-of-concept instantiation of OVV by defining a gradual type system for dynamic field projection and databases with dynamic schemas, and we observed that the result is a progressive type checker. Reflective Towers of Interpreters. As proposed in Section 5, future work on λ-VMF should permit library extension authors to write meta programs and object programs in an integrated way. Fortunately, many researchers have proposed designs that allow interesting interplay between the interpreter’s viewpoint (where the meta-level program runs) and the program being interpreted (where the object program runs). Conceptually, this work begins with 3-LISP [14, 37], which gives the programmer access to an infinite tower of (so-called meta-circular) interpreters, allowing them to redefine the language from within the language. Following (theoretical) work on 3-LISP, researchers give various approaches that attack practical concerns in how to express 10 2016/8/23 References morphism with existentials and indexed types. abs/1601.05106, 2016. [1] Jong-hoon (David) An, Avik Chaudhuri, and Jeffrey S. Foster. Static typing for Ruby on Rails. In Automated Software Engineering (ASE), 2009. [17] Sebastian Erdweg, Oliver Bracevac, Edlira Kuci, Matthias Krebs, and Mira Mezini. A co-contextual formulation of type rules and its application to incremental type checking. In Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), 2015. [2] Esben Andreasen and Anders Møller. Determinacy in static analysis for jQuery. In Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), 2014. [18] Jean-Christophe Filliâtre and Sylvain Conchon. Type-safe modular hash-consing. In Proceedings of the 2006 Workshop on ML. ACM, 2006. [3] Kenichi Asai. Reflection in direct style. In Generative Programming and Component Engineering (GPCE), 2011. [19] Daniel P. Friedman and Mitchell Wand. Reification: Reflection without metaphysics. In LISP and Functional Programming, 1984. [4] Kenichi Asai, Satoshi Matsuoka, and Akinori Yonezawa. Duplication and partial evaluation for a better understanding of reflective languages. Lisp and Symbolic Computation, 9(2-3), 1996. [20] Michael Furr, Jong hoon (David) An, and Jeffrey S. Foster. Profile-guided static typing for dynamic scripting languages. In Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), 2009. [5] SungGyeong Bae, Hyunghun Cho, Inho Lim, and Sukyoung Ryu. SAFEWAPI: web API misuse detector for web applications. In Foundations of Software Engineering (FSE), 2014. [21] Philippa Gardner, Sergio Maffeis, and Gareth David Smith. Towards a program logic for JavaScript. In Principles of Programming Languages (POPL), 2012. [6] Nels E. Beckman, Aditya V. Nori, Sriram K. Rajamani, Robert J. Simmons, Sai Deep Tetali, and Aditya V. Thakur. Proofs from tests. IEEE Transactions on Software Engineering, 2010. [22] Patrice Godefroid, Nils Klarlund, and Koushik Sen. DART: Directed automated random testing. In Programming Language Design and Implementation (PLDI), 2005. [7] Pramod Bhatotia, Alexander Wieder, Rodrigo Rodrigues, Umut A. Acar, and Rafael Pasquin. Incoop: MapReduce for incremental computations. In Cloud Computing (SoCC), 2011. [23] Philip J. Guo and Dawson Engler. Using automatic persistent memoization to facilitate data analysis scripting. In Software Testing and Analysis (ISSTA), 2011. [8] Pramod Bhatotia, Pedro Fonseca, Umut A. Acar, Björn B. Brandenburg, and Rodrigo Rodrigues. iThreads: A threading library for parallel incremental computation. In Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2015. [24] Matthew A. Hammer, Yit Phang Khoo, Michael Hicks, and Jeffrey S. Foster. Adapton: Composable, demand-driven incremental computation. In Programming Language Design and Implementation (PLDI), 2014. [25] Matthew A. Hammer, Joshua Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael W. Hicks, and David Van Horn. Incremental computation with names. In Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), 2015. [9] Eric Bodden, Andreas Sewe, Jan Sinschek, Hela Oueslati, and Mira Mezini. Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders. In International Conference on Software Engineering (ICSE), 2011. [10] Adam Chlipala, Leaf Petersen, and Robert Harper. bidirectional type checking. 2005. CoRR, [26] Simon Holm Jensen, Anders Møller, and Peter Thiemann. Type analysis for JavaScript. In Static Analysis (SAS), 2009. Strict [27] Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, and Ben Hardekopf. JSAI: a static analysis platform for JavaScript. In Foundations of Software Engineering (FSE), 2014. [11] Ravi Chugh, David Herman, and Ranjit Jhala. Dependent types for JavaScript. In Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), 2012. [12] Ravi Chugh, Patrick Maxim Rondon, and Ranjit Jhala. Nested refinements: a logic for duck typing. In Principles of Programming Languages (POPL), 2012. [28] Benjamin S. Lerner, Liam Elberty, Jincheng Li, and Shriram Krishnamurthi. Combining form and function: Static types for jQuery programs. In Object-Oriented Programming (ECOOP), 2013. [13] Olivier Danvy and Karoline Malmkjær. Intensions and extensions in a reflective tower. In LISP and Functional Programming, 1988. [29] Paul Blain Levy. Call-by-push-value: A subsuming paradigm. In Typed Lambda Calculi and Applications (TLCA), 1999. [14] Jim des Rivières and Brian Cantwell Smith. The implementation of procedurally reflective languages. In LISP and Functional Programming, 1984. [30] Paul Blain Levy. Call-by-push-value: A Functional/imperative Synthesis, volume 2. 2003. [15] Bruno Dufour, Barbara G. Ryder, and Gary Sevitsky. Blended analysis for performance understanding of framework-based applications. In Software Testing and Analysis (ISSTA), 2007. [31] Changhee Park and Sukyoung Ryu. Scalable and precise static analysis of JavaScript applications via loop-sensitivity. In Object-Oriented Programming (ECOOP), 2015. [16] Joshua Dunfield and Neelakantan R. Krishnaswami. Sound and complete bidirectional typechecking for higher-rank poly- [32] William Pugh. Incremental Computation via Function Caching. PhD thesis, Cornell University, 1988. 11 2016/8/23 [37] Brian Cantwell Smith. Reflection and semantics in Lisp. In Principles of Programming Languages (POPL), 1984. [33] William Pugh and Tim Teitelbaum. Incremental computation via function caching. In Principles of Programming Languages (POPL), 1989. [38] Manu Sridharan, Julian Dolby, Satish Chandra, Max Schäfer, and Frank Tip. Correlation tracking for points-to analysis of JavaScript. In Object-Oriented Programming (ECOOP), 2012. [34] Max Schäfer, Manu Sridharan, Julian Dolby, and Frank Tip. Dynamic determinacy analysis. In Programming Language Design and Implementation (PLDI), 2013. [39] Mitchell Wand and Daniel P. Friedman. The mystery of the tower revealed: A nonreflective description of the reflective tower. Lisp and Symbolic Computation, 1(1), 1988. [35] Jeremy G. Siek and Walid Taha. Gradual typing for functional languages. In Scheme and Functional Programming Workshop, 2006. [40] Shiyi Wei and Barbara G. Ryder. Practical blended taint analysis for JavaScript. In Software Testing and Analysis (ISSTA), 2013. [36] Jeremy G. Siek and Walid Taha. Gradual typing for objects. In Object-Oriented Programming (ECOOP), 2007. 12 2016/8/23
6cs.PL
arXiv:1503.08080v2 [math.AC] 25 Jan 2016 ALGEBRAICALLY RIGID SIMPLICIAL COMPLEXES AND GRAPHS KLAUS ALTMANN, MINA BIGDELI, JÜRGEN HERZOG AND DANCHENG LU Abstract. We call a simplicial complex algebraically rigid if its Stanley-Reisner ring admits no nontrivial infinitesimal deformations, and call it inseparable if it does not allow any deformation to other simplicial complexes. Algebraically rigid simplicial complexes are inseparable. In this paper we study inseparability and rigidity of Stanley-Reisner rings, and apply the general theory to letterplace ideals as well as to edge ideals of graphs. Classes of algebraically rigid simplicial complexes and graphs are identified. Introduction In the study of monomial ideals it is a popular technique to polarize in order to obtain squarefree monomial ideals. Let S = K[x1 , . . . , xn ] be the polynomial ring in n indeterminates over the field K. Given a monomial ideal I ⊆ S, the polarized ideal I ℘ of I is a squarefree monomial ideal defined in a larger polynomial ring S ℘ and S/I is obtained from S ℘ /I ℘ by reduction modulo a regular sequence of linear forms consisting of differences of variables, see [7, page 19] for details. In other words, S ℘ /I ℘ may be viewed an unobstructed deformation of S/I over a suitable affine space. The natural question arises whether S ℘ /I ℘ or any other K-algebra defined by a squarefree monomial ideal admits further unobstructed deformations, or at least non-trivial infinitesimal deformations. This may be indeed the case as the third author learned from Fløystad. Separation. Let I ⊆ S be a squarefree monomial ideal, and let y be an indeterminate over S. Fløystad (see [4]) calls a monomial ideal J ⊆ S[y] a separation of I for the variable xi if the following conditions hold: (i) the ideal I is the image of J under the K-algebra homomorphism S[y] → S with y 7→ xi and xj 7→ xj for all 1 ≤ j ≤ n; (ii) xi and y divide some minimal generators of J; (iii) y − xi is a non-zero divisor of S[y]/J. The ideal I is called separable if it admits a separation, otherwise it is called inseparable. 2010 Mathematics Subject Classification. Primary 13D10, 13C13; Secondary 05E40. Key words and phrases. infinitesimal deformations, rigidity, Stanley-Reisner ideals, edge ideals. The paper was written while the second and the fourth authors were visiting the Department of Mathematics of University Duisburg-Essen. They want to express their thanks for the hospitality. Corresponding author: Dancheng Lu. 1 If J ⊆ S[y] is a separation of I for the variable xi , then K[t] → S[y]/J, t 7→ y −xi , is a non-trivial unobstructed deformation of S/I over A1 = Spec K[t]. The simplest example of a squarefree monomial ideal which admits a separation is the ideal I = (x1 x2 , x1 x3 , x2 x3 ). One possible separation of I is the ideal J = (x1 y, x1x3 , x2 x3 ). Infinitesimal deformations. But even if I ⊆ S is inseparable, it still may admit infinitesimal deformations. We denote by ε a non-zero term with ε2 = 0. Let J ⊆ S[ε] be an ideal. Then S[ε]/J is called an infinitisimal deformation of S/I if the canonical K-algebra homomorphism K[ε] → S[ε]/J is flat and if S/I is obtained from S[ε]/J by reduction modulo ε. Thus if I = (f1 , . . . , fm ), then J = (f1 + g1 ε, . . . , fm + gm ε) and K[ε] → S[ε]/J is flat if and only if ϕ : I → S/I with fi 7→ gi + I is a well-defined S-module homomorphism. In other words, the infinitesimal deformations of S/I are in bijection to the elements of I ∗ = HomS (I, S/I). Cotangent functors. Recall that a K-linear map ∂ : S → S is called a K-derivation if ∂f g = f ∂g + g∂f . The set of K-derivations has a natural structure as an Smodule, and is denoted DerK (S). In fact, DerK (S) is a free S-module whose basis consists of the partial derivatives ∂/∂xi . The infinitesimal deformation S[ε]/J of S/I is called trivial if there exists a K-algebra automorphism S[ε] → S[ε] which maps J to IS[ε]. This is the case, if and only if there exists ∂ ∈ DerK (S) such that J = (f1 +∂f1 ε, . . . , fm +∂fm ε). Thus if we consider the natural map δ ∗ : DerK (S) → I ∗ which assigns to ∂ ∈ DerK (S) the element δ ∗ (∂) with δ ∗ (∂)(fi ) = ∂fi + I, then the non-zero elements of Coker δ ∗ are in bijection to the isomorphism classes of non-trivial infinitesimal deformations of S/I, see for example [6, Lemma 2.4]. This cokernel is denoted by T 1 (S/I) and is called the first cotangent functor of S/I. The cotangent functors have been first introduced by Lichtenbaum and Schlessinger [9]. The K-algebra S/I is called rigid if it does not admit any non-trivial infinitesimal deformations. Hence S/I is rigid if and only if T 1 (S/I) = 0. For simplicity we call I rigid if S/I is rigid. The simplest example of a squarefree monomial ideal which is inseparable but not rigid, is the ideal I = (x1 x2 , x2 x3 , x3 x4 ), see Proposition 3.7(a) and Theorem 3.10. We recommend the reader to consult [10, Section 3] for general basic facts about deformation theory. Rigidity of simplicial complexes. In the case that I ⊆ S is a monomial ideal, T 1 (S/I) is a Zn -graded S-module. If moreover I is a squarefree monomial ideal, then the Zn -graded components of T 1 (S/I) have a combinatorial interpretation as was shown by the first author and Christophersen in [2] and [1]. We recall some of these results in Section 1 of this paper because they are crucial for later applications. Recall that a simplicial complex ∆ on the vertex set V is a collection of subset of V such that whenever F ∈ ∆ and G ⊂ F , then G ∈ ∆. Frequently we denote the vertex set of ∆ by V (∆). Since I is a squarefree monomial ideal, there exists a unique simplicial complex ∆ such that I = I∆ , where I∆ is the Stanley–Reisner ideal of ∆. As usual, S/I∆ is denoted by K[∆] and is called the Stanley–Reisner ring of ∆. For simplicity we will write T 1 (∆) for T 1 (K[∆]). We say that ∆ is algebraically rigid (with respect to K) if K[∆] is rigid. Actually it is shown in Section 1 that algebraic rigidity of simplicial 2 complexes does not depend on K. There is the concept of rigid simplicial complexes, meaning that the simplicial complex does not admit any non-trivial automorphism. In this paper rigidity means algebraic rigidity, and will simply say that ∆ is rigid if it is algebraically rigid. Description of contents. The aim of this paper is to characterize rigid simplicial complexes in combinatorial terms and exhibit classes of them. By what we said before, it follows that ∆ is rigid if and only if T 1 (∆)c = 0 for all c ∈ Zn . The important facts, shown in [2], regarding the graded components of T 1 (∆) that will be used throughout the paper, are the following: write c = a − b with a, b ∈ Nn and supp a ∩ supp b = ∅. Here for a vector a, supp a is defined to be the set {i ∈ [n] : ai 6= 0} where the ai are the components of a. Then (i) T 1 (∆)a−b = 0 if b 6∈ {0, 1}n, and if b ∈ {0, 1}n , then T 1 (∆)a−b depends only on supp a and supp b; (ii) T 1 (∆)a−b = T 1 (link∆ supp a)−b . We say that ∆ is ∅-rigid if T 1 (∆)−b = 0 for all b ∈ {0, 1}n. Thus, by (ii), ∆ is rigid, if and only if all its links are ∅-rigid. These and other facts are recalled in Section 1. We close the section by applying the general theory to characterize inseparable simplicial complexes. Say, ∆ is a simplicial complex on the vertex set [n]. To each vertex i of ∆ one attaches a graph G{i} (∆) whose vertices are those faces F ∈ ∆ for which F ∪ {i} 6∈ ∆. The edges of G{i} (∆) are those {F, G} for which F ( G or G ( F . In Theorem 1.8 we show that ∆ is inseparable if and only if G{i} (∆) is connected for i = 1, . . . , n, and that this is equivalent to the condition that T 1 (∆)−ei = 0 for i = 1, . . . , n. Here ei denotes the ith canonical basis vector of Zn . Let dimK T 1 (∆)−ei = k. Iterating simple separation steps one can construct a e on the vertex set ([n] \ {i}) ∪ {v0 , v1 , . . . , vk } defined as ksimplicial complex ∆ e −b = 0 for all b with separation of ∆ for the vertex i having the property that T 1 (∆) e by cutting down supp b ⊆ {v0 , . . . , vk }, and such that K[∆] is obtained from K[∆] by a regular sequence consisting of differences of variables. In Section 2 we consider various operations on simplicial complexes and study their behaviour with respect to rigidity. In Proposition 2.3 it is shown that the join ∆1 ∗ ∆2 of the simplicial complexes ∆1 and ∆2 is rigid if and only if this is the case for ∆1 and ∆2 . More complicated is the situation for the disjoint union of two simplicial complexes ∆1 and ∆2 . Here we assume that none of the two simplicial complexes is the empty set and that their 0-dimensional faces correspond to their vertex set, a condition that we do not require in general. Under these (very weak) assumptions it is shown in Theorem 2.5 that ∆1 ∪ ∆2 is inseparable if and only if ∆1 and ∆2 are simplices, and that ∆1 ∪ ∆2 is rigid if and only in addition one of the simplices has positive dimension. As a consequence we see that a disconnected simplicial complex of positive dimension is never rigid, unless all its components are simplices. Finally in Theorem 2.10 we consider what we call the circ of two simplicial complexes, denoted by ∆1 ◦ ∆2 . Suppose that Vi is the vertex set of ∆i and 3 that V1 ∩ V2 = ∅. Then, by definition, F ⊆ V1 ∪ V2 is a face of ∆1 ◦ ∆2 if and only if either F ∩ V1 is a face of ∆1 or F ∩ V2 is a face of ∆2 . Note that ∆1 ◦ ∆2 = (∆1 ∗ hV2 i) ∪ (hV1 i ∗ ∆2 ) and that I∆1 ◦∆2 = (I∆1 I∆2 ). It turns out that ∆1 and ∆2 are rigid if ∆1 ◦ ∆2 is rigid and I∆1 , I∆2 6= 0. The converse is true only under some additional assumptions. A motivation for us to study the circ-operation resulted from the desire to classify the rigid letterplace ideals, see [4]. Given two finite posets P and Q, one assigns a monomial ideal L(P, Q), which in the case P = [n] or Q = [n] is called a letterplace ideal or a co-letterplace ideal, respectively. Letterplace and co-letterplace ideals have been considered before in [3]. In the paper [4] it is shown that all letterplace ideals are inseparable. Here we show that L(P, Q) is rigid if and only if no two elements of P are comparable, see Theorem 2.12. In the proof of one direction of this theorem we need the circ-construction. The last section of this paper is concerned with the rigidity of edge ideals. Given a finite simple graph on the vertex set [n] one assigns to it the so-called edge ideal I(G) generated by the monomials xi xj with {i, j} an edge of G. Obviously I(G) = I∆(G) for some simplicial complex ∆(G). This simplicial complex is called the independence complex of G. Indeed, its faces are the independent sets of G, that is, the subsets of [n] which do not contain any edge of G. We say that G is rigid if ∆(G) is rigid. Again there exist already various concepts of rigid graphs which should not be confused with the definition of rigidity used in this paper. Similarly, we say that G is inseparable if I(G) is inseparable. The ultimate goal would be to classify all rigid and inseparable graphs. It is not clear whether a nice description of these classes of graphs is possible. However with some additional assumptions on the graphs, inseparable or rigid graphs can be characterized combinatorially. Recall that a vertex i of G is called a free vertex if it belongs to only one edge, and an edge is called a leaf if it has a free vertex. Finally an edge e of G is called a branch, if there exists a leaf e′ with e′ 6= e such that e ∩ e′ 6= ∅. Our main result on rigidity of graphs is formulated in Theorem 3.10: Let G be a graph on the vertex set [n] such that G does not contain any induced cycle of length 4, 5 or 6. Then G is rigid if and only if each edge of G is a branch and each vertex of a 3-cycle of G belongs to a leaf. Theorem 3.10 has several consequences. In Corollary 3.11 it is shown that a chordal graph G is rigid if and only if each edge of G is a branch and each vertex of a 3-cycle of G belongs to a leaf. Another consequence is the fact that a graph with the property that all cycles have length ≥ 7 is rigid if and only if each of its edges is a branch, see Corollary 3.12. This result implies in particular that a forest consisting only of branches is rigid. Finally we notice in Corollary 3.13 that a cycle is rigid if and only if it is a 4- or 6-cycle. 1. The cotangent functor T 1 and rigid and inseparable Stanley–Reisner rings The cotangent functor T 1 . Let ∆ be a simplicial complex on the vertex set V (∆) = [n] where [n] = {1, . . . , n}. We denote by [∆] the set of elements i ∈ [n] with {i} ∈ ∆. Let F1 , . . . , Fm ⊆ [n]. We denote by hF1 , . . . , Fm i the smallest simplicial 4 complex ∆ with Fi ∈ ∆ for i = 1, . . . , m. The elements of ∆ are called faces. A facet of ∆ is a face of ∆ which is maximal with respect to inclusion. The set of facets of ∆ will be denoted by F (∆). We fix a field K. The ideal I∆ denotes the Stanley-Reisner ideal in S = K[x1 , . . . , xn ], that is,Qthe ideal generated by the monomial xN with N ⊆ [n] a non-face of ∆. Here xN = i∈N xi . The K-algebra K[∆] = S/I∆ is called the Stanley-Reisner ring of ∆. The cotangent cohomology modules T i (K[∆]) which we denote by T i (∆) are Zn graded. We quote several facts about the Zn -graded components of T i (∆) which were shown in [2]. We write c ∈ Zn as a − b with a, b ∈ Nn and supp a ∩ supp b = ∅, and set A = supp a and B = supp b. Here N denotes the set of non-negative integers, and as in the introduction the support of a vector a ∈ Nn is defined to be the set supp a = {i ∈ [n] : ai 6= 0}. Theorem 1.1 ([2], Theorem 9). (a) T i (∆)a−b = 0 if b 6∈ {0, 1}n . (b) Assuming b ∈ {0, 1}n , T i (∆)a−b depends only on A and B. Recall that for a subset A of [n], the link of A is defined to be link∆ A = {F ∈ ∆ : F ∩ A = ∅, F ∪ A ∈ ∆} with vertex set V (link∆ A) = [n] \ A. We will also need the following result: Proposition 1.2 ([2], Proposition 11). (a) T i (∆)a−b = 0, unless A∈∆ and ∅= 6 B ⊆ [link∆ A]. (b) T i (∆)a−b = T i (link∆ A)−b . In the present paper, we are only interested in T 1 . Because of Proposition 1.2(b) it is important to know how to compute T 1 (∆)−b for B ⊆ [∆]. For this purpose we introduce some notation. Let Y be a collection of subsets of [n]. We set K0 (Y) = {λ : Y → K} and  K1 (Y) = λ : {(Y0 , Y1 ) ∈ Y 2 : Y0 ∪ Y1 ∈ Y} → K and define the K-linear map d : K0 (Y) → K1 (Y) by (dλ)(Y0, Y1 ) = λ(Y1 ) − λ(Y0 ). Next given B ⊆ [n] and ∆, we define NB (∆) = {F ∈ ∆ : F ∩ B = ∅, F ∪ B ∈ / ∆}, ′ eB (∆) = {F ∈ NB (∆) : there exists B ( B with F ∪ B ′ ∈ N / ∆}. With the notation introduced one has Proposition 1.3 ([2], Corollary 6). (a) Suppose |B| ≥ 2. Then  (d,r) eB (∆)) , T 1 (∆)−b = Ker K0 (NB (∆)) −→ K1 (NB (∆)) ⊕ K0 (N where d : K0 (NB (∆)) → K1 (NB (∆)) is the map as defined above and r : K0 (NB (∆)) → eB (∆)) is the restriction map. K 0 (N 5 (b) For |B| = 1, the K-dimension of T 1 (∆)−b is one less than the K-dimension of the kernel given in (a). Rigidity. The simplicial complex ∆ is called ∅-rigid if T 1 (∆)−b = 0 for all b ∈ {0, 1}n . For ∅-rigidity it is enough to check the vanishing of T 1 (∆)−b for b ∈ {0, 1}n with supp b ⊆ [∆]. It follows from Proposition 1.2 that ∆ is rigid if and only if link∆ A is ∅-rigid for all A ∈ ∆. Thus we will assume a = 0 from now on. As an immediate consequence of Proposition 1.3 one obtains Corollary 1.4. (a) Suppose that |B| ≥ 2. Then T 1 (∆)−b = ΛB (∆), where ΛB (∆) = {λ : NB (∆) → K : λ|NeB (∆) = 0 and λ(F ) = λ(G) whenever F ⊆ G}. (b) dimK T 1 (∆)−b = dimK ΛB (∆) − 1 if |B| = 1. Let B be a subset of [n]. We define GB (∆) to be the graph whose vertex set is NB (∆) and for which {F, G} is an edge of GB (∆) if and only if F ( G or G ( F . It follows that λ ∈ ΛB (∆) is constant on the connected components of GB (∆). Note eB (∆) = ∅. We see that if |B| ≥ 2, then that if |B| = 1, then N (1) dimK T 1 (∆)−b = number of connected components of GB (∆) eB (∆), which contain no element of N and if B = {i}, then (2) dimK T 1 (∆)−ei = number of connected components of G{i} (∆) − 1 Hence the rigidity of a simplicial complex is independent of the field K. Examples 1.5. (a) Let 2[n] = h[n]i be the simplex on the vertex set [n]. For each eB (2[n] ) = ∅. This implies that 2[n] is ∅-rigid. Moreover, for each B ⊆ [n] we have N [n] A ∈ 2 , its link is a simplex, too. Thus, 2[n] is rigid. Of course, this is known before because K[2[n] ] = K[x1 , . . . , xn ]. (b) Fix n ≥ 2, and let Γ = 2[n] \{[n]} be the boundary of 2[n] . Then N[n] (Γ) = {∅}, e[n] (Γ) = ∅. In particular, dimK T 1 (Γ)−b = 1 for b = (1, . . . , 1). Again this but N follows also directly from the fact that K[Γ] = K[x1 , . . . , xn ]/(x1 x2 · · · xn ). (c) let ∆ = h{1}, . . . , {n}i. Then ∆ is 0-dimensional. The set B = {1} yields eB (∆) = ∅. Hence, T 1 (∆)−b 6= 0 for n ≥ 3, and so ∆ NB (∆) = {{2}, . . . , {n}} and N is not rigid. Note that K[∆] = K[x1 , . . . , xn ]/(xi xj : i 6= j). The ideal (xi xj : i 6= j) may be interpreted as the edge ideal of the complete graph on the vertex set [n]. Rigidity of edge ideals will be discussed in details in Section 3. The following lemma tells us when T 1 (∆)−b vanishes if supp b 6∈ ∆. We denote by 2B the simplex on the vertex set B. Lemma 1.6. Let ∆ be a simplicial complex on the vertex set [n], and let b ∈ {0, 1}n . Let B = supp b and assume that B 6∈ ∆. 6 eB (∆) 6= ∅. (a) Suppose that |B| ≥ 2. Then T 1 (∆)−b = 0 if and only if N 1 B B Moreover, T (∆)−b 6= 0 implies that the boundary 2 \{B} of 2 is contained in ∆. (b) Suppose that |B| = 1. Then T 1 (∆)−b = 0. Proof. Since B 6∈ ∆ it follows that ∅ ∈ NB (∆). Therefore, λ(F ) = λ(∅) for all λ ∈ ΛB (∆). Thus the K-vector space ΛB (∆) is generated by one element λ0 which eB (∆) 6= ∅ and which may be chosen to be the is forced to be the 0-element if N constant map with λ0 (∅) = 1, otherwise. This proves (a). Also (b) follows from this considerations keeping in mind Corollary 1.4(b). Alternatively, statement (b) follows from Lemma 1.2(a).  Separation. Let, as before, ∆ be a simplicial complex on the vertex set [n]. We say that ∆ is separable, if for some i, I∆ admits a separation for xi . Otherwise, we say that ∆ is inseparable. In the further discussions we refer to the conditions (i), (ii) and (iii) for separation, as given in the introduction. Let I = I∆ be minimally generated by the monomials u1 , . . . , um . We first observe: Lemma 1.7. If J is a separation of I for the variable xi , then T 1 (∆)−ei 6= 0. Proof. By condition (iii), S/I is obtained from S[y]/J by reduction modulo a linear form which is a regular element on S[y]/J. This implies that I and J are minimally generated by the same number of generators. Let J be minimally generated by v1 , . . . , vm . We may assume that y divides v1 , . . . , vk but does not divide the other generators of J. We may furthermore assume that for all i, vi is mapped to ui under the K-algebra homomorphism (i). Then we may write J = (u1 + (u1 /xi )(y − xi ), . . . , uk + (uk /xi )(y − xi ), uk+1, . . . , um ). From this presentation and by (iii) it follows that S[y]/J is an unobstructed deformation of S/I induced by the element [ϕ] ∈ T 1 (S/I)−ei , where ϕ ∈ I ∗ is the S-module homomorphism with ϕ(uj ) = uj /xi + I for j = 1, . . . , k and ϕ(uj ) = 0, otherwise. Condition (ii) makes sure that S[y]/J is a non-trivial deformation of S/I. Indeed, suppose [ϕ] = 0. Observe, that deg ϕ = −ei . Therefore, ϕ ∈ (Im δ ∗ )−ei , which is the K-vector space spanned by ϕi = δ ∗ (∂/∂xi ). Here δ ∗ : DerK (S) → I ∗ is the map as defined in the introduction with δ ∗ (∂)(f ) = ∂f + I for ∂ ∈ DerK (S) and f ∈ I. It follows that ϕ = λϕi for some λ ∈ K. Since ϕ(u1) = u1 /xi + I = λϕi (u1 ) it follows that λ = 1. On the other hand, by condition (ii), there exists j > k such that xi |uj and ϕ(uj ) = I 6= uj /xi + I = ϕi (uj ). This is a contradiction.  It follows from the above result that ∆ is inseparable if T 1 (∆)−ei = 0 for i = 1, . . . , n. Moreover the deformation K[y] → S[y]/J induces an infinitesimal deformation K[ε] → S[ε]/J¯ by reduction modulo y 2. As explained in the introduction, this infinitesimal deformation yields an element in T 1 (∆). This assignment is called the Kodaira-Spencer map. The arguments given above, even show that the image of the deformation K[y] → S[y]/J in T 1 (∆) via the Kodaira-Spencer map is non-trivial. 7 Finally we obtain Theorem 1.8. The following conditions are equivalent: (a) ∆ is inseparable. (b) G{i} (∆) is connected for i = 1, . . . , n. (c) T 1 (∆)−ei = 0 for i = 1, . . . , n. Proof. (c) ⇒ (a) follows from Lemma 1.7, and (b) ⇐⇒ (c) follows from the equality (2) in the preceding subsection. (a) ⇒ (b): Suppose G{i} (∆) is not connected for some i. Then the vertex set of G{i} (∆) can be written as a disjoint union V (G{i} (∆)) = A ∪ B such that for all F ∈ A and all G ∈ B, neither F ( G nor G ( F . Let I = I∆ , I(A) = (xF : F ∈ A) and I(B) = (xG : G ∈ B). Then I = (xi I(A), xi I(B), u1 , u2, . . . , ut ), where none of the uj is divisible by xi . Note that if {xF1 , . . . , xFr } is the minimal set of monomial generators of I(A) and {xG1 , . . . , xGs } is the minimal set of monomial generators of I(B), then {xi xF1 , . . . , xi xFr , xi xG1 , . . . , xi xGs } is the set of monomials of the minimal monomial set of generators of I which are divisible by xi . Thus, the ideal J = (yI(A), xiI(B), u1 , u2 , . . . , ut) ⊆ S[y] satisfies the conditions (i) and (ii) of a separation of I. We will show that y − xi is a non zero-divisor of S[y]/J. This will then imply that ∆ is separable, yielding a contradiction. Indeed, suppose y−xi is a zero-divisor of S[y]/J. Then y−xi belongs to a minimal prime ideal P of J. Since P is a monomial prime ideal it follows that y, xi ∈ P . Now let F ∈ A and G ∈ B and suppose that F ∪ G ∈ ∆. Then F ∪ G ∈ N{i} (∆), and hence F ∪ G ∈ A since F ( F ∪ G, and similarly F ∪ G ∈ B since G ( F ∪ G. This is a contradiction. Therefore, F ∪G 6∈ ∆ for all F ∈ A and G ∈ B. This implies that I(A)I(B) ⊆ I. It follows that I(A)I(B) ⊆ J, since xi does not divide any of the generators of I(A)I(B). Now since I(A)I(B) ⊆ P we conclude that I(A) ⊆ P or I(B) ⊆ P . As P is a minimal prime ideal of J, we see that y 6∈ P if I(A) ⊆ P and xi 6∈ P if I(B) ⊆ P . In any case we obtain a contradiction.  k-Separation. Let A and B be two finite collections of sets with F ∩ G = ∅ for all F ∈ A and G ∈ B. As it is common, we denote by A ∗ B the join of A and B, where A ∗ B = {F ∪ G : F ∈ A, G ∈ B}. If Γ and Σ are simplicial complexes, then the join Γ ∗ Σ is again a simplicial complex. The vertex set of Γ ∗ Σ is the set 1 V (Γ) ∪ V (Σ). In [1, Lemma 4.3], it was shown that all T−e (X) vanish whenever X i is a combinatorial manifold without boundary. Now we will show that beyond this special case the deformations in degree −ei are unobstructed. More precisely, we prove the following statement: Proposition 1.9. Assume that V (∆) = [n] and dimK T 1 (∆)−ei = k. Then there e on the vertex set ([n]\{i})∪{v0 , . . . , vk } such that I e is exists a simplicial complex ∆ ∆ 8 e −b = 0 obtained from I∆ by k times separations for the variable xi . Moreover T 1 (∆) for any b whose support supp b ⊆ {v0 , . . . , vk }. Proof. We may decompose ∆ as a disjoint union {∅, {i}} ∗ link∆ {i} ∪ N{i} (∆). Since dimK T 1 (∆)−ei = k, we have N{i} (∆) splits into k + 1 connected components N{i} (∆) = A0 ∪ A1 ∪ . . . ∪ Ak . As in the proof of Theorem 1.8, we can express I∆ as I∆ = ({xi xF : F ∈ k [ Aℓ }, u1 , . . . , ut ), ℓ=0 where the generators uj are not divisible by xi . e on the vertex set ([n]\{i})∪{v0 , v1 , . . . , vk } We define a new simplicial complex ∆ by k [ e = Ω ∗ link∆ {i} ∪ (Ωℓ ∗ Aℓ ). ∆ ℓ=0 Here Ω = h{v0 , . . . , vk }i, and Ωℓ = h{v0 , . . . , vk } \ {vℓ }i for ℓ = 0, . . . , k. Set T = K[x1 , . . . , xi−1 , xi+1 , . . . , xn , y0 , . . . , yk ]. Then I∆e is an ideal of T and I∆e = ({yℓ xF : ℓ = 0, . . . , k, F ∈ Aℓ }, u1 , . . . , ut). Theorem 1.7 provides the induction step of proving the k-separability. Thus applying induction it can be shown that S/I is isomorphic to T /I∆e modulo the regular e −b = 0 for any b whose sequence y1 − y0 , . . . , yk − yk−1 , and furthermore T 1 (∆) support supp b ⊆ {v0 , . . . , vk }.  We call I∆e a k-separation of I∆ . 2. Joins, disjoint unions and circs of simplicial complexes In this section we consider simplicial complexes arising from pairs of simplicial complexes and study their behaviour with respect to rigidity. Part of the results will be applied to classify rigid algebras defined by letterplace ideals. Monomial localization. In the following localization will be one of the tools in the proofs. Let K be a field, S = K[x1 , . . . , xn ] the polynomial ring over K, I ⊆ S a monomial ideal and P ⊆ S a monomial prime ideal. Then P = PF where F ⊆ [n] and PF = (xi : i ∈ F ). We observe that if (S/I)P denotes ordinary localization of S/I with respect to the prime ideal P , then (S/I)P = SP /I(P )SP , where I(P ) ⊆ S(P ) := K[xi : i ∈ F ] is the monomial ideal which is obtained from I by the substitution xi 7→ 1 for i 6∈ F . The ideal I(P ) is called the monomial localization of I with respect to P . Lemma 2.1. Let I ⊆ S be a monomial ideal, P ⊆ S a monomial prime ideal, and F ⊆ [n]. 9 (a) T 1 (S/I)P ∼ = (T 1 (S(P )/I(P ))[xi : i 6∈ P ])P . (b) Suppose that T 1 (S(P )/I(P )) 6= 0. Then T 1 (S/I) 6= 0. (c) Let I be a squarefree monomial ideal. Let ∆ be the simplicial complex on the vertex set [n] with I∆ = I. Then S(PF )/I∆ (PF ) = S(PF )/IΓ , where F = [n] \ F and Γ = link∆ (F ). In particular, Γ is rigid if ∆ is rigid. Proof. (a) Note that DerK (S) = HomS (ΩS/K , S), where ΩS/K is module of differentials of S/K, see [5, Definition, p. 384]. Since ΩS/K localizes (see [5, Proposition 16.6], the same holds true for DerK (S). In other words, DerK (S)P = DerK (SP ). From this fact one easily deduces that T 1 (S/I) localizes, that is T 1 (S/I)P = T 1 ((S/I)P ). Therefore, / P ])P T 1 (S/I)P ∼ = T 1 ((S(P )/I(P ))[xi : xi ∈ = T 1 ((S/I(P )S)P ) ∼ = T 1 ((S/I)P ) ∼ 1 ∼ = (T (S(P )/I(P ))[xi : i 6∈ P ])P . The last isomorphism follows from the fact that T 1 (R[y]) ∼ = T 1 (R) ⊗R R[y] = 1 T (R)[y] for a polynomial extension R → R[y]. (b) Suppose that T 1 (S(P )/I(P )) 6= 0 and let mP be the graded maximal ideal of S(P ) . Then T 1 (S(P )/I(P ))mP 6= 0 because mP ∈ Supp(T 1 (S(P )/I(P ))). It follows that (T 1 (S(P )/I(P ))[xi : i 6∈ P ])P 6= 0, since mP S = P . Hence the assertion follows from part (a). (c) Since F (Γ) = {G \ F : G ∈ F (∆), F ⊆ G}, we obtain that IΓ ⊆ S(PF ) is given by \ \ PG . IΓ = PF \(G\F ) = G∈F (∆),F ⊆G G∈F (∆),F ⊆G On the other hand, I∆ (PF ) = \ PG (PF ) = \ PG . G∈F (∆),F ⊆G G∈F (∆) Hence IΓ = I∆ (PF ).  Note that the fact stated in Lemma 2.1(c) which says that each link of a rigid simplicial complex is again rigid can also be deduced from Proposition 1.2(b). Example 2.2. Let I be a squarefree monomial ideal of K[x1 , . . . , xn ] generated in degree (n − 1). (a) If n = 3, then I is rigid if and only if I is generated by two monomials. (b) If n ≥ 4, then I is not rigid. Proof. In the following we may assume that I is not a principal ideal, because in this case I is a complete intersection generated in degree ≥ 2, and hence I is not rigid. (a) For n = 3, I is an edge ideal of a nonempty simple graph with 3 vertices. Edge ideals will be treated in detail on Section 3. A nonempty simple graph with 3 vertices is an isolated edge or a path of length 2 or a triangle. It follows from Theorem 3.10 that in those graph, only the second is rigid. This proves our result. 10 (b) We proceed by induction on n. Assume n = 4. If I is generated by 4 monomials, then the monomial localization I(P ) of I with respect to P = (x1 , x2 , x3 ) is the edge ideal of a triangle, and so I(P ) is not rigid because of Theorem 3.10. By Lemma 2.1(b) it follows that I is not rigid. If I is generated by 3 monomials, then I is the product of a variable, say x1 , and the edge ideal (x2 x3 , x2 x4 , x3 x4 ) of a triangle, and so it is not rigid. Indeed, this follows again from Lemma 2.1(b) by monomial localization with respect to P = (x2 , x3 , x4 ). If I is generated by 2 monomials, then it is the product of a monomial of degree 2 and an ideal generated by variables, and again I is not rigid. Assume n > 4. If I is generated by n monomials, then the monomial localization I(P ) of I with respect to P = (x1 , x2 , x3 ) is the edge ideal of a triangle, and so I is not rigid. If I is generated by less than n monomials, then I is the product of a variable and an ideal J which is generated in degree n − 2 in the remaining n − 1 variables. It follows from the induction hypothesis that J is not rigid and so I is not rigid.  Joins. Note that the notation “join” has been defined in the first section. Thus, if ∆1 and ∆2 are simplicial complexes on disjoint vertex sets, then the join ∆1 ∗ ∆2 is a simplicial complex on the vertex set V (∆1 ) ∪ V (∆2 ). In the remaining part of this subsection we always assume that ∆1 and ∆2 are simplicial complexes with disjoint vertex sets. Proposition 2.3. Let I∆1 ⊆ K[x1 , . . . , xn ] and I∆2 ⊆ K[y1 , . . . , ym ]. Then T 1 (∆1 ∗ ∆2 ) = T 1 (∆1 )[y1 , . . . , ym ] ⊕ T 1 (∆2 )[x1 , . . . , xn ]. In particular ∆1 ∗ ∆2 is rigid if and only if ∆1 and ∆2 are rigid. Proof. Set I = I∆1 ∗∆2 . Then I = I1 + I2 , where I1 = I∆1 S, I2 = I∆2 S and where S = K[x1 , . . . , xn , y1 , . . . , ym]. We set R = S/I. Furthermore let α · · · −→ F2 −→ F1 −→ S −→ S/I1 −→ 0 be the a resolution of I1 and let β · · · −→ G2 −→ G1 −→ S −→ S/I2 −→ 0 be the a resolution of I2 . Then, since TorSi (S/I1 , S/I2 ) = 0 for i > 0, the tensor product of the two above resolutions produces the following free S-resolution of S/I: γ · · · −→ F2 ⊕ (F1 ⊗ G1 ) ⊕ G2 −→ F1 ⊕ G1 −→ I −→ 0 Let f ⊗ g ∈ F1 ⊗ G1 . Then γ(f ⊗ g) = β(g)f − α(f )g ∈ I(F1 ⊕ G1 ). It follows that (F1 ⊗ G1 → F1 ⊕ G1 ) ⊗S R = 0. This implies that (3) I ∗ = Ker(F1∗ ⊕ G∗1 −→ F2∗ ⊕ G∗2 ) = I1∗ ⊕ I2∗ . Here M ∗ = HomS (M, S/I) for any graded S-module M. Assume that I1 is minimally generated by u1 , . . . , ur and I2 is minimally generated by v1 , . . . , vs . Let f1 , . . . , fr be the basis of F1 , where fi is mapped to ui in I1 for 1 ≤ i ≤ r and let g1 , . . . , gs be the basis of G1 , where gj is mapped to vj in I2 for 1 ≤ j ≤ s. Also we denote by f1∗ , . . . , fr∗ the basis F1∗ dual to f1 , . . . , fr . In other 11 words, fi∗ (fj ) = 1 ∈ S if i = j and fi∗ (fj ) = 0 if i 6= j. Similarly, we denote by g1∗ , . . . , gs∗ the dual basis of g1 , . . . , gs . Then Im δ ∗ ⊆ F1∗ ⊕ G∗1 is generated by the elements r s r X ∂uk ∗ X ∂vl ∗ X ∂uk ∗ (4) fk + gl = fk ∂x ∂x ∂x i i i k=1 l=1 k=1 for i = 1, . . . , n, and (5) r X ∂uk k=1 ∂yj fk∗ s s X ∂vl ∗ X ∂vl ∗ + g = g ∂yj l ∂yj l l=1 l=1 for j = 1, . . . , m. Here we use that ∂vl /∂xi = 0 for l = 1, . . . , s and ∂uk /∂yj = 0 for k = 1, . . . , r. Since T 1 (∆1 ∗ ∆2 ) ∼ = I ∗ / Im δ ∗ , (3), (4) and (5) imply that T 1 (∆1 ∗ ∆2 ) = T 1 (S/I1 ) ⊕ T 1 (S/I2 ). This yields the desired isomorphism because S/I1 ∼ = (K[x1 , . . . , xn ]/I∆ )[y1 , . . . , ym ] and S/I2 ∼ = (K[y1 , . . . , ym ]/I∆ )[x1 , . . . , xn ]. 1 2  Corollary 2.4. For all a − b ∈ Zn+m , we have T 1 (∆1 ∗ ∆2 )a−b ∼ = (T 1 (∆1 )[y1 , . . . , ym ])a−b ⊕ (T 1 (∆2 )[x1 , . . . , xn ])a−b . Proof. The assertion follows immediately from Proposition 2.3. However we give an alternative and more direct proof for this isomorphism: (i) Observing that links commute with joins, it is enough to prove that T 1 (∆1 ∗ ∆2 )−(b1 +b2 ) = (T 1 (∆1 )[y1 , . . . , ym])−(b1 +b2 ) ⊕ (T 1 (∆2 )[x1 , . . . , xn ])−(b1 +b2 ) , where Bi := supp bi ⊆ V (∆i ) for i = 1, 2. (ii) First we show that NB1 ∪B2 (∆1 ∗ ∆2 ) = [NB1 (∆1 ) ∗ (∆2 \ B2 )] ∪ [(∆1 \ B1 ) ∗ NB2 (∆2 )], where ∆i \ Bi = {F ∈ ∆i : F ∩ Bi = ∅} for i = 1, 2. Let F1 ∪ F2 ∈ NB1 ∪B2 (∆1 ∗ ∆2 ) with Fi ∈ ∆i for i = 1, 2. Then Fi ∈ ∆i \ Bi for i = 1, 2 and (F1 ∪ F2 ) ∪ (B1 ∪ B2 ) ∈ / ∆1 ∗ ∆2 by definition. It follows that for at least one i ∈ {1, 2}, Fi ∪ Bi ∈ / ∆i , namely, Fi ∈ NBi (∆i ). This actually proves the containment ⊆. The other containment can be proved similarly. (iii) Suppose that Bi 6= ∅ for i = 1, 2. We will show that both sides of the identity in step (i) vanishes. Let F1 ∪ F2 ∈ NB1 ∪B2 (∆1 ∗ ∆2 ) with Fi ∈ ∆i for i = 1, 2. Then Fi ∈ NBi (∆i ), for at least one i ∈ {1, 2} by the proof of (ii), say i = 1. It follows that (F1 ∪ F2 ) ∪ eB ∪B (∆1 ∗ ∆2 ). Hence B1 ∈ / ∆1 ∗ ∆2 . Since B1 ( B1 ∪ B2 , we have F1 ∪ F2 ∈ N 1 2 eB1 ∪B2 (∆1 ∗ ∆2 ). This implies that the left side of the identity NB1 ∪B2 (∆1 ∗ ∆2 ) = N in step (i) vanishes. To see that the right side also vanishes, we note that a multi-homogeneous eleam ment in T 1 (∆1 )[y1 , . . . , ym ] has the form ty1a1 · · · ym , where t is a multi-homogeneous 12 am has the multielement in T 1 (∆1 ) and ai ≥ 0 for i = 1, . . . , m. But y1a1 · · · ym homogeneous degree for which each coordinate is greater or equal than zero. Hence (T 1 (∆1 )[y1 , . . . , ym ])−(b1 +b2 ) = 0. Similarly (T 1 (∆2 )[x1 , . . . , xn ])−(b1 +b2 ) = 0. (iv) If one of the Bi is the empty set, say B2 = ∅, then (ii) implies that eB1 (∆1 ∗ ∆2 ) = N eB1 (∆1 ) ∗ ∆2 . NB1 (∆1 ∗ ∆2 ) = NB1 (∆1 ) ∗ ∆2 and N This yields T 1 (∆1 ∗ ∆2 )−b1 = T 1 (∆1 )−b1 = (T 1 (∆1 )[y1 , . . . , ym ])−b1 , as desired.  Disjoint unions. Next we consider the simplicial complex ∆1 ∪ ∆2 which is the disjoint union of ∆1 and ∆2 . The vertex set of ∆1 ∪ ∆2 is V (∆1 ) ∪ V (∆2 ) and F ∈ ∆1 ∪ ∆2 if and only if F ∈ ∆1 or F ∈ ∆2 . Theorem 2.5. Let ∆1 6= {∅} and ∆2 6= {∅} be simplicial complexes with disjoint vertex sets. Assume that for i = 1, 2, V (∆i ) = [∆i ], that is, {j} ∈ ∆i for all j ∈ V (∆i ). (a) The following conditions are equivalent: (1) ∆1 ∪ ∆2 is inseparable; (2) ∆1 and ∆2 are simplices. (b) The following conditions are equivalent: (1) ∆1 ∪ ∆2 is rigid; (2) ∆1 ∪ ∆2 is ∅-rigid; (3) ∆1 and ∆2 are simplices with dim ∆1 + dim ∆2 > 0. Proof. Let ∆ = ∆1 ∪ ∆2 . (a) (1) ⇒ (2): Since ∆ is inseparable, Theorem 1.8 implies that the graph G{i} (∆) is connected for all i ∈ V (∆1 ) ∪ V (∆2 ). Let i ∈ V (∆1 ). By assumption we have {i} ∈ ∆. It follows that N{i} (∆) = N{i} (∆1 ) ∪ ∆2 \ {∅}. Since N{i} (∆1 ) and ∆2 \ {∅} belong to different connected components of G{i} (∆) and since G{i} (∆) is connected, it follows that either N{i} (∆1 ) = ∅ or ∆2 \ {∅} = ∅. The second case is ruled out by assumption. Hence, N{i} (∆1 ) = ∅. This implies that i ∈ F for all F ∈ F (∆1 ). Since i is an arbitrary element in V (∆1 ) we see that F (∆1 ) = {V (∆1 )}. Starting with i ∈ V (∆2 ), the same argument proves that ∆2 is also a simplex. (2) ⇒ (1): By Theorem 1.8, it is enough to show that G{i} (∆) is connected for all i ∈ V (∆1 ) ∪ V (∆2 ). Let i ∈ V (∆1 ). As mentioned above we have N{i} (∆) = N{i} (∆1 )∪∆2 \{∅}. Since ∆1 is a simplex and {i} ∈ ∆1 it follows that N{i} (∆1 ) = ∅. Thus N{i} (∆) = ∆2 \ {∅}. Therefore G{i} (∆) is connected because ∆2 is a simplex. A similar argument shows that G{i} (∆) is also connected for all i ∈ V (∆2 ). (b) (1) ⇒ (2) is obvious. (2) ⇒ (3): Since ∆ is ∅-rigid we have T 1 (∆)−b = 0 for all b ∈ {0, 1}V (∆1 )∪V (∆2 ) . In particular, T 1 (∆)−ei = 0 for all i ∈ V (∆1 ) ∪ V (∆2 ). So by Theorem 1.8, ∆ is inseparable. Thus using part (a) we have that ∆1 and ∆2 are simplices. Suppose that dim ∆1 + dim ∆2 = 0. Then dim ∆1 = dim ∆2 = 0, and hence I∆ is of the form (xy). It follows that T 1 (∆)−(1,1) 6= 0, a contradiction. 13 (3) ⇒ (1): The assumptions imply that I∆ is of the form (xi yj : i = 1, . . . , n, j = 1, . . . , m) with n ≥ 2 or m ≥ 2. Corollary 2.11 implies that ∆ is rigid.  Corollary 2.6. Let ∆ be simplicial complex. Then ∆ is separable if ∆ has more than two connected components. Circs. For i = 1, 2, let ∆i be a simplicial complex on the vertex set Vi and assume that V1 ∩ V2 = ∅. Then the circ of ∆1 and ∆2 is the simplicial complex ∆1 ◦ ∆2 with vertex set V1 ∪ V2 whose faces are those subsets F of V1 ∪ V2 for which either F ∩ V1 is a face of ∆1 or F ∩ V2 is a face of ∆2 . It is worthwhile to note that if I∆1 ⊆ S1 = K[x1 , . . . , xn ] and I∆2 ⊆ S2 = K[y1 , . . . , ym ] then I∆1 ◦∆2 = I∆1 I∆2 S, where S = K[x1 , . . . , xn , y1 . . . , ym ]. In the following we set MB (∆) = {F ⊆ V (∆) : F ∈ / ∆ and F ∩ B = ∅} for any B ⊆ V (∆). For later use we list a few obvious facts in the next lemmata. Lemma 2.7. Let B = B1 ∪ B2 with ∅ = 6 Bi ⊆ Vi for i = 1, 2. Then (a) NB (∆1 ◦ ∆2 ) = NB1 (∆1 ) ∗ NB2 (∆2 ) ∪ NB1 (∆1 ) ∗ MB2 (∆2 ) ∪ MB1 (∆1 ) ∗ NB2 (∆2 ). (b) NB1 (∆1 ◦ ∆2 ) = NB1 (∆1 ) ∗ M∅ (∆2 ) and NB2 (∆1 ◦ ∆2 ) = M∅ (∆1 ) ∗ NB2 (∆2 ). Lemma 2.8. Let B = B1 ∪ B2 with ∅ = 6 Bi ⊆ Vi for i = 1, 2. Then eB (∆1 ◦ ∆2 ) = NB1 (∆1 ) ∗ N eB2 (∆2 ) ∪ N eB1 (∆1 ) ∗ NB2 (∆2 ) (a) N ∪ NB1 (∆1 ) ∗ MB2 (∆2 ) ∪ MB1 (∆1 ) ∗ NB2 (∆2 ). eB1 (∆1 ◦ ∆2 ) = N eB1 (∆1 ) ∗ M∅ (∆2 ) and N eB2 (∆1 ◦ ∆2 ) = M∅ (∆1 ) ∗ N eB2 (∆2 ). (b) N We use these lemmata to prove Proposition 2.9. Let ∆1 and ∆2 be two simplicial complexes on the vertex sets V1 and V2 , respectively, and let bi ∈ {0, 1}Vi , Bi = supp bi for i = 1, 2. Assume that I∆i 6= 0 for i = 1, 2. (a) Suppose that b1 , b2 6= 0. Then  eB ∪B (∆1 ◦ ∆2 ) = ∅ and NB ∪B (∆1 ◦ ∆2 ) 6= ∅, K, if N 1 ∼ 1 2 1 2 T (∆1 ◦ ∆2 )−(b1 +b2 ) = 0, otherwise. (b) dimK T 1 (∆1 ◦ ∆2 )−bi = dimK T 1 (∆i )−bi for i = 1, 2. Proof. First we observe that for each i = 1, 2, I∆i 6= 0 if and only if Vi ∈ / ∆i , which is equivalent to Mφ (∆i ) 6= ∅. eB1 ∪B2 (∆1 ◦∆2 ) = ∅ and NB1 ∪B2 (∆1 ◦∆2 ) 6= ∅. Lemma 2.7(a) to(a) Assume that N gether with Lemma 2.8(a) imply that NB1 (∆1 ) ∗ NB2 (∆2 ) 6= ∅. Therefore NBi (∆i ) 6= eB1 ∪B2 (∆1 ◦ ∆2 ) = ∅ it follows from Lemma 2.8(a) that ∅ for i = 1, 2. Since N eB (∆i ) = ∅ for eB1 (∆1 ) ∗ NB2 (∆2 ) = ∅, and so N eB2 (∆2 ) = ∅ and N NB1 (∆1 ) ∗ N i i = 1, 2. The same argument shows that MBi (∆i ) = ∅ for i = 1, 2. 14 Since MBi (∆i ) = ∅ for i = 1, 2, we have Vi \Bi ∈ ∆i and hence Vi \Bi ∈ NBi (∆i ) for i = 1, 2. It follows that any λ ∈ T 1 (∆1 ◦ ∆2 )−(b1 +b2 ) is constant on NB1 ∪B2 (∆1 ◦ ∆2 ), because for any F1 ∪ F2 ∈ NB1 ∪B2 (∆1 ◦ ∆2 ) with Fi ⊆ Vi for i = 1, 2 we have F1 ∪ F2 ⊆ (V1 \ B1 ) ∪ (V2 \ B2 ). Hence T 1 (∆1 ◦ ∆2 )−(b1 +b2 ) ∼ = K. 1 If NB1 ∪B2 (∆1 ◦ ∆2 ) = ∅, then T (∆1 ◦ ∆2 )−(b1 +b2 ) = 0. Assume now that e NB1 ∪B2 (∆1 ◦ ∆2 ) 6= ∅. Let λ ∈ Λ1 (∆1 ◦ ∆2 )−(b1 +b2 ) (see its definition in CoroleB1 ∪B2 (∆1 ◦ ∆2 ) with Fi ⊆ Vi , i = 1, 2. It lary 1.4) and F1 ∪ F2 ∈ NB1 ∪B2 (∆1 ◦ ∆2 ) \ N eB (∆i ) for i = 1, 2. By follows from Lemmata 2.7(a) and 2.8(a) that Fi ∈ NBi (∆i )\ N i eB (∆i ), i = 1, 2 and MB (∆i ), i = 1, 2 is nonempty. Lemma 2.8(a), at least one of N i i First suppose that MB1 (∆1 ) 6= ∅. Then we take G1 ∈ MB1 (∆1 ). Note that eB1 ∪B2 (∆1 ◦ ∆2 ) and (G1 ∪ F2 ) ∪ (F1 ∪ F2 ) ∈ ∆1 ◦ ∆2 . Therefore G1 ∪ F2 ∈ N λ(F1 ∪ F2 ) = 0. Similarly, we can conclude that λ(F1 ∪ F2 ) = 0 if MB2 (∆2 ) 6= ∅ or eB (∆i ) 6= ∅ for i = 1 or i = 2. So we have proved that λ = 0 in any case. Thus N i T 1 (∆1 ◦ ∆2 )−(b1 +b2 ) = 0. (b) We prove the statement for i = 1. The same argument holds for i = 2. Since M∅ (∆2 ) 6= ∅, we have NB1 ∪B2 (∆1 ◦ ∆2 ) = ∅ if and only if NB1 (∆1 ) = ∅ by Lemma 2.7(b). Hence we only need to consider the case when NB1 ∪B2 (∆1 ◦ ∆2 ) 6= ∅. We define a homomorphism ϕ from Λ1 (∆1 )−b1 to Λ1 (∆1 ◦ ∆2 )−b1 as follows: for λ1 ∈ Λ1 (∆1 )−b1 , ϕ(λ1 ) is given by ϕ(λ1 )(F1 ∪ G1 ) = λ1 (F1 ) for any F1 ∈ NB1 (∆1 ) and G1 ∈ M∅ (∆2 ). One can check that ϕ(λ1 ) belongs to Λ1 (∆1 ◦ ∆2 )−b1 and that ϕ is injective. To see that ϕ is surjective, one only need to notice that for any λ ∈ Λ1 (∆1 ◦ ∆2 )−b1 , λ(F1 ∪ G1 ) = λ(F1 ∪ G2 ) for any F1 ∈ NB1 (∆1 ) and G1 , G2 ∈ M∅ (∆2 ). Hence ϕ is an isomorphism of K-vector spaces. This implies that dimK T 1 (∆1 ◦ ∆2 )−b1 = dimK T 1 (∆1 )−b1 , using Corollary 1.4.  For simplicity we say that a simplicial complex ∆ on the vertex set [n] is special if either ∆ has a unique facet, which is a maximal proper subset of [n], or ∆ has exactly two facets, one of which contains a unique element say i and the other one of which is [n] \ {i}. We see that ∆ is special if and only if I∆ is of the form zP , where z is a variable in S with z 6∈ P , and P is either a monomial prime ideal of S or P = S. Theorem 2.10. (a) Suppose that ∆1 ◦ ∆2 is rigid, and that I∆i 6= 0 for i = 1, 2. Then ∆1 and ∆2 are rigid. (b) Conversely, suppose that ∆1 and ∆2 are rigid simplicial complexes with disjoint vertex sets V1 and V2 , respectively. Then ∆1 ◦ ∆2 is rigid if and only if for either j = 1 or j = 2, link∆j F is not special for all F ∈ ∆j . In algebraic terms, for j = 1 or j = 2, none of the monomial localizations of I∆j is of the form zP , where z is a variable in Sj with z 6∈ P , and P ⊆ Sj is either a monomial prime ideal or P = Sj . Proof. Let S1 = K[x1 , . . . , xn ], S2 = K[y1 , . . . , ym ] and S = K[x1 , . . . , xn , y1 , . . . , yn ]. We may assume that I∆1 ⊆ S1 and I∆2 ⊆ S2 . (a) Let P1 = (x1 , . . . , xn ) and P2 = (y1 , . . . , ym ). Since I∆1 ◦∆2 (Pi ) = (I∆1 I∆2 S)(Pi ) = I∆i 15 for i = 1, 2, we see that T 1 (K[∆1 ◦ ∆2 ](Pi )) ∼ = T 1 (K[∆i ]). Thus the assertion follows from Lemma 2.1(b). (b) First suppose that ∆1 ◦ ∆2 is rigid, and suppose that there exist F1 ∈ ∆1 and F2 ∈ ∆2 such that the Stanley–Reisner ideal Ilink∆j Fj is of the form zj Pj where zj is a variable in Sj with zj 6∈ Pj , Pj ⊆ Sj is either a monomial prime ideal or Pj = Sj . Since link∆1 ◦∆2 F1 ∪ F2 = link∆1 F1 ◦ link∆2 F2 , it follows that (Ilink∆1 ◦∆2 F1 ∪F2 )S = Ilink∆1 F1 Ilink∆2 F2 S = (z1 z2 )P1 P2 S is not rigid because the ideal (z1 z2 ) is not rigid, a contradiction (see Proposition 1.2(b) or Lemma 2.1(c)). Suppose that ∆1 ◦ ∆2 is not rigid. Then there exist a, b ∈ {0, 1}V1 ∪V2 with supp a ∩ supp b = ∅ such that T 1 (∆1 ◦ ∆2 )a−b 6= 0. Let a = a1 + a2 and b = b1 + b2 with a1 , b1 ∈ {0, 1}V1 and a2 , b2 ∈ {0, 1}V2 . We set B = supp b, Bi = supp bi for i = 1, 2, and denote by Γi the simplicial complex link∆i (supp ai ) for i = 1, 2. Since link∆1 ◦∆2 (supp a) = Γ1 ◦ Γ2 , we have T 1 (Γ1 ◦ Γ2 )−b 6= 0 by using Proposition 1.2(b). Note that Γi is rigid for i = 1, 2 by Lemma 2.1(c). Since T 1 (Γ1 ◦ Γ2 )−b 6= 0 we have (IΓ1 IΓ2 ) = IΓ1 ◦Γ2 6= 0. This implies that IΓi 6= 0 for i = 1, 2. Suppose b1 = 0. Since T 1 (Γ1 ◦ Γ2 )−b2 = T 1 (Γ2 )−b2 (see Proposition 2.9(b)), we have T 1 (Γ1 ◦ Γ2 )−b2 = 0, because Γ2 is rigid. This is a contradiction. Therefore b1 6= 0, and similarly b2 6= 0. Now Proposition 2.9(a) implies eB ∪B (Γ1 ◦ Γ2 ) = ∅. By a similar argument used that NB1 ∪B2 (Γ1 ◦ Γ2 ) 6= ∅ and N 1 2 eB (Γi ) = ∅ for i = 1, 2. in Proposition 2.9, we have NBi (Γi ) 6= ∅ and MBi (Γi ) = N i Therefore, for i = 1, 2 the map λi : NBi (Γi ) → K, which maps each element of NBi (Γi ) to 1, defines a nonzero element in Λ(Γi )−bi . Since Γi is rigid it follows from Corollary 1.4(a) that |Bi | = 1 for i = 1, 2. Without loss of generality we may assume that B1 = {x1 } and B2 = {y1 }. Then V (Γ1 ) \ {x1 } ∈ Γ1 and V (Γ2 ) \ {y1} ∈ Γ2 since MBi (Γi ) = ∅ for i = 1, 2. Now we consider the following cases: Case 1: |V (Γ1 )| = 1. Since IΓ1 is not zero we have IΓ1 = (x1 ) and so Γ1 is special. Case 2: |V (Γ1 )| = 2. Assume V (Γ1 ) = {x1 , x2 }. Then {x2 } ∈ Γ1 . Since IΓ1 6= 0, we have {x1 , x2 } ∈ / Γ1 and since IΓ1 is rigid we have Γ1 6= h{x1 }, {x2 }i. Hence Γ1 = h{x2 }i and IΓ1 = (x1 ). This implies that Γ1 is special again. Case 3: |V (Γ1 )| ≥ 3. Since V (Γ1 ) \ {x1 } ∈ Γ1 , we have either Γ1 = hV (Γ1 ) \ {x1 }i or Γ1 = hV (Γ1 ) \ {x1 }, F1 , . . . , Fk i, where k ≥ 1 and x1 ∈ Fj for j = 1, . . . , k. In the first case we have IΓ1 = (x1 ) and we are done. In the second one, we set G = F1 \{x1 }. Then linkΓ1 G = hV (Γ1 ) \ F1 , {x1 }i and V (linkΓ1 G) = (V (Γ1 ) \ F1 ) ∪ {x1 }. Write V (Γ1 ) \ F1 = {x2 , . . . , xs }. Since linkΓ1 G is rigid, we have s ≥ 3 and so IlinkΓ1 G = (x1 )(x2 , . . . , xs ) = x1 P . This also implies that Γ1 is special. The similar argument is applied to Γ2 .  Corollary 2.11. (a) Let I be a squarefree monomial ideal and let P be a nonprincipal monomial prime ideal in a disjoint set of variables. Then IP is rigid if and only if I is rigid. 16 (b) Let P1 , . . . Q , Pt be monomial prime ideals generated by pairwise disjoint sets of variables. Then ti=1 Pi is rigid if and only if at most one Pi is a principal ideal. Proof. (a) Let ∆1 and ∆2 be two simplicial complexes with I∆1 = I and I∆2 = P . Suppose IP is rigid. It follows from Theorem 2.10(a) that I is rigid. Conversely, suppose that I is rigid. Note that the links of ∆2 correspond to monomial localizations of P by Lemma 2.1(c). Since monomial localization of P with respect to any monomial prime ideal is never of the form (z) or zQ with Q a monomial prime ideal, Theorem 2.10(b) yields the desired conclusion. (b) follows immediately from (a).  Letterplace ideals. We conclude this section with applications to letterplace ideals. In [4], letterplace and co-letterplace ideals are introduced and it is shown that these are all inseparable monomial ideals. In this section we consider rigidity of this class of ideals. More generally, let P and Q be two partially ordered sets. A map ϕ : P → Q is called isotone or order preserving, if p ≤ p′ implies ϕ(p) ≤ ϕ(p′ ). The set of isotone maps is denoted by Hom(P, Q). Note that Hom(P, Q) is again a partially ordered set with φ ≤ ψ if φ(p) ≤ ψ(p) for all p ∈ P. We fix a field K and consider the polynomial ring S over K in the variables xp,q with p ∈ P and q ∈ Q. Attached to P and Q we define the monomial ideal L(P, Q) ⊆ S generated by the monomials Y uϕ = xp,ϕ(p) , ϕ ∈ Hom(P, Q). p∈P Theorem 2.12. Let P and Q be finite posets. The following conditions are equivalent: (a) L(P, Q) is rigid. (b) No two distinct elements of P are comparable. Proof. (a) ⇒ (b): Assume there exist a, b ∈ P with a < b. We consider the monomial prime ideal P = (xp,q : p ∈ {a, b}, q ∈ Q), and claim that L(P, Q)(P ) = L({a, b}, Q), where {a, b} is the poset with a < b. In fact, for any minimal generator u ∈ L(P, Q)(P ), there exists ϕ ∈ Hom(P, Q) such that u is obtained from uϕ by setting xp,ϕ(p) = 1 if p ∈ / {a, b}, that is, u = xa,ϕ(a) xb,ϕ(b) . This proves L(P, Q)(P ) ⊆ L({a, b}, Q). Conversely, let u = xa,c xb,d ∈ L({a, b}, Q), where c, d ∈ Q and c ≤ d. Let n = |P|. Since any finite partial order can be extended to a total order, there exists an isotone bijective map from P to [n], which we denote by f . We now define a map ϕ : P → Q as follows:  c, if f (p) < f (b), ϕ(p) = d, otherwise. Then ϕ ∈ Hom(P, Q) and ϕ(a) = c, ϕ(b) = d, and hence u ∈ L(P, Q)(P ). Thus our claim follows. It follows from Corollary 3.6 and its proof that S(P )/L({a, b}, Q) is not rigid. Therefore, Lemma 2.1(b) implies that S/L(P, Q) is not rigid. 17 (b) ⇒ (a): Let P = {p1 , . . . , pm } with pi and pj incomparable for all i 6= j and let Q = {q1 , . . . , qn }. Then m Y L(P, Q) = (xpi ,q1 , xpi ,q2 , . . . , xpi ,qn ). i=1 Thus the assertion follows from Corollary 2.11(b).  For an integer n ∈ N we denote by [n] the totally ordered set {1 < 2 < · · · < n}. The ideal L([n], P) is called the nth letterplace ideal, while L(P, [n]) is called the nth co-letterplace ideal. They are Alexander dual to each other if we identify xi,p with xp,i for any i ∈ [n] and p ∈ P. In particular, the facets of the simplicial complex associated with L([n], P) are in bijection with the generators of L(P, [n]), and vice versa. Corollary 2.13. Let P a finite poset. (a) L([n], P) is rigid if and only if n = 1. (b) L(P, [n]) is rigid if and only if no two distinct elements of P are comparable. 3. Rigidity of graphs In this section we apply the results of Section 1 to study the rigidity of edge ideals of a graph. Inseparable graphs. Let G be a finite simple graph with vertex set [n]. The edge set of G will be denoted by E(G). Let K be a field and S = K[x1 , . . . , xn ] the polynomial ring over K in n indeterminates x1 , . . . , xn . The edge ideal I(G) ⊆ S of G is defined to be the ideal generated by all products xi xj with {i, j} ∈ E(G). Let ∆(G) be the simplicial complex with I(G) = I∆(G) Then ∆(G) = {F ⊆ [n] : F does not contain any edges of G}, The simplicial complex ∆(G) is called the independence complex of G. The faces of ∆(G) are called the independent sets of G. We call G inseparable if I(G) is inseparable. Let i ∈ [n]. Then N(i) = {j : {j, i} ∈ E(G)} is called the neighborhood of i. We denote by G(i) the complementary graph of the restriction GN (i) of G to N(i). In other words, V (G(i) ) = N(i) and E(G(i) ) = {{j, k} : j 6= k, j, k ∈ N(i) and {j, k} 6∈ E(G)}. Note that G(i) is disconnected if and only if N(i) = A ∪ B, where A, B 6= ∅, A ∩ B = ∅ and all vertices of A are adjacent to those of B. Theorem 3.1. The following conditions are equivalent: (a) The graph G is inseparable; (b) G(i) is connected for all i; (c) T 1 (S/I(G))−ei = 0 for all i. 18 Proof. We set ∆ = ∆(G). By Theorem 1.8, it suffices to prove that G{i} (∆) is connected if and only if G(i) is connected for each i. First we note that V (G(i) ) ⊆ [n] and V (G{i} (∆)) = {F ⊆ [n] : F is an independent set of G and F ∩ V (G(i) ) 6= ∅}. Assume G(i) is connected. Given F1 , F2 ∈ V (G{i} (∆)), there exist k1 , k2 ∈ V (G(i) ) with ki ∈ Fi for i = 1, 2. Suppose that k1 = k2 . Then F1 , {k1}, F2 is a path in G{i} (∆), and thus F1 is connected to F2 . Next suppose that k1 6= k2 . Since G(i) is connected, there is a path k1 = j0 , j1 , . . . , js = k2 in G(i) . Note that {jℓ , jℓ+1 } ∈ V (G{i} (∆)) for all ℓ = 0, . . . , s − 1. Therefore, F1 , {k1}, {j0 , j1 }, {j1 }, {j1 , j2 }, {j2 }, . . . , {js−1 , js }, {k2}, F2 is a path in G{i} (∆), and so F1 is connected to F2 . It follows that G{i} (∆) is connected. Conversely, assume that G{i} (∆) is connected. Given k1 , k2 ∈ V (G(i) ), there is a path {k1 }, F1 , F2 , . . . , F2t−1 , {k2 } in G{i} (∆). Hence {k1 } ⊆ F1 ⊇ F2 ⊆ F3 ⊇ . . . ⊆ F2t−1 ⊇ {k2 }. We use the induction on t to show that there is a path from k1 to k2 in G(i) . If t = 1 then {k1 , k2 } ⊆ F1 and so k1 is adjacent to k2 (in G(i) ). For t > 1, let k0 ∈ F2 ∩ V (G(i) ). Then k1 is adjacent to k0 , and by induction hypothesis there is a path in G(i) from k0 to k2 . Hence there is a path in G(i) from k1 to k2 and it follows that G(i) is connected.  Considering the proof of Theorem 3.1 one even shows that the graphs G{i} (∆) and G(i) have the same number of connected components. Corollary 3.2. If G contains no triangle, then G is inseparable. The conditions (α) and (β). Let G be a finite graph on the vertex set [n] and ∆(G) be the independence complex of G. Let A be a subset of [n]. Then link A of ∆(G) can be interpreted as the independence complex of a suitable graph if A is an independent subset of G. In order to show this we introduce some notation. The set [ N(A) = N(i) i∈A is called the neighborhood of A (in G), and the set N[A] = A ∪ N(A) is called the closed neighborhood of A (in G). Let B ⊂ [n]. The induced subgraph of G with vertex set B, is the graph GB with edges {i, j} ∈ E(G) and such that i, j ∈ B. An induced cycle of G is a cycle of G which is of the form GB . By G \ A we denote the induced subgraph of G on the vertex set [n] \ A. Lemma 3.3. Let A ⊆ [n] be an independent subset of G. Then link∆(G) A is the independence complex of the graph G \ N[A]. 19 Proof. Note that F ∈ link∆(G) A if and only if F ⊆ [n] \ A and F ∪ A ∈ ∆(G). The last condition is equivalent to saying that F ∪ A does not contain any edge of G. Thus F ∈ link∆(G) A if and only if F ⊆ [n] \ N[A] and F does not contain any edge of G. Since the set of edges of G in [n] \ N(A) is the same as the set of edges of G in G \ N(A), the desired conclusion follows.  For a given subset B ⊆ [n], we may easily express the sets eB (∆(G)) ⊆ NB (∆(G)) ⊆ [n] N in terms of G: NB (∆(G)) = {F ⊆ [n] : F ∩ B = ∅, F contains no edges of G, but F ∪ B does}, eB (∆(G)) = and N {F ∈ NB (∆(G)) : there exists B ′ ( B such that F ∪ B ′ contains an edge of G}. The following lemma lists some obvious properties of these sets. Lemma 3.4. Let B ⊆ [n]. Then the following statements hold: eB (∆(G)). (a) If |B| ≥ 3 or |B| = 2 and B is not an edge of G, then NB (∆(G)) = N eB (∆(G)) = ∅ if and only B is an (b) If B is an edge, then ∅ ∈ NB (∆(G)), and N isolated edge of G, i.e. it does not have a common vertex with any other edge of G. Combining this lemma with Corollary 1.4 we obtain Corollary 3.5. Let b ∈ {0, 1}n and let B = supp b. Suppose that |B| ≥ 2. Then T 1 (∆(G))−b = 0 unless B is an isolated edge in G. On the other hand, if B is an isolated edge in G, then T 1 (∆(G))−b is one-dimensional. Let G be a graph on the vertex set [n]. Based on Theorem 3.1 and Corollary 3.5 we see that ∆(G) is ∅-rigid, (i.e., T 1 (∆(G))−b = 0 for every b ∈ {0, 1}n ) if and only if G(i) is connected for all i ∈ [n] and G contains no isolated edge. Combining this fact with Proposition 1.2 and Lemma 3.3 we obtain the following combinatorial conditions for a graph to be rigid: the graph G is rigid if and only if for all independent sets A ⊆ V (G) one has: (α) (G \ N[A])(i) is connected for all i ∈ [n] \ N[A]; (β) G \ N[A] contains no isolated edge. It is obvious from Corollary 3.2 that any bipartite graph is inseparable and so it satisfies the condition (α), since any induced graph of a bipartite graph is again bipartite. But, by far, not all bipartite graphs are rigid. For example we have Corollary 3.6. Let G be a Cohen–Macaulay bipartite graph (i.e., S/I(G) is Cohen– Macaulay). Then G is not rigid. Proof. By Proposition 2.3 we may assume that G is connected. By [8, Theorem 3.4] the graph G, after a suitable relabeling of its vertices, arises from a finite poset P = {p1 , . . . , pn } as follows: V (G) = {p1 , . . . , pn , q1 , . . . , qn } and E(G) = {{pi , qj } : pi ≤ pj }. We may assume that p1 is a minimal element in P . Let A = {p2 , . . . , pn }. Then N[A] = {p2 , . . . , pn , q2 , . . . , qn }, and G \ N[A] = {p1 , q1 }. It follows from (β) that G is not rigid.  20 Recall that a vertex v is called a free vertex if deg v = 1, and an edge e is called a leaf if it has a free vertex. An edge e of G is called branch, if there exists a leaf e′ with e′ 6= e such that e ∩ e′ 6= ∅. Let e = {i, j} ∈ E(G). We denote by N0 (e) the set (N(i) ∪ N(j)) \ {i, j}. In the next proposition we present sufficient conditions for graph to satisfy (α) or (β). Proposition 3.7. Let G be a finite graph on the vertex set [n]. (a) Suppose that each vertex of a 3-cycle in G belongs to a leaf. Then G satisfies (α), and hence G is inseparable. In particular, if G does not contain any 3-cycle, then G is inseparable. (b) Suppose that each edge of G is a branch. Then G satisfies (β). (c) Suppose that each edge of G is a branch and each vertex of a 3-cycle of G belongs to a leaf. Then G is rigid. Proof. (a) Suppose that (α) is not satisfied. Then there exists an independent set A ⊆ [n] and i ∈ [n] \ N[A] such that N(i) ∩ [n] \ N[A] = B ∪ C with B, C 6= ∅ and B ∩ C = ∅ and {j, k} ∈ E(G \ N[A]) ⊆ E(G) for all j ∈ B and all k ∈ C. Since B, C 6= ∅ there exist j ∈ B and k ∈ C such that {j, k} ∈ E(G). Thus i is a vertex of a 3-cycle in G. By assumption there exists a leaf {i, t} in G. Suppose that t ∈ N[A]. If t ∈ A then i ∈ N[A], a contradiction. Thus t ∈ N(A). Since deg t = 1 it follows that i ∈ A, again a contradiction. Therefore we see that t ∈ [n] \ N[A]. This implies that t ∈ B ∪ C. We may assume that t ∈ B. So {t, k} ∈ E(G), a contradiction since N(t) = {i}. It follows from Theorem 3.1 that G is inseparable if it satisfies (α). Suppose now that G does not contain any 3-cycle. Then, by the first part of the statement, G satisfies condition (α), and so it is inseparable. (b) Suppose that G does not satisfy (β). Then there exists an independent set A of the vertices of G such that G \ N[A] contains an isolated edge, say e = {i, j}. We show that e is not a branch of G and so we get a contradiction. Let v ∈ N0 (e) and let deg v = 1. Then we have either N(v) = {i} or N(v) = {j}. Without loss of generality we may assume that N(v) = {i}. Since e is an isolated edge in G \ N[A] we have v ∈ N[A]. Suppose that v ∈ A. Then {i} = N(v) ⊆ N(A), a contradiction. Thus v ∈ N(A), and so there exists t ∈ A such that v ∈ N(t). Since N(v) = {i} it follows that t = i. This implies that i ∈ A, which is again a contradiction. Hence deg v ≥ 2, as desired. (c) follows from (a) and (b).  Rigid graphs. The next two lemmata will help us to classify the rigid chordal graphs and rigid graphs without induced cycles of length 4,5 or 6. Recall that a graph G is chordal if any cycle of length ≥ 4 has chord. A chord of a cycle C is an edge {i, j} of G with i, j ∈ V (C) which is not an edge of C Lemma 3.8. Let G be a rigid graph on the vertex set [n], and let A be an independent set of vertices of G. Then G \ N[A] is rigid. 21 Proof. Let B be an independent set of vertices of G \ N[A]. Then A ∪ B is an independent set of vertices of G. Indeed, suppose that {i, j} ∈ E(G) for some i ∈ A and some j ∈ B. Then j ∈ N(i) implies that j ∈ N(A) ⊆ N[A]. Since N[A] ∩B = ∅ it follows that j ∈ / B which is a contradiction. Clearly, N[A]∪N[B] = N[A∪B]. Thus, ([n]\N[A])\N[B] = [n]\N[A∪B]. Since for any subset C of [n], G\C is an induced subgraph of G, we have (G\N[A])\N[B] = G \ N[A ∪ B]. Since rigidity is characterized by (α) and (β), the statement follows.  Let G be a graph on the vertex set [n]. For each e = {i, j} ∈ E(G) we define the set OG (e) as follows: [ OG (e) = {v ′ : v ′ ∈ N(v), N(v ′ ) ∩ {i, j} = ∅}. v∈N0 (e) Lemma 3.9. Let G be a rigid graph on the vertex set [n] which does not contain any induced 4-cycle, and let e = {i, j} be an edge of G which is not a branch. Then OG (e) 6= ∅. Proof. First we show that for all v ∈ N0 (e) we have N(v)\{i, j} = 6 ∅. Note that since G is rigid the edge e is not isolated, and so N0 (e) 6= ∅. Suppose that there exists v ∈ N0 (e) such that N(v) ⊆ {i, j}. Without loss of generality we may assume that v ∈ N(i). Since e is not a branch we have deg v ≥ 2. It follows that N(v) = {i, j}. Therefore G(v) consists of two isolated vertices i and j which contradicts the fact that G is rigid. Now suppose that OG (e) = ∅, i.e., for all v ∈ N0 (e) and for all v ′ ∈ N(v) we have N(v ′ ) ∩ {i, j} = 6 ∅. Since N0 (e) 6= ∅ we may assume that there exists v ∈ N(i) with v 6= j. As shown above N(v) \ {i, j} = 6 ∅. Suppose that for all v ′ ∈ N(v) \ {i, j} we have i ∈ N(v ′ ). Then i is an isolated vertex in G(v) , a contradiction. Thus there exists v ′ ∈ N(v) \ {i, j} such that v ′ ∈ / N(i). Hence v ′ ∈ N(j) which implies that v ∈ N(j) because G does not contain any induced 4-cycle. Since v ′ ∈ N(j) and v ′ 6= i, j we have v ′ ∈ N0 (e). So N(v ′′ )∩{i, j} = 6 ∅ for all v ′′ ∈ N(v ′ ). As shown above ′ N(v ) \ {i, j} = 6 ∅. Suppose that there exists v ′′ ∈ N(v ′ ) \ {i, j} such that v ′′ ∈ / N(j). Then v ′′ ∈ N(i). It follows that G contains the induced 4-cycle with vertices i, j, v ′ and v ′′ , a contradiction. Consequently, v ′′ ∈ N(j) for all v ′′ ∈ N(v ′ ) \ {i, j}. Then j ′ is an isolated vertex in G(v ) , a contradiction. This completes the proof.  Theorem 3.10. Let G be a graph on the vertex set [n] such that G does not contain any induced cycle of length 4, 5 or 6. Then G is rigid if and only if each edge of G is a branch and each vertex of a 3-cycle of G belongs to a leaf. Proof. By using part (c) of Proposition 3.7 it is enough to show that if a rigid graph G does not contain any induced cycle of length 4, 5 or 6, then each edge of G is a branch and each vertex of a 3-cycle of G belongs to a leaf. Suppose that e = {i, j} ∈ E(G) is not a branch. By Lemma 3.9, OG (e) 6= ∅. We claim that there exists A ⊆ OG (e) such that A is independent in G and e is an isolated edge in G \ N[A]. This will imply that G is not rigid, a contradiction. Let G′ be the induced subgraph of G on the vertex set OG (e) and let C1 , . . . , Cm be the 22 connected components of G′ . Let u, v ∈ V (Ck ) such that {u, v} ∈ E(G). We show that either N(u) ∩ N0 (e) ⊆ N(v) ∩ N0 (e) or N(v) ∩ N0 (e) ⊆ N(u) ∩ N0 (e). Assume that N(u) ∩ N0 (e) 6⊆ N(v) ∩ N0 (e). Then there exists x ∈ N(u) ∩ N0 (e) such that {v, x} is not an edge in G. Without loss of generality we may assume that i ∈ N(x). Let y ∈ N(v) ∩ N0 (e), and first suppose that y ∈ N(i). Then we have the 5-cycle with vertices i, x, u, v and y. Since v, u ∈ OG (e) it follows that {u, i}, {v, i} ∈ / E(G) and since {v, x} ∈ / E(G) it follows that {u, y} ∈ E(G) because G does not contain any induced cycle of length 4 and 5. Therefore y ∈ N(u) ∩ N0 (e). On the other hand if y ∈ N(j), then we have the 6-cycle with vertices i, x, u, v, y and j. Note that {v, x}, {u, i}, {u, j}, {v, i}, {v, j} ∈ / E(G). This implies that {v, y} ∈ E(G) since G does not contain any induced cycle of length 4, 5 and 6. Thus either N(u) ∩ N0 (e) ⊆ N(v) ∩ N0 (e) or N(v) ∩ N0 (e) ⊆ N(u) ∩ N0 (e), as desired. Now given Ck we choose a maximal set Dk = {u1 , . . . , ul } ⊆ V (Ck ) with the property that the sets N(ur ) ∩ N0 (e) are pairwise different. After having defined the set Dk for each Ck we are ready to define the set A. We let A be the unique subset of OG (e) such that A ∩ Ck consists of all elements ur ∈ Dk with the property that N(ur ) ∩ N0 (e) 6⊆ N(us ) ∩ N0 (e) for all us ∈ Dk with s 6= r. In order to complete the proof we show that A is independent in G and e is an isolated edge in G \ N[A]. Let u, v ∈ a and assume that {u, v} ∈ E(G). Then there exists k such that u, v ∈ Dk ⊆ V (Ck ). Therefore either N(u)∩N0 (e) ⊆ N(v)∩N0 (e) or N(v) ∩ N0 (e) ⊆ N(u) ∩ N0 (e). Thus by the choice of A, it follows that u = v, a contradiction. So A is an independent set of G. Finally we show that e is an isolated edge of G′′ := G \ N[A]. Note that for any v ∈ N0 (e) ∩ V (G′′ ) and for any v ′ ∈ N(v) \ {i, j} we have N(v ′ ) ∩ {i, j} 6= ∅. In fact, suppose that there exists v1 ∈ N(v) such that N(v1 ) ∩ {i, j} = ∅. So v1 ∈ V (Ck ) for some k. If v1 ∈ A, then v ∈ N(A) ⊆ N[A], a contradiction. Hence v1 ∈ / A. Therefore, by the choice of A, there exists v2 ∈ A such that N(v1 ) ∩ N0 (e) ⊆ N(v2 )∩N0 (e). Since v ∈ N(v1 )∩N0 (e) we have v ∈ N(v2 ) and so v ∈ N(A) ⊆ N[A], a contradiction. This shows that OG′′ (e) = ∅. Suppose that e is not an isolated edge of G′′ , i.e., N0 (e) ∩ V (G′′ ) 6= ∅. We observe that e is not a branch in G′′ . Indeed, if e is a branch, then since e is not isolated, there exists v ∈ N0 (e) ∩ V (G′′ ) such that degree of v in G′′ is one. We may assume that v ∈ N(i) \ N(j). Since e is not a branch in G we have N(v) \ {i, j} = 6 ∅ and for any v ′ ∈ N(v) \ {i, j} we have v ′ ∈ N[A]. This implies that for any v ′ ∈ N(v), v ′ ∈ N(A) because if v ′ ∈ a, then v ∈ N(A) ⊆ N[A] and hence v ∈ / V (G′′ ), a contradiction. As seen in the previous paragraph, for any v ′ ∈ N(v) \ {i, j} we have N(v ′ ) ∩ {i, j} 6= ∅. If v ′ ∈ / N(i), then v ′ ∈ N(j). Since v ∈ / N(j) we will get the induced 4-cycle with the vertices i, v, v ′ and j, a contradiction. So v ′ ∈ N(i) for any v ′ ∈ N(v). It follows that i is an isolated vertex in G(v) , a contradiction. Thus e is not a branch in G′′ . Lemma 3.8 implies that G′′ is rigid and hence by Lemma 3.9 it follows that OG′′ (e) 6= ∅, a contradiction. So indeed e is isolated in G′′ . 23 Now we prove that each vertex of a 3-cycle of G belongs to a leaf. Suppose that there exists i ∈ [n], i belongs to a 3-cycle in G and it does not belong to a leaf. So for all v ∈ N(i) we have deg v ≥ 2. Let j and k be the two other vertices of this 3-cycle. If N(i) = {j, k}, then j and k are isolated vertices of G(i) , contradicting (α). So N(i) \ {j, k} = 6 ∅. Since each edge of the graph G is a branch, for any v ∈ N(i) the edge {i, v} is a branch. Since i does not belong to a leaf it follows that any v ∈ N(i) belongs S to a leaf. Thus for any v ∈ N(i) there exists iv ∈ N(v) with deg iv = 1. Set a = v∈N (i)\{j,k} {iv }. Clearly, A is an independent set of the vertices of G and j, k are two isolated vertices in (G \ N[A])(i) , a contradiction. Consequently, i belongs to a leaf, as desired.  Corollary 3.11. Let G be a chordal graph. Then G is rigid if and only if each edge of G is a branch and each vertex of a 3-cycle of G belongs to a leaf. Corollary 3.12. Let G be a graph on the vertex set [n]. Suppose that all cycles of G have length ≥ 7 (which for example is the case when G is a forest). Then G is rigid if and only if each edge of G is a branch. Proof. Since G does not contain any 3-cycle, the statement follows from Theorem 3.10.  As another application we have Corollary 3.13. Let C be a cycle. Then C is rigid if and only if C is a 4-cycle or a 6-cycle. Proof. Suppose that |C| = 6 4, 5, 6. Then by Theorem 3.10, C is not rigid. Suppose now that |C| = 5. Then C \ N[A] is an isolated edge, where A = {i} for some vertex i of C, and hence the condition (β) is not satisfied. So C is not rigid also when |C| = 5. In conclusion, C is not rigid if |C| ∈ / {4, 6}. Next suppose that |C| ∈ {4, 6}. Since C does not contain a 3-cycle, it follows that C satisfies (α) by Proposition 3.7(a). Note that for any nonempty independent subset A of V (C), C \ N[A] is either an empty graph (i.e., a graph containing no edge) or a path of length 3. Therefore, the cycle C also satisfies the condition (β). Hence C is rigid.  Acknowledgement: We would like to express our deep gratitude to the referee for his/her careful reading and for his/her excellent advices, which improved the presentation of this paper considerably. References [1] K. Altmann, J.A. Christophersen, Deforming Stanley-Reisner schemes, Math. Ann. 348(3) (2010), 513–537. [2] K. Altmann, J.A. Christophersen, Cotangent cohomology of Stanley-Reisner rings. Manuscripta Math. 115(3) (2004), 361–378. [3] V. Ene, J. Herzog, F. Mohammadi, Monomial ideals and toric rings of Hibi type arising from a finite poset, European Journal of Combinatorics 32(3) (2011), 404–421. [4] G. Fløystad, B.M. Greve, J. Herzog, Letterplace and co-letterplace ideals of posets, http://arxiv.org/abs/1501.04523v1 24 [5] D. Eisenbud, Commutative Algebra with a View Toward Algebraic Geomtry, Springer, 1994. [6] J. Herzog, Deformation von Cohen-Macaulay Algebren, Journal fr die reine und angewandte Mathematik 318 (1980), 83–105. [7] J. Herzog, and T. Hibi, Monomial Ideals, Graduate Text in Mathematics, Springer, 2011. [8] J. Herzog, T. Hibi, Distributive lattices, bipartite graphs and Alexander duality, J. Algebraic Combin. 22(3) (2005), 289–302. [9] S. Lichtenbaum, M. Schlessinger, The Cotangent Complex of a Morphism , Trans. Amer. Math. Soc. 128(1) (1967), 41–70. [10] J. Stevens, Deformations of singularities, Lecture Notes in Mathematics (1811), Berlin: Springer, 2003. Klaus Altmann, Institut für Mathematik, Freie Universität Berlin, Arnimallee 3, D-14195 Berlin, Germany E-mail address: [email protected] Mina Bigdeli, Department of Mathematics, Institute for Advanced Studies in Basic Sciences (IASBS), Gava zang, 45195-1159 Zanjan, 45137-66731 Iran E-mail address: [email protected] Jürgen Herzog, Fakultät für Mathematik, Universität Duisburg-Essen, 45117 Essen, Germany E-mail address: [email protected] Dancheng Lu, Department of Mathematics, Soochow University, 215006 Suzhou, P.R.China E-mail address: [email protected] 25
0math.AC
1 Decentralized Online Learning with Kernels Alec Koppel§ , Santiago Paternain? , Cédric Richard† and Alejandro Ribeiro? arXiv:1710.04062v1 [math.OC] 11 Oct 2017 Abstract We consider multi-agent stochastic optimization problems over reproducing kernel Hilbert spaces (RKHS). In this setting, a network of interconnected agents aims to learn decision functions, i.e., nonlinear statistical models, that are optimal in terms of a global convex functional that aggregates data across the network, with only access to locally and sequentially observed samples. We propose solving this problem by allowing each agent to learn a local regression function while enforcing consensus constraints. We use a penalized variant of functional stochastic gradient descent operating simultaneously with low-dimensional subspace projections. These subspaces are constructed greedily by applying orthogonal matching pursuit to the sequence of kernel dictionaries and weights. By tuning the projection-induced bias, we propose an algorithm that allows for each individual agent to learn, based upon its locally observed data stream and message passing with its neighbors only, a regression function that is close to the globally optimal regression function. That is, we establish that with constant step-size selections agents’ functions converge to a neighborhood of the globally optimal one while satisfying the consensus constraints as the penalty parameter is increased. Moreover, the complexity of the learned regression functions is guaranteed to remain finite. On both multi-class kernel logistic regression and multi-class kernel support vector classification with data generated from class-dependent Gaussian mixture models, we observe stable function estimation and state of the art performance for distributed online multi-class classification. Experiments on the Brodatz textures further substantiate the empirical validity of this approach. I. I NTRODUCTION We consider decentralized online optimization problems: a network G = (V, E) of agents aims to minimize a global objective that is a sum of local convex objectives available only to each node. The problem is online and distributed because data samples upon which the local objectives depend are sequentially and locally observed by each agent. In this setting, agents aim to make inferences as well as one which has access to all data at a centralized location in advance. Instead of assuming agents seek a common parameter vector w ∈ Rp , we focus on the case where agents seek to learn a common decision function f (x) that belong to a reproducing kernel Hilbert space (RKHS). Such functions represent, e.g., nonlinear statistical models [2] or trajectories in a continuous space [3]. Learning in multiagent settings arises predominately in two technological settings: industrial-scale machine learning, where optimizing statistical model parameters is decentralized across a parallel processing architecture to attain computational speedup; and networked intelligent systems such as sensor networks [4], multi-robot teams [5], [6], and Internet of Things [7], [8]. In the later setting, decentralized processing justified as opposed to using a fusion center when the communication cost of centralization exceeds the cost of distributed information protocols. This is true of multi-agent systems with streaming data considered here. Efforts to develop optimization tools for multi-agent online learning have thus far been restricted to the case where each agent learns a linear statistical model [9] or a task-driven dictionary [10] that is as good as one with data aggregated across the network. However, these efforts exclude the state of the art tools for statistical learning based on nonlinear interpolators: namely, kernel methods [11], [12] and neural networks [13], [14]. We note that instabilities associated with non-convexity which are only a minor issue in centralized settings [15] become both theoretically and empirically difficult to overcome This work in this paper is supported by NSF CCF-1017454, NSF CCF-0952867, ONR N00014-12-1-0997, ARL MAST CTA, and ASEE SMART.Part of the results in this paper appeared in [1]. § Computational and Information Sciences Directorate, U.S. Army Research Laboratory, Adelphi, MD, 20783. Email: [email protected] ? Department of ESE, University of Pennsylvania, 200 South 33rd Street, Philadelphia, PA 19104. Email: {spater, aribeiro}@seas.upenn.edu † Laboratory Lagrange - UMR CNRS 7293, Observatory of the French Riviera University of Nice Sophia-Antipolis, Nice, France, 06108 2 in settings with consensus constraints [10], and therefore efforts to extend neural network learning to multi-agent online learning likely suffer the same drawbacks.1 Therefore, we focus on extending kernel methods to decentralized online settings, motivated both by its advantageous empirical performance, as well as the theoretical and practical benefits of the fact that the optimization problem defined by their training is convex. This stochastic convex problem, however, is defined over an infinite dimensional space, and therefore it is not enough to solve the optimization problem, but one must also solve it in an optimally sparse way. Doing so in multi-agent settings is the goal of this work. To contextualize our solution methodology, consider centralized vector-valued stochastic convex programming, which has classically been solved with stochastic gradient descent (SGD) [16]. SGD involves descending along the negative of the stochastic gradient rather than the true gradient to avoid the fact that computing the gradient of the average objective has complexity comparable to the training sample size, which could be infinite. In contrast, the setting considered in this work is a stochastic program defined over a function space, which is in general an intractable variational inference problem. However, when the function space is a RKHS [17], the Representer Theorem allows us to transform a search over an infinite space into one over a set of weights and data samples [18]. Unfortunately, the feasible set of the resulting problem has complexity comparable to the sample size N , and thus is intractable for N → ∞ [19]. Compounding this problem is that the storage required to construct the functional generalization of SGD is comparable to the iteration index of the algorithm, which is untenable for online settings. Efforts to mitigate the complexity of the function representation (“the curse of kernelization”) have been previously developed. These combine functional extensions of stochastic gradient method with compressions of the function parameterization independently of the optimization problem to which they are applied [20]–[24] or approximate the kernel during training [25]–[29], and at best converge on average. In contrast, a method was recently proposed that combines greedily constructed [30] sparse subspace projections with functional stochastic gradient method and guarantees exact convergence to the minimizer of the average risk functional. This technique, called parsimonious online learning with kernels (POLK), tailors the parameterization compression to preserve the descent properties of the underlying RKHS-valued stochastic process [31], and inspires the approach considered here. In this work, we extend the ideas in [31] to multi-agent settings. Multiple tools from distributed optimization may be used to do so; however, we note that the Representer Theorem [18] has not been established for general stochastic saddle point problems in RKHSs. Therefore, we adopt an approximate primal-only approach based on penalty methods [32], [33], which in decentralized optimization is known as distributed gradient descent (DGD). Using functional stochastic extensions of DGD, together with the greedy Hilbert subspace projections designed in POLK, we develop a method such that each agent, through its local data stream and message passing with only its neighbors, learns a memory-efficient approximation to the globally optimal regression function with probability 1. Such global stability guarantees are in contrast to specialized results for multi-agent kernel learning [34], [35] and alternative distributed online nonlinear function estimation methods such as dictionary learning [10], [15], [36] or neural networks [14], which suffer from instability due to the non-convexity of the optimization problem their training defines. The result of the paper is organized as follows. In Section II we clarify the problem setting of stochastic programming in RKHSs in the centralized and decentralized case. In Section III, we propose a new penalty functional that permits deriving a decentralized online method for kernel regression without any complexity bottleneck by making use of functional stochastic gradient method (Section III-A) combined with greedy subspace projections (Section III-B). In Section IV we present our main theoretical results, which establishes that the function sequence of each agent generated by the proposed technique converges to a neighborhood of the globally optimal function with probability 1. In Section V, we present numerical examples of decentralized online multi-class kernel logistic regression and kernel support vector machines with data generated from Gaussian mixtures, and observe a state of the art trade-off between Lyapunov 1 In general, globally convergent decentralized online training of neural networks is an open problem, whose solution requires fundamentally new approaches to stochastic global optimization. 3 stability and statistical accuracy. We then apply the resulting method to the benchmark Brodatz texture dataset [37] and observe state of the art decentralized online multi-class classification performance. II. P ROBLEM F ORMULATION A. Decentralized Functional Stochastic Programming Consider the problem of expected risk minimization, where the goal is to learn a regressor that minimizes a loss function quantifying the merit of a statistical model averaged over a data set. We focus on the case when the number of training examples N is very large or infinite. In this work, input-output examples, (xn , yn ), are i.i.d. realizations drawn from a stationary joint distribution over the random pair (x, y) ∈ X × Y, where X ⊂ Rp and Y ⊂ R. Here, we consider finding regressors that are not vector valued parameters, but rather functions f˜ ∈ H in a hypothesized function class H, which allows for learning nonlinear statistical models rather than generalized linear models that rarely achieve satisfactory statistical error rates in practice [12], [38]. The merit of the function f˜ is evaluated by the convex loss function ` : H×X ×Y → R that quantifies the merit of the estimator f˜(x̃) evaluated at feature vector x̃. This loss is averaged over all possible training examples to define the statistical loss L̃(f˜) := Ex,y [`(f˜(x), y)], which we combine with a Tikhonov regularizer to construct the regularized loss R̃(f˜) := argminf˜∈H L̃(f˜) + (λ/2)kf˜k2H [39], [40]. We then define the optimal function as h i λ (1) f˜∗ = argmin R̃(f˜) := argmin Ex̃,ỹ `(f˜ x̃), ỹ + kf˜k2H 2 f˜∈H f˜∈H In this work, we focus on extensions of the formulation in (1) to the case where data is scattered across an interconnected network that represents, for instance, robotic teams [10], communication systems [41], or sensor networks [4]. To do so, we define a symmetric, connected, and directed network G = (V, E) with |V| = V nodes and |E| = E edges and denote as ni := {j : (i, j) ∈ E} the neighborhood of agent i. For simplicity we assume that the number of edges E is even. Each agent i ∈ V observes a local data sequence as realizations (xi,n , yi,n ) from random pair (xi , yi ) ∈ X × Y and seeks to learn a common globally optimal regression function f . This setting may be mathematically captured by associating to each node i a convex loss functional `i : H × X × Y → R that quantifies the merit of the estimator fi (xi ) evaluated at feature vector xi , and defining the goal for each node as the minimization of the common global loss  h X i λ ∗ 2 f = argmin Exi ,yi `i (f xi ), yi + kf kH (2) 2 f ∈H i∈V Observe that this global loss is a network-wide average (scaled by V ) of all local losses, and therefore the minimizers of (1) and (2) coincide when (xi , yi ) have a common joint distribution for each i. However, in multi-agent optimization, this is not generally the case, thus when selecting a regression function f with only local data, different agents will learn a different decision function fi∗ that it is not optimal as compared to one selected in a centralized manner, i.e., with the data gathered by all agents. To overcome this limitation we allow message passing between agents and we impose a consensus constraint on the regression function among neighbors fi = fj , (i, j) ∈ E. Thus we consider the nonparametric decentralized stochastic program:  h X i λ ∗ 2 f = argmin Exi ,yi `i (fi x), yi + kfi kH 2 {fi }⊂H i∈V such that fi = fj , (i, j) ∈ E (3) For further define the product Hilbert space HV of functions aggregated over the network whose elements are stacked functions f (·) = [f1 (·); · · · ; fV (·)] that yield vectors of length V when evaluated at local random vectors f (x) = [f1 (x1 ); · · · ; fV (xV )] ∈ RV . Moreover, define the stacked random vectors x = 4 [x1 ; · · · ; xV ] ∈ X V ⊂ RV p and y = [y1 ; · · · yV ] ∈ RV that represents V labels or physical measurements, for instance. The goal of this paper is to develop an algorithm to solve (3) in distributed online settings where nodes do not know the distribution of the random pair (xi , yi ) but observe local independent training examples (xi,n , yi,n ) sequentially. B. Function Estimation in Reproducing Kernel Hilbert Spaces The optimization problem in (1), and hence (3), is intractable in general, since it defines a variational inference problem integrated over the unknown joint distribution P(x, y). However, when H is equipped with a reproducing kernel κ : X × X → R (see [12], [42]), a function estimation problem of the form (1) may be reduced to a parametric form via the Representer Theorem [19], [43]. Thus, we restrict the Hilbert space in Section II-A to be one equipped with a kernel κ that satisfies for all functions f˜ : X → R in H: (i) hf˜, κ(xi , ·))iH = f˜(xi ), (ii) H = span{κ(xi , ·)} (4) for all xi ∈ X . Here h·, ·iH denotes the Hilbert inner product for H. Further assume that the kernel is positive semidefinite, i.e. κ(xi , x0i ) ≥ 0 for all xi , x0i ∈ X . Function spaces of this type are called reproducing kernel Hilbert spaces (RKHS). In (4), property (i) is the reproducing property (via Riesz Representation Theorem [43]). Replacing f˜ by κ(x0i , ·) in (4) (i) yields hκ(x0i , ·), κ(xi , ·)iH = κ(xi , x0i ) which is the origin of the term “reproducing kernel.” This property induces a nonlinear transformation of the input space X : denote by φ(·) a nonlinear map of the feature space that assigns to each xi the kernel function κ(·, xi ). The reproducing property yields that the inner product of the image of distinct feature vectors xi and x0i under the map φ requires only kernel evaluations: hφ(xi ), φ(x0i )iH = κ(xi , x0i ) (the ’kernel trick’). Moreover, property (4) (ii) states that functions f˜ ∈ H may be written as a linear combination of kernel evaluations. For kernelized and regularized empirical risk minimization (ERM), the Representer Theorem [17], [18] establishes that the optimal f˜ in hypothesized function class H admit an expansion in terms of kernel evaluations only over training examples N X ˜ f (xi ) = wi,n κ(xi,n , xi ) , (5) n=1 T N where wi = [wi,1 , · · · , wi,N ] ∈ R denotes a set of weights. The upper index N in (5) is referred to as the model order, and for ERM the model order and training sample size are d equal. Common choices κ include the polynomial and radial basis kernels, i.e., κ(xi , x0i ) = xTi x0i + b and κ(xi , x0i ) = exp{−kxi − x0i k22 /2d2 }, respectively, where xi , x0i ∈ X . Suppose, for the moment, that we have access to N i.i.d. realizations of the random pairs (xi , yi ) for each agent i such that the expectation in (3) is computable, and we further ignore the consensus constraint. Then the objective in (3) becomes: N 1 XX λ `(fi (xi,n ), yi,n ) + kfi k2H f = argmin 2 f ∈HV N n=1 i∈V ∗ (6) Then, by substituting the Representer Theorem [cf. (5)] into (3), we obtain that optimizing in HV reduces to optimizing over the set of N V weights: N 1XX λ f ∗=argmin `i (wiTκXi(xi,n),yi,n)+ wiT KXi ,Xiwi , 2 {wi}∈RN Nn=1 i∈V (7) where we have defined the Gram (or kernel) matrix KXi ,Xi ∈ RN ×N , with entries given by the kernel evaluations between xi,m and xi,n as [KXi ,Xi ]m,n = κ(xi,m , xi,n ). We further define the vector of kernel 5 evaluations κXi (·) = [κ(xi,1 , ·) . . . κ(xi,N , ·)]T , which are related to the kernel matrix as KXi ,Xi = [κXi (xi,1 ) . . . κXi (xi,N )]. The dictionary of training points associated with the kernel matrix is defined as Xi = [xi,1 , . . . , xi,N ]. By exploiting the Representer Theorem, we transform a nonparametric infinite dimensional optimization problem in HV (6) into a finite N V -dimensional parametric problem (7). Thus, for empirical risk minimization, the RKHS provides a principled framework to solve nonparametric regression problems as a search over RV N for an optimal set of coefficients. However, to solve problems of the form (6) when training examples (xi,n , yi,n ) become sequentially available or their total number N is not finite, the objective in (6) becomes an expectation over random pairs (xi , yi ) as [11] X X f ∗ = argmin Exi ,yi [`i ( wi,n κ(xi,n , xi ), yi )] wi ∈RI ,{xi,n }n∈I i∈V n∈I λ X wi,n wi,m κ(xi,m , xi,n )k2H , + k 2 n,m∈I (8) where we substitute the Representer Theorem generalized to the infinite sample-size case established in [19] into the objective (3) with I as some countably infinite indexing set. That is, as the data sample size N → ∞, the representation of fi becomes infinite as well. Thus, our goal is to solve (8) in an approximate manner such that each fi admits a finite representation near fi∗ , while satisfying the consensus constraints fi = fj for (i, j) ∈ E (which were omitted for the sake of discussion between (6) - (8)). III. A LGORITHM D EVELOPMENT We turn to developing an online iterative and decentralized solution to solving (3) when the functions {fi }i∈V are elements of a RKHS, as detailed in Section II-B. To exploit the properties of this function space, we require the applicability of the Representer Theorem [cf. (5)], but this result holds for any regularized minimization problem with a convex functional. Thus, we may address the consensus constraint fi = fj , (i, j) ∈ E in (3) by enforcing approximate consensus on estimates fi (xi ) = fj (xi ) in expectation. This specification may be met by introducing the penalty functional h X i λ ψc (f ) = Exi ,yi `i (fi xi ), yi + kfi k2H 2 i∈V   cX 2 (9) + Ex [fi (xi )−fj (xi )] 2j∈n i i The reasoning for the definition (9) rather than one that directly addresses the consensus constraint deterministically is given in Remark 1, motivated by following the algorithm derivation. For future reference, we also define the local penalty as h i λ ψi,c (fi ) = Exi ,yi `i (fi xi ), yi + kfi k2H 2  cX + Exi [fi (xi )−fj (xi )]2 (10) 2j∈n i P and we observe from (9) - (10) that ψc (f ) = i ψi,c (fi ). Further define fc∗ = argminf ∈HV ψc (f ). We note that in the vector-valued decision variable case, other techniques to address the constraint in (3) are possible such as primal-dual methods [9] or dual methods [44], but the Representer Theorem has not been established for RKHS-valued stochastic saddle point problems. It is an open question whether expressions of the form (5) apply to problems with general functional constraints, but this matter is beyond the scope of this work. Therefore, these other approaches which make use of Lagrange duality do not readily extend to the nonparametric setting considered here. 6 Algorithm 1 Greedy Projected Penalty Method Require: {xt , yt , ηt , t }t=0,1,2,... initialize fi,0 (·) = 0, Di,0 = [], w0 = [], i.e. initial dictionary, coefficients are empty for each i ∈ V for t = 0, 1, 2, . . . do loop in parallel for agent i ∈ V Observe local training example realization (xi,t , yi,t ) Send obs. xi,t to nodes j ∈ ni , receive scalar fj,t (xi,t ) Receive obs. xj,t from nodes j ∈ ni , send fi,t (xj,t ) Compute unconstrained stochastic grad. step [cf. (22)] f˜i,t+1 (·) = (1 − ηt λ)fi,t − ηt ∇fi ψ̂i,c (fi (xi,t ), yi,t ) . Update params: D̃i,t+1 = [Di,t , xi,t ], w̃i,t+1 [cf. (23)] Greedily compress function using matching pursuit (fi,t+1, Di,t+1,wi,t+1) = KOMP(f˜i,t+1 ,D̃i,t+1 ,w̃i,t+1 ,t) end loop end for A. Functional Stochastic Gradient Method Given that the data distribution P(x, y) is unknown, minimizing ψc (f ) directly via variational inference is not possible. Rather than postulate a specific distribution for (x, y), we only assume access to sequentially available (streaming) independent and identically distributed samples (xt , yt ) from their joint density. Then, we may wield tools from stochastic approximation to minimize (9), which in turn yields a solution to (3). Begin by defining, ψ̂c (f (xt ), yt ), the stochastic approximation of the penalty function ψc (f ), evaluated at a realization (xt , yt ) of the stacked random pair (x, y): X  λ `i (fi xi,t ), yi,t + kfi k2H ψ̂c (f (xt ), yt ) = 2 i∈V  X c + (fi (xi,t )−fj (xi,t ))2 (11) 2 j∈n j and the local instantaneous penalty function ψ̂i,c (fi (xi,t ), yi,t ) similarly. To compute the functional stochastic gradient of ψc (f ) evaluated at a sample point (xt , yt ), we first address the local loss `i (fi xi,t ), yi,t ) in (11) as [22], [31]: ∇fi `i (fi (xi,t ), yi,t )(·) = ∂`i (fi (xi,t ), yi,t ) ∂fi (xi,t ) (·) ∂fi (xi,t ) ∂fi (12) where we have applied the chain rule. Now, define the short-hand notation `0i (fi (xi,t ), yi,t ) := ∂`i (fi (xi,t ), yi,t )/∂fi (xi,t ) for the derivative of `i (f (xi,t ), yi,t ) with respect to its first scalar argument fi (xi,t ) evaluated at xi,t . To evaluate the second term on the right-hand side of (12), differentiate both sides of the expression defining the reproducing property of the kernel [cf. (4)(i)] with respect to fi to obtain ∂fi (xi,t ) ∂hfi , κ(xi,t , ·)iH = = κ(xi,t , ·) ∂fi ∂fi (13) 7 Then, given (12) - (13), we may compute the overall gradient of the instantaneous penalty function ψ̂c (f (xt ), yt ) in (11) as h ∇f ψ̂c (f (xt ), yt ) = vec `0i (fi (xi,t ), yi,t )κ(xi,t , ·)+ λfi (14) i X +c (fi (xi,t )−fj (xi,t ))κ(xi,t , ·) j∈ni where on the right-hand side of (14), we have defined the vector stacking notation vec[·] to denote the stacking of V component-wise functional gradients, each associated with function fi , i ∈ V, and used the fact that the variation of the instantaneous approximate of the cross-node term, [fi (xi )−fj (xi )]2 , by the same reasoning as (12) - (13), is 2[fi (xi,t )−fj (xi,t )]κ(xi,t , ·). With this computation in hand, we present the stochastic gradient method for the λ-regularized multi-agent expected risk minimization problem in (3) as h ft+1 = (1 − ηt λ)ft − ηt vec `0i (fi,t (xi,t ), yi,t )κ(xi,t , ·) i X +c (fi,t (xi,t )−fj,t (xi,t ))κ(xi,t , ·) , (15) j∈ni where ηt > 0 is an algorithm step-size either chosen as diminishing with O(1/t) or a small constant – see Section IV. We may glean from (15) that the update for the network-wide P function ft decouples into ones for each agent i ∈ V, using the node-separability of the penalty ψc (f ) = i ψi,c (fi ), i.e., h fi,t+1 = (1 − ηt λ)fi,t − ηt `0i (fi,t (xi,t ), yi,t )κ(xi,t , ·) i X +c (fi,t (xi,t )−fj,t (xi,t ))κ(xi,t , ·) . (16) j∈ni We further require that, given λ > 0, the step-size satisfies ηt < 1/λ and the global sequence is initialized as f0 = 0 ∈ HV . With this initialization, the Representer Theorem (5) implies that, at time t, the function fi,t admits an expansion in terms of feature vectors xi,t observed thus far as fi,t (x) = t−1 X T wi,n κ(xi,n , x) = wi,t κXi,t (x) . (17) n=1 On the right-hand side of (17) we have introduced the notation Xi,t = [xi,1 , . . . , xi,t−1 ] ∈ Rp×(t−1) , κXi,t (·) = [κ(xi,1 , ·), . . . , κ(xi,t−1 , ·)]T , and wi,t = [wi,1 , . . . wi,t−1 ] ∈ Rt−1 . Moreover, observe that the kernel expansion in (17), taken together with the functional update (15), yields the fact that performing the stochastic gradient method in HV amounts to the following V parallel parametric updates on the kernel dictionaries Xi and coefficients wi : Xi,t+1 = [Xi,t , xi,t ] , ( (1  − ηt λ)[wi,t ]u for 0 ≤ u ≤ t − 1  P [wi,t+1 ]u= 0 −ηt `i (fi,t (xi,t),yi,t)+c j∈ni(fi,t (xi,t)−fj,t (xi,t)) , (18) where the second case on the last line of (18) is for u = t. Observe that this update causes Xi,t+1 to have one more column than Xi,t . We define the model order as number of data points Mi,t in the dictionary of agent i at time t (the number of columns of Xt ). FSGD is such that Mi,t = t − 1, and hence grows unbounded with iteration index t. Next we address this intractable memory growth such that we may execute stochastic descent through low-dimensional projections of the stochastic gradient, inspired by [31]. First, we clarify the motivation for the choice of the penalty function (9). 8 Remark 1 In principle, it is possible to address the RKHS-valued consensus constraint in (3) directly, through primal-only stochastic methods, by introducing the penalty function  h X i λ cX kfi −fj k2H (19) ψ̃c (f ) = Exi ,yi `i (fi xi ), yi + kfi k2H + 2 2 j∈n i∈V i Observe, however, that FSGD applied to (19), using comparable reasoning to that which leads to (16) from (9), yields h fi,t+1 = (1 − ηt λ)fi,t − ηt ∇fi `0i (fi,t (xi,t ), yi,t )κ(xi,t , ·) i X +c (fi,t −fj,t ) . (20) j∈ni Unfortunately, we cannot inductively define a parametric representation of (20) for node i in terms of its own kernel dictionaries and weights independently of the entire function associated to node j, since the last term in (20) lives directly in the Hilbert space. Thus, to implement (20) each agent would need to store the entire kernel dictionary and weights of all its neighbors at each step, which is impractically costly. The use of (9) rather than (19) is further justified that under a hypothesis regarding the mean transformation of the local data spaces, Exi [κ(xi , ·)], consensus with respect to the Hilbert norm, in addition to the mean square sense, is achieved when the penalty coefficient is c → ∞ (see Section IV for details). B. Sparse Subspace Projections To mitigate the complexity growth noted in Section III-A, we approximate the function sequence (15) by one that is orthogonally projected onto subspaces HD ⊆ H that consist only of functions that can some dictionary D = [d1 , . . . , dM ] ∈ Rp×M , i.e., HD = {f : f (·) = PM be represented using T M n=1 wn κ(dn , ·) = w κD (·)} = span{κ(dn , ·)}n=1 , and {dn } ⊂ {xu }u≤t . For convenience we define [κD (·) = κ(d1 , ·) . . . κ(dM , ·)], and KD,D as the resulting kernel matrix from this dictionary. We enforce function parsimony by selecting dictionaries Di with Mi,t << O(t) for each i [31]. To be specific, we propose replacing the local update (16) in which the dictionary grows at each iteration Mt+1 by its projection onto subspace HDi,t+1 = span{κ(di,n , ·)}n=1 as 2  fi,t+1 = argmin f − fi,t −ηt ∇fi ψ̂i,c (fi (xi,t ), yi,t ) H f ∈HDi,t+1 h  := PHDi,t+1 (1 − ηt λ)fi,t − ηt ∇fi `i (fi,t (xi,t ), yi,t ) i X +c (fi,t (xi,t )−fj,t (xi,t ))κ(xi,t , ·) . (21) j∈ni where we define the projection operator P onto subspace HDi,t+1 ⊂ H by the update (21). Coefficient update The update (21), for a fixed dictionary Di,t+1 ∈ Rp×Mt+1 , yields one in the coefficient space only. This fact may be observed by defining the un-projected stochastic gradient step starting at function fi,t parameterized by dictionary Di,t and coefficients wi,t : f˜i,t+1 = fi,t − ηt ∇fi ψ̂i,c (fi (xi,t ), yi,t ) . (22) This update may be represented using dictionary and weights D̃i,t+1 = [Di,t , xi,t ] , ( (1  − ηt λ)[wi,t ]u for 0 ≤ u ≤ t − 1  P [w̃i,t+1 ]u= 0 −ηt `i (fi,t (xi,t),yi,t)+c j∈ni(fi,t (xi,t)−fj,t (xi,t)) , (23) 9 where the last coefficient is for u = t. Note that D̃i,t+1 has M̃ = Mi,t +1 columns, which is also the length of w̃i,t+1 . For a fixed Di,t+1 , the stochastic projection (21) is a least-squares update on the coefficient vector: the Representer Theorem allows us to rewrite (21) in terms of kernel expansions as in Section 3.2 of [31], which yields wi,t+1 = K−1 (24) Di,t+1 Di,t+1 KDi,t+1 D̃i,t+1 w̃i,t+1 , where we define the cross-kernel matrix KDi,t+1 ,D̃i,t+1 whose (n, m)th entry is given by κ(di,n , d̃i,m ). The other kernel matrices KD̃i,t+1 ,D̃i,t+1 and KDi,t+1 ,Di,t+1 are defined similarly. Observe that Mi,t+1 is the number of columns in Di,t+1 , while M̃i = Mi,t + 1 is the number of columns in D̃t+1 [cf. (23)]. Given that the local projections of f˜i,t+1 onto stochastic subspaces HDi,t+1 , for a fixed node-specific dictionaries Di,t+1 , is a least-squares problem, we now detail the kernel dictionary Di,t+1 selection from past data {xi,u , yi,u }u≤t . Dictionary Update The selection procedure for the kernel dictionary Di,t+1 is based upon greedy compression [45]: function f˜i,t+1 defined by the stochastic gradient method without projection is parameterized by dictionary D̃i,t+1 [cf. (23)] of model order M̃i = Mi,t + 1. We form Di,t+1 by selecting a subset of Mi,t+1 columns from D̃i,t+1 that best approximate f˜i,t+1 in terms of Hilbert norm error, which may be done by executing kernel orthogonal matching pursuit (KOMP) [30], [46] with error tolerance t to find a kernel dictionary matrix Di,t+1 based on the one which adds the latest sample point D̃i,t+1 . This choice is due to the fact that we can tune its stopping criterion to guarantee stochastic descent, and guarantee the model order of the learned function remains finite – see Section IV for details. We now describe the variant of KOMP we propose using, called Destructive KOMP with Pre-Fitting (see [46], Section 2.3). Begin with an input a candidate function f˜ of model order M̃ parameterized by kernel dictionary D̃ ∈ Rp×M̃ and coefficients w̃ ∈ RM̃ . The method then approximates f˜ by a function f ∈ H with a lower model order. Initially, this sparse approximation is the original function f = f˜ so that its dictionary is initialized with that of the original function D = D̃, with corresponding coefficients w = w̃. Then, the algorithm sequentially removes dictionary elements from the initial dictionary D̃, yielding a sparse approximation f of f˜, until the error threshold kf − f˜kH ≤ t is violated, in which case it terminates. See Appendix A for further details. We summarize the key steps of the proposed method in Algorithm 1 for solving (3) while maintaining a finite model order, thus allowing for the memory-efficient learning of nonparametric regression functions online in multi-agent systems. The method, Greedy Projected Penalty Method, executes the stochastic projection of the functional stochastic gradient iterates onto sparse subspaces HDi,t+1 stated in (21). Initial functions are set to null fi,0 = 0, i.e., it has empty dictionary Di,0 = [] and coefficient vector wi,0 = []. The notation [] is used to denote the empty matrix or vector respective size p × 0 or 0. Then, at each step, given an independent training example (xi,t , yi,t ) and step-size ηt , we compute the unconstrained functional stochastic gradient iterate (22) with respect to the instantaneous penalty function (11) which admits the parameterization D̃i,t+1 and w̃i,t+1 as stated in (23). These parameters are then fed into KOMP with approximation budget t , such that (fi,t+1 , Di,t+1 , wi,t+1 ) = KOMP(f˜i,t+1 , D̃i,t+1 , w̃i,t+1 , t ). IV. C ONVERGENCE A NALYSIS We turn to establishing that the method presented in Algorithm 1 converges with probability 1 to the minimizer of the penalty function ψc (f ) [cf. (9)] when attenuating algorithm step-sizes are used, and to a neighborhood of the minimizer along a subsequence when constant step-sizes are used. Moreover, for the later case, the kernel dictionary that parameterizes the regression function fi for each agent i remains finite in the worst case. This analysis is an application of Section IV of [31], but these results, together with the properties of the penalty function ψc (f ) allow us to establish bounds on the deviation for each individual in the network from the common globally optimal regression function. Before analyzing the proposed method developed in Section III, we define key quantities to simplify the analysis and introduce standard assumptions which are necessary to establish convergence. Define the 10 local projected stochastic functional gradient associated with the update in (21) as ˜ f ψ̂i,c (fi,t (xi,t), yi,t ) = ∇ i  h i fi,t − PHDi,t+1 fi,t − ηt∇fi ψ̂i,c (fi,t (xi,t),yi,t) /ηt (25) such that the local update of Algorithm 1 [cf. (21)] may be expressed as a stochastic descent using ˜ f ψ̂i,c (fi,t (xi,t), yi,t ) . The definitions of (25) and the local projected functional gradients fi,t+1 = fi,t − ηt ∇ i stochastic gradient ∇fiψ̂i,c (fi,t (xi,t), yi,t ) may be stacked to analyze the global convergence behavior of the algorithm. For further reference, we define the stacked projected functional stochastic gradient of the ˜ f ψ̂c (ft (xt ), yt ) = [∇ ˜ f1 ψ̂1,c (f1,t (x1,t), y1,t ); · · · ; ∇ ˜ f ψ̂V,c (fV,t (xV,t), yV,t )]. Then the penalty function as ∇ V stacked global update of the algorithm is ˜ f ψ̂c (ft (xt ), yt ) . ft+1 = ft − ηt ∇ (26) Moreover, observe that the stochastic functional gradient in (14), based upon the fact that (xt , yt ) are independent and identically distributed realizations of the random pair (x, y), is an unbiased estimator of the true functional gradient of the penalty function ψc (f ) in (9), i.e. E[∇f ψ̂c (f (xt ), yt ) Ft ] = ∇f ψc (f ) (27) for all t. In (27), we denote as Ft the sigma algebra which measures the algorithm history for times u ≤ t, i.e. Ft = {xu , yu , uu }tu=1 . Next, we formally state technical conditions on the loss functions, data domain, and stochastic approximation errors that are necessary to establish convergence. Assumption 1 The feature space X ⊂ Rp and target domain Y ⊂ R are compact, and the kernel map may be bounded as p sup κ(x, x) = X < ∞ (28) x∈X Assumption 2 The local losses `i (fi (x), y) are convex and differentiable with respect to the first (scalar) argument fi (x) on R for all x ∈ X and y ∈ Y. Moreover, the instantaneous losses `i : H × X × Y → R are Ci -Lipschitz continuous for all z ∈ R for a fixed y ∈ Y |`i (z, y) − `i (z 0 , y)| ≤ Ci |z − z 0 | (29) with C := maxi Ci as the largest modulus of continuity. Assumption 3 The projected functional gradient of the instantaneous penalty function defined by stacking (25) has finite conditional second moments: ˜ f ψ̂c (ft (xt ), yt )k2 | Ft ] ≤ σ 2 E[k∇ H (30) Assumption 1 holds in most settings by the data domain itself, and justifies the bounding of the loss. Taken together, these conditions permit bounding the optimal function fc∗ in the Hilbert norm, and imply that the worst-case model order is guaranteed to be finite. Variants of Assumption 2 appear in the analysis of stochastic descent methods in the kernelized setting [47], [48], and is satisfied for supervised learning problems such as logistic regression, support vector machines with the square-hinge-loss, the square loss, among others. Moreover, it is standard in the analysis of descent methods (see [49]). Assumption 3 is common in stochastic methods, and ensures that the stochastic approximation error has finite variance. Next we establish a few auxiliary results needed in the proof of the main results. Specifically, we introduce a proposition which quantifies the error due to sparse projections in terms of the ratio of the compression budget to the learning rate. 11 Proposition 1 Given independent realizations (xt , yt ) of the random pair (x, y), the difference between the stacked projected stochastic functional gradient and the its un-projected variant defined by (25) and (14), respectively, is bounded as t V (31) ηt where ηt > 0 denotes the algorithm step-size and t > 0 is the approximation budget parameter of Algorithm 2. ˜ f ψ̂c (ft (xt ), yt ) − ∇f ψ̂c (f (xt ), yt )kH ≤ k∇  Proof: See Appendix B. With the error induced by sparse projections quantified, we may now shift focus to analyzing the Hilbert-norm sub-optimality of the stacked iterates generated by Algorithm 1. Specifically, we have a descent property of the sequence {ft }. Lemma 1 (Stochastic Descent) Consider the sequence generated {ft } by Algorithm 1 with f0 = 0. Under Assumptions 1-3, the following expected descent relation holds.   E kft+1 − fc∗ k2H Ft ≤ kft −fc∗ k2H −2ηt [ψc (ft )−ψc (fc∗ )] + 2t V kft − fc∗ kH +ηt2 σ 2 (32)  Proof: See Appendix B. Now that Lemma 1 establishes a descent-like property, we may apply the proof of Theorem 1 in [31] to kft − fc∗ kH with diminishing step-sizes. Thus we have the following corollary. Corollary 1 Consider the sequence {ft } generated by Algorithm 1 with f0 = 0 and regularizer λ > 0. Under Assumptions 1-3 and the hypothesis that the projection sets HDi,t in (21) are intersected with some finite Hilbert-norm ball kf kH ≤ D for all t, with diminishing step-sizes and compression budget, i.e., ∞ X t=0 ηt = ∞ , ∞ X ηt2 < ∞ , t = ηt2 , (33) t=0 such that ηt < 1/λ, the sequence converges exactly to the minimizer of the penalty [cf. (9)]: ft → fc∗ with probability 1. To attain exact convergence to the minimizer of the penalty, fc∗ , we require the compression budget determining the error t incurred by sparse projections to approach null. This means that to have exact convergence, we require the function representation to require an increasing amount of memory which is, in the limit, of infinite complexity. In contrast, when constant step-size and compression budget are used, then the algorithm settles to a neighborhood, as we state next. Theorem 1 The sequence {ft } generated by Algorithm 1 with f0 = 0 and regularizer λ > 0, under Assumptions 1-3, with constant step-size selection ηt = η < 1/λ and constant compression budget t =  = Kη 3/2 for a positive constant K, converges to a neighborhood of fc∗ with probability 1: √ h i √ η √ ∗ lim inf kft −fc kH ≤ KV + K 2 V 2 +λσ 2 = O( η) a.s. (34) t λ Proof: See Appendix D.  Empirically, the use of constant step-sizes has the effect of maintaining consistent algorithm adaptivity in the face of new data, at the cost of losing exact convergence. But this drawback is more than compensated for by the fact that in this case we may apply Theorem 3 of [31], which guarantees the model order of the function sequence remains finite, and in the worst case, is related to the covering number of the data domain 12 2 2 2 1 1 1 0 0 0 -1 -1 -1 -2 -2 -2 -3 -2 -1 0 1 2 (a) Gaussian Mixtures data. 3 -2 0 2 (b) Logistic Decision surface. -3 -2 -1 0 1 2 3 (c) Hinge Decision surface. Fig. 1: Visualizations of the Gaussian mixture data set (Figure 1a) as in [24] and the learned low-memory multi-class kernel logistic regressor of a randomly chosen agent in the network (Figure 1b), which attains 95.2% classification accuracy on a hold-out test set. Curved black lines denote decision boundaries between classes; dotted lines denote confidence intervals; bold black dots denote kernel dictionary elements associated to an arbitrary i ∈ V. Kernel dictionary elements concentrate at peaks of the Gaussian clusters and near points of overlap between classes. In Figure 1c we plot the resulting decision surface learned by kernel SVM which attains 95.7% accuracy – the state of the art. Corollary 2 Denote ft ∈ HV as the stacked function sequence defined by Algorithm 1 with constant step-size ηt = η < 1/λ and approximation budget  = Kη 3/2 where K > 0 is an arbitrary positive scalar. Let Mt be the model order of the stacked function ft i.e., the number of columns of the dictionary Dt which parameterizes ft . Then there exists a finite upper bound M ∞ such that, for all t ≥ 0, the model order is always bounded as Mt ≤ M ∞ . Thus, only constant step-sizes attain a reasonable tradeoff between performance relative to fc∗ and the complexity of storing the function sequence {ft }: in this setting, we obtain approximate convergence to fc∗ while ensuring the memory requirements are always finite, as stated in Corollary 2. We are left to analyze the goodness of the solution fc∗ as an approximation of the solution of the original problem (3). In particular, we establish consensus in the mean square sense. Let us start by establishing that the penalty term is bounded by a p∗ /c, where p∗ is the primal value of the optimization problem (3) and c is the barrier parameter introduced in (9). Proposition 2 Let Assumptions 1 - 3 hold. Let fc∗ be the minimizer of the penalty function (9) and let p∗ be the primal optimal value of (3). Then, it holds that  ∗ 1 XX p∗ ∗ Exi [fc,i (xi )−fc,j (xi )]2 ≤ . (35) 2 i∈Vj∈n c i  Proof: See Appendix E. Proposition 2 establishes a relationship between the choice of penalty parameter c and constraint satisfaction. This result may be used to attain convergence in mean square of each individual agent’s regression function to ones which coincide with one another. Under an additional hypothesis, we obtain exact consensus, as we state next. Theorem 2 Let Assumptions 1 - 3 hold. Let fc∗ be the minimizer of the penalty function (9). Then, suppose ∗ ∗ the penalty parameter c in (9) approaches infinity c → ∞, and that the node-pair differences fi,c − fj,c are not orthogonal to mean transformation Exi [κ(xi , ·)] of the local input spaces xi for all (i, j) ∈ E. ∗ ∗ Then fi,c = fj,c for all (i, j) ∈ E. Proof: As a consequence, the limit of (35) when c tends to infinity yields consensus in L2 sense, i.e.,  ∗ 1 XX ∗ Exi [fc,i (xi )−fc,j (xi )]2 = 0, (36) lim c→∞ 2 i∈V j∈n i 13 0.6 0.4 0.2 0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 Mi,t , Model Order Network Disagreement Global Objective 20 10-11 1.6 1.4 1.2 1 0.8 10-12 10-13 10-14 10-15 0 1000 2000 3000 4000 5000 t, number of samples processed t, number of samples processed 15 10 5 0 0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 t, number of samples processed (c) Model Order Mi,t vs. samples pro(a) Global objective vs. samples processed (b) Disagreement vs. samples processed cessed  P Fig. 2: In Fig. 2a, we plot the global objective i∈V (Exi ,yi [`i (fi,t x), yi ]) versus P the number of samples processed, and observe convergence. In Fig. 2b we display the Hilbert-norm network disagreement (i,j)∈E kfi,t − fj,t k2H with a penalty parameter c that doubles every 200 samples. As c increases, agents attain consensus. In Fig. 2c, we plot the model order of a randomly chosen agent’s regression function, which stabilizes to 18 after 162 samples. which, by pulling the limit outside the sum in (36), yields  ∗ ∗ lim Exi [fc,i (xi )−fc,j (xi )]2 = 0 , c→∞ (37) for all (i, j) ∈ E. Consensus in the mean square sense is a less stringent constraint that equality in the Hilbert norm as desired in (3). In particular, for any (i, j) ∈ E, if fi = fj , then consensus in the mean square sense is satisfied as well. Then, apply the reproducing property of the kernel (4)(i), to write  ∗ ∗ −fc,j , k(xi , ·) > (38) 0 = lim Exi < fc,i c→∞  ∗ ∗ ≥ lim Exi < fc,i −fc,j , k(xi , ·) > c→∞ ∗ ∗ = lim < fc,i −fc,j , Exi k(xi , ·) > c→∞ where in the previous expression we pull the absolute value outside the expectation, and in the later we apply linearity of the expectation. Thus, (38) implies consensus is achieved with respect to the Hilbert ∗ ∗ are not orthogonal to Exi [κ(xi , ·)], the mean of the − fc,j norm, whenever the function differences fc,i transformation of the local input data xi .  V. N UMERICAL E XPERIMENTS We consider the task of kernel logistic regression (KLR) (Section V-A) from multi-class training data scattered across a multi-agent system in two settings: classification of data from a Gaussian mixture model and texture classification. In Section V-B, we consider kernel support vector machines (KSVM).2 A. Kernel Logistic Regression For KLR, the merit of a particular regressor for agent i is quantified by its contribution to the classconditional probability. We define a set of class-specific functions fi,k : X → R, and denote them jointly as fi ∈ HD , where {1, . . . , D} denotes the set of classes. Then, define the probabilistic model exp(fi,d (xi )) P (yi = d | xi ) := P . d0 exp(fi,d0 (xi )) (39) 2 We thank Garrett Warnell and Ethan Stump of the U.S. Army Research Laboratory for invaluable assistance in the algorithm implementation. 14 which models the odds ratio of a sample being in class d versus all others. The negative log likelihood defined by (39) is the instantaneous loss (see, e.g., [50]) at sample (xi,n , yi,n ): `i (fi , xi,n , yi,n ) = −log P (yi = yi,n |xi,n ). (40) For a given set of activation functions, classification decisions d˜ for xi is given by the maximum likelihood estimate, i.e., d˜ = argmaxd∈{1,...,D} fi,d (x). Gaussian Mixture Model Following [24], [31], we generate a data set from Gaussian mixture models, which consists N = 5000 feature-label pairs for training and 2500 for testing. Each label yn was drawn uniformly at random from the label set. The corresponding feature vector xn ∈ Rp was P then drawn from 2 a planar (p = 2), equitably-weighted Gaussian mixture model, i.e., x y ∼ (1/3) 3j=1 N (µy,j , σy,j I) 2 where σy,j = 0.2 for all values of y and j. The means µy,j are themselves realizations of their own Gaussian distribution with class-dependent parameters, i.e., µy,j ∼ N (θ y , σy2 I), where {θ 1 , . . . , θ D } are equitably spaced around the unit circle, one for each class label, and σy2 = 1.0. We fix the number of classes D = 5, meaning that the feature distribution has, in total, 15 distinct modes. The data is plotted in Figure 1a. Each agent in a V = 20 network observes a unique stream of training examples from this common data set. Here the communications graph is a random network with edges generated randomly between nodes with probability 1/5 repeatedly until we obtain one that is connected, and then symmetrize it. We run Algorithm 1 when the entire training set is fed to each agent in a streaming fashion, a Gaussian kernel is used with bandwidth d = 0.6, with constant learning rate η = 3, compression budget chosen as  = η 3/2 with parsimony constant K = 0.04, mini-batch size 32, and regularizer λ = 10−6 . The penalty coefficient is initialized as c = 0.01 and doubled after every 200 training examples. We plotPthe results of this implementation in Figures 1b and 2. In Figure 2a, we plot the global  objective i∈V (Exi ,yi [`i (fi,t x), yi ]) relative to the number of training examples processed, and observe stable convergence to a global minimum. In Figure 2b we display Hilbert-norm network disagreement P 2 (i,j)∈E kfi,t − fj,t kH versus observed sample points. Since each regression function is initialized as null, initially the disagreement is trivially null, but it remains small over the function sample path as model training occurs. Moreover, the model order of an arbitrarily chosen agent i = 15 versus samples processed is given in Figure 2c: observe that the model order stabilizes after only a couple hundred training examples to 18, which is only a couple more than 15, the number of modes of the joint data density function. The resulting decision surface of node 15 is given in Figure 1b, which achieves 95.2% classification accuracy on the test set which is comparable to existing centralized batch approaches (see Table 2 of [31]) to kernel logistic regression. Texture Classification We generated the brodatz data set using a subset of the images provided in [37]. Specifically, we used 13 texture images (i.e. D=13), and from them generated a set of 256 textons [51]. Next, for each overlapping patch of size 24-pixels-by-24-pixels within these images, we took the feature to be the associated p = 256-dimensional texton histogram. The corresponding label was given by the index of the image from which the patch was selected. We then randomly selected N = 10000 feature-label pairs for training and 5000 for testing. Each agent in network with V = 5 observes a unique stream of training examples from this common data set. Here the communication graph is a random network with edges generated randomly between nodes with probability 1/5 repeatedly until we obtain one that is connected, and then symmetrize it. To train the classifier we run Algorithm 1 ten epoches: in each epoch we fed the entire training set to each agent in a streaming fashion. A Gaussian kernel is used with bandwith σ 2 = 0.1, with constant learning rate η = 4, compression budget  = η 3/2 with parsimony constant K = 0.04, mini-batch size 32 and regularizer λ = 10−5 . The penalty coefficient is set to c = 0.02. PWe plot the results of this experiment in Figure 3. In Figure 3a we display the global objective convergence to i∈V (Exi ,yi [`i (fi,t x), yi ]) relative to the number of observed examples, and observe P a global minimum. In Figure 3b we plot the Hilbert norm network disagreement (i,j)∈E kfi,t − fj,t k2H . Since the initial regression function is null for all agents the disagreement is zero and as observed in Figure 15 3 5000 10 -10 2 2.5 4000 1.5 2 3000 1.5 1 2000 1 0.5 0.5 0 0 2 4 6 8 10 10 4 1000 0 0 0 2 4 6 8 10 10 0 4 5 10 10 4 (a) Global Objective vs. samples pro- (b) Disagreement vs. samples processed (c) Model Order Mi,t vs. samples processed cessed  P Fig. 3: In Fig. 3a, we plot the global objective i∈V (Exi ,yi [`i (fi,t x), yi ]) versus P the number of samples processed, and observe convergence. In Fig. 3b we display the Hilbert-norm network disagreement (i,j)∈E kfi,t − fj,t k2H with a penalty parameter c = 0.02. In Fig. 3c, we plot the model order of a randomly chosen agent’s regression function, which stabilizes to 4299. 3b it remains small over the training. Moreover, the model order of an agent chosen at random versus samples processed is given in Figure 3c. The resulting decission function achives 93.5% classification accuracy over the test set which is comparable with the accuracy of the centralized version (95.6%) [31]. However the model order requiered is more than twice the model order in the centralized case (4358 in average v.s. 1833 [31]). Compared to other distributed classification algorithms the current algorithm outperforms them. For instance D4L achieves around 75% classification accuracy [10]. B. Kernel Support Vector Machines Now we address the problem of training a multi-class kernel support vector machine online in a multiagent systems. The merit of a particular regressor is defined by its ability to maximize its classification margin, which may be formulated by first defining a set of class-specific activation functions fi,d : X → R, and denote them jointly as fi ∈ HD . In Multi-KSVM, points are assigned the class label of the activation function that yields the maximum response. KSVM is trained by taking the instantaneous loss ` to be the multi-class hinge function which defines the margin separating hyperplane in the kernelized feature space, i.e., `i (fi , xn , yn ) = max(0, 1 + fi,r (xn ) − fi,yn (xn )), (41) where r = argmaxd0 6=y fi,d0 (x). See [50] for further details. We consider an implementation where each agent in a V = 20 network observes a unique stream of training examples from the Gaussian mixtures data set (see Figure 1a). Moreover, the communications graph is fixed as a random network with edges generated randomly between nodes with probability 1/5 repeatedly until we obtain one that is connected, and then symmetrize it. We run Algorithm 1 when the entire training set is fed to each agent in a streaming fashion, a Gaussian kernel is used with bandwidth σ̃ 2 = 0.6, with constant learning rate η = 3, compression budget chosen as  = η 3/2 with parsimony constant K = 0.04, mini-batch size 32, and regularizer λ = 10−6 . The penalty coefficient is initialized as c = 0.01 and doubled after every 200 training examples. We plot the results in Figures 1c and 4. In Figure 4a, we observe that the  P of this implementation global objective (E [` (f x), y ]) converges stably to a global minimum as P the number of xi ,yi i i,t i i∈V samples processed increases. In Figure 4b we display Hilbert-norm network disagreement (i,j)∈E kfi,t − fj,t k2H versus observed sample points. Since each regression function is initialized as null, initially the disagreement is trivially null, but it remains small over the function sample path as model training occurs, and periodically spikes when the penalty parameter is increased. Moreover, the model order of an arbitrarily 0.3 0.2 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 t, number of samples processed Mi,t , Model Order 25 0.4 0 30 100 0.8 0.7 0.6 0.5 Network Disagreement Global Objective 16 10-5 10 -10 10-15 0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 t, number of samples processed 20 15 10 5 0 0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 t, number of samples processed (b) Disagreement vs. samples (a) Global objective vs. samples (c) Model Order Mi,t vs. samples  P Fig. 4: In Fig. 4a, we plot the global objective i∈V (Exi ,yi [`i (fi,t x), yi ]) versus the number of samples processed, and observe convergence, albeit more noisily than for the differentiable logistic loss. In Fig. 4b we display the Hilbert-norm network P disagreement (i,j)∈E kfi,t − fj,t k2H with a penalty parameter c that doubles every 200 samples. As c increases, agents attain consensus with respect to the Hilbert norm. In Fig. 4c, we plot the model order of a randomly chosen agent’s regression function, which stabilizes to 22 after 354 samples. Here we obtain a slightly higher complexity classifier that achieves slightly better accuracy. chosen agent i = 6 versus samples processed is given in Figure 4c: the model order stabilizes after only a couple hundred training examples to 22, which is only a couple more than 15, the number of modes of the joint data density function. The resulting decision surface of node 6 is given in Figure 1c, which achieves 95.7% classification accuracy, which is approximately state of the art. VI. C ONCLUSION In this paper, we extended the ideas in [31] to multi-agent settings with the intent of developing a method such that a network of autonomous agents, based on their local data stream, may learn a kernelized statistical model which is optimal with respect to information aggregated across the entire network. To do so, we proposed an unusual penalty function whose structure is amenable to efficient parameterizations when developing stochastic approximation-based updates. By applying functional stochastic gradient method to this node-separable penalty combined with greedily constructed subspace projections, we obtain a decentralized online algorithm for memory-efficient nonparametric function approximation that is globally convergent. We obtain a controllable trade-off between optimality and memory requirements through the design of the greedy subspace projections. Moreover, for large penalty parameter selections, agents achieve consensus. The empirical performance of this protocol, the Greedy Projected Penalty Method, yields state of the art statistical accuracy for a team of interconnected agents learning from streaming data for both multi-class kernel logistic regression and multi-class kernel support vector machines problems. These results provide a mathematical and empirical foundation for accurate and stable multi-agent statistical inference in online settings while preserving memory-efficiency. A PPENDIX A: D ETAILS OF M ATCHING P URSUIT The removal procedure is as follows: at each step, a single dictionary element j of D is selected to be removed which contributes the least to the Hilbert-norm error minf ∈HD\{j} kf˜ − f kH of the original function f˜, when dictionary D is used. Since at each stage the kernel dictionary is fixed, this amounts to a computation involving weights w ∈ RM −1 only;P that is, the error of removing dictionary point dj is ˜ computed for each j as γj = minwI\{j} ∈RM −1 kf (·) − k∈I\{j} wk κ(dk , ·)k. We use the notation wI\{j} to denote the entries of w ∈ RM restricted to the sub-vector associated with indices I \ {j}. Then, we define the dictionary element which contributes the least to the approximation error as j ∗ = argminj γj . If the error incurred by removing this kernel dictionary element exceeds the given compression budget γj ∗ > t , 17 Algorithm 2 Kernel Orthogonal Matching Pursuit (KOMP) Require: function f˜ defined by dict. D̃ ∈ Rp×M̃ , coeffs. w̃ ∈ RM̃ , approx. budget t > 0 initialize f = f˜, dictionary D = D̃ with indices I, model order M = M̃ , coeffs. w = w̃. while candidate dictionary is non-empty I = 6 ∅ do for j = 1, . . . , M̃ do Find minimal approximation error with dictionary element dj removed X γj = min kf˜(·) − wk κ(dk , ·)kH . wI\{j} ∈RM −1 k∈I\{j} end for Find index minimizing approx. error: j ∗ = argminj∈I γj if minimal approx. error exceeds threshold γj ∗ > t stop else Prune dictionary D ← DI\{j ∗ } Revise set I ← I \ {j ∗ }, model order M ← M − 1. Update weights w defined by current dictionary D w = argminkf˜(·) − wT κD (·)kH w∈RM end end while return f, D, w of model order M ≤ M̃ such that kf − f˜kH ≤ t the algorithm terminates. Otherwise, this dictionary element dj ∗ is removed, the weights w are revised based on the pruned dictionary as w = argminw∈RM kf˜(·) − wT κD (·)kH , and the process repeats as long as the current function approximation is defined by a nonempty dictionary. This procedure is summarized in Algorithm 2. A PPENDIX B: P ROOF OF P ROPOSITION 1 ˜ f ψ̂c (ft (xt), yt ) Consider the square-Hilbert-norm difference of the stacked projected stochastic gradient ∇ and its un-projected variant ∇f ψ̂c (ft (xt ), yt ) defined in (25) and (14), respectively, ˜ f ψ̂c (ft (xt ), yt ) − ∇f ψ̂c (f (xt ), yt )k2H k∇  h i = vec fi,t −PHDi,t+1 fi,t −ηt∇fi ψ̂i,c (fi,t (xi,t),yi,t) /ηt   2 − vec ∇fi ψ̂i,c (fi,t (xi,t ), yi,t ) H  h i 2 ≤ V max fi,t −PHDi,t+1 fi,t −ηt∇fi ψ̂i,c (fi,t (xi,t),yi,t) /ηt (42) i∈V 2 − ∇fi ψ̂i,c (fi,t (xi,t ), yi,t ) H where we apply the fact that the functional gradient is a concatenation of functional gradients associated with each agent in (42) for the first equality, and for the second inequality we consider the worst-case estimate across the network. Now, let’s focus on the term inside the Hilbert-norm on the right-hand side. 18 Multiply and divide ∇fi ψ̂i,c (fi,t (xi,t ), yi,t ), the last term, by ηt , and reorder terms to write h i  fi,t −PHDi,t+1 fi,t −ηt∇fi ψ̂i,c (fi,t (xi,t),yi,t) /ηt 2 − ∇fi ψ̂i,c (fi,t (xi,t ), yi,t ) H  1 = fi,t −ηt ∇fi ψ̂i,c (fi,t (xi,t ), yi,t ) ηt h i 1 − PHDi,t+1 fi,t −ηt ψ̂i,c (fi,t (xi,t ), yi,t ) ηt 1 = 2 kf˜i,t+1 − fi,t+1 k2H ηt 2 H (43) where we have substituted the definition of f˜i,t+1 and fi,t+1 in (22) and (21), respectively, and pulled the nonnegative scalar ηt outside the norm. Now, observe that the KOMP residual stopping criterion in Algorithm 2 is kf˜i,t+1 − fi,t+1 kH ≤ t , which we may apply to the last term on the right-hand side of (43). This result with the inequality (42) yields (31).  A PPENDIX C: P ROOF OF L EMMA 1 Begin by considering the square of the Hilbert-norm difference between ft+1 and fc∗ = argmin ψc (f ) which minimizes (9), and expand the square to write ˜ f ψ̂c (ft (xt ), yt )k2H kft+1 − fc∗ k2H = kft − ηt ∇ ˜ f ψ̂c (ft (xt ), yt)iH = kft −f ∗ k2 −2ηt hft −f ∗ , ∇ + H c 2 ˜ ηt k∇f ψ̂c (ft (xt ), yt )k2H (44) Add and subtract the functional stochastic gradient of the penalty function ∇f ψ̂c (ft (xt ), yt) defined in (14) to the second term on the right-hand side of (44) to obtain kft+1 − fc∗ k2H = kft −fc∗ k2H −2ηt hft −fc∗ ,∇f ψ̂c (ft (xt ), yt)iH ˜ f ψ̂c (ft (xt ), yt)−∇f ψ̂c (ft (xt ), yt)iH −2ηthft −f ∗ ,∇ + c 2 ˜ ηt k∇f `(ft (xt ), yt )k2H (45) We deal with the third term on the right-hand side of (45), which represents the directional error associated with the sparse stochastic projections, by applying the Cauchy-Schwartz inequality together with Proposition 1 to obtain kft+1 −fc∗ k2H = kft −fc∗ k2H −2ηt hft −fc∗ ,∇f ψ̂c (ft (xt ), yt)iH ˜ f `(ft (xt ), yt )k2H +2t V kft −fc∗ kH +ηt2 k∇ Now compute the expectation of (46) conditional on the algorithm history Ft   E kft+1 −fc∗ k2H Ft = kft −fc∗ k2H + 2t V kft − fc∗ kH + ηt2 σ 2 −2ηthft −fc∗, ∇f ψc (ft )iH (46) (47) where we have applied the fact that the stochastic functional gradient in (14) is an unbiased estimator [cf. (27)] for the functional gradient of the penalty function in (9), as well as the fact that the variance of the functional projected stochastic gradient is finite stated in (30) (Assumption 3). Observe that since ψc (f ) is an expectation of a convex function, it is also convex, which allows us to write ψc (ft ) − ψc (fc∗ ) ≤ hft − fc∗ , ∇f ψc (ft )iH , (48) 19 which we substitute into the second term on the right-hand side of the relation given in (47) to obtain   E kft+1 − fc∗ k2H Ft ≤ kft −fc∗ k2H −2ηt [ψc (ft )−ψc (fc∗ )] (49) + 2t V kft − fc∗ kH + ηt2 σ 2 . Thus the claim in Lemma 1 is valid.  A PPENDIX D: P ROOF OF T HEOREM 1 The use of the regularizer (λ/2)kf k2H in (9) implies that the penalty is λ-strongly convex in f ∈ H, yielding λ (50) kft − fc∗ k2H ≤ ψc (ft ) − ψc (fc∗ ) 2 Substituting the relation (50) into the second term on the right-hand side of the expected descent relation stated in Lemma 1, with constant step-size ηt = η and budget t = , yields E[kft+1 − fc∗ k2H Ft ] ≤ (1 − ηλ)kft − fc∗ k2H + 2V kft − fc∗ kH + η 2 σ 2 . (51) The expression in (51) may be used to construct a stopping stochastic process , which tracks the suboptimality of kft − fc∗ k2H until it reaches a specific threshold, as in the proof of Theorem 2 of [31]. In doing so, we obtain convergence  to a neighborhood. We may define a stochastic process δt that qualifies as a supermartingale, i.e. E δt+1 Ft ≤ δt by considering (51) and solving for the appropriate threshold by analyzing when the following holds true E[kft+1 − fc∗ k2H Ft ] ≤ (1 − ηλ)kft − fc∗ k2H + 2V kft − fc∗ kH + η 2 σ 2 ≤ kft − fc∗ k2H . (52) which may be rearranged to obtain the sufficient condition −ηλkft − fc∗ k2H + 2V kft − fc∗ kH + η 2 σ 2 ≤ 0 . (53) Note that (53) defines a quadratic polynomial in kft − fc∗ kH , which, using the quadratic formula, has roots p V ± 2 V 2 + λη 3 σ 2 kft − fc∗ kH = (54) λη Observe (53) is a downward-opening polynomial in kft − fc∗ kH which is nonnegative. Thus, focus on the positive root, substituting the approximation budget selection  = Kη 3/2 to define the radius of convergence as p √   √ η V + 2 V 2 +λη 3 σ 2 = KV + K 2 V 2 +λσ 2 (55) ∆ := λη λ (55) allows us to construct a stopping process: define δt as δt = kft − fc∗ kH o n × 1 min −ηλkfu − fc∗ k2H + 2V kfu − fc∗ kH + η 2 σ 2 > ∆ (56) u≤t where 1{E} denotes the indicator process of event E ∈ Ft . Note that δt ≥ 0 for all t, since both kft −f ∗ kH and the indicator function are nonnegative. The rest of the proof applies the same reasoning as that of 20 Theorem 2 in [31]: in particular, given the definition (56), either minu≤t −ηλkfu − fc∗ k2H + 2V kfu − fc∗ kH + η 2 σ 2 > ∆ holds, in which case we may compute the square root of the condition in (52) to write E[δt+1 Ft ] ≤ δt (57) Alternatively, minu≤t −ηλkfu − fc∗ k2H + 2V kfu − fc∗ kH + η 2 σ 2 ≤ ∆, in which case the indicator function is null for all s ≥ t from the use of the minimum inside the indicator in (56). Thus in either case, (57) is valid, implying δt converges almost surely to null, which, as a consequence we obtain the fact that either limt→∞ kft − fc∗ kH − ∆ = 0 or the indicator function is null for large t, i.e. limt→∞ 1{minu≤t −ηλkfu − fc∗ k2H + 2V kfu − fc∗ kH + η 2 σ 2 > ∆} = 0 almost surely. Therefore, we obtain that √   √ η ∗ 2 2 KV + K +λσ a.s. , (58) lim inf kft −fc kH ≤ ∆ = t→∞ λ as stated in Theorem 1.  A PPENDIX E: P ROOF OF P ROPOSITION 2 Let be the minimizer of ψc (f ) defined in (9) and f ∗ be the solution of the problem (3). Since the former is the minimizer of ψc (f ) it holds that h X i λ Exi ,yi `i (fi∗ xi ), yi + kfi∗ k2H ψc (fc∗ ) ≤ ψc (f ∗ ) = 2 i∈V   ∗ cX ∗ 2 + Ex [f (xi )−fj (xi )] . (59) 2j∈n i i fc∗ i Where the equality follows from the definition of ψc (f ) in (9). Since f ∗ is solution to the problem (3) it satisfies that fi = fj for all (i, j) ∈ E, thus  Exi [fi∗ (xi ) − fj∗ (xi )]2 = 0 , (60) for all (i, j) ∈ E. As a consequence, replacing ψc (fc∗ ) by its expression in the first equality in (59) and rearranging terms yields a bound the constraint violation of fc∗ as  ∗ 1 1 XX ∗ Exi [fc,i (xi )−fc,j (xi )]2 ≤ (R(f ∗ ) − R(fc∗ )) , (61) 2 i∈Vj∈n c i where R(f ) is the global regularized objective in (2), i.e., h  X i λ 2 R(f ) = Exi ,yi `i (fi xi ), yi + kfi kH . 2 i∈V (62) The fact that by definition p∗ = R(f ∗ ) yields (35). R EFERENCES [1] A. Koppel, S. Paternain, C. Richard, and A. Ribeiro, “’decentralized efficient nonparametric stochastic optimization’,” in Signal and Information Processing (GlobalSIP), 2017 IEEE Global Conference on (to appear). IEEE, 2017. [2] M. Anthony and P. L. Bartlett, Neural network learning: Theoretical foundations. cambridge university press, 2009. [3] Z. Marinho, B. Boots, A. Dragan, A. Byravan, G. J. Gordon, and S. Srinivasa, “Functional gradient motion planning in reproducing kernel hilbert spaces,” in Proceedings of Robotics: Science and Systems, Ann Arbor, MI, July 2016. [4] R. J. Kozick and B. M. Sadler, “Source localization with distributed sensor arrays and partial spatial coherence,” IEEE Transactions on Signal Processing, vol. 52, no. 3, pp. 601–616, 2004. [5] A. Koppel, J. Fink, G. Warnell, E. Stump, and A. Ribeiro, “Online learning for characterizing unknown environments in ground robotic vehicle models,” in Proc. Int. Conf. Intelligent Robots and Systems. [6] M. Schwager, P. Dames, D. Rus, and V. Kumar, “A multi-robot control policy for information gathering in the presence of unknown hazards,” in Robotics Research. Springer, 2017, pp. 455–472. [7] J. Liu, Q. Chen, and H. D. Sherali, “Algorithm design for femtocell base station placement in commercial building environments,” in INFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp. 2951–2955. 21 [8] A. Ghosh and S. Sarkar, “Pricing for profit in internet of things,” in Information Theory (ISIT), 2015 IEEE International Symposium on. IEEE, 2015, pp. 2211–2215. [9] A. Koppel, F. Jakubiec, and A. Ribeiro, “A saddle point algorithm for networked online convex optimization,” IEEE Trans. Signal Process., p. 15, Oct 2015. [10] A. Koppel, G. Warnell, E. Stump, and A. Ribeiro, “D4l: Decentralized dynamic discriminative dictionary learning,” IEEE Trans. Signal and Info. Process. over Networks, vol. (submitted), June 2017, available at http://www.seas.upenn.edu/ aribeiro/wiki. [11] K. Slavakis, P. Bouboulis, and S. Theodoridis, “Online learning in reproducing kernel hilbert spaces,” Signal Processing Theory and Machine Learning, pp. 883–987, 2013. [12] J.-B. Li, S.-C. Chu, and J.-S. Pan, Kernel Learning Algorithms for Face Recognition. Springer, 2014. [13] S. Haykin, “Neural networks: A comprehensive foundation,” 1994. [14] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems, 2012, pp. 1097–1105. [15] J. Mairal, F. Bach, and J. Ponce, “Task-driven dictionary learning,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 34, no. 4, pp. 791–804, 2012. [16] H. Robbins and S. Monro, “A stochastic approximation method,” Ann. Math. Statist., vol. 22, no. 3, pp. 400–407, 09 1951. [17] G. Kimeldorf and G. Wahba, “Some results on tchebycheffian spline functions,” Journal of mathematical analysis and applications, vol. 33, no. 1, pp. 82–95, 1971. [18] B. Schölkopf, R. Herbrich, and A. J. Smola, “A generalized representer theorem,” Subseries of Lecture Notes in Computer Science Edited by JG Carbonell and J. Siekmann, p. 416. [19] V. Norkin and M. Keyzer, “On stochastic optimization and statistical learning in reproducing kernel hilbert spaces by support vector machines (svm),” Informatica, vol. 20, no. 2, pp. 273–292, 2009. [20] Y. Engel, S. Mannor, and R. Meir, “The kernel recursive least-squares algorithm,” IEEE Transactions on Signal Processing, vol. 52, no. 8, pp. 2275–2285, Aug 2004. [21] W. Liu, P. P. Pokharel, and J. C. Principe, “The kernel least-mean-square algorithm,” Signal Processing, IEEE Transactions on, vol. 56, no. 2, pp. 543–554, 2008. [22] J. Kivinen, A. J. Smola, and R. C. Williamson, “Online Learning with Kernels,” IEEE Transactions on Signal Processing, vol. 52, pp. 2165–2176, August 2004. [23] O. Dekel, S. Shalev-Shwartz, and Y. Singer, “The forgetron: A kernel-based perceptron on a fixed budget,” in Advances in Neural Information Processing Systems 18. MIT Press, 2006, p. 259266. [Online]. Available: http://research.microsoft.com/apps/pubs/default. aspx?id=78226 [24] J. Zhu and T. Hastie, “Kernel Logistic Regression and the Import Vector Machine,” Journal of Computational and Graphical Statistics, vol. 14, no. 1, pp. 185–205, 2005. [25] B. Dai, B. Xie, N. He, Y. Liang, A. Raj, M.-F. F. Balcan, and L. Song, “Scalable kernel methods via doubly stochastic gradients,” in Advances in Neural Information Processing Systems, 2014, pp. 3041–3049. [26] T. Le, V. Nguyen, T. D. Nguyen, and D. Phung, “Nonparametric budgeted stochastic gradient descent,” in Artificial Intelligence and Statistics, 2016, pp. 654–572. [27] T. Le, T. Nguyen, V. Nguyen, and D. Phung, “Dual space gradient descent for online learning,” in Advances in Neural Information Processing Systems, 2016, pp. 4583–4591. [28] J. Lu, S. C. Hoi, J. Wang, P. Zhao, and Z.-Y. Liu, “Large scale online kernel learning,” Journal of Machine Learning Research, vol. 17, no. 47, p. 1, 2016. [29] D. Calandriello, A. Lazaric, and M. Valko, “Second-order kernel online convex optimization with adaptive sketching,” in International Conference on Machine Learning, 2017. [30] Y. Pati, R. Rezaiifar, and P. Krishnaprasad, “Orthogonal Matching Pursuit: Recursive Function Approximation with Applications to Wavelet Decomposition,” in Proceedings of the Asilomar Conference on Signals, Systems and Computers, 1993. [31] A. Koppel, G. Warnell, E. Stump, and A. Ribeiro, “Parsimonious online learning with kernels via sparse projections in function space,” arXiv preprint arXiv:1612.04111, 2016. [32] B. Johansson, T. Keviczky, M. Johansson, and K. Johansson, “Subgradient methods and consensus algorithms for solving convex optimization problems,” in Proc. of the 47th IEEE Conference on Decision and Control, Cancun, Mexico, 2008, pp. 4185–4190. [33] S. Ram, A. Nedic, and V. Veeravalli, “Distributed stochastic subgradient projection algorithms for convex optimization,” J Optimiz. Theory App., vol. 147, no. 3, pp. 516–545, Sep. 2010. [34] X. Nguyen, M. J. Wainwright, and M. I. Jordan, “Nonparametric decentralized detection using kernel methods,” IEEE Transactions on Signal Processing, vol. 53, no. 11, pp. 4053–4066, 2005. [35] P. A. Forero, A. Cano, and G. B. Giannakis, “Consensus-based distributed support vector machines,” Journal of Machine Learning Research, vol. 11, no. May, pp. 1663–1707, 2010. [36] P. Chainais and C. Richard, “Learning a common dictionary over a sensor network,” in Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), 2013 IEEE 5th International Workshop on. IEEE, 2013, pp. 133–136. [37] P. Brodatz, Textures: A Photographic Album for Artists and Designers. Dover, 1966. [38] S. Mukherjee and S. K. Nayar, “Automatic generation of rbf networks using wavelets,” Pattern Recognition, vol. 29, no. 8, pp. 1369– 1383, 1996. [39] S. Shalev-Shwartz, O. Shamir, N. Srebro, and K. Sridharan, “Learnability, stability and uniform convergence,” Journal of Machine Learning Research, vol. 11, no. Oct, pp. 2635–2670, 2010. [40] T. Evgeniou, M. Pontil, and T. Poggio, “Regularization networks and support vector machines,” Advances in computational mathematics, vol. 13, no. 1, pp. 1–50, 2000. [41] A. Ribeiro, “Ergodic stochastic optimization algorithms for wireless communication and networking,” IEEE Transactions on Signal Processing, vol. 58, no. 12, pp. 6369–6386, 2010. 22 [42] K. Müller, T. Adali, K. Fukumizu, J. C. Principe, and S. Theodoridis, “Special issue on advances in kernel-based learning for signal processing [from the guest editors],” IEEE Signal Process. Mag., vol. 30, no. 4, pp. 14–15, 2013. [Online]. Available: http://dx.doi.org/10.1109/MSP.2013.2253031 [43] R. Wheeden, R. Wheeden, and A. Zygmund, Measure and Integral: An Introduction to Real Analysis, ser. Chapman & Hall/CRC Pure and Applied Mathematics. Taylor & Francis, 1977. [Online]. Available: https://books.google.com/books?id=YDkDmQ hdmcC [44] T. Suzuki, “Dual averaging and proximal gradient descent for online alternating direction multiplier method,” in Proc. 30th Int. Conf. Machine Learning, vol. 28, no. 1, Atlanta, GA, USA, Jun. 16-21 2013, pp. 392–400. [45] D. Needell, J. Tropp, and R. Vershynin, “Greedy signal recovery review,” in Signals, Systems and Computers, 2008 42nd Asilomar Conference on. IEEE, 2008, pp. 1048–1050. [46] P. Vincent and Y. Bengio, “Kernel matching pursuit,” Machine Learning, vol. 48, no. 1, pp. 165–187, 2002. [47] M. Pontil, Y. Ying, and D. xuan Zhou, “Error analysis for online gradient descent algorithms in reproducing kernel hilbert spaces,” Tech. Rep., 2005. [48] Y. Ying and D. X. Zhou, “Online regularized classification algorithms,” IEEE Transactions on Information Theory, vol. 52, no. 11, pp. 4775–4788, Nov 2006. [49] Y. Nesterov, “Introductory lectures on convex programming volume i: Basic course,” 1998. [50] K. Murphy, Machine Learning: A Probabilistic Perspective. MIT press, 2012. [51] T. Leung and J. Malik, “Representing and Recognizing the Visual Appearence of Materials using Three-dimensional Textons,” International Journal of Computer Vision, vol. 43, no. 1, pp. 29–44, 1999.
10math.ST
Simple groups, fixed point ratios and applications arXiv:1707.03564v1 [math.GR] 12 Jul 2017 Timothy C. Burness School of Mathematics, University of Bristol, Bristol BS8 1TW, United Kingdom Abstract. The study of fixed point ratios is a classical topic in permutation group theory, with a long history stretching back to the origins of the subject in the 19th century. Fixed point ratios arise naturally in many different contexts, finding a wide range of applications. In this survey article we focus on fixed point ratios for simple groups of Lie type, highlighting some of the main results, applications and related problems. 1. Introduction The study of fixed point ratios is a classical topic in permutation group theory, with a long history stretching all the way back to the early days of group theory in the 19th century. The concept arises naturally in many different contexts, finding a wide range of interesting (and often surprising) applications. One of the main aims of this survey article is to highlight some of these applications. For instance, we will explain how fixed point ratios play a key role in the study of some remarkable generation properties of finite groups. We will also see how probabilistic methods, based on fixed point ratio estimates, have revolutionised the search for small bases of primitive permutation groups. In a completely different direction, we will also describe how bounds on fixed point ratios can be used to investigate the structure of monodromy groups of coverings of the Riemann sphere. In this introductory section we start by recalling some basic properties of fixed point ratios and we present several standard examples that will be useful later. We also highlight connections to some classical notions in permutation group theory, such as minimal degree, fixity and derangements. To whet the appetite of the reader, we close the introduction by presenting three very different group-theoretic problems. It is interesting to note that none of these problems have an obvious connection to fixed point ratios, but we will show later that recent advances in our understanding of fixed point ratios (in particular, recent results for (almost) simple groups of Lie type) play an absolutely essential role in their solution. Some of the main theorems on fixed point ratios will be highlighted in Section 2, where we focus on the simple groups of Lie type. Finally, in Sections 3, 4 and 5 we will discuss the three motivating problems mentioned above. Here we will explain the connection to fixed point ratios and we will sketch some of the main ideas. In particular, we will see how some of the results presented in Section 2 play a key role, and we will report on more recent developments and open problems. Finally, we have also included an extensive bibliography, which we hope will serve as a useful guide for further reading. Acknowledgments. This article is based on a lecture series I gave at the workshop Some problems in the theory of simple groups at the Centre Interfacultaire Bernoulli at the École Polytechnique Fédérale de Lausanne in September 2016. This workshop was part of the semester programme Local representation theory and simple groups at the CIB. It is a pleasure to thank the organisers of this programme for inviting me to participate and for their 1. INTRODUCTION 3 generous hospitality. I would also like to thank Gunter Malle and Donna Testerman for their helpful comments on an earlier version of this article. 1.1. Preliminaries. We start with some preliminary definitions. Let G 6 Sym(Ω) be a permutation group on a finite set Ω. For α ∈ Ω we will write Gα = {x ∈ G : αx = α} for the stabiliser of α in G. Similarly, the set of fixed points of x ∈ G will be denoted by CΩ (x) = {α ∈ Ω : αx = α}. Definition 1.1. The fixed point ratio of x ∈ G, denoted by fpr(x, Ω) = fpr(x), is the proportion of points in Ω fixed by x, i.e. fpr(x) = |CΩ (x)| . |Ω| Notice that fpr(x) is the probability that a randomly chosen element of Ω is fixed by x (with respect to the uniform distribution on Ω). This viewpoint is often useful for applications. Indeed, in recent years probabilistic methods have been used to solve many interesting problems in finite group theory. Typically, the aim is to establish an existence result through a probabilistic approach (rather than an explicit construction, for example) – this has been a standard technique in combinatorics, number theory and other areas for many years. As we will see later, bounds on fixed point ratios play a central role in several applications of this flavour. It is also worth noting that a fixed point ratio is a special type of character ratio; if π : G → C is the corresponding permutation character, then fpr(x) = π(x) . π(1) The following lemma records some basic properties. Lemma 1.2. Let G be a permutation group on a finite set Ω and let x be an element of G. (i) fpr(x) = fpr(y) for all y ∈ xG . (ii) fpr(x) 6 fpr(xm ) for all m ∈ Z. (iii) If G is transitive with point stabiliser H, then fpr(x) = |xG ∩ H| . |xG | (iv) If the derived subgroup G0 is transitive, then there is a non-linear irreducible constituent χ of the permutation character such that fpr(x) 6 1 + |χ(x)| . 1 + χ(1) Proof. Parts (i) and (ii) are trivial. 4 (iii) For β ∈ Ω, g ∈ G define (β, g) = 1 if β g = β, otherwise (β, g) = 0. Then   X X X  |xG | |CΩ (x)| = |CΩ (g)| = (β, g) g∈xG g∈xG β∈Ω  = X  X  (β, g) = g∈xG β∈Ω X |xG ∩ Gβ |, β∈Ω which is equal to |Ω| |xG ∩ H| by the transitivity of G. (iv) Set f = fpr(x) and write π = 1 + χ1 + · · · + χt with χi ∈ Irr(G). Note that the transitivity of G0 implies that each χi is non-linear. If 1 + |χi (x)| < f (1 + χi (1)) for all i then X X f |Ω| = 1 + χi (x) 6 1 + |χi (x)| i i = X (1 + |χi (x)|) − (t − 1) i <f ! X (1 + χi (1)) − (t − 1) i = f |Ω| − (1 − f )(t − 1), which is a contradiction.  The formula in part (iii) of the previous lemma is a key tool for computing fixed point ratios for transitive groups. Indeed, it essentially reduces the problem to determining the fusion of H-classes in G, which may be more tractable. Example 1.3. Sym(n) on 2-sets. Let G = Sym(n) be the symmetric group of degree n > 5, let x = (1, 2,3) ∈ G and let Ω be the set of 2-element subsets of {1, . . . , n}. Then |Ω| = n2 and the action of G is transitive, with point stabiliser H = Sym(n − 2) × Sym(2). We compute fpr(x) in three different ways: a. Direct calculation. We have CΩ (x) = {{a, b} : a, b ∈ {4, . . . , n}}, so  n−3 |CΩ (x)| = 2 and thus (1.1) fpr(x) = (n − 3)(n − 4) . n(n − 1) b. Permutation character. Let π be the permutation character. The action of G on Ω has rank 3 (that is, H has three orbits on Ω) and by Young’s Rule we have π = 1 + χ(n−1,1) + χ(n−2,2) , where χλ is the character of the irreducible Specht module S λ corresponding to the partition λ of n (see [61, Section 14], for example). By applying 1. INTRODUCTION 5 the Hook Formula for dimensions and the Murnaghan-Nakayama Rule for character values (see [61, Sections 20 and 21]), we calculate that χ(n−1,1) (x) = χ(n−4,1) (1) = n − 4 and χ(n−2,2) (x) = χ(n−5,2) (1) = (n − 3)(n − 6)/2 if n > 7 (one can check that χ(3,2) (x) = −1 and χ(4,2) (x) = 0), so fpr(x) = 1 + (n − 4) + (n − 3)(n − 6)/2 (n − 3)(n − 4) = . n(n − 1)/2 n(n − 1) c. Conjugacy classes. All the 3-cycles in G are conjugate, so xG ∩ H is the set of 3-cycles in H. This gives     n−2 n G H G |x ∩ H| = |x | = 2 , |x | = 2 3 3 and thus Lemma 1.2(iii) implies that (1.1) holds. Example 1.4. GLn (q) on vectors. Consider the action of G = GLn (q) on its natural module V = Fnq . For x ∈ G we have fpr(x) = q d−n , where d is the dimension of the 1-eigenspace of x on V . Example 1.5. PGLn (q) on 1-spaces. Similarly, we can consider the transitive action of G = PGLn (q) = GLn (q)/Z on the set of 1-dimensional subspaces of V . Suppose q is odd and set x = x̂Z ∈ G, where x̂ ∈ GLn (q) is the block-diagonal matrix [−I1 , In−1 ] with respect to a basis {e1 , . . . , en } for V (here, and elsewhere, we use Im to denote the m × m identity matrix). Then x fixes he1 i and every 1-space in he2 , . . . , en i, and no others, so fpr(x) = q n−1 −1 q−1 q n −1 q−1 1+ = q n−1 + q − 2 1 ∼ . n q −1 q Alternatively, note that a point stabiliser H = q n−1 :(GL1 (q) × GLn−1 (q))/Z is a maximal parabolic subgroup of G and one checks that xG ∩ H is a union of two H-classes. More precisely, |GLn−1 (q)| |GLn (q)| |xG ∩ H| = q n−1 + q · , |xG | = |GLn−2 (q)||GL1 (q)| |GLn−1 (q)||GL1 (q)| which provides another way to compute fpr(x) via Lemma 1.2(iii). 1.2. Problems. It is natural to consider the following problems, either in the context of a specific permutation group, or more typically for an interesting family of permutation groups, such as primitive groups and almost simple groups. 1. Given a permutation group G and x ∈ G, compute fpr(x). 2. Obtain upper and lower bounds on fpr(x) (in terms of parameters depending on G and x). 6 3. Compute (or bound) the minimal and maximal fixed point ratios min{fpr(x) : x ∈ G} and max{fpr(x) : 1 6= x ∈ G}. 4. We can also consider “local” versions. For example, given a (normal) subset S ⊆ G \ {1}, compute (or bound) min{fpr(x) : x ∈ S} and max{fpr(x) : x ∈ S}. For instance, we may be interested in the case where S is the set of elements of prime order in G, or the set of involutions, etc. Note that max{fpr(x) : 1 6= x ∈ G} and max{fpr(x) : x ∈ G, |x| prime} are equal by Lemma 1.2(ii). As we will see later, bounds on fixed point ratios (in particular, upper bounds) are often sufficient for the applications we have in mind. The above problems are closely related to some classical notions in permutation group theory. To see the connection, let us fix a permutation group G 6 Sym(Ω) of degree n. a. Minimal degree: The minimal degree µ(G) of G is defined to be the smallest number of points moved by any non-identity element, i.e.   µ(G) = min (n − |CΩ (x)|) = n 1 − max fpr(x) . 16=x∈G 16=x∈G For example, µ(Sym(n)) = 2 and µ(Alt(n)) = 3. This is a classical invariant studied by Jordan, Bochert, Manning and others (see Section 2.2). b. Fixity: Similarly, the largest number of fixed points of a non-identity element is called the fixity of G, denoted by   f (G) = n max fpr(x) = n − µ(G). 16=x∈G In addition, max16=x∈G fpr(x) is sometimes referred to as the fixity ratio. This has been studied by Liebeck, Saxl, Shalev and others. If we take S to be the set of involutions in G, then n (maxx∈S fpr(x)) is the involution fixity of G. This concept was studied by Bender in the early 1970s, who classified the transitive groups with involution fixity 1 (for example, the 3-transitive action of PSL2 (2m ) on the projective line has this property). See [32, 35, 82] for more recent results in the context of almost simple primitive groups. c. Derangements: An element x ∈ G is a derangement if fpr(x) = 0, so min fpr(x) = 0 ⇐⇒ G contains a derangement. 16=x∈G The existence and abundance of derangements has been intensively studied for many years, finding a wide range of applications. We refer the reader to [25, Chapter 1], and the references therein. 1.3. Applications. The above problems have an intrinsic interest in their own right, but much of the motivation for studying fixed point ratios stems from the wide range of applications. In order to motivate some of these applications, we close this introduction by presenting three very different 2. SIMPLE GROUPS 7 problems involving simple groups where fixed point ratios play a key role. We will return to these problems in Sections 3, 4 and 5. 1. Generating graphs. Let G be a finite group. The generating graph Γ(G) is a graph on the nonidentity elements of G so that two vertices x, y are joined by an edge if and only if G = hx, yi. Problem A. Let G be a nonabelian finite simple group. Prove that Γ(G) is a connected graph with diameter 2. 2. Monodromy groups. Let g be a non-negative integer and let E(g) be the set of nonabelian nonalternating composition factors of monodromy groups of branched coverings f : X → P1 (C) of the Riemann sphere, where X is a compact connected Riemann surface of genus g. Problem B. Prove that E(g) is finite. 3. Bases. Let G 6 Sym(Ω) be a permutation group. A subset B ⊆ Ω is a base for G if the pointwise stabiliser of B in G is trivial. The base size b(G) of G is the minimal size of a base for G. Problem C. Let G 6 Sym(Ω) be a transitive nonabelian finite simple group with point stabiliser H satisfying the following conditions: (i) If G = Alt(m), then H acts primitively on {1, . . . , m}. (ii) If G is a classical group, then H acts irreducibly on the natural module. Prove that b(G) 6 7, with equality if and only if G is the Mathieu group M24 in its natural action on 24 points. 2. Simple groups In this section we focus on fixed point ratios for primitive simple groups of Lie type. We start with a brief discussion of primitivity in Section 2.1, before turning our attention to the connection between fixed point ratios and the classical notion of minimal degree. In Section 2.3 we introduce a theorem of Liebeck and Saxl (see Theorem 2.6), which provides an essentially best possible upper bound on fixed point ratios for simple groups of Lie type. For the remainder of the section, we look at ways in which this theorem can be strengthened in special cases of interest. For example, we will explain how much stronger bounds have been established for so-called non-subspace actions of classical groups – later we will see that these improved fixed point ratio estimates are essential for the applications we have in mind. Finally, a word or two on notation. For the remainder of this article we will adopt the notation for simple groups used by Kleidman and Liebeck 8 (see [68, Section 5.1]). Notice that this differs slightly from the notation in the Atlas [34]. For instance, we will write PΩn (q) for a simple orthogonal group (where  = ± when n is even) and On (q) is the isometry group of the underlying quadratic form. 2.1. Primitivity. Let G 6 Sym(Ω) be a permutation group, with orbits Ωi , i ∈ I. Then G induces a transitive permutation group GΩi on each Ωi ; these are called the transitive constituents of G. In some sense, G is built from its transitive constituents; indeed, G is a subdirect product of the GΩi (that is, the corresponding projection maps G → GΩi are surjective). For example, G = {1, (1, 2)(3, 4)} has orbits Ω1 = {1, 2} and Ω2 = {3, 4} on Ω = {1, 2, 3, 4}, and G is a proper subdirect product of GΩ1 = {1, (1, 2)} and GΩ2 = {1, (3, 4)}. For the purposes of studying fixed point ratios, it is natural to assume that G is transitive. In turn, the transitive constituents themselves may be built from smaller permutation groups in a natural way. This leads us to the notion of primitivity. This is an important irreducibility condition that allows us to define the primitive groups, which are the basic building blocks of all permutation groups. Definition 2.1. A transitive group G 6 Sym(Ω) is imprimitive if Ω admits a nontrivial G-invariant partition, otherwise G is primitive. Here the trivial partitions are {Ω} and {{α} : α ∈ Ω}. It is an easy exercise to show that G is primitive if and only if a point stabiliser H = Gα is a maximal subgroup of G, which is a useful characterisation. For instance, the action of G = Sym(n) on the set of k-element subsets of {1, . . . , n} is primitive for all 1 6 k < n, k 6= n/2 (note that G is imprimitive if k = n/2 since Gα < Sym(n/2) o Sym(2) < G). Any transitive group of prime degree is primitive and all 2-transitive groups are primitive. It turns out that the abstract structure of a finite primitive group G is rather restricted (observe that transitivity alone imposes no structural restrictions whatsoever). For example, the socle of G (denoted soc(G)) is a direct product of isomorphic simple groups (recall that the socle of a group is the product of its minimal normal subgroups). In fact, we can say much more. The main result is the O’Nan-Scott theorem (see [38, Chapter 4], for example), which describes the structure and action of a primitive group in terms of its socle. This is a very powerful tool for studying primitive groups. Indeed, in many situations it can be used to reduce a general problem to a much more specific problem concerning almost simple groups, at which point one can appeal to the Classification of Finite Simple Groups (CFSG) and the vast literature on simple groups and their subgroups, conjugacy classes and representations. (Recall that a finite group G is almost simple if soc(G) = G0 is a nonabelian simple group, so G0 6 G 6 Aut(G0 ).) In view of these observations, in this article we will focus our attention on fixed point ratios for almost simple primitive permutation groups. 2. SIMPLE GROUPS 9 2.2. Minimal degree. Let G 6 Sym(Ω) be a primitive permutation group of degree n. Recall that   µ(G) = min (n − |CΩ (x)|) = n 1 − max fpr(x) 16=x∈G 16=x∈G is the minimal degree of G. This invariant has been studied since the 19th century. In particular, a classical problem is to find lower bounds on µ(G) in terms of n, assuming G 6= Alt(n), Sym(n), which is equivalent to finding upper bounds on max16=x∈G fpr(x). We record some results: • Jordan [62], 1871: µ(G) tends to infinity as n tends to infinity. In particular, there are only finitely many primitive groups with a given minimal degree bigger than 3. • Bochert [12], 1892: µ(G) > n/4 − 1 if G is 2-transitive. √ • Babai [7, 8], 1981/2: µ(G) > ( n − 1)/2 (independent of CFSG). √ • Liebeck & Saxl [75], 1991: µ(G) > 2( n − 1) (using CFSG). Remark 2.2. The bounds obtained by Babai and Liebeck & Saxl are essentially best possible. To see this, consider the primitive product action of G = Sym(m) o Sym(2) on n = m2 points (with m > 3), so  ((γ1 )x1 , (γ2 )x2 ) if π = 1 (x1 ,x2 )π (γ1 , γ2 ) = ((γ2 )x2 , (γ1 )x1 ) if π = (1, 2) for all γ1 , γ2 ∈ {1, . . . , m} and (x1 , x2 )π ∈ G. One checks that every nonidentity element x ∈ G moves at least 2m points, with equality if and only 2 if x is of the form (y, 1) or (1, y) in √ the base group Sym(m) , where y is a transposition. Therefore µ(G) = 2 n. The following theorem of Guralnick and Magaard is a simplified version of [52, Theorem 1]; it is the best known result on the minimal degree of primitive groups. Theorem 2.3. Let G 6 Sym(Ω) be a primitive group of degree n with µ(G) < n/2. Then one of the following holds: (i) G = Sym(n) or Alt(n); (ii) G 6 L o Sym(r) acts with its product action on Ω = Γr for some r > 1, where L 6 Sym(Γ) is an almost simple primitive group with socle L0 and either (a) L0 = Alt(m) and Γ is the set of k-element subsets of {1, . . . , m} for some k > 1; or (b) L0 = Ωm (2) is an orthogonal group over F2 and Γ is a set of 1-dimensional subspaces of the natural L0 -module. By carefully analysing the cases arising in (b), Guralnick and Magaard establish the following striking corollary (see [52, Corollary 1]). Corollary 2.4. Let G be a finite primitive group and assume that the socle of G is not a product of alternating groups. Then 4 max fpr(x) 6 . 16=x∈G 7 10 Remark 2.5. (i) The upper bound in Corollary 2.4 is best possible. For example, suppose G = O7 (2) ∼ = Sp6 (2), H = Gα = O− 6 (2) and x ∈ G is a transvection (in other words, x is an involution with Jordan form [J2 , J14 ] on the natural module for Sp6 (2), where Ji denotes a standard unipotent Jordan block of size i). All the transvections in H (and also in G) are conjugate, so |xG ∩ H| = |xH | = |O− |Sp (2)| 6 (2)| = 36, |xG | = 5 6 = 63 2|Sp4 (2)| 2 |Sp4 (2)| and thus fpr(x) = 36/63 = 4/7 (the respective centraliser orders can be read off from [6, Sections 7 and 8], noting that x is a b1 -type involution in both H and G). (ii) Note that the conclusion is false if we allow groups whose socle is a product of alternating groups. For instance, in Example 1.3 we observed that   lim max fpr(x) = 1 n→∞ 16=x∈G for the action of G = Sym(n) on 2-sets. We refer the reader to [66] for results on the minimal degree of arbitrary finite permutation groups and some interesting applications to quantum computing. 2.3. Fixed point ratios for simple groups. In this section we discuss fixed point ratios for almost simple groups of Lie type. With a view towards applications, we are primarily interested in obtaining upper bounds, so it is natural to focus on primitive actions and prime order elements. We start by recalling a theorem of Liebeck and Saxl [75, Theorem 1], which is the most general result in this area. Theorem 2.6. Let G 6 Sym(Ω) be a transitive almost simple group of Lie type over Fq with socle G0 and point stabiliser H. Assume G0 6= PSL2 (q). Then either (2.1) max fpr(x) 6 16=x∈G 4 3q or G0 ∈ {PSL4 (2), PSp4 (3), PΩ− 4 (3)}. Remark 2.7. (i) This is a simplified version of [75, Theorem 1], which includes the case G0 = PSL2 (q) and gives a precise description of the triples (G, H, x) with fpr(x) > 4/3q. (ii) The upper bound is essentially best possible. For instance, in Example 1.5 (G = PGLn (q) on 1-spaces) we observed that there are elements x ∈ G with fpr(x) ∼ 1/q. 2. SIMPLE GROUPS 11 (iii) Consider the special case G0 = PSL4 (2) ∼ = Alt(8) appearing in the statement of the theorem. If G = G0 .2 = Sym(8), |Ω| = 8 and x = (1, 2), then fpr(x) = 6/8 > 4/6. The proof of Theorem 2.6 proceeds by induction, with the ultimate goal of eliminating the existence of a minimal counterexample (minimal with respect to the order of the group). The details of the argument are somewhat complicated by the fact that there are a small number of groups for which the bound in (2.1) is false. To give a flavour of the main ideas, we provide a brief sketch to show that (2.1) holds when G = PSLn (q) with n > 6. Below we use the notation Pm for the stabiliser in G of an m-dimensional subspace of the natural module V for G. Sketch proof of Theorem 2.6 (G = PSLn (q), n > 6). Suppose fpr(x) > 4/3q for some 1 6= x ∈ G. Set H = Gα and write x = x̂Z, where x̂ ∈ SLn (q) and Z = Z(SLn (q)). In view of Lemma 1.2, we may assume that H is maximal (so G is primitive) and x has prime order r, so x is either semisimple (if r 6= p) or unipotent (if r = p), where p is the characteristic of Fq . Replacing x by a suitable conjugate, if necessary, we may assume that x ∈ H. Note that (2.2) |Ω| < 3q|CG (x)| 4 by Lemma 1.2(iii). Our first goal is to reduce to the case where x stabilises a nontrivial decomposition V = V1 ⊕ V2 . Suppose otherwise. If x is semisimple then it acts irreducibly on V and we deduce that |CG (x)| 6 (q n − 1)/(q − 1). In view of (2.2), this implies that H = P1 (the smallest permutation representation of G has degree (q n − 1)/(q − 1)), which means that x fixes a 1-space. This is incompatible with the irreducibility of x. Similarly, if x is unipotent then it must be regular (i.e. it has Jordan form [Jn ] on V ) and by considering |CG (x)| we again deduce that H = P1 . But a regular unipotent element fixes a unique 1-dimensional subspace of V , so |CΩ (x)| = 1 and once again we have reached a contradiction. Let V = V1 ⊕ V2 be a nontrivial decomposition fixed by x with 1 6 a1 6 a2 , where ai = dim Vi . Assume a1 is minimal. We claim that a1 6 2. Suppose a1 > 3. Set Ai = SLai (q), Bi = GLai (q) and write x̂ = (x̂1 , x̂2 ) ∈ B1 × B2 . Let X = hA1 × A2 , x̂i 6 SLn (q). Let xi be the automorphism of the simple group Ai /Z(Ai ) induced by x̂i . The minimality of a1 implies that neither x̂1 nor x̂2 is a scalar, so each xi is nontrivial. The key step in the proof is to study the orbits Ω1 , . . . , Ωk of X on Ω, together with the action of A1 and A2 on each orbit. The case where H = Pa1 can be handled directly, so assume otherwise. For convenience, let us also assume that neither A1 /Z(A1 ) nor A2 /Z(A2 ) are exceptions to the statement of the main theorem. Then using induction and a technical 12 lemma [75, Lemma 2.8] one can show that |CΩj (x)| 6 4|Ωj |/3q for each j, which implies that fpr(x) 6 4/3q, a contradiction. We now have a1 6 2 and a2 > 4 since n > 6. By considering the orbits of A2 on Ω and applying induction, one can reduce to the case where A2 6 H. From here it follows that H = P1 or P2 (using work of Kantor [64], given the fact that H contains long root elements of G), and it is not too difficult to eliminate these two possibilities. 2 Theorem 2.6 plays a central role in the proof of√[75, Theorem 2], which yields the aforementioned lower bound µ(G) > 2( n − 1) on the minimal degree of a primitive group G of degree n that does not contain Alt(n). To derive this bound, it suffices to show that µ(G) > n/3 unless G satisfies the conditions in part (ii)(a) of Theorem 2.3. We briefly sketch the argument. Consider a counterexample G 6 Sym(Ω) of minimal order, with point stabiliser H. Fix x ∈ H of prime order such that fpr(x) > 2/3. By applying the O’Nan-Scott theorem, we can reduce to the case where G is almost simple. For example, if G is either an affine group or a twisted wreath product, then N = soc(G) is regular (that is, H ∩ N = 1), so |CΩ (x)| = |CN (x)| 6 n |N | = 2 2 and thus fpr(x) 6 1/2, a contradiction. Now assume G is almost simple with socle G0 . If G0 is a simple group of Lie type over Fq then Theorem 2.6 immediately gives µ(G) > n/2 if q > 2, and µ(G) > n/3 if q = 2. If G0 is a sporadic group and µ(G) > n/2 then Lemma 1.2(iv) implies that 1 + |χ(x)| > 1 + χ(1) 2 for some non-linear character χ ∈ Irr(G). By inspecting the relevant character tables in the Atlas [34], one checks that no such character exists. Finally, suppose G0 = Alt(m) is an alternating group and consider the action of H on Γ = {1, . . . , m}. The situation where H is intransitive or imprimitive on Γ can be handled directly, working with a concrete description of the action of G on subsets or partitions. Suppose H is primitive. The minimality of |G| implies that µ(H) > m/3 with respect to the action of H on Γ. This immediately translates into a lower bound of the form |xG | > f (m) for some function f and thus |H| > 23 f (m) since fpr(x) > 2/3. But H is a primitive group of degree m, so |H| < g(m) for some function g (for instance, we can take g(m) = 4m by a theorem of Praeger and Saxl [91]). Together, these bounds imply that m 6 750 and by inspecting lists of small degree primitive groups one can reduce this to m 6 24. The remaining possibilities can be eliminated one-by-one. 2.4. Classical groups. As observed in Remark 2.7, the upper bound in Theorem 2.6 is essentially best possible. However, it would be desirable to have bounds on fpr(x) that depend on the element x in some way. We might also try to establish stronger bounds, at the expense of excluding some 2. SIMPLE GROUPS 13 specific actions. In this section we report on recent work in this direction for almost simple classical groups. Let G 6 Sym(Ω) be an almost simple primitive classical group over Fq with socle G0 and point stabiliser H. Let V be the natural module for G0 and set n = dim V . Write q = pf with p prime. The possibilities for G0 are recorded in Table 2.1. Note that we may assume the given conditions on n and q due to several exceptional isomorphisms among the low-dimensional classical groups (see [68, Proposition 2.9.1] for example). Type Linear Unitary Symplectic Notation PSLn (q) PSUn (q) PSpn (q)0  Ωn (q) Orthogonal PΩ± n (q) Conditions n > 2, (n, q) 6= (2, 2), (2, 3) n > 3, (n, q) 6= (3, 2) n > 4 even nq odd, n > 7 n > 8 even Table 2.1. The finite simple classical groups Since G is primitive, H is a maximal subgroup of G with G = G0 H. The possibilities for H are described by a fundamental theorem of Aschbacher. In [2], Aschbacher introduces eight geometric families of subgroups of G, denoted by C1 , . . . , C8 , which are defined in terms of the underlying geometry of V . For example, these collections include the stabilisers of certain types of subspaces of V , and the stabilisers of appropriate direct sum and tensor product decompositions. Roughly speaking, Aschbacher’s main theorem implies that H is either contained in one of the Ci collections, or H is almost simple and the socle of H acts absolutely irreducibly on V . Following [68], we use S to denote the latter collection of non-geometric subgroups. In turn, we write S = S1 ∪ S2 where a subgroup H ∈ S is in S1 if its socle is a group of Lie type in the defining characteristic p. A brief description of these subgroup collections is presented in Table 2.2. Some further conditions are imposed on the subgroups in S to avoid containment in a geometric subgroup collection. For instance, suppose G0 = PSLn (q) and H ∈ S has socle H0 . Let b 0 → GL(V ) ρ:H b 0 is the be the corresponding absolutely irreducible representation (where H b 0 ) does not fix a non-degenerate form full covering group of H0 ). Then ρ(H on V and the representation cannot be realised over a proper subfield of Fq b 0 )). (see [68, p.3] for a complete list of the conditions satisfied by ρ(H It turns out that a small additional subgroup collection (denoted by N ) arises when G0 = PSp4 (q)0 (with q even) or PΩ+ 8 (q), due to the existence of certain exceptional automorphisms (the maximal subgroups in the latter case have been determined by Kleidman [67]). The definitive reference for information on the structure, maximality and conjugacy of the geometric subgroups is the book by Kleidman and Liebeck 14 C1 C2 C3 C4 C5 C6 C7 C8 S N Stabilisers of subspaces, or pairs of subspaces, of V L Stabilisers of decompositions V = ti=1 Vi , where dim Vi = a Stabilisers of prime degree extension fields of Fq Stabilisers of decompositions V = V1 ⊗ V2 Stabilisers of prime index subfields of Fq Normalisers of symplectic-type r-groups, r 6= p N Stabilisers of decompositions V = ti=1 Vi , where dim Vi = a Stabilisers of nondegenerate forms on V Almost simple absolutely irreducible subgroups 0 Novelty subgroups (G0 = PΩ+ 8 (q) or PSp4 (q) (p = 2), only) Table 2.2. Aschbacher’s subgroup collections [68]. More recently, the maximal subgroups of the low-dimensional classical groups with n 6 12 have been completely determined by Bray, Holt and Roney-Dougal in [14]. Example 2.8. If G0 = PSL6 (q) then the subgroups comprising the geometric Ci collections are described below (note that the C6 and C7 collections are empty). Here we refer to the type of a subgroup H, which provides an approximate description of the group-theoretic structure of H (the precise structure is presented in [14, 68]). C1 : Parabolic subgroups Pm with m ∈ {1, 2, 3, 4, 5}, where Pm = GU for an m-dimensional subspace U of V . In addition, if G contains a graph (or graph-field) automorphism τ of G0 then C1 also includes the stabilisers of the form GU,W , where U, W are non-zero subspaces of V with 6 = dim U + dim W and either U ⊂ W or V = U ⊕ W . (Note that if G = hG0 , τ i and m 6= 3 then Pm < G0 < G since dim U τ = 6 − m.) C2 : Stabilisers of direct sum decompositions of the form V = V1 ⊕ V2 or V = U1 ⊕ U2 ⊕ U3 , where dim Vi = 3 and dim Ui = 2. These subgroups are of type GL3 (q) o Sym(2) and GL2 (q) o Sym(3), respectively. C3 : Field extension subgroups of type GL3 (q 2 ) and GL2 (q 3 ). C4 : Tensor product subgroups of type GL3 (q) ⊗ GL2 (q). C5 : Subfield subgroups of type GL6 (q0 ), where q = q0k for some prime k. C8 : Classical subgroups of type Sp6 (q) and O± 6 (q) (with q odd in the 2 latter case), and also type GU6 (q0 ) if q = q0 . In addition, the possible socles of the subgroups in S are as follows (see [14, Table 8.25]): Alt(6), Alt(7), PSL2 (11), M12 , PSL3 (4), PSU4 (3), PSL3 (q). Note that the latter subgroup arises from the symmetric-square representation S 2 (W ) of SL3 (q), where W is the natural module for SL3 (q). 2. SIMPLE GROUPS 15 When studying fixed point ratios for classical groups, it is natural to distinguish between those actions which permute subspaces of the natural module and those which do not. This leads us naturally to the following definition. Definition 2.9. Let G 6 Sym(Ω) be an almost simple primitive classical group over Fq with socle G0 , natural module V and point stabiliser H. The action of G on Ω is a subspace action if one of the following holds for each maximal subgroup M of G0 containing H ∩ G0 : (i) M is the stabiliser in G0 of a proper non-zero subspace U of V , where U is totally singular, non-degenerate or, if G0 is orthogonal and q is even, a non-singular 1-space (U can be any subspace if G0 = PSLn (q)). (ii) M = O± n (q) if G0 = Spn (q) and q is even. Example 2.10. If G0 = PSp6 (q) then the subspace actions correspond to the following maximal subgroups H of G: C1 : H = Pm = GU is a maximal parabolic subgroup, where U is a totally singular m-space and m ∈ {1, 2, 3}. C1 : H = GW is of type Sp4 (q) × Sp2 (q), where W is a non-degenerate 2-space. − C8 : H is of type O+ 6 (q) or O6 (q), and q is even. Note that a subgroup H of the latter type is the stabiliser of a non-degenerate quadratic form on V . However, if we consider the isomorphism Sp6 (q) ∼ = O7 (q) (where O7 (q) is the isometry group of a non-singular quadratic form on a 7-dimensional space over Fq ), then H corresponds to the stabiliser of an appropriate non-degenerate 6-space. This explains why we include these subgroups in Definition 2.9. In general, notice that subspace actions correspond to maximal subgroups in the collection C1 (in addition to the special C8 -subgroups that arise when G is a symplectic group in even characteristic). As previously remarked, it is sensible to make a distinction between subspace and non-subspace actions when studying fixed point ratios for classical groups. In general, the stabilisers for subspace actions tend to be large subgroups, such as maximal parabolic subgroups, so it is natural to expect that fpr(x) = |xG ∩ H|/|xG | will also be large in this situation. For example, we demonstrated the sharpness of Theorem 2.6 by considering the action of PGLn (q) on 1-spaces. Therefore, it is reasonable to expect that better bounds can be established if we exclude subspace actions. In addition, we have a very concrete description of subspace actions, which may permit direct calculation, so it also makes sense to treat them separately from this point of view. 2.5. Subspace actions of classical groups. Let G 6 Sym(Ω) be a primitive almost simple classical group over Fq in a subspace action with socle G0 and natural module V . Fix an element x ∈ G ∩ PGL(V ) and write x = x̂Z, where x̂ ∈ GL(V ) and Z denotes the centre of GL(V ). Since we can identify Ω with a collection of subspaces (or pairs of subspaces) of V , it 16 is natural to expect that fpr(x) will reflect certain properties of the action of x on V . For instance, in Example 1.4 we observed that fpr(x) = q d−n for the natural action of GLn (q) on V = Fnq , where d = dim CV (x) is the dimension of the 1-eigenspace of x on V . To formalise this, we introduce the following notation (recall that if y ∈ GL(W ), then [W, y] is the subspace of W spanned by the vectors of the form w − wy, for w ∈ W ). Definition 2.11. For x ∈ PGL(V ), let x̂ be a pre-image of x in GL(V ) and define ν(x) = min{dim[V̄ , λx̂] : λ ∈ K × }, where V̄ = V ⊗ K and K is the algebraic closure of Fq . Note that ν(x) is equal to the codimension of the largest eigenspace of x̂ on V̄ . Example 2.12. Consider the action of G = PSpn (q) on the set Ω of 2-dimensional non-degenerate subspaces of V . Assume q is odd and set x = x̂Z, where x̂ = [−Im , In−m ] and 0 < m < n/2 with respect to an appropriate symplectic basis of V . The eigenspaces U and W of x̂ are nondegenerate, so m = dim U = ν(x) is even and x stabilises the orthogonal decomposition V = U ⊥ W . Since G acts transitively on Ω we have |Ω| = |Spn (q)| ∼ q 2(n−2) . |Sp2 (q)||Spn−2 (q)| Clearly, x fixes a non-degenerate 2-space if and only if it is contained in either U or W , so |CΩ (x)| = |Spn−m (q)| |Spm (q)| + ∼ q 2(m−2) + q 2(n−m−2) |Sp2 (q)||Spm−2 (q)| |Sp2 (q)||Spn−m−2 (q)| ∼ q 2(n−m−2) and thus fpr(x) ∼ q −2m = q −2ν(x) . The most general result for subspace actions is the following theorem of Frohardt and Magaard [44], which shows that the previous example is typical for all subspace actions. Theorem 2.13. Fix  > 0 and let G 6 Sym(Ω) be a primitive almost simple classical group over Fq with natural module V , where Ω is an appropriate set of k-subspaces of V . Then there exists an integer N = N (q, ) such that if dim V > N then fpr(x) < q −ν(x)k +  for all 1 6= x ∈ G ∩ PGL(V ). This is a somewhat simplified version of their main result. Indeed, [44] provides a suitably modified version of the theorem that holds for all nonidentity elements in G, together with explicit upper and lower bounds on fpr(x). For instance, [44, Theorem 1] states that if G0 = PSLn (q), n > 5 and Ω is the set of k-dimensional subspaces of V , then either (a) fpr(x) 6 9q −(n−1)/2 , or (b) x ∈ G ∩ PGL(V ), ν(x) 6 n/2k and q −ν(x)k − q −n 6 fpr(x) 6 q −ν(x)k + 11q −n/2 . 2. SIMPLE GROUPS 17 We also refer the reader to [51, Section 3] for some alternative upper bounds on max16=x∈G fpr(x) for subspace actions (this work of Guralnick and Kantor was motivated by very different applications, which we will discuss in Section 3). 2.6. Non-subspace actions of classical groups. Now let us turn to the non-subspace actions of classical groups. Here it is natural to distinguish between geometric and non-geometric actions. For geometric actions, we have a rather concrete description of the embedding of H = Gα in G, which permits a detailed analysis of the conjugacy classes in H and, more importantly, their fusion in G. In this way, it is possible to compute accurate fixed point ratio estimates for geometric actions. Example 2.14. Suppose G = PSp12 (q) and H is a C2 -subgroup of G of type Sp4 (q) o Sym(3), so H is the stabiliser of an orthogonal decomposition V = V1 ⊥ V2 ⊥ V3 and each Vi is a nondegenerate 4-space. Let Z denote the centre of Sp12 (q). Assume q ≡ 1 (mod 3) and set x = x̂Z ∈ G where x̂ = [I6 , λI3 , λ2 I3 ] and λ ∈ Fq is a primitive cube root of unity (here we are thinking of x̂ as a diagonal matrix, with respect to an appropriate basis). Since two semisimple elements in a symplectic group are conjugate if and only if they have the same eigenvalues (in a splitting field), we see that H 3 xG ∩ H = xH 1 ∪ x2 where x̂1 , x̂2 ∈ Sp4 (q) are as follows: x̂1 = ([I4 ], [I2 , λ, λ2 ], [λI2 , λ2 I2 ]), x̂2 = ([I2 , λ, λ2 ], [I2 , λ, λ2 ], [I2 , λ, λ2 ]). Therefore |Sp4 (q)| |Sp4 (q)| · + |x ∩ H| = 3! · |Sp2 (q)||GL1 (q)| |GL2 (q)| G  |Sp4 (q)| |Sp2 (q)||GL1 (q)| 3 ∼ 6q 12 + q 18 and |xG | = |Sp12 (q)| ∼ q 48 , |Sp6 (q)||GL3 (q)| so fpr(x) ∼ q −30 ∼ |xG |−5/8 (we refer the reader to [25, Chapter 3] for detailed information on the centralisers of elements of prime order in finite classical groups). We require different methods to handle the non-geometric actions of classical groups. Indeed, in general we are unable to determine the maximal subgroups H ∈ S for a given classical group G. Of course, we do not even know the dimensions of the irreducible representations of simple groups, let alone information on the embedding of H in G that might allow us to understand the fusion of the relevant conjugacy classes! However, as described below in Section 2.7, there are ways to overcome these obstacles for the purposes of estimating fixed point ratios. A key result on non-subspace actions is the following theorem of Liebeck and Shalev [81], which plays a major role in several important applications. A nice feature of this result is that the upper bound depends on the size of the conjugacy class of the element. 18 Theorem 2.15. There is an absolute constant  > 0 such that fpr(x) < |xG |− for all x ∈ G of prime order and for every primitive almost simple classical group G in a non-subspace action. It is easy to see that this result does not extend to subspace actions. For example, if we consider the action of G = PGLn (q) on 1-spaces and we choose x ∈ G with ν(x) = 1 then |xG | ∼ q 2n−2 but fpr(x) ∼ q −1 . In particular, Theorem 2.15 implies that fpr(x) tends to 0 as |G| tends to infinity (for classical groups acting on subspaces of a fixed dimension, we only get this limiting behaviour as the field size tends to infinity). The constant  in Theorem 2.15 is undetermined and with applications in mind it is desirable to pin down an explicit estimate. The main theorem of [19] implies that  ∼ 1/2 is optimal. Theorem 2.16. Let G be a primitive almost simple classical group in a non-subspace action with point stabiliser H and natural module of dimension n. Then 1 fpr(x) < |xG |− 2 +η for all x ∈ G of prime order, where η → 0 as n → ∞. This is a simplified version of [19, Theorem 1], which is proved in the sequence of papers [20, 21, 22]. Indeed, one can take −1/2 + 1/n + δ for the exponent, where δ = 0, or (G, H, δ) is one of a small number of known exceptions (in every case, δ → 0 as n → ∞). The next example shows that there is not much room for improvement in this exponent. Example 2.17. Suppose G = PSLn (q) and H is a C8 -subgroup of type O+ (q), so n is even and q is odd. Let x ∈ G be an involution such that n x̂ = [−Im , In−m ] with m even. Then |xG ∩ H| = |O+ n (q)| + |Om (q)||O+ n−m (q)| and |xG | = + |O+ n (q)| − |Om (q)||O− n−m (q)| ∼ q m(n−m) |GLn (q)| ∼ q 2m(n−m) |GLm (q)||GLn−m (q)| so fpr(x) ∼ q −m(n−m) ∼ |xG |−1/2 . There are many other examples that demonstrate the accuracy of the bound in Theorem 2.16. For instance, if q = q02 and H is a subfield subgroup of G defined over Fq0 then |xG ∩ H| ∼ |xG |1/2 for all x ∈ G with fixed points, so fpr(x) ∼ |xG |−1/2 . The proof of Theorem 2.16 is given in [20, 21, 22]. To handle the relevant geometric actions we combine detailed information on the structure of the maximal geometric subgroups in [68] (which is organised according to the subgroup collections arising in Aschbacher’s theorem) with a careful analysis of the conjugacy classes and fusion of elements of prime order. A different approach is needed to deal with the non-geometric actions corresponding to the maximal subgroups in the collection S. We will briefly describe the main ingredients in the next section. 2. SIMPLE GROUPS 19 2.7. S-actions of classical groups. Let G, H and n be given as in the statement of Theorem 2.16. Let G0 be the socle of G, which is a simple classical group over Fq (for q = pf , p prime) with natural module V of b 0 → GL(V ) be the dimension n. Assume H ∈ S has socle H0 and let ρ : H corresponding absolutely irreducible representation. If n is small, say n 6 5, then the possibilities for (G, H, ρ) are well known (see [14]) and it is straightforward to work directly with the representation ρ (and its Brauer character) to obtain sufficient information on the fusion of H-classes in G to compute (or accurately estimate) fixed point ratios. Now assume n > 6. Let us write H ∈ A if q = p, H0 = Alt(m) is an alternating group and V is the fully deleted permutation module for H0 over Fq (in which case n = m − 2 or m − 1). We can now state the following result, which combines the main theorem of [73] with [54, Theorem 7.1]. Theorem 2.18. Let G be a primitive almost simple classical group over Fq with socle G0 , point stabiliser H ∈ S \ A and natural module V of dib 0 → GL(V ) be the corresponding representation. mension n > 6. Let ρ : H Then the following hold: (i) |H| < q 3nα , where α = 2 if G0 is unitary, otherwise α = 1; √ (ii) Either ν(x) > max{2, n/2} for all 1 6= x ∈ H ∩ PGL(V ), or n 6 10 and (G, H, ρ) belongs to a short list of known exceptions. Remark 2.19. (a) The bound in part (i) of the theorem can be sharpened, at the expense of some additional (known) exceptions. For instance, see [73, Theorem 4.2] and [27, Theorem 2.10] for improvements with q 3nα replaced by q (2n+4)α and q 2n+4 , respectively (for example, the case (G, H) = (PSL27 (q), E6 (q)) is an exception to the bound |H| < q 2n+4 ). (b) We can view the bound in (ii) as a linear analogue of the aforementioned bounds of Babai, Liebeck and Saxl on the minimal degree of a primitive permutation group (with irreducibility in place of primitivity); see Section 2.2. (c) The bound in (ii) is close to best possible if we impose the condition that the only exceptions occur in small dimensions. To see this, suppose n = m2 where m > 3 is odd. If q is chosen appropriately then G = PSLn (q) has a maximal subgroup H ∈ S with socle H0 = PSLm (q 2 ), which is embedded in G via the module W ⊗ W (q) for b 0 = SLm (q 2 ), where W is the natural module for H0 and W (q) is H the q-power Frobenius twist of W . If we take x = √ [−Im−1 , I1 ] ∈ H0 then it is easy to check that ν(x) = 2m − 2 < 2 n. The proof of Theorem 2.15 also uses the bound in part (i) of Theorem 2.18, but the bound in (ii) is a crucial new ingredient in the proof of Theorem 2.16. The cases in A, and also the small number of low-dimensional exceptions arising in part (ii) of Theorem 2.18, are well understood embeddings and they can be handled directly. Generically, Theorem 2.18 tells us that H is small and the elements in H ∩ PGL(V ) have relatively small eigenspaces on V . In particular, the 20 latter property yields a lower bound |xG | > f (n, q) for all x ∈ H ∩ PGL(V ) of prime order, so we get (2.3) fpr(x) = |xG ∩ H| |H| q 3nα < < . |xG | |xG | f (n, q) Note that if x ∈ H \ PGL(V ) has prime order then x is either a field, graph or graph-field automorphism of G0 and it is straightforward to check that the inequality |xG | > f (n, q) still holds, so (2.3) is valid for all x ∈ H of prime order. Example 2.20. Suppose G = PSLn (q), H ∈ S \ A and√n > 10. Let x ∈ H be an element of prime order with ν(x) = s, so s > d n/2e = β by Theorem 2.18(ii). It is not too difficult to show that 1 |xG | > q 2β(n−β) 2 (see [20, Corollary 3.38]) so we get fpr(x) < |xG |−1/2 if 1 q 6n < q 2β(n−β) . 2 One checks that this inequality holds if n > 36, so we may assume that n 6 36. In fact, if we replace the bound in part (i) of Theorem 2.18 by |H| < q 2n+4 (at the expense of a small number of known exceptions (see [73, Theorem 4.2]), which can be handled separately), then we can reduce to the case where n 6 16. At this point we can turn to results of Lübeck [84] (in defining characteristic) and Hiss and Malle [59, 60] (in non-defining characteristic) to determine the possibilities for (G, H, ρ) and we can then work directly with these cases. 2.8. Exceptional groups. Finally, let us say a few words on fixed point ratios for exceptional groups. Let G 6 Sym(Ω) be a primitive almost simple exceptional group of Lie type over Fq with socle G0 and point stabiliser H. Recall that Theorem 2.6 gives max fpr(x) 6 16=x∈G 4 3q and it is natural to ask if this upper bound can be improved. In [46], Frohardt and Magaard obtain close to best possible upper bounds in the special case where the rank of G is at most 2. For example, they prove that ( 1 if G0 ∈ {G2 (q), 2 G2 (q)} and q > 4, q 2 −q+1 max fpr(x) = 1 if G0 = 3 D4 (q). 16=x∈G q 4 −q 2 +1 In [71], using different methods, Lawther, Liebeck and Seitz present a detailed analysis of fixed point ratios for all the exceptional groups. For instance, [71, Theorem 1] gives  1   q8 (q4 −1) if G0 = E8 (q) 1 if G0 ∈ {E7 (q), 2 E6 (q)} max fpr(x) 6 q 6 −q 3 +1  16=x∈G 1  if G0 ∈ {E6 (q), F4 (q)}, q 4 −q 2 +1 2. SIMPLE GROUPS 21 with equality if G0 = E6 (q), 2 E6 (q) or F4 (q). More detailed bounds are given in [71, Theorem 2], which depend not only on G, but also on the choice of H and x to some extent. For example, if G = E8 (q) and H does not contain a maximal torus of G, then [71, Theorem 2] states that fpr(x) 6 q −48 for all non-identity semisimple elements x ∈ G. As for classical groups, the proofs rely on detailed information on the subgroup structure and conjugacy classes of the finite exceptional groups. In particular, there is a fundamental reduction theorem for subgroups due to Liebeck and Seitz, which plays a similar role to Aschbacher’s theorem for classical groups (see [77, Theorem 8], for example). We finish by highlighting two other important ingredients in [71]. 2.8.1. Parabolic actions. The special case where H is a maximal parabolic subgroup is studied using tools from the character theory of finite groups of Lie type, such as the Deligne-Lusztig theory and Green functions. These sophisticated techniques can be used to obtain very precise fixed point ratio estimates. For example, suppose G = E8 (q), H = P8 and x ∈ G is unipotent (here our notation indicates that H corresponds to the 8-th node in the Dynkin diagram of G, labelled in the usual way, so the Levi factor of H is of type E7 (q)). Then |Ω| ∼ q 57 and one can show that the corresponding permutation character admits the decomposition X 1G (x) = nφ Rφ (x) H c φ∈W = Rφ1,0 (x) + Rφ8,1 (x) + Rφ35,2 (x) + Rφ112,3 (x) + Rφ84,4 (x), c = Irr(W ) and W is the Weyl group of G. The Rφ are almost where W characters of G and the coefficients are given by nφ = h1W WP , φi, where WP is the corresponding parabolic subgroup of W . The restriction of the Rφ to unipotent elements x ∈ G are called Green functions; each Rφ (x) is a polynomial in q with non-negative coefficients. Lübeck has implemented an algorithm of Lusztig to compute the relevant Green functions (modulo a sign issue for certain elements) and his calculations yield very precise estimates for fpr(x) (see [71, Section 2] for more details). For example, if x ∈ G is a long root element then 1G H (x) can be computed precisely in this way; we get a certain monic polynomial in q of degree 45, which implies that fpr(x) 6 1/q 8 (q 4 − 1). This turns out to be the largest fixed point ratio for any non-identity element of G. 2.8.2. Algebraic groups. Results on the dimensions of fixed point spaces for primitive actions of exceptional algebraic groups also play a key role in [71]. In the general set up, Ḡ is a simple algebraic group over the algebraic closure K = F̄q and σ is a Frobenius morphism of Ḡ such that G0 is the derived subgroup of Ḡσ = {x ∈ Ḡ : xσ = x}. Let H̄ be a σ-stable closed subgroup of Ḡ and let Γ = Ḡ/H̄ be the corresponding coset variety, which is naturally a Ḡ-variety over K. Then the fixed point space CΓ (x) is a subvariety for each x ∈ Ḡ, and we may compare the dimensions of Γ and CΓ (x). In analogy with Lemma 1.2(iii), we have dim CΓ (x) − dim Γ = dim(xḠ ∩ H̄) − dim xḠ 22 for all x ∈ H̄ (see [70, Proposition 1.14]). Moreover, if we set H = H̄σ then fpr(x) = |xG ∩ H| Ḡ Ḡ ∼ q dim(x ∩H̄)−dim x G |x | for all x ∈ H (see [71, Lemma 4.5], for example). In this way, if H corresponds to a σ-stable closed subgroup of Ḡ, then it is possible to use dimension bounds at the algebraic group level to study fixed point ratios for the finite group G. This interplay between finite and algebraic groups is applied repeatedly in [71], using results obtained for primitive actions of exceptional algebraic groups in the companion paper [70]. Similar considerations also play a role in the analysis of geometric actions of finite classical groups in the proof of Theorem 2.16, using results for classical algebraic groups in [18]. 3. Generation and random generation In this section we discuss applications of fixed point ratios to problems concerning the generation and random generation of finite groups. In particular, we will explain how fixed point ratios play a key role in the solution to Problem A on generating graphs of simple groups stated in the introduction. 3.1. Simple groups. Recall that a group is n-generated if it can be generated by n elements. For instance, dihedral and symmetric groups are 2-generated, e.g. we have Sym(n) = h(1, 2), (1, 2, . . . , n)i. The following theorem (essentially due to Steinberg [98]) is the starting point for the investigation of many interesting problems. Theorem 3.1. Every finite simple group is 2-generated. The proof relies on CFSG. The alternating groups are easy:  h(1, 2, 3), (1, 2, . . . , n)i n odd, Alt(n) = h(1, 2, 3), (2, 3, . . . , n)i n even. In [98], Steinberg presents explicit generating pairs for each simple group of Lie type. For instance, PSL2 (q) = hxZ, yZi, where Z = Z(SL2 (q)) and     µ 0 −1 1 x= , y= −1 0 0 µ−1 with F× q = hµi. In [4], Aschbacher and Guralnick complete the proof of the theorem by showing that every sporadic group is 2-generated. Remark 3.2. By a theorem of Dalla Volta and Lucchini [36], every almost simple group is 3-generated (there are such groups that really need 3 generators, e.g. take G = Aut(PSLn (q)) with nq odd and q = p2f with p prime). In view of Theorem 3.1, it is natural to consider the abundance of generating pairs in a finite simple group (or a sequence of such groups), or the existence of generating pairs with special properties (such as prescribed orders). Problems of this flavour have been intensively investigated in recent years. 3. GENERATION AND RANDOM GENERATION 23 3.2. Random generation. Let G be a finite group, let k be a positive integer and let P(G, k) = |{(x1 , . . . , xk ) ∈ Gk : G = hx1 , . . . , xk i}| |G|k be the probability that k randomly chosen elements generate G. Conjecture 3.3 (Netto [88], 1882). “If we arbitrarily select two or more substitutions of n elements, it is to be regarded as extremely probable that the group of lowest order which contains these is the symmetric group, or at least the alternating group.” In our terminology, Netto is claiming that limn→∞ P(Alt(n), 2) = 1. This remarkable conjecture was proved by Dixon [37] in a highly influential paper published in 1969, which relies in part on the pioneering work of Erdös and Turán in the mid-1960s on statistical properties of symmetric groups. In the same paper, Dixon makes the bold conjecture that all finite simple groups are strongly 2-generated in the sense of Netto. Conjecture 3.4. Let (Gn ) be any sequence of finite simple groups such that |Gn | tends to infinity with n. Then limn→∞ P(Gn , 2) = 1. Dixon’s conjecture was eventually proved in the 1990s. In [65], Kantor and Lubotzky establish the conjecture for classical groups and low rank exceptional groups, and the remaining exceptional groups were handled by Liebeck and Shalev [78]. In both papers, the strategy of the proof is based on an elementary observation. Let M be the set of maximal subgroups of G and let x, y ∈ G be randomly chosen elements. If G 6= hx, yi then x, y ∈ H for some H ∈ M. The probability of this event is |G : H|−2 , so X 1 − P(G, 2) 6 |G : H|−2 =: Q(G). H∈M By carefully studying M, using recent advances in our understanding of the subgroup structure of the simple groups of Lie type (such as Aschbacher’s theorem for classical groups), one shows that Q(G) → 0 as |G| tends to infinity, and the result follows. Note that this probabilistic approach shows that every sufficiently large finite simple group is 2-generated, without the need to explicitly construct a pair of generators. Many interesting related results have been established in more recent years. For example, the following result is [87, Theorem 1.1]. Theorem 3.5. We have P(G, 2) > 53/90 for every finite simple group G, with equality if and only if G = Alt(6). 3.3. Spread. The following 2-generation property was introduced by Brenner and Wiegold [15] in the 1970s. Definition 3.6. Let G be a finite group and let k be a positive integer. Then G has spread at least k if for any non-identity elements x1 , . . . , xk ∈ G there exists y ∈ G such that G = hxi , yi for all i. We say that G is 32 generated if it has spread at least 1. 24 We will also be interested in the more restrictive notion of uniform spread, which was introduced more recently in [16]. Definition 3.7. We say that G has uniform spread at least k if there exists a fixed conjugacy class C of G such that for any non-identity elements x1 , . . . , xk ∈ G there exists y ∈ C such that G = hxi , yi for all i. Clearly, every cyclic group has uniform spread at least k for all k ∈ N, so for the remainder of this discussion let us assume G is non-cyclic. Set s(G) = max{k ∈ N0 : G has spread at least k} u(G) = max{k ∈ N0 : G has uniform spread at least k} (so u(G) = 0 if G does not have uniform spread at least 1, etc.). Note that u(G) 6 s(G) < |G| − 1 and there are examples with u(G) < s(G). For example, if G = Sym(6) then u(G) = 0 and s(G) = 2. Note that G is 3 2 -generated if and only if s(G) > 1. In [15], Brenner and Wiegold study the spread of the simple groups Alt(n) and PSL2 (q). Among other things, they prove that s(Alt(2m)) = 4 if m > 4 and s(PSL2 (q)) = q − 2 if q is even. The following theorem of Breuer, Guralnick and Kantor is the main result on the spread of simple groups (see [16, Corollary 1.3]). Theorem 3.8. Let G be a nonabelian finite simple group. Then u(G) > 2, with equality if and only if (3.1) G ∈ {Alt(5), Alt(6), Ω+ 8 (2), Sp2m (2) (m > 3)}. It turns out that u(G) = s(G) = 2 for each of the groups in (3.1). Remark 3.9. The weaker bound u(G) > 1 was originally obtained by Stein [97], and independently by Guralnick and Kantor [51]. In the latter paper, the authors prove that there is a conjugacy class C of G such that each non-identity element of G generates G with at least 1/10 of the elements in C, and they also establish some related results for almost simple groups. In [16], the constant 1/10 is replaced by 13/42 (for G = Ω+ 8 (2), this is best possible). In fact, with the exception of a known finite list of small groups, plus the family of symplectic groups over F2 , 1/10 can be replaced by 2/3 (see [16, Theorem 1.1]). As explained below, this result is the key ingredient in the proof of Theorem 3.8. We also note that in an earlier paper, Guralnick and Shalev proved that u(G) > 2 for all sufficiently large simple groups G (see [55, Theorem 1.2]). Fixed point ratios play a central role in the proof of Theorem 3.8. Let us explain the connection. Let G be a finite group. For x, y ∈ G, let |{z ∈ y G : G = hx, zi}| |y G | be the probability that x and a randomly chosen conjugate of y generate G. Set Q(x, y) = 1 − P(x, y). P(x, y) = Lemma 3.10. Suppose there exists an element y ∈ G and a positive integer k such that Q(x, y) < 1/k for all 1 6= x ∈ G. Then u(G) > k. 3. GENERATION AND RANDOM GENERATION 25 Proof. Let x1 , . . . , xk ∈ G be non-identity elements and let E denote the event E1 ∩· · ·∩Ek , where Ei is the event that G = hxi , zi for a randomly chosen conjugate z ∈ y G . Let P(E) be the probability that E occurs and let Ē be the complementary event (and similarly for P(Ei ) and Ēi ). We need to show that P(E) > 0. To see this, we note that P(E) = 1 − P(Ē) = 1 − P(Ē1 ∪ · · · ∪ Ēk ) > 1 − k X P(Ēi ) = 1 − i=1 so P(E) > 1 − k · 1 k = 0 and the result follows. k X Q(xi , y) i=1  Let M(y) be the set of maximal subgroups of G containing y. The following result is the main tool in the proof of Theorem 3.8. Corollary 3.11. Suppose there is an element y ∈ G and a positive integer k such that X 1 fpr(x, G/H) < k H∈M(y) for all elements x ∈ G of prime order. Then u(G) > k. Proof. In view of Lemma 3.10, it suffices to show that X Q(x, y) 6 fpr(x, G/H) H∈M(y) for all 1 6= x ∈ G. Fix a non-identity element x ∈ G and let z ∈ y G . Then G 6= hx, zi if and only if hx0 , yi 6 H for some x0 ∈ xG and H ∈ M(y), so we have X Q(x, y) 6 Px (H), H∈M(y) where Px (H) is the probability that a randomly chosen conjugate of x lies in H. Now |xG ∩ H| = fpr(x, G/H) Px (H) = |xG | and the result follows.  The key step in applying Corollary 3.11 is to carefully choose y ∈ G so that it belongs to very few maximal subgroups of G, with the essential extra property that we can explicitly determine the subgroups in M(y), or at least a collection of maximal subgroups containing M(y) that is not too much bigger. This means that there is some flexibility in the approach – the optimal choice of y is not always obvious (in practice, it seems that there are many valid possibilities, but some will require more work than others). Example 3.12. Let’s use this approach to prove that u(Alt(5)) > 2. Set G = Alt(5) and y = (1, 2, 3, 4, 5) ∈ G. The maximal subgroups of G are isomorphic to Sym(3), Alt(4) and D10 , and it is easy to see that M(y) = {K} with K = h(1, 2, 3, 4, 5), (1, 2)(3, 5)i = D10 . 26 We now compute   1/3 |x| = 2 0 |x| = 3 fpr(x, G/H) = fpr(x, G/K) =  1/6 |x| = 5 H∈M(y) X and thus u(G) > 2 by Corollary 3.11. In fact, we have u(G) = 2 (see Theorem 3.8), which shows that the strictness of the inequality in Corollary 3.11 is essential. As an aside, one can check that the class of 3-cycles has the uniform spread 1 property, but not spread 2. Example 3.13. We claim that u(G) > 3 if G = Alt(n) and n > 8 is even (recall the result of Brenner and Wiegold, which states that s(G) = 4). To see this, set n = 2m and k = m − (2, m − 1). Fix y ∈ G with cycle-shape [k, n − k] and note that (k, n − k) = 1. We claim that M(y) consists of a single intransitive subgroup H of type Sym(k) × Sym(n − k). It is clear that H is the only intransitive subgroup in M(y), so assume M ∈ M(y) is transitive. The cycle-shape of y implies that M is primitive, but hyi contains a k-cycle and thus M = G by a classical result of Marggraf (1892), which is a contradiction (Marggraf’s theorem implies that the only primitive groups of degree n containing a cycle of length ` < n/2 are Sym(n) and Alt(n); see [101, Theorem 13.5]). This justifies the claim. It remains to estimate fixed point ratios with respect to the action of G on k-sets. A straightforward combinatorial argument shows that fpr(x) < 1/3 for all x ∈ G of prime order (see the proof of [16, Proposition 6.3]) and the result follows. Remark 3.14. The analysis of odd degree alternating groups is slightly more complicated. In this situation, no elements have precisely two cycles, so one is forced to work with n-cycles, which may belong to several maximal subgroups. Remark 3.15. By a theorem of Guralnick and Shalev [55, Theorem 1.1], if Gi = Alt(ni ) and ni tends to infinity with i, then s(Gi ) tends to infinity if and only if p(ni ) tends to infinity, where p(ni ) is the smallest prime divisor of ni . Let us also comment on the proof of Theorem 3.8 for classical groups, which require the most work. To illustrate some of the main ideas, we will assume that G = PSLn (q) and n > 13 is odd. Following [16], fix a semisimple element y ∈ G preserving a decomposition V = U ⊕ W of the natural module, where dim U = k = (n − 1)/2 and y acts irreducibly on U and W . We claim that M(y) = {GU , GW }, which quickly implies that X 1 fpr(x, G/H) = 2 · fpr(x, G/GU ) < 3 H∈M(y) for all x ∈ G of prime order (note that the actions of G on k-subspaces and (n − k)-subspaces of V are permutation isomorphic and fpr(x, G/GU ) = fpr(x, G/GW ) for all x ∈ G). For example, if q > 8 then fpr(x, G/GU ) 6 1/6 by Theorem 2.6. In particular, we conclude that u(G) > 3. In order to determine the subgroups in M(y), it is very helpful to observe that |y| is divisible by a primitive prime divisor of q n−k − 1 (that is, a prime r such that n − k is the smallest positive integer i such that r divides q i − 1; 3. GENERATION AND RANDOM GENERATION 27 a2 a3 a ab a3 b b a2 b Figure 3.1. The generating graph of D8 = ha, b | a4 = b2 = 1, ab = a−1 i a classical theorem of Zsigmondy (1892) establishes the existence of such primes if n − k > 3 and (n − k, q) 6= (6, 2)). The subgroups of classical groups containing such ppd elements are studied in [53], where the analysis is organised according to Aschbacher’s subgroup structure theorem. The main theorem of [53] severely limits the possible subgroups in M(y), and many of these possibilities can be ruled out by considering the order of y (which is roughly (q n − 1)/(q − 1) since (k, n − k) = 1). We refer the reader to the proof of [16, Proposition 5.23] for the details. 3.4. Generating graphs. The following notion first appeared in a paper by Liebeck and Shalev [80] on random generation. Definition 3.16. Let G be a finite group. The generating graph Γ(G) is a graph on the non-identity elements of G so that two vertices x, y are joined by an edge if and only if G = hx, yi. This graph encodes many interesting generation properties of the group. For example, G is 2-generated ⇐⇒ The edge-set of Γ(G) is non-empty G has spread 1 ⇐⇒ Γ(G) has no isolated vertices G has spread 2 =⇒ Γ(G) is connected with diameter at most 2 Moreover, the interplay between groups and graphs suggests many natural problems. For instance, what is the (co)-clique number and chromatic number of Γ(G)? Does Γ(G) contain a Hamiltonian cycle? In view of Theorem 3.1, it makes sense to study the generating graphs of finite simple groups. Moreover, the fact that simple groups are strongly 2-generated (in the probabilistic sense of Netto and Dixon (see Conjecture 3.4), for example, or in the sense of spread, as in Theorem 3.8) suggests that the corresponding generating graphs should have lots of edges and therefore strong connectivity properties. Example 3.17. If G = Alt(5) then Γ(G) has 59 vertices and one checks that there are 1140 edges. It also has clique number 8, chromatic number 28 9 and coclique number 15 (for example, a maximal coclique is given by the set of 15 elements of order 2). The following result summarises some of the main results on generating graphs for simple groups. Theorem 3.18. Let G be a nonabelian finite simple group and let Γ(G) be its generating graph. (i) Γ(G) has no isolated vertices. (ii) Γ(G) is connected and has diameter 2. (iii) Γ(G) contains a Hamiltonian cycle if |G| is sufficiently large. Proof. Clearly, (ii) implies (i), and (ii) is an immediate corollary of Theorem 3.8. Part (iii) is one of the main results in [17] and we briefly sketch the argument in the case where G is a group of Lie type. The three main ingredients are as follows: (a) By the proof of Dixon’s conjecture, we know that P(G, 2) → 1 as |G| tends to infinity. More precisely, a theorem of Liebeck and Shalev (see [80, Theorem 1.6]) states that there is a positive constant c1 such that c1 P(G, 2) > 1 − m(G) for any nonabelian finite simple group G, where m(G) is the minimal index of a proper subgroup of G. Note that G 6 Sym(m(G)), so m(G) tends to infinity with |G|. (b) Set |G| = m + 1 (so m is odd) and let di be the degree of the i-th vertex of Γ(G), where the vertices are labelled so that di 6 di+1 for all i. By a theorem of Fulman and Guralnick [48], there is a positive constant c2 such that d1 > c2 (m + 1) (the constant c2 is independent of the choice of G). (c) Pósa’s criterion: Γ(G) has a Hamiltonian cycle if dk > k + 1 for all k < m/2 (see [83, Exercise 10.21(b)]). If di > m/2 for all i then Pósa’s criterion immediately implies that Γ(G) has a Hamiltonian cycle, so assume otherwise. Let t be maximal such that dt < m/2 and observe that m X 1 1 2 (m+1) ·P(G, 2) = di < (m−1)t+(m−t)(m+1) < (m+1)2 − (m+1)t. 2 2 i=1 Therefore, applying (a) we get c1 t 1− 6 P(G, 2) 6 1 − m(G) 2(m + 1) and thus 2c1 (m + 1) t6 6 c2 (m + 1) − 1 m(G) if |G| is sufficiently large, where c2 is the constant in (b). It follows that if 1 6 k 6 t then dk > d1 > c2 (m + 1) > t + 1 > k + 1. 3. GENERATION AND RANDOM GENERATION 29 Similarly, if t + 1 6 k < m/2 then dk > (m + 1)/2 > k + 1. Therefore, Pósa’s criterion is satisfied and we conclude that Γ(G) has a Hamiltonian cycle.  Let G be a 2-generated finite group and let N be a nontrivial normal subgroup of G. Observe that if Γ(G) has no isolated vertices, then G/N is cyclic (indeed, if 1 6= x ∈ N and G = hx, yi for some y ∈ G, then G/N = hyN i is cyclic). The following conjecture is a combination (and strengthening) of conjectures in [16, 17]: Conjecture 3.19. Let G be a finite group with |G| > 4. Then the following are equivalent: (i) G has spread 1. (ii) G has spread 2. (iii) Γ(G) has no isolated vertices. (iv) Γ(G) is connected. (v) Γ(G) is connected with diameter at most 2. (vi) Γ(G) contains a Hamiltonian cycle. (vii) G/N is cyclic for every nontrivial normal subgroup N . Remark 3.20. Some comments on the status of this conjecture: (a) Note that any of the first six statements implies (vii). The following implications are also obvious: (i) ⇐⇒ (iii), (ii) =⇒ (v), (vi) =⇒ (iv) =⇒ (iii), (v) =⇒ (iv) =⇒ (iii) (b) By [17, Proposition 1.1], (vi) and (vii) are equivalent for soluble groups. (c) The conjectured equivalence of (i) and (vii) is [16, Conjecture 1.8], and that of (vi) and (vii) is [17, Conjecture 1.6]. Notice that if the conjecture is true, then there is no finite group with spread 1, but not spread 2. Let us focus on the following weaker conjecture of Breuer, Guralnick and Kantor. Conjecture 3.21. Let G be a finite group. Then G has spread 1 if and only if G/N is cyclic for every nontrivial normal subgroup N of G. As noted above, Conjecture 3.21 has been verified for soluble groups. More importantly, Guralnick has recently established the following reduction theorem. Theorem 3.22. It is sufficient to prove Conjecture 3.21 for almost simple groups. In view of this result, we focus our attention on almost simple groups G of the form G = hG0 , xi, where G0 is simple and x ∈ Aut(G0 ). The goal is to prove that G has spread 1 (in fact, we aim for s(G) > 2). This is work in progress: • G0 = Alt(n) or sporadic: s(G) > 2 by results in [16]. 30 • G0 = PSLn (q): s(G) > 2 by the main theorem of [26]. • G0 ∈ {PSpn (q), Ωn (q) (nq odd)}: s(G) > 2 by work of Scott Harper (2016) in his PhD thesis (see [58]). The goal is to use Corollary 3.11 to show that u(G) > 2. To do this, we need to find a suitable element y ∈ G0 x so that we can determine the maximal overgroups M(y) and estimate X fpr(x, G/H) H∈M(y) for all x ∈ G of prime order (to get spread 1, recall that we need to show that this sum is less than 1). The set-up here is complicated by the fact that we have to choose y in the coset G0 x, where x is typically a field or graph automorphism of G0 . The following example illustrates some of the main ideas in the situation where x is a field automorphism. Example 3.23 (Harper). Let G0 = Spn (q), where q = q0e is even, e > 5 and n = 2m with m > 3 odd. Let X = Spn (K) be the ambient simple algebraic group over the algebraic closure K = F̄q and let σ : X → X be a Frobenius morphism such that Xσe = G0 . Set H0 = Xσ = Spn (q0 ) < G0 . Suppose G = hG0 , xi, where x is the restriction of σ to G0 (this is a field automorphism of order e). By the Lang-Steinberg theorem (see [99, Theorem 10.1]), for each sx in the coset G0 x there exists a ∈ X such that s = a−σ a. This allows us to define a map (3.2) f : {G0 -classes in G0 x} → {H0 -classes in H0 } by sending (sx)G0 to (a(sx)e a−1 )H0 . One checks that f is well-defined and bijective (this map is sometimes called the Shintani correspondence). One can also show that f has nice fixed point properties for suitable actions of G and H0 (see [26, Theorem 2.14], for example). The strategy is to choose an element z ∈ H0 so that the maximal overgroups of z in H0 are somewhat restricted; hopefully this will allow us to control the maximal subgroups of G containing a representative y ∈ G0 x of the corresponding G0 -class in the coset G0 x. To do this, we take a semisimple element of the form z = [A, B] ∈ H0 , where A ∈ Sp2 (q0 ) and B ∈ Spn−2 (q0 ) are irreducible (so z preserves an orthogonal decomposition V0 = U ⊥ W of the natural module V0 for H0 , with dim U = 2). Fix an element y ∈ G0 x such that f (y G0 ) = z H0 . We need to determine the maximal subgroups of G containing y. To do this, it is helpful to observe that (|A|, |B|) = 1 so ν(y ` ) = 2 for some positive integer `. This quickly rules out maximal subgroups in the collections C3 , C4 and C7 , and [54, Theorem 7.1] (cf. Theorem 2.18) can be used to further restrict the possibilities for H. By exploiting some additional properties of the bijection in (3.2) one can show that there is a unique reducible subgroup in M(y) (of type Sp2 (q) × Spn−2 (q)) and also a unique C8 -subgroup of type O± n (q). By carefully studying the subgroups in C2 ∪C5 , and by applying the fixed point ratio bounds in Theorems 2.6 and 2.16, one can show that X fpr(x, G/H) < α H∈M(y) 4. MONODROMY GROUPS 31 for all x ∈ G of prime order, where  (4q + 4)1/2−1/2m 4  α = 2· + 1 + 2(m−1,e) + (log(e) + 1)(q0 + 1)(q0m−1 + 1) · 3q q m−1 Now q > 32 since q = q0e with e > 5, and it is straightforward to show that α < 1/3. Therefore u(G) > 3 by Corollary 3.11. 4. Monodromy groups In this section we turn to an application of fixed point ratios in the study of coverings of Riemann surfaces, focussing on the solution to Problem B stated in the introduction. 4.1. Preliminaries. Let X be a compact connected Riemann surface of genus g > 0 and let Y = P1 (C) be the Riemann sphere. Let f : X → Y be a branched covering of degree n. This means that f is a meromorphic function with a finite set of branch points B = {y1 , . . . , yk } ⊂ Y (with k > 2) such that the restriction of f to X 0 = X \ f −1 (B) is a covering map of degree n (that is, |f −1 (y)| = n for all y ∈ Y 0 = Y \ B, so generically f is an “n-to-1” mapping). Fix y0 ∈ Y 0 and let Ω = f −1 (y0 ) = {x1 , . . . , xn } be the fibre of y0 . Let γ be a loop in Y 0 based at y0 . For each xi ∈ Ω, we can lift γ via f to a path γ̃i in X beginning at xi . The endpoint γ̃i (1) is also in Ω and the corresponding map σγ : xi 7→ γ̃i (1) is a permutation of Ω, which is independent of the homotopy type of γ. In this way, we obtain a homomorphism ϕ : π1 (Y 0 , y0 ) → Sym(Ω), [γ] 7→ σγ from the fundamental group of Y 0 with base point y0 . The image of this map is a permutation group of degree n. Moreover, the path connectedness of Y 0 implies that the group we obtain in this way is independent of the choice of base point y0 ∈ Y 0 , up to permutation isomorphism. This allows us to make the following definition. Definition 4.1. The monodromy group Mon(X, f ) of f is defined to be the image of ϕ. Since X has genus g, we refer to Mon(X, f ) as a monodromy group of genus g. The connectedness of X implies that Mon(X, f ) is a transitive permutation group. Example 4.2. Let n > 2 be an integer and consider the map f : X → Y given by f (z) = z n , where X = Y = P1 (C). This is a branched covering of degree n with branch points B = {0, ∞} and Ω = f −1 (1) = {e2πik/n : k = 0, 1, . . . , n − 1}. Here the monodromy group is cyclic of order n, generated by the permutation α 7→ ζα of Ω, with ζ = e2πi/n . There is a natural generating set {γ1 , . . . , γk } for π1 (Y 0 , y0 ), where γi is a loop that encircles the i-th branch point yi (and no other branch point) with the property that the γi only meet at y0 . Moreover, by relabelling if necessary, one can show that the product γ1 · · · γk is homotopy equivalent 32 to the trivial loop based at y0 , so γ1 · · · γk = 1 and by a theorem of Hurwitz (1891) we have π1 (Y 0 , y0 ) = hγ1 , . . . , γk | γ1 · · · γk = 1i. This implies that Mon(X, f ) = hσ1 , . . . , σk i and σ1 · · · σk = 1, where σi = σγi as above. Question. Which transitive permutation groups G 6 Sym(Ω) of degree n occur as the monodromy group of a branched covering f : X → P1 (C) of genus g and degree n? A necessary and sufficient condition is provided by the Riemann Existence Theorem below (see [100] for a modern treatment). In the statement, recall that ind(x) = n − t is the index of a permutation x ∈ Sym(Ω), where t is the number of cycles of x on Ω. Equivalently, ind(x) is the minimal ` such that x is a product of ` transpositions. P Note that if x1 , . . . , xk are permutations of Ω with x1 · · · xk = 1, then i ind(xi ) is even. Theorem 4.3 (Riemann Existence Theorem). Let G 6 Sym(Ω) be a transitive group of degree n. Then G is isomorphic to a monodromy group Mon(X, f ) for some compact connected Riemann surface X of genus g and branched covering f : X → P1 (C) if and only if G has a generating set {g1 , . . . , gk } such that g1 · · · gk = 1 and (4.1) k X ind(gi ) = 2(n + g − 1). i=1 This fundamental result allows us to translate questions about monodromy groups to purely group-theoretic problems concerning finite permutation groups. One of the main problems is to understand the structure of monodromy groups of genus g, specifically in terms of the composition factors of such groups. This is formalised in a highly influential conjecture of Guralnick and Thompson from 1990 [56], which we will discuss below. Remark 4.4. There is a well understood connection between branched covers of P1 (C) and finite extensions of the field C(t). More precisely, if f : X → P1 (C) is a branched covering then C(X)/C(t) is a finite extension, where C(X) and C(t) denote the function fields of X and P1 (C), respectively. It turns out that the Galois group of the normal closure of this extension is the monodromy group Mon(X, f ). Therefore, Theorem 4.3 can be interpreted in terms of the inverse Galois problem. In particular, this viewpoint permits natural generalisations in which C is replaced by some other algebraically closed field (of any characteristic). We will return to this more general set-up at the end of the section. 4.2. The Guralnick-Thompson conjecture. Motivated by the discussion above, we define the genus of a finite group as follows. Definition 4.5. Let G 6 Sym(Ω) be a finite transitive permutation group and let E = {g1 , . . . , gk } be a generating set for G with g1 · · · gk = 1. Define the genus g = g(G, Ω, E) as in (4.1) and define g(G, Ω) to be the minimal value of g(G, Ω, E) over all such generating sets E (for any k). We 4. MONODROMY GROUPS 33 say that a finite group G has genus g if it has a faithful transitive G-set Ω such that g(G, Ω) 6 g. Example 4.6. Let G = hg1 i be a cyclic group of order n. Set E = {g1 , g1−1 } and consider the regular action of G on itself. Then ind(g1 ) = ind(g1−1 ) = n − 1, so (4.1) implies that G has genus zero. Example 4.7. Let G = Sym(n) = hg1 , g2 , g2−1 g1−1 i, where g1 = (1, 2) and g2 = (1, 2, . . . , n), and consider the natural action of G of degree n. The indices of the respective generators are 1, n − 1 and n − 2, hence G has genus zero. Similarly, every alternating group has genus 0. Fix a non-negative integer g and let C(g) be the set of composition factors of groups of genus g. Note that C(0) ⊆ C(g). In view of the above examples, it follows that C(g) contains every simple cyclic and alternating group. Therefore we focus on E(g), which is the set of nonabelian, nonalternating composition factors of groups of genus g. The following theorem establishes a conjecture of Guralnick and Thompson [56], which we stated as Problem B in the introduction. Theorem 4.8. E(g) is finite for each g. Sketch proof. We briefly sketch the main steps, highlighting the central role played by fixed point ratios. Step 1. Reduction to almost simple primitive groups. By work of Aschbacher, Guralnick, Neubauer, Thompson and others [3, 49, 56, 89], it is sufficient to show that there are only finitely many primitive almost simple groups of Lie type of genus g. The key ingredient in this highly nontrivial reduction is the Aschbacher-O’Nan-Scott theorem (as formulated in [5]) on the structure of finite groups with a core-free maximal subgroup. See [49, Section 5] for more details. Step 2. Fixed point ratio estimates. The next result provides the connection to fixed point ratios (see [49, Corollary 2]). Proposition 4.9. Let X be the set of nonabelian, non-alternating finite simple groups such that (4.2) max fpr(x, Ω) 6 16=x∈G 1 86 for every almost simple primitive group G 6 Sym(Ω) with socle G0 ∈ X . Then X ∩ E(g) is finite for every non-negative integer g. Proof. Let G 6 Sym(Ω) be a primitive almost simple group of degree n with socle G0 ∈ X , so (4.2) holds. Fix a generating set {g1 , . . . , gk } for G such that g1 · · · gk = 1 and define g as in (4.1). Note that k > 3. Let di be the order of gi and let orb(gi ) be the number of cycles of gi on Ω. Without loss of generality, we may assume that di 6 di+1 for all i. 34 By the orbit-counting lemma we have  X n n orb(gi ) = fpr(x, Ω) = 1 + di di x∈hgi i  X fpr(x, Ω) 16=x∈hgi i and thus k X ind(gi ) = i=1 k X i=1 k 85 X di − 1 . (n − orb(gi )) > n 86 di i=1 Since G is insoluble and G 6∼ = Alt(5), [56, Proposition 2.4] implies that k X di − 1 (4.3) i=1 di > 85 . 42 (Note that equality holds if and only if k = 3 and (d1 , d2 , d3 ) = (2, 3, 7), so G is a Hurwitz group, such as PSL2 (7).) Therefore 2(n + g − 1) = k X ind(gi ) > i=1 85 85 · n 86 42 and thus n 6 7224(g − 1). The result follows.  Step 3. Bounded rank. We combine Proposition 4.9 with Theorem 2.6, noting that 4/3q 6 1/86 when q > 113 (the almost simple groups with socle PSL2 (q) excluded in Theorem 2.6 can be handled separately). Therefore, to complete the proof of the theorem we may assume that G is an almost simple classical group of large rank (in other words, we may assume that the dimension of the natural module of the socle of G is arbitrarily large). Step 4. Classical groups in non-subspace actions. Let G 6 Sym(Ω) be an almost simple primitive group over Fq with socle G0 in a non-subspace action (see Definition 2.9). Let m be the dimension of the natural module for G0 . By Theorem 2.15 there is a constant δ > 0 such that max fpr(x) < q −δm , 16=x∈G so there are at most finitely many groups G with max16=x∈G fpr(x) > 1/86. Now apply Proposition 4.9. Step 5. Classical groups in subspace actions. To complete the proof it remains to handle the subspace actions of classical groups. It is sufficient to prove the following result (see [45]). Proposition 4.10. Fix a prime power q and non-negative integer g. Then there exists a constant N = N (q) such that if G 6 Sym(Ω) is any primitive almost simple classical group over Fq in a subspace action of genus g then either m 6 N or n 6 2000g, where m is the dimension of the natural module and n is the degree of G. 4. MONODROMY GROUPS 35 In other words, if the dimension of the natural module V is large enough, then the degree of G is bounded above by a (linear) function of g and the result follows. The key tool is Theorem 2.13 – the details are rather technical, so we only provide a rough outline of the argument. Let G = hg1 , . . . , gk i be a generating set such that g1 · · · gk = 1 and (4.1) holds. Let di be the order of gi and label the gi so that di 6 di+1 for all i. Let ϕ be Euler’s function and set ν(d) = min{ν(x) : x ∈ G, |x| = d}, 1X ϕ(a)q −ν(a) α0 (d) = 1 − d a|d for each natural number d. Note that α0 (d) > 1/4 if d > 2. Set k α(gi ) = X ind(gi ) , σ= α(gi ) n i=1 and observe that it suffices to show that σ > 2.001 if m is sufficiently large (where m is the dimension of the natural module). We may assume that m is large enough so that Theorem 2.13 gives fpr(x) < q −ν(x) + 10−3 for all 1 6= x ∈ G ∩ PGL(V ). Then   di di X j 1 1 X fpr(gij ) > 1 −  q −ν(|gi |)  − 10−3 α(gi ) = 1 − di di j=1 j=1   1 X =1− ϕ(a)q −ν(a)  − 10−3 di a|di = α0 (di ) − 10−3 which is at least 0.249, whence σ > 0.249k. Therefore, we may assume that k 6 8. With further work it is possible to reduce to the minimal case k = 3, where the final analysis splits into several subcases according to the values of d1 , d2 and d3 . It is worth noting that an important tool in the latter reduction is the fact that k X ν(gi ) > 2m, i=1 which follows from a well known theorem of Scott [93].  4.3. Genus zero groups. It remains an open problem to explicitly determine the simple groups in E(g), although there has been some significant recent progress in the low genus cases, and in particular the special case g = 0. For example, the sporadic groups in E(0) have been determined by Magaard [85]; the examples are as follows: M11 , M12 , M22 , M23 , M24 , J1 , J2 , Co3 , HS. 36 By work of Frohardt and Magaard [42, 43], the only exceptional groups in E(0) are 2 B2 (8), G2 (2)0 ∼ = PSU3 (3) and 2 G2 (3)0 ∼ = PSL2 (8). The relevant groups of the form PSL2 (q) and PSU3 (q) are determined in [40]: PSL2 (q) : q ∈ {7, 8, 11, 13, 16, 17, 19, 25, 27, 29, 31, 32, 37, 41, 43, 64} PSU3 (q) : q ∈ {3, 4, 5} There is work in progress by Frohardt, Guralnick, Hoffman and Magaard to extend the results in [40] to higher rank classical groups, leading to a complete classification of all primitive permutation groups of genus zero. In fact, the ultimate aim is to determine the primitive groups of genus at most two, building on earlier work in [41]. It is anticipated that these results will have interesting number-theoretic applications. At a conference in July 2016 (Algebraic Combinatorics and Group Actions, Herstmonceux Castle, UK), Frohardt announced that the groups in E(0) have been determined. The complete list is as follows: PSL2 (q), 7 6 q 6 43, q 6= 9, 23 PSL2 (64) PSL3 (q), q ∈ {3, 4, 5, 7} PSL4 (3), PSL4 (4), PSL5 (2), PSL5 (3), PSL6 (2) PSU3 (3), PSU3 (4), PSU3 (5) PSp4 (3), PSp4 (4), PSp4 (5) PSp6 (2), PSp8 (2) − PΩ+ 8 (2), PΩ8 (2) 2 B (8) 2 M11 , M12 , M22 , M23 , M24 , J1 , J2 , Co3 , HS Example 4.11. Notice that G = PSL2 (23) 6∈ E(0). To see that G does not have a primitive genus zero action, first observe that G has five conjugacy classes of maximal subgroups, represented by Z23 :Z11 , D24 , D22 , Sym(4) (two classes). Fix a maximal subgroup M and set n = |G : M |. As recorded in the following table, it is straightforward to compute ind(x) for each non-identity x ∈ G (with respect to the action of G on G/M ): M n 2n − 2 |x| = 2 3 4 6 11 12 23 Z23 :Z11 24 46 12 16 18 20 20 22 22 D24 253 504 120 168 186 208 230 230 242 D22 276 550 132 184 208 238 250 252 264 Sym(4) 253 504 122 166 186 208 230 230 242 Seeking a contradiction, suppose that G = hg1 , . . . , gk i with g1 · · · gk = 1 P and i ind(gi ) = 2n − 2. As before, let di denote the order of gi and assume di 6 di+1 for all i. Suppose M is the Borel subgroup Z23 :Z11 , so 2n − 2 = 46. From the above table, it follows that k = 3, d1 = 2 and d2 ∈ {2, 3}. If d2 = 2 then P (d − 1)/di < 2, which contradicts the bound in (4.3). Therefore, d2 = 3 i i 5. BASES 37 and a second application of (4.3) forces d3 > 11. But this implies that k X ind(gi ) > 12 + 16 + 20 > 46, i=1 which is a contradiction. The other cases are similar. 4.4. Generalisations. As noted in Remark 4.4, there are natural generalisations to other fields. Let k be an algebraically closed field of characteristic p > 0 and let f : X → Y be a finite separable cover of smooth projective curves over k. Let G be the corresponding monodromy group, which is the Galois group of the normal closure of the extension k(X)/k(Y ) of function fields. As for p = 0, in positive characteristic we can seek restrictions on the structure of G according to the genus of X. There is still a translation of the problem to group theory, but the set-up is much more complicated. For example, there is no known analogue of Riemann’s Existence Theorem and further complications arise if the given cover f is wildly ramified (the proof of the Guralnick-Thompson conjecture goes through essentially unchanged in the tamely ramified case). The following conjecture of Guralnick is the positive characteristic analogue of the Guralnick-Thompson conjecture (see [50, Conjecture 1.6]). In order to state the conjecture, let p be a prime and let S be a nonabelian simple group. We say that S has genus g (in characteristic p) if S is a composition factor of the monodromy group of a finite separable cover f : X → Y of smooth projective curves over an algebraically closed field of characteristic p with X of genus at most g. Conjecture 4.12. Let g > 0 be an integer and let Ep (g) be the set of nonabelian non-alternating simple groups of genus g in characteristic p > 0. Then   [ Ep (g) ∩  Lie(r) r6=p is finite, where Lie(r) is the set of finite simple groups of Lie type in characteristic r. The condition r 6= p in the conjecture is necessary. For example, work of Abhyankar (see [1] and the references therein) shows that Ep (0) contains every simple classical group in characteristic p. Guralnick’s conjecture is still open in its full generality, and we refer the reader to the survey article [50] for further details. Here it is worth highlighting [50, Theorem 1.5], which shows that the conjecture holds if we replace Lie(r) by the set of finite simple groups of Lie type in characteristic r of bounded dimension. 5. Bases In this final section we introduce the classical notion of a base for a permutation group and we discuss how probabilistic methods, based on fixed point ratio estimates, have been used to establish strong results on the minimal size of bases for simple groups. In particular, we will sketch a solution to Problem C in the introduction. 38 5.1. Preliminaries. We begin by defining the base size of a permutation group. Definition 5.1. Let T G 6 Sym(Ω) be a permutation group. A subset B of Ω is a base for G if α∈B Gα = 1. The base size of G, denoted by b(G), is the minimal cardinality of a base. Examples 5.2. 1. b(G) = 1 if and only if G has a regular orbit on Ω. 2. b(G) = n − 1 for the natural action of G = Sym(n) on Ω = {1, . . . , n}. 3. b(G) = dim V for the natural action of G = GL(V ) on Ω = V . 4. b(G) = dim V + 1 for the action of G = PGL(V ) on the set of 1-dimensional subspaces of V . Remark 5.3. Bases arise naturally in several different contexts: a. Abstract group theory. Let G be a finite group and let H be a corefree subgroup, so we may view G as a permutation group on Ω = G/H. In T this xcontext, b(G) is the size of the smallest subset S ⊆ G such that x∈S H = 1. b. Permutation group theory. Let G be a permutation group of degree n and let B be a base for G. If x, y ∈ G then \ αx = αy for all α ∈ B ⇐⇒ xy −1 ∈ Gα ⇐⇒ x = y α∈B n|B| . and thus |G| 6 In this way, (upper) bounds on b(G) can be used to bound the order of G. c. Computational group theory. The concept of a base and strong generating set was introduced by Sims [96] in the early 1970s, and it plays a fundamental role in the computational study of finite permutation groups (e.g. for computing the order of the group, and testing membership). See [95, Section 4] for more details. d. Graph theory. Let Γ be a graph with vertices V and automorphism group G = Aut(Γ) 6 Sym(V ). Then b(G) = the fixing number of Γ = the determining number of Γ = the rigidity index of Γ is a well-studied graph invariant. See the survey article by Bailey and Cameron [9] for further details. Let G be a permutation group of degree n. In general, it is very difficult to compute b(G) precisely (indeed, algorithmically, this is known to be an NP-hard problem; see [10]), so we focus on bounds, and in particular upper bounds in view of applications. It is easy to see that log |G| 6 b(G) 6 log2 |G| (5.1) log n 5. BASES 39 and it is straightforward to construct transitive groups G such that b(G) is at either end of this range. A well known conjecture of Pyber [92] from the early 1990s asserts that the situation for primitive groups is rather more restrictive, in the sense that there is an absolute constant c such that log |G| b(G) 6 c log n for any primitive group G of degree n. This conjecture has very recently been proved by Duyan, Halasi and Maróti [39], building on the earlier work of many authors. The following lemma reveals a connection between the base size and the minimal degree of a transitive group (cf. Section 2.2). Lemma 5.4. Let G 6 Sym(Ω) be a transitive group of degree n. Then b(G)µ(G) > n. Proof. Let B be a base of minimal size and let S be the support of an element 1 6= g ∈ G of minimal degree. If B x ∩ S = ∅ for some x ∈ G, then B x ⊆ Ω \ S, so g fixes every element of B x , but this is not possible since B x is a base. Therefore |B x ∩ S| > 1 for all x ∈ G. Next we claim that |{x ∈ G : α ∈ B x }| = |B||G|/n for all α ∈ Ω. Consider α1 ∈ B. Fix y ∈ G such that αy = α1 . Then {x ∈ G : α = α1x } = {x ∈ G : α = αyx } = {x ∈ G : yx ∈ Gα } = y −1 Gα , so |{x ∈ G : α ∈ B x }| = |B||Gα | = |B||G|/n as claimed. We conclude that X X |G| 6 |B x ∩ S| = |{x ∈ G : α ∈ B x }| = |S||B||G|/n x∈G α∈S and thus µ(G)b(G) = |S||B| > n.  Let G 6 Sym(Ω) be a primitive group of degree n. Since b(Sym(n)) = n − 1, b(Alt(n)) = n − 2 we will assume that G 6= Alt(n), Sym(n). Determining upper bounds on b(G) in terms of n is an old problem. We record some results: • Bochert [11], 1889: b(G) 6 n/2 √ • Babai [7], 1981: b(G) 6 c n log n for some constant c (independent of CFSG) √ • Liebeck [72], 1984: b(G) 6 c n (using CFSG) Remark 5.5. It is easy to see that Liebeck’s bound is best possible. For example, if G = Sym(m) and Ω is the√set of 2-element subsets of {1, . . . , m}, 2 then n = m 2 and b(G) ∼ 3 m = O( n). For instance, if m ≡ 1 (mod 12) then {{1, 2}, {2, 3}, {4, 5}, {5, 6}, . . . , {m − 3, m − 2}, {m − 2, m − 1}} is a base of size 2(m − 1)/3 (this is optimal). Stronger bounds are attainable if we focus on specific families of primitive groups. For instance, a striking theorem of Seress [94] states that b(G) 6 4 if G is soluble. For the remainder we will focus on almost simple primitive groups. 40 5.2. Simple groups and probabilistic methods. Let G 6 Sym(Ω) be a primitive almost simple group of degree n, with socle G0 and point stabiliser H. In studying the base size of such groups, it is natural to make a distinction between standard and non-standard groups, according to the following definition (see Definition 2.9 for the notion of a subspace action of a classical group). Definition 5.6. We say that G is standard if one of the following holds: (i) G0 = Alt(m) and Ω is an orbit of subsets or partitions of {1, . . . , m}; (ii) G is a classical group in a subspace action. Otherwise, G is non-standard. (Note that we will only use the terms standard and non-standard in the context of a primitive group.) In general, if G is standard then H is “large” in the sense that |G| is not bounded above by a polynomial in n = |G : H| of fixed degree. For example, if we take the standard action of G = PGLm (q) on 1-spaces then 2 |G| ∼ q m −1 and n ∼ q m−1 . In view of (5.1), this implies that the base size of such a standard group can be arbitrarily large (indeed, we already noted that b(G) = m + 1 for the given action of PGLm (q)). Now assume G is non-standard. By a theorem of Cameron, there is an absolute constant c such that |G| 6 nc for any such group G. In later work, Liebeck [72] showed that c = 9 is sufficient, and this was extended by Liebeck and Saxl [76] to give the following. Theorem 5.7. Let G be a non-standard group of degree n. Then either |G| 6 n5 , or (G, n) = (M23 , 23) or (M24 , 24). This result suggests that non-standard groups may admit small bases. Indeed, the following striking theorem of Liebeck and Shalev [81] shows that this is true in a very strong sense. The proof uses probabilistic methods based on fixed point ratio estimates. Theorem 5.8. There is an absolute constant c such that if G 6 Sym(Ω) is a non-standard permutation group then the probability that a randomly chosen c-tuple in Ω is a base for G tends to 1 as |G| tends to infinity. Remark 5.9. This asymptotic result was conjectured by Cameron and Kantor [33], and they showed that it holds for alternating and symmetric groups with the best possible constant c = 2. Let us explain the connection between fixed point ratios and base sizes. Let c be a positive integer and let Q(G, c) be the probability that a randomly chosen c-tuple of points in Ω is not a base for G, so b(G) 6 c ⇐⇒ Q(G, c) < 1. Observe that a c-tuple in Ω fails to be a base if and only if it is fixed by an element x ∈ G of prime order, and note that the probability that a randomly chosen c-tuple is fixed by x is equal to fpr(x)c . Let P be the set of elements of prime order in G, and let x1 , . . . , xk represent the G-classes in P. Then (5.2) Q(G, c) 6 X x∈P fpr(x)c = k X i=1 c b |xG i | · fpr(xi ) =: Q(G, c). 5. BASES 41 We have thus established the following key lemma, which allows us to exploit upper bounds on fixed point ratios to bound the base size. b Lemma 5.10. If Q(G, c) < 1 then b(G) 6 c. Sketch proof of Theorem 5.8. Let G0 denote the socle of G. In view of the work of Cameron and Kantor in [33], we may assume that G0 is a group of Lie type over Fq . First we claim that b(G) 6 500 if G0 is an exceptional group. To see this, we apply Theorem 2.6, which states that 4 fpr(x) 6 3q for all non-identity elements x ∈ G. Now |G| 6 |Aut(E8 (q))| < q 249 , so  500 X  500 k 4 4 G b |G| Q(G, 500) 6 Q(G, 500) 6 |xi | < 3q 3q i=1 q −1 q 249 . which is at most since |G| < The claim follows. Similarly, if G0 is a non-standard classical group of rank r, then the same argument yields b(G) 6 c(r) (with Q(G, c(r)) → 0 as q tends to infinity). The key tool to handle the remaining non-standard classical groups of arbitrarily large rank is Theorem 2.15, which states that there is a constant  > 0 such that fpr(x) < |xG |− (5.3) for all x ∈ G of prime order (recall that the non-standard hypothesis is essential). Let m be the dimension of the natural module for G0 . We need two facts: 1. G has at most q 4m conjugacy classes of elements of prime order (for example, this follows from [74, Theorem 1]); and 2. |xG | > q m/2 for all x ∈ G of prime order. Set c = d11/e. Then b Q(G, c) = k X i=1 c |xG i | · fpr(xi ) < k X −10 |xG 6 k · (q m/2 )−10 6 q −m i | i=1 and thus Q(G, c) tends to 0 as |G| tends to infinity, as required.  5.3. Further results. As the above sketch proof indicates, the constant c in Theorem 5.8 depends on the constant  in (5.3), and is therefore undetermined. However, by applying the stronger fixed point ratio estimates in [19, 20, 21, 22] and [71], it is possible to show that c = 6 is optimal. Indeed, the following result, which is proved in the sequence of papers [23, 27, 30, 31], reveals a striking dichotomy for almost simple primitive groups: either the base size can be arbitrarily large (standard groups), or there exists an extremely small base (non-standard groups). This solves Problem B as stated in the introduction. Theorem 5.11. Let G 6 Sym(Ω) be a non-standard permutation group. Then b(G) 6 7, with equality if and only if G = M24 in its natural action 42 on 24 points. Moreover, the probability that a random 6-tuple in Ω forms a base for G tends to 1 as |G| tends to infinity. Example 5.12. To illustrate the proof of Theorem 5.11 for exceptional groups, let us briefly sketch an argument to show that b(G) 6 5 for G = E8 (q). b First assume H is small, say |H| 6 q 88 , and write Q(G, 5) = α + β where α is the contribution to the summation from elements x ∈ G with |xG | 6 12 q 112 . Observe that    5 1 112 2|H| 5 1 112 2q 88 6 q = 16q −8 . β< q 2 q 112 2 q 112 Suppose x ∈ G has prime order and |xG | 6 12 q 112 . The sizes of the conjugacy classes of elements of prime order in G are available in the literature and by inspection we see that x is unipotent of type A1 or 2A1 (in terms of the standard Bala-Carter labelling of unipotent classes). There are fewer than 2q 92 such elements in G, and [71, Theorem 2] implies that fpr(x) 6 2q −24 , hence α < 2q 92 (2q −24 )5 = 64q −28 and the result follows. To complete the analysis, we may assume |H| > q 88 . As discussed in Section 2.8, if H is a maximal parabolic subgroup then it is possible to compute very accurate fixed point ratio estimates using character-theoretic methods (recall that for unipotent elements, this relies on Lübeck’s work on Green functions for exceptional groups). This allows us to obtain strong upper bounds on b(G) for parabolic actions. Moreover, when combined with the trivial lower bound b(G) > log |G|/ log |Ω|, we get the exact base size in all but one case (here Pi denotes the maximal parabolic subgroup of G corresponding to the i-th node in the Dynkin diagram of G with respect to the standard Bourbaki [13] labelling): P1 P2 P3 P4 P5 P6 P7 P8 H b(G) 4 3 3 3 3 3 3 or 4 5 Note that log |G|/ log |Ω| = 3 − o(1) when H = P7 , so we expect b(G) = 4 is the correct answer in this case. Finally, let us assume |H| > q 88 and H is non-parabolic. By applying a fundamental subgroup structure theorem of Liebeck and Seitz (see [77, Theorem 8]), we deduce that H is of type D8 (q), E7 (q)A1 (q) or E8 (q0 ) with q = q02 . Let us assume H is of type D8 (q); the other cases are similar. Let K be the algebraic closure of Fq and set Ḡ = E8 (K) and H̄ = D8 (K), so we may view G as Ḡσ , and similarly H as H̄σ , for a suitable Frobenius b morphism σ of Ḡ. Write Q(G, 5) = α + β, where α is the contribution from semisimple elements. Let x ∈ G be a semisimple element of prime order. By applying [71, Lemma 4.5], we have   |W (Ḡ):W (H̄)| · 2(q + 1)8 q + 1 8 −δ(x) fpr(x) 6 = 270 q , q−1 q δ(x) (q − 1)8 5. BASES 43 where W (X̄) is the Weyl group of X̄ and δ(x) = dim xḠ − dim(xḠ ∩ H̄). If CḠ (x)0 is not of type D8 , E7 T1 nor E7 A1 , then [70, Theorem 2] implies that δ(x) > 80 and we deduce that fpr(x) < q −59 . Therefore, if α1 denotes the contribution to α from these elements then α1 < |G| · (q −59 )5 < q 248 · q −295 = q −47 . There are fewer than q 130 remaining semisimple elements in G and by applying [71, Theorem 2] we deduce that their contribution is less than q 130 · (q −37 )5 = q −55 . In particular, α < q −47 + q −55 is tiny. For unipotent elements there is a distinction between the cases q even and q odd (recall that we are only interested in elements of prime order). In any case, the fusion in Ḡ of unipotent classes in H̄ has been determined by Lawther [69] and using these results it is straightforward to show that β is also small (and tends to zero as q tends to infinity). See the proof of [30, Lemma 4.5] for the details. For classical groups, Theorem 2.16 is the key ingredient in the proof of Theorem 5.11, which roughly states that  ∼ 1/2 is optimal in (5.3). In order to use it, let m be the dimension of the natural module for G0 and set ηG (t) = k X −t |xG i | i=1 for t ∈ R, where x1 , . . . , xk represent the G-classes of elements of prime order in G. If m > 6, then careful calculation reveals that ηG (1/3) < 1. Therefore, by combining this with the generic upper bound fpr(x) < |xG |−1/2+1/m from Theorem 2.16, we deduce that b Q(G, 4) < k X 1 1 1+4(− 2 + m ) |xG 6 ηG (1/3) < 1 i | i=1 if m > 6, and thus b(G) 6 4. In this way, we can establish the following sharpened version of Theorem 5.11 for classical groups (see [23, Theorem 1]). Theorem 5.13. Let G be a non-standard classical group with point stabiliser H. Then b(G) 6 5, with equality if and only if G = PSU6 (2).2 and H = PSU4 (3).22 . Moreover, the probability that a random 4-tuple in Ω forms a base for G tends to 1 as |G| tends to infinity. The problem of determining the precise base size of every non-standard group is an ongoing project of the author with Guralnick and Saxl. We finish by reporting on some recent work towards this goal. 5.3.1. Alternating and sporadic groups. If G0 is a (non-standard) alternating or sporadic group, then b(G) has been calculated in all cases. For example, if G0 = Alt(n) then [27, Theorem 1.1] implies that b(G) = 2 if n > 12 (if G = Alt(12) and H = M12 , then b(G) = 3). Similarly, if G = M 44 is the Monster sporadic group, then b(G) = 2 unless H = 2.B, in which case b(G) = 3 (see [31]). To handle the symmetric and alternating groups, we first observe that H is a primitive subgroup (this follows from the non-standard hypothesis), so we can use a well known result of Maróti [86] to bound |H| from above. This is combined with Theorem 2.3 on the minimal degree of H, which tells us that either µ(H) > n/2, or H is a product-type group arising from the action of a symmetric group on k-sets. The latter situation can be handled directly, whereas in the general case we translate the bound on µ(H) into a lower bound on |xG | for all x ∈ H of prime order. This is useful because b Q(G, 2) < |H|2 max |xG |−1 . 16=x∈H The proof for sporadic groups relies heavily on computational methods, together with detailed information on their conjugacy classes, irreducible characters and subgroup structure that is available in GAP [47]. Further work is needed to handle the Baby Monster and the Monster (see [31, 90] for more details). As an aside, it is worth noting that determining the exact base size for the standard groups with an alternating socle is a difficult combinatorial problem. Indeed, this is an open problem, even for the action of Sym(n) on k-sets. See [57] for the best known results in this particular case. 5.3.2. Classical groups. Suppose G0 is a classical group, so H is either geometric or non-geometric. In [28], probabilistic methods are used to determine the precise base size of all non-geometric actions of classical groups. Here the key ingredient is Theorem 2.18, combined with a detailed analysis of the low-dimensional irreducible representations of quasisimple groups. As discussed in Section 2.7, the lower bound on ν(x) in part (ii) of Theorem 2.18 yields a lower bound on |xG |, so our approach is somewhat similar to the one we used for symmetric and alternating groups (although the details are more complicated in this situation). The following result is a simplified version of [28, Theorem 1]. Theorem 5.14. Let G 6 Sym(Ω) be a non-standard classical group with socle G0 and point stabiliser H ∈ S. Assume n > 8, where n is the dimension of the natural module for G0 . Then one of the following holds: (i) b(G) = 2; − (ii) b(G) = 3 and (G, H) = (O+ 14 (2), Sym(16)), (O12 (2), Sym(13)), − − (Ω12 (2), Alt(13)) or (Ω10 (2), Alt(12)); (iii) b(G) = 4 and (G, H) = (O− 10 (2), Sym(12)). The analysis of the geometric actions of classical groups is more difficult, and so far we only have partial results. For example, we can show that b(G) = 2 if H is a subfield subgroup corresponding to a subfield of Fq of odd prime index. The analysis in some cases is rather delicate; for example, it can be difficult to decide if b(G) = 2 or 3. This sort of situation tends to arise when |H| ∼ |G|1/2 , which often corresponds to a case where H is the centraliser in G of an involution (at least when q is odd). We anticipate that 5. BASES 45 our recent work in [29] on base sizes for primitive actions of simple algebraic groups will play a role in this analysis. 5.3.3. Non-standard groups with large base size. The proof of Theorem 5.11 reveals that there are infinitely many exceptional groups with b(G) > 5. In fact, it has recently been shown that there are infinitely many with b(G) = 6 (see [29, Theorem 11]) and with some additional work it is possible to determine them all (see [24]). Theorem 5.15. Let G 6 Sym(Ω) be a non-standard permutation group with socle G0 and point stabiliser H. Then b(G) = 6 if and only if one of the following holds: (i) (G, H) = (M23 , M22 ), (Co3 , McL.2), (Co2 , PSU6 (2).2), or (Fi22 .2, 2.PSU6 (2).2); (ii) G0 = E7 (q) and H = P7 ; (iii) G0 = E6 (q) and H = P1 or P6 . In cases (ii) and (iii), the usual estimates via fixed point ratios yield b(G) ∈ {5, 6}, so more work is needed to pin down the precise answer. To do this we apply some recent results from [29] on bases for simple algebraic groups. For example, consider case (ii). Let Ḡ = E7 and H̄ be the corresponding algebraic groups over F̄q (so H̄ is a maximal parabolic subgroup of Ḡ with Levi factor of type E6 ) and let σ be a Frobenius morphism of Ḡ such that (Ḡσ )0 = G0 . We may assume that H̄ is σ-stable. In [29, Section 5] we show that the generic 5-point stabiliser in Ḡ with respect to the action on the coset variety Ḡ/H̄ is 8-dimensional (here generic means that there is a non-empty open subvariety U of (Ḡ/H̄)5 such that the stabiliser in Ḡ of any tuple in U is 8-dimensional). By considering the fixed points under σ, we deduce that every 5-point stabiliser in the finite group G is nontrivial, for any q, and the result follows. Note that the connected component of the generic 5-point stabiliser is not a torus (because it is 8-dimensional), so there are no complications with split tori when q = 2. Bibliography [1] S.S. Abhyankar and N. Inglis, Galois groups of some vectorial polymomials, Trans. Amer. Math. Soc. 353 (2001), 2941–2969. [2] M. Aschbacher, On the maximal subgroups of the finite classical groups, Invent. Math. 76 (1984), 469–514. [3] M. Aschbacher, On conjectures of Guralnick and Thompson, J. Algebra 135 (1990), 277–343. [4] M. Aschbacher and R. Guralnick, Some applications of the first cohomology group, J. Algebra 90 (1984), 446–460. [5] M. Aschbacher and L. Scott, Maximal subgroups of finite groups, J. Algebra 92 (1985), 44–80. [6] M. Aschbacher and G.M. Seitz, Involutions in Chevalley groups over fields of even order, Nagoya Math. J. 63 (1976), 1–91. [7] L. Babai, On the order of uniprimitive permutation groups, Annals of Math. 113 (1981), 553–568. [8] L. Babai, On the order of doubly transitive permutation groups, Invent. Math. 65 (1982), 473–484. [9] R.F. Bailey and P.J. Cameron, Base size, metric dimension and other invariants of groups and graphs, Bull. London Math. Soc. 43 (2011), 209–242. [10] K.D. Blaha, Minimum bases for permutation groups: the greedy approximation, J. Algorithms 13 (1992), 297–306. [11] A. Bochert, Über die Zahl verschiedener Werte, die eine Funktion gegebener Buchstaben durch Vertauschung derselben erlangen kann, Math. Ann. 33 (1889), 584–590. [12] A. Bochert, Ueber die Classe der transitiven Substitutionengruppen, Math. Ann. 40 (1892), 176–193. [13] N. Bourbaki, Lie Groups and Lie Algebras (Chapters 4-6), Springer, 2002. [14] J.N. Bray, D.F. Holt and C.M. Roney-Dougal, The Maximal Subgroups of the Lowdimensional Finite Classical Groups, London Math. Soc. Lecture Note Series, vol. 407, Cambridge University Press, 2013. [15] J.L. Brenner and J. Wiegold, Two-generator groups I, Michigan Math. J. 22 (1975), 53–64. [16] T. Breuer, R.M. Guralnick and W.M. Kantor, Probabilistic generation of finite simple groups, II, J. Algebra 320 (2008), 443–494. [17] T. Breuer, R.M. Guralnick, A. Lucchini, A. Maróti, and G.P. Nagy, Hamiltonian cycles in the generating graph of finite groups, Bull. London Math. Soc. 42 (2010), 621–633. [18] T.C. Burness, Fixed point spaces in actions of classical algebraic groups, J. Group Theory 7 (2004), 311–346. [19] T.C. Burness, Fixed point ratios in actions of finite classical groups, I, J. Algebra 309 (2007), 69–79. [20] T.C. Burness, Fixed point ratios in actions of finite classical groups, II, J. Algebra 309 (2007), 80–138. [21] T.C. Burness, Fixed point ratios in actions of finite classical groups, III, J. Algebra 314 (2007), 693–748. [22] T.C. Burness, Fixed point ratios in actions of finite classical groups, IV, J. Algebra 314 (2007), 749–788. [23] T.C. Burness, On base sizes for actions of finite classical groups, J. London Math. Soc. 75 (2007), 545–562. 47 48 BIBLIOGRAPHY [24] T.C. Burness, On base sizes for almost simple primitive groups, in preparation. [25] T.C. Burness and M. Giudici, Classical groups, derangements and primes, vol. 25, Lecture Notes Series of the Aust. Math. Soc., Cambridge University Press, 2016. [26] T.C. Burness and S. Guest On the uniform spread of almost simple linear groups, Nagoya Math. J. 209 (2013), 35–109. [27] T.C. Burness, R.M. Guralnick and J. Saxl, On base sizes for symmetric groups, Bull. London Math. Soc. 43 (2011), 386–391. [28] T.C. Burness, R.M. Guralnick and J. Saxl, Base sizes for S-actions of finite classical groups, Israel J. Math. 199 (2014), 711–756. [29] T.C. Burness, R.M. Guralnick and J. Saxl, On base sizes for algebraic groups, J. European Math. Soc. (JEMS) 19 (2017), 2269–2341. [30] T.C. Burness, M.W. Liebeck and A. Shalev, Base sizes for simple groups and a conjecture of Cameron, Proc. London Math. Soc. 98 (2009), 116–162. [31] T.C. Burness and E.A. O’Brien and R.A. Wilson, Base sizes for sporadic simple groups, Israel J. Math. 177 (2010), 307–334. [32] T.C. Burness and A.R. Thomas, On the involution fixity of exceptional groups of Lie type, preprint. [33] P.J. Cameron and W.M. Kantor, Random permutations: some group-theoretic aspects, Combin. Probab. Comput. 2 (1993), 257–262. [34] J.H. Conway, R.T. Curtis, S.P. Norton, R.A. Parker and R.A. Wilson, Atlas of Finite Groups, Oxford University Press, Eynsham, 1985. [35] E. Covato, The involution fixity of simple groups, PhD thesis, University of Bristol, 2017. [36] F. Dalla Volta and A. Lucchini, Generation of almost simple groups, J. Algebra 178 (1995), 194–223. [37] J.D. Dixon, The probability of generating the symmetric group, Math. Z. 110 (1969), 199–205. [38] J.D. Dixon and B. Mortimer, Permutation Groups, Springer Graduate Texts in Math. 163, Springer-Verlag, New York, 1996. [39] H. Duyan, Z. Halasi and A. Maróti, A proof of Pyber’s base size conjecture, submitted (arxiv:1611.09487). [40] D. Frohardt, R. Guralnick and K. Magaard, Genus 0 actions of groups of Lie rank 1, in Arithmetic fundamental groups and noncommutative algebra (Berkeley, CA, 1999), 449–483, Proc. Sympos. Pure Math., vol. 70, Amer. Math. Soc., Providence, RI, 2002. [41] D. Frohardt, R. Guralnick and K. Magaard, Primitive monodromy groups of genus at most two, J. Algebra 417 (2014), 234–274. [42] D. Frohardt and K. Magaard, Monodromy composition factors among exceptional groups of Lie type, in Group theory (Granville, OH, 1992), 134–143, World Sci. Publ., River Edge, NJ, 1993. [43] D. Frohardt and K. Magaard, About a conjecture of Guralnick and Thompson, in Groups, difference sets, and the Monster (Columbus, OH, 1993), 43–54, Ohio State Univ. Math. Res. Inst. Publ., vol. 4, de Gruyter, Berlin, 1996. [44] D. Frohardt and K. Magaard, Grassmannian fixed point ratios, Geom. Dedicata 82 (2000), 21–104. [45] D. Frohardt and K. Magaard, Composition factors of monodromy groups, Annals of Math. 154 (2001), 327–345. [46] D. Frohardt and K. Magaard, Fixed point ratios in exceptional groups of rank at most two, Comm. Algebra 30 (2002), 571–602. [47] The GAP Group, GAP – Groups, Algorithms, and Programming, Version 4.4, 2004. [48] J. Fulman and R.M. Guralnick, The probability of generating an irreducible subgroup, in preparation. [49] R.M. Guralnick, The genus of a permutation group, in Groups, combinatorics & geometry (Durham 1990), 351–363, London Math. Soc. Lecture Note Ser. vol. 165, Cambridge University Press, 1992. BIBLIOGRAPHY 49 [50] R.M. Guralnick, Monodromy groups of coverings of curves, in Galois groups and fundamental groups, Math. Sci. Res. Inst. Publ. 41, 1–46, Cambridge University Press, 2003. [51] R.M. Guralnick and W.M. Kantor, Probabilistic generation of finite simple groups, J. Algebra 234 (2000), 743–792. [52] R.M. Guralnick and K. Magaard, On the minimal degree of a primitive permutation group, J. Algebra 207 (1998), 127–145. [53] R. Guralnick, T. Pentilla, C.E. Praeger, and J. Saxl, Linear groups with orders having certain large prime divisors, Proc. London Math. Soc. 78 (1999), 167–214. [54] R.M. Guralnick and J. Saxl, Generation of finite almost simple groups by conjugates, J. Algebra 268 (2003), 519–571. [55] R.M. Guralnick and A. Shalev, On the spread of finite simple groups, Combinatorica 23 (2003), 73–87. [56] R.M. Guralnick and J.G. Thompson, Finite groups of genus zero, J. Algebra 131 (1990), 303–341. [57] Z. Halasi, On the base size for the symmetric group acting on subsets, Studia Sci. Math. Hungar. 49 (2012), 492–500. [58] S. Harper, On the uniform spread of almost simple symplectic and orthogonal groups, J. Algebra, to appear. [59] G. Hiss and G. Malle, Low dimensional representations of quasi-simple groups, LMS J. Comput. Math. 4 (2001), 22–63. [60] G. Hiss and G. Malle, Corrigenda: Low dimensional representations of quasi-simple groups, LMS J. Comput. Math. 5 (2002), 95–126. [61] G.D. James, The Representation Theory of the Symmetric Groups, Springer Lecture Notes in Math. 682, Springer, Berlin, 1978. [62] C. Jordan, Théorèmes sur les groupes primitifs, J. Math. Pures Appl. (Liouville) 16 (1871), 383–408. [63] C. Jordan, Recherches sur les substitutions, J. Math. Pures Appl. (Liouville) 17 (1872), 351–367. [64] W.M. Kantor, Subgroups of classical groups generated by long root elements, Trans. Amer. Math. Soc. 248 (1979), 347–379. [65] W.M. Kantor and A. Lubotzky, The probability of generating a finite classical group, Geom. Dedicata 36 (1990), 67–87. [66] J. Kempe, L. Pyber and A. Shalev, Permutation groups, minimal degrees and quantum computing, Groups Geom. Dyn. 1 (2007), 553–584. [67] P.B. Kleidman, The maximal subgroups of the finite 8-dimensional orthogonal groups PΩ+ 8 (q) and of their automorphism groups, J. Algebra 110 (1987), 173–242. [68] P.B. Kleidman and M.W. Liebeck, The Subgroup Structure of the Finite Classical Groups, London Math. Soc. Lecture Note Series, vol. 129, Cambridge University Press, 1990. [69] R. Lawther, Unipotent classes in maximal subgroups of exceptional algebraic groups, J. Algebra 322 (2009), 270–293. [70] R. Lawther, M.W. Liebeck and G.M. Seitz, Fixed point spaces in actions of exceptional algebraic groups, Pacific J. Math. 205 (2002), 339–391. [71] R. Lawther, M.W. Liebeck and G.M. Seitz, Fixed point ratios in actions of finite exceptional groups of Lie type, Pacific J. Math. 205 (2002), 393–464. [72] M.W. Liebeck, On minimal degrees and base sizes of primitive permutation groups, Arch. Math. 43 (1984), 11–15. [73] M.W. Liebeck, On the orders of maximal subgroups of the finite classical groups, Proc. London Math. Soc. 50 (1985), 426–446. [74] M.W. Liebeck and L. Pyber, Upper bounds for the number of conjugacy classes of a finite group, J. Algebra 198 (1997), 538–562. [75] M.W. Liebeck and J. Saxl, Minimal degrees of primitive permutation groups, with an application to monodromy groups of coverings of Riemann surfaces, Proc. London Math. Soc. 63 (1991), 266–314. 50 BIBLIOGRAPHY [76] M.W. Liebeck and J. Saxl, Maximal subgroups of finite simple groups and their automorphism groups, Proceedings of the International Conference on Algebra, Part 1 (Novosibirsk, 1989), 243–259, Contemp. Math. 131, Amer. Math. Soc., 1992. [77] M.W. Liebeck and G.M. Seitz, A survey of of maximal subgroups of exceptional groups of Lie type, in Groups, combinatorics & geometry (Durham, 2001), 139–146, World Sci. Publ., River Edge, NJ, 2003. [78] M.W. Liebeck and A. Shalev, The probability of generating a finite simple group, Geom. Dedicata 56 (1995), 103–113. [79] M.W. Liebeck and A. Shalev, Classical groups, probabilistic methods, and the (2, 3)generation problem, Annals of Math. 144 (1996), 77–125. [80] M.W. Liebeck and A. Shalev, Simple groups, probabilistic methods, and a conjecture of Kantor and Lubotzky, J. Algebra 184 (1996), 31–57. [81] M.W. Liebeck and A. Shalev, Simple groups, permutation groups, and probability, J. Amer. Math. Soc. 12 (1999), 497–520. [82] M.W. Liebeck and A. Shalev, On fixed points of elements in primitive permutation groups, J. Algebra 421 (2015), 438–459. [83] L. Lovász, Combinatorial problems and exercises, North-Holland, Amsterdam, 1979. [84] F. Lübeck, Small degree representations of finite Chevalley groups in defining characteristic, LMS J. Comput. Math. 4 (2001), 135–169. [85] K. Magaard, Monodromy and sporadic groups, Comm. Algebra 21 (1993), 4271–4297. [86] A. Maróti, On the order of primitive groups, J. Algebra 258 (2002), 631–640. [87] N.E. Menezes, M. Quick and C.M. Roney-Dougal, The probability of generating a finite simple group, Israel J. Math. 198 (2013), 371–392. [88] E. Netto, Substitutionentheorie und ihre Anwendungen auf die Algebra, Teubner, Leipzig, 1882; English transl. 1892, second edition, Chelsea, New York, 1964. [89] M.G. Neubauer, On monodromy groups of fixed genus, J. Algebra 153 (1992), 215– 261. [90] M. Neunhöffer, F. Noeske, E.A. O’Brien and R.A. Wilson, Orbit invariants and an application to the Baby Monster, J. Algebra 341 (2011), 297–305. [91] C.E. Praeger and J. Saxl, On the orders of primitive permutation groups, Bull. London Math. Soc. 12 (1980), 303–307. [92] L. Pyber, Asymptotic results for permutation groups, in Groups and Computation (eds. L. Finkelstein and W. Kantor), DIMACS Series, vol. 11, pp.197–219, 1993. [93] L. Scott, Matrices and cohomology, Annals of Math. 105 (1977), 473–492. [94] Á. Seress, The minimal base size of primitive solvable permutation groups, J. London Math. Soc. 53 (1996), 243–255. [95] Á. Seress, Permutation Group Algorithms, Cambridge Tracts in Mathematics 152, Cambridge University Press, 2003. [96] C.C. Sims, Computation with permutation groups, Proc. Second Sympos. on Symbolic and Algebraic Manipulation, (ACM, New York), pp.23–28, 1971. [97] A. Stein, 1 21 -generation of finite simple groups, Beiträge Algebra Geom. 39 (1998), 349–358. [98] R. Steinberg, Generators for simple groups, Canad. J. Math. 14 (1962), 277–283. [99] R. Steinberg, Endomorphisms of linear algebraic groups, Mem. Amer. Math. Soc. 80 (1968). [100] H. Völklein, Groups as Galois Groups: An Introduction, Cambridge Studies in Advanced Math. 53, Cambridge University Press, 1996. [101] H. Wielandt, Finite Permutation Groups, Academic Press, New York, 1964.
4math.GR
1 Coverage Analysis of a Vehicular Network Modeled as Cox Process Driven by Poisson Line Process arXiv:1709.08577v1 [cs.IT] 25 Sep 2017 Vishnu Vardhan Chetlur and Harpreet S. Dhillon Abstract In this paper, we consider a vehicular network in which the wireless nodes are located on a system of roads. We model the roadways, which are predominantly straight and randomly oriented, by a Poisson line process (PLP) and the locations of nodes on each road as a homogeneous 1D Poisson point process (PPP). Assuming that each node transmits independently, the locations of transmitting and receiving nodes are given by two Cox processes driven by the same PLP. For this setup, we derive the coverage probability of a typical receiver, which is an arbitrarily chosen receiving node, assuming independent Nakagami-m fading over all wireless channels. Assuming that the typical receiver connects to its closest transmitting node in the network, we first derive the distribution of the distance between the typical receiver and the serving node to characterize the desired signal power. We then characterize coverage probability for this setup, which involves two key technical challenges. First, we need to handle several cases as the serving node can possibly be located on any line in the network and the corresponding interference experienced at the typical receiver is different in each case. Second, conditioning on the serving node imposes constraints on the spatial configuration of lines, which require careful analysis of the conditional distribution of the lines. We address these challenges in order to accurately characterize the interference experienced at the typical receiver. We then derive an exact expression for coverage probability in terms of the derivative of Laplace transform of interference power distribution. We analyze the trends in coverage probability as a function of the network parameters: line density and node density. We also study the asymptotic behavior of this model and compare the coverage performance with that of a homogeneous 2D PPP model with the same node density. Index Terms The authors are with Wireless@VT, Department of ECE, Virginia Tech, Blacksburg, VA (email: {vishnucr, hdhillon}@vt.edu). The support of the US NSF (Grant IIS-1633363) is gratefully acknowledged. Manuscript last updated: September 26, 2017. 2 Stochastic geometry, Cox process, Poisson line process, coverage probability, vehicular network, road systems, Nakagami-m fading. I. I NTRODUCTION Vehicular communication, which collectively refers to vehicle-to-vehicle (V2V) and vehicleto-infrastructure (V2I) communication, has enabled the vehicular nodes to share information with each other and also with roadside units (RSUs) to improve the road safety and transport efficiency [1]–[3]. With autonomous vehicles becoming a reality in the near future, the data traffic originating from vehicular networks is expected to increase many folds while also putting more stringent latency and connectivity constraints compared to the networks of today. In order to meet these stringent requirements, it is critical to understand the system-level performance of these networks under different operational scenarios. In the recent years, stochastic geometry has emerged as a powerful tool for modeling and system-level analysis of wireless networks. The most popular approach is to model the locations of wireless nodes by a homogeneous 2D Poisson point process (PPP) [4]–[7] and focus on the performance analysis of a randomly chosen receiver in the network. Despite its simplicity and analytical tractability, PPP may not always be a suitable model for all spatial configurations of nodes. In the context of this paper, the locations of vehicular nodes and RSUs in vehicular networks are restricted to roadways, which are predominantly linear and randomly oriented. The 2D PPP model, in which the location of nodes are modeled by randomly distributed points in the 2D plane, does not capture the coupling between the nodes and the underlying infrastructure (roads) in vehicular networks. While modeling the locations of vehicular nodes, one has to consider two fundamental sources of randomness: (i) the locations of nodes on each road are often irregular and can hence be treated as a realization of a point process, and (ii) the layout of the roads is also often irregular, which makes it possible to model the road system as a realization of a line process [8]–[12]. In short, it is necessary to consider doubly stochastic spatial models for vehicular nodes that account for the randomness associated with the roads as well as the locations of nodes on these roads. A well-known canonical model in the literature that readily meets this requirement is a Cox process or doubly stochastic Poisson point process [13], [14], where the roads in a network are modeled by a Poisson line process (PLP) and the location of nodes on the roads are modeled by a 1D PPP. Despite the relevance of this canonical model in understanding the system-level performance of vehicular networks, its coverage analysis is still an open problem, which is the main focus of this paper. In particular, we develop tools to characterize serving distance as well 3 as conditional interference power distributions, which collectively provide exact characterization of coverage probability and can also be readily applied to study many other aspects of vehicular networks. A. Related Work While there is a significant volume of literature pertaining to the analysis of vehicular networks using tools from stochastic geometry, the spatial models considered in these works are often too simple [15]–[20] and are limited to a single road or an intersection of two roads. For instance, a signal-to-interference plus noise ratio (SINR) based analysis to compute the optimum transmission probability for vehicles on a single road, has been proposed in [15]. The trade-offs between the aggregate packet progress and spatial frequency reuse for multi-hop transmission between vehicles in a multi-lane highway setup were studied in [17]. In [19], [20], the authors have analyzed the packet reception probability of a link at the intersection of two perpendicular roads where the location of nodes are modeled as 1D PPP on each road. Since these models do not accurately capture the irregular structure of roads and their effect on the performance, they do not always offer reliable system-level insights that aid in the design. Although relatively sparse, there are also a few works in the literature where more sophisticated models that include the randomness associated with the road systems were studied [8]–[12], [21], [22]. In [8], the authors have modeled the streets in an urban setting by a Manhattan Poisson line process (MPLP) and the base stations on each road by a 1D PPP and characterized the downlink coverage performance of mmWave microcells by adopting a Manhattan distance based path-loss model. While this is a reasonable model for mmWave communication in an urban setting, it may not be applicable to all scenarios due to the irregular structure of roads. A more refined model for vehicular networks is presented in [10], [11], where the streets are modeled by the edges of either a Poisson-Line tessellation (PLT), Poisson-Voronoi tessellation (PVT), or a Poisson-Delaunay tessellation (PDT) and the nodes on each line are modeled by a homogeneous 1D PPP. Owing to its analytical tractability, PLT often gains preference over PVT and PDT in modeling road systems (it has also been used in other related applications, such as in modeling the effect of blockages in localization networks [23]). In [10], the authors have considered a hierarchical two-tier network whose components are modeled as a Cox process on a PLT and have characterized the mean shortest path on the streets connecting these components. Using the same spatial model, a formula for probability density function of inter-node distances was presented in [11]. In [12], the author has derived the uplink coverage probability for a setup 4 where the typical receiver is randomly chosen from a PPP and the locations of transmitter nodes are modeled as a Cox process driven by a PLP. However, to the best of our knowledge, this paper is the first to derive the coverage probability for a setup where both the receiver and transmitter nodes are modeled by Cox processes driven by the same PLP. In other words, this paper is the first to derive the coverage probability of a vehicular node located on a PLP when it connects to another vehicular node on the same PLP. The technical challenges in this analysis originate from the spatial coupling between the vehicular nodes induced by the underlying PLP. More detailed account of our contributions is provided below. B. Contributions In this paper, we present an analytical procedure for performing the canonical coverage analysis of a vehicular network. We consider a doubly-stochastic spatial model for wireless nodes, which captures the irregularity in the spatial layout of roads by modeling them as a PLP and the spatial irregularity in the locations of wireless nodes by modeling them as a 1D PPP on each road. In order to mimic various fading scenarios, we choose Nakagami-m fading channel that allows us to control the severity of fading. For this setup, we derive the signal-to-interference ratio (SIR) based coverage probability of a typical receiver, which is an arbitrarily chosen receiving node in the network, assuming that it connects to its closest transmitting node in the network. We then study the trends in the coverage performance which offers useful system design insights. More technical details about the coverage probability and system-level insights are provided next. Coverage probability. We derive an exact expression for coverage probability by accurately characterizing the interference experienced at the typical receiver. We first derive several fundamental distance distributions that are necessary to characterize the desired signal power at the typical receiver. Since the distribution of nodes is coupled with the distribution of lines in the network, it poses two key challenges to the exact coverage analysis. First, the serving node, which is the closest transmitting node to the typical receiver, can possibly be located on any of the lines in the network. Consequently, the interference measured at the typical receiver in each of these cases is different and we have to handle each case separately. In order to address this issue, we derive a generalized expression for coverage probability for all these cases. Second, when a transmitting node on a particular line is chosen to be the serving node, it implies that there can not be any line with a node whose distance to the typical receiver is smaller than the distance between the typical receiver and the serving node. This additional constraint imposed by the distribution of nodes impacts the conditional distribution of lines as observed at the typical 5 receiver. We determine the conditional distribution of the lines in order to accurately compute the interference at the typical receiver. We then determine the coverage probability in terms of derivative of Laplace transform of the distribution of the interference power. System-level insights. Using our analytical results, we study the effect of two key network parameters, namely, node density and line density, on the coverage probability of the typical receiver. We observe that the coverage probability increases as the density of nodes on lines increases. However, the coverage probability degrades as the density of the lines in the network increases. The contrasting effect of node and line densities on the coverage probability offers useful insights in the design and deployment of RSUs in the network. We also compare the coverage probabilities of our setup with the results obtained from a homogeneous 2D PPP model, which is a widely accepted model for 2D wireless networks and is often used as a preferred approximation for more spohisticated point processes whose analysis may not be as tractable as a PPP. This comparison reveals that the 2D PPP model may not serve as a good approximation for our Cox process model, thereby highlighting the significance of our analytical results. II. M ATHEMATICAL P RELIMINARY: P OISSON L INE P ROCESS Since the PLP will be the main component of our model described in Section III, a basic knowledge of its construction and properties will be useful in understanding the proposed model. While we provide only a brief introduction to PLP and its properties in this section, a detailed account of the underlying theory can be found in [13], [24]. Line process. A line process is simply a random collection of lines in a 2D plane. Any undirected line L in R2 can be uniquely characterized by its perpendicular distance ρ from the origin o ≡ (0, 0) and the angle θ subtended by the perpendicular dropped onto the line from the origin with respect to the positive x-axis in counter clockwise direction, as shown in Fig. 1. The pair of parameters ρ and θ can be represented as the coordinates of a point on the cylindrical surface C ≡ [0, 2π) × [0, ∞), which is termed as the representation space, as illustrated in Fig. 2. Clearly, there is a one-to-one correspondence between the lines in R2 and points on the cylindrical surface C. Thus, a random collection of lines can be constructed from a set of points on C. Such a set of lines generated by a Poisson point process on C is called a Poisson line process. In our system model, we also assume the PLP to be motion-invariant for analytical simplicity. So, we will discuss the concept of motion-invariance for line processes and some well-established results of PLP next. 6 𝑦 𝐿4 𝐿3 𝐿4 𝐿1 𝐿2 𝐿3 𝜌 𝜌 𝑜 𝜃 𝐿2 𝑥 0 Fig. 1. 𝐿1 Illustration of Poisson line process in two2 𝜃 2π Fig. 2. Illustration of a point process on representation space C ≡ [0, 2π) × [0, ∞). dimensional plane R . Stationarity and Motion-Invariance. The definition of stationarity for line processes is similar to that of point processes. A line process Φl = {L1 , L2 , . . . } is said to be stationary if the translated line process T Φl = {T (L1 ), T (L2 ), . . . } has the same distribution of lines as that of Φl for any translation T in the plane. Upon translating the origin in the plane R2 by a distance t in a direction that makes an angle β with respect to the positive x-axis, the equivalent representation of  a line L in C changes from (ρ, θ) to ρ−t cos(θ−β), θ . Therefore, for a stationary line process Φl ,    the point process ρL1 −t cos(θL1 −β), θL1 , ρL2 −t cos(θL2 −β), θL2 , . . . in the representation    space C has the same distribution as that of the point process ρL1 , θL1 , ρL2 , θL2 , . . . . Similarly, rotation of the axes about the origin by an angle γ in R2 changes the representation of the line in C from (ρ, θ) to (ρ, θ − γ), where the operation θ − γ is modulo 2π. In addition to translation-invariance, if a line process is also invariant to the rotation of the axes about the origin, then it is said to be motion-invariant. Line density. Line density µ of a line process Φl is defined as the mean line length per unit area. If Φl is a motion-invariant line process, then the density of the corresponding point process λ in the representation space C is given by λ = µ . 2π Number of lines intersecting a disc. If Φl is a motion-invariant Poisson line process with line density µ, then the number of lines that intersect a convex region K ⊆ R2 follows a Poisson distribution with mean τK = µν(K) = λν(K), 2π (1) where ν(K) is the perimeter of the convex region K. Therefore, the number of lines intersecting a disc of radius d is Poisson distributed with mean 2πλd. 7 III. S YSTEM M ODEL A. Spatial Modeling of Wireless Nodes We first model the spatial distribution of road systems by a motion-invariant PLP Φl with line density µl . We denote the density of equivalent PPP on the representation space C by λl . We then model the locations of wireless nodes, which include vehicular nodes and RSUs, on each line (road) by a homogeneous 1D PPP with density λn . Assuming that each wireless node transmits independently with a probability p, the locations of transmitting nodes on each line is then given by a thinned PPP with density λv = pλn . We denote the set of locations of the transmitting nodes on a line L by {wL } ≡ ΨL . Similarly, the distribution of receiving nodes on each line is also a thinned PPP with density λr = (1 − p)λn . Thus, the locations of transmitting and receiving nodes are modeled by Cox processes Φt and Φr , which are driven by the same PLP Φl . Our goal is to derive the SIR based coverage probability of a typical receiver from the point process Φr . For analytical simplicity, we translate the origin o ≡ (0, 0) to the location of the typical receiver. The translated point process Φr0 can be treated as the superposition of the point process Φr , an independent 1D PPP with density λr on a line passing through the origin, and an atom at the origin o [12]. This can be understood by applying Slivnyak’s theorem [13], [14] in two steps: first, we add a point at the origin to the PPP in the representation space C, thereby obtaining a PLP Φl0 = Φl ∪ {L0 } with a line L0 passing through the origin, and second, we add a point at the origin to the 1D-PPP on the line L0 passing through the origin in R2 . The line L0 passing through the origin will henceforth be referred to as the typical line. Since both Φr and Φt are driven by the same line process, the translated point process Φt0 is also the superposition of Φt and an independent PPP with density λv on L0 , as shown in Fig. 3. Since the other receiver nodes in the network do not have any impact on the SIR measured at the typical receiver in this setup, we will focus only on the distribution of transmitter nodes in the network. For brevity, the transmitter nodes will henceforth be referred to as only nodes. We denote the ith (i = 1, 2, . . . ) closest line to the origin o (excluding the typical line) by Li and its perpendicular distance to the origin by Yi . The distance of the closest node on a line Li from the projection of the origin onto Li is denoted by Xi , as illustrated in Fig. 3. Thus, the distance p to the closest node on Li from the origin is Si = Yi2 + Xi2 . For notational consistency, we denote the distance of the typical line from the origin by Y0 ≡ 0 and the distance to the closest node on L0 by S0 . We denote the number of lines that intersect a region A ⊂ R2 by Nl (A) and the number of nodes in A by Nv (A). Throughout this paper, we denote the random variables 8 Typical Receiver Serving node 𝐿0 Interfering nodes 𝑦𝑛 𝑜 𝑥𝑛 𝑟 𝐿𝑛 Fig. 3. Illustration of the system model. by upper case letters and their corresponding realizations by lower case letters. For instance, Yn denotes a random variable, whereas yn denotes its realization. B. Transmitter Association Scheme and Propagation Model We assume that the transmit power is the same for all the nodes and the antennas are isotropic. We further assume that the typical receiver connects to its closest transmitting node in the network. Note that the closest node does not necessarily have to be on the same line as that of the typical receiver and can possibly be located on any of the other lines. We denote such an event in which the serving node is located on the ith closest line (excluding the typical line) to the origin by Ei (i = 1, 2, . . . ). We denote the event in which the serving node is located on the typical line by E0 . In wireless communication networks, the severity of fading between the transmitter and the receiver depends on environmental factors and hence, the effect of fading can vary significantly from an urban scenario consisting of several buildings to rural areas and highways which are almost devoid of any tall structures. Therefore, in order to mimic a wide range of fading environments, we choose Nakagami-m fading with parameter m. In the interest of analytical tractability, we restrict the values of m to integers. For simplicity of exposition, we assume that the system is interference limited and hence, the thermal noise is neglected. Thus, the signal-tointerference ratio (SIR) at the typical receiver is SIR = P Lj ∈Φl0 G0 R−α P wLj ∈ΨLj \b(o,R) GwLj kwLj k−α , (2) where α > 2 is the path-loss exponent, G0 is the channel fading gain between the typical receiver and the serving node, GwLj is the channel fading gain between the typical receiver and 9 the interfering node at the location wLj , R is the Euclidean distance to the serving node from the typical receiver, and kwLj k is the Euclidean distance of the interfering node from the typical receiver. IV. C OVERAGE P ROBABILITY This is the main technical section of the paper, where we derive the coverage probability for the setup described in the previous section. Recall that the serving node which is the closest node to the typical receiver can possibly be located on any line Lk (k = 0, 1, . . . ). As a result, the interference at the typical receiver will be different in each of these cases and hence, they need to be handled separately. However, we can derive a generalized expression for the cases in which the serving node does not lie on the typical line (E1 , E2 , . . . ). Therefore, in our analysis, we will derive the coverage probability conditioned on the events E0 and En (n = 1, 2, . . . ) separately and obtain the final result using law of total probability. A key difference between the events E0 and En is that the distance of the line on which the serving node is located is always zero in case of E0 , whereas the distance of the line containing the serving node Yn in case of En is a random variable. Therefore, in the computation of coverage probability conditioned on En , we will derive the intermediate results by additionally conditioning on Yn . In the final step, we obtain the overall coverage probability by taking expectation over Yn . While we can obtain some of the results for the case E0 from the intermediate results pertaining to En by simply substituting Y0 = 0 in place of Yn , we will provide detailed proofs for those results where this approach is not applicable. A. Preliminary Results We begin our analysis with the derivation of some fundamental distance distributions which will be used later in the computation of coverage probability. While it may be relatively straightforward to derive some of these results, they are presented here for completeness. Lemma 1. The cumulative distribution function (CDF) and probability density function (PDF) of the distance of the nth closest line from the origin Yn are CDF: FYn (yn ) = 1 − exp(−2πλl yn ) n−1 X (2πλl yn )k k=0 PDF: fYn (yn ) = exp(−2πλl yn ) (2πλl yn )n . yn (n − 1)! k! , (3) (4) 10 Proof: From the definition of a PLP, recall that there is a one-to-one correspondence between lines in R2 and points on C ≡ [0 2π) × [0 ∞). The abscissa and the ordinate of these points represent the orientation of the line and the distance of the line from the origin, respectively. We now consider the projections of these points onto the vertical axis of the cylindrical surface, which represents the distance of the lines from the origin. Note that the number of projections of points in a segment of length t on the vertical axis of C is the same as the number of points in the area [0, 2π) × [0, t), which follows a Poisson distribution with mean 2πλl t. This means that the projections of points onto the vertical axis of C forms a 1D PPP Ψl0 with density 2πλl . Therefore, the distance of the nth closest line from the origin follows the same distribution as that of the distance of nth closest point in a 1D PPP with density 2πλl , which is a well-known result in stochastic geometry [14]. Lemma 2. Conditioned on the distance of the nth closest line to the origin Yn , the CDF of the distance Xn between the projection of origin onto the line Ln and its closest node on Ln is FXn (xn |yn ) = 1 − exp(−2λv xn ). (5) Proof: The proof follows from the void probability of a 1D PPP with density λv . Lemma 3. Conditioned on the distance of the nth closest line to the origin Yn , the CDF and PDF of the distance to the closest node on the line Ln from the typical receiver Sn are p CDF: FSn (sn |yn ) = 1 − exp(−2λv s2n − yn2 ), p  2λv sn PDF: fSn (sn |yn ) = p exp − 2λv s2n − yn2 . s2n − yn2 (6) (7) Proof: The conditional CDF of Sn is given by p p FSn (sn |yn ) = P(Sn < sn |Yn ) = P( Xn2 + yn2 < sn |Yn ) = P(Xn < s2n − yn2 |Yn ) p p = FXn ( s2n − yn2 |yn ) = 1 − exp(−2λv s2n − yn2 ). The PDF fSn (sn |yn ) can be obtained by taking the derivative of FSn (sn |yn ) w.r.t. sn . Corollary 1. The CDF and the PDF of the distance between the typical receiver at the origin and its closest node on the typical line S0 are CDF: FS0 (s0 ) = 1 − exp(−2λv s0 ), (8) PDF: fS0 (s0 ) = 2λv exp(−2λv s0 ). (9) 11 Proof: The proof follows from substituting S0 and Y0 = 0 in place of Sn and Yn in Lemma 3. Conditioned on the distance Yn , we will now derive the distribution of the distance of the closest node to the typical receiver among the nodes that are located on the lines that are closer and farther than the line of interest Ln in the following Lemmas. These results will be used in the next subsection in the computation of the probability of occurrence of events E0 and En . Lemma 4. Conditioned on the distance of the nth closest line to the origin Yn , the CDF and PDF of the distance Un between the typical receiver and its closest node among the n − 1 lines {L1 , L2 , . . . Ln−1 } (excluding the typical line) that are closer than Yn are CDF:   n−1 Z p   un 1 un  2 2  , 0 ≤ un < yn ,  1 − 1 − yn + yn 0 exp − λv 2 un − z dz " Z FUn (un |yn ) = n−1 # yn p   dz   exp − λv 2 u2n − z 2 , yn ≤ un < ∞,  1 − yn 0 (10) PDF:   n−2 Z p  un 1 un   2 2  (n − 1) 1 − exp − λv 2 un − z dz +   y y n n  0   Z un    p  2λ u v n   exp(−2λv u2n − z 2 ) p × dz ,   yn u2n − z 2 0 fUn (un |yn ) =  Z yn   p  dz n−2   2 2  exp − λv 2 un − z (n − 1)   yn  0  Z yn   p  2λv un   × exp(−2λv u2n − z 2 ) p dz,  yn u2n − z 2 0 0 ≤ un < yn , yn ≤ un < ∞. (11) Proof: See Appendix A. Lemma 5. Conditioned on the distance of the nth closest line to the origin Yn , the CDF and PDF of the distance Vn between the typical receiver and its closest node among the lines {Ln+1 , Ln+2 , . . . } that are farther than Yn are CDF: " Z vn FVn (vn |yn ) = 1 − exp − 2πλl yn #   p 1 − exp(−2λv vn2 − z 2 ) dz , yn ≤ vn < ∞, (12) 12 PDF: Z vn p 2λv vn vn2 − z 2 ) p dz vn2 − z 2 yn " # Z vn   p 1 − exp(−2λv vn2 − z 2 ) dz , × exp − 2πλl fVn (vn |yn ) = 2πλl exp(−2λv yn ≤ vn < ∞. (13) yn Proof: See Appendix B. We can easily specialize the results of Lemma 5 to obtain the CDF and PDF of the distance between the typical receiver and its closest node among the lines that are farther than the typical line as given in the following Corollary. Corollary 2. The CDF and PDF of the distance V0 between the typical receiver and its closest node among the lines that are farther than the typical line are # " Z v0  q  CDF: FV0 (v0 ) = 1 − exp − 2πλl 1 − exp(−2λv v02 − z 2 ) dz , (14) 0 Z v0 q  2λ v  v 0 exp − 2λv v02 − z 2 p 2 dz v0 − z 2 0 " # Z v0  q  × exp − 2πλl 1 − exp(−2λv v02 − z 2 ) dz . PDF: fV0 (v0 ) = 2πλl (15) 0 Proof: The proof follows from substituting V0 and Y0 = 0 in place of Vn and Yn in Lemma 5. B. Probabilities of Events En and E0 In this subsection, we will derive the probability with which the typical receiver connects to a node on the nth closest line to the origin conditioned on the distance of the line from the origin Yn and the probability with which the typical receiver connects to a node on the typical line. These intermediate results hold the key to the derivation of conditional serving distance distribution in the next subsection. Lemma 6. Conditioned on Yn , the probability of occurrence of the event En is Z ∞    P(En |Yn ) = 1 − FS0 (sn ) 1 − FUn (sn |yn ) 1 − FVn (sn |yn ) fSn (sn |yn )dsn , (16) 0 where FS0 (·), FUn (· |yn ), FVn (·|yn ), and fSn (sn |yn ) are given by Corollary 1, Lemmas 4, 5, and 3, respectively. Proof: The typical receiver connects to a node on the nth closest line if the distance to the closest node on the line Ln is smaller than the distance to the closest node on any other line. 13 In this case, we will group all the lines excluding the line of interest Ln into 3 sets: (i) the typical line L0 , (ii) the lines that are closer than the line Ln (L1 , L2 , . . . , Ln−1 ), and (iii) the lines that are farther than the line Ln (Ln+1 , Ln+2 , . . . ). The distance to the closest node on Ln must be smaller than the distance to the closest node in each of these three sets, i.e., Sn must be smaller than the minimum of S0 , Un , and Vn . Thus, the conditional probability of occurrence of the event En is computed as P(En |Yn ) = P(Sn < min{S0 , Un , Vn }|Yn ) = P(Sn < S0 , Sn < Un , Sn < Vn |Yn ) Z ∞ (a) = P(S0 > sn |Sn , Yn )P(Un > sn |Sn , Yn )P(Vn > sn |Sn , Yn )fSn (sn |yn )dsn 0 Z ∞    (b) 1 − FS0 (sn ) 1 − FUn (sn |yn ) 1 − FVn (sn |yn ) fSn (sn |yn )dsn , = 0 where (a) follows from the conditional independence of the variables S0 , Un , and Vn , and (b) follows from the independence of the random variable S0 . Corollary 3. The probability of occurrence of the event E0 is Z ∞ FS0 (v0 )fV0 (v0 )dv0 , P(E0 ) = (17) 0 where FS0 (·) and fV0 (·) are given by Corollaries 1 and 2, respectively. Proof: The typical receiver at the origin connects to a node on the typical line when the distance to the closest node on the typical line is smaller than the distance to the closest node on any other line. Thus, the probability of occurrence of E0 is given by Z ∞ P(S0 < v0 |V0 )fV0 (v0 )dv0 P(E0 ) = P(S0 < min{S1 , S2 , . . .}) = P(S0 < V0 ) = 0 Z ∞ = FS0 (v0 )fV0 (v0 )dv0 , 0 which completes the proof. C. Serving Distance Distribution In this subsection, we will derive the distribution of distance between the typical receiver and the serving node conditioned on the events En and E0 . As stated in the previous subsection, in case of En , the distance to the closest node on the nth closest line Sn must be smaller than the minimum of S0 , Un , and Vn . Therefore, we first determine the distribution of Wn = min{S0 , Un , Vn } in the following Lemma. 14 Lemma 7. Conditioned on the distance of the nth closest line to the origin Yn , the CDF and PDF of Wn = min{S0 , Un , Vn } are    FWn (wn |yn ) = 1 − 1 − FS0 (wn ) 1 − FUn (wn |yn ) 1 − FVn (wn |yn ) , (18)    PDF: fWn (wn |yn ) = fS0 (wn ) 1 − FUn (wn |yn ) 1 − FVn (wn |yn ) + 1 − FS0 (wn ) fUn (wn |yn )    × 1 − FVn (wn |yn ) + 1 − FS0 (wn ) 1 − FUn (wn |yn ) fVn (wn |yn ), (19) CDF: where FS0 (·), fS0 (·) are given by Corollary 1, FUn (· |yn ), fUn (· |yn ) are given by Lemma 4, and FVn (·|yn ), fVn (·|yn ) are given by Lemma 5. Proof: The proof simply follows from the distribution of minimum of three independent random variables [25]. Using the intermediate results derived thus far, we will now derive the conditional distribution of the serving distance R in the following Lemma. Lemma 8. Conditioned on the event En and the distance of the nth closest line Yn , the CDF and PDF of the serving distance R are Z ∞  1 FSn (wn |yn ) − FSn (r|yn ) fWn (wn |yn )dwn , (20) CDF: FR (r|En , Yn ) = 1 − P(En |Yn ) r Z ∞ 1 fSn (r|yn )fWn (wn |yn )dwn , (21) PDF: fR (r|En , yn ) = P(En |Yn ) r where FSn (·|yn ), fSn (·|yn ) are given by Lemma 3, P(En |Yn ) and fWn (·|yn ) are given by Lemmas 6 and 7, respectively. Proof: The conditional CDF of the serving distance R is computed as FR (r|En , Yn ) P(Sn > r, Sn < min{S0 , Un , Vn }|Yn ) P(R > r, En |Yn ) (a) = 1− P(En |Yn ) P(En |Yn ) Z ∞ P(r < Sn < Wn |Yn ) 1 =1− =1− P(r < Sn < wn |Wn , Yn )fWn (wn |yn )dwn P(En |Yn ) P(En |Yn ) r Z ∞  1 FSn (wn |yn ) − FSn (r|yn ) fWn (wn |yn )dwn , =1− P(En |Yn ) r where (a) follows from the condition for the occurrence of the event En . The conditional PDF = 1 − P(R > r|En , Yn ) = 1 − fR (r|En , yn ) can be computed by taking the derivative of FR (r|En , yn ) w.r.t. r. Lemma 9. Conditioned on the event E0 , the CDF and PDF of the serving distance R are given by CDF: 1 FR (r|E0 ) = 1 − P(E0 ) Z r ∞  FS0 (v0 ) − FS0 (r) fV0 (v0 )dv0 , (22) 15 1 PDF: fR (r|E0 ) = P(E0 ) Z ∞ fS0 (r)fV0 (v0 )dv0 , (23) r where FS0 (·), fS0 (·) are given by Corollary 1, fV0 (v0 ) and P(E0 ) are given by Corollaries 2 and 3, respectively. Proof: The proof follows along the same lines as that of Lemma 8. D. Conditional Probability Mass Function of Number of Lines Now that we have derived the distribution of the serving distance R, the next main step is to characterize the interference experienced at the typical receiver conditioned on R for the events En and E0 . The sources of interference are all the nodes that are located at a distance farther than R from the origin, i.e., the nodes that lie outside the disc b(o, R) centered at the origin o with radius R. Please note that such nodes could also lie on lines which are located closer than R. Please see Fig. 4 for an illustration. Therefore, in order to accurately characterize the interference, we will have to first determine the distribution of lines. In order to explain this concretely, let us consider the case of En , where the serving node is located at a distance R on the nth closest line from the origin. From the properties of PLP, we know that the number of lines intersecting a disc of fixed radius follows a Poisson distribution with mean equal to the line density scaled by the perimeter of the disc. However, this does not hold for the conditional distribution of the number of lines that intersect the disc b(o, R). This is because the lines that intersect the disc b(o, R) must not contain any nodes in the chord segment inside the disc (since we have already conditioned on the event that the serving node is located on Ln at a distance R from the typical receiver). This additional constraint imposed by the distribution of nodes on the lines impacts the conditional distribution of number of lines intersecting the disc b(o, R). Note that the typical line is not included in the count of number of lines intersecting the disc b(o, R). Now, conditioned on the event En , we know that there are at least n lines that intersect the disc b(o, R) which include the n − 1 lines that are closer than the line of interest Ln and the line Ln itself which is at a distance Yn ≤ R. In addition to these n lines, there are also a random number of lines that are farther than Yn but closer than the serving distance R, as illustrated in Fig. 4. Therefore, our immediate goal is to determine the conditional distribution of this random number of lines that intersect the disc b(o, R) but do not intersect the disc b(o, Yn ), denoted by  Nl b(o, R) \ b(o, Yn ) . 16 Typical Receiver 𝐿𝑛 𝐿0 Serving node Interfering nodes 𝑦𝑛 Typical Line Line containing the serving node Lines that intersect 𝑏(𝑜, 𝑦𝑛 ) Lines that intersect 𝑏(𝑜, 𝑟) but not 𝑏(𝑜, 𝑦𝑛 ) Lines that do not intersect 𝑏(𝑜, 𝑟) 𝑜 𝑟 Fig. 4. Illustration of different sets of lines. Lemma 10. Conditioned on the event En , the distance of the nth closest line Yn , and the serving distance R, the probability mass function (PMF) of number of lines that are farther than Yn and closer than R is Z r     p  P Nl b(o, r) \ b(o, yn ) = k|En , Yn , R = exp − 2πλl exp(−2λv r2 − y 2 )dy yn  2πλl × Rr exp(−2λv yn k p r2 − y 2 )dy . k! (24) Proof: See Appendix C. Remark 1. Conditioned on the event En , serving distance R, and the distance of the nth closest line to the origin Yn , we have derived the PMF of number of lines that are farther than Yn and closer than R. However, it can be observed that the conditional distribution remains Poisson p Rr but with a mean of 2πλl yn exp(−2λv r2 − y 2 )dy. Therefore, the conditional distribution of Rr µl lines can be interpreted as a thinned Poisson line process with line density 2π(r−y exp − n ) yn p  2λv r2 − y 2 dy. Corollary 4. Conditioned on the event E0 and the serving distance R, the PMF of number of lines (excluding the typical line) that are closer than R is Z r   p  P(Nl b(o, R) = k|R, E0 ) = exp − 2πλl exp(−2λv r2 − y 2 )dy 0  × 2πλl Rr 0 exp(−2λv k! k p r2 − y 2 )dy . (25) Proof: The proof follows from substituting E0 and Y0 = 0 in place of En and Yn in Lemma 10. 17 E. Laplace Transform of Interference Distribution In this subsection, we will determine the Laplace transform of the distribution of the interference power conditioned on the serving distance R. We will first consider the case where the typical receiver connects to the nth closest line to the origin. In this case, we group the sources of interference into the following five sets: (i) the set of nodes present on the typical line, (ii) the set of nodes present on the line that contains the serving node which is at a distance Yn , (iii) the set of nodes present on the lines that are closer than Yn (excluding the typical line), (iv) the set of nodes present on the lines that are farther than Yn but closer than the serving distance R (an annular region), and (v) the set of nodes present on the lines whose distance from the origin exceeds the serving distance R. We denote the interference from these five sets of nodes by I0 , In , Iin , Iann , and Iout , respectively. We will now derive the Laplace transform of distribution of interference from each of these components. The interference measured at the typical receiver from the nodes on the typical line is given P by I0 = wL ∈ΨL \b(o,R) GwL0 kwL0 k−α , where ΨL0 is the 1-D PPP on the typical line, GwL0 0 0 are the channel gains between the typical receiver and the interfering nodes at wL0 . While the Laplace transform of distribution of interference from nodes of a 1D PPP is very well-known, we still present the result in the following Lemma for completeness. Lemma 11. Conditioned on the event En , serving distance R, and the distance of the nth closest line Yn , the Laplace transform of distribution of interference from the nodes situated on the typical line L0 is " Z ∞ LI0 (s|r, yn , En ) = exp − 2λv r  # sx−α −m  dx . 1− 1+ m  (26) Proof: The distribution of nodes on the typical line is independent of the distance of the nth closest line Yn . Thus, the Laplace transform of distribution of interference from nodes on the typical line can be computed as " LI0 (s|r, yn , En ) = E[e−sI0 ] = E EG # Y exp − sGxL0 kwL0 k  −α wL0 ∈ΨL0 \b(o,R) " (a) =E Y wL0 ∈ΨL0 \b(o,R)  # "  # Z ∞  sx−α −m skwL0 k−α −m (b) = exp − 2λv 1− 1+ dx , 1+ m m r where (a) follows from the Gamma distribution of channel fading gains, and (b) follows from the PGFL of PPP and substituting x = kwL0 k. 18 Lemma 12. Conditioned on the event En , the serving distance R, and the distance of the nth closest line form the origin Yn , the Laplace transform of distribution of interference from the nodes on the line Ln is " Z ∞ LIn (s|r, yn , En ) = exp − 2λv √ 2 r2 −yn   #  s(x2 + yn2 )−α/2 −m 1− 1+ dx . m (27) Proof: The proof follows along the same lines as that of Lemma 11. Lemma 13. Conditioned on the event En , serving distance R, and the distance of the nth closest line Yn , the Laplace transform of distribution of interference from the nodes located on the lines that are closer than Yn is Z LIin (s|r, yn , En ) = yn " exp − 2λv 0   # !n−1  s(x2 + y 2 )−α/2 −m dy 1− 1+ dx . √ m yn r2 −y 2 Z ∞ (28) Proof: See Appendix D. Lemma 14. Conditioned on the event En , serving distance R, and the distance of the nth closest line from the origin Yn , the Laplace transform of distribution of interference from the nodes located on the lines that are farther than Yn and closer than R is Z "  Z r √ LIann (s|r, yn , En ) = exp − 2πλl exp(−2λv r2 − z 2 )dz 1− yn r  exp − 2λv yn ∞ #     s(x2 + y 2 )−α/2 −m dy × √ . 1− 1+ dx m (r − yn ) r2 −y 2 Z (29) Proof: See Appendix E. Lemma 15. Conditioned on the event En , serving distance R, and the distance of the nth closest line from the origin Yn , the Laplace transform of the distribution of the interference from the nodes located on the lines that are farther than the serving distance R is " Z ∞ Z ∞  LIout (s|r, yn , En ) = exp − 2πλl 1 − exp − 2λv 1 r  − 1+ Proof: See Appendix F. 0  s(x2 + y 2 )−α/2 −m m ! # dx dy (30) 19 The aggregate interference at the typical receiver is given by I = I0 + Iin + In + Iann + Iout . Conditioned on En , R, and Yn , the five components of interference are mutually independent and hence, the conditional Laplace transform of the distribution of total interference power is LI (s|r, yn , En ) = LI0 (s|r, yn , En )LIin (s|r, yn , En )LIn (s|r, yn , En ) × LIann (s|r, yn , En )LIout (s|r, yn , En ). (31) In case of event E0 , the five different sources of interference mentioned earlier is reduced to three since the typical line and the line containing the serving node are the same and there are no lines closer than the typical line. Therefore, the sources of interference in this case are: (i) the set of nodes on the typical line, (ii) the set of nodes on the lines that are closer than the serving distance R, and (iii) the set of nodes on the lines that are farther than the serving distance R. We denote the interference from the three sets of nodes by I0 , Iin , and Iout , respectively. The conditional Laplace transform of distribution of the interference from these three sources can be directly obtained from the results in Lemmas 11, 14, and 15 by substituting E0 and Y0 = 0 in place of En and Yn , as given in the following Corollary. Corollary 5. Conditioned on the event E0 and the serving distance R, the Laplace transform of interference power distribution is LI (s|r, E0 ) = LI0 (s|r, E0 )LIin (s|r, E0 )LIout (s|r, E0 ), (32) where " ∞ # sx−α −m  LI0 (s|r, E0 ) = exp − 2λv 1− 1+ dx , m r " Z  Z r √ LIin (s|r, E0 ) = exp − 2πλl exp(−2λv r2 − z 2 )dz 1− Z   0 Z ∞ × √  r2 −y 2 (33) r  exp − 2λv 0   #  s(x2 + y 2 )−α/2 −m dy 1− 1+ dx , m r (34) and " Z LIout (s|r, E0 ) = exp − 2πλl ∞  Z 1 − exp − 2λv r ∞  1 0  ! # s(x2 + y 2 )−α/2 −m dx dy . − 1+ m  (35) Now that we have determined the Laplace transform of distribution of interference power from all the components for both the cases En and E0 , we will derive the coverage probability next. 20 F. Coverage Probability The coverage probability is formally defined as the probability with which the SIR measured at the receiver exceeds a predetermined threshold β required for a successful communication. Using the results derived thus far, the total coverage probability at the typical receiver can be obtained in terms of the conditional Laplace transform of the distribution of the interference power as given in the following theorem. Theorem 1. The coverage probability of the typical receiver Pc is  m−1 ∞ m−1 X Z ∞ (−mβ)k  ∂ k X X Z ∞ Z ∞ (−mβ)k Pc = P(E0 ) L (s|r, E0 ) fR (r|E0 )dr + −kα k! k I r ∂s r−kα k! α 0 yn s=mβr n=1 k=0 0 k=0   k ∂ (36) LI (s|r, En , yn ) P(En |Yn )fR (r|En , yn )fYn (yn )drdyn . × ∂sk s=mβrα Proof: The coverage probability can be computed as ∞ X Pc = P(SIR > β) = P(Ei )P(SIR > β|Ei ) i=0 = P(E0 )P(SIR > β|E0 ) + ∞ X h i EYn P(En |Yn )P(SIR > β|En , Yn ) n=1  ∞ h i X h i = P(E0 )ER P(SIR > β|E0 , R) + EYn P(En |Yn )ER P(SIR > β|En , R, Yn ) n=1 Z ∞ = P(E0 ) P(SIR > β|E0 , R)fR (r|E0 )dr 0 + ∞ Z X n=1 0 ∞ Z ∞ P(SIR > β|En , R, Yn )P(En |Yn )fR (r|En , yn )fYn (yn )drdyn (37) yn Following the same approach presented in [26]–[28], we can obtain the final expression by rewriting the conditional coverage probability in (37) in terms of derivative of Laplace transform of the distribution of the interference power. This completes the proof. V. N UMERICAL R ESULTS AND D ISCUSSION In this section, we verify the accuracy of our analytical results by comparing the coverage probabilities evaluated using the theoretical expressions with the results obtained from the MonteCarlo simulations. We also analyze the trends in coverage probability as a function of network parameters. We then highlight the significance of our analysis by comparing our coverage probability results with that of a homogeneous 2D PPP model with the same node density, which is often used to approximate more sophisticated point processes that may not be as tractable as a homogeneous PPP. 21 1 Coverage probability, Pc Theory Simulation 0.8 0.6 0.4 0.2 Coverage probability, Pc 1 Increasing µl = 15, 25, 35, 45 km/km2 0.8 0.6 0.4 0.2 0 -20 0 20 40 -20 -10 0 10 20 SIR threshold, β (dB) SIR threshold, β (dB) Fig. 5. Coverage probability of the typical receiver as a 2 Fig. 6. Coverage probability of the typical receiver as a function of SIR threshold (µl = 35 km/km , λv = 35 function of SIR threshold (λv = 35 nodes/km, m = 1, nodes/km, m = 1, and α = 4). and α = 4). A. Numerical Results We simulate the Cox process model described in Section III in MATLAB with line density µl = 35 km/km2 , node density λv = 35 nodes/km, and path-loss exponent α = 4. For this setup, we evaluate the empirical coverage probability for a receiver located at the origin using Monte-Carlo simulations. We observe that our analytical results match exactly with the MonteCarlo simulations as depicted in Fig. 5. The key network parameters that have an impact on the coverage probability are the line density and the node density. Therefore, we will next study the impact of each of these parameters separately on the coverage probability. Impact of line density. We compute the coverage probability of the typical receiver for node density of λv = 35 nodes/km and different line densities of µl = 15, 25, 35, and 45 km/km2 . It can be observed from Fig. 6 that the coverage probability decreases as the line density increases. This trend in the coverage probability can be easily understood by examining the case where the receiver connects to a node on the typical line. In this case, an increase in the line density does not have any effect on the serving distance, however, it increases the interference power due to the reduced distance between the typical receiver and interfering nodes on other lines. Impact of node density. We compare the coverage probability of the typical receiver for node densities of λv = 20, 30, 40, and 50 nodes/km as a function of SIR threshold β. The other system parameters were fixed at µl = 35 km/km2 , m = 1, and α = 4. It can be observed from Fig. 7 that the coverage probability increases as the density of nodes on the lines increases. Recall that the distance from the typical receiver at the origin to any node on a line involves two 22 1 Coverage probability, Pc Coverage probability, Pc 1 0.8 0.6 0.4 Increasing λv = 20, 30, 40, 50 nodes/km µl = 10 km/km2 , λv = 100 nodes/km µl = 35 km/km2 , λv = 35 nodes/km µl = 150 km/km2 , λv = 5 nodes/km 2D PPP (λp = µl λv ) 0.8 0.6 0.4 0.2 0.2 0 -20 -10 0 10 20 -20 SIR threshold, β (dB) Fig. 7. Coverage probability of the typical receiver as a 2 function of SIR threshold (µl = 35 km/km , m = 1, and -10 0 10 20 30 40 50 SIR threshold, β (dB) Fig. 8. Coverage probability of the typical receiver as a function of SIR threshold (m = 1 and α = 4). α = 4). components: (i) perpendicular distance of the line from the origin, and (ii) the distance of the node (along the line) from the projection of the origin onto the line. When the density of nodes increases, the nodes come closer along the direction of the line, which decreases the second component of distance described above. Consequently, the decrement in the distance from the typical receiver to the nodes located on the lines that are closer to the origin is relatively more than the decrement in the distance to the nodes located on the lines that are farther away from the origin. This increases the desired signal power at a faster rate than the interference power, thus improving the SIR and hence the coverage probability at the typical receiver. B. Comparison with a Homogeneous 2D PPP Model In this subsection, we compare the coverage probability of the typical receiver obtained for the Cox process driven by PLP described in Section III with the results from a homogeneous 2D PPP model with the same node density, which is often used as a first-order approximation for more sophisticated point processes whose analysis may not be as tractable as a homogeneous PPP. We compute the coverage probability of the typical receiver for our setup with line density µl = 35 km/km2 and transmitter node density λv = 35 nodes/km. Thus, the equivalent node density of a homogeneous 2D PPP is λp = µl λv = 1225 nodes/km2 . The notable difference between the coverage probabilities obtained from the two models in Fig. 8 highlights the importance of our model for the analysis of vehicular networks where the locations of nodes are restricted to road systems. This suggests that the homogeneous 2D PPP is not a good approximation for the proposed Cox process-based model in all operational scenarios. In order to glean better insights, 23 we will now study the asymptotic behavior of the proposed model by evaluating the coverage probability for the extreme values of line and node densities. Low line density and high node density. In this case, the collinearity of the locations of nodes in the network is more distinct. Hence, the coverage probability for our setup with µl = 10 km/km2 and λv = 100 nodes/km deviates significantly from the results of 2D PPP model, as shown in Fig. 8. Also, due to the high density of nodes on each line, the typical receiver almost always connects to the closest node on the typical line. Therefore, the theoretical analysis for this case is relatively simple and the corresponding results are already given in the Corollaries. High line density and low node density. As the density of lines µl → ∞, it allows the nodes to be positioned almost anywhere in R2 . In addition to this, if the density of nodes on each line is low, only a small number of nodes appear to be aligned on a straight line. As a result, the nodes appear to be uniformly distributed in the entire 2D plane like a PPP. This explains the trend in Fig. 8, where the coverage probability of the typical receiver for our setup with a high line density of µl = 150 km/km2 and low node density of λv = 5 nodes/km is quite close to that of the 2D PPP model. VI. C ONCLUSION In this paper, we have presented an analytical method for the coverage analysis of a vehicular network in which the locations of nodes are confined to road systems. We have modeled the roads by a PLP and the nodes on each road by a homogeneous 1D PPP. Assuming that the typical receiver connects to its closest node in the network, we began our analysis with the derivation of several distance distributions which were necessary to determine the desired signal power at the typical receiver. We then computed the conditional distribution of lines in order to accurately characterize the interference at the typical receiver. We then derived an exact expression for SIR-based coverage probability of the typical receiver in terms of the derivative of Laplace transform of interference power distribution. We have verified the accuracy of our analytical results numerically by comparing them with the results obtained from Monte-Carlo simulations. Our analysis also reveals that the line density and the node density have a conflicting effect on the coverage probability. We then highlighted the significance of our analysis by comparing our coverage results with that of a homogeneous 2D PPP model with the same node density and also studied the asymptotic behavior of our model. This work has numerous extensions. First and foremost, the proposed model as well as the canonical analysis presented in this paper can be readily applied to study other metrics of 24 interest, such as information throughput and area spectral efficiency, which were not directly analyzed in this paper. The proposed approach can also be easily specialized to study the vehicular network performance under specific system constraints, such as those imposed by the mmWave frequencies, thus making the analysis relevant to a particular technology such as 5G. From stochastic geometry perspective, it will be useful to develop appropriate generative models for the proposed setup that simplify the analysis without compromising the accuracy of the results. Finally, while the proposed model is a reasonable canonical model for vehicular networks, there is always scope for making such models more accurate (often at the cost of reduced tractability) by obtaining network parameters from the actual data [29]. Therefore, another worthwhile extension of this work is to take a data-driven approach to vehicular network modeling, which will provide useful insights into the parameter ranges that are of interest in different morphologies. A PPENDIX A. Proof of Lemma 4 The CDF of Un conditioned on Yn is    FUn (un |yn ) = 1 − P(Un > un |Yn ) = 1 − P Nv b(o, un ) = 0|Yn , where Nv (b(o, un )) denotes the number of nodes within the disc of radius un centered at o. Therefore, we need to find the probability that there are no nodes on any of the lines that are closer than Yn that intersect the disc b(o, un ). We know that there are n − 1 lines whose distance from the origin is uniformly distributed in the range (0, yn ). Depending on the range of un , there are two possible cases: (i) if un is smaller than yn , then the number of lines intersecting the disc b(o, un ) follows a binomial distribution with parameters n − 1 and un , yn and (ii) if un exceeds yn , then all the n − 1 lines intersect the disc b(o, un ). Thus, we obtain a piece-wise conditional CDF for Un as follows: FUn (un |yn )  n−1   X       1 − P N b(o, u ) = 0|N b(o, u ) = j, Y v n l n n    j=0       = ×P Nl b(o, un ) = j|Yn ,     n−1   Y      1 − P N L ∩ b(o, u ) = 0|Y  v i n n  i=1 0 ≤ un < yn , yn ≤ un < ∞ 25 (a) =  n−1   j   X      1 − P N L ∩ b(o, u ) = 0|Y P N b(o, u ) = j|Y 0 ≤ un < yn ,  v n n l n n ,  j=0    n−1     1 − P Nv L ∩ b(o, un ) = 0|Yn yn ≤ un < ∞, (38) where (a) follows from the independent and identically distributed (i.i.d.) locations of the nodes on the lines. In step (a), L denotes an arbitrarily chosen line that intersects the disc b(o, un ). We will now derive the expression for each term in (38). For the case 0 ≤ un < yn , we know that the number of lines intersecting the disc b(o, un ) follows a binomial distribution. Therefore,   n − 1 u j   un n−1−j n 1− P Nl b(o, un ) = j|Yn = . (39) yn yn j We will now evaluate the probability that there are no nodes on the segment of an arbitrarily chosen line L that intersects the disc b(o, un ). We denote the perpendicular distance of the line from the origin by Z which is uniformly distributed in the range (0, un ) for the first case. Conditioned on Z, the probability that there are no nodes on the segment that intersects b(o, un ) is given by   p   P Nv L ∩ b(o, un ) = 0|Z, Yn = exp − λv 2 u2n − z 2 . This result follows from the void probability of 1D-PPP. By taking the expectation over Z, we now obtain the probability that there are no nodes on the segment of a randomly chosen line that intersects the disc b(o, un ) as   Z  P Nv L ∩ b(o, un ) = 0|Yn = un p 1 dz. (40) exp − λv 2 u2n − z 2 un 0 Similarly, for the second case where yn ≤ un < ∞, the distances of the lines that intersect the disc b(0, un ) are uniformly distributed in the range (0, yn ). Therefore, the desired probability in this case is given by   Z  P Nv L ∩ b(o, un ) = 0|Yn = yn p 1 dz. (41) exp − λv 2 u2n − z 2 yn 0 Upon substituting (39), (40), and (41) in (38) and simplifying the resulting expression, we obtain the final result. The PDF of Un can then be computed by taking the derivative of FUn (un |yn ) with respect to un . B. Proof of Lemma 5 The CDF of Vn conditioned on Yn is    FVn (vn |yn ) = 1 − P(Vn > vn |Yn ) = 1 − P Nv b(o, vn ) \ b(o, yn ) = 0|Yn 26 ∞    nl X   = 1− P Nl b(o, vn ) \ b(o, yn ) = nl |Yn P Nv L ∩ {b(o, vn ) \ b(o, yn )} = 0|Yn , (a) nl =0 (42) where (a) follows from the i.i.d. locations of nodes on the lines. Note that L denotes an arbitrarily chosen line whose distance from the origin is greater than vn and smaller than yn . From the definition of PLP, we know that the number of lines whose distances from the origin are in the range (yn , vn ) follows a Poisson distribution with mean 2πλl (vn − yn ). Thus,   exp − 2πλ (v − y ) 2πλ (v − y )nl  l n n l n n . (43) P Nl b(o, vn ) \ b(o, yn ) = nl |Yn = nl ! The evaluation of the second term in the equation (42) is similar to that of (40) in the proof of Lemma 4. The only change is that the distances of the lines in this case are uniformly distributed in the range (yn , vn ). Hence, the desired probability is obtained as   Z vn p   P Nv L ∩ {b(o, vn ) \ b(o, yn )} = 0|Yn = exp − λv 2 vn2 − z 2 1 dz. (44) (vn − yn ) yn Substituting (43) and (44) in (42), we obtain the final expression. The conditional PDF of Vn can then be obtained by taking the derivative of FVn (vn |yn ) w.r.t. vn . C. Proof of Lemma 10 The conditional PMF of number of lines can be computed as      (a) P En Nl b(o, r) \ b(o, yn ) = k, Yn , R    P Nl b(o, r) \ b(o, yn ) = k En , Yn , R = P En |Yn , R    × P Nl b(o, r) \ b(o, yn ) = k|Yn , R , (45) where (a) follows from the application of Bayes’ theorem. We now need to determine each term in (45) to compute the desired conditional PMF. The first term in the numerator is nothing but the probability that there are no nodes inside a disc of radius r centered at the origin, given that there are k lines that are farther than yn and closer than r. In addition to these k lines, there are n − 1 lines that are closer than yn , one line at a distance of yn , and the typical line that intersect the disc b(o, r). Therefore, the probability that there are no nodes on any of these lines that intersect the disc b(o, r) can be computed as follows:    P En Nl b(o, r) \ b(o, yn ) = k, Yn , R     = P Nv b(o, r) = 0 Nl b(o, r) \ b(o, yn ) = k, Yn , R   n−1  Y    = P Nv L0 ∩ b(o, r) = 0|Yn , R P Nv Li ∩ b(o, r) = 0|Yn , R i=1 27 k  Y    × P Nv Ln ∩ b(o, r) = 0|Yn , R P Nv Ln+j ∩ b(o, r) = 0|Yn , R   (46) j=1 n−1 p p  dy 2 2 exp − 2λv r2 − yn2 exp(−2λv r − y ) = exp(−2λv r) yn 0 Z r k p  dy 2 2 exp − 2λv r − y × . (r − yn ) yn Z yn (47) The second term in the numerator in (45) is the probability that there are k lines that are farther than yn and closer than r. Since both r and yn are fixed, the number of lines that are farther than yn and closer than r simply follows a Poisson distribution with mean 2πλl (r − yn ). Therefore, the second term in the numerator is given by   exp − 2πλ (r − y ) 2πλ (r − y )k  l n l n . P Nl b(o, r) \ b(o, yn ) = k|Yn , R = k! (48) The denominator in (45) is the probability of occurrence of event En conditioned on both Yn and R. This is nothing but the probability that there are no nodes inside the disc of radius r. This can be easily computed using law of total probability as follows: ∞   X       P En |Yn , R = P En Nl b(o, r) \ b(o, yn ) = k, Yn , R P Nl b(o, r) \ b(o, yn ) = k|Yn , R k=0 n−1 p p  dy exp(−2λv r2 − y 2 ) exp − 2λv r2 − yn2 yn 0 k  Z r k ∞ p X  dy 2πλl (r − yn ) 2 2 exp − 2λv r − y × exp − 2πλl (r − yn ) k! (r − yn ) yn k=0   Z r p p  = exp − 2λv r − 2λv r2 − yn2 − 2πλl 1 − exp − 2λv r2 − y 2 dy Z (a) = exp(−2λv r) yn (49) yn Z × yn exp(−2λv 0 p dy r2 − y 2 ) yn n−1 , (50) where (a) follows from substituting (47) and (48) in (49). Substituting (47), (48), and (50) in (45), we obtain the final expression. D. Proof of Lemma 13 We know that there are n − 1 lines (excluding the typical line) closer than Yn whose distances from the origin are uniformly distributed in the range (0, yn ). The Laplace transform of distribution of interference from an arbitrarily chosen line L, conditioned on its distance from the origin Y is given by " Z ∞ LIL (s|r, yn , En , y) = exp − 2λv √ r2 −y 2   #  s(x2 + y 2 )−α/2 −m 1− 1+ dx . m (51) 28 This expression is similar to the result obtained in Lemma 12. The lower limit of the integral follows from the condition that there must be no nodes closer than r. Now, taking the expectation over Y which is uniformly distributed in the range (0, yn ), we obtain the conditional Laplace transform of distribution of interference from a single line as follows: Z yn dy LIL (s|r, yn , En , y) LIL (s|r, yn , En ) = yn Z0 yn " Z ∞    # dy s(x2 + y 2 )−α/2 −m exp − 2λv √ dx . = 1− 1+ m yn (52) r2 −y 2 0 Owing to the i.i.d. locations of nodes on the lines, the conditional Laplace transform of distribution of interference from the nodes on all the n − 1 lines is given by n−1 LIin (s|r, yn , En ) = LIL (s|r, yn , En ) Z yn " Z ∞    # !n−1 s(x2 + y 2 )−α/2 −m dy = exp − 2λv √ . 1− 1+ dx m yn (53) r2 −y 2 0 E. Proof of Lemma 14 We know that the distances of the random number of lines that are farther than yn and closer than r are uniformly distributed in the range (yn , r). As given in (51), the Laplace transform of interference from an arbitrarily chosen line L conditioned on the distance of the line from the origin Y is " ∞  #   2 2 −α/2 −m s(x + y ) dx . 1− 1+ √ m r2 −y 2 Z LIL (s|r, yn , En , y) = exp − 2λv Thus, the conditionalZLaplace transform of distribution of interference from a single line is " Z ∞   r  # dy s(x2 + y 2 )−α/2 −m . exp − 2λv √ dx LIL (s|r, yn , En ) = 1− 1+ m (r − yn ) r2 −y 2 yn (54) Owing to the i.i.d. locations of nodes on the lines, the conditional Laplace transform of interference distribution from all the lines that are farther than Yn and closer than R can be computed as ∞   i X  LIann (s|r, yn , En ) = P Nl b(o, r) \ b(o, yn ) = i LIL (s|r, yn , En ) (55) i=0 (a) = exp " Z r √ exp(−2λv r2 − z 2 )dz − 2πλl #  1 − LIL (s|r, yn , En ) , yn (56) where (a) follows from the substitution of the PMF given by Lemma 10 in (55). Substituting (54) in (56), we obtain the final expression. 29 F. Proof of Lemma 15 Following the same approach as in Lemma 14, we first determine the conditional Laplace transform of distribution of interference from an arbitrary line L at a distance Y from the origin as follows: " Z ∞  LIL (s|r, yn , En , y) = exp − 2λv 0  # s(x2 + y 2 )−α/2 −m dx . 1− 1+ m  (57) Owing to the independent distribution of nodes on the lines, for a given realization of the line process, the conditional Laplace transform of interference distribution is simply the product of the Laplace transform of distribution of interference from each of these lines. Therefore, we can write the Laplace transform of distribution of interference conditioned on the line process Φl0 ≡ Φl ∪ L0 as LIout (s|r, yn , En , Φl0 ) = Y LIL (s|r, yn , En , y), (58) y∈Ψl0 where Ψl0 represents the set of distances of the lines from the origin, which is a 1D PPP with density 2πλl as shown in the proof of Lemma 1. By taking the expectation over Ψl0 , we obtain the desired result as follows: LIout (s|r, yn , En ) = EΨl0  Y  LIL (s|r, yn , En , y) y∈Ψl0 (a)  Z ∞ = exp − 2πλl   1 − LIL (s|r, yn , En , y) dy , (59) r where (a) follows from the PGFL of PPP Ψl0 . We obtain the final expression upon substituting (57) in (59). R EFERENCES [1] H. Hartenstein and L. P. Laberteaux, “A tutorial survey on vehicular ad hoc networks,” IEEE Commun. Magazine, vol. 46, no. 6, pp. 164–171, Jun. 2008. [2] S. Biswas, R. Tatchikou, and F. Dion, “Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety,” IEEE Commun. Magazine, vol. 44, no. 1, pp. 74–82, Jan. 2006. [3] P. Papadimitratos, A. D. L. Fortelle, K. Evenssen, R. Brignolo, and S. Cosenza, “Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation,” IEEE Commun. Magazine, vol. 47, no. 11, pp. 84–95, Nov. 2009. [4] H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, “Modeling and analysis of K-tier downlink heterogeneous cellular networks,” IEEE Journal on Sel. Areas in Commun, vol. 30, no. 3, pp. 550–560, Apr. 2012. [5] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach to coverage and rate in cellular networks,” IEEE Trans. on Commun., vol. 59, no. 11, pp. 3122–3134, Nov. 2011. [6] J. G. Andrews, A. K. Gupta, and H. S. Dhillon, “A primer on cellular network analysis using stochastic geometry,” arXiv preprint, Oct. 2016, available online: arxiv.org/abs/1604.03183. 30 [7] H. ElSawy, A. Sultan-Salem, M. S. Alouini, and M. Z. Win, “Modeling and analysis of cellular networks using stochastic geometry: A tutorial,” IEEE Communications Surveys Tutorials, vol. 19, no. 1, pp. 167–203, Firstquarter 2017. [8] Y. Wang, K. Venugopal, A. F. Molisch, and R. W. Heath Jr., “MmWave vehicle-to-infrastructure communication: Analysis of urban microcellular networks,” 2017, available online: arxiv.org/abs/1702.08122. [9] F. Baccelli, M. Klein, M. Lebourges, and S. Zuyev, “Stochastic geometry and architecture of communication networks,” Telecommunication Systems, vol. 7, no. 1, pp. 209–227, Jun. 1997. [10] C. Gloaguen, F. Fleischer, H. Schmidt, and V. Schmidt, “Analysis of shortest paths and subscriber line lengths in telecommunication access networks,” Networks and Spatial Economics, vol. 10, no. 1, pp. 15–47, Mar. 2010. [11] F. Voss, C. Gloaguen, F. Fleischer, and V. Schmidt, “Distributional properties of Euclidean distances in wireless networks involving road systems,” IEEE Journal on Sel. Areas in Commun., vol. 27, no. 7, pp. 1047–1055, Sep. 2009. [12] F. Morlot, “A population model based on a Poisson line tessellation,” in Proc., Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, May 2012, pp. 337–342. [13] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic geometry and its applications. John Wiley & Sons, 2013. [14] M. Haenggi, Stochastic Geometry for Wireless Networks. Cambridge University Press, 2013. [15] B. Blaszczyszyn, P. Muhlethaler, and Y. Toor, “Maximizing throughput of linear vehicular Ad-hoc NETworks (VANETs) – a stochastic approach,” in European Wireless Conf., May 2009, pp. 32–36. [16] S. Busanelli, G. Ferrari, and R. Gruppini, “Performance analysis of broadcast protocols in VANETs with Poisson vehicle distribution,” in Intl. Conf. on ITS Telecommunications, Aug 2011, pp. 133–138. [17] M. J. Farooq, H. ElSawy, and M. S. Alouini, “A stochastic geometry model for multi-hop highway vehicular communication,” IEEE Trans. on Wireless Commun., vol. 15, no. 3, pp. 2276–2291, Mar. 2016. [18] M. Mabiala, A. Busson, and V. Veque, “Inside VANET: Hybrid network dimensioning and routing protocol comparison,” in Proc., IEEE Veh. Technology Conf., Apr. 2007, pp. 227–232. [19] M. Ni, M. Hu, Z. Wang, and Z. Zhong, “Packet reception probability of VANETs in urban intersecton scenario,” in Intl. Conf. on Connected Vehicles and Expo, Oct. 2015, pp. 124–125. [20] E. Steinmetz, M. Wildemeersch, T. Q. S. Quek, and H. Wymeersch, “A stochastic geometry model for vehicular communication near intersections,” in Proc., IEEE Globecom Workshops, Dec. 2015, pp. 1–6. [21] C. Gloaguen, F. Fleischer, H. Schmidt, and V. Schmidt, “Simulation of typical Cox Voronoi cells with a special regard to implementation tests,” Mathematical Methods of Operations Research, vol. 62, no. 3, pp. 357–373, 2005. [22] B. Blaszczyszyn and P. Muhlethaler, “Random linear multihop relaying in a general field of interferers using spatial Aloha,” IEEE Trans. on Wireless Commun., vol. 14, no. 7, pp. 3700–3714, Jul. 2015. [23] S. Aditya, H. S. Dhillon, A. F. Molisch, and H. Behairy, “Asymptotic blind-spot analysis of localization networks under correlated blocking using a Poisson line process,” IEEE Wireless Commun. Letters, to appear. [24] R. Schneider and W. Weil, Stochastic and Integral Geometry. Springer Berlin Heidelberg, 2008. [25] A. Leon-Garcia, Probability, Statistics, and Random Processes For Electrical Engineering. Pearson Education, 2011. [26] V. V. Chetlur and H. S. Dhillon, “Downlink coverage analysis for a finite 3D wireless network of unmanned aerial vehicles,” IEEE Trans. on Commun., to appear. [27] R. Tanbourgi, H. S. Dhillon, J. G. Andrews, and F. K. Jondral, “Dual-branch MRC receivers under spatial interference correlation and Nakagami fading,” IEEE Trans. on Commun., vol. 62, no. 6, pp. 1830–1844, Jun. 2014. [28] Y. J. Chun, S. L. Cotton, H. S. Dhillon, A. Ghrayeb, and M. O. Hasna, “A stochastic geometric analysis of device-todevice communications operating over generalized fading channels,” IEEE Trans. on Wireless Commun., vol. 16, no. 7, pp. 4151–4165, Jul. 2017. [29] C. Gloaguen, F. Fleischer, H. Schmidt, and V. Schmidt, “Fitting of stochastic telecommunication network models via distance measures and Monte–Carlo tests,” Telecommunication Systems, vol. 31, no. 4, pp. 353–377, Apr. 2006.
7cs.IT
ACO Implementation for Sequence Alignment with Genetic Algorithms Aaron Lee [email protected] Livia King [email protected] December 1, 2002 Abstract In this paper, we implement Ant Colony Optimization (ACO) for sequence alignment. ACO is a meta-heuristic recently developed for nearest neighbor approximations in large, NP-hard search spaces. Here we use a genetic algorithm approach to evolve the best parameters for an ACO designed to align two sequences. We then used the best parameters found to interpolate approximate optimal parameters for a given string length within a range. The basis of our comparison is the alignment given by the Needleman-Wunsch algorithm. We found that ACO can indeed be applied to sequence alignment. While it is computationally expensive compared to other equivalent algorithms, it is a promising algorithm that can be readily applied to a variety of other biological problems. Motivation found, the ants would start to wander back along the path that they had traversed to the ant colony. Because the ant who came back first with food would double the pheromone on the trail, the next ant to leave the ant colony in search of food who have a higher chance to take that path because ants will tend to follow trails that have the highest pheromone concentration [1]. In nature, it was found that this often led to suboptimal solutions. The decay of the pheromone was occasionally not fast enough to cause the ants to seek other solutions; hence, there was a slight propensity to follow the path of the ant that returned back to the ant colony first. In other words, there was too much of a weight on the ant that reached the first food source, because the first food source found was not necessarily the closest food source globally. In computers, this limitation was easily avoided by adding a pheromone evaporation effect where the ants’ pheromones would decrease in concentration as time progressed, preventing the early convergence onto local minimums [5]. Ant colony optimization (ACO) is a novel algorithm recently developed for nearest neighbor approximations in large, NP-hard search spaces [1]. The algorithm itself is more accurately described as a meta-heuristic that must be applied differently to different problems. ACOs have been applied successfully to both the Traveling Salesman Problem (TSP) [2] and the Quadratic Assignment Problem (QAP) [3]. More recently, better methods of attaining optimal values for ACOs have been developed. In 1998, Bottee et al. used genetic algorithms on top of ACOs to achieve locally optimal values for ACOs very quickly [4]. As far as we have been able to tell, the ACO algorithm has not yet been applied to biological problems. Most biological problems today face the same difficulty as other NP-hard computational problems. The ACO algorithm seems particularly well-suited for these kinds of applications. We propose using ant colony optimization with genetic algorithms and applying the resulting ACO to two sequence alignment. Critical Review Introduction Dorigo, Caro, and Gambardella outlined in their 1999 paper the basic characteristics of the ant algorithm and reported on some of the uses for which it has been tested. They list the ant algorithm as deriving many of its characteristics from real ant colonies. For example, artificial ants, like real ants, are part of a colony of cooperating individuals, and use pheromones to facilitate indirect communication between Ant Colony Optimization is a meta-heuristic that was developed after studying the behavior of ants and learning how ants were able to solve constraint optimization problems in nature. It was found that ants laid down pheromone trails as they traversed the ground. As soon as a food source was 1 themselves and other ants. Although each of the individuals in a population is simple and not capable of deriving a good solution to a problem, the population as a whole can come up with a good solution, concept that is now known as swarm intelligence. Both real ants and artificial ants make decisions using local information. Unlike real ants, however, artificial ants have some abilities that allow them to derive higher quality solutions than their natural counterparts. Artificial ants can keep a memory of past actions. Their methods of pheromone depositing are also different. They may deposit varying amounts of pheromones based on the quality of the solution found and might deposit pheromones after the generation of a complete solution rather than step by step. Other abilities like the ability to look ahead several steps, or to backtrack, can also be added to artificial ants. The first problem ant algorithms were applied to was the traveling salesman problem (TSP), a commonly researched NP hard problem in which a theoretical salesman has to find the shortest path connecting n cities. Three algorithms based on the ACO meta-heuristic were defined, and the ”ant-cycle” algorithm (later called Ant System, or AS), a variation in which the ants deposited pheromone after they finished constructing their solution was found to be the most effective. The ant algorithm performed as well as several other general purpose heuristics on relatively small problems (involving 30 to 75 cities). However, the ant algorithm was not able to come up with the best known solution when it was applied to larger problems, although it was able to find good solutions quickly. Later variations on the AS algorithm, most notably ant colony systems (ACS), were more successful and beat many other heuristics in terms of solution quality and CPU time when run on standard TSP problems. ACO was next applied to the Quadratic Assignment problem, which involves assigning n facilities to n locations so as to minimize cost. In this case, the ACO algorithms tested are the best available heuristic. ACO has also been shown to be the best available heuristic by far in the sequential ordering problem. Other problems to which ACO has been applied include Job shop scheduling, vehicle routing, graph coloring, shortest common supersequence, connection oriented network routing, and connection-less network routing. From the results listed by Dorigo et. al, it can be seen that ACO is a valid approach that has been successful for many problems. However, there are some limitations to ACO’s potential. First, because of the ant algorithm’s random nature, the success of ant algorithms very problem dependent and it is hard to predict what variations on the algorithm will be successful without actually implementing the algorithm and testing it. There are also limitations as to which problems can be solved with ACO. The problem must lend itself to being represented by ants traveling across a virtual space. Each state available to the ant must also not have many neighbor states, as too many neighbor states will minimize the chance of two ants appearing in the same state, and render the pheromone communication worthless. Design ACO We closely modeled our approach after Bottee and Bonabeau’s algorithm for solving the traveling salesman problem. A sequence alignment between two sequences n and m bases long is represented by a n x m Needleman-wunsch scoring matrix. At the beginning of every generation, a set number of ants start at the bottom right corner (which represents the end of an alignment) of the matrix, and traverse the matrix until they reach the beginning of the alignment (when the ant reaches either the top or left edge of the matrix). From any given position, an ant can move in one of three directions: up, left, or diagonally up-left. As is the case with the Needleman-Wunsch algorithm, a move in the former two directions represents a gap in one of the strands, while a diagonal move is either a match or a mismatch. At every step, the ants use a scoring algorithm to decide what direction to move in. Every direction (up, left, or diagonal) is assigned a score based on the following formula: Wφ φi · M Wm · R Wr Where φi is the pheromones level for step i in a particular direction, M has a value of 2 if going in that direction will result in a match and 1 if it results in a mismatch, R is the regional weighting score that encourages ants to move toward the diagonal of the matrix, and Wφ , Wm , and Wr are the weights assigned to those values. The ant chooses a number pi . If pi is greater than the parameter p, then the ant simply moves in the direction with the highest score. If pi is less than p, the ant chooses the direction using a weighted probability based on the scores. After each ant moves, it leaves a pheromone trail according to the formula. φi+1 = (φi + φstep ) · ql Where φi is the old pheromone level, phii+1 is the new pheromone level, and ql is a number between 0 and 1 that represents the local decay of pheromones. As each ant moves, it also scores its path using a Needleman-Wunsch like scoring scheme that adds points for matches and subtracts points for mismatches and gaps. At the end of each generation, the best path is reinforced according to the formula. φi+1 = (φi + φstep · (Sg /Sh ) 2 Variable g a φ0 φstep Wφ Wm Wr ql qg p Range 10 - 40 5 - 30 0-1 0-1 0 - 10 0 - 10 0 - 10 0-1 0-1 0-1 In calculating the output of the ACO given a set of parameters, we first showed empirically that the distribution of scores followed a normal distribution. This allowed us to easily throw out the data points that were outside x ± σ and calculate a corrected mean (x corr ) during the evolution of the parameters. This prevents random extreme values from affecting the mean and is a valid procedure after verifying that the output from the ACO is normally distributed. We also measured the total time to run all the trials of for each parameter (ttrials ). Using these two variables we can assign a score to each parameter (Pi ) 1 : Score(Pi ) = Table 1: Variables optimized for in the genetic algorithm. x corr (i)3 ttrials (i) (1) Using this scoring function, we were able to make a relative ranking of the current population of the highest scoring parameters. We then kept the top 1% of the population as “parents.” The next generation was then generated using various parents and copy mutations (see Appendix to see the actual implementation of the genetic algorithm). Several runs for each string length was preformed, in hopes of finding a set of parameters that came up often which would represent a locally optimal solution. After the best parameters for each of the strings were found, we can interpolate and approximate the best set of parameters for any string length up to a length of 100 characters. where Sg is the score of the best path of this generation, and Sh is the best score obtained so far overall. The entire matrix also undergoes a global decay: φi+1 = φi · qg where qg is the global decay parameter. The simulation keeps on looping through generations until the score for the best alignment converges, or until the maximum number of generations is reached. Genetic Algorithm Results The motivation for using a genetic algorithm is simple: all the parameters above can be approximately determined using a genetic algorithm which evolves for the best set of parameters. Since hand-tweaking of ACO parameters can be a futile exercise and often a waste of time, genetic algorithms provide a convenient alternative albeit it may sometimes be inaccurate. We used a very simple implementation of genetic algorithms to quickly find a set of parameters that were locally optimal at discrete steps of search string length. At the beginning of every generation, two strings are randomly generated. The first string is the template string which is simply a random string filled with four possible values (0, 1, 2, 3) at every given position. The second string is generated by performing approximately 33% to 66% random mutations of the template string. This includes insertions of a random value, deletion at a given position, and a point mutation of changing one value to another value at a given point in the string. This generation process hopefully produces two strings that are mostly similar but at the same time contain significant differences in their sequences. Using a fixed string length size for the two similar strings that will be aligned, we evolved a best set of parameters. Table 1 shows the variables and their possible range. We then used a series of string lengths (10, 20, 30, 40, 50, 60, 70, 80, 90, 100) and attempted to evolve the best set of parameters for each of these parameters. Ant Colony Optimization Results Using the same string generators for the genetic algorithm, a string length of 50 was set. Then a random set of parameters were chosen. Afterwards, the ACO was run with these parameters and the chosen strings for 100 repetitions. The outputting scores were then gathered and compiled into a histogram. This process was repeated several times. Figure 1 shows one such histogram. All of the outputs from the ACOs followed a similar distribution to the one shown in Figure 1. Hence we were able to conclude that to a first order approximation, we can expect the ACO output to be normally distributed. Given that the distribution is normal, we use this knowledge to save time during the genetic algorithm run and to make a good approximation of the mean score given by a set of parameters as was shown above. Genetic Algorithm Results We explored the range of 10 - 100 characters for the string length. Our genetic algorithm probed this string length 1 It was found that if x corr is not more emphasized than time, then the GA will start sacrificing score for faster and faster times. This is an undesirable result; raising to the third power provided better results. 3 range by attempting to find the best set of parameters in 10 character increments: we ran a separate genetic algorithm for the string lengths 10, 20, 30, 40, 50, 60, 70, 80, 90, and 100 characters. Each of these string lengths were run multiple times with a population of 500 parameter sets, and the genetic algorithm was stopped after the population had reached an equilibrium for about 10 generations. Figure 2 and Figure 3 show the trends for each of the variables.2 It is clear from these trends that most of the variables follow a linear trend. The only exceptions are g and a which both seem to require a lower limit and then proceed to grow starting at 80 string length. (There is not enough data to support what kind of growth the trend follows.) All other variables increase linearly, decrease linearly, or remain constant. Using these variables we were able to interpolate values for any string length between 10 to 100. Using this system of approximation, we were able to design an optimized form of the ACO implementation that first calculated approximate optimal values for the parameter set and then runs the ACO on the input strings. 14 12 10 + + +| +| | | | | + + + + 8 | + ×| + × | 6 | × × × × × × × × 4 2 0 0 20 40 60 80 100 String Length Figure 2: This figure shows the trends for the variables in the range of 0 to 15. represents g. × represents a. + | represents Wφ . represents Wm . represents Wr . provided a sanity check to make sure that the our algorithm did indeed provide a satisfactory alignment. In testing unalignable pairs of sequences, we choose sequences that were reversed of each other and no character appears twice in these sequences. Type II alignments provide a test to see how the ACO deals with pairs of sequences that it had not evolved to handle. In order to test Type III, we generate a pair of sequences in the similar manner as we did during the evolutions of the parameters for genetic algorithms. Theoretically, it is these sequences that should provide the most interesting alignments. Table 2 shows an example alignment for each one of these categories. There is not an objective measurement that would provide a quantitative degree of similarity between the alignments, hence we only provide a representative alignment of each of the categories instead. Optimized ACO Results Using the parameter set given above, we modified our ACO implementation to use the parameter table and interpolate approximately optimal parameters for a given input string (See Appendix A for the actual implementation). We provide here some of the sample alignments outputted by our implementation and compare them to the NeedlemanWunsch sequence alignment. We divide the category of pairs of sequences into one of three types: highly similar (Type I), unalignable (Type II), and in between (Type III). This provides a qualitative basis for comparison between the Needleman-Wunsch and our ACO implementation. To test highly similar pairs of sequences, we choose sequences that were nearly the same. Thus Type I alignments 2 Note: variables with similar ranges were grouped together to save space. Type I 60 50 40 30 II III 20 10 0 ACO Needleman-Wunsch abcdefgggghijklmnopq ||||||| |||||||||| abcdefg---hijklmnopq qpo-nmlkjihgfedcba | -abcdefghijklmnopq -CACTTTTTCAGATCTATTG |||||||||||| |||| CTACTTTTTCAGATATATTC abcdefgggghijklmnopq ||||||| |||||||||| abcdefg---hijklmnopq qponmlkjihgfedcba | abcdefghijklmnopq C-ACTTTTTCAGATCTATTG | |||||||||||| |||| CTACTTTTTCAGATATATTC Table 2: Sample alignments from both ACO and Needleman-Wunsch. Type I are pairs of sequences that are highly similar. Type II are pairs of sequences that are unalignable. Finally, Type III are pairs of sequences that are somewhere in between. 45 47 49 51 53 55 57 59 61 63 65 67 69 71 Figure 1: A histogram of output of one ACO run with same set of parameters for a 100 runs. 4 + 1.0 | + 0.8 | + | + | + | | | | | | 250 + + + + 0.6 + + 0.4 × × × × × × 200 150 × × 300 × × 100 50 0.2 0 0 0 20 40 60 80 100 −50 String Length ++ + + +++++ + + + + ++ ++ +++++++ ++++++ +++++++ + + +++++++ +++ ++++++++++ + + + + + + + + + + + + + + +++++ + +++++++++++++++++++++ ++ +++ +++ ++++++++++ +++ ++++ ++++++++++ + + + + + + + + + ++ +++++++++++++++++++++++++++++++++++++++ + + ++++++++ ++++ +++++++++++++ ++++++++ +++ + +++++++++ ++++ +++++++++ +++++ +++++++ + ++++++++++++++++ ++++++++++ ++++++ ++++++++++++ + + + + + + + + + + + + + + + + +++++++++++++++++++ ++++++++++++++++++++ ++++++ +++ ++++ +++++++++++++++ +++ +++++++ ++ ++ ++++ +++ +++++ +++++ ++ ++ +++++ +++++++++ ++++++++++ +++ +++ + + + + + + + + + + + + + + + + + + + + ++ + + + + + ++++ ++ + ++ + +++++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + ++ +++++++++++++++++++ ++ ++ + + + ++ ++ + +++ +++++++++ +++ ++++++ ++++++ + + + + + + + + + + + + + + + ++++ ++++ + + + +++++++ + ++ +++++ ++ +++++++ + +++ ++ ++++++++ + + + ++ +++ ++++++++++++ + + + + + + + + ++ + + + + + 50 100 150 200 250 300 350 Figure 4: This is a scatter plot of scores from both Needleman-Wunsch and ACO. The x-axis is the Needleman-Wunsch scores, and the y-axis is the ACO scores. Figure 3: This figure shows the trends for the variables in the range of 0 to 1. + represents φ0 . × represents φstep . represents qg . represents qg . | represents p. Some problems and sources of error were encountered during the course of experimental runs of our implementation. We realize that there is an error in our genetic algorithm in that we should have optimized for high scoring consistency and low run time instead of optimizing for high average score and low run time. This produced parameter sets for the ACO that were suboptimal for the problem that we were addressing. Due to the time constraint of the project, we were not able to fix this issue in time for the deadline. Also, the higher string lengths such as the 90 and 100 case were based on data that was not completely reliable in that we did not have enough time to run the genetic algorithm multiple times with many generations due to the highly computationally expensive nature of this algorithm. This produced possibly suboptimal parameter sets for these string lengths and hence cannot be as well trusted as the parameter sets generated for the lower part of the string length range. Finally, we realize that genetic algorithms have the danger of producing suboptimal results, but we are confident in the results we have obtained because multiple runs of the genetic algorithm for a given string length gave results that were very similar to each other, an indication that the parameter sets generated were indeed near the global optimum. A few improvements could be made to the ACO implementation for sequence alignment as well. The way that it is currently implemented, there is a limitation in the accuracy of the outputted alignments. The ants crawling up from the bottom right of the scoring matrix to the upper left cause alignments to be very accurate at the beginning of the traversal but not at the end of the alignment since the paths of the ants will diverge towards the end. This limitation can be easily overcome by adding an additional feature of having Discussion Analysis At first glance, Table 2 provides some very promising results. It shows that the ACO actually preforms at a level of reaching nearly the mathematically optimal solution. In Type I, the alignments are exactly the same. For Type II, the ACO alignment is suboptimal compared with the NeedlemanWunsch because there is an extra gap that is not necessary. For Type III, the alignment is again nearly optimal: the main difference comes at the beginning of the alignment where the ACO could have made an extra match. It is interesting to note that on several other alignments, the main difference between ACO and Needleman-Wunsch comes at the beginning, a matter that we will address later. Hence even from a completely qualitative standpoint, it can be said that the ACO does provide satisfactory results. While it can not be considered to be faster or more efficient than Needleman-Wunsch, it can, nevertheless, be applied to sequence alignment. Conclusion As the results of the optimized ACO runs have shown, the ACO algorithm is a powerful algorithm that can be readily applied to sequence alignment. While it is true that this particular implementation of the ACO with respect to sequence alignment is not algorithmically faster or more efficient than the Needleman-Wunsch dynamic programming equivalent, the purpose of this paper was to show that the ACO is a viable algorithm that can be used to solve computational biology problems perhaps more efficiently when searching an NP hard search space. 5 non-scoring ants dropped in random places on the scoring matrix. This way, areas around where the ants were dropped will have better alignment paths for when the scoring ants which started in the lower left corner reached the paths that were reinforced by the non-scoring ants. If local alignment is desired, then the random ants can be simply considered to be scoring. In conclusion, we found that the ACO algorithm is an algorithm that can be used to solve biological problems. While in this case, it is not necessarily better than the existing algorithm for two sequence alignment; we are confident that the ACO can be readily adapted for much more complicated problems such as Multi-Sequence Alignment (MSA). In this case, the search space is much larger and the Needleman-Wunsch algorithm is out of the question; hence, a good adaption of the ACO meta-heuristic might provide a solution that rivals even the fastest MSA implementation today. Additional applications of ACO to biological problems could be such problems as clustering or even an ACO adapted algorithm for protein folding. Contributions Thanks to Qian Zhang for his suggestions on ways of improving our algorithm. To Charles Duan for helping us with LATEX. To the Harvard NICE computing environment. To our TF, Jon Radoff for answering our never-ending questions. And to Professor Church for his instruction of this class. References [1] Dorigo, M. and Gambardella, L.M. (1997). Ant Colony System: A Cooperative Learning Approach to the Traveling Salesman Problem. IEEE Trans. Evol. Comp. 1, 53-66. [2] Lawler, E.L., Lenstra, J.K., Rinnooy-Kan, A.H.G., and Shmoys, D.B. (eds) (1985). The Travelling Salesman Problem. New York, NY: Wiley. [3] Gambardella, L.M., Taillard, E.D. and Dorigo, M. (1998). Ant Colonies for the QAP J. Operational Res. Soc. 1998. (in press). [4] Bottee, H. and Bonabeau, E. (1998). Evolving Ant Colony Optimization Adv. Complex Systems 1998. 1, 149-159 [5] Colorni, A., Dorigo, M., Maniezzo, V. and Trubian, M. (1993). Ant system for job-shop scheduling. Belg. J. Oper. Res., Stat. and Comput. Sci. 34, 39-53. 6 Appendix A ACO Implementation 1 2 3 4 #!/usr/local/bin/perl use strict; # Ant.pl # Authors: Li-Wei King, Aaron Lee 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ################################### # Default values just in case something goes terribly wrong my $NUM_ANTS = 10; my $MAX_GEN = 50; my $PHER_STEP = .1; my $PHER_WEIGHT = .1; my $MATCH_WEIGHT = .1; my $REGION_WEIGHT = .00001; my $PROB_PROB = .5; # Must be between 0 and 1. It is the probability # that the direction will be chosen based on probability. my $INIT_PHER = .01; # The amount of pheremone that an untraveled path has. my $L_DECAY = .7; # Local decay. Cannot be larger than 1. my $G_DECAY = .7; # Global decay. Cannot be larger than 1. 19 20 21 22 23 # Constants that won’t eventually be passed to the program. use constant MATCH_BONUS => 5; use constant GAP_PENALTY => -4; use constant MISMATCH_PENALTY => -3; 24 25 26 27 28 29 30 31 ############ # Useful abbreviations #For encoding the direction an ant moves use constant D => 0; use constant L => 1; use constant U => 2; use constant N => -1; # Undefined direction 32 33 34 35 36 37 # The index at which certain information is stored in the $ants array use constant X_INDEX => 0; use constant Y_INDEX => 1; use constant DIR_INDEX => 2; # Where the ant decides to move from that position use constant SCORE_INDEX => 3; # The current score at that position 38 39 40 41 42 43 44 45 ########### # Table of GA optimized my @GA_TABLE; $GA_TABLE[10][0] = 10; $GA_TABLE[40][0] = 10; $GA_TABLE[70][0] = 10; $GA_TABLE[100][0] = 15; values $GA_TABLE[20][0] $GA_TABLE[50][0] $GA_TABLE[80][0] = 10; $GA_TABLE[30][0] = 10; $GA_TABLE[60][0] = 10; $GA_TABLE[90][0] = 10; = 10; = 12; 46 47 48 49 50 $GA_TABLE[10][1] $GA_TABLE[40][1] $GA_TABLE[70][1] $GA_TABLE[100][1] = = = = 5; $GA_TABLE[20][1] 5; $GA_TABLE[50][1] 5; $GA_TABLE[80][1] 10; = 5; $GA_TABLE[30][1] = 5; $GA_TABLE[60][1] = 5; $GA_TABLE[90][1] = 5; = 5; = 8; $GA_TABLE[10][2] $GA_TABLE[30][2] $GA_TABLE[50][2] $GA_TABLE[70][2] $GA_TABLE[90][2] = = = = = .411191490; .453581583; .432201854; .417636990; .341437549; $GA_TABLE[20][2] $GA_TABLE[40][2] $GA_TABLE[60][2] $GA_TABLE[80][2] $GA_TABLE[100][2] = = = = = .438349294; .517059770; .436950953; .366514982; .329430526; $GA_TABLE[10][3] $GA_TABLE[30][3] $GA_TABLE[50][3] $GA_TABLE[70][3] $GA_TABLE[90][3] = = = = = 9.434392207; 9.353249096; 9.290221874; 9.149204714; 9.332940631; $GA_TABLE[20][3] $GA_TABLE[40][3] $GA_TABLE[60][3] $GA_TABLE[80][3] $GA_TABLE[100][3] = = = = = 9.423857194; 9.284172996; 9.282690356; 9.064648465; 9.259328124; $GA_TABLE[10][4] $GA_TABLE[30][4] $GA_TABLE[50][4] $GA_TABLE[70][4] $GA_TABLE[90][4] = = = = = 6.109820365; 9.343075608; 10; 10; 10; $GA_TABLE[20][4] $GA_TABLE[40][4] $GA_TABLE[60][4] $GA_TABLE[80][4] $GA_TABLE[100][4] = = = = = 6.926580738; 9.244311660; 10; 10; 10; $GA_TABLE[10][5] $GA_TABLE[30][5] $GA_TABLE[50][5] $GA_TABLE[70][5] = = = = 3.909960135; 2.224402772; 2.142958734; 1.736982155; $GA_TABLE[20][5] $GA_TABLE[40][5] $GA_TABLE[60][5] $GA_TABLE[80][5] = = = = 2.350289525; 1.853908945; 1.915834968; 1.878705913; 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 7 74 $GA_TABLE[90][5] = 1.856936304; $GA_TABLE[100][5] = 1.862138526; $GA_TABLE[10][6] $GA_TABLE[30][6] $GA_TABLE[50][6] $GA_TABLE[70][6] $GA_TABLE[90][6] = = = = = 0.853763237; 0.827315180; 0.798933405; 0.730894471; 0.622498305; $GA_TABLE[20][6] $GA_TABLE[40][6] $GA_TABLE[60][6] $GA_TABLE[80][6] $GA_TABLE[100][6] = = = = = 0.830586273; 0.827352487; 0.728488635; 0.620157623; 0.628942392; $GA_TABLE[10][7] $GA_TABLE[30][7] $GA_TABLE[50][7] $GA_TABLE[70][7] $GA_TABLE[90][7] = = = = = 0.660878498; 0.606102419; 0.571805707; 0.579124731; 0.519128179; $GA_TABLE[20][7] $GA_TABLE[40][7] $GA_TABLE[60][7] $GA_TABLE[80][7] $GA_TABLE[100][7] = = = = = 0.635274652; 0.595236898; 0.577967010; 0.532124853; 0.515925041; $GA_TABLE[10][8] $GA_TABLE[30][8] $GA_TABLE[50][8] $GA_TABLE[70][8] $GA_TABLE[90][8] = = = = = 0.917907684; 1; 1; 1; 1; $GA_TABLE[20][8] $GA_TABLE[40][8] $GA_TABLE[60][8] $GA_TABLE[80][8] $GA_TABLE[100][8] = = = = = 1; 0.965550166; 1; 1; 1; $GA_TABLE[10][9] $GA_TABLE[30][9] $GA_TABLE[50][9] $GA_TABLE[70][9] $GA_TABLE[90][9] = = = = = 0.990544051; 1; 1; 1; 1; $GA_TABLE[20][9] $GA_TABLE[40][9] $GA_TABLE[60][9] $GA_TABLE[80][9] $GA_TABLE[100][9] = = = = = 1; 1; 1; 1; 1; 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 #################################### if ($#ARGV != 1) { print "Usage: \n"; print " ant.pl <SEG1> <SEG2>\n"; exit; } 107 108 109 my $SEG1 = $ARGV[0]; my $SEG2 = $ARGV[1]; 110 111 112 113 114 115 116 my $strlenavg = length($SEG1) + length($SEG2) / 2; if ($strlenavg < 10 || $strlenavg > 100) { print "The string lengths of SEG1 and SEG2 must have an average string length betweeen 10 and 100!\n"; exit; } 117 118 optimize_vars_run_aco($SEG1, $SEG2, $strlenavg); 119 120 121 122 123 124 125 126 127 sub optimize_vars_run_aco { my $str1 = shift; my $str2 = shift; my $len = shift; my @opt; my $lowten = (int $len / 10) * 10; my $highten = (int $len / 10) * 10 + 10; my $wherex = $len - $lowten; 128 for (my $i = 0; $i <= 9; $i++) { push(@opt, $wherex * ($GA_TABLE[$highten][$i]-$GA_TABLE[$lowten][$i])/10 + $GA_TABLE[$lowten][$i]); } 129 130 131 132 run_aco($str1, $str2, $opt[0], $opt[1], $opt[2], $opt[3], $opt[4], $opt[5], $opt[6], $opt[7], $opt[8], $opt[9]); 133 134 135 } 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 sub run_aco { # Arguments to the array my $seq1 = shift; my $seq2 = shift; my $MAX_GEN = shift; my $NUM_ANTS = shift; my $PHER_STEP = shift; my $PHER_WEIGHT = shift; my $MATCH_WEIGHT = shift; my $REGION_WEIGHT = shift; my $INIT_PHER = shift; my $L_DECAY = shift; my $G_DECAY = shift; my $prob_prob = shift; 151 152 153 #Other variables my $high_score; 8 154 155 156 157 158 my my my my my @best_path_x; @best_path_y; @best_path_dir; $prev_score = 0; # Used to figure out if there are repeats or not $repeat_counter = 0; 159 160 print "Aligning: $seq1 with $seq2\n"; 161 162 163 164 # Store the sequences in arrays my @seqy = split(’’, $seq1); my @seqx = split(’’, $seq2); 165 166 167 168 169 170 171 172 173 174 175 my @pher; # Stores the pheremone values # begin matrix initialization. for (my $i = 0; $i <= $#seqy; $i++) { for (my $j = 0; $j <= $#seqx; $j++) { $pher[$i][$j][D] = $INIT_PHER; $pher[$i][$j][L] = $INIT_PHER; $pher[$i][$j][U] = $INIT_PHER; } } 176 177 178 179 180 # begin main generation loop for (my $gen = 0; $gen < $MAX_GEN; $gen++) { my %done = (); # This hash stores a 1 if the ant is finished, 0 if it isn’t my @ants = (); # Stores the information for all the ants 181 182 183 184 185 186 187 188 189 190 191 192 193 194 # reinitialize ants. The ant array is organized thus: # $ants[ant_id][move_number][information for that move] for (my $ant = 0; $ant < $NUM_ANTS; $ant++) { $ants[$ant][0][X_INDEX] = $#seqx; $ants[$ant][0][Y_INDEX] = $#seqy; $done{$ant} = 0; if ($seqx[$#seqx] eq $seqy[$#seqy]) { #$ants[$ant][0][SCORE_INDEX] = MATCH_BONUS; $ants[$ant][0][SCORE_INDEX] = 0; } else { $ants[$ant][0][SCORE_INDEX] = 0; } } 195 196 197 my $ants_done = 0; for (my $step = 0; $ants_done < $NUM_ANTS; $step++) { 198 199 200 # simulate the ants: for (my $ant = 0; $ant < $NUM_ANTS; $ant++) { 201 202 203 204 205 #If the ant is done, then skip it. if ($done{$ant} == 1) { next; } 206 207 208 209 # pick up where we left off: my $ant_x = $ants[$ant][$step][X_INDEX]; my $ant_y = $ants[$ant][$step][Y_INDEX]; 210 211 212 213 214 215 # get the direction that the ant should take, and update # the direction index my $dir = get_dir($ant_x, $ant_y,\@pher, $PHER_WEIGHT, $MATCH_WEIGHT, $REGION_WEIGHT, $prob_prob, \@seqx, \@seqy); $ants[$ant][$step][DIR_INDEX] = $dir; 216 217 218 219 220 # update pher matrix $pher[$ant_y][$ant_x][$dir] += $PHER_STEP; # Do local decay $pher[$ant_y][$ant_x][$dir] *= $L_DECAY; 221 222 223 224 225 226 227 228 229 230 231 232 233 # move in the chosen direction and update the score. # The score stored at each square includes # match/mismatch score for this square as well as well # as any gap penalty for the move that got the ant to # that position . if ($dir == D) { $ants[$ant][$step + 1][X_INDEX] = $ant_x - 1; $ants[$ant][$step + 1][Y_INDEX] = $ant_y - 1; $ants[$ant][$step + 1][SCORE_INDEX] = $ants[$ant][$step][SCORE_INDEX]; if ($seqx[$ants[$ant][$step][X_INDEX]] eq $seqy[$ants[$ant][$step][Y_INDEX]]) { $ants[$ant][$step + 1][SCORE_INDEX] += MATCH_BONUS; } else { 9 $ants[$ant][$step + 1][SCORE_INDEX] += MISMATCH_PENALTY; 234 } 235 236 } elsif ($dir == U) { $ants[$ant][$step $ants[$ant][$step $ants[$ant][$step } elsif ($dir == L) { $ants[$ant][$step $ants[$ant][$step $ants[$ant][$step } 237 238 239 240 241 242 243 244 245 + 1][X_INDEX] = $ant_x; + 1][Y_INDEX] = $ant_y - 1; + 1][SCORE_INDEX] = $ants[$ant][$step][SCORE_INDEX] + GAP_PENALTY; + 1][X_INDEX] = $ant_x - 1; + 1][Y_INDEX] = $ant_y; + 1][SCORE_INDEX] = $ants[$ant][$step][SCORE_INDEX] + GAP_PENALTY; 246 #Check if the ant is done and update score if needed if ($ants[$ant][$step + 1][X_INDEX] == 0 || $ants[$ant][$step + 1][Y_INDEX] == 0) { $ants[$ant][$step + 1][DIR_INDEX] = N; $done{$ant} = 1; if ($seqx[$ants[$ant][$step+1][X_INDEX]] eq $seqy[$ants[$ant][$step+1][Y_INDEX]]) { $ants[$ant][$step + 1][SCORE_INDEX] += MATCH_BONUS; } else { $ants[$ant][$step + 1][SCORE_INDEX] += MISMATCH_PENALTY; } 247 248 249 250 251 252 253 254 255 256 $ants_done++; 257 } 258 } 259 260 } 261 262 263 264 265 266 267 268 #Do a global update #Find the best score my $max_gen_score = $ants[0][$#{$ants[0]}][SCORE_INDEX]; my $max_score_ant = 0; my @best_gen_path_x = (); # The best path of the generation: my @best_gen_path_y = (); my @best_gen_path_dir = (); x coordinates 269 270 271 272 273 274 275 for (my $a = 1; $a <= $#ants; $a++) { if ($ants[$a][$#{$ants[$a]}][SCORE_INDEX] > $max_gen_score) { $max_gen_score = $ants[$a][$#{$ants[$a]}][SCORE_INDEX]; $max_score_ant = $a; } } 276 277 278 279 280 281 282 #Get the best path for(my $s = 0; $s <= $#{$ants[$max_score_ant]}; $s++) { push (@best_gen_path_x, $ants[$max_score_ant][$s][X_INDEX]); push (@best_gen_path_y, $ants[$max_score_ant][$s][Y_INDEX]); push (@best_gen_path_dir, $ants[$max_score_ant][$s][DIR_INDEX]); } 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 #Find out if the high score this time is the all time high. if ($gen == 0) { $high_score = $max_gen_score; for (my $i = 0; $i <= $#best_gen_path_x; $i++) { push (@best_path_x, $best_gen_path_x[$i]); push (@best_path_y, $best_gen_path_y[$i]); push (@best_path_dir, $best_gen_path_dir[$i]); } } elsif ($max_gen_score > $high_score) { @best_path_x = (); @best_path_y = (); @best_path_dir = (); $high_score = $max_gen_score; for (my $i = 0; $i <= $#best_gen_path_x; $i++) { push (@best_path_x, $best_gen_path_x[$i]); push (@best_path_y, $best_gen_path_y[$i]); push (@best_path_dir, $best_gen_path_dir[$i]); } } 303 304 305 306 307 308 309 310 311 #Reinforce the best path again based on how good it is. I’m #using < rather than <= because the last direction is undefined. if ($max_gen_score > 0 && $high_score > 0) { for (my $i = 0; $i < $#best_gen_path_x; $i++) { $pher[$best_gen_path_y[$i]][$best_gen_path_x[$i]][$best_gen_path_dir[$i]] += ($max_gen_score/$high_score) * $PHER_STEP; } } 312 313 #global_decay(\@pher, $G_DECAY); 10 314 #Check for convergence if ($max_gen_score == $prev_score) { $repeat_counter++; } else { $max_gen_score = $prev_score; $repeat_counter = 0; } 315 316 317 318 319 320 321 322 #If we get the same score 5 times, we’ll stop the calculation if ($repeat_counter == 5) { last; } 323 324 325 326 } 327 328 my my my my 329 330 331 332 @alignment = get_alignment(\@best_path_x, \@best_path_y, \@seqx, \@seqy); $x_alignment = $alignment[0]; $dashes = $alignment[1]; $y_alignment = $alignment[2]; 333 print print print print print 334 335 336 337 338 "The best alignment obtained was: \n"; "$x_alignment\n"; "$dashes\n"; "$y_alignment\n"; "The high score was: $high_score \n"; 339 340 } 341 342 343 344 345 346 347 sub get_alignment { #Arguments my $best_x_ref = shift; my $best_y_ref = shift; my $seq_x_ref = shift; my $seq_y_ref = shift; # Stores the x coordinates of the best path 348 349 350 351 352 353 354 #Other variables my $last_x; my $last_y; my $x_result = ""; my $y_result = ""; my $dashes = ""; # The x coordinate of the last step we traced 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 # Handle the cases where the alignment doesn’t start in the 0,0 # position if($best_x_ref->[$#{@$best_x_ref}] != 0) { for (my $i = 0; $i < $best_x_ref->[$#{@$best_x_ref}]; $i++) { $x_result = $x_result.$seq_x_ref->[$i]; $y_result = $y_result."-"; $dashes = $dashes." "; } } elsif ($best_y_ref->[$#{@$best_y_ref}] != 0) { for (my $i = 0; $i < $best_y_ref->[$#{@$best_y_ref}]; $i++) { $x_result = $x_result."-"; $y_result = $y_result.$seq_y_ref->[$i]; $dashes = $dashes." "; } } 372 373 374 375 376 377 378 #First step. Start from the beginning of the alignment (the end of # the best_x_ref and best_y_ref arrays $last_x = $best_x_ref->[$#{@$best_x_ref}]; $last_y = $best_y_ref->[$#{@$best_y_ref}]; $x_result = $x_result.$seq_x_ref->[$last_x]; $y_result = $y_result.$seq_y_ref->[$last_y]; 379 380 381 382 383 384 if ($seq_x_ref->[$last_x] eq $seq_y_ref->[$last_y]) { $dashes = $dashes."|"; } else { $dashes = $dashes." "; } 385 386 387 388 389 390 391 392 393 for (my $i = $#{@$best_x_ref} - 1; $i >= 0; $i--) { # Gap in the x if the x index has not changed. Append a gap to # the sequence. if ($best_x_ref->[$i] eq $last_x) { $last_y = $best_y_ref->[$i]; $x_result = $x_result."-"; $y_result = $y_result."$seq_y_ref->[$best_y_ref->[$i]]"; $dashes = $dashes." "; 11 } elsif ($best_y_ref->[$i] eq $last_y) { # Gap in y $last_x = $best_x_ref->[$i]; $y_result = $y_result."-"; $x_result = $x_result."$seq_x_ref->[$best_x_ref->[$i]]"; $dashes = $dashes." "; } else { #Diagonal move $last_x = $best_x_ref->[$i]; $last_y = $best_y_ref->[$i]; $y_result = $y_result."$seq_y_ref->[$best_y_ref->[$i]]"; $x_result = $x_result."$seq_x_ref->[$best_x_ref->[$i]]"; if ($seq_y_ref->[$best_y_ref->[$i]] eq $seq_x_ref->[$best_x_ref->[$i]]) { $dashes = $dashes."|"; } else { $dashes = $dashes." "; } } 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 } 412 413 return ($x_result, $dashes, $y_result); 414 415 } 416 417 418 419 420 sub global_decay { #Arguments my $pher_ref = shift; my $g_decay = shift; 421 for (my $x = 0; $x <= $#{ $pher_ref }; $x++) { for (my $y = 0; $y <= $#{ $pher_ref->[$x] }; $y++ ) { for (my $d = 0; $d < 3; $d++) { $pher_ref->[$x]->[$y]->[$d] *= $g_decay; } } } 422 423 424 425 426 427 428 429 } 430 431 432 433 434 435 436 437 438 439 440 441 sub get_dir { #Arguments my $x = shift; my $y = shift; my $pher_ref = shift; my $pher_weight = shift; my $match_weight = shift; my $region_weight = shift; my $prob_prob = shift; my $seqx = shift; my $seqy = shift; 442 443 444 445 #Calculate the regional weighting for these coordinates. #assumes that both sequences are the same length. #TODO: MAKE SURE TO CHANGE REGIONAL WEIGHTINGS This 446 447 448 449 my $reg_w_up; my $reg_w_left; my $reg_w_diag; 450 451 452 453 454 455 456 457 458 459 460 461 462 463 if ($x == $y) { $reg_w_up = 1; $reg_w_left = 1; $reg_w_diag = 2; } elsif ($x > $y) { $reg_w_up = 1; $reg_w_diag = 1.5; $reg_w_left = 2; } else { $reg_w_up = 2; $reg_w_left = 1; $reg_w_diag = 1.5; } 464 465 466 467 468 #Figure out whether going up, diagonal, or left will give us a match my $match_up; my $match_left; my $match_diag; 469 470 471 472 473 if ($seqx->[$x] eq $seqy->[$y - 1]) { $match_up = 2; } else { $match_up = 1; 12 } 474 475 if ($seqx->[$x - 1] eq $seqy->[$y - 1]) { $match_diag = 2; } else { $match_diag = 1; } 476 477 478 479 480 481 if ($seqx->[$x - 1] eq $seqy->[$y]) { $match_left = 2; } else { $match_left = 1; } 482 483 484 485 486 487 #Figure out the scores for each direction my $up_score; my $diag_score; my $left_score; 488 489 490 491 492 $up_score = exp(log($pher_ref->[$y]->[$x]->[U]) * $pher_weight + log($match_up) * $match_weight + log($reg_w_up) * $region_weight); 493 494 495 496 $diag_score = exp(log($pher_ref->[$y]->[$x]->[D]) * $pher_weight + log($match_diag) * $match_weight + log($reg_w_diag) * $region_weight); 497 498 499 500 $left_score = exp(log($pher_ref->[$y]->[$x]->[L]) * $pher_weight + log($match_left) * $match_weight + log($reg_w_left) * $region_weight); 501 502 503 504 #Decide whether we’re gonna decide the direction based on the best #score, or based on a weighted probability. # if (rand(1) > $prob_prob) { #If we’re just gonna do it based on best score 505 506 507 508 509 510 my $high_score = max($up_score, $diag_score, $left_score); 511 512 if ($high_score == $up_score) { return U; } elsif ($high_score == $diag_score) { return D; } else { return L; } } else { #Determine the direction using probabilities 513 514 515 516 517 518 519 520 521 522 my $total_score = $up_score + $diag_score + $left_score; 523 524 my $rand_num = rand($total_score); 525 526 $total_score -= $up_score; if ($rand_num > $total_score) { return U; } 527 528 529 530 531 $total_score -= $diag_score; if ($rand_num > $total_score) { return D; } else { return L; } 532 533 534 535 536 537 } 538 539 } 540 541 sub max { 542 my $max = $_[0]; 543 544 for(my $i = 1; $i <= $#_; $i++) { if ($_[$i] > $max) { $max = $_[$i]; } } 545 546 547 548 549 550 return $max; 551 552 } 13 B Genetic Algorithm Implementation 1 2 3 #!/usr/local/bin/perl -w use Time::HiRes; use strict; 4 5 ### BEGIN VARIABLES 6 7 8 9 10 11 12 13 14 # Constants my $STR_LENGTH my $POP_LIMIT my $RECORD_FREQ my $NUM_TEST_IND my $KEEP_PARENTS my $CROSSOVER my $ZERO = = = = = = = 20; 1000; 5; 7; int ($POP_LIMIT * .1); .2; 0.0000000001; 15 16 17 18 19 20 # Global variables my @pop; my $cur_gen my $file_num my $SCORE_INDEX = 10; = 0; = 0; 21 22 my @range = (); 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 $range[0][0] $range[0][1] $range[1][0] $range[1][1] $range[2][0] $range[2][1] $range[3][0] $range[3][1] $range[4][0] $range[4][1] $range[5][0] $range[5][1] $range[6][0] $range[6][1] $range[7][0] $range[7][1] $range[8][0] $range[8][1] $range[9][0] $range[9][1] = = = = = = = = = = = = = = = = = = = = 10; 40; 5; 30; $ZERO; 1; $ZERO; 10; $ZERO; 10; $ZERO; 5; $ZERO; 1; $ZERO; 1; $ZERO; 1; $ZERO; 1; # $MAX_GEN # $NUM_ANTS # $PHER_STEP # $PHER_WEIGHT # $MATCH_WEIGHT # $REGION_WEIGHT # $INIT_PHER # $L_DECAY # $G_DECAY # $PROB_PROB 44 45 46 ### BEGIN MAIN PROGRAM 47 48 49 #randomize variables randomize_vars(); 50 51 52 53 54 while (1) { #initialization my $seq1 = getrandseq(); my $seq2 = mutate($seq1); 55 print print print print 56 57 58 59 "Generation $cur_gen\n"; "-Testing sequences:\n"; "-Sequence 1 (".length($seq1)."): $seq1\n"; "-Sequence 2 (".length($seq2)."): $seq2\n"; 60 61 test_pop($seq1, $seq2); 62 63 gen_next_pop(); 64 65 if ($cur_gen == $RECORD_FREQ) { print_pop(); $cur_gen = 0; $file_num++; } 66 67 68 69 70 71 $cur_gen++; 72 73 } 74 75 ### BEGIN SUBROUTINES 76 77 sub getrandseq { 14 my $limit = $STR_LENGTH; my $str = ""; 78 79 80 for (my $i = 0; $i < $limit; $i++) { my $aa = int rand(4); 81 82 83 $str .= $aa; 84 } 85 86 return $str; 87 88 } 89 90 91 92 sub mutate { my $template = shift; my $num_muts = int length($template) / (rand (2) + 1.5); 93 for (my $i = 0; $i < $num_muts; $i++) { my $whichmut = int rand(3); my $where = int rand(length($template)); 94 95 96 97 if ($whichmut == 0) { # Point mutation substr($template,$where,1,int rand(4)); } elsif ($whichmut == 1) { # Insertion my $beg = substr($template,0,$where); my $end = substr($template,$where); my $num = int rand(4); $template = "$beg$num$end"; } else { # Deletion my $beg = substr($template,0,$where); my $end = substr($template,$where+1); $template = "$beg$end"; } 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 } 113 114 return $template; 115 116 } 117 118 sub randomize_vars { 119 for (my $i = 0; $i < $POP_LIMIT; $i++) { for (my $j = 0; $j <= $#range; $j++) { $pop[$i][$j] = rand($range[$j][1]-$range[$j][0]) + $range[$j][0]; } $pop[$i][0] = int $pop[$i][0]; $pop[$i][1] = int $pop[$i][1]; } 120 121 122 123 124 125 126 127 } 128 129 130 131 sub test_pop { my $seq1 = shift; my $seq2 = shift; 132 my @winners; 133 134 print "-- Beginning population testing...\n"; for (my $i = 0; $i < $POP_LIMIT; $i++) { my $score = score_individual($i, $seq1, $seq2); $pop[$i][$SCORE_INDEX] = $score; } 135 136 137 138 139 140 # Sort so that the winners are at the top and losers are at the bottom @pop = sort {$b->[$SCORE_INDEX] <=> $a->[$SCORE_INDEX]} @pop; 141 142 143 print "-- DONE! \n"; print "-- Top three scores: "; print "$pop[0][$SCORE_INDEX], $pop[1][$SCORE_INDEX], $pop[2][$SCORE_INDEX]\n"; 144 145 146 147 } 148 149 150 151 152 sub score_individual { my $ind = shift; my $seq1 = shift; my $seq2 = shift; 153 154 my @scores = (); 155 156 157 my $totalscore = 0; my $totaltime = 0; 15 158 print "-- Testing string length: $STR_LENGTH\n"; print "-- Generation: ".($file_num*$RECORD_FREQ+$cur_gen)."\n"; print "-- Testing individual $ind \n"; print "----- Ants : $pop[$ind][1] \n"; print "----- Gens : $pop[$ind][0] \n"; for (my $i = 0; $i < $NUM_TEST_IND; $i++) { my $score; my $before = Time::HiRes::time(); $score = run_aco($seq1, $seq2, int $pop[$ind][0], int $pop[$ind][1], $pop[$ind][2], $pop[$ind][3], $pop[$ind][4], $pop[$ind][5], $pop[$ind][6], $pop[$ind][7], $pop[$ind][8], $pop[$ind][9]); $totaltime += Time::HiRes::time() - $before; $totalscore += $score; push(@scores, $score); } 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 my $mean = $totalscore / $NUM_TEST_IND; print "------- Mean:$mean\n"; 176 177 178 my $stddev = 0; for (my $i = 0; $i < $NUM_TEST_IND; $i++) { my $term = ($mean - $scores[$i])*($mean - $scores[$i]); $stddev += $term; } $stddev = sqrt($stddev / ($NUM_TEST_IND + 1)); print "------- Standard dev:$stddev\n"; 179 180 181 182 183 184 185 186 my $newmean = 0; my $datapoints = 0; my $thrownout = 0; for (my $i = 0; $i < $NUM_TEST_IND; $i++) { if ($scores[$i] >= $mean - $stddev && $scores[$i] <= $mean + $stddev) { $newmean += $scores[$i]; $datapoints++; } else { $thrownout++; } } if ($datapoints == 0) { $newmean = -10000; } else { $newmean /= $datapoints; } 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 my $ga_score = print "------print "------print "------print "------print "------- 204 205 206 207 208 209 ($newmean * $newmean * $newmean) / $totaltime; Good datapoints: $datapoints\n"; Thrown out data: $thrownout\n"; Corrected mean: $newmean\n"; Average time: ".$totaltime/$NUM_TEST_IND."\n"; Final GA score: ".$ga_score."\n"; 210 return ($ga_score); 211 212 } 213 214 215 216 217 sub gen_next_pop { # Populate the next generation for (my $i = $KEEP_PARENTS; $i < $POP_LIMIT; $i++) { my $cur_parent = int rand($KEEP_PARENTS); 218 219 220 for (my $j = 0; $j < $SCORE_INDEX; $j++) { $pop[$i][$j] = $pop[$cur_parent][$j]; 221 222 223 224 225 226 # Copy mutation my $which_mut = rand(10); if ($which_mut < 2) { # Plus case $pop[$i][$j] += .1 * rand(1) * ($range[$j][1] - $range[$j][0]); 227 228 229 230 231 232 233 if ($pop[$i][$j] > $range[$j][1]) { $pop[$i][$j] = $range[$j][1]; } } elsif ($which_mut < 4) { # Minus case $pop[$i][$j] -= .1 * rand(1) * ($range[$j][1] - $range[$j][0]); 234 235 236 237 if ($pop[$i][$j] < $range[$j][0]) { $pop[$i][$j] = $range[$j][0]; } 16 } else { # Do nothing case } 238 239 240 241 # Branch migration if (rand(1) < $CROSSOVER) { $cur_parent = int rand($KEEP_PARENTS); } 242 243 244 245 } 246 } 247 248 } 249 250 251 sub print_pop { my $filename = "out-$file_num.txt"; 252 open(FH, "> $filename"); 253 254 printf FH ("%13s printf FH ("%13s printf FH ("%13s printf FH ("%13s printf FH ("%13s printf FH ("%13s printf FH ("%13s printf FH ("%13s printf FH ("%13s printf FH ("%13s printf FH ("%13s print FH "\n"; 255 256 257 258 259 260 261 262 263 264 265 266 ", ", ", ", ", ", ", ", ", ", ", "MAX_GEN"); "NUM_ANTS"); "PHER_STEP"); "PHER_WEIGHT"); "MATCH_WEIGHT"); "REGION_WEIGHT"); "INIT_PHER"); "L_DECAY"); "G_DECAY"); "PROB_PROB"); "SCORE"); 267 268 for (my $i = 0; $i < $POP_LIMIT; $i++) { for (my $j = 0; $j <= $SCORE_INDEX; $j++){ printf FH ("%13.9f ", $pop[$i][$j]); } print FH "\n"; } print FH "\n"; close FH; 269 270 271 272 273 274 275 276 277 } 278 279 280 281 282 283 284 #################################### # Put ACO code here # # In the interest of space, the ACO code was not included here. # Please see Appendix A to see the implementation of the ACO. # The only change that was made was silencing all the output functions. 17
9cs.NE
Submitted arXiv: 1509.07566 DETECTING SPARSE MIXTURES: RATE OF DECAY OF ERROR PROBABILITY ¶ arXiv:1509.07566v2 [cs.IT] 24 Dec 2016 By Jonathan G. Ligok , George V. Moustakides†† and Venugopal V. Veeravallik University of Illinois at Urbana-Champaignk , University of Patras†† and Rutgers University†† We study the rate of decay of the probability of error for distinguishing between a sparse signal with noise, modeled as a sparse mixture, from pure noise. This problem has many applications in signal processing, evolutionary biology, bioinformatics, astrophysics and feature selection for machine learning. We let the mixture probability tend to zero as the number of observations tends to infinity and derive oracle rates at which the error probability can be driven to zero for a general class of signal and noise distributions via the likelihood ratio test. In contrast to the problem of detection of non-sparse signals, we see the log-probability of error decays sublinearly rather than linearly and is characterized through the χ2 -divergence rather than the Kullback-Leibler divergence for “weak” signals and can be independent of divergence for “strong” signals. Our contribution is the first characterization of the rate of decay of the error probability for this problem for both the false alarm and miss probabilities. 1. Introduction. We consider the problem of detecting a sparse signal in noise, modeled as a mixture, where the unknown sparsity level decreases as the number of samples collected increases. Of particular interest is the case where the unknown signal strength relative to the noise power is very small. This problem has many natural applications. In signal processing, applications include detecting a signal in a multi-channel system [10, 16] and detecting covert communications [11]. In evolutionary biology, the problem manifests in the reconstruction of phylogenetic trees in the multi-species coalescent model [20]. In bioinformatics, the problem arises in the context of determining gene expression from gene ontology datasets [15]. In astrophysics, detection of sparse mixtures is used to compare models of the cosmic microwave background to observed data [5]. Also, statistics developed from the study of this problem have been applied in machine learning to anomaly ¶ Supported by the US National Science Foundation under grants CIF 1514245 and CIF 1513373. This paper was partially presented at the 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2016 as [19]. MSC 2010 subject classifications: Primary 62G10; secondary 62G20 Keywords and phrases: likelihood ratio test, sparse mixture, error exponents 1 2 J. G. LIGO ET AL. detection on graphs [22] and high-dimensional feature selection when useful features are rare and weak [12]. Prior work on detecting a sparse signal in noise has been primarily focused on Gaussian signal and noise models, with the goal of determining the tradeoff in signal strength with sparsity required for detection with vanishing probability of error. In contrast, this work considers a fairly general class of signal and noise models. Moreover, in this general class of sparse signal and noise models, we provide the first analysis of the rate at which the false alarm (Type-I) and miss detection (Type-II) error probabilities vanish with sample size. We also provide simple to verify conditions for detectability, which are derived using simpler tools than previously used. In the problem of testing between n i.i.d. samples from two known distributions, it is well known that the rate at which the error probability decays is e−cn for some constant c > 0 bounded by the Kullback-Leibler divergence between the two distributions [6, 8]. In this work, we show for the problem of detecting a sparse signal in noise that the error probability for an oracle detector decays at a slower rate determined by the sparsity level and the χ2 -divergence between the signal and noise distributions, with different behaviors possible depending on the signal strength. In addition to determining the optimal trade-off between signal strength and sparsity for consistent detection, an important contribution in prior work has been the construction of adaptive (and, to some extent, distribution-free) tests that achieve the optimal tradeoff without knowing the model parameters [1, 3, 4, 11, 16, 17, 23]. We discuss prior work in more detail in Sec. 2.1. However, the adaptive tests that have been proposed in these papers are not amenable to an analysis of the rate at which the error probability goes to zero. We show that in a Gaussian signal and noise model that an adaptive test based on the sample maximum has miss detection probability that vanishes at the optimal rate when the sparse signal is sufficiently strong. 2. Problem Setup. Let {f0,n (x)}, {f1,n (x)} be sequences of probability density functions (PDFs) for real valued random-variables. We consider the following sequence of composite hypothesis testing problems with sample size n, called the (sparse) mixture detection problem: (2.1) H0,n : X1 , . . . , Xn ∼ f0,n (x) i.i.d. (null) (2.2) H1,n : X1 , . . . , Xn ∼ (1 − n )f0,n (x) + n f1,n (x) i.i.d. (alternative) where {f0,n (x)} is known, {f1,n (x)} is from some known family F of sequences of PDFs, and {n } is a sequence of positive numbers such that n → 0. We will also assume nn → ∞ so that a typical realization of the alternative is distinguishable from the null. DETECTING SPARSE MIXTURES 3 Let P0,n , P1,n denote the probability measure under H0,n , H1,n respectively, and let E0,n , E1,n be the corresponding expectations, with respect to the particular {f0,n (x)}, {f1,n (x)} and {n }. When convenient, we will drop the f (x) subscript n. Let Ln , f1,n . When f0,n (x) = f0 (x) and f1,n (x) = f0 (x − µn ), 0,n (x) we say that the model is a location model. For the purposes of presentation, we will assume that {µn } is a positive and monotone sequence. When f0 (x) is a standard normal PDF, we call the location model a Gaussian location model. The distributions of the alternative in a location model are described by the set of sequences {(n , µn )}. The location model can be considered as one where the null corresponds to pure noise, while the alternative corresponds to a sparse signal (controlled by n ), with signal strength µn contaminated by additive noise. The relationship between n and µn determines the signal-to-noise ratio (SNR), and characterizes when the hypotheses can be distinguished with vanishing probability of error. In the general case, f0,n (x) can be thought of as the noise and f1,n (x) as the signal distribution. We define the probability of false alarm for a hypothesis test δn between H0,n and H1,n as (2.3) PFA (n) , P0,n [δn = 1] and the probability of missed detection as (2.4) PMD (n) , P1,n [δn = 0]. A sequence of hypothesis tests {δn } is consistent if PFA (n), PMD (n) → 0 as n → ∞. We say we have a rate characterization for a sequence of consistent hypothesis tests {δn } if we can write (2.5) lim n→∞ log PFA (n) = −c, g0 (n) lim n→∞ log PMD (n) = −d, g1 (n) where g0 (n), g1 (n) → ∞ as n → ∞ and 0 < c, d < ∞. The rate characterization describes decay of the error probabilities for large sample sizes. All logarithms are natural. For the problem of testing between i.i.d. samples from two fixed distributions, g0 (n) = g1 (n) = n, and c, d are called the error exponents [6]. In the mixture detection problem, g0 (n) and g1 (n) will be sublinear functions of n. The log-likelihood ratio between the corresponding probability measures of H1,n and H0,n is (2.6) LLR(n) = n X i=1  log 1 − n + n Ln (Xi ) . 4 J. G. LIGO ET AL. In order to perform an oracle rate characterization for the mixture detection problem, we consider the sequence of oracle likelihood ratio tests (LRTs) between H0,n and H1,n (i.e. with n , f0,n , f1,n known): ( 1 LLR(n) ≥ 0 (2.7) δn (X1 , . . . , Xn ) , . 0 otherwise It is well known that (2.7) is optimal for testing between H0,n and H1,n in the MD (n) sense of minimizing PFA (n)+P , which is the average probability of error 2 when the null and alternative are assumed to be equally likely [18, 21]. It is valuable to analyze PFA (n) and PMD (n) separately since many applications incur different costs associated with false alarms and missed detections. Location Model: The detectable region for a location model is the set of sequences {(n , µn )} such that a sequence of consistent oracle tests {δn } exist. For convenience of analysis, we introduce the parameterization (2.8) n = n−β where β ∈ (0, 1) as necessary. Following the terminology of [1], when β ∈ (0, 12 ), the mixture is said to be a “dense mixture”. If β ∈ ( 21 , 1), the mixture is said to be a “sparse mixture”. 2.1. Related Work. Prior work on mixture detection has been focused primarily on the Gaussian location model. The main goals in these works have been to determine the detectable region and construct optimally adaptive tests (i.e. those which are consistent independent of knowledge of {(n , µn )}, whenever possible). The study of detection of mixtures where the mixture probability tends to zero was initiated by Ingster for the Gaussian location model [16]. Ingster characterized the detectable region, and showed that outside the detectable region the sum of the probabilities of false alarm and missed detection is bounded away from zero for any test. Since the generalized likelihood statistic tends to infinity under the null, Ingster developed an increasing sequence of simple hypothesis tests that are optimally adaptive. Donoho and Jin introduced the Higher Criticism test, which is optimally adaptive and is computationally efficient relative to Ingster’s sequence of hypothesis tests, and also discussed some extensions to Subbotin distributions and χ2 -distributions [11]. Cai et al. extended these results to the case where f0,n (x) is standard normal and f1,n (x) is a normal distribution with positive variance, derived limiting expressions for the distribution of LLR(n) under both hypotheses, and showed that the Higher Criticism test is optimally DETECTING SPARSE MIXTURES 5 adaptive in this case [3]. Jager and Wellner proposed a family of tests based on φ-divergences and showed that they attain the full detectable region in the Gaussian location model [17]. Arias-Castro and Wang studied a location model where f0,n (x) is some fixed but unknown symmetric distribution, and constructed an optimally adaptive test that relies only on the symmetry of the distribution when µn > 0 [1]. In a separate paper, Arias-Castro and Wang also considered mixtures of Poisson distributions and showed the problem had similar detectability behavior to the Gaussian location model [2]. Cai and Wu gave an information-theoretic characterization of the detectable region via an analysis of the sharp asymptotics of the Hellinger distance for a wide variety of distributions, and established a strong converse result showing that reliable detection is impossible outside the detectable region in many cases if (2.7) is not consistent [4]. This work also gave general conditions for the Higher Criticism test to be consistent. Our work complements [4] by providing conditions for consistency (as well as asymptotic estimates of error probabilities) for optimal tests, with simple to verify conditions for a fairly general class of models. While the Hellinger distance used in [4] provides bounds on PFA (n) + PMD (n) for the test specified in (2.7), our analysis treats PFA (n), PMD (n) separately as they may have different rates at which they tend to zero and different acceptable tolerances in applications. As we will show in Sec. 3.2 and Sec. 4, there are cases where PFA (n)  PMD (n) for adaptive tests and PFA (n)  PMD (n) for an oracle test. Walther numerically showed that while the popular Higher Criticism statistic is consistent, there exist optimally adaptive tests with significantly higher power for a given sample size at different sparsity levels [23]. Our work complements [23] by providing a benchmark to meaningfully compare the sample size and sparsity trade-offs of different tests with an oracle test. It should be noted that all of the work except [1, 3] has focused on the case where β > 12 , and no prior work has provided an analysis of the rate at which PFA (n), PMD (n) can be driven to zero with sample size. 3. Main Results for Rate Analysis. 3.1. General Case. Our main result is a characterization of the oracle rate via the test given in (2.7). The sufficient conditions required for the rate characterization are applicable to a broad range of parameters in the Gaussian location model (Sec. 3.2). We first look at the behavior of “weak signals”, where Ln has suitably controlled tails under the null hypothesis. In the Gaussian location model 6 J. G. LIGO ET AL. in Sec. 3.2, this theorem is applicable to small detectable µn . Theorem 3.1. Let γ0 ∈ (0, 1) and assume that for all γ ∈ (0, γ0 ) the following conditions are satisfied:   (Ln − 1)2 (3.1) lim E0 1{Ln ≥1+ γ } = 0 n→∞ n Dn2 (3.2) n Dn → 0 √ (3.3) nn Dn → ∞ where (3.4) Dn2 = E0 [(Ln − 1)2 ] < ∞. Then for the test specified by (2.7), (3.5) log PFA (n) 1 =− . 2 2 n→∞ nn Dn 8 lim Moreover, (3.5) holds if we replace PFA (n) with PMD (n). The quantity Dn2 is known as the χ2 -divergence between f0,n (x) and f1,n (x) [14]. In contrast to the problem of testing between i.i.d. samples from two fixed distributions [8], the rate is not characterized by the Kullback-Leibler divergence for the mixture detection problem. Proof. We provide a sketch of the proof for PFA (n), and leave the details to Supplemental Material. We first establish that (3.6) lim sup n→∞ log PFA (n) 1 ≤− n2n Dn2 8 By the Chernoff bound applied to PFA (n) and noting X1 , . . . , Xn are i.i.d.,      s  n PFA (n) = P0 LLR(n) ≥ 0 ≤ min E0 1 − n + n Ln (X1 ) 0≤s≤1  hp in (3.7) ≤ E0 1 − n + n Ln (X1 ) By direct computation, we see E0 [Ln (X1 )−1] = 0, and the following sequence DETECTING SPARSE MIXTURES 7 of inequalities hold: " # hp i 1 2n (Ln (X1 ) − 1)2 E0 1 − n + n Ln (X1 ) = 1 − E0 p 2 2 1 + 1 + n (Ln (X1 ) − 1) " # (Ln (X1 ) − 1)2 2n p ≤ 1 − E0 1{n (Ln (X1 )−1)≤γ} 2 (1 + 1 + n (Ln (X1 ) − 1))2   (Ln (X1 ) − 1)2 2n Dn2 γ √ E0 ≤1− 1{Ln (X1 )≤1+  } n Dn2 2(1 + 1 + γ)2    2 2 2 (Ln (X1 ) − 1) n Dn √ 1 − E0 =1− 1{Ln (X1 )≥1+ γ } n Dn2 2(1 + 1 + γ)2 Since the expectation in the previous line tends to zero by (3.1), for sufficiently large n it will become smaller than γ. Therefore we have by (3.7)   1 2n Dn2 log PFA (n) √ ≤ log 1 − (1 − γ) . n 2 (1 + 1 + γ)2 Dividing both sides by 2n Dn2 and taking the lim sup using (3.2),(3.3) estab(n) 1−γ lishes lim supn→∞ lognP2FA . Since γ can be arbitrarily small, ≤ − 21 (1+√ 2 1+γ)2 n Dn (3.6) is established. We now establish that log PFA (n) 1 (3.8) lim inf ≥− . 2 2 n→∞ nn Dn 8 The proof of (3.8) is similar to that of Cramer’s theorem (Theorem I.4, [9]). The key difference from Cramer’s theorem is that LLR(n) is the sum of i.i.d. random variables for each n, but the distributions of the summands defining LLR(n) in (2.6) change for each n under either hypothesis. Thus, we modify the proof of Cramer’s theorem by introducing a n-dependent tilted distribution, and replacing the standard central limit theorem (CLT) with the Lindeberg-Feller CLT for triangular arrays (Theorem 3.4.5, [13]). We introduce the tilted distribution f̃n (x) corresponding to f0,n (x) by s 1 − n + n Ln (x) n (3.9) f̃n (x) = f0,n (x) Λn (sn )  s  where Λn (s) = E0 1 − n + n Ln (X1 ) , which is convex with Λn (0) = Λn (1) = 1, and sn = arg min0≤s≤1 Λn (s). Let P̃, Ẽ denote the tilted measure and expectation, respectively (where we suppress the n for clarity). A standard dominated convergence argument (Lemma 2.2.5, [8]) shows that   (3.10) Ẽ log 1 − n + n Ln (X1 ) = 0. 8 J. G. LIGO ET AL. Define the variance of the log-likelihood ratio for one sample as h 2 i (3.11) σn2 = Ẽ log 1 + n (Ln (X1 ) − 1) . For sufficiently large n such that Lemma 7.1 (proved in Supplementary Material) holds, namely that C1 2n Dn2 ≥ σn2 ≥ C2 2n Dn2 , we have:   PFA (n) = P0 [LLR(n) ≥ 0] = E0 1{LLR(n)≥0} h i = (Λn (sn ))n Ẽ e−LLR(n) 1{LLR(n)≥0} h i = (Λn (sn ))n Ẽ e−LLR(n) |LLR(n) ≥ 0 P̃ [LLR(n) ≥ 0] (3.12) ≥ (Λn (sn ))n e−Ẽ[LLR(n)|LLR(n)≥0] P̃ [LLR(n) ≥ 0] Ẽ[LLR(n)1{LLR(n)≥0} ] n − P̃[LLR(n)≥0] = (Λn (sn )) e P̃ [LLR(n) ≥ 0] (3.13) ≥ (Λn (sn ))n e (3.14) − √ n − ≥ (Λn (sn )) e − ≥ (Λn (sn ))n e Ẽ[(LLR(n))2 ] 2 nσn P̃[LLR(n)≥0] √ − P̃ [LLR(n) ≥ 0] P̃[LLR(n)≥0] √ = (Λn (sn ))n e (3.15) Ẽ[|LLR(n)|] P̃[LLR(n)≥0] 2 nC1 2 n Dn P̃[LLR(n)≥0] P̃ [LLR(n) ≥ 0] P̃ [LLR(n) ≥ 0] P̃ [LLR(n) ≥ 0] where (3.12) follows from Jensen’s inequality, (3.13) by LLR(n)1{LLR(n)>0} ≤ |LLR(n)|, (3.14) by Jensen’s inequality, and (3.15) by Lemma 7.1 proved in the Supplementary Material. Taking logarithms and dividing through by n2n Dn2 gives √ log PFA (n) 1 log Λn (sn ) C1 log P̃ [LLR(n) ≥ 0] √ ≥ − . + 2 2 2 2 nn Dn n Dn n2n Dn2 P̃ [LLR(n) ≥ 0] nn Dn Taking lim inf and applying Lemma 7.2, in which it is established that P̃[LLR(n) ≥ 0] → 21 , and Lemma 7.4 in which it is established that n (sn ) lim inf n→∞ logΛ ≥ − 18 , (see Supplementary Material), along with the 2 D2 n n (n) assumption n2n Dn2 → ∞ establishes that lim inf n→∞ lognP2FA ≥ − 18 . 2 n Dn The analysis under H1,n for PMD (n) relies on the fact that the Xi are i.i.d. with pdf (1 − n + n Ln )f0,n (x), which allows the use of 1 − n + n Ln to change the measure from the alternative to the null. The upper bound is DETECTING SPARSE MIXTURES 9 established identically, by noting that the Chernoff bound furnishes " #!n   1 PMD (n) = P1,n − LLR(n) > 0 ≤ E1 p 1 − n + n Ln (X1 ) in  hp 1 − n + n Ln (X1 ) = E0 Similarly, the previous analysis can be applied to show that (3.8) holds with PFA (n) replaced with PMD (n). In order to study the behavior of tests when Thm 3.1 does not hold, we rely on the following bounds for PMD (n), PFA (n): Theorem 3.2. (a) Let {δn } be any sequence of tests such that lim sup PFA (n) < 1, n→∞ then, (3.16) lim inf n→∞ log PMD (n) ≥ −1. nn (b) The following upper and lower bounds for PFA (n) hold for the test specified by (2.7): (3.17) (3.18) PFA (n) ≤ 1 − (P0 [Ln ≤ 1])n " n # X  PFA (n) ≥ P0 log max 1 − n , n Ln (Xi ) ≥ 0 . i=1 These bounds are easily proved by noting if all observations under H1,n come from f0,n , then a miss detection occurs (a), and at least one sample must have Ln ≥ 1 in order to raise a false alarm (b). Note that these are universal bounds in the sense that they impose no conditions on f1,n (x), f0,n (x) and n . Also note that the bound of Thm 3.2(a) is independent of any divergences between f0,n (x) and f1,n (x), and it holds for any consistent sequence of tests because PFA (n) → 0. This is in contrast to the problem of testing between i.i.d. samples from fixed distributions, where the rate is a function of divergence [8]. When the conditions of Thm 3.1 do not hold, we have the following rate characterization for “strong signals”, where Ln is under the f1,n (x) distribution in an appropriate sense. In the Gaussian location model in Sec. 3.2, this theorem is applicable to large detectable µn . 10 J. G. LIGO ET AL. Theorem 3.3. Let M0 > 1, and assume that for all M > M0 , the following condition is satisified: h i (3.19) E0 Ln 1{Ln >1+ M } → 1. n Then for the test specified by (2.7), (3.20) (3.21) log PFA (n) ≤ −1 nn n→∞ log PMD (n) lim = −1. n→∞ nn lim sup Proof. We first prove (3.20). Let φ(x) = 1 + sx − (1 + x)s . By Taylor’s theorem, we see for s ∈ (0, 1) and x ≥ −1 that φ(x) ≥ 0. Since E0 [Ln − 1] = 0, E0 [(1 − n + n Ln (X1 ))s ] = 1 − E0 [φ(n (Ln (X1 ) − 1))]. Note this implies E0 [φ(n (Ln (X1 ) − 1))] ∈ [0, 1] since E0 [(1 − n + n Ln (X1 ))s ] is convex in s and is 1 for s = 0, 1. As in the proof of Thm 3.1, by the Chernoff bound, PFA (n) ≤ (E0 [(1 − n + n Ln (X1 ))s ])n for any s ∈ (0, 1). Thus, supressing the dependence on X1 , and assuming M > M0 , we have log PFA (n) ≤ log E0 [(1 − n + n Ln (X1 ))s ] n = log(1 − E0 [φ(n (Ln − 1))]) (3.22) (3.23) (3.24) (3.25) ≤ −E0 [φ(n (Ln − 1))]   ≤ −E0 φ(n (Ln − 1))1{n (Ln −1)≥M }   = −E0 (1 + sn (Ln − 1) − (1 + n (Ln − 1))s ) 1{n (Ln −1)≥M }   ≤ −E0 (sn (Ln − 1) − (1 + n (Ln − 1))s ) 1{n (Ln −1)≥M }   ≤ −E0 (sn (Ln − 1) − 2s sn (Ln − 1)s ) 1{n (Ln −1)≥M }     2s = −E0 n (Ln − 1) s − 1{n (Ln −1)≥M } (n (Ln − 1))1−s     2 ≤ −E0 n (Ln − 1) s − 1−s 1{n (Ln −1)≥M } M 11 DETECTING SPARSE MIXTURES  = −n s −  2 M 1−s  E0 Ln  "  1 1− Ln  1{n (Ln −1)≥M }  ! # 1 1{n (Ln −1)≥M } ≤ −n s − 1−s E0 Ln 1 − M 1+ M n !     2 1 1− E L 1 = −n s − 1−s 0 n { (L −1)≥M } n n M 1+ M n  2 where (3.22) follows from log(1 − x) ≤ −x for x ≤ 1, (3.23) follows from φ(x) ≥ 0, (3.24) follows from (1 + x)s ≤ 2s xs for x ≥ 1 and taking M > M0 , (3.25) follows from s ∈ (0, 1). Dividing both sides of the inequality by n and taking a lim supn→∞ establishes lim sup n→∞ log PFA 2 ≤ −s + 1−s . nn M Letting M → ∞ and optimizing over s ∈ (0, 1) establishes the (3.20). By a change of measure between the alternative and null hypotheses, we see that (3.20) also holds with PFA (n) replaced with PMD (n). Combining this with Thm 3.2 establishes (3.21). Theorem 3.3 shows that the rate of miss detection is controlled by the average number of observations drawn from f1,n (x) under H1,n , independent of any divergence between f1,n (x) and f0,n (x) when (3.19) holds. Interestingly, so long as the condition of Thm 3.3 holds, by Thm 3.2(a), no non-trivial sequence of tests (i.e. lim supn→∞ PFA (n), PMD (n) < 1) can achieve a better rate than (2.7) under H1,n . This is different from the case of testing i.i.d. observations from two fixed distributions, where allowing for a slower rate of decay for PFA (n) can allow for a faster rate of decay for PMD (n) (Sec. 3.4, [8]). In Sec. 3.2, we will show that Thm 3.3 is not always tight under H0,n , and the true behavior can depend on divergence between f0,n (x) and f1,n (x), using the upper and lower bounds of Thm 3.2(b). 3.1.1. Comparison to Related Work. Cai and Wu [4] consider a model which is essentially as general as ours, and characterize the detection boundary for many cases of interest, but do not perform a rate analysis. Note that our rate characterization (3.5) depends on Dn , the χ2 -divergence between f0,n and f1,n . While the Hellinger distance used in [4] can be upper bounded in terms of the χ2 -divergence, a corresponding lower bound does not exist in general [14], and so our results cannot be derived using the methods of [4]. In fact, our results complement [4] in giving precise bounds on the error decay 12 J. G. LIGO ET AL. for this problem once the detectable region boundary has been established. Furthermore, as we will show in Thm 4.1, there are cases where the rates derived by analyzing the likelihood ratio test are essentially achievable. 3.2. Gaussian Location Model. In this section, we specialize Thm 3.1 and 3.3 to the Gaussian location model. The rate characterization proved is summarized in Fig. 1. We first recall some results from the literature for the detectable region for this model. Theorem 3.4. The boundary of the detectable region (in {(n , µn )} space) is given by (with n = n−β ): 1 1. If 0 < β ≤ 12 , then µcrit,n = nβ− 2 . (Dense) q 3 1 2. If 2 < β < 4 , then µcrit,n = 2(β − 12 ) log n. (Moderately Sparse) p √ 3. If 34 ≤ β < 1, then µcrit,n = 2(1 − 1 − β)2 log n. (Very Sparse) If in the dense case µn = nr , then the LRT (2.7) is consistent if r > β − 12 . (a) Detectable region (r versus β) where √ µn = 2r log n, n = n−β (b) Detectable region (r versus β) where µn = nr , n = n−β Fig 1: Detectable regions for the Gaussian location model. Unshaded regions have PMD (n) + PFA (n) → 1 for any test (i.e. reliable detection is impossible). Green regions are where corollaries 3.5 and 3.6 provide an exact rate characterization. The red region is where Thm 3.8 provides an upper bound on the rate, but no lower bound. The blue region is where Cor. 3.7 holds, and provides an upper bound on the rate for PFA (n) and an exact rate characterization for PMD (n). 13 DETECTING SPARSE MIXTURES Moreover, if r < β − 12 , then PFA (n) + P√MD (n) → 1 for any sequence of tests as n → ∞. If in the sparse cases, µn = 2r log n, then the LRT is consistent if µn > µcrit,n . Moreover, if µn < µcrit,n , then PFA (n) + PMD (n) → 1 for any sequence of tests as n → ∞. Proof. For the proof see [1, 3, 11]. We call the set of {(n , µn )} sequences where (2.7) is consistent the interior of the detectable region. We now begin proving a rate characterization for the Gaussian location model by specializing Thm 3.1. Note that Ln (x) = 1 2 2 eµn x− 2 µn and Dn2 = eµn −1. A simple computation shows that the conditions in the theorem can be re-written as: For all γ > 0 sufficiently small: (3.26)    n    Q − 23 µn + µ1n log 1 + γn + µ21 Q − 32 µn + µ1n log 1 + γn n    e −1   o γ 1 1 −2Q − 2 µn + µn log 1 + n + Q 12 µn + µ1n log 1 + γn →0 2 (3.27) 2n (eµn − 1) → 0 (3.28) n2n (eµn − 1) → ∞ where Q(x) = 2 R∞ x 1 2 √1 e− 2 x dx. 2π Corollary 3.5. where h(n) → ∞ and (3.29) (Dense case) If n = n−β for β ∈ (0, 12 ) and µn = lim supn→∞ q 2 µn β log n 3 h(n) 1 n 2 −β < 1, then 1 log PFA (n) =− . 2 µ 2 n→∞ n (e n − 1) 8 n lim If µn → 0, (3.29) can be rewritten as (3.30) lim n→∞ log PFA (n) 1 =− . n2n µ2n 8 This result holds when replacing PFA (n) with PMD (n). Proof. It is easy to verify (3.27) and (3.28) directly, and (3.26) if µn does not tend to zero. To verify (3.26) it suffices to show: If µn → 0, for any α ∈ R, then Q(αµn + µ1 log(1+ γ )) n 2 eµn −1 n → 0. Since ex − 1 ≥ x, it suffices to 14 J. G. LIGO ET AL. show that Q(αµn + µ1 log(1+ γ )) n n µ2n 1 2 −2x → 0. This can be verified by the standard bound Q(x) ≤ e for x > 0, and noting that αµn + for sufficiently large n and that exx−1 → 1 as x → 0. 1 µn log(1 + γ n ) >0 The implication of this corollary is that our rate characterization of the probabilities of error holds for a large portion of the detectable region up to the detection boundary, as h(n) can be taken such that h(n) → 0 for any nξ ξ > 0, making it negligible with respect to µcrit,n in Thm 3.4. Corollary 3.6. (Moderately sparse case) If n = n−β for β ∈ ( 12 , 43 ) q then and µn = 2(β + 12 + ξ) log n for any 0 < ξ < 3−4β 6 (3.31) lim n→∞ log PFA (n) 1 =− 2 µ 2 n 8 nn (e − 1) and the same result holds replacing PFA (n) with PMD (n). Proof. It is easy to verify (3.27) and (3.28) directly. To verify (3.26), note since Q(·) ≤ 1 and µn → ∞, we need 1  n   − Q − 32 µn + µ1n log 1 + γn     + Q 12 µn + 2Q − 12 µn + µ1n log 1 + γn 2 eµn −1 1 µn  log 1 + γ n  o → 0.  Thus, it suffices to show thatQ − 23 µn + µ1n log(1 + γn ) → 0, or equivalently, that − 23 µn + µ1n log(1 + γn ) → ∞ for any fixed γ > 0. Applying log(1 + γn ) ≥ log( γn ) = β log n + log γ shows that  log 1 + γn ≥ q 3 β log n + log γ − 2(β − 12 + ξ) log n + q 2 2(β − 12 + ξ) log n q  p β log γ = − 32 2(β − 21 + ξ) + q log n + q 2(β − 21 + ξ) 2(β − 12 + ξ) log n (3.31) − 32 µn + 1 µn where the last √ term tends to 0 with n. Thus, (3.31) tends to infinity if the coefficient of log n is positive, i.e. if 12 (1−2ξ) < β < 14 (3−6ξ) , which holds by the definition of ξ. Thus, (3.31) tends to infinity and (3.26) is proved. 15 DETECTING SPARSE MIXTURES Note that ξ can be replaced with an appropriatelyq chosen sequence tending to 0 such that (3.27) and (3.28) hold. For µn > 23 β log n, (3.26) does not hold. However, Thm 3.3 and Thm 3.2 provide √ a partial rate characterization for the case where µn grows faster than 2β log n which we present in the following corollary. Corollary 3.7. then If n = n−β for β ∈ (0, 1) and lim inf n→∞ (3.33) If nn µ2n lim n→∞ √ µn 2β log n > 1, log PMD (n) = −1. nn → ∞, then (3.34) lim sup n→∞ Otherwise, if nn µ2n log PFA (n) = −1 nn → 0, then (3.35) lim sup n→∞ log PFA (n) 1 ≤− . µ2n 8 Proof. The condition for Thm 3.3 given by (3.19) is   1  Q µ1n log 1 + M n − 2 µn → 1. This holds if 1 µn log(1 + M n ) − 12 µn → −∞, which is true if r > β. (n) n ≥ −1 if n To show that lim inf n→∞ log PnFA → ∞, we can apply µ2n n a similar argument to the lower bound for Thm 3.1 to the lower bound given by (3.18) and is thus omitted. Instead, we show a short proof of (n) lim inf n→∞ log PnFA ≥ −C for C ≥ 1 using (3.18). Note that we can loosen n (3.18) to " k # n X X  PFA (n) ≥ P0 log (1 − n ) + log n Ln (Xi ) ≥ 0 i=1 i=k+1 for any k and explicitly compute a lower bound to PFA (n) in terms of the standard normal cumulative distribution function. Optimizing this bound (n) ≥ −C for some over the choice of k establishes that lim inf n→∞ log PnFA n µ n √ constant C ≥ 1 (with C = 1 if log n → ∞). The lower bounding of (3.18) in a manner similar to (3.1) recovers the correct constant when µn scales as √ 2r log n. 16 J. G. LIGO ET AL. To see that the log-false alarm probability scales faster than nn when → 0, one can apply (3.17). In this case, nn µ2n n  log PFA (n) ≤ log 1 − 1 − Q( 12 µn ) . Applying the standard approximation 1 2 1 2 √ (3.36) we see lim supn→∞ e− 2 x xe− 2 x ≤ Q(x) ≤ √ for x > 0, 2π(1 + x2 ) x 2π log PFA (n) µ2n ≤ − 18 . Note that (3.35) shows an asymmetry between the rates for the miss detection and false alarm probabilities, since there is a fundamental lower bound due to the sparsity under the alternative for the miss probability, but not under the null. √ Theorems 3.1 and 3.3 do not hold when √ n = n−β and µn = 2r log n where r ∈ ( β3 , β) for β ∈ (0, 34 ) or r ∈ ((1 − 1 − β)2 , β) for β ∈ ( 34 , 1). For the remainder of the detectable region, we have an upper bound on the rate derived specifically for the Gaussian location setting. One can think of this as a case of “moderate signals”.   √ Theorem 3.8. Let n = n−β and µn = 2r log n where r ∈ β3 , β for √ β ∈ (0, 43 ) or r ∈ ((1 − 1 − β)2 , β) for β ∈ ( 34 , 1). Then, (3.37) lim sup n→∞ log PFA (n) 1   ≤− .  β 16 n2n e Φ 2r − 32 µn µ2n Rx 2 where Φ(x) = 1 − Q(x) = −∞ √12π e−x /2 dx denotes the standard normal cumulative distribution function. Moreover, (3.37) holds replacing PFA with PMD . Proof. The proof is based on a Chernoff bound with s = 21 . Details are given in the Supplemental Material.  2 β It is useful to note that n2n eµn Φ ( 2r − 32 )µn behaves on the order of 2 n1−2β+2r−r(1.5−β/2r) √ 2r log n for large n in Thm 3.8. DETECTING SPARSE MIXTURES 17 4. Rates and Adaptive Testing in the Gaussian Location Model. No adaptive tests prior to this work have had precise rate characterization. Moreover, optimally adaptive tests for 0 < β < 1 such as the Higher Criticism (HC) [11] test or the sign test of Arias-Castro and Wang (ACW) ([1], Sec. 1.4)1 are not amenable to rate analysis based on current analysis techniques. This is due to the fact that the consistency proofs of these tests follow from constructing functions of order statistics that grow slowly under the null and slightly quicker under the alternative via a result of Darling and Erdös [7]. We therefore analyze the max test: ( 1 maxi=1,...,n Xi ≥ τn (4.1) δmax (X1 , . . . , Xn ) , 0 otherwise where τn is a sequence of test thresholds. While the max test is not consistent everywhere (2.7) is [1, 11], it has a few advantages over other tests that are adaptive to all {(n , µn )} possible (i.e. optimally adaptive). The first advantage is a practical perspective; the max test requires a linear search and trivial storage complexity to find the largest element in a sample, whereas computing the HC or ACW test requires on the order of n log n operations to compute the order statistics of a sample of size n (which may lead to non-trivial auxiliary storage requirements), along with computations depending on Q-functions or partial sums of the signs of the data. Moreover, the max test has been shown to work in applications such as astrophysics [5]. It does not require specifying the null distribution, which allows it to be applied to the Subbotin location models as in [1]. The second advantage is analytical, as the cumulative distribution function of the maximum of an i.i.d. sample of size n with cumulative distribution function F (x) has the simple form of F (x)n . This also provides a simple way to set the test threshold to meet a pre-specified false alarm probability for a given sample size n. As most applications focus on the regime where n = n−β for β > 21 , the following theorem shows the max test provides a simple test with rate guarantees for almost the entire detectable region in this case. √ Theorem 4.1. For the max test given by (4.1) with threshold τn = 2 log n: The rate under the null is given by (4.2) 1 lim n→∞ log PFA (n) 1 =− . log log n 2 We avoid the use of the acronym CUSUM since it is reserved for the most popular test for the quickest change detection problem in Sequential Analysis. 18 J. G. LIGO ET AL. Under the alternative, if lim inf n→∞ √ (4.3) > 1 with n = n−β , log PMD (n) √ = −1. n→∞ nn Q( 2 log n − µn ) lim In particular, if lim inf n→∞ rate under the alternative (4.4) µn √ 2(1− 1−β)2 log n √ µn 2 log n lim n→∞ > 1, the max test achieves the optimal log PMD (n) = −1. nn Otherwise, the max test is not consistent. Proof. The error probabilities for the max test given by (4.1) with threshold τn (4.5) PFA (n) = 1 − Φ(τn )n (4.6) n PMD (n) = (1 − n )Φ(τn ) + n Φ(τn − µn ) follow from the cumulative distribution function of the maximum of an i.i.d. sample. The rates (4.2),(4.3),(4.4) as well as the condition for inconsistency are derived by applying the approximation (3.36) to (4.5) and (4.6). Fig 2: Detectable region of the Max test. White denotes where detection is impossible for any test. Black denotes where the max test is inconsistent. Green denotes where the max test is consistent, but has suboptimal rate under the alternative compared to (2.7). Blue denotes where the max test achieves the optimal rate under the alternative. Compare to Fig. 1a. DETECTING SPARSE MIXTURES 19 The√results of Thm. 4.1 are summarized in Fig. 2. In particular, if we take √ µn = 2r log n with r ∈ (1 − 1 − β)2 , 1 , we see log PMD (n) scales on the √ 1−β−(1− r)2 n √ √ . This is suboptimal compared to the rates achieved by order of (1− r) 2 log n the (non-adaptive) likelihood ratio test (2.7), but is of polynomial order (up to a sub-logarithmic factor). Note that the rate of decay of the sum error probability can be slower than that of the miss detection probability, since the false alarm probability is fixed by the choice of threshold, independent of the true {(n , µn )} for adaptivity. 5. Numerical Experiments. In this section, we provide numerical simulations to verify the rate characterization developed for the Gaussian location model as well as some results comparing the performance of adaptive tests. 5.1. Rates for the Likelihood Ratio Test. We first consider the dense case, with n = n−0.4 and µn = 1. The conditions of Cor. 3.5 apply here, and we (n) expect log2 PFA → − 18 . Simulations were done using direct Monte Carlo µ2 nn (e n −1) simulation with 10000 trials for the errors for n ≤ 106 . Importance sampling via the hypothesis alternate to the true hypothesis (i.e. H0,n for simulating (a) Simulations of error probabilities in the Gaussian location model with µn = 1, n = n−0.4 for the test (2.7). A best fit line for log PMD (n) is given as a blue dashed line and corresponding line for log PFA (n) is given as a red dot-dashed line. (b) Simulations of error probabilities in the Gaussian location model with µn = p 2(0.19) log n, n = n−0.6 for the test (2.7). A best fit line for log PMD (n) is given as a blue dashed line and corresponding line for log PFA (n) is given as a red dot-dashed line. Fig 3: Simulation results for Cor. 3.5 and 3.6 20 J. G. LIGO ET AL. PMD (n), H1,n for simulations PFA (n)) was used for 106 < n ≤ 2 × 107 with between 10000 − 15000 data points. The performance of the test given (2.7) is shown in Fig. 3a. The dashed lines are the best fit lines between the log2 error probabilities and n2n (eµn − 1) using data for n ≥ 350000. By Cor. 3.5, we expect the slope of the best fit lines to be approximately − 18 . This is the case, as the line corresponding to missed detection has slope −0.13 and the line corresponding to false alarm has slope −0.12. p The moderately sparse case with n = n−0.6 and µn = 2(0.19) log n is shown in Fig. 3b. The conditions of Cor. 3.6 apply here, and we expect log PFA (n) → − 18 . Simulations were performed identically to the dense case. 2 µ2 nn (e n −1) The dashed lines are the best fit lines between the log-error probabilities 2 and n2n (eµn − 1) using data for n ≥ 100000. By Cor. 3.6, we expect the slope of the best fit lines to be approximately − 18 . Both best fit lines have slope of −0.11. It is important to note that PFA (n), PMD (n) are both large even at n = 2 × 107 and simulation to larger sample sizes should show better agreement with Cor. 3.6. 5.2. Adaptive Testing. In order to implement an adaptive test, the threshold for the test statistic must be chosen in order to achieve a target false alarm probability. This can be done analytically for the max test by inverting (4.5). For other tests, which do not have tractable expressions for the false alarm probability, we set the threshold by simulating the test statistic under the null. The threshold is chosen such that the empirical fraction of exceedances of the threshold matches the desired false alarm. As expected, the adaptive tests cannot match the rate under the null with non-trivial behavior under the alternative, and therefore we report the results for adaptive tests at the standard 0.05 and 0.10 levels. The miss detection probabilities reported for the max test were computed analytically via (4.6). Note that the likelihood ratio test (2.7) with threshold set to meet a given false alarm level is the oracle test which minimizes the miss detection probability [8]. As multiple definitions of the Higher Criticism test exist in literature, we use the following version from [3]: Given a sample X1 , . . . , Xn , let pi = Q(Xi ) for 1 ≤ i ≤ n. Let {p(i) } denote {pi } sorted in ascending order. Then, the higher criticism statistic is given by (5.1) i − p(i) √ HC∗n = max HCn,i where HCn,i = q n n 1≤i≤n p(i) (1 − p(i) ) and the null hypothesis is rejected when HC∗n is large. The HC test is optimally adaptive, i.e. is consistent whenever (2.7) is. 21 DETECTING SPARSE MIXTURES The ACW test [1] is implemented as follows: Given the samples X1 , . . . , Xn , let X[i] denote the i-th largest sample by absolute value. Then, Pk ∗ (5.2) S = max 1≤k≤n i=1 sgn(X[i] ) √ k and the null hypothesis is rejected when S ∗ is large. The ACW test is adaptive for β > 12 . It is unknown how the ACW test behaves for β ≤ 12 . Note that like the Max test (and unlike the HC test), the ACW test does not exploit exact knowledge of the null distribution (but assumes continuity and symmetry about zero). The performance of test (2.7) is summarized in Table 1 with a comparison of adaptive tests in the moderately sparse example from the previous section is given in Table 2. We used 115000 realizations of the null and alternative. The sample sizes illustrated were chosen to be comparable with applications of sparse mixture detection, such as the WMAP data in [5] which has n ≈ 7 × 104 . Thus, our simulations provide evidence for both larger and smaller sample sizes than used in practice. We see there is a large gap in performance between the likelihood ratio test (2.7) and the adaptive tests, but the Higher Criticism test performs significantly better than the Max or ACW tests. LRT PFA (n) PMD (n) 0.307 0.388 0.258 0.320 0.213 0.256 0.166 0.193 0.119 0.134 0.074 0.084 Table 1 p Error probabilities for µn = 2(0.19) log n, n = n−0.6 for the LRT given by (2.7). n 10 102 103 104 105 106 PFA = 0.10 ACW LRT Max HC 0.807 0.665 0.744 0.666 0.816 0.542 0.704 0.630 0.792 0.417 0.672 0.561 0.751 0.281 0.639 0.491 0.685 0.158 0.603 0.396 0.602 0.064 0.562 0.295 Table 2 p Miss Detection probabilities for µn = 2(0.19) log n, n = n−0.6 , for probability 0.05 and 0.10. n 10 102 103 104 105 106 LRT 0.776 0.667 0.548 0.403 0.252 0.119 PFA = 0.05 Max HC 0.845 0.790 0.814 0.775 0.789 0.728 0.762 0.688 0.733 0.623 0.699 0.546 ACW 0.706 0.722 0.653 0.617 0.539 0.446 False Alarm 22 J. G. LIGO ET AL. LRT PFA (n) PMD (n) 1.62e-1 2.75e-1 6.31e-2 1.12e-1 7.63e-3 1.36e-2 5.38e-5 8.83e-5 Table 3 p Error probabilities for µn = 2(0.66) log n, n = n−0.6 for the LRT given by (2.7). n 10 102 103 104 PFA = 0.10 ACW LRT Max HC 5.88e-1 3.59e-1 4.36e-1 3.38e-1 4.80e-1 8.45e-2 1.61e-1 1.07e-1 1.33e-1 1.89e-3 1.80e-2 4.20e-3 4.43e-3 7.10e-8 1.32e-4 ≤ 1e-5 Table 4 p Miss Detection probabilities for µn = 2(0.66) log n, n = n−0.6 for False probability 0.05 and 0.10. n 10 102 103 104 LRT 4.66e-1 1.28e-1 3.69e-3 2.12e-7 PFA = 0.05 Max HC 5.66e-1 7.18e-1 2.56e-1 6.24e-1 4.40e-2 2.48e-2 8.08e-4 ≤ 1e-5 ACW 5.88e-1 4.80e-1 1.33e-1 1.25e-3 Alarm p For the case of strong signals, we calibrate as µn = 2(0.66) log n for n = n−0.6 . This corresponds to the rates given by Thm. 3.3. The performance of test (2.7) is summarized in Table 3 with a comparison of adaptive tests in the moderately sparse example from the previous section is given in Table 4. Here we used 180000 realizations of the null and alternative. As even the max test has error probabilities sufficiently small for many applications in this regime at moderate sample sizes (which are still on the order used in applications [5]), we only consider sample sizes up to n = 104 . We see that in the strong signal case, the likelihood ratio test performs better than the adaptive tests, but all tests produce sufficiently small error probabilities for most applications. 6. Conclusions and Future Work. In this paper, we have presented an rate characterization for the error probability decay with sample size in a general mixture detection problem for the likelihood ratio test. In the Gaussian location model, we explicitly showed that the rate characterization holds for most of the detectable region. A partial rate characterization (an upper bound on the rate under both hypotheses and universal lower bound on the rate under H1,n ) was provided for the remainder of the detectable region. In contrast to usual large deviations results [6, 8] for the decay of error probabilities, our results show that the log-probability of error decays sublinearly with sample size. There are several possible extensions of this work. One is to provide corresponding lower bounds for the rate in cases not covered by Thm 3.1. DETECTING SPARSE MIXTURES 23 Another is to provide a general analysis of the behavior that is not covered by Thm 3.1 and 3.3, present in Thm 3.8 in the Gaussian location model. As noted in [3], in some applications it is natural to require PFA (n) ≤ α for some fixed α > 0, rather than requiring PFA (n) → 0. While Thm 3.4 shows the detectable region is not enlarged under in the Gaussian location model (and similarly for some general models [4]), it is conceivable that the oracle optimal test which fixes PFA (n) (i.e. one which compares LLR(n) to a non-zero threshold) can achieve a better rate for PMD (n). It is expected that the techniques developed in this paper extend to the case where PFA (n) is constrained to a level α. In the Gaussian location model, the analysis of (2.7) constrained to level α problem has been studied in [16] via contiguity arguments. Finally, it is important to develop tests that are amenable to a rate analysis and are computationally simple to implement over 0 < β < 1. In the case of weak signals in the Gaussian location model, we see that the error probabilities for the likelihood ratio test, which establish the fundamental limit on error probabilities, decay quite slowly even with large sample sizes. In this case, closing the gap between the likelihood ratio test and adaptive tests is important for applications where it is desirable to have high power tests. In the case of strong signals, we see the miss detection probability for even the simplest adaptive test, the max test, are very small for moderate sample sizes at standard false alarm levels so the rate of decay is not as important as the weak signal case for applications. SUPPLEMENTARY MATERIAL Supplemental Material for “Detecting Sparse Mixtures: Rate of Decay of Error Probability” (doi: COMPLETED BY THE TYPESETTER; .pdf). We provide details of proofs of the main theorems. References. [1] Arias-Castro, E. and Wang, M. (2013). Distribution-free tests for sparse heterogeneous mixtures. arXiv preprint arXiv:1308.0346 [math.ST]. [2] Arias-Castro, E. and Wang, M. (2015). The sparse Poisson means model. Electron. J. Statist. 9 2170–2201. MR3406276 [3] Cai, T. T., Jeng, X. J. and Jin, J. (2011). Optimal detection of heterogeneous and heteroscedastic mixtures. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 73 629–662. MR2867452 [4] Cai, T. T. and Wu, Y. (2014). Optimal Detection of Sparse Mixtures Against a Given Null Distribution. IEEE Trans. Info. Theory 60 2217–2232. MR3181520 [5] Cayon, L., Jin, J. and Treaster, A. (2005). Higher Criticism statistic: detecting and identifying non-Gaussianity in the WMAP first-year data. Monthly Notices of the Royal Astronomical Society 362 826–832. 24 J. G. LIGO ET AL. [6] Cover, T. M. and Thomas, J. A. (2006). Elements of Information Theory. NY: John Wiley and Sons, Inc. MR2239987 [7] Darling, D. A. and Erdös, P. (1956). A limit theorem for the maximum of normalized sums of independent random variables. Duke Math. J. 23 143–155. MR0074712 [8] Dembo, A. and Zeitouni, O. (2010). Large deviations techniques and applications 38. Springer Science & Business Media. MR2571413 [9] den Hollander, F. (2008). Large deviations 14. American Mathematical Soc. MR1739680 [10] Dobrushin, R. L. (1958). A statistical problem arising in the theory of detection of signals in the presence of noise in a multi-channel system and leading to stable distribution laws. Theory of Probability & Its Applications 3 161–173. [11] Donoho, D. and Jin, J. (2004). Higher criticism for detecting sparse heterogeneous mixtures. Ann. Statist. 32 962–994. MR2065195 [12] Donoho, D. and Jin, J. (2008). Higher criticism thresholding: Optimal feature selection when useful features are rare and weak. Proceedings of the National Academy of Sciences 105 14790–14795. [13] Durrett, R. (2010). Probability: Theory and Examples, 4 ed. Cambridge University Press. MR2722836 [14] Gibbs, A. L. and Su, F. E. (2002). On choosing and bounding probability metrics. International statistical review 70 419–435. [15] Goeman, J. J. and Bühlmann, P. (2007). Analyzing gene expression data in terms of gene sets: methodological issues. Bioinformatics 23 980–987. [16] Ingster, Y. and Suslina, I. A. (2003). Nonparametric goodness-of-fit testing under Gaussian models 169. Springer Science & Business Media. MR1991446 [17] Jager, L. and Wellner, J. A. (2007). Goodness-of-fit tests via phi-divergences. Ann. Statist. 35 2018–2053. MR2363962 [18] Lehmann, E. L. and Romano, J. P. (2006). Testing statistical hypotheses. Springer Science & Business Media. MR2135927 [19] Ligo, J. G., Moustakides, G. V. and Veeravalli, V. V. (2016). Rate analysis for detection of sparse mixtures. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 4244-4248. [20] Mossel, E. and Roch, S. (2015). Distance-based species tree estimation: information-theoretic trade-off between number of loci and sequence length under the coalescent. In Approximation, randomization, and combinatorial optimization. Algorithms and techniques. LIPIcs. Leibniz Int. Proc. Inform. 40 931–942. Schloss Dagstuhl. Leibniz-Zent. Inform.,Wadern,DE. MR3442006 [21] Poor, H. V. (1994). An Introduction to Signal Detection and Estimation, 2 ed. Springer, New York, NY. MR1270019 [22] Saligrama, V. and Zhao, M. (2012). Local Anomaly Detection. In 2012 International Conference on Artificial Intelligence and Statistics (AISTATS) 969–983. [23] Walther, G. (2013). The average likelihood ratio for large-scale multiple testing and detecting sparse mixtures. In From probability to statistics and back: high-dimensional models and processes. Inst. Math. Stat. (IMS) Collect. 9 317–362. Inst. Math. Statist., Beachwood, OH. MR3202643 DETECTING SPARSE MIXTURES Coordinated Science Laboratory and Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Urbana, IL 61801, USA E-mail: [email protected] [email protected] 25 Department of Electrical and Computer Engineering University of Patras 26500 Rio, Greece and Department of Computer Science Rutgers University New Brunswick, NJ 08854, USA E-mail: [email protected] Submitted arXiv: 1509.07566 SUPPLEMENTAL MATERIAL FOR: “DETECTING SPARSE MIXTURES: RATE OF DECAY OF ERROR PROBABILITY” By Jonathan G. Ligok , George V. Moustakides†† and Venugopal V. Veeravallik University of Illinois at Urbana-Champaignk , University of Patras†† and Rutgers University†† 7. Weak Signals: Supporting Lemmas. In this section, we provide the proofs of the lemmas that are necessary for establishing the validity of Theorem 3.1. Lemma 7.1. Under the assumptions of Theorem 3.1, there exist positive constants C1 , C2 such that for sufficiently large n we have C1 2n Dn2 ≥ σn2 ≥ C2 2n Dn2 , where σn2 is defined in (3.11). Proof. We first show that for sufficiently large n, (7.1) C1 ≥ σn2 Λn (sn ) . 2n Dn2 Note that (log (1 + x))2 (1 + x)s ≤ 2x2 for s ∈ (0, 1) , x ≥ 1. √ This follows from 0 ≤ log (1 + x) ≤ x for x ≥ 0 and 1 ≤ (1 + x)s ≤ 2x for x ≥ 1 and s ∈ (0, 1). Also, note Λn (0) = Λn (1) = 1 implying sn ∈ (0, 1) by convexity of Λn (Lemma 2.2.5, [8]). For shorthand, we will write Ln = Ln (X1 ). Then, h i Λn (sn )σn2 = E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn h i = E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)>1} h i (7.3) + E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)≤1} (7.2) ¶ Supported by the US National Science Foundation under grants CIF 1514245 and CIF 1513373. 1 2 J. G. LIGO ET AL.   We first consider E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)>1} . By (7.2), we have on the event {n (Ln − 1) > 1} that log (1 + n (Ln − 1)) 2 1 + n (Ln − 1) sn ≤ 2 n (Ln − 1) 2 . Thus,   (7.4) E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)>1}     ≤ E0 2 (n (Ln − 1))2 1{n (Ln −1)>1} ≤ 22n E0 (Ln − 1)2 = 22n Dn2 . We now consider h i E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)≤1} . A simple calculus argument shows that (log (1 + x))2 ≤ 5x2 for x ≥ − 12 . Note that since Ln ≥ 0, −n ≤ n (Ln − 1). Because n → 0, for sufficiently large n we have that n < 12 and (log (1 + n (Ln − 1)))2 ≤ 5 (n (Ln − 1))2 holds. Also, (1 + n (Ln − 1))sn ≤ 2sn ≤ 2 on the event {n (Ln − 1) ≤ 1}. Thus, h i (7.5) E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)≤1} h i h i ≤ E0 10 (n (Ln − 1))2 1{n (Ln −1)≤1} ≤ 10 E0 (n (Ln − 1))2 = 10 2n Dn2 . Using (7.4),(7.5) in (7.3), we see for sufficiently large n that Λn (sn )σn2 ≤ 122n Dn2 establishing (7.1). We now show that (7.6) C2 ≤ σn2 Λn (sn ) . 2n Dn2 DETECTING SPARSE MIXTURES” 3 Taking any γ < 12 , from Equation (3.1) of Theorem 3.1, h i Λn (sn )σn2 = E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn h i ≥ E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)≤γ}     1 (7.7) 1{n (Ln −1)≤γ} ≥ E0 (log (1 + n (Ln − 1)))2 2 h i 1 ≥ E0 (n (Ln − 1))2 1{n (Ln −1)≤γ} (7.8) 4 " # (n (Ln − 1))2 Dn2 E0 1{n (Ln −1)≤γ} = 4 Dn2 # " Dn2 (n (Ln − 1))2 = E0 1{Ln ≤1+ γ } n 4 Dn2 #! " Dn2 2n (Ln − 1)2 (7.9) = 1 − E0 1{Ln ≥1+ γ } n 4 Dn2 Where (7.7) follows from (1 + n (Ln − 1))sn ≥ (1 − n )sn ≥ 1 − n ≥ 12 for sufficiently large n, as sn ∈ (0, 1) and n → 0. A simple calculus argument shows that 12 x2 ≤ (log (1 + x))2 for x ∈ [− 21 , 12 ]. This, along the fact that with − 12 < −n ≤ n (Ln − 1) ≤ γ < 12 on the event {n (Ln − 1) ≤ γ} for sufficiently large n establishes (7.8). The definition of Dn2 furnishes (7.9). 2 Noting that E0 [ (LnD−1) 1{Ln ≥1+ γ } ] → 0 by the assumptions of Thm 2.1 in 2 n n the main text, (7.6) is established. In order to remove the Λn (sn ) factor from the bounds, note that Λn (sn ) ≤ Λn (1) ≤ 1 and that Λn (s) ≥ (1 − n )s ≥ 21 for sufficiently large n. This along with (7.1) and (7.6) establishes the lemma. This lemma is established identically under H1,n by applying a change of measure to P0,n (which replaces sn with 1 − sn in the argument above). Lemma 7.2. Under the assumptions of Theorem 3.1, if we use the tilted measure, we have (7.10)   1 P̃ LLR (n) ≥ 0 → 2 as n → ∞. Proof. For the proof, we will need the Lindeberg-Feller Central Limit Theorem whose validity is demonstrated in Theorem 3.4.5, [13]: 4 J. G. LIGO ET AL. Theorem 7.3. For each n, let Zn,i , 1 ≤ i ≤ n, be independent zero-mean random variables. Suppose n X  2  lim E Zn,i = σ2 > 0 (7.11) n→∞ i=1 and for all γ > 0, n h i X lim E |Zn,i |2 1{|Zn,i |>γ} = 0 (7.12) n→∞ i=1 Then, Sn = Zn,1 + . . . + Zn,n converges in distribution to the normal distribution with mean zero and variance σ 2 as n → ∞. Let us now continue with the proof of Lemma 7.2. We draw i.i.d. {Xi }ni=1 from H0,n . Define for 1 ≤ m ≤ n  ξn,i . ξn,i = log 1 + n Ln (Xi ) − 1 , Zn,i = √ nσn (7.13) Note that n X (7.14) i=1 LLR(n) Zn,i = √ . nσn Pn We show i=1 Zn,i converges to a standard normal distribution under the 2 ] = 1. tilted measure. As stated in the main text, Ẽ [Zn,i ] = 0 and Ẽ[Zn,i n Thus, (7.11) is satisfied with σ 2 = 1. It remains to check (7.12). Since for fixed n, the Zn,i are i.i.d, it suffices to verify that # " 2  2  ξn,1 Ẽ nZn,1 1{|Zn,1 |>γ} = Ẽ 1 2 → 0, σn2 { ξn,12 >γ 2 } nσn n → ∞. To simplify notation, let Ln = Ln (X1 ). By Lemma 7.1, it suffices to show that " # 2 ξn,1 Ẽ 2 2 1 ξn,1 →0 2 n Dn { 2 2 >nγ 2 } C2 n Dn which changing to the P0 measure is equivalent to showing that for 0 < γ < γ0 " # 2 ξn,1 sn →0 (7.15) E0 2 2 (1 + n (Ln − 1)) 1 ξn,1 2 2 n Dn { 2 2 >nγ } C2 n Dn DETECTING SPARSE MIXTURES” 5 since Λn (sn ) ∈ [ 12 , 1] for sufficiently large n. We decompose (7.15) into # 2 ξn,1 sn (7.16) E0 2 2 (1 + n (Ln − 1)) 1 ξn,1 2 2 n Dn { 2 >nγ } C2 2 n Dn " # 2 ξn,1 = E0 2 2 (1 + n (Ln − 1))sn 1 ξn,1 2 2 n Dn { 2 >nγ ,n (Ln −1)>1} C2 2 n Dn " # 2 ξn,1 sn + E0 2 2 (1 + n (Ln − 1)) 1 ξn,1 2 2 n Dn { 2 2 >nγ ,n (Ln −1)≤1} " C2 n Dn and show that both parts in (7.16) tend to zero. For the first part applying 2 (7.2) and log(1 + x) ≤ x for x > 0, " # 2 ξn,1 sn E0 2 2 (1 + n (Ln − 1)) 1 ξn,1 2 2 n Dn { 2 >nγ ,n (Ln −1)>1} C2 2 n Dn # " 22n (Ln − 1)2 ≤ E0 1{ 2n (Ln −1)2 >nγ 2 , (L −1)>1} n n 2n Dn2 2 C2 2 n Dn   (Ln − 1)2 √ = 2E0 1{ Ln√−1 >γ n,n (Ln −1)>1} Dn2 Dn C2   2 (Ln − 1) √ √ γ 1 ≤ 2E0 {Ln >1+ C2 nDn n  } n Dn2   2 (Ln − 1) ≤ 2E0 1{Ln >1+ γ } → 0 n Dn2 √ where the last inequality holds because nDn n → ∞ we can conclude √ from √ that for sufficiently large n we have C2 nDn n ≥ 1. We now show that the second part in (7.16) tends to zero as well. We observe that since Ln ≥ 0 we have −n ≤ n (Ln − 1). Using (log(1 + x))2 ≤ 5x2 for x ≥ − 21 , and that (1 + n (Ln − 1))sn ≤ 2sn ≤ 2 on the event 6 J. G. LIGO ET AL. {n (Ln − 1) ≤ 1}, we see that for n sufficiently large such that n < 21 , " # 2 sn ξn,1 E0 2 2 1 + n (Ln − 1) 1 ξn,1 2 2 n Dn { 2 >nγ ,n (Ln −1)≤1} C2 2 n Dn " # 2n (Ln − 1)2 ≤ 10E0 1{ 52n (Ln −1)2 >nγ 2 , (L −1)≤1} n n 2n Dn2 2 C2 2 n Dn   2 (Ln − 1) q ≤ 10E0 1 C2 √ {|Ln −1|> nDn γ} Dn2 5   2 (Ln − 1) q = 10E0 1 C2 √ nDn γ} {Ln >1+ Dn2 5   2 (Ln − 1) ≤ 10E0 1{Ln >1+ γ } n Dn2 √ The last equality follows from the fact that nn Dn → ∞, since this im√ plies that nDnq→ ∞, which suggests that for large enough n we cannot q √ C2 √ C2 have 1 − Ln > nDn γ but only Ln − 1 > nDn γ. Finally the 5 q5 √ last inequality is true for large enough n such that C52 nDn n ≥ 1, which is always possible since this quantity tends to infinity because of our assumption in (3.3). Thus, (7.15) holds and the Lindeberg-Feller CLT shows √ that LLR(n) converges to a standard normal distribution under the tilted nσn measure. Therefore,   LLR(n) 1 (7.17) P̃ [LLR(n) ≥ 0] = P̃ √ ≥0 → 2 nσn as n → ∞ establishing the lemma. Verifying the Lindeberg-Feller CLT conditions for analyzing PMD is done by changing from the P1 to the P0 measure. Lemma 7.4. (7.18) Under the assumptions of Theorem 3.1 we have lim inf n→∞ log Λn (sn ) 1 ≥− . 2n Dn2 8 Proof. Consider the function (1 + x)s for s ∈ (0, 1) and x ∈ [−γ, γ] where 0 < γ < 1. Then 1 1 (1 − s) (2 − s) 3 x (1 + x)s = 1 + sx + s (s − 1) x2 + 2 6 (1 + ξ)3−s 1 1 γ (7.19) ≥ 1 + sx − x2 − x2 = 1 + sx − ω(γ)x2 , 8 3 (1 − γ)3 DETECTING SPARSE MIXTURES” where we define ω(γ) = 1 8 + γ 1 3 (1−γ)3 . 7 The first equality holds for some ξ ∈ [−γ, γ] by the mean value form of Taylor’s theorem. The inequality is obtained by minimizing the coefficient of x2 while for the last term we observe that since x ≥ −γ we have x3 ≥ −γx2 ; furthermore (1 + ξ)3−s ≥ (1 − γ)3 and (1 − s)(2 − s) ≤ 2. When we substitute the previous inequalities we obtain the lower bound in (7.19). Using this, we can lower bound Λn (s) for all s ∈ (0, 1). Fix 0 < γ < 1. As before, we will use the shorthand Ln = Ln (X1 ). Then, for sufficiently large n we have n < γ suggesting that −γ ≤ n (Ln − 1). Therefore using (7.19) and assuming n sufficiently large we can write Λn (s) = E0 [(1 + n (Ln − 1))s ]   ≥ E0 (1 + n (Ln − 1))s 1{n (Ln −1)≤γ}   ≥ E0 (1 + sn (Ln − 1)) 1{n (Ln −1)≤γ} − ω(γ)2n Dn2   = 1 − ω(γ)2n Dn2 − E0 (1 + sn (Ln − 1)) 1{n (Ln −1)≥γ}   ≥ 1 − ω(γ)2n Dn2 − E0 (1 + n (Ln − 1)) 1{n (Ln −1)≥γ}    1 1 2 2 2 2 ≥ 1 − ω(γ)n Dn − E0 +  (Ln − 1) 1{n (Ln −1)≥γ} γ2 γ n    (Ln − 1)2 2 γ 1{Ln ≥1+  } 2n Dn2 ≥ 1 − ω(γ) + 2 E0 n γ Dn2   2 ≥ 1 − ω(γ) + 2 γ 3 2n Dn2 , γ where in the second equality we used the fact that E0 [Ln − 1] = 0 and in the third inequality we replaced the maximum values of s = 1. In the fourth inequality we used the property that on the set {Ln ≥ 1 + γn } we can write γ12 2n (Ln − 1)2 ≥ 1 and γ1 2n (Ln − 1)2 ≥ n (Ln − 1). Finally in the last inequality using the condition of Theorem 3.1 and assuming n sufficiently large the expectation becomes smaller than γ 3 . Using the previous result we obtain  log 1 − (ω(γ) + 2γ)2n Dn2 log Λn (sn ) lim inf ≥ lim inf = −(ω(γ) + 2γ), n→∞ n→∞ 2n Dn2 2n Dn2 where for the equality we used the limit log(1−x) → −1 as x → 0 and the x assumption that n Dn → 0. Letting γ → 0 establishes the lemma since ω(0) = 18 . The proof is identical under H1,n , where the analogue of the lemma is n) lim inf n→∞ Λn(1−s ≥ − 18 . 2 D2 n n 8 J. G. LIGO ET AL. 8. Moderate Signals: Gaussian Location Model. Assume > 12 . Recall from the proof of Thm 3.1  hp in (8.1) PFA (n) ≤ E0 1 − n + n Ln (X1 ) β 2r 3 2 > and hp i 1 (8.2) E0 1 − n + n Ln (X1 ) = 1− E0 2 " # 2n (Ln (X1 ) − 1)2 p 2 . 1 + 1 + n (Ln (X1 ) − 1) We√write the observations as a multiple of µn , X = αµn . Then, taking µn = 2r log n, we have 2 Ln (x) = e−µn /2+µn x = nr(2α−1) . (8.3) In view of (8.3), n (Ln − 1) = nr(2α−1)−β − n−β . (8.4) Thus, if r(2α − 1) − β > 0 we have n (Ln − 1) → ∞ and if r(2α − 1) − β < 0 we have n (Ln − 1) → 0 as n → ∞. 2 2 3 β Let κ = 2r + 12 . Note (1+√x1+x)2 ≥ x4 − x8 for x ≥ −1. Thus, on the event {X1 < κµn }, 2n (Ln (X1 ) − 1)2 3n (Ln (X1 ) − 1)3 2n (Ln (X1 ) − 1)2 ≥ − p 2 4 8 1 + 1 + n (Ln (X1 ) − 1)   (1 − n−β ) 2 2 1 (8.5) ≥ n (Ln (X1 ) − 1) − 4 8 2 2  (Ln (X1 ) − 1) (8.6) ≥ n 8 where (8.5) follows from −1 ≤ −n ≤ n (Ln (X1 ) − 1) ≤ 1 − n−β on {X1 < κµn }, and (8.6) follows from non-negativity of the terms involved. Then, " # 2n (Ln (X1 ) − 1)2 E0 p 2 1 + 1 + n (Ln (X1 ) − 1) " # 2n (Ln (X1 ) − 1)2 (8.7) ≥ E0 p 2 1{X1 <κµn } 1 + 1 + n (Ln (X1 ) − 1) (8.8) (8.9) 2n E0 [(Ln (X1 ) − 1)2 1{X1 <κµn } ] 8  2  2 = n eµn Φ((κ − 2)µn ) − 2Φ((κ − 1)µ) + Φ(κµ) 8 ≥ 9 DETECTING SPARSE MIXTURES” where (8.7) follows from non-negativity, (8.8) follows from (8.6) and Φ denotes the standard normal cumulative distribution function. 2 By the standard approximation Q(x) ≈ x√12π e−x /2 , we see that the domi2 nant term in (8.9) is 2n eµn Φ((κ−2)µn )/8 and is of the order of β which tends to zero by our assumption on 2r . Thus, as in the proof of Thm 3.1, by (8.1)   log PFA (n) 2n  µ2n ≤ log 1 − e Φ((κ − 2)µn ) − 2Φ((κ − 1)µ) + Φ(κµ) . n 16 2 Dividing both sides by 2n eµn Φ((κ − 2)µn ) and taking a lim sup yields lim sup n→∞ log PFA (n) µ 2 nn e 2n Φ((κ − 2)µn ) 2 ≤− 2 n−2β+2r−r(1.5−β/2r) √ 2r log n 1 . 16 For consistency, it suffices to require n2n eµn Φ((κ − 2)µn ) → ∞. Thus, it 2  √ β suffices to require 1 − 2β + 2r − r 32 − 2r > 0, since log n is negligible with respect to any positive power of n. Combining the constraints −2β + 2  2  β β β < 0, 1 − 2β + 2r − r 32 − 2r > 0, 23 > 2r > 12 gives the 2r − r 32 − 2r desired rate characterization. The proof for PMD is identical. Note that this bound is likely not tight (even if it has the right order), since we neglected the event {X1 ≥ κµn } to form the bound. 10 Coordinated Science Laboratory and Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Urbana, IL 61801, USA E-mail: [email protected] [email protected] J. G. LIGO ET AL. Department of Electrical and Computer Engineering University of Patras 26500 Rio, Greece and Department of Computer Science Rutgers University New Brunswick, NJ 08854, USA E-mail: [email protected]
10math.ST
Short-term Memory of Deep RNN arXiv:1802.00748v1 [cs.LG] 2 Feb 2018 Claudio Gallicchio Department of Computer Science, University of Pisa Largo Bruno Pontecorvo 3 - 56127 Pisa, Italy Abstract. The extension of deep learning towards temporal data processing is gaining an increasing research interest. In this paper we investigate the properties of state dynamics developed in successive levels of deep recurrent neural networks (RNNs) in terms of short-term memory abilities. Our results reveal interesting insights that shed light on the nature of layering as a factor of RNN design. Noticeably, higher layers in a hierarchically organized RNN architecture results to be inherently biased towards longer memory spans even prior to training of the recurrent connections. Moreover, in the context of Reservoir Computing framework, our analysis also points out the benefit of a layered recurrent organization as an efficient approach to improve the memory skills of reservoir models. 1 Introduction Deep learning is an attractive area of research in constant growth [1]. In particular, in the neuro-computing field, the study of deep neural networks composed by multiple non-linear layers has proved able to learn feature representations at progressively higher levels of abstraction, leading to eminent performance e.g. in vision tasks. Extending the benefits of depth to recurrent neural networks (RNNs) is an intriguing research direction that is recently gaining an increasing attention [2]. In this context, the study of deep RNNs has pointed out that hierarchically organized recurrent models have the potentiality of developing multiple time-scales representations of the input history in their internal states, which can be of great help, e.g., when dealing with text processing tasks [3]. More recently, studies in the area of Reservoir Computing (RC) [4, 5] have shown that the ability of developing such a structured state space organization is indeed an intrinsic property of layered RNN architectures [6, 7]. The study of deep RC networks on the one hand allowed the development of efficiently trained deep models for learning in the temporal domain, and on the other hand it paved the way to further studies on the properties of deep RNNs dynamics even in the absence of (or prior to) learning of the recurrent connections. An aspect of prominent relevance in the study of dynamical models is represented by the analysis of their memory abilities. In this paper, exploiting the ground provided by the deep RC framework, we explicitly address the problem of analyzing the short-term memory capacity of individual (progressively higher) layers in deep recurrent architectures. Contributing to highlight the intrinsic diversification of transient state dynamics in hierarchically constructed recurrent networks, our investigation aims at shedding more light on the bias of layering in the RNN architectural design. Framed in the RC area, our analysis is also intended to provide insights on the process of reservoir network construction. 2 Deep Stacked RNN We consider deep RNNs [3] whose recurrent architecture is obtained by a stacked composition of multiple non-linear recurrent hidden layers, as illustrated in Fig. 1. The state computation proceeds by following the hierarchical network organization, from the lowest layer to the highest one. Specifically, at each time step t the first recurrent layer in the network is fed by the external input while each successive layer is fed by the activation of the previous one. Fig. 1: Hierarchical organization of hidden layers in a deep RNN. Under a dynamical system perspective, a deep RNN implements an inputdriven discrete-time non-linear dynamical system, in which the state evolution in each layer i is ruled by a state transition function F (i) . Here we denote the input dimension by NU and assume, for the sake of simplicity, that each hidden layer contains NR recurrent units. In the following, we use u(t) and x(i) (t), respectively, to indicate the external input and state of i-th hidden layer at time step t. Based on this notation, the state in the first layer is updated according to the following equation: x(1) (t) = F (1) (u(t), x(1) (t − 1)) = tanh(W(1) u(t) + Ŵ(1) x(1) (t − 1)), (1) where W(1) ∈ RNR ×NU is the input weight matrix and Ŵ(1) ∈ RNR ×NR is the recurrent weight matrix for the first layer. For each successive layer i > 1, the state is updated according to: x(i) (t) = F (i) (x(i−1) (t), x(i) (t−1)) = tanh(W(i) x(i−1) (t)+ Ŵ(i) x(i) (t−1)), (2) where W(i) ∈ RNR ×NR collects the weights for the inter-layer connections from layer i − 1 to layer i and Ŵ(i) ∈ RNR ×NR is the recurrent weight matrix for layer i. Note that in both above eq. 1 and 2, a tanh non-linearity is used as element-wise applied activation function of recurrent units and bias terms are omitted for the ease of notation. Here it is also worth observing that, although the deep recurrent dynamics globally evolve as a whole, locally to each layer i the state information coming from the previous level i − 1 actually acts as an independent input information that encodes the history of the external input up to the present time step. Taking aside the aspects related to learning of the recurrent connections (and the specific aspects involved by different training strategies), here we focus our analysis on the case of untrained deep recurrent dynamics. To do so, we resort to the recently introduced deep RC framework [6], according to which the recurrent part of the deep RNN architecture is left untrained after initialization subject to stability constraints [7]. Specifically, the network is initialized with weights from a uniform distribution in [−1, 1] and then re-scaled to control for each layer i the values of kW(i) k2 and ρ(Ŵ(i) ), where ρ(·) denotes the spectral radius of its matrix argument (i.e. the maximum among the eigenvalues magnitudes). These quantities are hyper-parameters of the model that influence its state dynamics and that are typically set to small values in order to guarantee a stable regime, a standard initialization approach also for trained networks. Notice that this framework allows us on the one hand to investigate the fixed characterization of state dynamics in successive levels of a deep RC network, and on the other hand to study of the bias due to layering in deep recurrent architectures. Output computation is implemented by using an output layer of size NY . Though different choices are possible for the state-output connection settings (see e.g. [3, 8]), following from our analysis aims here we consider output modules that are individually applied to each layer of the recurrent network. This enables us to study separately the characteristics of the state behavior emerging at the different levels in the architecture. We use linear output modules, such that for (i) each layer i the output is computed as y(i) (t) = Wout x(i) (t), where matrices (i) NY ×NR are trained for each layer individually, using a direct method Wout ∈ R such as pseudo-inversion. In the RC framework this setting also ensures the same training cost for every layer. 3 Experiments We investigate the short-term memory abilities of deep RNN architectures by resorting to the Memory Capacity (MC) task [9]. This aims at measuring the extent to which past input events can be recalled from present state activations. Specifically, the recurrent system is tested in its ability to reconstruct delayed versions of a stationary uni-variate driving input signal (NU = NY = 1), with the MC at layer i computed as a squared correlation coefficient, as follows: M C (i) = ∞ X k=1 (i) M Ck = ∞ (i) X Cov 2 (u(t − k), yk (t)) (i) k=1 V ar(u(t)) V ar(yk (t)) , (3) (i) where yk (t) is the activation of the output unit trained to reconstruct the u(t−k) signal from the state of layer i, while Cov and V ar respectively denote the covariance and variance operators. In order to maximally exercise the memory capability of the systems, we used i.i.d. input signals from a uniform distribution in [−0.8, 0.8], i.e. an unstructured temporal stream in which u(t) does not carry information on previous inputs . . . , u(t−2), u(t−1). For this task, we considered a 6000 time-step long sequence, where the first 5000 time steps were used for training1 and the remaining 1000 for MC assessment. 1 The first 1000 time steps were considered as transient to washout the initial conditions. We considered deep RNNs with NL = 10 recurrent layers, each of which containing NR = 100 recurrent units. Input and inter-layer weights were rescaled such that kW(i) k2 = 1 for i = 1, . . . , NL . Weights of recurrent connections were re-scaled to the same spectral radius in all the layers, i.e. ρ = ρ(Ŵ(i) ) for i = 1, . . . , NL , with ρ values ranging in [0.1, 1.5]. Note that, under the considered experimental settings, for higher values of ρ > 1 the network dynamics tend to exhibit a chaotic behavior, as shown in previous works in terms of local Lyapunov exponents [10, 11]. Although recurrent dynamics in chaotic regimes are generally not interesting under a practical point of view, in this paper we consider also these cases (ρ > 1) for the scope of analysis. For each choice of ρ we independently generated 50 networks realizations (with different seeds for random generation), and averaged the achieved results over such realizations. For practical assessment of the MC values, it is useful to recall a basic theoretical result provided in [9], which states that the MC of an NR -dimensional recurrent system driven by an i.i.d. uni-variate input signal is upper bounded by NR . Accordingly, we considered a maximum value for the delay k in eq. 3 equal to twice the size of the state space, i.e. 200, which is sufficient to account for the correlations that are practically involved in our experimental settings. Fig. 2 shows the MC values achieved in correspondence of progressively higher layers in the architecture, and for the different cases of ρ considered for network initialization. Results clearly point out that for recurrent networks in the ordered regime (ρ not exceeding 1) higher layers in the deep architecture are naturally biased toward progressively longer short-term memory abilities. For networks in a chaotic regime (ρ above 1) higher layers tend to show a poorer MC. The MC performance shown in Fig. 2 has a peak in correspondence of 50 45 (i) 9 40 8 35 Layer (i) Memory Capacity (MC ) 10 7 30 6 25 5 20 4 15 3 10 2 5 1 0.2 0.4 0.6 0.8 1 1.2 1.4 Spectral Radius ( ) Fig. 2: MC of different layers in deep RNNs for increasing values of ρ. ρ = 0.9, in which case the score improves from 22.2 in the 1st layer, up to 50.1 in the 10th layer. Interestingly, our results also highlight the effectiveness of layering and its striking advantage as a convenient process for RC networks architectural design. The memory of an NR -dimensional reservoir can be indeed easily improved by using an underlying stack of recurrent layers to filter the external input signal. Note that such improvement comes at the only price of a modestly increased cost for the state computation (that increases linearly with the number of layers), while the cost for output training remains the same. layer 1 layer 4 layer 7 layer 10 k Memory Capacity (MC ) 1 0.8 0.6 0.4 0.2 0 10 20 30 40 50 60 70 80 Delay (k) Fig. 3: k-delay memory capacity of deep RNN layers at increasing height. We further inquire into the memory structure developed by the layers of deep RNNs by analyzing the MC values for increasing delays. Fig. 3 shows the forgetting curves of individual (progressively higher) layers, i.e. the values of (i) M Ck as a function of k, obtained in the case of ρ = 0.9. The plot in Fig. 3 clearly reveals the diversification of memory spans in the components of the deep recurrent architecture: higher layers are able to store information about past inputs for longer times. While for the 1st layer the memory recall is almost null after delay 30, the dynamics developed in the 10th layer lead to a value that is above zero even for a delay of 60. We can also see that input signals with smaller delays are better reconstructed in the lower layers, while higher layers are characterized by a peak that tends to shift to the right (more evident for layer 10 in Fig. 3), and by a slope of the forgetting curve that tends to be increasingly smoother. Besides, the highlighted diversification of short-term memory spans among the successive layers in the deep RNN architecture is also interesting as a way of characterizing (in a quantitative way) the intrinsic richness of state representations globally developed by the deep recurrent system. 4 Conclusions In this paper we have provided a computational analysis of short-term memory in deep RNNs. To do so, we have resorted to the MC task as a mean to quantify the memory of state dynamics in successive levels of a deep recurrent system. Our results clearly showed that higher layers in a hierarchically organized RNN architecture are inherently featured, even prior to learning of recurrent connections, by an improved ability to latch input information for longer time spans. The analysis provided in this paper also revealed interesting insights on the diversification of the memory structure developed within deep stacked RNN dynamics, showing that higher layers tend to forget the past input history more slowly and more smoothly compared lower ones. Furthermore, framed within the deep RC framework, our results provided evidence that support the practical benefit of the layered recurrent organization as a way to improve the memory skills of reservoir networks in a cost-effective fashion. Overall, though further studies in this research direction are certainly demanded (e.g. on the theoretical side), we believe that the outcomes provided in this paper can contribute to better understand and characterize the bias due to layering in deep recurrent neural models. References [1] I. Goodfellow, Y. Bengio, and A. Courville. Deep learning. MIT press, 2016. [2] P. Angelov and A. Sperduti. Challenges in deep learning. In Proc. of the 24th European Symposium on Artificial Neural Networks (ESANN), pages 489–495. i6doc.com, 2016. [3] M. Hermans and B. Schrauwen. Training and analysing deep recurrent neural networks. In NIPS, pages 190–198, 2013. [4] D. Verstraeten, B. Schrauwen, M. d’Haene, and D. Stroobandt. An experimental unification of reservoir computing methods. Neural networks, 20(3):391–403, 2007. [5] M. Lukoševičius and H. Jaeger. Reservoir computing approaches to recurrent neural network training. Computer Science Review, 3(3):127–149, 2009. [6] C. Gallicchio, A. Micheli, and L. Pedrelli. Deep reservoir computing: A critical experimental analysis. Neurocomputing, 268:87–99, 2017. [7] C. Gallicchio and A. Micheli. Echo state property of deep reservoir computing networks. Cognitive Computation, 9(3):337–350, 2017. [8] R. Pascanu, C. Gulcehre, K. Cho, and Y. Bengio. How to construct deep recurrent neural networks. arXiv preprint arXiv:1312.6026v5, 2014. [9] H. Jaeger. Short term memory in echo state networks. Technical report, German National Research Center for Information Technology, 2001. [10] C. Gallicchio, A. Micheli, and L. Silvestri. Local lyapunov exponents of deep rnn. In Proc. of the 25th European Symposium on Artificial Neural Networks (ESANN), pages 559–564. i6doc.com, 2017. [11] C. Gallicchio, A. Micheli, and L. Silvestri. Local lyapunov exponents of deep echo state networks. Neurocomputing, 2017. (Accepted).
2cs.AI
arXiv:cs/0201011v1 [cs.PL] 16 Jan 2002 Under consideration for publication in Theory and Practice of Logic Programming 1 A Backward Analysis for Constraint Logic Programs ANDY KING University of Kent at Canterbury, Canterbury, CT2 7NF, UK. email: [email protected] LUNJIN LU Oakland University, Rochester, MI 48309, USA. email: [email protected] Abstract One recurring problem in program development is that of understanding how to re-use code developed by a third party. In the context of (constraint) logic programming, part of this problem reduces to figuring out how to query a program. If the logic program does not come with any documentation, then the programmer is forced to either experiment with queries in an ad hoc fashion or trace the control-flow of the program (backward) to infer the modes in which a predicate must be called so as to avoid an instantiation error. This paper presents an abstract interpretation scheme that automates the latter technique. The analysis presented in this paper can infer moding properties which if satisfied by the initial query, come with the guarantee that the program and query can never generate any moding or instantiation errors. Other applications of the analysis are discussed. The paper explains how abstract domains with certain computational properties (they condense) can be used to trace control-flow backward (right-to-left) to infer useful properties of initial queries. A correctness argument is presented and an implementation is reported. 1 Introduction The myth of the lonely logic programmer writing a program in isolation is just that: a myth. Applications (and application components) are usually implemented and maintained by a team. One consequence of this is a significant proportion of the program development effort is devoted to understanding code developed by another. One advantage of (constraint) logic programs for software development is that their declarative nature makes them less opaque than, say, C++ programs. One disadvantage of logic programs over C++ programs, however, is that the signature (argument types) of a predicate do not completely specify how the predicate should be invoked. In particular, a call to a predicate from an unexpected context may generate an error if an argument of the call is insufficiently instantiated (even if the program and query are well-typed). This is because logic programs contain builtins and calls to these builtins often impose moding requirements on the query. If the program is developed by another programmer, it may not be clear how to 2 Andy King and Lunjin Lu query a predicate so as to avoid an instantiation error. In these circumstances, the programmer will often resort to a trial and error tactic in their search for an initial call mode. This can be both frustrating and tedious and, of course, cannot guarantee coverage of all the program execution paths. This paper presents an analysis for inferring moding properties which, if satisfied by the initial query, ensure that the program does not generate instantiation errors. Of course, it does not mean that the inferred call has the form exactly intended by the original programmer – no analysis can do that – the analysis just recovers mode information. Nevertheless, this is a useful first step in understanding the code developed by another. The problem of inferring initial queries which do not lead to instantiation errors is an instance of the more general problem of deducing how to call a program so that it conforms to some desired property, for example, calls to builtins do not error, the program terminates, or calls to builtins behave predictably. The backward analysis presented in this paper is designed to infer conditions on the query which, if satisfied, guarantee that resulting derivations satisfy a property such as one of those above. Specifically, the analysis framework can be instantiated to solve the following analysis problems: • Builtins and library functions can behave unpredictably when called with infinite rational trees. For example, the query ?- X = X + X, Y is X will not terminate in SICStus Prolog because the arithmetic operator expects its input to be a finite tree rather than an infinite rational tree. Moreover, the standard term ordering of Prolog does not lift to rational trees, so the builtin sort can behave unpredictably when sorting rational trees. These problems (and related problems with builtins) motivate the use of dependency analysis for tracking which terms are definitely finite (Bagnara et al., 2001). The basic idea is to describe the constraint x = f (x1 , . . . , xn ) by the Boolean function x ⇔ ∧ni=1 xi which encodes that x is bound to a finite tree iff each xi is bound to a finite tree. Although not proposed in the context of backward analysis (Bagnara et al., 2001), the framework proposed in this paper can be instantiated with a finite tree dependency domain to infer finiteness properties on the query which, if satisfied, guarantee that builtins are not called with problematic arguments. • Termination inference is the problem of inferring initial modes for a query that, if satisfied, ensure that a logic program terminates. This problem generalises termination checking which verifies program termination for a class of queries specified by a given mode. Termination inference dates back to (Mesnard, 1996) but it has been recently observed (Genaim & Codish, 2001) that the missing link between termination checking and termination inference is backward analysis. A termination inference analyser is reported in (Genaim & Codish, 2001) composed from two components: a standard termination checker (Codish & Taboch, 1999) and the backward analysis described in this paper. The resulting analyser is similar to the cTI analyser of (Mesnard & Neumerkel, 2001) – the main difference is its design as two existing black- A Backward Analysis for Constraint Logic Programs 3 box components which, according to (Genaim & Codish, 2001), simplifies the formal justification and implementation. • Mode analysis is useful for implementing ccp programs. In particular (Debray et al., 1992) explains how various low-level optimisations, such as returning output values in registers, can be applied if goals can be scheduled left-toright without suspension. If the guards of the predicates are re-interpreted as moding requirements, then the backward mode analysis can infer sufficient conditions for avoiding deadlock under left-to-right scheduling. The analysis presented in this paper thus has applications outside program development. To summarise, the analysis presented in this paper can deduce properties of the call which, if satisfied, guarantee that resulting derivations fulfill some desired property. The analysis is unusual in that it applies lower approximation (see 2.4.1) as well as upper approximation (see 2.3.1); it is formulated in terms of a greatest fixpoint calculation (see 2.4) as well as least fixpoint calculation (see 2.3); the analysis also imposes some unusual restrictions on the abstract domain (see 2.4.6). 1.1 Backward analysis Backward analysis has been applied extensively in functional programming in, among other things, projection analysis (Wadler & Hughes, 1987), stream strictness analysis (Hall & Wise, 1989), inverse image analysis (Dyber, 1991), etc. By reasoning about the context of a function application, these analyses can identify opportunities for eager evaluation that are missed by (forward) strictness analysis as proposed by (Mycroft, 1981). Furthermore, backward reasoning on imperative programs dates back to the early days of static analysis (Cousot & Cousot, 1982). By way of contrast, backward analysis has been rarely applied in logic programming. One notable exception is the demand analysis of (Debray, 1993). This analysis infers the degree of instantiation necessary for the guards of a concurrent constraint program (ccp) to reduce. It is a local analysis that does not consider the possible suspension of body calls. This analysis detects those (uni-modal) predicates which can be implemented with specialised suspension machinery. A more elaborate backward analysis for ccp is presented by (Falaschi et al., 2000). This demand analysis infers how much input is necessary for a procedure to generate a certain amount of output. This information is useful for adding synchronisation (ask) constraints to a procedure to delay execution and thereby increase grain size, and yet not introduce deadlock. (Section 7 provides more extensive and reflective review of the related work.) 1.2 Contributions Our work is quite different. As far as we are aware, it is unique in that it focuses on the backward analysis of (constraint) logic programs with left-to-right scheduling. Specifically, our work makes the following practical and theoretical contributions: • it shows how to compute an initial mode of a predicate which is safe in that 4 Andy King and Lunjin Lu if a query is at least as instantiated as the inferred mode, the execution is guaranteed to be free from instantiation errors. The modes inferred are often disjunctive, sometimes surprising and, for the small predicates that we verified by hand, appear to be optimal. • it specifies a practical algorithm for calculating initial modes that is straightforward to implement in that it reduces to two bottom-up fixpoint calculations. Furthermore, this backward analysis problem cannot be solved with any existing abstract interpretation machinery. • to the best our knowledge, it is the first time domains that are closed under Heyting completion (Giacobazzi & Scozzari, 1998), or equivalently are condensing (Marriott & Søndergaard, 1993), have been applied to backward analysis. Put another way, our work adds credence to the belief that condensation is an important property in the analysis of logic programs. The final point requires some unpacking. Condensation was originally proposed in (Langen, 1991), though arguably the simplest statement of this property (Marriott & Søndergaard, 1993) is for downward closed domains such as P os (Armstrong et al., 1998) and the P os-like type dependency domains (Codish & Lagoon, 2000). Suppose that f : X → X is an abstract operation on a downward closed domain X equipped with an operation ∧ that mimics unification or constraint solving. X is condensing iff x ∧ f (y) = f (x ∧ y) for all x, y ∈ X. Hence, if X is condensing, x ∧ f (true) = f (x) where true represents the weakest abstract constraint. More exactly, if f (true) represents the result of the goal-independent analysis, and f (x) the result of the goal-dependent one with an initial constraint x, then the equivalence f (x) = x ∧ f (true) enables goal-dependent analysis to be performed in a goal-independent way without loss of precision. This, in turn, can simplify the implementation of an analyser (Armstrong et al., 1998). Because of this, domain refinement machinery has been devised to enrich a domain with new elements to obtain the desired condensing property (Giacobazzi & Scozzari, 1998). It turns out that it is always possible to systematically design a condensing domain for a given downward closed property (Giacobazzi & Scozzari, 1998)[Theorem 8.2] by applying Heyting completion. Conversely, under some reasonable hypotheses, all condensing domains can be reconstructed by Heyting completion (Giacobazzi & Scozzari, 1998)[Theorem 8.3]. One consequence of this is that condensing domains come equipped with a (pseudo-complement) operator and this turns out to be an operation that is important in backward analysis. To summarise, machinery has been developed to synthesise condensing domains and condensing domains provide operations suitable for backward analysis. 1.3 Organisation of the paper The rest of the paper is structured as follows. Section 2 introduces the key ideas of the paper in an informal way through a worked example. Section 3 introduces the necessary preliminaries for the formal sections that follow. Section 4 presents an operational semantics for constraint logic programs with assertions in which the set of program states is augmented by a special error state. Section 5 develops a A Backward Analysis for Constraint Logic Programs 5 semantics which computes those initial states that cannot lead to the error state. The semantics defines a framework for backward analysis and formally argues correctness. Section 6 describes an instantiation of the framework for mode analysis. Section 7 reviews the related work and section 8 concludes. Much of the formal machinery is borrowed directly from (Giacobazzi et al., 1995; Giacobazzi & Scozzari, 1998) and in particular the reader is referred to (Giacobazzi et al., 1995) for proofs of the semantic results stated in section 3 (albeit presented in a slightly different form). To aid continuity in the paper, the remaining proofs are relegated to appendix A. 2 Worked example 2.1 Basic components This section informally presents an abstract interpretation scheme which infers how to query a given predicate so as to avoid run-time moding errors. In other words, the analysis deduces moding properties of the call that, if satisfied, guarantee that resulting derivations cannot encounter an instantiation error. To illustrate, consider the Quicksort program listed in the left column of figure 1. This is the first ingredient of the analysis: the input program. The second ingredient is an abstract domain which, in this case, is P os. P os is the domain of positive Boolean functions, that is, the set of functions f : {0, 1}n → {0, 1} such that f (1, . . . , 1) = 1. Hence x∨y ∈ P os since 1 ∨ 1 = 1 but ¬x 6∈ P os since ¬1 = 0. P os is augmented with the bottom element 0 with 1 being the top element. The domain is ordered by entailment |= and, in this example, will be used to represent grounding dependencies. P os comes equipped with the logical operations: conjunction ∧, disjunction ∨, implication ⇒ (and thus bi-implication ⇔). Conjunction is used to conjoin the information from different body atoms, while disjunction is used to combine the information from different clauses. Conjunction and disjunction, in turn, enable two projection operators to be defined: ∃x (f ) = f [x 7→ 0] ∨ f [x 7→ 1] and ∀x (f ) = f ′ if f ′ ∈ P os otherwise ∀x (f ) = 0 where f ′ = f [x 7→ 0] ∧ f [x 7→ 1]. Note that although f [x 7→ 0] ∨ f [x 7→ 1] ∈ P os for all f ∈ P os it does not follow that f [x 7→ 0] ∧ f [x 7→ 1] ∈ P os for all f ∈ P os. Indeed, (x ⇐ y)[x 7→ 0] ∧ (x ⇐ y)[x 7→ 1] = ¬y. Both operators are used to project out the body variables that are not in the head of a clause. Specifically, these operators eliminate the variable x from the formula f . They are dual in the sense that ∀x (f ) |= f |= ∃x (f ). These are the basic components of the analysis. 2.2 Normalisation and abstraction The analysis components are assembled in two steps. The first is a bottom-up analysis for success patterns, that is, a bottom-up analysis which infers the groundness dependencies which are known to be created by each predicate regardless of the calling pattern. This step is a least fixpoint (lfp) calculation. The second step is a bottom-up analysis for input modes (the objective of the analysis). This step is a 6 Andy King and Lunjin Lu qs([], s, s). qs([m|xs], s, t) :pt(xs, m, l, h), qs(l, s, [m|r]), qs(h, r, t). pt([], , [], []). pt([x|xs], m, [x|l], h) :m =< x, pt(xs, m, l, h). pt([x|xs], m, l, [x|h]) :m > x, pt(xs, m, l, h). qs(t1 , s, t2 ) :t1 = [], t2 = s. qs(t1 , s, t) :t1 = [m|xs], t3 = [m|r], pt(xs, m, l, h), qs(l, s, t3 ), qs(h, r, t). pt(t1 , , t2 , t3 ) :t1 = [], t2 = [], t3 = []. pt(t1 , m, t2 , h) :t1 = [x|xs], t2 = [x|l], m =< x pt(xs, m, l, h). pt(t1 , m, l, t2 ) :t1 = [x|xs], t2 = [x|h], m > x, pt(xs, m, l, h). qs(t1 , s, t2 ) :1 ⋄ g1 . qs(t1 , s, t) :1 ⋄ g2 , pt(xs, m, l, h), qs(l, s, t3 ), qs(h, r, t). pt(t1 , , t2 , t3 ) :1 ⋄ g3 . pt(t1 , m, t2 , h) :1 ⋄ g4 , =<’(m, x), pt(xs, m, l, h). pt(t1 , m, l, t2 ) :1 ⋄ g5 , >’(m, x), pt(xs, m, l, h). =<’(m, x) :- g6 ⋄ g6 . >’(m, x) :- g6 ⋄ g6 . Fig. 1. Quicksort: raw, normalised and abstracted greatest fixpoint (gfp) computation. To simplify both steps, the program is put into a form in which the arguments of head and body atoms are distinct variables. This gives the normalised program listed in the centre column of figure 1. This program is then abstracted by replacing each Herbrand constraint x = f (x1 , . . . , xn ) with a formula x ⇔ ∧ni=1 xi that describes its grounding dependency. This gives the abstract program listed in the right column of figure 1. The formula 1 in the assertion represents true whereas the formulae gi that appear in the abstract program are as follows: g1 = t1 ∧ (t2 ⇔ s) g2 = t1 ⇔ (m ∧ xs) ∧ t3 ⇔ (m ∧ r) g 3 = t1 ∧ t2 ∧ t3 g4 = t1 ⇔ (x ∧ xs) ∧ t2 ⇔ (x ∧ l) g5 = t1 ⇔ (x ∧ xs) ∧ t2 ⇔ (x ∧ h) g6 = m ∧ x Builtins that occur in the source, such as the tests =< and >, are handled by augmenting the abstract program with fresh predicates, =<′ and >′ , which express the grounding behaviour of the builtins. The ⋄ symbol separates an assertion (the required mode) from another P os formula describing the grounding behaviour of a successful call to the builtin (the success mode). For example, the formula g6 left of ⋄ in the =<′ clause asserts that the =< test will error if its first two arguments are not ground, whereas the g6 right of ⋄ describes the state that holds if the test succeeds. These formulae do not coincide for all builtins (see Table 1). For quicksort, the only non-trivial assertions arise from builtins. This would change if the programmer introduced assertions for verification (Puebla et al., 2000a). A Backward Analysis for Constraint Logic Programs 7 2.3 Least fixpoint calculation An iterative algorithm is used to compute the lfp and thereby characterise the success patterns of the program. A success pattern is a pair consisting of an atom with distinct variables for arguments paired with a P os formula over those variables. Renaming and equality of formulae induce an equivalence between success patterns which is needed to detect the fixpoint. The patterns hp(u, w, v), u ∧ (w ⇔ v)i and hp(x1 , x2 , x3 ), (x3 ⇔ x2 ) ∧ x1 i, for example, are considered to be identical: both express the same inter-argument groundness dependencies. Each iteration produces a set of success patterns: at most one pair for each predicate in the program. 2.3.1 Upper approximation of success patterns A success pattern records an inter-argument groundness dependency that describes the binding effects of executing a predicate. If hp(~x), f i correctly describes the predicate p, and g holds whenever f holds, then hp(~x), gi also correctly describes p. Success patterns can thus be approximated from above without compromising correctness. Iteration is performed in a bottom-up fashion and commences with F0 = ∅. Fj+1 is computed from Fj by considering each clause p(~x) ← d ⋄ f, p1 (~x1 ), . . . , pn (~xn ) in turn. Initially Fj+1 = ∅. The success pattern formulae fi for the n body atoms are conjoined with f to obtain g = f ∧ ∧ni=1 fi . Variables not present in p(~x), Y say, are then eliminated from g by computing g ′ = ∃Y (g) (weakening g) where ∃{y1 ...yn } (g) = ∃y1 (. . . ∃yn (g)). Weakening g does not compromise correctness because success patterns can be safety approximated from above. 2.3.2 Weakening upper approximations If Fj+1 already contains a pattern of the form hp(~x), g ′′ i, then this pattern is replaced with hp(~x), g ′ ∨ g ′′ i, otherwise Fj+1 is revised to include hp(~x), g ′ i. Thus the success patterns become progressively weaker on each iteration. Again, correctness is preserved because success patterns can be safety approximated from above. 2.3.3 Least fixpoint calculation for Quicksort For brevity, let ~u = hx1 , x2 i, ~v = hx1 , x2 , x3 i and w ~ = hx1 , x2 , x3 , x4 i. Then the lfp for the abstracted Quicksort program is obtained (and checked) in the following 3 iterations:     hqs(~v ), x1 ∧ (x2 ⇔ x3 )i hqs(~v ), x2 ⇔ (x1 ∧ x3 )i           hpt(w), ~ x1 ∧ x3 ∧ x4 i hpt(w), ~ x1 ∧ x3 ∧ x4 i F1 = F = 2     h=<′ (~u), x1 ∧ x2 i h=<′ (~u), x1 ∧ x2 i         ′ h> (~u), x1 ∧ x2 i h>′ (~u), x1 ∧ x2 i Finally, F3 = F2 . The space of success patterns forms a complete lattice which ensures that a lfp (a most precision solution) exists. The iterative process will always terminate since the space is finite and hence the number of times each 8 Andy King and Lunjin Lu success pattern can be updated is also finite. Moreover, it will converge onto the lfp since iteration commences with the bottom element F0 = ∅. Observe that F2 , the lfp, faithfully describes the grounding behaviour of quicksort: a qs goal will ground its second argument if it is called with its first and third arguments already ground and vice versa. Note that assertions are not considered in the lfp calculation. 2.4 Greatest fixpoint calculation A bottom-up strategy is used to compute a gfp and thereby characterise the safe call patterns of the program. A safe call pattern describes queries that do not violate the assertions. A call pattern has the same form as a success pattern (so there is one call pattern per predicate rather than one per clause). One starts with assuming no call causes an error and then checks this assumption by reasoning backwards over all clauses. If an assertion is violated, the set of safe call patterns for the involved predicate is strengthened (made smaller), and the whole process is repeated until the assumptions turn out to be valid (the gfp is reached). 2.4.1 Lower approximation of safe call patterns Iteration commences with D0 = {hp(~x), 1i | p ∈ Π} where Π is the set of predicate symbols occurring in the program. An iterative algorithm incrementally strengthens the call pattern formulae until they only describe queries which lead to computations that satisfy the assertions. Note that call patterns describe a subset (rather than a superset) of those queries which are safe. Call patterns are thus lower approximations in contrast to success patterns which are upper approximations. Put another way, if hp(~x), gi correctly describes some safe call patterns of p, and g holds whenever f holds, then hp(~x), f i also correctly describes some safe call patterns of p. Call patterns can thus be approximated from below without compromising correctness (but not from above). Dk+1 is computed from Dk by considering each p(~x) ← d ⋄ f, p1 (~x1 ), . . . , pn (~xn ) in turn and calculating a formula that characterises its safe calling modes. Initially set Dk+1 = Dk . A safe calling mode is calculated by propagating moding requirements right-to-left by repeated application of the logical operator ⇒. More exactly, let fi denote the success pattern formula for pi (~xi ) in the previously computed lfp and let di denote the call pattern formula for pi (~xi ) in Dk . Set en+1 = 1 and then compute ei = di ∧ (fi ⇒ ei+1 ) for 1 ≤ i ≤ n. Each ei describes a safe calling mode for the compound goal pi (~xi ), . . . , pn (~xn ). 2.4.2 Intuition and explanation The intuition behind the symbolism is that di represents the demand that is already known for pi (~xi ) not to error whereas ei is di possibly strengthened with extra demand so as to ensure that the sub-goal pi+1 (~xi+1 ), . . . , pn (~xn ) also does not error when executed immediately after pi (~xi ). Put another way, anything larger than di A Backward Analysis for Constraint Logic Programs 9 may possibly cause an error when executing pi (~xi ) and anything larger than ei may possibly cause an error when executing pi (~xi ), . . . , pn (~xn ). The basic inductive step in the analysis is to compute an ei which ensures that pi (~xi ), . . . , pn (~xn ) does not error, given di and ei+1 which respectively ensure that pi (~xi ) and pi+1 (~xi+1 ), . . . , pn (~xn ) do not error. This step translates a demand after the call to pi (~xi ) into a demand before the call to pi (~xi ). The tactic is to set en+1 = 1 and then compute ei = di ∧ (fi ⇒ ei+1 ) for i ≤ n. This tactic is best explained by unfolding the definitions of en , then en−1 , then en−2 , and so on. This reverse ordering reflects the order in which the ei are computed; the ei are computed whilst walking backward across the clause. Any calling mode is safe for the empty goal and hence en+1 = 1. Note that en = dn ∧ (fn ⇒ en+1 ) = dn ∧ (¬fn ∨ 1) = dn . Hence en represents a safe calling mode for the goal pn (~xn ). Observe that ei should not be larger than di , otherwise an error may occur while executing pi (~xi ). Observe too that if pi (~xi ), . . . , pn (~xn ) is called with a mode described by di , then pi+1 (~xi+1 ), . . . , pn (~xn ) is called with a mode described by (di ∧ fi ) since fi describes the success patterns of pi (~xi ). The mode (di ∧ fi ) may satisfy the ei+1 demand. If it does not, then the minimal extra demand is added to (di ∧ fi ) so as to satisfy ei+1 . This minimal extra demand is ((di ∧ fi ) ⇒ ei+1 ) – the weakest mode that, in conjunction with (di ∧ fi ), ensures that ei+1 holds. Put another way, ((di ∧ fi ) ⇒ ei+1 ) = ∨{f ∈ P os | (di ∧ fi ) ∧ f |= ei+1 }. Combining the requirements to satisfy pi (~xi ) and then pi+1 (~xi+1 ), . . . , pn (~xn ), gives ei = di ∧ ((di ∧ fi ) ⇒ ei+1 ) which reduces to ei = di ∧ (fi ⇒ ei+1 ) and corresponds to the tactic used in the basic inductive step. 2.4.3 Pseudo-complement This step of calculating the weakest mode that when conjoined with di ∧ fi implies ei+1 , is the very heart of the analysis. Setting ei = 0 would trivially achieve safety, but ei should be as weak as possible to maximise the class of safe queries inferred. For P os, computing the weakest ei reduces to applying the ⇒ operator, but more generally, this step amounts to applying the pseudo-complement operator. The pseudo-complement operator (if it exists for a given abstract domain) takes, as input, two abstractions and returns, as output, the weakest abstraction whose conjunction with the first input abstraction is at least as strong as the second input abstraction. If the domain did not possess a pseudo-complement, then there is not always a unique weakest abstraction (whose conjunction with one given abstraction is at least as strong as another given abstraction). To see this, consider the domain Def (Armstrong et al., 1998) which does not possess a pseudo-complement. Def is the sub-class of P os that is definite (Armstrong et al., 1998). This means that Def has the special property that each of its Boolean functions can be expressed as a (possibly empty) conjunction of propositional Horn clauses. As with P os, Def is assumed to be augmented with the bottom element 0. Def can thus represent the grounding dependencies x ∧ y, x, x ⇔ y, y, x ⇐ y, x ⇒ y, 0 and 1 but not x ∨ y. Suppose that di ∧ fi = (x ⇔ y) and ei+1 = (x ∧ y). Then conjoining x with di ∧ fi would be at least as strong 10 Andy King and Lunjin Lu as ei+1 and symmetrically conjoining y with di ∧ fi would be at least as strong as ei+1 . However, Def does not contain a Boolean function strictly weaker than both x and y, namely x ∨ y, whose conjunction with di ∧ fi is at least as strong as ei+1 . Thus setting ei = x or ei = y would be safe but setting ei = (x ∨ y) is prohibited because x ∨ y falls outside Def . Moreover, setting ei = 0 would loose an unacceptable degree of precision. A choice would thus have to be made between setting ei = x and ei = y in some arbitrary fashion, so there would be no clear tactic for maximising precision. Returning to the compound goal pi (~xi ), . . . , pn (~xn ), a call described by the mode di ∧ ((di ∧ fi ) ⇒ ei+1 ) is thus sufficient to ensure that neither pi (~xi ) nor the subgoal pi+1 (~xi+1 ), . . . , pn (~xn ) error. Since di ∧ ((di ∧ fi ) ⇒ ei+1 ) = di ∧ (fi ⇒ ei+1 ) = ei it follows that pi (~xi ), . . . , pn (~xn ) will not error if its call is described by ei . In particular, it follows that e1 describes a safe calling mode for the body atoms of the clause p(~x) ← d ⋄ f, p1 (~x1 ), . . . , pn (~xn ). The next step is to calculate g = d ∧ (f ⇒ e1 ). The abstraction f describes the grounding behaviour of the Herbrand constraint added to the store prior to executing the body atoms. Thus (f ⇒ e1 ) describes the weakest mode that, in conjunction with f , ensures that e1 holds, and hence the body atoms are called safely. Hence d ∧ (f ⇒ e1 ) represents the weakest demand that both satisfies the body atoms and the assertion d. One subtlety which relates to the abstraction process, is that d is required to be a lower-approximation of the assertion whereas f is required to be an upper-approximation of the constraint. Put another way, if the mode d describes the binding on the store, then the (concrete) assertion is satisfied, whereas if the (concrete) constraint is added to the store, then the store is described by the mode f . Table 1 details how to abstract various builtins for groundness for a declarative subset of ISO Prolog. 2.4.4 Strengthening lower approximations Variables not present in p(~x), Y say, are then eliminated by g ′ = ∀Y (g) (strengthening g) where ∀{y1 ...yn } (g) = ∀y1 (. . . ∀yn (g)). A safe calling mode for this particular clause is then given by g ′ . Eliminating variables from g by strengthening g is unusual and initially appears strange. Recall, however, that call patterns can be approximated from below without compromising correctness (but not from above). In particular the standard projection tactic of computing ∃{y1 ...yn } (g) would result in an upper approximation of g that possibly describes a larger set of concrete call patterns which would be incorrect. The direction of approximation thus dictates that eliminating the variables Y from g must strengthen g. Indeed, g holds whenever ∀yi (g) holds and therefore g holds whenever ∀{y1 ...yn } (g) holds as required. Dk+1 will contain a call pattern hp(~x), g ′′ i and, assuming g ′ ∧ g ′′ 6= g ′′ , this is updated with hp(~x), g ′ ∧ g ′′ i. Thus the call patterns become progressively stronger on each iteration. Correctness is preserved because call patterns can be safely approximated from below. The space of call patterns forms a complete lattice which ensures that a gfp exists. In fact, because call patterns are approximated from below, the gfp is the most precise solution, and therefore the desired solution. (This A Backward Analysis for Constraint Logic Programs 11 contrasts to the norm in logic program analysis where approximation is from above and the lfp is the most precise solution). Moreover, since the space of call patterns is finite, termination is assured. In fact, the scheme will converge onto the gfp since iteration commences with the top element D0 = {hp(~x), 1i | p ∈ Π}. 2.4.5 Greatest fixpoint calculation for Quicksort Under this procedure Quicksort generates the following Dk sequence:     hqs(~v ), 1i hqs(~v ), 1i            hpt(w), ~ 1i hpt(w), ~ 1i D0 = D1 = ′ ′   h=< (~u), 1i h=< (~u), x1 ∧ x2 i         ′ h> (~u), 1i h>′ (~u), x1 ∧ x2 i     hqs(~v ), 1i hqs(~v ), x1 i             hpt(w), ~ x2 ∧ (x1 ∨ (x3 ∧ x4 ))i hpt(w), ~ x2 ∧ (x1 ∨ (x3 ∧ x4 ))i D2 = D3 = ′ ′     h=< (~u), x1 ∧ x2 i h=< (~u), x1 ∧ x2 i         ′ ′ h> (~u), x1 ∧ x2 i h> (~u), x1 ∧ x2 i These calculations are non-trivial so consider how D2 is obtained from D1 by applying the clause pt(t1 , m, t2 , h) : −1 ⋄ g4 , =<′ (m, x), pt(xs, m, l, h). The following ei and g formulae are generated: e3 = 1 e2 = 1 ∧ ((xs ∧ l ∧ h) ⇒ 1) = 1 e1 = (m ∧ x) ∧ ((m ∧ x) ⇒ 1) = m∧x g = 1 ∧ (((t1 ⇔ x ∧ xs) ∧ (t2 ⇔ x ∧ l)) ⇒ (m ∧ x)) To characterise those pt(t1 , m, t2 , h) calls which are safe, it is necessary to compute a function g ′ on the variables t1 , m, t2 , h which, if satisfied by the mode of a call, ensures that g is satisfied by the mode of the call. Put another way, it is necessary to eliminate the variables x, xs and l from g (those variables which do not occur in the head pt(t1 , m, t2 , h)) to strengthen g obtain a function g ′ such that g holds whenever g ′ holds. This is accomplished by calculating g ′ = ∀l ∀xs ∀x (g). First consider the computation of ∀x (g): g[x 7→ 0] = (((t1 ⇔ x ∧ xs) ∧ (t2 ⇔ x ∧ l)) ⇒ (m ∧ x))[x 7→ 0] = ((t1 ⇔ 0 ∧ xs) ∧ (t2 ⇔ 0 ∧ l)) ⇒ (m ∧ 0) = (¬t1 ∧ ¬t2 ) ⇒ 0 = t1 ∨ t2 g[x 7→ 1] = (((t1 ⇔ x ∧ xs) ∧ (t2 ⇔ x ∧ l)) ⇒ (m ∧ x))[x 7→ 1] = ((t1 ⇔ xs) ∧ (t2 ⇔ l)) ⇒ m Since g[x 7→ 0] ∧ g[x 7→ 1] ∈ P os it follows that: ∀x (g) = (((t1 ⇔ xs) ∧ (t2 ⇔ l)) ⇒ m) ∧ (t1 ∨ t2 ) 12 Andy King and Lunjin Lu (otherwise ∀x (g) would be set to 0). Eliminating the other variables in a similar way we obtain: ∀xs ∀x (g) = ((t2 ⇔ l) ⇒ m) ∧ (t1 ∨ t2 ) g = ∀l ∀xs ∀x (g) = m ∧ (t1 ∨ t2 ) ′ Observe that if ∀l ∀xs ∀x (g) holds then g holds. Thus if the mode of a call satisfies g ′ then the mode also satisfies g as required. This clause thus yields the call pattern hpt(w), ~ x2 ∧ (x1 ∨ x3 )i. Similarly the first and third clauses contribute the patterns hpt(w), ~ 1i and hpt(w) ~ ← x2 ∧ (x1 ∨ x4 )i. Observe also that 1 ∧ (x2 ∧ (x1 ∨ x3 )) ∧ (x2 ∧ (x1 ∨ x4 )) = x2 ∧ (x1 ∨ (x3 ∧ x4 )) which gives the final call pattern formula for pt(w) ~ in D2 . The gfp is reached at D3 since D4 = D3 . The gfp often expresses elaborate calling modes, for example, it states that pt(w) ~ cannot generate an instantiation error (nor any predicate that it calls) if it is called with its second, third and fourth argument ground. This is a surprising result which suggests that the analysis can infer information that might be normally missed by a programmer. 2.4.6 Restrictions posed by the framework The chief computational requirement of the analysis is that the input domain is equipped with a pseudo-complement operation. As already mentioned, it is always possible to systematically design a domain with this operator (Giacobazzi & Scozzari, 1998) and any domain that is known to be condensing (see section 1.2) comes equipped with this operator. Currently, however, there are only a few domains with a pseudo-complement. Indeed, the domain described in (Codish & Lagoon, 2000) appears to be unique in that it is the only type domain that is condensing. This is the main limitation of the backward analysis described in this paper. P os is downward-closed in the sense that if a function f describes a substitutions, then f also describes all substitutions less general than the substitution. The type domain of (Codish & Lagoon, 2000) is also downward-closed. It does not follow, however, that a domain equipped with a pseudo-complement operation is necessarily downward-closed. Heyting completion, the domain refinement technique used to construct pseudo-complement, can be moved to linear implication (Giacobazzi et al., 1998), though the machinery is more complicated. However, it is likely, that in the short term tractable condensing domains will continue to be downwardclosed. In fact, constructing tractable downward-closed condensing domains is a topic within itself. 3 Preliminaries 3.1 Basic Concepts Sets and sequences Let N denote the set of non-negative integers. The powerset of S is denoted ℘(S). The empty sequence is denoted ǫ and S ⋆ denotes the set of A Backward Analysis for Constraint Logic Programs 13 (possibly empty) sequences whose elements are drawn from S. Sequence concatenation is denoted · and the length of a sequence s is |s|. Furthermore, let s0 = ǫ and sn = s · sn−1 where n ∈ N. If n ∈ N and s ∈ N⋆ then max(n · s) = max(n, max(s)) where max(ǫ) = 0. Orderings A pre-order on a set S is a binary relation ⊑ that is reflexive and transitive. A partial order on a set S is a pre-order that is anti-symmetric. A poset hS, ⊑i is a partial order on a set S. If hS, ⊑i is a poset, then C ⊆ S is a chain iff a ⊑ b or b ⊑ a for all a, b ∈ C. A meet semi-lattice hL, ⊑, ⊓i is a poset hL, ⊑i such that the meet (greatest lower bound) ⊓{x, y} exists for all x, y ∈ L. A complete lattice is a poset hL, ⊑i such that the meet ⊓X and the join ⊔X (least upper bound) exist for all X ⊆ L. Top and bottom are respectively defined by ⊤ = ⊓∅ and ⊥ = ⊔∅. A complete lattice is denoted hL, ⊑, ⊓, ⊔, ⊤, ⊥i. Let hS, ⊑i be a pre-order. If X ⊆ S then ↓(X) = {y ∈ S | ∃x ∈ X.y ⊑ x}. If x ∈ S then ↓(x) = ↓({x}). The set of orderideals of S, denoted ℘↓(S), is defined by ℘↓(S) = {X ⊆ S | X = ↓(X)}. Observe that h℘↓(S), ⊆, ∪, ∩, S, ∅i is a complete lattice. An algebraic structure is a pair hS, Qi where S is a non-empty set and Q is collection of n-ary operations f : S n → S where n ∈ N. Let hS, ⊑i and hS ′ , ⊑′ i be posets and hS, Qi and hS ′ , Q′ i algebraic structures such that Q = {fi | i ∈ I} and Q′ = {fi′ | i ∈ I} for an index set I. Then α : S → S ′ is a semi-morphism between hS, Qi and hS ′ , Q′ i iff α(fi (s1 , . . . , sn )) ⊑ fi′ (α(s1 ), . . . , α(sn )) for all hs1 , . . . , sn i ∈ S n and i ∈ I. Functions and fixpoints Let f : A → B. Then dom(f ) denotes the domain of f and if C ⊆ A then f (C) = {f (c) | c ∈ C}. Furthermore, cod(f ) = f (dom(f )). Let hL, ⊑, ⊔, ⊓i and hL′ , ⊑′ , ⊔′ , ⊓′ i be complete lattices. The map f : L → L′ is additive iff f (⊔X) = ⊔′ f (X) for all X ⊆ L; f is continuous iff f (⊔C) = ⊔′ f (C) for all chains C ⊆ L; f is co-continuous iff f (⊓C) = ⊓′ f (C) for all chains C ⊆ L and f is monotonic iff f (x) ⊑′ f (y) for all x ⊑ y. Let x ⊑ y. If f is continuous then f (y) = f (x ⊔ y) = ⊔′ {f (x), f (y)} and thus f (x) ⊑′ f (y). If f is co-continuous then f (x) = f (x ⊓ y) = ⊓′ {f (x), f (y)} and thus f (x) ⊑′ f (y). Both continuity and co-continuity thus imply monotonicity. If f : L → L, then f is idempotent iff f (x) = f 2 (x) for all x ∈ L and f is extensive iff x ⊑ f (x) for all x ∈ L. The Knaster-Tarski theorem states that any monotone operator f : L → L on a complete lattice hL, ⊑, ⊔, ⊓, ⊤, ⊥i admit both greatest and least fixpoints that are characterised by gfp(f ) = ⊔{x ∈ L | x ⊑ f (x)} and lfp(f ) = ⊓{x ∈ L | f (x) ⊑ x}. If f is co-continuous then gfp(f ) = ⊓n∈N f n (⊤) and dually if f is continuous then lfp(f ) = ⊔n∈N f n (⊥). {f n (⊤) | n ∈ N} and {f n (⊥) | n ∈ N} are, respectively, the lower and upper Kleene iteration sequences of f . Galois insertions and closure operators If hS, ⊑i and hS ′ , ⊑′ i are posets and α : S → S ′ and γ : S ′ → S are monotonic maps such that ∀x ∈ S.x ⊑ γ(α(x)) and ∀x′ ∈ S ′ .α(γ(x′ )) ⊑′ x′ , then the quadruple hS, γ, S ′ , αi is a Galois connection between S and S ′ . In other words, α is the lower (or left) adjoint of γ and γ is the upper (or right) adjoint of α. If, in addition, ∀x′ ∈ S ′ .x′ ⊑′ α(γ(x′ )), then hS, γ, S ′ , αi 14 Andy King and Lunjin Lu is a Galois insertion between S and S ′ . The operator ρ : L → L on a complete lattice hL, ⊑i is a closure operator iff ρ is monotonic, idempotent and extensive. The set of closure operators on L is denoted uco(L). The image set ρ(L) of a closure operator ρ is a complete lattice with respect to ⊑. A Galois insertion hL, γ, L′ , αi between the complete lattices L and L′ defines the closure operator ρ = γ ◦ α. Conversely, a closure operator ρ : L → L on the complete lattice hL, ⊑, ⊔i defines the Galois insertion hL, id, ρ(L), ρi where id denotes identity. Galois insertions and closure operators are thus isomorphic, though closure operators are typically more succinct and hence used in this paper. Substitutions Let Sub denote the set of (idempotent) substitutions and let Ren denote the set of (bijective) renaming substitutions. 3.2 Cylindric constraint systems Let V denote a (denumerable) universe of variables and let C denote a constraint system over V . An algebra hC, ✂, ⊗, 1, {∃x}x∈V , {dx,y }x,y∈V i is a semi-cylindric constraint system iff hC, ✂, ⊗i is a meet semi-lattice with a top 1; ∃x is a family of (unary) cylindrification operations such that: c ✂ ∃x (c), ∃x (c) ✂ ∃x (c′ ) if c ✂ c′ , ∃x (c ⊗ ∃x (c′ )) = ∃x (c) ⊗ ∃x (c′ ); and dx,y is a family of (constant) diagonalisation operations such that: dx,x = 1, dx,y = ∃z (dx,z ⊗ dz,y ) and dx,y ⊗ ∃x (c ⊗ dx,y ) ✂ c if x 6= y. Cylindrification captures the concept of projecting out a variable (and is useful in modeling variables that go out of scope) whereas diagonalisation captures the notion of an alias between two variables (and is useful in modeling parameter passing). (The reader is referred to (Giacobazzi et al., 1995) for further details on cylindric constraint systems and their application in abstract interpretation.) Example 3.1 An equation e is a pair (s = t) where s and t are terms. A finite conjunction of equations is denoted E and Eqn denotes the set of finite conjunctions of equations. Let eqn(θ) = {x = t | x 7→ t ∈ θ} and unif y(E) = {θ ∈ Sub | ∀(s = t) ∈ E.θ(s) = θ(t)}. Eqn is pre-ordered by entailment E1 ✂ E2 iff unif y(E1 ) ⊆ unif y(E2 ) and quotiented by E1 ≈ E2 iff E1 ✂ E2 and E2 ✂ E1 . This gives the meet semi-lattice hEqn/ ≈, ✂, ⊗i with a top 1 where conjunction is defined [E1 ]≈ ⊗ [E2 ]≈ = [E1 ∪ E2 ]≈ and 1 = [∅]≈ . Let mgu(E) = {θ ∈ unif y(E) | ∀κ ∈ unif y(E) . eqn(κ)✂eqn(θ)}. Finally, let dx,y = [{x = y}]≈ and define project out by ∃x ([E]≈ ) = [eqn({y 7→ t ∈ θ | x 6= y})]≈ if θ ∈ mgu(E). Otherwise, if mgu(E) = ∅, define ∃x ([E]≈ ) = [{a = b}]≈ where a and b are distinct constant symbols. Then hEqn/≈, ✂, ⊗, 1, {∃x}x∈V , {dx,y }x,y∈V i is a semi-cylindric constraint system. An algebra hC, ✂, ⊕, ⊗, 1, 0, {∃x}x∈V , {dx,y }x,y∈V i that extends a semi-cylindric constraint system to a complete lattice hC, ✂, ⊕, ⊗, 1, 0i is a cylindric constraint system. A semi-cylindric constraint system can be lifted to a cylindric constraint system via a power-domain construction. In particular h℘↓(C), ⊆, ∪, ∩, C, ∅, {∃′x }x∈V , {d′x,y }x,y∈V i is a cylindric constraint system where ∃′x (C) = ↓({∃x (c) | c ∈ C}) and d′x,y = ↓(dx,y ). A Backward Analysis for Constraint Logic Programs 15 Example 3.2 The semi-cylindric system of example 3.1 can be lifted to the cylindric system h℘↓ (Eqn), ⊆, ∪, ∩, Eqn, ∅, ∃′ , d′ i where ∃′x (C) = ↓({∃x (c)|c ∈ C}) and d′x,y = ↓(dx,y ). In the sequel, unless otherwise stated, all constraint systems considered are over the same V and thus a cylindric constraint system will be simply denoted hC, ✂, ⊕, ⊗, 1, 0, ∃, di. Let var(o) denote the set of the variables in the syntactic object o and let F V (c) denote the set of free variables in a constraint c ∈ C, that is, F V (c) = {x ∈ var(c) | ∃y ∈ V . c 6= ∃x (c ⊗ dx,y )}. Abbreviate project out by ∃{x1 ,...,xn } (c) = ∃x1 (. . . (∃xn (c))) and project onto by ∃X (c) = ∃F V (c)\X (c). Let d~x,~y = ⊗ni=1 dxi ,yi where ~x = hx1 . . . xn i and ~y = hy1 . . . yn i. If c ∈ C then let ∂~xy~ (c) denote the constraint obtained by replacing ~x with ~y , that is, ∂~xy~ (c) = ∃~z (∃~x (c ⊗ d~x,~z ) ⊗ d~z,~y ) where var(~z) ∩ (F V (c) ∪ var(~x) ∪ var(~y )) = ∅. Finally, if C ⊆ C then ∂~xy~ (C) = {∂~xy~ (c) | c ∈ C}. Example 3.3 Let X be a finite subset of V . The groundness domain hEP osX , |=, g, ∧, 1, 0i (Heaton et al., 2000) is a finite lattice where EP osX = {0} ∪ {∧F | F ⊆ X ∪ EX }, EX = {x ⇔ y | x, y ∈ X} and f1 g f2 = ∧{f ∈ EP osX | f1 |= f ∧ f2 |= f }. EP osX is a cylindric constraint system with dx,y = (x ⇔ y) and ∃x (f ) = f ′ ∧ f ′′ where f ′ = ∧{y ∈ Y | f |= y}, f ′′ = ∧{e ∈ EY | f |= e} and Y = X \ {x}. Example 3.4 Let BoolX denote the Boolean functions over X. The dependency domain P osX (Armstrong et al., 1998) is defined by P osX = {0} ∪ {f ∈ BoolX | ∧X |= f }. Henceforth Y abbreviates ∧Y . The lattice hP osX , |=, ∨, ∧, 1, 0i is finite and is a cylindric constraint system with dx,y = (x ⇔ y) and Schröder elimination defining ∃x (f ) = f [x 7→ 1] ∨ f [x 7→ 0]. 3.3 Complete Heyting algebras Let hL, ⊑, ⊓i be a lattice with x, y ∈ L. The pseudo-complement of x relatively to y, if it exists, is a unique element z ∈ L such that x ⊓ w ⊑ y iff w ⊑ z. L is relatively pseudo-completed iff the pseudo-complement of x relative to y, denoted x → y, exists for all x, y ∈ L. If L is also complete then it is a complete Heyting algebra (cHa). If x, y ∈ L then x ⊓ (x → y) = x ⊓ y. Furthermore, if hL, ⊑, ⊔, ⊓i is a cHa then x → y = ⊔{w ∈ L | x ⊓ w ⊑ y}. The intuition behind the pseudo-complement of x relative to y is that it is the weakest element whose combination (meet) with x implies y. Interestingly pseudo-complement can be interpreted as the adjoint of conjunction. (The reader is referred to (van Dalen, 1997) for further details on complete Heyting algebras.) The following result (Birkhoff, 1967)[Chapter IX, Theorem 15] explains how a cHa depends on the additivity of meet. Theorem 3.1 A complete lattice L is relatively pseudo-complemented iff x ⊓ (⊔Y ) = ⊔{x ⊓ y | y ∈ Y } for all x ∈ L and Y ⊆ L. 16 Andy King and Lunjin Lu Example 3.5 Let {x, y} ⊆ X and f = (x ⇔ y). Then returning to EP osX of example 3.3, f ∧ (g{x, y}) = f ∧ (1) = f 6= (x ∧ y) = g{x ∧ y, x ∧ y} = g{f ∧ x, f ∧ y}. Hence, by theorem 3.1, EP osX is not a cHa. Now consider P osX of example 3.4, and specifically let f ∈ P osX and G ⊆ P osX . Since ∧ distributes over ∨, it follows that f ⊓ (⊔G) = ⊔{f ⊓ g | g ∈ G}, thus by theorem 3.1, P osX is a cHa. Similarly, ∩ distributes over ∪, and thus it follows by theorem 3.1 that ℘↓ (C) is also a cHa. 3.4 Constraint logic programs Let Π denote a (finite) set of predicate symbols, let Atom denote the set of (flat) atoms over Π with distinct arguments drawn from V , and let hC, ✂, ⊕, ⊗, 1, 0, ∃, di be a semi-cylindric constraint system. The set of constrained atoms is defined by BaseC = {p(~x) :- c | p(~x) ∈ Atom ∧ c ∈ C}. Let F V (p(~x) :- c) = var(~x) ∪ F V (c). Entailment ✂ lifts to BaseC by w1 ✂ w2 iff ∃~x (d~x,~x1 ⊗ c1 ) ✂ ∃~x (d~x,~x2 ⊗ c2 ) where wi = p(~xi ) :- ci and var(~x) ∩ (F V (w1 ) ∪ F V (w2 )) = ∅. This pre-order defines the equivalence relation w1 ≈ w2 iff w1 ✂ w2 and w2 ✂ w1 to give a set of interpretations defined by IntC = ℘(BaseC /≈). IntC is ordered by I1 ⊑ I2 iff for all [w1 ]≈ ∈ I1 there exists [w2 ]≈ ∈ I2 such that w1 ✂ w2 . Let ≡ denote the induced equivalence relation I1 ≡ I2 iff I1 ⊑ I2 and I2 ⊑ I1 . hIntC / ≡, ⊑, ⊔, ⊓, ⊤, ⊥i is a complete lattice where [I1 ]≡ ⊔ [I2 ]≡ = [I1 ∪ I2 ]≡ , [I1 ]≡ ⊓ [I2 ]≡ = [∪{I | I ⊑ I1 ∧ I ⊑ I2 }]≈ , ⊤ = [{[p(~x) :- 1]≈ | p(~x) ∈ Atom}]≡ and ⊥ = [∅]≡ . A constraint logic program P over C is a finite set of clauses w of the form w = h :- c, g where h ∈ Atom, c ∈ C, g ∈ Goal and Goal = Atom⋆ . The fixpoint semantics of P is defined in terms of an immediate consequences operator FPC . Definition 3.1 Given a constraint logic program P over a semi-cylindric constraint system C, the operator FPC : IntC → IntC is defined by:   ∃ p(~x) :- c, p1 (~x1 ), . . . , pn (~xn ) ∈ P .   FPC (I) = [p(~x) :- c′ ]≈ ∃ . {[pi (~xi ) :- ci ]≈ }ni=1 ⊆ I   c′ = c ⊗ ⊗ni=1 ∃x~i (ci ) The operator FPC lifts to IntC /≡ by FPC ([I]≡ ) = [FPC (I)]≡ . The lifting is monotonic and hence the fixpoint semantics for a program P over C exists and is denoted F C (P ) = lfp(FPC ). (The reader is referred to (Bossi et al., 1994; Jaffar & Maher, 1994) for further details on semantics and constraint logic programming.) The operational semantics of P is defined in terms of a transition system →P between states of the form State = Goal × C. To define the transition system, let F V (hg; ci) = var(g) ∪ F V (c) and F V (h :- c, g) = var(h) ∪ F V (c) ∪ var(g). To rename clauses with ϕ ∈ Ren it is necessary to rename constraints with ϕ. Thus ϕ(~ x) define ϕ(h :- c, g) = ϕ(h) :- ∂~x (c), ϕ(g). To rename apart from a syntactic object o, let w ≪o P indicate that there exists w′ ∈ P and ϕ ∈ Ren such that var(cod(ϕ)) ∩ F V (w′ ) = ∅, ϕ(w′ ) = w and F V (o) ∩ F V (w) = ∅. Definition 3.2 A Backward Analysis for Constraint Logic Programs 17 Given a constraint logic program P over a semi-cylindric constraint system C, →P ⊆ State2 is the least relation such that: s = hp(~x), g; ci →P hg ′ , g; c ⊗ d~x,~x′ ⊗ c′ i where p(~x′ ) :- c′ , g ′ ≪s P . The operational semantics is specified by the transitive closure of the transition relation on (atomic) goals, that is, OC (P ) = [{[p(~x) :- c]≈ | hp(~x); 1i →⋆P hǫ; ci}]≡ . The relationship between the operational and fixpoint semantics is stated below. Theorem 3.2 OC (P ) = F C (P ). 3.5 Abstract semantics for constraint logic programs To apply abstraction techniques and finitely characterise F C (P ), and thereby OC (P ), the semi-cylindric domain C is replaced by the cHa ℘↓(C) which is particularly amenable to approximation and backward reasoning. If P is a constraint logic program over C, then ↓(P ) = {h :- ↓(c), g | h :- c, g ∈ P }. Furthermore, if I ∈ IntC , then let ↓([I]≡ ) = [{[p(~x) :- ↓(c)]≈ | [p(~x) :- c]≈ ∈ I}]≡ . Note the overloading on ≈ and hence ≡. The ≈ of [p(~x) :- c]≈ is induced by hC, ✂i whereas the ≈ of [p(~x) :- ↓(c)]≈ is induced by h℘↓(C), ⊆i. The following proposition ↓ details the relationship between F C and F ℘ (C) . Proposition 3.1 ↓ ↓(F C (P )) ⊑ F ℘ (C) (↓(P )). Let hC, ✂, ⊕, ⊗, 1, 0, ∃, di denote a cylindric constraint system. If ρ ∈ uco(C) then hρ(C), ✂, ⊗i is a complete lattice. If ρ is additive, then hρ(C), ✂, ⊕, ⊗i is a sub-lattice of hC, ✂, ⊕, ⊗i. More generally, the join is denoted ⊕′ . Observe that ρ(C) has 1 and ρ(0) for top and bottom and c1 ⊕ c2 ✂ ρ(c1 ⊕ c2 ) = c1 ⊕′ c2 for all c1 , c2 ∈ ρ(C). A cylindric constraint system is obtained by augmenting ρ(C) with cylindrification ∃′x and diagonalisation d′x,y operators. To abstract hC, ✂, ⊕, ⊗, 1, 0, ∃, di safely with hρ(C), ✂, ⊕′ , ⊗, 1, ρ(0), ∃′ , d′ i, ρ is required to be a semi-morphism (Giacobazzi et al., 1995) which additionally requires that ρ(∃x (c)) ✂ ∃′x (ρ(c)) for all c ∈ C and ρ(dx,y ) ✂ d′x,y for all x, y ∈ V . In fact, these requirements turn out to be relatively weak conditions: most abstract domains come equipped with (abstract) operators to model projection and parameter passing. Example 3.6 Consider the cylindric system h℘↓ (Eqn), ⊆, ∪, ∩, Eqn, ∅, ∃, di derived from the semicylindric system introduced in example 3.1. Let Bool = BoolV and P os = P osV . Define αP os : ℘↓ (Eqn) → P os by αP os (C) = ∨{α(θ) | θ ∈ mgu(E) ∧ E ∈ C} and α(θ) = ∧{x ⇔ var(t) | x 7→ t ∈ θ}. Also define γP os : P os → ℘↓ (Eqn) by γP os (f ) = ∪{C ∈ ℘↓ (Eqn) | αP os (C) |= f } and observe ρP os ∈ uco(℘↓ (Eqn)) where ρP os = γP os ◦ αP os . To construct a semi-morphism, put d′x,y = γP os (x ⇔ y) and ∃′x (C) = γP os (f [x 7→ 1]∨f [x 7→ 0]) where f = αP os (C). Then ρP os (dx,y ) ⊆ d′x,y and 18 Andy King and Lunjin Lu ρP os (∃x (C)) ⊆ ∃′x (ρP os (C)) for all C ∈ ℘↓(Eqn). Note that C1 ∩ C2 = γP os (f1 ∧ f2 ) and C1 ⊕′ C2 = γP os (f1 ∨ f2 ) where Ci = γP os (fi ). Surprisingly C1 ⊕′ C2 6= C1 ∪ C2 (Filé & Ranzato, 1994), as witnessed by C1 = γP os (x) and C2 = γP os (x ⇔ y) since {y = f (x, z)} 6∈ C1 ∪ C2 whereas αP os ({y = f (x, z)}) = y ⇔ (x ∧ z) |= x ∨ (x ⇔ y) so that {y = f (x, z)} ∈ C1 ⊕′ C2 = γP os (x ∨ (x ⇔ y)). Nevertheless, ρP os is a semi-morphism between h℘↓ (Eqn), ⊆, ∪, ∩, Eqn, ∅, ∃, di and hρP os (℘↓(Eqn)), ⊆ , ⊕′ , ∩, Eqn, ρP os (∅), ∃′ , d′ i. The operator ρ lifts to the complete lattice IntC / ≡ by ρ([I]≡ ) = [ρ(I)]≡ where ρ(I) = {[p(~x) :- ρ(c)]≈ | [p(~x) :- c]≈ ∈ I}. Thus ρ ∈ uco(IntC /≡). It is also useful to lift ρ to programs by ρ(P ) = {h :- ρ(c), g | h :- c, g ∈ P }. The following result relates the fixpoint semantics of P to that of its abstraction ρ(P ). Theorem 3.3 Let C be a cylindric constraint system. If ρ ∈ uco(C) is a semi-morphism, then ρ(F C (P )) ⊑ F cod(ρ) (ρ(P )). Corollary 3.1 Let C be a semi-cylindric constraint system. If ρ ∈ uco(℘↓(C)) is a semi-morphism, then ρ(↓(F C (P ))) ⊑ F cod(ρ) (ρ(↓(P ))). 4 Constraint logic programs with assertions We consider programs annotated with assertions (Drabent & Maluszyński, 1988). When considering the operational semantics of a constraint logic program, it is natural to associate assertions with syntactic elements of the program such as predicates or the program points between body atoms. Without loss of generality, we decorate the neck of each clause with a set of constraints C that is interpreted as an assertion. When C is encountered, the store c is examined to determine whether c ∈ C (modulo renaming). If c ∈ C execution proceeds normally, otherwise an error state, denoted ♦, is entered and execution halts. To formalise this idea, let C be a semi-cylindric constraint system and ρ ∈ uco(℘↓(C)). The assertion language (in whatever syntactic form it takes) is described by ρ. A clause of a constraint logic program over C with assertions over cod(ρ) then takes the form h :- C ⋄c, g where h ∈ Atom, C ∈ cod(ρ), c ∈ C, g ∈ Goal and ⋄ separates the assertion from the body of the clause. Notice that C is an orderideal and thus downward closed. (C can thus represent disjunctions of constraints, but the semantics presented in this section should not be confused with a collecting semantics.) Note also that program transformation (Puebla et al., 2000a) can be used to express program point assertions in terms of our assertion language. To specify the behaviour of programs with assertions, let State♦ = State ∪ {♦}, and let CLP(P ) = {h :- c, g | h :- C ⋄ c, g ∈ P }. The following definition details how the operational semantics for the assertion language is realised in terms of projection, renaming and a test for inclusion. Definition 4.1 A Backward Analysis for Constraint Logic Programs 19 Given a constraint logic program P over a semi-cylindric constraint system C with assertions over ρ(℘↓(C)), ⇒P ⊆ State × State♦ is the least relation such that:  if p(~x′ ) :- C ′ ⋄ c′ , g ′ ∈ P  ♦ ′ s = hp(~x), g; ci ⇒P ∧ ∂~x~x (∃x~ (c)) 6∈ C ′  ′ hg , g; c ⊗ d~x,~x′ ⊗ c′ i else if p(~x′ ) :- c′ , g ′ ≪s CLP(P ) Recall that p(~x′ ) :- c′ , g ′ ≪s CLP(P ) ensures that the clause p(~x′ ) :- c′ , g ′ does not share any variables with s. The operational semantics of P is then defined in terms of ⇒⋆P as Aρ,C (P ) = [{[p(~x) :- c]≈ | hp(~x); 1i ⇒⋆P hǫ; ci}]≡ . The relationship between two operational semantics is stated in the following (trivial) result. Proposition 4.1 Aρ,C (P ) ⊑ OC (CLP(P )) Assertions are often used as interface between behaviour that is amenable to formalisation, for example as an operational semantics, and behaviour that is less tractable, for example, the semantics of a builtin (Puebla et al., 2000b). More to the point, it is not always possible to infer the behaviour of a builtin from its definition, partly because builtins are often complicated and partly because builtins are often expressed in a language such as C. Our work requires assertions for each builtin in order to specify: its calling convention (for example, which arguments are required to be ground) and its success behaviour (for example, which arguments are grounded). 5 Backward fixpoint semantics for constraint logic programs with assertions Let P be a constraint logic program over the semi-cylindric constraint system C with assertions over ρ(℘↓(C)). One natural and interesting question is whether the error state ♦ is reachable (or conversely not reachable) in P from an initial state hp(~x); ci. For a given constraint logic program P with assertions, the backward fixpoint semantics presented in this section infers a (possibly empty) set of c ∈ C for which hp(~x); ci 6⇒⋆P ♦. The semantics formalises the informal backward analysis sketched in section 2. For generality, the semantics is parameterised by C and ρ. The correctness argument requires ρ to be a semi-morphism between h℘↓ (C), ⊆, ∪, ∩, C, ∅, ∃, di and hρ(℘↓(C)), ⊆, ⊕′ , ∩, C, ρ(∅), ∃′ , d′ i. Additionally, ρ(℘↓(C)) must be a cHa, that is, it must possess a pseudo-complement →′ . To explain, how pseudo-complement aids backward analysis consider the problem of inferring c ∈ C for which hg; ci 6⇒⋆P ♦ where g = p1 (~x1 ), . . . , pn (~xn ). Suppose fi ∈ ρ(℘↓(C)) describes the success pattern for pi (~xi ), that is, if hpi (~xi ); 1i →⋆P hǫ; ci then c ∈ fi . Moreover, suppose di ∈ ρ(℘↓(C)) approximates the initial call pattern for pi (~xi ), that is, if c ∈ di then hpi (~xi ); ci 6⇒⋆P ♦. Observe that hpn−1 (~xn−1 ), pn (~xn ); ci 6⇒⋆P ♦ if c ∈ dn−1 ∩ e and e ∩ (dn−1 ∩ fn−1 ) ⊆ dn . This follows since hpn−1 (~xn−1 ); ci 6⇒⋆P ♦ because c ∈ dn−1 ∩ e ⊆ dn−1 . Moreover, if hpn−1 (~xn−1 ), pn (~xn ); ci ⇒⋆P hpn (~xn ); c′ i then c′ ∈ (dn−1 ∩ e) ∩ fn−1 ⊆ dn and thus hpn (~xn ); c′ i 6⇒⋆P ♦. Putting e = ρ(∅) ensures 20 Andy King and Lunjin Lu e ∩ (dn−1 ∩ fn−1 ) ⊆ dn and thereby achieves correctness. However, for precision, dn−1 ∩ e should be maximised. Since ρ(℘↓(C)) is a cHa, this reduces to assigning e = ⊕′ {e′ ∈ ρ(℘↓(C)) | e′ ∩ (dn−1 ∩ fn−1 ) ⊆ dn } = (dn−1 ∩ fn−1 ) →′ dn . In general, without pseudo-complement, there is no unique best e that maximises precision (see example 5.1). The construction is generalised for g = p1 (~x1 ), . . . , pn (~xn ), by putting en = C and ei = di ∩ ((di ∩ fi ) →′ ei+1 ) = di ∩ (fi →′ ei+1 ) for 1 ≤ i < n. Then hg; ci 6⇒⋆P ♦ if c ∈ e1 as required. This iterated application of →′ to propagate requirements right-to-left is the very essence of the backward analysis. Example 5.1 Returning to examples 3.2–3.5, let αEP os (C) = g{α(θ) | θ ∈ mgu(E) ∧ E ∈ C}, γEP os (f ) = ∪{C ∈ ℘↓ (Eqn) | αEP os (C) |= f } and ρEP os = γEP os ◦ αEP os . Note that C1 ∩ C2 = γEP os (f1 ∧ f2 ) and C1 ⊕′ C2 = γEP os (f1 g f2 ) where Ci = γEP os (fi ). By defining ∃′ and d′ in an analogous way to example 3.5, a semi-morphism ρEP os is constructed between h℘↓ (Eqn), ⊆, ∪, ∩, Eqn, ∅, ∃, di and hρEP os (℘↓(Eqn)), ⊆, ⊕′ , ∩, Eqn, ρEP os (∅), ∃′ , d′ i. Recall that ρEP os (℘↓(Eqn)) is not a cHa. Now consider the problem of inferring an initial c for hpn−1 (~xn−1 ), pn (~xn ); ci within ρEP os (℘↓(Eqn)). In particular let dn−1 = γEP os (1), fn−1 = γEP os (x ⇔ y) and dn = γEP os (x ∧ y). Then ej ∩ (dn−1 ∩ fn−1 ) ⊆ dn for e1 = γEP os (x) and e2 = γEP os (y) but (e1 ⊕′ e2 ) ∩ (dn−1 ∩ fn−1 ) = γEP os ((x g y) ∧ 1 ∧ (x ⇔ y)) = γEP os (x ⇔ y) 6⊆ γEP os (x∧y) = dn . Thus there is no unique e maximising precision. Example 5.2 Identity ρid = λx.x is the trivial semi-morphism between h℘↓ (C), ⊆, ∪, ∩, C, ∅, ∃, di and h℘↓ (C), ⊆, ∪, ∩, C, ∅, ∃, di where the pseudo-complement is given by C1 →′ C2 = {c ∈ C | ∀c′ ✂ c . c′ ∈ C1 ⇒ c′ ∈ C2 } (Birkhoff, 1967). Example 5.3 Recall that ρP os is a semi-morphism between h℘↓ (Eqn), ⊆, ∪, ∩, Eqn, ∅, ∃, di and hρP os (℘↓(Eqn)), ⊆, ⊕′ , ∩, Eqn, ρP os (∅), ∃′ , d′ i. Although ⊕′ 6= ∪, ρP os (℘↓(Eqn)) is a sub-cHa of ℘↓ (Eqn) with respect to ∩ and →′ (Scozzari, to appear). Moreover, pseudo-complement (intuitionistic implication) →′ coincides with classic implication ⇒ in the sense that C1 →′ C2 = γP os (f1 ⇒ f2 ) where Ci = γP os (fi ). This follows since V |= f2 |= (¬f1 ) ∨ f2 and thus f1 ⇒ f2 ∈ P os. Moreover, f1 ∧ f |= f2 iff |= (f1 ∧ f ) ⇒ f2 iff |= f ⇒ (¬f1 ) ∨ f2 iff f |= (¬f1 ) ∨ f2 . Hence C1 →′ C2 = ⊕′ {C ∈ ρP os (℘↓(Eqn)) | C1 ∩ C ⊆ C2 } = γP os (f1 ⇒ f2 ). Thus →′ is finitely computable for ρP os . Finally note that ¬ and ∨ are defined on Bool rather than P os since ¬f 6∈ P os iff f ∈ P os. Example 5.4 Now consider the problem of inferring an initial c for hpn−1 (~xn−1 ), pn (~xn ); ci within ρP os (℘↓(Eqn)). Analogous to example 5.1, let dn−1 = γP os (1), fn−1 = γP os (x ⇔ y) and dn = γP os (x ∧ y). Then ej ∩ (dn−1 ∩ fn−1 ) ⊆ dn for e1 = γP os (x) and e2 = γP os (y) and (e1 ⊕′ e2 )∩(dn−1 ∩fn−1 ) = γP os ((x∨y)∧1∧(x ⇔ y)) = γP os (x∧y) = dn . Thus there is a unique e maximising precision. A Backward Analysis for Constraint Logic Programs 21 Since hρ(℘↓(C)), ⊆, ⊕′ , ∩, C, ρ(∅), ∃′ , d′ i is a cylindric constraint system, it follows that e ⊆ ∃′x (e) for all e ∈ ρ(℘↓(C)). A consequence of e ⊆ ∃′x (e) is that projection approximates from above. Approximation from above, however, is not entirely appropriate for backward analysis. In particular, observe that if hg; ci 6⇒⋆P ♦ for all c ∈ e, then it does not necessarily follow that hg; ci 6⇒⋆P ♦ for all c ∈ ∃′x (e). What is required is a dual notion of projection, say denoted ∀′ , that approximates from below. Then hg; ci 6⇒⋆P ♦ for all c ∈ ∀′x (e). Although ∀′ is an abstract operator, the concept is defined for an arbitrary cylindric constraint system for generality. Definition 5.1 If hC, ✂, ⊕, ⊗, 1, 0, ∃, di is a cylindric constraint system and x ∈ V then ∀x : C → C is a monotonic operator such that: ∃x (∀x (c)) ✂ c and c ✂ ∀x (∃x (c)) for all c ∈ C. Recall that ∃x is monotonic and thus α is the lower adjoint of γ and γ is the upper adjoint of α. More exactly, it follows that ∀x can be automatically constructed from ∃x by ∀x (c) = ⊕{c′ ∈ C | ∃x (c′ ) ✂ c}. Observe that this ensures that ∀x is the most precise projection operator from below. For succinctness, define ∀{x1 ,...,xn } (c) = ∀x1 (. . . (∀xn (c))) and ∀X (c) = ∀F V (c)\X (c). Example 5.5 For ρid , let ∀′x (C) = ↓({c ∈ C | ∃x (c) = c}). Example 5.6 For ρP os , let ∀′x (C) = γP os (f ′ ) if f ′ ∈ P os otherwise ∀′x (C) = γP os (0) where C = γP os (f ) and f ′ = f [x 7→ 0] ∧ f [x 7→ 1]. Observe that ∃x (f )[x 7→ 0] ∧ ∃x (f )[x 7→ 1] = ∃x (f ) and hence C ⊆ ∃′x (C) = ∀′x (∃′x (C)) as required. Moreover, if ∀′x (C) = γP os (0) then ∃′x (∀′x (C)) = γP os (0) ⊆ C. Otherwise ∃x (f [x 7→ 0] ∧ f [x 7→ 1]) = f [x 7→ 0] ∧ f [x 7→ 1] |= f . Thus ∃′x (∀′x (C)) ⊆ C as required. Finally, note that ∀′x is finitely computable for ρP os . For example if Ci = γP os (fi ), f1 = (x ⇐ y), f2 = (x ∧ y) and f3 = (x ∨ y), then ∀′x (Ci ) = γP os (fi′ ) where f1′ = 0, f2′ = 0 and f3′ = y. Backward analysis can now be formalised as follows. Definition 5.2 Given a constraint logic program P over a semi-cylindric constraint system C with assertions over ρ(℘↓(C)), the operator DPρ,C : Intcod(ρ) → Intcod(ρ) is defined by:   ∀ [p(~x) :- e]≈ ∈ E .         ∀ p(~x) :- C ⋄ c, p1 (~x1 ), . . . , pn (~xn ) ∈ P .      n [ ∃ {[pi (~xi ) :- fi ]≈ }i=1 ⊆ F . ρ,C E DP (D) = ∃ {[pi (~xi ) :- di ]≈ }ni=1 ⊆ D .      ′     e = C ∧ e = d ∩ (f → e ) ∧ n+1 i i i i+1     ′   ′ e ⊆ ∀~x (e0 ) ∧ e0 = C ∩ (ρ(↓(c)) → e1 ) where [F ]≡ = F cod(ρ) (ρ(↓(CLP(P )))). Since D is parameterised by ρ and C it can interpreted as a backward analysis framework. D requires F , the success patterns of the program obtained by discarding the assertions, to be pre-computed. D considers each clause in the program in turn and 22 Andy King and Lunjin Lu calculates those states which ensure that the clause (and those it calls) will not violate an assertion. An abstraction which characterises these states is calculated by propagating requirements, represented as abstractions, right-to-left by repeated application of pseudo-complement. Projection from below then computes those states which, when restricted to the head variables, still ensure that no error arises in the clause (and those it calls). Repeated application of D yields a decreasing sequence of interpretations. The operator DPρ,C lifts to Intcod(ρ) / ≡ by DPρ,C ([D]≡ ) = [DPρ,C (D)]≡ . Since hcod(ρ), ⊑, ⊔, ⊓i is a complete lattice, DPρ,C will possess a gfp if DPρ,C is monotonic. The existence of gfp(DPρ,C ) is guaranteed by the following result since co-continuity implies monotonicity. Proposition 5.1 DPρ,C : Intcod(ρ) /≡ → Intcod(ρ) /≡ is co-continuous. Since gfp(DPρ,C ) exists, a backward fixpoint semantics can be defined Dρ,C (P ) = gfp(DPρ,C ) and computed by lower Kleene iteration. To establish a connection between Dρ,C (P ) and the operational semantics of P , it is useful to annotate the goals of a state with their depth in the computation tree. To formalise this idea ⇒P is lifted to the annotated states Conf♦ = Conf ∪ {♦} where Conf = Goal × C × N⋆ to obtain the transition system ⇛P . Definition 5.3 Given a constraint logic program with assertions P over a semi-cylindric constraint system C, ⇛P ⊆ Conf × Conf♦ is the least relation such that:  ♦ if hp(~x), g; ci ⇒P ♦ hp(~x), g; c; n · hi ⇛P ′ hg ′ , g; c′ ; (n + 1)|g | · hi if hp(~x), g; ci ⇒P hg ′ , g; c′ i ′ The sequence (n + 1)|g | denotes |g ′ | concatenations of n + 1. The following result relates the depth of the goals of the annotated states to the iterates obtained by lower Kleene iteration. Informally, it says that if a constrained atom p(~x) :- e occurs in the interpretation obtained by applying D k times, and e characterises an initial state (in a certain sense), and the depth of the goals in a derivation starting at the initial state does not exceed k, then the derivation will not violate an assertion. The main safety theorem flows out of this result. Lemma 5.1 Let hp(~y ); c′′ ; 1i = s1 ⇛⋆P sn ⇛P ♦, si = hgi ; ci ; hi i and (DPρ,C )k (⊤) = [Dk ]≡ . If max({max(hi ) | 1 ≤ i ≤ n}) ≤ k and [p(~y ) :- e]≈ ∈ Dk then ∃y~ (c′′ ) 6∈ ∃y~ (e). Theorem 5.1 If Dρ,C (P ) = [D]≡ , [p(~y ) :- e]≈ ∈ D and c ∈ ∃y~ (e) then hp(~y ); ci 6⇒⋆P ♦. 6 Experimental evaluation In order to evaluate the usefulness of the analysis framework presented in section 5, a backward P os analyser has been constructed for inferring calling modes. The A Backward Analysis for Constraint Logic Programs 23 fixpoint component of the analyser is coded in SICStus Prolog 3.8.3. The domain operations are coded in C and are essentially the binary decision diagram (BDD) routines written by Armstrong and Schachte (Armstrong et al., 1998). The analyser takes, as input, a program written in a declarative subset of ISO Prolog. It outputs a mode for each program predicate. The safety result of theorem 5.1 ensures that if a call to a predicate is at least as instantiated as the inferred mode, then the call will not violate an instantiation requirement. Modes are expressed as grounding dependencies (Armstrong et al., 1998). The implementation follows the framework defined in section 5 very closely. The analyser was straightforward to implement as it is essentially two bottom-up fixpoint computations: one for F and the other for D. The only subtlety is in handling the builtins. For each builtin, it is necessary to select a grounding dependency that is sufficient for avoiding an instantiation error. This is an lower approximation (the required mode of table 1). It is also necessary to specify behaviour on success. This is an upper-approximation (the success mode of table 1). The lower approximations are the assertions that are added to Prolog program to obtain a constraint logic program with assertions. Interestingly, the success mode does not always entail the required mode. Univ (=..) illustrates this. A sufficient but not necessary condition for univ not to error is that either the first or second argument is ground. This cannot be weakened in P os (but could be weakened in a type dependency domain (Codish & Lagoon, 2000) that expressed rigid lists). The success mode is that the first argument is ground iff the second argument is ground (which does not entail the required mode). Note too that keysort and sort error if their first argument is free. A sufficient mode for expressing this requirement is that the first argument is ground. Again, this requirement cannot be weakened in P os. The analyser has been applied to some standard Prolog benchmarks which can be found at http://www.oakland.edu/∼l2lu/benchmarks-BG.zip. The results of the analysis, that is, the calling modes for the predicates in the smaller benchmarks, are given in table 2. The results, though surprising in some cases (see sort of permSort and insert of treesort for example) have been verified by hand and appear to be optimal for P os. The analysis, of course, can be applied to larger programs (though it becomes very difficult to verify the results by hand) and table 3 demonstrates that the analysis scales smoothly to medium-scale programs at least. The table lists the larger benchmarks (which possibly include some unreachable code) in terms of increasing size measured by the total number of atoms in the source. The abs column records the time in milliseconds required to read, parse and normalise the source into the ground program representation used by the analyser; lfp is the time needed to compute the fixpoint characterising the success modes; gfp is the time needed to compute the calling modes; and finally sum is the total analysis time. This includes the (usually negligible) overhead of annotating the source with the modes required by builtins. Timings were performed on a Dell GX200 1GHz PC with 128 MB memory running Windows 2000. The timings suggest that the analysis is practical at least for medium-scale programs (though the running time for BDDs can be sensitive to the particular dependencies that arise). Moreover, with a state- 24 Andy King and Lunjin Lu builtin t1 == t2 , t1 \== t2 , t1 @< t2 , t1 @> t2 , t1 @=< t2 , t1 @>= t2 , t1 \= t2 , !, compound(t1 ), display(t1 ), listing, listing(t1 ), nl, nonvar(t1 ), print(t1 ), portray clause(t1 ), read(t1 ), repeat, true, var(t1 ), write(t1 ), writeq(t1 ) atom(t1 ), atomic(t1 ), compare(t1 , t2 , t3 ), float(t1 ), ground(t1 ), integer(t1 ), number(t1 ) length(t1 , t2 ) statistics(t1 , t2 ) abort, fail, false keysort(t1 , t2 ), sort(t1 , t2 ) tab(t1 ), put(t1 ) t1 is t2 t1 =:= t2 , t1 =\= t2 , t1 < t2 , t1 > t2 , t1 =< t2 , t1 >= t2 arg(t1 , t2 , t3 ) name(t1 , t2 ) t1 =.. t2 functor(t1 , t2 , t3 ) required mode true success mode true true f1 true true true f1 f1 f2 g1 f2 g1 f alse g2 f1 g1 g1 g1 g4 g4 g5 g3 g1 g2 g6 Table 1. Abstracting builtins where fi = ∧var(ti ), g1 = f1 ∧ f2 , g2 = f1 ⇔ f2 , g3 = f1 ∧ (f2 ⇒ f3 ), g4 = f1 ∨ f2 , g5 = f1 ∨ (f2 ∧ f3 ) and g6 = f2 ∧ f3 . of-the-art GER factorised BDD package (Bagnara & Schachte, 1999) the analysis would be faster. Interestingly, the time to compute the lfp often dominates the whole analysis. BDD widening will be required to analyse very large applications but this is a study within itself (Heaton et al., 2000). 7 Related work Our work was motivated by the recent revival of interest in logic programming with assertions (Boye et al., 1997; Puebla et al., 2000a). For example, (Puebla et al., 2000b) argues that it is useful to trap an unexpected call to a predicate with an assertion otherwise a program may error at a point that is far from the source of the problem. Moreover, (Puebla et al., 2000a) observe that predicates are normally written with an expectation on the initial calling pattern, and hence provide an entry assertion to make the, moding say, of the top-level queries explicit. Our work shows how entry assertions can be automatically synthesised which ensure that instantiation errors do not occur while executing the program. The most closely related work concerns the demand analysis of ccp (Debray, 1993; Falaschi et al., 2000). A demand analysis for the ccp language Janus (Saraswat et al., 1990) is proposed in (Debray, 1993) which determines whether or not a predicate is uni-modal. A predicate is uni-modal iff the argument tuple for each clause share the same minimal pattern of instantiation necessary for reduction. The demand analysis of a predicate simply traverses the head and guard of each clause to determine the extent to which arguments have to be instantiated. Body atoms need not be considered so the analysis does not involve a fixpoint computation. A related paper A Backward Analysis for Constraint Logic Programs benchmark bubblesort dnf heapify predicate sort(x1 , x2 ) ordered(x1 ) append(x1 , x2 , x3 ) go dnf(x1 , x2 ) norm(x1 , x2 ) literal(x1 ) greater(x1 , x2 ) adjust(x1 , x2 , x3 , x4 ) permSort queens quicksort treeorder treesort heapify(x1 , x2 ) select(x1 , x2 , x3 ) ordered(x1 ) permutation(x1 , x2 ) sort(x1 , x2 ) noattack(x1 , x2 , x3 ) safe(x1 ) delete(x1 , x2 , x3 ) perm(x1 , x2 ) queens(x1 , x2 ) append(x1 , x2 , x3 ) qsort(x1 , x2 ) partition(x1 , x2 , x3 , x4 ) member(x1 , x2 ) select(x1 , x2 , x3 ) split(x1 , x2 , x3 , x4 ) split(x1 , . . . , x7 ) visits2tree(x1 , x2 , x3 ) v2t(x1 , x2 , x3 ) tree to list aux(x1 , x2 , x3 ) tree to list(x1 , x2 ) list to tree(x1 , x2 ) insert list(x1 , x2 , x3 ) insert(x1 , x2 , x3 ) treesort(x1 , x2 ) 25 mode x1 x1 true true true true true x 1 ∧ x2   (x1 ∧ x4 ) ∨  (x1 ∧ x2 ∧ x3 ) ∨  (¬x2 ∧ ¬x3 ∧ x4 ) x1 true x1 true x1 ∨ x2 x1 ∧ x2 ∧ x3 x1 true true x1 ∨ x2 true x1 x2 ∧ (x1 ∨ (x3 ∧ x4 )) true true true true true true true true x1 x1 ∧ x2 x1 ∧ (x2 ∨ x3 ) x1 Table 2. Precision of the Mode Analysis (small benchmarks) (Debray et al., 1992) presents a goal-dependent (forward) analysis that detects those ccp predicates which can be scheduled left-to-right without deadlock. If assertions are used to approximate synchronisation, then the analysis described in this paper can be re-interpreted as a backward suspension analysis of ccp under left-to-right scheduling. When reasoning about module interaction it can be advantageous to reverse the traditional deductive approach to abstract interpretation that is based on the abstract unfolding of abstract goals. In particular (Giacobazzi, 1998) shows how abduction and abstraction can be combined to compute those properties that one module must satisfy to ensure that its composition with another fulfils certain requirements. Abductive analysis can, for example, determine how an optimisation 26 file astar fft knight browse wamcc cal wamcc life crypt wamcc cry mult browse bid disj r consultant ncDP tsp elex scanner robot sorts cs2 scc bp0-6 bnet jons mathlib intervals barnes hut Andy King and Lunjin Lu size 100 104 105 106 108 110 113 118 125 128 148 151 156 162 165 165 172 175 175 201 205 222 226 230 240 abs lfp gfp sum file 10 10 0 20 tictactoe 20 0 10 30 jons2 10 0 0 10 kalah 10 0 0 10 draw 10 10 0 20 cs r 10 10 10 30 reducer 10 0 0 10 sdda 10 10 10 30 bryant 10 10 0 20 ga 10 10 0 20 neural 30 0 10 40 press 20 0 10 30 peep 10 10 0 20 nbody 30 20 10 60 eliza 20 10 0 30 read 10 10 0 20 simple analyzer 0 10 10 20 ann 30 10 10 50 diffsimpsv 10 141 0 151 arch1 20 10 0 30 asm 20 20 0 40 poker 40 0 10 50 pentomino 10 10 0 20 chat 20 10 10 40 sim v5-2 40 30 40 110 semigroup size 258 261 269 289 311 320 336 349 363 378 381 414 421 432 434 512 547 681 692 800 962 981 1037 1308 2328 abs lfp gfp sum 20 10 10 40 20 10 0 30 30 10 20 60 70 91 40 201 40 20 10 70 40 30 0 70 20 21 0 41 30 120 21 171 50 30 20 100 30 10 0 40 30 20 0 50 50 20 10 80 40 20 20 80 50 20 0 70 40 20 10 70 90 701 20 811 50 30 10 90 61 100 0 161 50 40 10 100 60 40 30 130 81 70 10 161 50 40 80 170 411 1422 1082 2915 80 70 0 150 180 90 60 350 Table 3. Speed of the Mode Analysis (medium-scale benchmarks) in one module depends on a predicate defined in another module. Abductive analysis is related to the backward analysis presented in this paper since abduction is the inverse image of a forward semantics whereas pseudo-complement is the inverse image of conjunction – the basic computational step in forward (and backward) semantics. The termination inference engine of (Genaim & Codish, 2001) decomposes the cTI analyser of (Mesnard, 1996) into two components: a termination checker (Codish & Taboch, 1999) and the backward analysis described in this paper. First, the termination inference engine computes a set of binary clauses which describe possible loops in the program with size relations. Second, a Boolean function is inferred for each predicate that describes moding conditions sufficient for each loop to only be executed a finite number of times. Third, the backward analysis described in this paper is applied to infer initial modes by calculating a greatest fixpoint which guarantee that the moding conditions hold and thereby assure termination. Interestingly, the cTI analyser involves a µ-calculus solver to compute the greatest fixpoint of an equivalent (though more complex) system of equations. This seems to suggest that greatest fixpoints are important in backward analysis. Cousot and Cousot (Cousot & Cousot, 1992) explain how a backward collecting semantics can be deployed to precisely characterise states that arise in finite SLD-derivations. First, they present a forward collecting semantics that records the A Backward Analysis for Constraint Logic Programs 27 descendant states that arise from a set of initial states. Second, they present a dual (backward) collecting semantics that records those states which occur as ascendant states of the final states. By combining both semantics, they characterise the set of descendant states of the initial states which are also ascendant states of the final states of the transition system. This use of backward analysis is primarily as a device to improve the precision of a classic goal-dependent analysis. Our work is more radical in the sense that it shows how a bottom-up analysis performed in a backward fashion, can be used to characterise initial queries. Moreover it is used for lower approximation rather than upper approximation. Mazur, Janssens and Bruynooghe (Mazur et al., 2000) present a kind of ad hoc backward analysis to derive reuse conditions from a goal-independent reuse analysis for Mercury (Somogyi et al., 1996). The analysis propagates reuse information from a point where a structure is decomposed in a clause to the point where the clause is invoked in its parent clause. This is similar in spirit to how demand is passed from a callee to a caller in the backward analysis described in this paper. However, the reuse analysis does not propagate information right-to-left across a clause using pseudo-complement, and so one interesting topic for future work will to be relate these two analyses. Another matter for future work, will be to investigate the extent to which our backward mode analysis can be reconstructed by inverting abstract functions (Hughes & Launchbury, 1994). 8 Conclusion We have shown how abstract interpretation, and specifically a backward analysis, can infer moding properties which if satisfied by the initial query, come with the guarantee that the program and query cannot generate instantiation errors. Backward analysis has other applications in termination inference and also in inferring queries for which the builtins called from within the program behave predictably in the presence of rational trees. The analysis is composed of two bottom-up fixpoint calculations, a lfp and a gfp, both of which are straightforward to implement. The lfp characterises success patterns. The gfp, uses these success patterns to infer safe initial calling patterns. It propagates moding requirements right-to-left, against the control-flow, using the pseudo-complement operator. This operator fits with backward analysis since it enables moding requirements to be minimised (maximally weakened) in right-to-left propagation. This operator, however, requires that the computational domain be closed under Heyting completion (or equivalently condense). This requirement seems reasonable because disjunctive dependencies occur frequently in right-to-left propagation and therefore significant precision would be lost if the requirement were relaxed. Experimental evaluation has demonstrated that the analysis is practical in the sense that it can infer calling modes for mediumscaled programs. Finally, our work adds weight to the belief that condensing is an important property in the analysis of logic programs. 28 Andy King and Lunjin Lu Acknowledgements We thank Maurice Bruynooghe, Mike Codish, Samir Genaim, Roberto Giacobazzi, Jacob Howe, Fred Mesnard, Germán Puebla and Francesca Scozzari for helpful discussions. We would also like to thank the anonymous referees for their comments and Peter Schachte for his BDD analyser. We also thank Roberto Bagnara for the use of some of the China benchmarks. This work was supported, in part, by EPSRC grant GR/MO8769. References Armstrong, T., Marriott, K., Schachte, P., & Søndergaard, H. (1998). Two Classes of Boolean Functions for Dependency Analysis. Science of Computer Programming, 31(1), 3–45. Bagnara, R., & Schachte, P. (1999). Factorizing Equivalent Variable Pairs in ROBDDBased Implementations of Pos. Pages 471–485 of: International Conference on Algebraic Methodology and Software Technology. Lecture Notes in Computer Science, vol. 1548. Springer-Verlag. Bagnara, R., Zaffanella, E., Gori, R., & Hill, P. M. (2001). Boolean Functions for FiniteTree Dependencies. Pages 575–589 of: International Conference on Logic for Programming, Artificial Intelligence and Reasoning. Lecture Notes in Artificial Intelligence, vol. 2250. Springer-Verlag. Birkhoff, G. (1967). Lattice Theory. AMS Press. Bossi, A., Gabbrielli, M., Levi, G., & Martelli, M. (1994). The s-Semantics Approach: Theory and Applications. The Journal of Logic Programming, 19/20, 149–197. Boye, J., Drabent, W., & Maluszyński, J. (1997). Declarative Diagnosis of Constraint Programs: an Assertion-based Approach. Pages 123–141 of: Proceedings of the Third International Workshop on Automated Debugging. University of Linköping Press. Codish, M., & Lagoon, V. (2000). Type Dependencies for Logic Programs using ACIunification. Theoretical Computer Science, 238, 131–159. Codish, M., & Taboch, C. (1999). A Semantic Basis for the Termination Analysis of Logic Programs. The Journal of Logic Programming, 41(1), 103–123. Cousot, P., & Cousot, R. (1982). Inductive Principles for Proving Invariance Properties of Programs. Pages 75–119 of: Tools and Notions for Program Construction. Cambridge University Press. Cousot, P., & Cousot, R. (1992). Abstract Interpretation and Application to Logic Programs. The Journal of Logic Programming, 13(2–3), 103–179. Debray, S. (1993). QD-Janus: a Sequential Implementation of Janus in Prolog. Software Practice and Experience, 23(12), 1337–1360. Debray, S., Gudeman, D., & Bigot, P. (1992). Detection and Optimization of Suspensionfree Logic Programs. The Journal of Logic Programming, 29(1–3), 171–194. Drabent, W., & Maluszyński, J. (1988). Inductive Assertion Method for Logic Programs. Theoretical Computer Science, 59(1), 133–155. Dyber, P. (1991). Inverse Image Analysis Generalises Strictness Analysis. Information and Computation, 90(2), 194–216. Falaschi, M., Hicks, P., & Winsborough, W. (2000). Demand Transformation Analysis for Concurrent Constraint Programs. The Journal of Logic Programming, 41(3), 185–215. Filé, G., & Ranzato, F. (1994). Improving Abstract Interpretations by Systematic Lifting A Backward Analysis for Constraint Logic Programs 29 to the Powerset. Pages 655–669 of: International Logic Programming Symposium. MIT Press. Genaim, S., & Codish, M. (2001). Inferring Termination Conditions for Logic Programs using Backwards Analysis. Pages 681–690 of: International Conference on Logic for Programming, Artificial Intelligence and Reasoning. Lecture Notes in Artificial Intelligence, vol. 2250. Springer-Verlag. Giacobazzi, R. (1998). Abductive Analysis of Modular Logic Programs. Journal of Logic and Computation, 8(4), 457–484. Giacobazzi, R., & Scozzari, F. (1998). A Logical Model for Relational Abstract Domains. ACM Transactions on Programming Languages and Systems, 20(5), 1067–1109. Giacobazzi, R., Debray, S., & Levi, G. (1995). Generalized Semantics and Abstract Interpretation for Constraint Logic Programs. The Journal of Logic Programming, 25(3), 191–248. Giacobazzi, R., Ranzato, F., & Scozzari, F. (1998). Building Complete Abstract Interpretations in a Linear Logic-based Setting. Pages 215–229 of: Static Analysis Symposium. Lecture Notes in Computer Science, vol. 1503. Springer-Verlag. Hall, C., & Wise, D. (1989). Generating Function Versions with Rational Strictness Patterns. Science of Computer Programming, 12, 39–74. Heaton, A., Abo-Zaed, M., Codish, M., & King, A. (2000). A Simple Polynomial Groundness Analysis for Logic Programs. The Journal of Logic Programming, 45(1–3), 143–156. Hughes, R. J. M., & Launchbury, J. (1994). Reversing Abstract Interpretations. Science of Computer Programming, 22, 307–326. Jaffar, J., & Maher, M. J. (1994). Constraint Logic Programming: A Survey. The Journal of Logic Programming, 19/20, 503–581. Langen, A. (1991). Advanced Techniques for Approximating Variable Aliasing in Logic Programs. Ph.D. thesis, Computer Science Department, Los Angeles, California 900890782. Marriott, K., & Søndergaard, H. (1993). Precise and Efficient Groundness Analysis for Logic Programs. ACM Letters on Programming Languages and Systems, 2(4), 181–196. Mazur, N., Janssens, G., & Bruynooghe, M. (2000). A Module Based Analysis for Memory Reuse in Mercury. Pages 1255–1269 of: Computational Logic. Lecture Notes in Artificial Intelligence, vol. 1861. Mesnard, F. (1996). Inferring Left-terminating Classes of Queries for Constraint Logic Programs. Pages 7–21 of: Joint International Conference and Symposium on Logic Programming. MIT Press. Mesnard, F., & Neumerkel, U. (2001). Applying Static Analysis Techniques for Inferring Termination Conditions of Logic Programs. Pages 93–110 of: Static Analysis Symposium. Lecture Notes in Computer Science, vol. 2126. Springer-Verlag. Mycroft, A. (1981). Abstract Interpretation and Optimising Transformations for Applicative Programs. Ph.D. thesis, University of Edinburgh. Puebla, G., Bueno, F., & Hermenegildo, M. (2000a). An Assertion Language for Constraint Logic Programs. Pages 23–61 of: Analysis and Visualization Tools for Constraint Programming. Lecture Notes in Computer Science, vol. 1870. Springer-Verlag. Puebla, G., Bueno, F., & Hermenegildo, M. (2000b). A Generic Preprocessor for Program Validation and Debugging. Pages 63–107 of: Analysis and Visualization Tools for Constraint Programming. Lecture Notes in Computer Science, vol. 1870. Springer-Verlag. Saraswat, V., Kahn, K., & Levy, J. (1990). Janus: a Step Towards Distributed Constraint Programming. Pages 431–446 of: North American Conference on Logic Programming. MIT Press. 30 Andy King and Lunjin Lu Scozzari, F. (to appear). Logical Optimality of Groundness Analysis. Theoretical Computer Science. Somogyi, Z., Henderson, F., & Conway, T. (1996). The execution algorithm of Mercury, an efficient purely declarative logic programming language. The Journal of Logic Programming, 29(1–3), 17–64. van Dalen, D. (1997). Logic and Structure. Springer. Wadler, P., & Hughes, R. J. M. (1987). Projections for Strictness Analysis. Pages 385–407 of: Functional Programming and Computer Architecture. Lecture Notes in Computer Science, vol. 274. Springer-Verlag. A Backward Analysis for Constraint Logic Programs 31 A Proof appendix Proof for proposition 3.1 ℘↓(C) ′ Proof by induction. Let I0 = ∅, I0′ = ∅, Ik+1 = FPC (Ik ) and Ik+1 = F↓(P ) (Ik′ ). To show ↓(Ik ) ⊑ Ik′ since then it follows that ↓(lfp(FPC )) = ↓(⊔k∈N Ik ) ⊑ ⊔k∈N ↓(Ik ) ⊑ ℘↓(C) ⊔k∈N Ik′ = lfp(F↓(P ) ). The base case is trivial so suppose ↓(Ik ) ⊑ Ik′ . Let [p(~x) :- c′ ]≈ ∈ Ik+1 . Then there exists p(~x) :- c, p1 (~x1 ), . . . , pn (~xn ) ∈ P and {[pi (~xi ) :- ci ]≈ }ni=1 ⊆ Ik such that c′ = c ⊗ ⊗ni=1 ∃x~i (ci ). Observe that ↓(c′ ) ⊆ ↓(c) ∩ ∩ni=1 ↓(∃x~i (ci )) ⊆ ↓(c) ∩ ∩ni=1 ∃x~i (↓(ci )). But by the inductive hypothesis, there ′ exist {[pi (~xi ) :- c′i ]≈ }ni=1 ⊆ Ik′ such that ↓(ci ) ⊆ c′i . Hence [p(~x) :- c′′ ]≈ ∈ Ik+1 such ′ ′′ ′ that ↓(c ) ⊆ c so that Ik+1 ⊑ Ik+1 and the result follows. Proof for theorem 3.3 The proof tactic is analogous to that used for proposition 3.1. Proof for corollary 3.1 Let C be a semi-cylindric constraint system and ρ ∈ uco(℘↓(C)) be a semi-morphism. ↓ By proposition 3.1 it follows that ↓(F C (P )) ⊑ F ℘ (C) (↓(P )) and hence ρ(↓(F C (P ))) ⊑ ↓ ↓ ρ(F ℘ (C) (↓(P ))) and by theorem 3.3 ρ(F ℘ (C) (↓(P ))) ⊑ F cod(ρ) (ρ(↓(P ))) and so the result follows. Proof for proposition 5.1 Let Dn+1 ⊑ Dn for all n ∈ N. Put En = ∪{Dl | l ≥ n} and E = ∩{En | n ∈ N}. Since Dn+1 ⊑ Dn observe that En ≡ Dn for all n ∈ N and hence DPρ,C (⊓{[Dn ]≡ | n ∈ N}) = DPρ,C (⊓{[En ]≡ | n ∈ N}) = DPρ,C ([E]≡ ) = [DPρ,C (E)]≡ = [∩{DPρ,C (En ) | n ∈ N}]≡ = ⊓{[DPρ,C (En )]≡ | n ∈ N} = ⊓{DPρ,C ([En ]≡ ) | n ∈ N} = ⊓{DPρ,C ([Dn ]≡ ) | n ∈ N}. Proof for lemma 5.1 Proof by (double) induction. Let hp(~y ); c′′ ; 1i = s1 ⇛⋆P sn ⇛P ♦, si = hgi ; ci ; hi i and suppose (DPρ,C )k (⊤) = [Dk ]≡ . The outer induction is on k. base case: Suppose max({max(hi ) | 1 ≤ i ≤ n}) ≤ 1 and [p(~y ) :- e]≈ ∈ D1 . Thus s1 ⇛P ♦ so that s1 ⇒P ♦ and hence there exists p(~x′ ) :- C ′ ⋄ c′ , g ′ ∈ P such that ′ ∂y~~x (∃y~ (c′′ )) 6∈ C ′ . Then [p(~x′ ) :- e′ ]≈ ∈ D1 where ∃~z (d~z,~y ⊗ e) = ∃~z (d~z,~x′ ⊗ e′ ) and var(~z) ∩ (var(~y ) ∪ F V (e) ∪ var(~x′ ) ∪ F V (e′ )) = ∅. Observe that e′ ⊆ ∀~x′ (C ′ ) and ′ ′ thus ∂y~~x (∃y~ (e)) = ∃~x′ (e′ ) ⊆ ∃~x′ (∀~x′ (C ′ )) = ∀x~ ′ (C ′ ) ⊆ C ′ . Hence ∂y~~x (∃y~ (c′′ )) 6∈ ′ ∂y~~x (∃y~ (e)) so that ∃y~ (c′′ ) 6∈ ∃y~ (e) as required. inductive case: Suppose k = max({max(hi ) | 1 ≤ i ≤ n}) > 1 and [p(~y ) :- e]≈ ∈ Dk . Suppose, for the sake of a contradiction, that ∃y~ (c′′ ) ∈ ∃y~ (e). Since k > 1 there exists w = p(~x) :- C ⋄ c, p1 (~x1 ), . . . , pl (~xl ) ∈ P , ϕ ∈ Ren such that ϕ(CLP(w)) = p(~x′ ) :- c′ , p1 (~x′1 ), . . . , pl (~x′l ) ≪s1 CLP(P ) and s2 = hp1 (~x′1 ), . . . , pl (~x′l ); c′1 ; 2l i and c′1 = c′′ ⊗ dy~,~x′ ⊗ c′ . Suppose hp1 (~x′1 ); c′1 i ⇒⋆P hǫ; c′2 i, . . . , hpm (~x′m ); c′m i ⇒⋆P ♦. Without loss of generality assume F V (CLP(w))∩F V (c′i ) = ∅ for all i ∈ [1, m]. Let ~v = ~x·~x1 · · · ~xl and ~v ′ = ~x′ ·~x′1 · · · ~x′l . Let gi′ ∈ C such that hpi (~x′i ); 1i →⋆P hǫ; gi′ i and c′i+1 = c′i ⊗gi′ for all i ∈ [1, m). For all i ∈ [1, m), put gi = ∂~x~x′i (gi′ ). Put c1 = ∂~v~v′ (c′1 ) i and for all i ∈ [2, m], put ci = ∂~x~x′i (c′i ). Then ci+1 = ci ⊗ gi for all i ∈ [1, m). i 32 Andy King and Lunjin Lu Let OC (P ) = [F ]≡ . By proposition 4.1, [pi (~xi ) :- gi ]≈ = [pi (~x′i ) :- gi′ ]≈ ∈ F for all i ∈ [1, m). By theorem 3.2, OC (P ) = F C (P ) and by corollary 3.1, ρ(↓(F C (P ))) ⊑ F cod(ρ) (ρ(↓(P ))). Thus for i ∈ [1, m) there exists [pi (~xi ) :- fi ]≈ ∈ F such that ρ(↓(gi )) ⊆ fi . Put fi = 0 for all i ∈ [m, l] to ensure [pi (~xi ) :- fi ]≈ ∈ F for all i ∈ [m, l]. Let [pi (~xi ) :- di ]≈ ∈ Dk for all i ∈ [1, l]. Finally put en+1 = C, ei = di ∩ (fi →′ ei+1 ) for all i ∈ [1, l] and e0 = C ∩ (ρ(↓(c)) →′ e1 ). The inner induction is on i and is used to show ρ(↓(ci )) ⊆ ei for all i ∈ [1, m]. base case: Now c1 = ∂~v~v′ (c′1 ) ✂ ∂y~~x (∃y~ (c′′ )) ∈ C. Thus ρ(↓(c1 )) ⊆ C. Furthermore, c1 = ∂~v~v′ (c′1 ) ✂ ∂~v~v′ (c′ ) = c. Thus ρ(↓(c1 )) ⊆ ρ(↓(c)). Moreover, c1 ✂ ∂y~~x (∃y~ (c′′ )) ∈ ∂y~~x (∃y~ (e)) ⊆ ∀~x (e0 ) ⊆ e0 . Thus ρ(↓(c1 )) ⊆ e0 . However, e0 = C∩(ρ(↓(c)) →′ e1 ). Thus ρ(↓(c1 )) ⊆ C ∩(ρ(↓(c)) →′ e1 ) and ρ(↓(c1 )) ⊆ ρ(↓(c1 ))∩C ∩(ρ(↓(c)) →′ e1 ) = ρ(↓(c1 )) ∩ (ρ(↓(c)) →′ e1 ) = ρ(↓(c1 )) ∩ ρ(↓(c)) ∩ (ρ(↓(c)) →′ e1 ) = ρ(↓(c1 )) ∩ ρ(↓(c)) ∩ e1 = ρ(↓(c1 )) ∩ e1 . Therefore ρ(↓(c1 )) ⊆ e1 as required. inductive case: Suppose ρ(↓(ci )) ⊆ ϕ(ei ). Now ρ(↓(ci+1 )) = ρ(↓(ci ⊗ gi )) ⊆ ρ(↓(ci )) ∩ ρ(↓(gi )) ⊆ ei ∩ ρ(↓(gi )) ⊆ ei ∩ ρ(↓(gi )) ⊆ ei ∩ fi ⊆ (fi →′ ei+1 ) ∩ fi = ei+1 . Therefore ρ(↓(ci+1 )) ⊆ ei+1 as required. ~ x′ m (∃~xm (dm )) and Thus ρ(↓(cm )) ⊆ em ⊆ dm so that cm ∈ dm . Let d′m = ∂~xm ~ x′ m (∃~xm (cm )) observe that [pm (~x′m ) :- d′m ]≈ = [pm (~xm ) :- dm ]≈ ∈ Dk . Put c′′m = ∂~xm ′ ′′ ′ ′ ′ ⋆ so that cm ✂ cm ∈ dm . By the inductive hypothesis hpm (~xm ); cm i 6⇒P ♦ which is a contradiction and hence ∃y~ (c′′ ) 6∈ ∃y~ (e) as required. The result follows. Proof for theorem 5.1 Let Dρ,C (P ) = [D]≡ , [p(~y ) :- e]≈ ∈ D and c′′ ∈ ∃y~ (e). Thus ∃y~ (c′′ ) ∈ ∃y~ (∃y~ (e)) = ∃y~ (e). Suppose, for the sake of a contradiction, that hp(~y ); c′′ ; 1i = s1 ⇛⋆P sn ⇛P ♦ where si = hgi ; ci ; hi i. Let k = max({max(hi ) | 1 ≤ i ≤ n}). Suppose (DPρ,C )k (⊤) = [Dk ]≡ . Since D ⊑ Dk and by lemma 5.1 there exists [p(~y ) :- e′ ]≈ ∈ Dk such that ∃y~ (c′′ ) 6∈ ∃y~ (e′ ). Since ∃y~ (e) ⊆ ∃y~ (e′ ) it follows that ∃y~ (c′′ ) 6∈ ∃y~ (e) which is a contradiction. The result follows.
6cs.PL
On Using Linear Diophantine Equations to Tune the extent of Look Ahead while Hiding Decision Tree Rules Georgios Feretzakis and Dimitris Kalles and Vassilios S. Verykios School of Science and Technology, Hellenic Open University, Patras, Greece [email protected], [email protected], [email protected] Abstract This paper focuses on preserving the privacy of sensitive patterns when inducing decision trees. We adopt a record augmentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuristic solutions like output perturbation or cryptographic techniques - which restrict the usability of the data since the raw data itself is readily available for public use. In this paper, we propose a look ahead approach using linear Diophantine equations in order to add the appropriate number of instances while minimally disturbing the initial entropy of the nodes. 1 Introduction Privacy preserving data mining (Verykios et al., 2004) is a quite recent research area trying to alleviate the problems stemming from the use of data mining algorithms to the privacy of the data subjects recorded in the data and the information or knowledge hidden in these piles of data. Agrawal and Srinkant (Agrawal and Srinkant, 2000) were the first to consider the induction of decision trees from anonymized data, which had been adequately corrupted with noise to survive from privacy attacks. The generic strand of knowledge hiding research (Gkoulalas-Divanis and Verykios, 2009) has led to specific algorithms for hiding classification rules, like, for example, noise addition by a data swapping process (Estivill-Castro and Brankovic, 1999). A key target area concerns individual data privacy and aims to protect the individual integrity of database records to prevent the re-identification of individuals or characteristic groups of people from data inference attacks. Another key area is sensitive rule hiding, the subject of this paper, which deals with the protection of sensitive patterns that arise from the application of data mining techniques. Of course, all privacy preservation techniques strive to maintain data information quality. The main representative of statistical approaches (Chang and Moskowitz, 1998) adopts a parsimonious downgrading technique to determine whether the loss of functionality associated with not downgrading the data, is worth the extra confidentiality. Reconstruction techniques involve the redesign of the public dataset (Natwichai et al., 2005; Natwichai et al., 2006) from the non-sensitive rules produced by algorithms like C4.5 (Quinlan, 1993) and RIPPER (Cohen, 1995). Perturbation based techniques involve the modification of transactions to support only non-sensitive rules (Katsarou et al., 2009), the removal of tuples associated with sensitive rules (Natwichai et al., 2008), the suppression of certain attribute values (Wang et al., 2005) and the redistribution of tuples supporting sensitive patterns so as to maintain the ordering of the rules (Delis et al., 2010). In this paper, we propose a series of techniques to efficiently protect the disclosure of sensitive knowledge patterns in classification rule mining. We aim to hide sensitive rules without compromising the information value of the entire dataset. After an expert selects the sensitive rules, we modify class labels at the tree node corresponding to the tail of the sensitive pattern, to eliminate the gain attained by the information metric that caused the splitting. Then, we appropriately set the values of non-class attributes, adding new instances along the path to the root where required, to allow non-sensitive patterns to remain as unaffected as possible (Kalles et al., 2016). This approach is of great importance as the sanitized data set can be subsequently published and, even, shared with competitors of the data set owner, as can be the case with retail banking [Li et al., 2011]. In this paper, we extend a previous work (Kalles et al., 2016) by formulating a generic look ahead solution which takes into account the tree structure all the way from an affected leaf to the root. The rest of this paper is structured in 3 sections. Section 2 describes the dataset operations we employ to hide a rule while attempting to minimally affect the decision tree. Section 3 discusses further research issues and concludes the paper. 2 The Baseline Problem and a Heuristic Solution Figure 1 shows a baseline problem, which assumes a binary decision tree representation, with binary-valued, symbolic attributes (X, Y and Z) and binary classes (C1 and C2). Hiding R3 implies that the splitting in node Z should be suppressed, hiding R2 as well. X Y t f t C1 C2 X f t Then, we employ a top-down pass (Allocate-and-Set) to complete the specification of the newly added instances. These two passes help us hide all sensitive rules and keep the sanitized tree close to the form of the original decision tree. These two techniques had been fully described in previous published works (Kalles et al., 2016). The main contribution of this paper is the improvement of the Swap-and-Add pass by following a look ahead approach than a greedy which was used before. W Z t f C1 Y f f t W t Z f C2 C1 C2 t C1 f C2 C1 R1: 𝑋=𝑡⋀𝑌=𝑡⇒𝐶1 R2: 𝑋=𝑡⋀𝑌=𝑓⋀𝑍=𝑡⇒𝐶2 R3: 𝑋=𝑡⋀𝑌=𝑓⋀𝑍=𝑓⇒𝐶1 R4: 𝑋=𝑓⋀𝑍=𝑡⇒𝐶1 R5: 𝑋=𝑓⋀𝑍=𝑓⇒𝐶2 R1: 𝑋=𝑡⋀𝑌=𝑡⇒𝐶1 R23: 𝑿=𝒕⋀𝒀=𝒇⇒𝑪2 R4: 𝑋=𝑓⋀𝑍=𝑡⇒𝐶1 R5: 𝑋=𝑓⋀𝑍=𝑓⇒𝐶2 2.1 Adding instances to preserve the class balance using Linear Diophantine Equations: a proof of concept and an indicative example The Swap-and-Add pass aims to ensure that node statistics change without threatening class-value balances in the rest of the tree. Using Figure 2 as an example, we show the original tree with class distributions of instances across edges. Figure 1. A binary decision tree before (left) and after (right) hiding and the associated rule sets. A first idea to hide R3 would be to remove from the training data all the instances of the leaf corresponding to R3 and to retrain the tree from the resulting (reduced) dataset. However this action may incur a substantial tree restructuring, affecting other parts of the tree too. Another approach would be to turn into a new leaf the direct parent of the R3 leaf. However, this would not modify the actual dataset, thus an adversary could recover the original tree. To achieve hiding by modifying the original data set in a minimal way, we may interpret “minimal” in terms of changes in the data set or in terms of whether the sanitized decision tree produced via hiding is syntactically close to the original one. Measuring minimality in how one modifies decision trees has been studied in terms of heuristics that guarantee or approximate the impact of changes (Kalles and Morris, 1996; Kalles and Papagelis, 2000; Kalles and Papagelis, 2010). However, hiding at Z modifies the statistics along the path from Z to the root. Since splitting along this path depends on these statistics, the relative ranking of the attributes may change, if we run the same induction algorithm on the modified data set. To avoid ending up with a completely different tree, we first employ a bottom-up pass (Swap-and-Add) to change the class label of instances at the leaves and then to add some new instances on the path to the root, to preserve the key statistics at the intermediate nodes. Figure 2. Original tree We use the information gain as the splitting heuristic. To hide the leaf which corresponds to the 9 positive instances (to the right of N0) we change the nine positive instances to negative ones and denote this operation by (-9p,+9n). As a result the parent node, N0, becomes a one-class node with minimum (zero) entropy. All nodes located upwards to node N0 until the root N4 also absorb the (-9p, +9n) operation (Figure 3). This conversion would leave Ν1 with 49p+46n instances. But, as its initial 58p+37n distribution contributed to N1’s splitting attribute, AN1, which in turn created N0 (and then 9p), we should preserve the information gain of AN1, since the entropy of a node only depends on the ratio p:n of its instance classes (Lemma 1). Lemma 1. The entropy of a node only depends on the ratio of its instance classes. (The proof is in (Kalles et al., 2016)) Equations as the formulation technique of the problem of determining how many instances to add; as we shall show, this technique deals with both issues in one go. Let (𝑥1 , 𝑦1 ) be the number of positive and negative instances respectively that have to be added to node N1 in order to maintain its initial ratio. This can be expressed with the following equation: 49 + 𝑥1 58 = 46 + 𝑦1 37 The above equation is equivalent to the following linear Diophantine equation: 37𝑥1 − 58𝑦1 = 855 (1) Similarly, let (𝑥2 , 𝑦2), (𝑥3 , 𝑦3 ), (𝑥4 , 𝑦4 ) be the corresponding number of positive and negative instances that have to be added to nodes N2, N3 and N4. The corresponding linear Diophantine equations for nodes N2, N3 and N4 are: 137𝑥2 − 58𝑦2 = 1755 137𝑥3 − 352𝑦3 = 4401 459𝑥4 − 541𝑦4 = 9000 (2) (3) (4) The general solutions of the above four (1-4) linear Diophantine equations are given below (k ∈ ℤ): Figure 3. Bottom-up propagation of instances (-9p,+9n). 58𝑝 To maintain the initial ratio (37𝑛) of node N1, we should add appropriate number of positive and negative instances to N1 and extend this addition process up until the tree root, by accumulating at each node all instance requests from below and by adding instances locally to maintain the node statistics, propagating these changes to the tree root. In a previously published work (Kalles et al., 2016) the above procedure was greedy, essentially solving the problem for only one (tree) level of nodes, which resulted many times in a non-optimum (minimum) number of added instances, whereas a look ahead based solution would be able to take into account all levels up to the root. In addition, the new ratios (p:n) of the nodes were not exactly the same as they were before the change, thus propagating ratio changes whose impact could only be quantified in a compound fashion by inspecting the final tree and hampering our ability to investigate the behavior of this heuristic in a detailed fashion. We, therefore, reverted to using Diophantine Linear 𝑥 = 9405 + 58k 37𝑥1 − 58𝑦1 = 855 ⇔ { 1 𝑦1 = 5985 + 37k 𝑥 = −19305 + 58k 137𝑥2 − 58𝑦2 = 1755 ⇔ { 2 𝑦2 = −45630 + 137k 𝑥 = −734967 + 352k 137𝑥3 − 352𝑦3 = 4401 ⇔ { 3 𝑦3 = −286065 + 137k 𝑥4 = −297000 + 541k 459𝑥4 − 541𝑦4 = 9000 ⇔ { 𝑦4 = −252000 + 459k From the infinite pairs of solutions for every linear Diophantine equation we choose the pairs (𝑥1∗ , 𝑦1∗ ), (𝑥2∗ , 𝑦2∗ ), (𝑥3∗ , 𝑦3∗ ) 𝑎𝑛𝑑 (𝑥4∗ , 𝑦4∗ ),where 𝑥1∗ , 𝑥2∗ , 𝑥3∗ , 𝑥4∗ , 𝑦1∗ , 𝑦2∗ , 𝑦3∗ , 𝑦4∗ are the minimum natural numbers that satisfy the following condition. (C1): 𝑥1∗ ≤ 𝑥2∗ ≤ 𝑥3∗ ≤ 𝑥4∗ and 𝑦1∗ ≤ 𝑦2∗ ≤ 𝑦3∗ ≤ 𝑦4∗ Condition (C1) ensures that we have selected the optimum path to the root of the decision tree in terms that every addition of instances propagates upwards in a consistent manner (i.e. if one adds some instances at a lower node, one cannot have added fewer instances in an ancestor node). With this technique we can determine exactly the minimum number of instances that must be added to each node in order to maintain the initial ratios of every node. There are a few cases that a linear Diophantine equations has no solutions, this problem can be overcome by a little change to the initial ratio until we construct a solvable linear Diophantine equation. For this example the pairs of solutions that are both minimum and satisfy the condition (C1) are: (𝑥1∗ , 𝑦1∗ ) = (67,28) (𝑥2∗ , 𝑦2∗ ) = (67,128) (𝑥3∗ , 𝑦3∗ ) = (361,128) (𝑥4∗ , 𝑦4∗ ) = (550,450) Based on the above solutions we have to add to N1, 67 positive and 28 negative instances which leads to a ratio of 116𝑝 ( ). These new instances propagate upwards, therefore 74𝑛 on N2, we don’t need to add any positive instances but we need to add 100 (=128-28) negative instances which leads 116𝑝 to a ratio of (274𝑛). Similarly, for N3 we should add, 294 (=361-67) new positive and no negative instances. Finally, for N4, we should add 189 (=550-361) new positive and 322 (=450-128) new negative instances. Therefore, with this look ahead technique we know from the very beginning which one is the optimum path in order to add appropriate number of instances to maintain the exact values of initial ratios which means that we will not have any disturbance in our tree after the hiding. We observe that the solutions of Diophantine equation (4) which corresponds to node N4 (root) determine the total number of instances that should be added to our dataset in order to have the same ratios as initially. If we slightly 540𝑝 change the ratio of N4 (in our case let be changed to (460𝑛) 541𝑝 instead of (459𝑛) then we will have a different Diophantine equation which leads to a smaller number of added instances. In our example the new Diophantine equation (4’) and the set of solutions are given below: 460𝑥4 − 540𝑦4 = 4000 (4’) 𝑥4 = −1400 + 27k 460𝑥4 − 540𝑦4 = 4000 ⇔ { ,k ∈ ℤ 𝑦4 = −1200 + 23k For this example the pairs of solutions that are both minimum and satisfy the condition C1 are: (𝑥1∗ , 𝑦1∗ ) = (67,28) (𝑥2∗ , 𝑦2∗ ) = (67,128) (𝑥3∗ , 𝑦3∗ ) = (361,128) (𝑥4∗ , 𝑦4∗ ) = (382,318) Therefore, we have to add 700 new instances instead of 1000 that we had to add before. Of course now we don’t have exactly the same ratio p:n for node N4 but something very close to it. In other words, the method of linear Diophantine equations helping us to make a trade-off between the number of added instances and the accuracy of a node’s ratio. 2.2 Fully specifying instances Having set the values of some attributes for the newly added instances is only a partial instance specification, since we have not set those instance values for any other attribute other than the ones present in the path from the root to the node where the instance addition took place. Unspecified values must be so set to ensure that currently selected attributes at all nodes do not get displaced by competing attributes. This is what the Allocate-and-Set pass does. With reference to Figure 2 and the 9n instances added due to N1 via the N2-N1 branch, these instances have not had their values set for 𝐴N1and 𝐴N2. Moreover, these must be so set to minimize the possibility that 𝐴N2 is displaced from N2, since (at N2) any of attributes 𝐴N0, 𝐴N1 or 𝐴N2 (or any other) can be selected. Those 9n instances were added to help guarantee the existence of N1. As it happened in the bottom-up pass, we need the information gain of 𝐴N2 to be large enough to fend off competition from 𝐴N0 or 𝐴N1 at node N2, but not too large to threaten 𝐴N3. We start with the best possible allocation of values to attribute 𝐴N2 , and progressively explore directing some of these along the N2 N1 branch, and stop when the information gain for 𝐴N2 becomes lower than the information gain for 𝐴N3 . We use the term two-level hold-back to refer to this technique, as it spans two tree levels. This approach exploits the convexity property of the information gain difference function (Lemma 2). The Allocate-and-Set pass examines all four combinations of distributing all positive and all negative instances to one branch, select the one that maximizes the information gain difference and then move along the slope that decreases the information gain, until we do not exceed the information gain of the parent; then perform the recursive specification all the way to the tree fringe. Lemma 2. Distributing new class instances along only one branch maximizes information gain. (The proof is in (Kalles et al., 2016)) 2.3 Grouping of hiding requests By serially processing hiding requests, each one incurs the full cost of updating the instance population. By knowing all of them in advance, we only consider once each node in the bottom-up pass and once in the top-down pass. We express that dealing with all hiding requests in parallel leads to the minimum number of new instances by: 𝑆 𝑆 |𝑇𝑅𝑃 | = 𝑚𝑖𝑛 |(𝑇{𝑖} ) | 𝑖 𝑅−{𝑖} The formula states that for a tree T, the number of instances (|T|), after a parallel (Tp) hiding process of all rules (leaves) in R, is the optimal along all possible orderings of all serial (Ts) hiding requests drawn from R. A serial hiding request is implemented by selecting a leaf to be hidden and then, recursively, dealing with the remaining leaves (Lemma 3). Lemma 3. When serially hiding two non-sibling leaves, the number of new instances to be added to maintain the max: min ratios is larger or equal to the number of instances that would have been added if the hiding requests were handled in parallel. (The proof is in (Kalles et al., 2016)) We now demonstrate an example, in which two hiding requests were handled in parallel, using the proposed look ahead technique of linear Diophantine equations. In figure 4, we show the original tree with class distributions of instances across edges. Figure 5. Bottom-up propagation of instances (-10p,+10n) from the left side and (+5p,-5n) from the right side of the tree . Figure 4. Original tree We use the information gain as the splitting heuristic. To hide the leaf which corresponds to the 10 positive instances (to the left of N0) we change the ten positive instances to negative ones and denote this operation by (-10p,+10n). As a result, the parent node, N0, becomes a one-class node with minimum (zero) entropy. All nodes located upwards to node N0 until the root N4 also absorb the (-10p,+10n) operation (Figure 5). This conversion would leave Ν1 with 48p+47n instances. But, as its initial 58p+37n distribution contributed to N1’s splitting attribute, AN1, which in turn created N0 (and then 10p), we should preserve the information gain of AN1, since the entropy of a node only depends on the ratio p:n of its instance classes. To hide the leaf which corresponds to the 5 negative instances (to the right of N0’) we change the five negative instances to positive ones and denote this operation by (+5p,5n). As a result, the parent node, N0’, becomes a one-class node with minimum (zero) entropy. All nodes located upwards to node N0’ until the root N4 also absorb the (10p,+10n) operation (Figure 5). The intersection node N3 and the root N4 will be affected by (-5p,+5n) which is the total outcome of the two operations from the two subtrees below of N3. This conversion would leave Ν1’ with 125p+45n instances. But, as its initial 120p+50n distribution contributed to N1’s splitting attribute, AN1’, which in turn created N0’ (and then 5n), we should preserve the information gain of AN1’, since the entropy of a node only depends on the ratio p:n of its instance classes. In order to maintain the ratio of nodes N1 and N1’, we have to add appropriate number of positive and negative instances to N1, N1’ and extend this addition process up until the tree root, by accumulating at each node all instance requests from below and by adding instances locally to maintain the node statistics, propagating these changes to the tree root. Let (𝑥1 , 𝑦1 ) be the number of positive and negative instances respectively that should be added to node N1 to maintain its initial ratio. This can be expressed with the following equation: 48 + 𝑥1 58 = 47 + 𝑦1 37 The above equation is equivalent to the following linear Diophantine equation: 37𝑥1 − 58𝑦1 = 950 (5) Similarly, let (𝑥2 , 𝑦2), (𝑥1′ , 𝑦1′ ), (𝑥2 ′, 𝑦2 ′), (𝑥3 , 𝑦3 ), (𝑥4 , 𝑦4 ) be the corresponding number of positive and negative instances that should be added to nodes N2, N1’, N2’, N3 and N4. The corresponding linear Diophantine equations for nodes N2, N1’, N2’, N3 and N4 are: 137𝑥2 − 58𝑦2 = 1950 (6) 50𝑥1′ − 120𝑦1′ = −850 (7) 93𝑥2′ − 294𝑦2′ = −1935 (8) 230𝑥3 − 352𝑦3 = 2910 (9) 459𝑥4 − 541𝑦4 = 5000 (10) The general solutions of the above six (5-10) linear Diophantine equations are given below( k ∈ ℤ): 𝑥 = 10450 + 58k 37𝑥1 − 58𝑦1 = 950 ⇔ { 1 𝑦1 = 6650 + 37k 𝑥 = −21450 + 58k 137𝑥2 − 58𝑦2 = 1950 ⇔ { 2 𝑦2 = −50700 + 137k 𝑥 ′ = −425 + 12k 50𝑥1′ − 120𝑦1′ = −850 ⇔ { 1 𝑦1′ = −170 + 5k 𝑥 ′ = −12255 + 98k 137𝑥2 ′ − 58𝑦2 ′ = 1755 ⇔ { 2 𝑦2 ′ = −3870 + 31k 𝑥3 = 109125 + 176k 137𝑥3 − 352𝑦3 = 4401 ⇔ { 𝑦3 = 71295 + 115k 𝑥4 = −165000 + 541k 459𝑥4 − 541𝑦4 = 9000 ⇔ { 𝑦4 = −140000 + 459k From the infinite pairs of solutions for every linear Diophantine equation we choose the pairs (𝑥 ̅̅̅, 𝑦1 (𝑥 ̅̅̅, ̅̅̅), ̅̅̅′, 𝑦1 (𝑥 ̅̅̅′, 𝑦2 (𝑥 ̅̅̅, ̅̅̅), ̅̅̅, ̅4 ), 1 ̅̅̅), 2 𝑦 2 (𝑥 1 ̅̅̅′), 2 ̅̅̅′), 3 𝑦 3 (𝑥 4 𝑦 where ̅̅̅, 𝑥1 ̅̅̅, 𝑥2 ̅̅̅ 𝑥1 ′ , ̅̅̅ 𝑥2 ′ , ̅̅̅, 𝑥3 ̅̅̅, 𝑥4 ̅̅̅, 𝑦1 ̅̅̅, 𝑦2 ̅̅̅ 𝑦1 ′ , 𝑦 ̅̅̅2 ′ , ̅̅̅, 𝑦3 𝑦̅4 are the minimum natural numbers that satisfy the conditions (C1) and (C2). (C1): ̅̅̅ 𝑥1 ≤ ̅̅̅ 𝑥2 and ̅̅̅ 𝑦1 ≤ ̅̅̅ 𝑦2 and ̅̅̅ 𝑥1 ′ ≤ ̅̅̅ 𝑥2 ′ and ̅̅̅ 𝑦1′ ≤ 𝑦 ̅̅̅2 ′ ′ ′ (C2): ̅̅̅ 𝑥2 + ̅̅̅ 𝑥2 ≤ ̅̅̅ 𝑥3 ≤ ̅̅̅ 𝑥4 and 𝑦 ̅̅̅2 + ̅̅̅ 𝑦2 ≤ ̅̅̅ 𝑦3 ≤ 𝑦̅4 Condition (C1) ensures that we have selected the optimum path from the leaves up to intersection node N3 of the decision tree. Condition (C2) ensures that we have selected the optimum path from one level below the intersection node N3 (N2, N2’) up to the root. For this example, the pairs of solutions that are both minimum and satisfy the conditions (C1), (C2) are: (𝑥 ̅̅̅, 𝑦1 = (68,27) 1 ̅̅̅) (𝑥 ̅̅̅, ̅̅̅) 2 𝑦 2 = (68,127) (𝑥 ̅̅̅′, 𝑦 ̅̅̅′) 1 1 = (7,10) (𝑥 ̅̅̅′, 𝑦 ̅̅̅′) 2 2 = (93,36) (𝑥 ̅̅̅, 𝑦 ̅̅̅) 3 3 = (357,225) (𝑥 ̅̅̅, ̅4 ) = (546,454) 4 𝑦 Based on the above solutions we should add to N1, 68 positive and 27 negative instances. These new instances propagate upwards, therefore on N2, we don’t need to add any positive instances but we need to add 100 (=127-27) negative instances. In the same manner, we should add to N1’, 7 positive and 10 negative instances. These new instances propagate upwards, therefore on N2’, we need to add 86 (=93-7) positive instances and 26 (=36-10) negative instances. Similarly, for N3 we should add, 196 (=357-68-93) new positive and 62 (=225-127-36) new negative instances. Finally, for N4, we should add 189 (=546-357) new positive and 229 (=454-225) new negative instances. Therefore, based on this example we observe that by using this technique we can handle more than one hiding requests without any increase in the number of instances that can be added. This proof of concept shows that formulating the problem of hiding requests in parallel is nearly a natural fit for the linear Diophantine equations technique. 3 Conclusions and directions for further work We have presented the outline of a heuristic that allows one to specify which leaves of a decision tree should be hidden and then proceed to judiciously add instances to the original data set so that the next time one tries to build the tree, the to-be-hidden nodes will have disappeared because the instances corresponding to those nodes will have been absorbed by neighboring ones. We have presented a fully-fledged example of the proposed approach and, along its presentation, discussed a variety of issues that relate to how one might minimize the amount of modifications that are required to perform the requested hiding as well as where some side-effects of this hiding might emerge. To do so, we have turned our attention to using linear Diophantine equations to formulate the constraints which must be satisfied for the heuristic to work. Of course, several aspects of our technique can be substantially improved. The max:min ratio concept can guarantee the preservation of the information gain of a splitting attribute but it would be interesting to see whether it can be applied to other splitting criteria too. Since this ratio is based on frequencies, it should also work with a similar popular metric, the Gini index (Breiman et al., 1984). On the other hand, it is unclear whether it can preserve trees that have been induced using more holistic metrics, such as the minimum description length principle (Quinlan and Rivest, 1989). Extensive experimentation with several data sets would allow us to estimate the quality of the max:min ratio heuristic and also experiment with a revised version of the heuristic, one that strives to keep the p:n ratio of a node itself (and not its parent), or one that attempts to remove instances instead of swapping their class labels, or still another that further relaxes the p:n ratio concept during the top-down phase by distributing all unspecified instances evenly among the left and right outgoing branch from a node and proceeding recursively to the leaves (which is the one we actually implemented). In general, experimenting with a variety of heuristics to trade off ease of implementation with performance is an obvious priority for experimental research. On performance aspects, besides speed, one also needs to look at the issue of judging the similarity of the original tree with the one produced after the above procedure has been applied. One might be interested in syntactic similarity (Zantema and Bodlaender, 2000) (comparing the data structures –or parts thereof- themselves) or semantic similarity (comparing against reference data sets). This is an issue of substantial importance, which will also help settle questions of which heuristics work better and which not. As the number of instances to be added is a main index of the heuristic’s quality a reasonable direction for investigation is to determine the appropriate ratio values, which result in smaller integer solutions of the corresponding Linear Diophantine Equations but, at the same time, do not deviate too much from the structure of the original tree. This suggests the adoption of approximate ratios instead of exact ones and, obviously, raises the potential to further investigate the trade-off between data-set increase and tree similarity. Extensive experimentation with different decision trees would allow us to observe if this look ahead technique can be applied not only to two parallel hiding requests but for any k simultaneously specified requests, without any impact to the number of instances that should be added. It should not be ruled out that this could even lead to a formally proven result. It is rather obvious that the variety of answers one could explore for each of the questions above constitutes a research agenda of both a theoretical and an applied nature. At the same time, it is via extending the base case, by allowing multi-valued and numeric attributes and multi-class problems that we should address the problem of enhancing the basic technique, alongside investigating the robustness of this heuristic to a variety of splitting criteria and to datasets of varying size and complexity. The longer-term goal is to have it operate as a standard data engineering service to accommodate hiding requests, coupled with a suitable environment where one could specify the importance of each hiding request. We have developed a prototype web-based application which implements the aforementioned technique and we have used it to obtain initial confirmation of the validity of our arguments. References Agrawal, R., and Srikant, R. 2000: Privacy-Preserving Data Mining. In ACM SIGMOD Conference of Management of Data, pp. 439-450. Breiman, L.; Friedman, J. H. ; Olshen, R. A. and Stone, C. J. 1984. Classification and regression trees. Belmont, CA, Wadsworth. Chang, L.W., and Moskowitz, I.S. 1998. Parsimonious Downgrading and Decision Trees applied to the Inference Problem. In New Security Paradigms Workshop, pp. 82-89. Cohen, W.W. 1995. Fast effective rule induction. In Machine Learning: the 12th International Conference Delis, A.; Verykios, V.S.; and Tsitsonis, A. 2010. A Data Perturbation Approach to Sensitive Classification Rule Hiding. In 25th Symposium On Applied Computing. Estivill-Castro, V., and Brankovic, L. 1999. Data swapping: Balancing privacy against precision in mining for logic rules. In First International Conference on Data Warehousing and Knowledge Discovery. Gkoulalas-Divanis, A., and Verykios, V.S. 2009. Privacy Preserving Data Mining: How far can we go? In Handbook of Research on Data Mining in Public and Private Sectors: Organizational and Government Applications. Eds. A. Syvajarvi and J. Stenvall. IGI Global. Kalles, D., and Morris, D.T. 1996. Efficient Incremental Induction of Decision Trees. Machine Learning 24(3), 231-242. Kalles, D., and Papagelis, A. 2000. Stable decision trees: Using local anarchy for efficient incremental learning. International Journal on Artificial Intelligence Tools 9(1), 79-95. Kalles, D., and Papagelis, A. 2010. Lossless fitness inheritance in genetic algorithms for decision trees. Soft Computing 14(9), 973993. Kalles, D.; Verykios, V.S.; Feretzakis, G.; and Papagelis, A. 2016. Data set operations to hide decision tree rules. In Proceedings of the Twenty-second European Conference on Artificial Intelligence. Kalles, D.; Verykios, V.S.; Feretzakis, G.; and Papagelis, A. 2016. Data set operations to hide decision tree rules. In Proceedings of the 1st International Workshop on AI for Privacy and Security. Article No. 10. Katsarou, A.; Gkouvalas-Divanis, A.; and Verykios, V. S. 2009. Reconstruction-based Classification Rule Hiding through Controlled Data Modification. In IFIP International Federation for Information Processing 296, 449-458. Li, R. ; de Vries D.; and Roddick J. 2011. Bands of Privacy Preserving Objectives: Classification of PPDM Strategies. In 9th Australasian Data Mining Conference, pp. 137-151. Natwichai, J.; Li, X.; and Orlowska, M. 2005. Hiding Classification Rules for Data Sharing with Privacy Preservation. In 7th International Conference on Data Warehousing and Knowledge Discovery, pp. 468-467. Natwichai, J.; Li, X.; and Orlowska, M. 2006. A Reconstructionbased Algorithm for Classification Rules Hiding. In 17th Australasian Database Conference, pp. 49-58. Natwichai, J.; Sun, X.; and Li, X. 2008. Data Reduction Approach for Sensitive Associative Classification Rule Hiding. In 19th Australian Database Conference. Quinlan, J.R. 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann. Quinlan, J.R.; and Rivest, R.L. 1989. Infering Decision Trees using the Minimum Description Length Principle. Information and Computation 80, 227-248. Verykios, V.S.; Bertino, E.; Fovino, I.N.; Provenza, L.P.; Saygin, Y.; and Theodoridis, Y. 2004. State of the Art Privacy Preserving Data Mining. SIGMOD Record 33(1), 50-57. Wang, K.; Fung, B.C.M.; and Yu, P.S. 2005. Template-Based Privacy Preservation in Classification Problems. In 5th IEEE International Conference on Data Mining, pp. 466-473. Zantema, H.; and Bodlaender, H.L. 2000. Finding Small Equivalent Decision Trees is Hard. International Journal of Foundations of Computer Science 11(2), 343-354.
2cs.AI
arXiv:1608.02674v1 [cs.DC] 9 Aug 2016 Further Algebraic Algorithms in the Congested Clique Model and Applications to Graph-Theoretic Problems François Le Gall Graduate School of Informatics Kyoto University [email protected] Abstract Censor-Hillel et al. [PODC’15] recently showed how to efficiently implement centralized algebraic algorithms for matrix multiplication in the congested clique model, a model of distributed computing that has received increasing attention in the past few years. This paper develops further algebraic techniques for designing algorithms in this model. We present deterministic and randomized algorithms, in the congested clique model, for efficiently computing multiple independent instances of matrix products, computing the determinant, the rank and the inverse of a matrix, and solving systems of linear equations. As applications of these techniques, we obtain more efficient algorithms for the computation, again in the congested clique model, of the all-pairs shortest paths and the diameter in directed and undirected graphs with small weights, improving over Censor-Hillel et al.’s work. We also obtain algorithms for several other graph-theoretic problems such as computing the number of edges in a maximum matching and the Gallai-Edmonds decomposition of a simple graph, and computing a minimum vertex cover of a bipartite graph. 1 Introduction Background. The congested clique model is a model in distributed computing that has recently received increasing attention [5, 12, 13, 17, 18, 19, 20, 26, 27, 30, 34, 35]. In this model n nodes communicate with each other over a fully-connected network (i.e., a clique) by exchanging messages of size O(log n) in synchronous rounds. Compared with the more traditional congested model [36], the congested clique model removes the effect of distances in the computation and thus focuses solely on understanding the role of congestion in distributed computing. Typical computational tasks studied in the congested clique model are graph-theoretic problems [5, 12, 13, 17, 20, 34], where a graph G on n vertices is initially distributed among the n nodes of the network (the ℓ-th node of the network knows the set of vertices adjacent to the ℓ-th vertex of the graph, and the weights of the corresponding edges if the graph is weighted) and the nodes want to compute properties of G. Besides their theoretical interest and potential applications, such problems have the following natural interpretation in the congested clique model: the graph G represents the actual topology of the network, each node knows only its neighbors but can communicate to all the nodes of the network, and the nodes want to learn information about the topology of the network. Censor-Hillel et al. [5] recently developed algorithms for several graph-theoretic problems in the congested clique model by showing how to implement centralized algebraic algorithms for matrix multiplication in this model. More precisely, they constructed a O(n1−2/ω )-round algorithm for matrix multiplication, where ω denotes the exponent of matrix multiplication (the best known upper bound on ω is ω < 2.3729, obtained in [25, 43], which gives exponent 1 − 2/ω < 0.1572 in the congested clique model), improving over the O(n2−ω ) algorithm mentioned in [13], in the following setting: given two n × n matrices A and B over a field, the ℓ-th node of the network initially owns the ℓ-th row of A and the ℓ-column of B, and needs to output the ℓ-th row and the ℓcolumn of the product AB. Censor-Hillel et al. consequently obtained O(n1−2/ω )-round algorithms for several graph-theoretic tasks that reduce to computing the powers of (some variant of) the adjacency matrix of the graph, such as counting the number of triangles in a graph (which lead to an improvement over the prior best algorithms for this task [12, 13]), detecting the existence of a constant-length cycle and approximating the all-pairs shortest paths in the input graph (improving the round complexity obtained in [34]). One of the main advantages of such an algebraic approach in the congested clique model is its versatility: it makes possible to construct fast algorithms for graph-theoretic problems, and especially for problems for which the best non-algebraic centralized algorithm is highly sequential and does not seem to be implementable efficiently in the congested clique model, simply by showing a reduction to matrix multiplication (and naturally also showing that this reduction can be implemented efficiently in the congested clique model). Our results. In this paper we develop additional algebraic tools for the congested clique model. We first consider the task of computing in the congested clique model not only one matrix product, but multiple independent matrix products. More precisely, given k matrices A1 , . . . , Ak each of size n × m and k matrices B1 , . . . , Bk each of size m × m, initially evenly distributed among the n nodes of the network, the nodes want to compute the k matrix products A1 B1 , . . . , Ak Bk . Prior works [5, 13] considered only the case k = 1 and m = n, i.e., one product of two square matrices. Our contribution is thus twofold: we consider the rectangular case, and the case of several matrix products as well. Let us first discuss our results for square matrices (m = n). By using sequentially k times the matrix multiplication algorithm from [5], k matrix products can naturally be computed in O(kn1−2/ω ) rounds. In this work we show that we can actually do better. 2 Theorem 1 (Simplified version). In the congested clique model k independent products of pairs of n × n matrices can be computed with round complexity  O(k2/ω n1−2/ω ) if 1 ≤ k < n, O(k) if k ≥ n. This generalization of the results from [5] follows from a simple strategy: divide the n nodes of the network into k blocks (when k ≤ n), each containing roughly n/k nodes, compute one of the k matrix products per block by using an approach similar to [5] (i.e., a distributed version of the best centralized algorithm computing one instance of square matrix multiplication), and finally distribute the relevant part of the k output matrices to all the nodes of the network. Analyzing the resulting protocol shows that the dependence in k in the overall round complexity is reduced to k2/ω . This sublinear dependence in k has a significant number of implications (see below). The complete version of Theorem 1, given in Section 3, also considers the general case where the matrices may not be square (i.e., the case m 6= n), which will be crucial for some of our applications to the All-Pairs Shortest Path problem. The proof becomes more technical than for the square case, but is conceptually very similar: the main modification is simply to now implement a distributed version of the best centralized algorithm for rectangular matrix multiplication. The upper bounds obtained on the round complexity depend on the complexity of the best centralized algorithms for rectangular matrix multiplication (in particular the upper bounds given in [24]). Figure 1 depicts the upper bounds we obtain for the case k = 1. While the major open problem is still whether the product of two square matrices can be computed in a constant (or nearly constant) number of rounds, our results show that for m = O(n0.651... ), the product of an n × m matrix by an m × n matrix can indeed be computed in O(nǫ ) rounds for any ǫ > 0. We also show lower bounds on the round complexity of the general case (Proposition 1 in Section 3), which are tight for most values of k and m, based on simple arguments from communication complexity. Round complexity n1 n0.5 n0.1572 n0 n0 n0.5 n0.651... n1 n2 Value of m Figure 1: Our upper bounds on the round complexity of the computation of the product of an n × m matrix by an m × n matrix in the congested clique model. We then study the following basic problems in linear algebra: computing the determinant, the rank or the inverse of an n × n matrix over a finite field F of order upper bounded by a polynomial of n, and solving a system of n linear equations and n variables. We call these problems DET(n, F), 3 Rank(n, F), INV(n, F) and SYS(n, F), respectively (the formal definitions are given in Section 2). While it is known that in the centralized setting these problems can be solved with essentially the same time complexity as matrix multiplication [4], these reductions are typically sequential and do not work in a parallel setting. In this paper we design fast deterministic and randomized algorithm for these four basis tasks, and obtain the following results. Theorem 2. Assume that F has characteristic greater than n. In the congested clique model, the deterministic round complexity of DET(n, F) and INV(n, F) is O(n1−1/ω ). Theorem 3. Assume that F has order |F| = Ω(n2 log n). In the congested clique model, the randomized round complexity of DET(n, F), SYS(n, F) and Rank(n, F) is O(n1−2/ω log n). The upper bounds of Theorems 2 and 3 are O(n0.5786 ) and O(n0.1572 ), respectively, by basing our implementation on the asymptotically fastest (but impractical) centralized algorithm for matrix multiplication corresponding to the upper bound ω < 2.3729. These bounds are O(n2/3 ) and O(n1/3 log n), respectively, by basing our implementation on the trivial (but practical) centralized algorithm for matrix multiplication (corresponding to the bound ω ≤ 3). These algorithms are obtained by carefully adapting to the congested clique model the relevant known parallel algorithms [9, 21, 22, 23, 37] for linear algebra, and using our efficient algorithm for computing multiple matrix products (Theorem 1) as a subroutine. An interesting open question is whether INV(n, F) can be solved with the same (randomized) round complexity as the other tasks. This problem may very well be more difficult; in the parallel setting in particular, to the best of our knowledge, whether matrix inversion can be done with the same complexity as these other tasks is also an open problem. Applications of our results. The above results give new algorithms for many graph-theoretic problems in the congested clique model, as described below and summarized in Table 1. Our main key tool to derive these applications is Theorem 7 in Section 3, which gives an algorithm computing efficiently the distance product (defined in Section 2) of two matrices with small integer entries based on our algorithm for multiple matrix multiplication of Theorem 1. Computing the distance product is a fundamental graph-theoretic task deeply related to the AllPairs Shortest Path (APSP) problem [40, 41, 47]. Combining this result with techniques from [41], and observing that these techniques can be implemented efficiently in the congested clique model, we then almost immediately obtain the following result. Theorem 4. In the congested clique model, the deterministic round complexity of the all-pairs shortest paths problem in an undirected graph of n vertices with integer weights in {0, . . . , M }, where M is an integer such that M ≤ n, is Õ(M 2/ω n1−2/ω ). Since computing the diameter of a graph reduces to solving the all-pairs shortest paths, we obtain the same round complexity for diameter computation in the same class of graphs. This improves over the Õ(M n1−2/ω )-round algorithm for these tasks (implicitly) given in [5]. The main application of our results nevertheless concerns the all-pair shortest paths problem over directed graphs (for which the approach based on [41] does not work) with constant weights. We obtain the following result by combining our algorithm for distance product computation with Zwick’s approach [47]. Theorem 5. In the congested clique model, the randomized round complexity of the all-pairs shortest paths problem in a directed graph of n vertices with integer weights in {−M, . . . , 0, . . . , M }, where M = O(1), is O(n0.2096 ). 4 Table 1: Summary of the applications of our algebraic techniques to graph-theoretic problems in the congested clique model. Here n both represents the number of vertices in the input graph and the number of nodes in the network. Problem APSP (undirected graphs, weights in {0, 1, . . . , M }) Round  2 complexity  2 Õ M ω n1− ω Th. 4 O(n0.2096 )  2  2 Diameter (undirected graphs, weights in {0, 1, . . . , M }) Õ M ω n1− ω  2 Computing the size of a maximum matching O n1− ω log n Computing allowed edges in a perfect matching O(n1−1/ω ) Gallai-Edmonds decomposition O(n1−1/ω ) Minimum vertex cover in bipartite graphs O(n1−1/ω ) APSP (directed graphs, constant weights) Th. 5 Cor. 1 Th. 8 Sec. 6.3 Th. 9 Sec. 6.4 Previously   2 Õ M n1− ω Õ(n1/3 )   2 Õ M n1− ω — — — — Prior to this work, the upper bound for the round complexity of this problem was Õ(n1/3 ), obtained by directly computing the distance product (as done in [5]) in the congested clique model. Again, Theorem 5 follows easily from Theorem 7 and the observation that the reduction to distance product computation given in [47] can be implemented efficiently in the congested clique model. The exponent 0.2096 in the statement of Theorem 5 is derived from the current best upper bounds on the complexity of rectangular matrix multiplication in the centralized setting [24]. Theorems 2 and 3 also enable us to solve a multitude of graph-theoretic problems in the congested clique model with a sublinear number of rounds. Examples described in this paper are computing the number of edges in a maximum matching of a simple graph with O(n1−2/ω log n) rounds, computing the set of allowed edges in a perfect matching, the Gallai-Edmonds decomposition of a simple graph, and a minimum vertex cover in a bipartite graph with O(n1−1/ω ) rounds. These results are obtained almost immediately from the appropriate reductions to matrix inversion and similar problems known the centralized setting [7, 31, 38] — indeed it is not hard to adapt all these reductions so that they can be implemented efficiently in the congested clique model. Note that while non-algebraic centralized algorithms solving these problems also exist (see, e.g., [32]), they are typically sequential and do not appear to be efficiently implementable in the congested clique model. The algebraic approach developed in this paper, made possible by our algorithms for the computation of the determinant, the rank and the inverse of matrix, appears to be currently the only way of obtaining fast algorithms for these problems in the congested clique model. 2 Preliminaries Notations. Through this paper we will use n to denote the number of nodes in the network. The n nodes will be denoted 1, 2, . . . , n. The symbol F will always denote a finite field of order upper bounded by a polynomial in n (which means that each field element can be encoded with O(log n) bits and thus sent using one message in the congested clique model). Given any positive integer p, we use the notation [p] to represent the set {1, 2, . . . , p}. Given any p × p′ matrix A, we will write its entries as A[i, j] for (i, j) ∈ [p] × [p′ ], and use the notation A[i, ∗] to represent its i-th row and A[∗, j] to represent its j-th column. 5 Graph-theoretic problems in the congested clique model. As mentioned in the introduction, typically the main tasks that we want to solve in the congested clique model are graphtheoretical problems. In all the applications given in this paper the number of vertices of the graph will be n, the same as the number of nodes of the network. The input will be given as follows: initially each node ℓ ∈ [n] has the ℓ-th row and the ℓ-th column of the adjacency matrix of the graph. Note that this distribution of the input, while being the most natural, is not essential; the only important assumption is that the entries are evenly distributed among the n nodes since they can then be redistributed in a constant number of rounds as shown in the following Lemma by Dolev et al. [12], which we will use many times in this paper. Lemma 1. [12] In the congested clique model a set of messages in which no node is the source of more than n messages and no node is the destination of more than n messages can be delivered within two rounds if the source and destination of each message is known in advance to all nodes. Algebraic problems in the congested clique model. we consider in this paper are defined as follows. The five main algebraic problems that MM(n, m, k, F) — Multiple Rectangular Matrix Multiplications Input: matrices A1 , . . . , Ak ∈ Fn×m and B1 , . . . , Bk ∈ Fm×n distributed among the n nodes (Node ℓ ∈ [n] has A1 [ℓ, ∗], . . . , Ak [ℓ, ∗] and B1 [∗, ℓ], . . . , Bk [∗, ℓ]) Output: the matrices A1 B1 , . . . , Ak Bk distributed among the n nodes (Node ℓ ∈ [n] has A1 B1 [ℓ, ∗], . . . , Ak Bk [ℓ, ∗] and A1 B1 [∗, ℓ], . . . , Ak Bk [∗, ℓ]) DET(n, F) — Determinant Input: matrix A ∈ Fn×n distributed among the n nodes (Node ℓ ∈ [n] has A[ℓ, ∗] and A[∗, ℓ]) Output: det(A) (Each node of the network has det(A)) Rank(n, F) — Rank Input: matrix A ∈ Fn×n distributed among the n nodes (Node ℓ ∈ [n] has A[ℓ, ∗] and A[∗, ℓ]) Output: rank(A) (Each node of the network has rank(A)) INV(n, F) — Inversion Input: invertible matrix A ∈ Fn×n distributed among the n nodes (Node ℓ ∈ [n] has A[ℓ, ∗] and A[∗, ℓ]) Output: matrix A−1 distributed among the n nodes (Node ℓ ∈ [n] has A−1 [ℓ, ∗] and A−1 [∗, ℓ]) (Node ℓ ∈ [n] has A−1 [ℓ, ∗] and A−1 [∗, ℓ]) SYS(n, F) — Solution of a linear system Input: invertible matrix A ∈ Fn×n and vector b ∈ Fn×1 , distributed among the n nodes (Node ℓ ∈ [n] has A[ℓ, ∗], A[∗, ℓ] and b) Output: the vector x ∈ Fn×1 such that Ax = b (Node ℓ ∈ [n] has x[ℓ]) Note that the distribution of the inputs and the outputs assumed in the above five problems is mostly chosen for convenience. For instance, if needed the whole vector x in the output of SYS(n, F) can be sent to all the nodes of the network in two rounds using Lemma 1. The only important assumption is that when dealing with matrices, the entries of the matrices must be evenly distributed among the n nodes. We will also in this paper consider the distance product of two matrices, defined as follows. 6 Definition 1. Let m and n be two positive integers. Let A be an n × m matrix and B be an m × n matrix, both with entries in R ∪ {∞}. The distance product of A and B, denoted A ∗ B, is the n × n matrix C such that C[i, j] = mins∈[m] {A[i, s] + B[s, j]} for all (i, j) ∈ [n] × [n]. We will be mainly interested in the case when the matrices have integer entries. More precisely, we will consider the following problem. DIST(n, m, M ) — Computation of the distance product Input: an n×m matrix A and an m×n matrix B, with entries in {−M, . . . , −1, 0, 1, . . . , M }∪{∞} (Node ℓ ∈ [n] has A[ℓ, ∗] and B[∗, ℓ]) Output: the matrix C = A ∗ B distributed among the n nodes (Node ℓ ∈ [n] has C[ℓ, ∗] and C[∗, ℓ]) Centralized algebraic algorithms for matrix multiplication. We now briefly describe algebraic algorithms for matrix multiplication and known results about the complexity of rectangular matrix multiplication. We refer to [4] for a detailed exposition of these concepts. Let F be a field and m, n be two positive integer. Consider the problem of computing the product of an n × m matrix by an m × n matrix over F. An algebraic algorithm for this problem is described by three sets {αijµ }, {βijµ } and {λijµ } of coefficients from F such that, for any n × m matrix A and any m × n matrix B, the equality C[i, j] = t X λijµ S (µ) T (µ) µ=1 holds for all (i, j) ∈ [n] × [n], where C = AB and S (µ) = m n X X T (µ) = αijµ A[i, j], m n X X βijµ B[j, i], i=1 j=1 i=1 j=1 for each s ∈ [t]. Note that each S (µ) and each T (µ) is an element of F. The integer t is called the rank of the algorithm, and corresponds to the complexity of the algorithm. For instance, consider the trivial algorithm computing this matrix product using the formula C[i, j] = m X A[i, s]B[s, j]. s=1 This algorithm can be described in the above formalism by taking t = n2 m, writing each µ ∈ [n2 m] as a triple µ = (i′ , j ′ , s′ ) ∈ [n] × [n] × [m], and choosing  1 if i = i′ and j = j ′ , λij(i′ ,j ′ ,s′ ) = 0 otherwise,   1 if i = i′ and j = s′ , 1 if i = j ′ and j = s′ , αij(i′ ,j ′ ,s′ ) = βij(i′ ,j ′ ,s′ ) = 0 otherwise, 0 otherwise. Note that this trivial algorithm, and the description we just gave, also works over any semiring. 7 The exponent of matrix multiplication. For any non-negative real number γ, let ω(γ) denote the minimal value τ such that the product of an n × ⌈nγ ⌉ matrix over F by an ⌈nγ ⌉ × n matrix over F can be computed by an algebraic algorithm of rank nτ +o(1) (i.e., can be computed with complexity O(nτ +ǫ ) for any ǫ > 0). As usual in the literature, we typically abuse notation and simply write that such a product can be done with complexity O(nω(γ) ), i.e., ignoring the o(1) in the exponent. The value ω(1) is denoted by ω, and often called the exponent of square matrix multiplication. Another important quantity is the value α = sup{γ | ω(γ) = 2}. The trivial algorithm for matrix multiplication gives the upper bound ω(γ) ≤ 2 + γ, and thus ω ≤ 3 and α ≥ 0. The current best upper bound on ω is ω < 2.3729, see [25, 43]. The current best bound on α is α > 0.3029, see [24]. The best bounds on ω(γ) for γ > α can also be found in [24]. 3 Matrix Multiplication in the Congested Clique Model In this section we present our results on the round complexity of MM(n, m, k, F) and DIST(n, m, M ). We first give the complete statement of our main result concerning MM(n, m, k, F) that was stated in a simplified form in the introduction. Theorem 1 (Complete version). For any positive integer k ≤ n, the deterministic round complexity of MM(n, m, k, F) is √  if √ 0 ≤ m ≤ kn,  O(k) kn ≤ m < n2 /k, O(k2/ω(γ) n1−2/ω(γ) ) if  O(km/n) if m ≥ n2 /k, where γ is the solution of the equation     log m log k log k + − 1 ω(γ). γ =1− 1− log n log n log n (1) For any k ≥ n, the deterministic round complexity of MM(n, m, k, F) is  O(k) if 1 ≤ m ≤ n, O(km/n) if m ≥ n. The proof √ of Theorem 1, which will also show that Equation (1) always has a solution when k ≤ n and kn ≤ m < n2 /k, is given in Section 3.1 (a short discussion of the proof ideas was presented in the introduction). The upper bounds we obtain for the case k = 1 are depicted in Figure 1, where Equation (1) is solved using the best known upper bound on ω(γ) from [24]. √ As briefly mentioned in the introduction, the round complexity is constant for any k ≤ n, and we further have round complexity O(nǫ ), for any ǫ > 0, for all values k ≤ n(1+α)/2 (the bound α > 0.3029 implies (1 + α)/2 > 0.6514). For the case m = n the solution of Equation (1) is γ = 1, which gives the bounds of the simplified version of Theorem 1 presented in the introduction. We now give lower bounds on the round complexity of MM(n, m, k, F) that show that the upper √ bounds of Theorem 1 are tight, except possibly in the case kn ≤ m < n2 /k when k ≤ n. Proposition 1. The randomized round complexity of MM(n, m, k, F) is  Ω(k) if 1 ≤ m ≤ n, Ω(km/n) if m ≥ n. 8 Proof. We first prove the lower bound Ω(km/n) for any m ≥ n. Let us consider instances of MM(n, m, k, F) of the following form: for each s ∈ [k] all the rows of As are zero except the first row; for each s ∈ [k] all the columns of Bs are zero except the second column. Let us write Cs = As Bs for each s ∈ [k]. We prove the lower bound by partitioning the n nodes of the network into the two sets {1} and {2, . . . , n}, and considering the following two-party communication problem. Alice (corresponding to the set {1}) has for input As [1, j] for all j ∈ [m] and all s ∈ [k]. Bob (corresponding to the set {2, . . . , n}) has for input Bs [i, 2] for all i ∈ [m] and all s ∈ [k]. The goal is for Alice to output Cs [1, 2] for all s ∈ [k]. Note that P Cs [1, 2] is the inner product (over F) of the first row of As and the second column of Bs . Thus ks=1 Cs [1, 2] is the inner product of two vectors of size km. Alice and Bob must exchange Ω(km log |F|) bits to compute this value [8], which requires Ω(km/n) rounds in the original congested clique model. We now prove the lower bound Ω(k) for any m ≥ 1. Let us consider instances of MM(n, m, k, F) of the following form: for each s ∈ [k], all entries of As are zero except the entry As [1, 1] which is one; for each s ∈ [k], Bs [i, j] = 0 for all (i, j) ∈ / {(1, j) | j ∈ {2, . . . , n}} (the other n − 1 entries are arbitrary). Again, let us write Cs = As Bs for each s ∈ [k]. We prove the lower bound by again partitioning the n nodes of the network into the two sets {1} and {2, . . . , n}, and considering the following two-party communication problem. Alice has no input. Bob has for input Bs [1, j] for all j ∈ {2, . . . , n} and all s ∈ [k]. The goal is for Alice to output Cs [1, j] for all j ∈ {2, . . . , n} and all s ∈ [k]. Since the output reveals Bob’s whole input to Alice, Alice must receive Ω(k(n − 1) log |F|) bits, which gives round complexity Ω(k) in the original congested clique model. 3.1 Proof of Theorem 1 Let us first prove the following proposition that deals with the case where m is large. In this case the algorithm is relatively simple. Proposition 2. For any k ≤ n and any m ≥ n2 /k, the deterministic round complexity of MM(n, m, k, F) is O(km/n). Proof. We assume below for convenience that both n/k and km/n are integers. If this is not the case the proof can be adjusted in a straightforward manner by replacing them by ⌈n/k⌉ and ⌈km/n⌉, respectively. For each s ∈ [k], we will write Cs = As Bs . Let us decompose the matrix As into n/k matrices of size n × km n by partitioning the m columns of As into n/k consecutive blocks of size km/n. Let (1) (n/k) us call these smaller matrices As , . . . , As . Similarly, for each s ∈ [k] we decompose the matrix km Bs into n/k matrices of size n × n by partitioning the m rows of Bs into n/k consecutive blocks (1) (n/k) of size km/n. Let us call these smaller matrices Bs , . . . , Bs (t) (t) (t) Cs = As Bs . For each s ∈ [k], and each i, j ∈ [n] the equation Cs [i, j] = n/k X Cs(t) [i, j] . For each t ∈ [n/k] we write (2) t=1 obviously holds. Our distributed algorithm is based on this simple observation. Each node of the network will be assigned, besides its original label ℓ ∈ [n], a second label (s, t) ∈ [k] × [n/k]. The assignment of these labels is arbitrary, the only condition being that distinct nodes are assigned distinct labels. The distributed algorithm is as follows. 9 (t) (t) 1. Node (s, t) ∈ [k] × [n/k] receives the whole two matrices As and Bs from the nodes of the (t) networks owning the entries of these two matrices, and then locally computes Cs . (t) (t) 2. Node ℓ ∈ [n] receives Cs [ℓ, ∗] and Cs [∗, ℓ] for all s ∈ [k] and all t ∈ [n/k] from the nodes of the network owning these entries, and then locally computes Cs [ℓ, ∗] and Cs [∗, ℓ] using Equation (2) for all s ∈ [k]. The number of field elements received per node is 2km at Step 1 and 2n2 at Step 2. The total number of field elements received per node is thus O(km + n2 ), which gives round complexity O(km/n) when km ≥ n2 from Lemma 1. The main technical contribution is the following proposition. √ Proposition 3. For any k and m such that k ≤ n and kn ≤ m < n2 /k, the deterministic round complexity of MM(n, m, k, F) is O(k2/ω(γ) n1−2/ω(γ) ),  log k  log m log k where γ is the solution of the equation 1 − log n γ = 1 − log n + log n − 1 ω(γ). Proof. For convenience, let us assume that n/k is an integer (otherwise we replace this value by the nearest integer). Let γ ≥ 0 be a value that will be set later. Let d be the largest integer such that the product of a d × ⌈dγ ⌉ matrix by a ⌈dγ ⌉ × d matrix can be computed by an algebraic algorithm (as in Section 2) of rank n/k. Note that   d = Θ (n/k)1/ω(γ) from the definition of√the exponent of matrix multiplication. For convenience, we assume below p that n/d, n/k and kn/d are also integers (otherwise we can again simply replace these values by the nearest integer). Define the quantity   m m r= p =Θ . (n/k)γ/ω(γ)+1/2 dγ n/k Our choice of γ (discussed later) will guarantee that m ≥ (n/k)γ/ω(γ)+1/2 , which implies r = Ω(1). We will thus assume below, for convenience but without affecting the analysis of the complexity of the algorithm, that r and dγ are integers such that r ≥ 1 and dγ ≤ m, and that m/dγ is an integer as well. For each s ∈ [k], we write the entries of As and Bs as As [ix, jz] and Bs [jz, ix], respectively, where i ∈ [d], j ∈ [dγ ], x ∈ [n/d] and z ∈ [m/dγ ]. More precisely, this notation corresponds to decomposing each row of As and each column of Bs into d consecutive blocks of n/d entries, and decomposing each column of As and each row of Bs into dγ consecutive blocks of m/dγ entries. Note that this corresponds to decomposing As into an d×dγ matrix where each entry is a submatrix of As of size (n/d) × (m/dγ ), and decomposing Bs into an dγ × d matrix where each entry is a submatrix of Bs of size (m/dγ ) × (n/d). We will write As [i∗, j∗] and Bs [j∗, i∗] to represent these submatrices. Similarly, we write the elements of the output matrix Cs = As Bs as Cs [ix, jy], where i, j ∈ [d] and x, y ∈ [n/d]. By extending the formulation given in Section 2 to block matrices (and using the same notations), for any s ∈ [k], any i, j ∈ [d] and any x, y ∈ [n/d] we can write Cs [ix, jy] = n/k X µ=1 10 λijµ Ss(µ) Ts(µ) , (3) (µ) where, for each µ ∈ [n], Ss is an (n/d)×(m/dγ ) matrix that can be written as a linear combination (µ) of the submatrices of As , and Ts is an (m/dγ ) × (n/d) matrix that can be written as a linear combination of the submatrices of Bs : γ Ss(µ) = d X d X αijµ As [i∗, j∗] (4) βijµ Bs [j∗, i∗]. (5) i=1 j=1 γ Ts(µ) = d X d X i=1 j=1 Finally, we will also decompose each label x, y and z into two parts: p √ • we write x = wx′ where w ∈ [ n/k] and x′ ∈ [ kn/d], √ p • we write y = wy ′ where w ∈ [ n/k] and y ′ ∈ [ kn/d], p • we write z = wz ′ where w ∈ [ n/k] and z ′ ∈ [r]. p p This corresponds to further decomposing each submatrix of As into an n/k × n/k matrix where √ each entry submatrix of As of size ( kn/d) × r, and decomposing each submatrix p √ of Bs p is a smaller into an n/k × n/k matrix where each entry is a smaller submatrix of Bs of size r × ( kn/d). Each node of the network has a label (i, x) ∈ [d] × [n/d], and receives as input As [ix, ∗] and Bp [∗, ix] forpall s ∈ [k]. We assign two additional labels to each node: one label (s, u, v) ∈ [k] × s [ n/k] × [ n/k] and one label (s, µ) ∈ [k] × [n/k]. The assignment of these labels is arbitrary, the only condition being that distinct nodes are assigned distinct labels. The algorithm is given in Figure 2. The number of field elements received per node at Step 1 is √ m kn γ × p = 2km. 2×d×d × γ d d n/k The number of field elements received per node at Step 2 is   m n (6) 2 × × γ = O k(1+γ)/ω(γ) mn1−(1+γ)/ω(γ) . d d The number of field elements received per node at Step 3 is √ √   n kn kn (7) × × = O k2/ω(γ) n2−2/ω(γ) . k d d The number of field elements received per node at Step 4 is 2kn. Note that Expression (6) is larger than 2km since ω(γ) ≥ 1+ γ and k ≤ n. Moreover, Expression (7) is larger than 2kn since ω(γ) ≥ 2 and k ≤ n. Thus the total number of field elements received per node is   O k(1+γ)/ω(γ) mn1−(1+γ)/ω(γ) + k2/ω(γ) n2−2/ω(γ) . Let us write a = log k/ log n and b = log m/ log n and define the two functions a(1 + γ) 1+γ +b+1− , ω(γ) ω(γ) 2a 2 g(γ) = +2− , ω(γ) ω(γ) f (γ) = 11 p p 1. Node (s, u, v) ∈ [k] × [ n/k] × [ n/k] receives As [iux′ , jvz ′ ] and Bs [juz ′ , ivy√′ ] from the nodes of the network owning these entries, for all i ∈ [d], j ∈ [dγ ], x′ , y ′ ∈ [ kn/d] (µ) and z ′ ∈ [r]. Node (s, u, v) then locally computes Ss [ux′ , vz ′ ] using Equation (4) √ (µ) and Ts [uz ′ , vy ′ ] using Equation (5) for all µ ∈ [n/k], all x′ , y ′ ∈ [ kn/d] and all z ′ ∈ [r]. (µ) (µ) 2. Node (s, µ) ∈ [k] × [n/k] receives the whole matrices Ss and Ts from the nodes of the network owning the entries of these matrices, and locally computes the product (µ) (µ) (µ) Ps = Ss Ts . p p (µ) 3. Node (s, u, v) ∈ [k] × [ n/k] × [ n/k] receives Ps [ux′ , vy ′ ] from√the nodes of the network owning these entries, for all µ ∈ [n/k] and all x′ , y ′ ∈ [ kn/d]. Node ′ ′ (s, u, v) then √ locally computes Cs [iux , jvy ] using Equation (3) for all i, j ∈ [d] and ′ ′ all x , y ∈ [ kn/d]. 4. Node (i, x) ∈ [d] × [n/d] receives Cs [ix, ∗] and Cs [∗, ix] for all s ∈ [k] from the nodes of the network owning these entries. Figure 2: Distributed algorithm for MM(n, m, k, F) in the congested clique model. Initially each node (i, x) ∈ [d] × [n/d] has as input As [ix, ∗] and Bs [∗, ix] for all s ∈ [k]. for any γ ≥ 0. The function f is a decreasing function of γ, with value a/2 + b + 1/2 when γ = 0 and with limit a + b when γ goes to infinity. The function g is an increasing function of γ, with value a + 1 when √ γ = 0 and with limit 2 when γ goes to infinity. Let us choose γ as follows. Since we assumed kn ≤ m < n2 /k, the equation f (γ) = g(γ) necessarily has a solution. We choose γ as this solution, i.e., such that (1 − a) γ = 1 − a + (b − 1) ω(γ). (8) Observe that such a choice for γ implies that m ≥ (n/k)γ/ω(γ)+1/2 as we required: Equation (8) can be rewritten as (1 − a)γ 1−a b =1+ − , ω(γ) ω(γ) which implies b ≥ (1 − a)  1 γ + ω(γ) 2  since ω(γ) ≥ 2. For our choice of γ, the total number of field elements received per node is thus O(k2/ω(γ) n2−2/ω(γ) ), which gives round complexity O(k2/ω(γ) n1−2/ω(γ) ), as claimed, from Lemma 1. The proof of Theorem 1 now follows easily from Propositions 2 and 3. √ Proof of Theorem 1. Consider first the case k ≤ n. When kn ≤ m ≤ n2 /k, we use the algorithm √ of Proposition 3. When m ≥ n2 /k, we use the algorithm of Proposition 2. When 0 ≤ m ≤ kn the 12 claimed √ upper bound O(k) on the round complexity can be derived from Proposition 2 by taking m = kn (i.e., by appending rows and columns with zero entries to the input matrices) and γ = 0. For the case k ≥ n we can simply repeat ⌈k/n⌉ times an algorithm for MM(n, m, n, F), which gives round complexity  O(k) if 1 ≤ m ≤ n, O(km/n) if m ≥ n. from the analysis of the previous paragraph. 3.2 Application to the distance product One of the main applications of Theorem 1 is the following result, which will be the key ingredient for all our results on the all-pairs shortest paths and diameter computation discussed in Section 6. Theorem 7. For any M ≤ n and m ≤ n, the deterministic round complexity of DIST(n, m, M ) is  √ if 0 ≤ m ≤ M n log m,  O(M log m)  √ M n log m ≤ m ≤ n2 /(M log m), O (M log m)2/ω(γ) n1−2/ω(γ) if  O (mM log m/n) if n2 /(M log m) ≤ m ≤ n,     M log m log M where γ is the solution of the equation 1 − log + − 1 ω(γ). γ = 1 − log n log n log n Let us first give a brief overview of the proof of Theorem 7. The idea is to show that DIST(n, m, M ) reduces to MM(n, m, k, F) for k ≈ M log m and a well-chosen finite field F, and then use Theorem 1 to get a factor (M log m)2/ω(γ) , instead of the factor M obtained in a straightforward implementation of the distance product, in the complexity. This reduction is done by first applying a standard encoding of the distance product into a usual matrix product of matrices with integer entries of absolute value exp(M ), and then using Fourier transforms to split this latter matrix product into roughly M log m independent matrix products over a small field. Proof of Theorem 7. We show below that DIST(n, m, M ) reduces to MM(n, m, k, F) where k = O(M log m) and |F| = poly(M, log m). The result then follows from Theorem 1. Let N be any positive integer. We first show how to reduce the multiplication or the addition of two nonnegative N -bit integers a and b to 2N independent operations (multiplications or additions, respectively) in a large enough field, using the Fourier transform. Let F be a finite field with characteristic at least N + 1. Let ΦN : {0, 1, . . . , 2N −1 } → F[x]/(x2N − 1) PN −1 i be the map that maps each N -bit integer c = i=0 ci 2 , with each ci in {0, 1}, to the polynomial PN −1 i i=0 ci x . Computing the product ab ∈ Z (resp. the sum a + b ∈ Z) reduces to computing the product ΦN (a)ΦNP (b) (resp. the sum ΦN (a) + ΦN (b)) over F[x]/(x2N − 1). Indeed, P2N −1if ΦiN (a)ΦN (b) 2N −1 is the polynomial i=0 ci xi , with each ci in F, then ab is equal to the sum i=0 ci 2 computed over the integers (note that the assumption on the characteristic of F is crucial here), and similarly for the addition. The computation of ΦN (a)ΦN (b) and ΦN (a) + ΦN (b) can be done using the identities ΦN (a)ΦN (b) = DF T −1 (DF T (ΦN (a)) · DF T (ΦN (b))), ΦN (a) + ΦN (b) = DF T −1 (DF T (ΦN (a)) + DF T (ΦN (b))), 13 (9) (10) where DF T : F[x]/(x2N − 1) → F2N is the Fourier transform and where · and the second + represent the coordinate-wise multiplication and addition in F2N , respectively (we refer to [4] for a detailed presentation of this Fourier transform). In order for the Fourier transform to be defined we nevertheless need to choose the field F such that it contains a 2N -th primitive root of unity. It is known (see, e.g., [11]) that for any prime p such that 2N divides p − 1 the finite field F = Zp contains such a prime root. It is also known ([28, 29], see also [11]) that the least prime p such that ′ 2N divides p − 1 is smaller than d(2N )d for some absolute constants d and d′ . By choosing such a prime p, we obtain a reduction from the computation of ab (resp. a + b) to one coordinate-wise multiplication (resp. addition) in F2N where |F| = poly(N ). Note that we do not need to discuss the costs of finding p and the cost of preprocessing/postprocessing operations (such as applying the Fourier transform and its inverse), since they will have no impact on the round complexity of the algorithm we design below. Pm Let us now consider the task of computing the integer t=1 at bt given non-negative N -bit integers a1 , .P . . , am , b1 , . . . , bm . Similarly to what we just did, this sum can be recovered from the polynomial m t=1 ΦN (at )ΦN (bt ), which can be obtained by computing the 2N -dimentional vector m X t=1 DF T (ΦN (at )) · DF T (ΦN (bt )) (11) over a finite field F of order polynomial in N and m, and then applying the inverse Fourier transform. We can now describe our reduction. Let A, B be the matrices with entries in {−M, . . . , M }∪{∞} of which we want to compute the distance product. We first reduce this distance product to one usual product of matrices with large entries, using standard techniques [2, 42, 47]. Consider the n × m matrix A′ by the m × n matrix B ′ defined as:   (m + 1)M −A[i,j] if A[i, j] 6= ∞, (m + 1)M −B[j,i] if B[j, i] 6= ∞, ′ ′ A [i, j] = B [j, i] = 0 if A[i, j] = ∞, 0 if B[j, i] = ∞, for all (i, j) ∈ [n] × [m]. It is easy to check (see [47] for a proof) that the entry A ∗ B[i, j] can be  ′ ′ recovered easily from entry A B [i, j], for each (i, j) ∈ [n] × [m]. Let N = log2 ((m + 1)2M + 1) be the number of bits needed to represent the entries of A′ and B ′ , and F be a finite field as in the previous paragraph. Next, in order to compute A′ B ′ we use the following strategy. For each (i, j) ∈ [n] × [m], consider the two vectors DF T (ΦN (A′ [i, j])) ∈ F2N and DF T (ΦN (B ′ [j, i])) ∈ F2N . For convenience write them as ~ pij = (pij [1], . . . , pij [2N ]) and ~qji = (qji [1], . . . , qji [2N ]), respectively. Now, for any s ∈ [2N ], define the matrix A′s ∈ Fn×m and the matrix Bs′ ∈ Fm×n such that A′s [i, j] = pij [s] and Bs [j, i] = qji [s] for all (i, j) ∈ [n] × [m]. It follows from the discussion of the previous paragraph (and in particular Equation (11)) that for each (i, j) ∈ [n] × [n] the entry ′ [i, j]. Since all preprocessing A′ B ′ [i, j] can be recovered from the entries A′1 B1′ [i, j], . . . , A′2N B2N and postprocessing steps of this strategy can be performed locally by the nodes of the network in the congested clique model, this reduces the computation of A′ B ′ to solving one instance of MM(n, m, 2N, F), with 2N = O(M log m) and |F| = poly(M, m), as claimed. 4 Deterministic Computation of Determinant and Inverse Matrix In this section we present deterministic algorithms for computing the determinant of a matrix and the inverse of a matrix in the congested clique model, and prove Theorem 2. Our algorithms can 14 be seen as efficient implementations of the parallel algorithm by Prerarata and Sarwate [37] based on the Faddeev-Leverrier method. Let A be an n × n matrix over a field F. Let det(λI − A) = λn + c1 λn−1 + · · · + cn−1 λ + cn be its characteristic polynomial. The determinant of A is (−1)n cn and, if cn 6= 0, its inverse is A−1 = − An−1 + c1 An−2 + · · · + cn−2 A + cn−1 I . cn Define the vector ~c = (c1 , . . . , cn )T ∈ Fn×1 . For any k ∈ [n] let sk denote the trace of the matrix Ak , and define the vector ~s = (s1 , . . . , sn )T ∈ Fn×1 . Define the n × n matrix   1  s1  2    s2  s 3 1 S= .  ..  .. .. ..  .  . . . sn−1 sn−2 sn−3 ... s1 n It can be easily shown (see, e.g., [9, 37]) that S~c = −~s, which enables us to recover ~c from ~s if S is invertible. The matrix S is invertible whenever n! 6= 0, which is true in any field of characteristic zero or in any finite field of characteristic strictly larger than n. The following proposition shows that the inverse of an invertible triangular matrix can be computed efficiently in the congested clique model. Proposition 4. Let F be any field. The deterministic round complexity of INV(n, F), when the input A is an invertible lower triangular matrix, is O(n1−2/ω ). Proof. We adapt the standard sequential algorithm for triangular matrix inversion [1, 3]. Let A be an invertible lower triangular n × n matrix with entries in F. Assume without loss of generality that n is a power of two. Let us decompose A in four blocks of size n/2 × n/2:   A11 0 A= . A21 A22 Observe that both A11 and A22 are invertible lower triangular matrices, and   A−1 0 −1 11 A = . −1 A−1 −A−1 22 A21 A11 22 Inverting A thus reduces to inverting two invertible lower triangular matrices of size n/2 × n/2 and performing two matrix multiplications. We implement this algorithm recursively (and in parallel) in the congested clique model as follows. The n nodes are partitioned into two groups of size of n/2: the first group consisting of nodes 1, . . . , n/2 and the second group consisting of nodes n/2+1, . . . , n. The first group recursively computes A−1 11 and the second group recursively computes −1 A−1 . The important point here is that the computation of A−1 22 11 and the computation of A22 can be done independently (i.e., in parallel). The nodes of the second group then in two rounds (using Lemma 1) distribute appropriately the rows of A−1 22 to the nodes of the first group (who own the −1 −1 columns of A21 ), so that the nodes of the first group can compute A−1 22 A21 and then −A22 A21 A11 . −1 The nodes of the first group finally distribute appropriately the rows of −A−1 22 A21 A11 to the nodes of the second group, in two rounds from Lemma 1. 15 Let RI (n) denote the round complexity of our problem (computing the inverse of an invertible lower triangular n×n matrix using n nodes), and RM (n) denote the round complexity of computing the product of two n × n matrices using n nodes (i.e., the problem MM(n, n, 1, F)). The recurrence relation we obtain is  RI (1) = 0, RI (n) ≤ RI (n/2) + 2RM (n/2) + 4 for n ≥ 2, which gives RI (n) = O(n1−2/ω ) since RM (n) = O(n1−2/ω ) from Theorem 1. We are now ready to give the proof of Theorem 2. √ Proof of Theorem 2. For convenience we assume that n is a square, and write p = n. If n √ is not a square we can easily adapt the proof by taking p = ⌈ n⌉. Observe that any integer a ∈ {0, 1, . . . , n − 1} can be written in a unique way as a = (a1 − 1)p + (a2 − 1) with a1 , a2 ∈ [p]. Below when we write a = (a1 , a2 ) ∈ [n], we mean that a1 and a2 are the two elements in [p] such that a = (a1 − 1)p + (a2 − 1). For any ℓ ∈ [n], let Rℓ be the p × n matrix such that the i-th row of Rℓ is the ℓ-th row of A(i−1)p , for each i ∈ [p]. Similarly, for any ℓ ∈ [n], let Cℓ be the n × p matrix such that the j-th column of Cℓ is the ℓ-th column of Aj−1 , for each j ∈ [p]. For each ℓ ∈ [n] define Uℓ = Rℓ Cℓ , which is a p × p matrix. Observe that, for any k = (k1 , k2 ) ∈ [n], the identity sk = n X Uℓ [k1 , k2 ] (12) ℓ=1 holds. We will use this expression, together with the equation ~c = −S −1~s to compute the determinant in the congested clique model. In order to compute the inverse of A we then use the following approach. For any (a1 , a2 ) ∈ [p] × [p], define the coefficient ca1 ,a2 ∈ F as follows:  cn−1−(a1 −1)p−(a2 −1) if (a1 , a2 ) 6= (p, p), ca1 ,a2 = 1 if (a1 , a2 ) = (p, p). For any a2 ∈ [p], define the n × n matrix Ea2 as follows: Ea2 = p X ca1 ,a2 A(a1 −1)p . a1 =1 Note that the following holds whenever cn 6= 0: Pp Pp Pp Pn−1 (a1 −1)p+(a2 −1) a Ea2 Aa2 −1 a2 =1 ca2 ,a1 A a1 =1 −1 a=0 cn−1−a A =− = − a2 =1 . A =− cn cn cn (13) The algorithm for DET(n, F) and INV(n, F) is described in Figure 3. Steps 1 and 7.2 can be implemented in O(p2/ω n1−2/ω ) rounds from Theorem 1 (or its simplified version in the introduction). Step 5 can be implemented in O(n1−2/ω ) rounds, again from Theorem 1. At Steps 2, 3 and 6 each node receives n elements from the field F, so each of these three steps can be implemented in two rounds from Lemma 1. The other steps (Steps 4, 7.1 and 7.3) do not require any  communication. The total round complexity of the algorithm is thus O p2/ω n1−2/ω = O n1−1/ω , as claimed. 16 1. The matrices A(a1 −1)p and Aa2 −1 are computed for all a1 , a2 ∈ [p] using the distributed algorithm of Theorem 1. At the end of this step node ℓ ∈ [n] has the whole p × n matrix Rℓ and the whole n × p matrix Cℓ . 2. Node ℓ ∈ [n] locally computes Uℓ , and sends Uℓ [k1 , k2 ] to each node k = (k1 , k2 ) ∈ [n]. 3. Node k = (k1 , k2 ) ∈ [n], who received Uℓ [k1 , k2 ] for all ℓ ∈ [n] at the previous step, locally computes sk using Equation (12). Node k then sends sk to all the nodes. 4. Node ℓ ∈ [n], who received ~s at Step 3, locally constructs S[ℓ, ∗] and S[∗, ℓ]. 5. The matrix S −1 is computed using the algorithm of Proposition 4. At the end of this step, node ℓ ∈ [n] has S −1 [ℓ, ∗] and S −1 [∗, ℓ]. 6. Node ℓ ∈ [n] locally computes cℓ from S −1 [ℓ, ∗] and ~s, and sends cℓ to all nodes. 7. The determinant of A is (−1)n cn . If cn = 0 the matrix A is not invertible. Otherwise the nodes compute A−1 as follows: 7.1 Node ℓ ∈ [n] computes Ea2 [ℓ, ∗] for each a2 ∈ [p] (this can be done locally since ~c and each row A(a1 −1)p [ℓ, ∗] are known from Steps 6 and 1, respectively). 7.2 The matrices Ea2 Aa2 −1 are computed for all a2 ∈ [p] using the distributed algorithm of Theorem 1 (since, besides Ea2 [ℓ, ∗] obtained at the previous step, each node ℓ ∈ [n] knows Aa2 −1 [∗, ℓ] from the result of the computation of Step 1). At the end of this step, node ℓ ∈ [n] has the ℓ-th row and the ℓ-th column of the matrix Ea2 Aa2 −1 for all a2 ∈ [p]. 7.3 Node ℓ ∈ [n] computes locally A−1 [ℓ, ∗] and A−1 [∗, ℓ] using Equation (13). Figure 3: Distributed algorithm for computing the determinant of an n × n matrix A and computing A−1 if det(A) 6= 0. Initially each node ℓ ∈ [n] has as input A[ℓ, ∗] and A[∗, ℓ]. 5 Randomized Algorithms for Algebraic Problems In this section we present O(n1−2/ω )-round randomized algorithms for computing the determinant, the rank and for solving linear systems of equations in the congested clique model, and prove Theorem 3. Our approach is based on Wiedemann’s method [44] and its parallel implementations [21, 22, 23]. Let A be an n × n matrix over F. The minimal polynomial of A, which we denote minpol(A), is the monic polynomial g over F of least degree such that g(A) = 0. Let v ∈ Fn×1 and w ∈ F1×n be any vectors. Consider the sequence wA0 v, wAv, wA2 v, . . . , wAn−1 v consisting of n elements of F. This sequence is linearly generated over F, and thus also admits a polynomial called the generating polynomial of the sequence, which we denote minpol(A, v, w). We refer to [16] for the precise definition of the generating polynomial of such a linearly generated sequence and a description of efficient algorithms to compute it — in this paper we will just need to know that such a polynomial exists. Wiedemann [44] showed that with high probability minpol(A, v, w) = minpol(A) when v and w are chosen at random. We use the following characterization of this property proved by Kaltofen and Pan [22]. 17 Lemma 2. ([22]) Let A be any n × n matrix over F. Let v ∈ Fn×1 and w ∈ F1×n be two vectors in which each coordinate is chosen uniformly at random from F. Then   2n . Pr minpol(A) = minpol(A, v, w) ≥ 1 − |F| In general the minimal polynomial of a matrix A is not equal to its characteristic polynomial charpol(A). Wiedemann [44] nevertheless showed that the characteristic polynomial can be obtained from the minimal polynomial by preconditioning the matrix. Since it will be more convenient for our purpose to apply a diagonal preconditioner, we will use the following version shown by Chen et al. [6]. Lemma 3. ([6]) Let A be any n × n matrix over F. Let D be an n × n diagonal matrix where each diagonal entry is chosen uniformly at random from F \ {0}. Then   n(n − 1) . Pr charpol(DA) = minpol(DA) ≥ 1 − 2(|F| − 1) Kaltofen and Saunders [23] showed that the rank of a matrix can be obtained, with high probability, from the degree of the minimal polynomial by using another preconditioning of the matrix. The following lemma follows from the combination of Theorem 1 and Lemma 2 in [23]. Lemma 4. ([23]) Let A be any n × n  1 u2 u3 · · ·  1 u2 · · ·   .. . U = 1   . ..  matrix over F such that rank(A) < n. Let   un 1 un−1   v2 1   ..   v3 v2 1 .  , V =   .. .  .. ...  . u2  vn vn−1 · · · v2 1 1        be two n × n unit (upper and lower, respectively) triangular random Toepliz matrices. Let D be an n × n diagonal matrix where each diagonal entry is chosen uniformly at random from F. Then   n(3n + 1) . Pr rank(A) = deg(minpol(U AV D)) − 1 ≥ 1 − 2|F| We are now ready to prove Theorem 3. Proof of Theorem 3. We first show how to compute efficiently, in the congested clique model, the sequence Ã0 u, Ãu, Ã2 u, . . .,Ãn−1 u given an arbitrary matrix à ∈ Fn×n and an arbitrary vector u ∈ Fn×1 . For convenience assume that n is a power of two (otherwise we can simply add zero rows and columns to à and zero entries to u), and write n = 2k for some positive integer k. For each i ∈ {0, . . . , k}, define the n × n matrix i M (i) = [u|Ãu| · · · |Ã2 −1 u|0| · · · |0], i −1 obtained by concatenating the vectors u, . . . , Ã2 each i ∈ {0, . . . , k − 1}, define the n × n matrix u and then adding 2k − 2i zero columns. For i N (i) = [0| · · · |0|u|Ãu| · · · |Ã2 −1 u|0| · · · |0], 18 i obtained by concatenating the vectors u, . . . , Ã2 −1 u, adding 2i zero columns on the left and 2k −2i+1 zero columns on the right. Observe that, for any i ∈ {0, . . . , k − 1}, the equality i M (i+1) = M (i) + Ã2 N (i) i−1 i holds. Moreover, for any i ∈ {1, . . . , k − 1}, the matrix Ã2 can be obtained by multiplying Ã2 by itself. This enables us to compute the n vectors Ã0 u, Ãu, Ã2 u, . . . , Ãn−1 u using only 2k − 1 matrix multiplications. We describe in Figure 4 the implementation of this approach in the congested clique model, which uses O(kn1−2/ω ) = O(n1−2/ω log n) rounds. input: node ℓ ∈ [n] has Ã[ℓ, ∗], Ã[∗, ℓ] and u output: node ℓ ∈ [n] has M (k) [∗, ℓ] = Ãℓ−1 u 1. M (0) ← [u|0| · · · |0] (Node ℓ ∈ [n] locally constructs M (0) [ℓ, ∗] and M (0) [∗, ℓ]) 2. N (0) ← [0|u|0| · · · |0] (Node ℓ ∈ [n] locally constructs N (0) [ℓ, ∗] and N (0) [∗, ℓ]) 3. For i from 0 to k − 1 the nodes do: i 3.1 The nodes compute Ã2 N (i) using the algorithm of Theorem 1: after the computai i tion node ℓ ∈ [n] has Ã2 N (i) [ℓ, ∗] and Ã2 N (i) [∗, ℓ]. 3.2 The nodes locally compute M (i+1) : node ℓ ∈ [n] computes M (i+1) [ℓ, ∗] = M (i) [ℓ, ∗]+ i i Ã2 N (i) [ℓ, ∗] and M (i) [∗, ℓ] = M (i) [∗, ℓ] + Ã2 N (i) [∗, ℓ]. i+1 3.3 If i 6= k − 1 the nodes compute Ã2 i i = Ã2 Ã2 using the algorithm of Theorem 1. Figure 4: Distributed randomized algorithm for computing the sequence Ã0 u, Ãu, Ã2 u, . . . , Ãn−1 u given a matrix à ∈ Fn×n and a vector u ∈ Fn×1 . Here n is a power of two, written n = 2k . We now describe a O(n1−2/ω log n)-round algorithm in the congested clique model that computes, with high probability, the minimal polynomial minpol(A) of an arbitrary matrix A ∈ Fn×n . More precisely, the matrix A is initially distributed among the n nodes of the network (node ℓ ∈ [n] receives as input A[ℓ, ∗] and A[∗, ℓ]) and at the end of the computation we would like a designated node of the network (say, node 1) to have the polynomial minpol(A). The algorithm is as follows. First, a designated node (say, node 1 again) takes two random vectors v, w as in Lemma 2. This node then sends v, w to all the nodes of the network in four rounds of communication using the scheme of Lemma 1. Then the nodes of the network apply the algorithm of Figure 4 with à = A and u = v. After this, each node ℓ ∈ [n] owns Aℓ−1 v, and can then compute locally the field element wAℓ−1 v. All nodes then sends their result to node 1 using one round of communication. Node 1 finally computes locally the polynomial minpol(A, v, w). The complexity of this algorithm is clearly O(n1−2/ω log n) rounds. The correctness follows from Lemma 2, which guarantees that minpol(A) = minpol(A, v, w) with probability at least 1 − 2n/|F|. Our O(n1−2/ω log n)-round algorithm for INV(n, F) (i.e., for solving the linear system Ax = b where A is invertible) in the congested clique model is as follows. The nodes of the network first use the algorithm of the previous paragraph, so that node 1 obtains with high probability minpol(A). Let us write minpol(A) as m0 + m1 λ + · · · + mn λn , with mn = 1. From the definition of the 19 minimal polynomial, we have x= m1 b + m2 Ab + · · · + mn An−1 b . −m0 (14) Node 1 then sends the two field elements m0 and mℓ to node ℓ, for each ℓ ∈ {1, . . . , n}, in two rounds. The nodes of the network use the O(n1−2/ω log n)-round algorithm of Figure 4 with u = b and à = A, so that each node ℓ ∈ [n] owns Aℓ−1 b at the end of the computation. Each node ℓ ∈ [n] mℓ ℓ−1 then locally computes − m A b, and sends the ℓ′ -th coordinate of this vector to node ℓ′ , for each 0 ℓ′ ∈ [n]. This can be done in two rounds. Node ℓ ∈ [n] then adds the n elements he receives, which gives x[ℓ] from Equation (14). We now describe our O(n1−2/ω log n)-algorithm for DET(n, F). First, a designated node (say, node 1) takes a random diagonal matrix D as in Lemma 3. This node then sends D to all the nodes of the network using two rounds of communication (using the scheme of Lemma 1). Each node ℓ ∈ [n] of the network then constructs DA[ℓ, ∗] and DA[∗, ℓ]. The nodes of the network then apply the above algorithm computing the minimal polynomial, so that Node 1 obtains with high probability minpol(DA). Let m0 denote the constant term of minpol(DA). Note that the determinant of DA is (−1)n m0 , from Lemma 3, and thus the determinant of A is (−1)n m0 Qn . i=1 D[i, i] Node 1 sends this value all the nodes of the network in one round of communication. Finally, we present our algorithm for Rank(n, F). First, we can check with high probability whether rank(A) = n by computing det(A) using the algorithm described in the previous paragraph. Therefore we assume below that rank(A) < n, and compute the rank as follows. A designated node (say, node 1) takes three random matrices U, V, D as in Lemma 4, and sends the three matrices to all the nodes of the network in six rounds using the scheme of Lemma 1 (note that each matrix is described by at most n coefficients). The nodes of the network then apply the O(n1−2/ω )-round algorithm of Theorem 1 three times to compute U AV D. They then use the O(n1−2/ω log n)-round algorithm computing the minimal polynomial, so that Node 1 obtains minpol(U AV D). Node 1 locally computes deg(minpol(U AV D)) − 1 and sends this value to all the nodes of the network in one round. The correctness of this algorithm is guaranteed by Lemma 4. 6 Applications to Graph-Theoretic Problems In this section we consider applications of our results to graph-theoretic problems in the congested clique model. 6.1 The All Pair Shortest Paths problem The All-Pairs Shortest Paths problem (APSP) asks, given a weighted graph G = (V, E), to compute the shortest path between u and v for all pairs of vertices (u, v) ∈ V ×V . For simplicity, but without significant loss of generality, we will assume that the weights are O(log n)-bit integers. When the graph G is undirected, the definition of the APSP requires the weights to be nonnegative (otherwise there would be negative cycles). When the graph G is directed negative weights are allowed but it is implicitly required that the graph has no non-negative cycle. We say that the graph is unweighted 20 if the only allowed weight is one. In this subsection the term “adjacency matrix of G” refers to the |V | × |V | matrix in which the entry in the i-th row and j-th column is the weight of the edge from the i-th node to the j-th node of the graph if these two nodes are connected and ∞ otherwise. Let us first describe very briefly the main results concerning the complexity of the APSP in the centralized setting. For undirected unweighted graphs, Seidel [40] showed that the APSP reduces to computing the powers of the adjacency matrix (seen as a matrix over the integers) of the graph, and can thus be solved in Õ(nω ) time. For all other cases, including directed graphs and undirected graphs with arbitrary weights, the standard algebraic way of solving the APSP is to compute the powers of the distance product of the adjacency matrix of the graph. This distance product of an n × m matrix A by an m × n matrix B can be trivially solved in time O(smn2 ), where s denotes the number of bits needed to represent each entry of A and B, which gives a Õ(n3 )-time algorithm for the APSP. Despite much research (including recent exciting developments [45]), no significantly better algorithm is known for computing the distance product or solving the general APSP. Faster algorithms for computing the distance product can be nevertheless designed when the entries of A and B are small integers, i.e., the entries are in {−M, . . . , −1, 0, 1, . . . , M } ∪ {∞} for some integer M . As already mentioned in the proof of Theorem 7, Alon et al. [2] and Takaoka [42] (for the square case) and then Zwick [47] (for the rectangular case) showed that C can be recovered easily from the standard matrix product of the n × m matrix A′ by the m × n matrix B ′ where   (m + 1)M −A[i,j] if A[i, j] 6= ∞, (m + 1)M −B[j,i] if B[j, i] 6= ∞, A′ [i, j] = B ′ [j, i] = 0 if A[i, j] = ∞, 0 if B[j, i] = ∞, for all (i, j) ∈ [n] × [m]. This implies in particular that the distance product can be computed in Õ(M nω(log m/ log n) ) time, and in particular in Õ(M nω ) time when m = n. Shoshan and Zwick [41] used this technique (for the square case) to obtain a Õ(M nω )-time algorithm for the APSP in undirected graphs with weights in {0, . . . , M }. Zwick used this technique (for the rectangular case) to construct an algorithm for the directed case. He obtained in particular time complexity O(n2.58 ), which has been improved to O(n2.54 ) using the best known upper bound on the exponent of rectangular matrix multiplication [24], when M is constant (and in particular for directed unweighted graphs). Censor-Hillel et al. [5] showed how to adapt Seidel’s method [40] to solve the APSP over undirected unweighted graphs in Õ(n1−2/ω ) rounds. They also observed that the centralized matrix algorithms for the distance product discussed above can be implemented in the congested clique model, solving DIST(n, n, M ) in O(min{n1/3 log n, M n1−2/ω }) rounds. While not explicitly stated in [5], this result gives a O(M n1−2/ω )-round algorithm for the APSP in undirected graphs with weights in {0, 1, . . . , M }, by observing that the reduction given in [41] from such instances of APSP to the computation of the distance product can be implemented efficiently in the congested clique model. Our improved upper bound (Theorem 4 stated in the introduction) follows directly from our improved algorithm for the computation of the distance product in the congested clique model (Theorem 7). We now consider the APSP in directed graphs with small integer weights and prove Theorem 5. Besides the new bounds of Theorem 7, we will also use another upper bound on the round complexity of DIST(n, m, M ), which is better for large values of M . This is the bound obtained from Theorem 1 for the choice ω(ℓ) = 2 + ℓ corresponding to the implementation of the trivial matrix multiplication algorithm (which works over any semiring, see Section 2) in the congested clique model. We state this bound in the following proposition. 21 Proposition 5. The round complexity of DIST(n, m, M ) is  √ O(log M ) if 0 ≤ m ≤ n, √ O(m2/3 n−1/3 log M ) if m ≥ n. We are now ready to prove Theorem 5. Proof of Theorem 5. Let A be the adjacency matrix of the graph G = (V, E). The centralized algorithm by Zwick [47] works as follows. The algorithm performs ⌈log3/2 n⌉ iteration, while maintaining an n × n matrix F initially set to F = A. In the k-th iteration, it sets s = (3/2)k , and takes a set S ⊆ V of O((n log n)/s) vertices chosen uniformly at random from V . The algorithm then construct the submatrix of size |S| × n of F , denoted F [S, ∗], consisting of the rows corresponding to the vertices in S, and the submatrix of size n × |S| of F , denoted F [∗, S], consisting of the columns corresponding to vertices in S. It then puts a cap of sM on the absolute values of the entries of F [S, ∗] and F [∗, S]. The last step of the iteration is to compute the distance product F ′ = F [∗, S] ∗ F [S, ∗] and, for each (i, j) ∈ [n × n], replace the (i, j) entry of F by F ′ [i, j] if F ′ [i, j] < F [i, j]. It can be shown that after the last iteration the entry F [i, j] is the length of the shortest path between the i-th node and the j-th node of the graph, for all (i, j) ∈ [n × n], if the graph has no negative cycle. This centralized algorithm can be implemented easily in the congested clique model. The only part that requires communication between the nodes is the computation of the distance product: at step i the nodes need to compute the distance product of a n × m matrix by a m × n matrix with entries of absolute values bounded by ⌈sM ⌉ with m = O((n log n)/s) and s = (3/2)i . We have two strategies to compute the distance product, the algorithm of Proposition 5 and the algorithm of Theorem 7. Since there are only O(log n) iterations, the total round complexity is o  n (15) Õ min 1 + (n/s)2/3 n−1/3 , s + s2/ω(γ) n1−2/ω(γ) , for the value of s the maximizes this expression, where γ denotes the solution of the equation log(n/s) log s log s  γ = 1 − log 1 − log n n + log n − 1 ω(γ). As in the analysis for the centralized setting given in [47], the left part of (15) is a decreasing function of s, while the right part is an increasing function of s. Using the best known upper bound on ω(γ) from [24] (see also Figure 5), we can upper bound the total round complexity by O(n0.2096 ). Note that the above algorithm only computes the lengths of the shortest paths. As in Zwick’s centralized algorithm, the shortest paths can be constructed by using exactly the same strategy, but constructing a matrix of witnesses whenever a distance product is computed (as described in Section 3 of [47]), which can be done with the same round complexity. While a result similar to Theorem 5 can be obtained when M is not a constant, by using exactly the same algorithm but keeping the value M in Equation (15), in this case it is complicated to express the result of the numerical optimization in a closed form, so we omit this generalization. An interesting open question is whether the algorithm of Theorem 5 can be derandomized. While Zwick showed that this can be done in the centralized setting by introducing the concept of bridging sets, it does not seem that the algorithm proposed in [47] for constructing bridging sets can be implemented efficiently in the congested clique model. 22 n1 Value 1 + (n/s)2/3 n−1/3 Value s + s2/ω(γ) n1−2/ω(γ) n1/3 n0.2095... n0.1572 n0 n0 n0.1856... n1/3 n1/2 Value of s n1 Figure 5: Values of the two parts of Equation (15). 6.2 Diameter computation Since computing the diameter of a graph trivially reduces to the APSP problem, we immediately obtain the following result. Corollary 1. In the congested clique model, the deterministic round complexity of diameter computation in an undirected graph of n vertices with integer weights in {0, . . . , M }, where M is an integer such that M ≤ n, is Õ(M 2/ω n1−2/ω ). The same reduction can be used to obtain a randomized algorithm for computing the diameter of directed graphs with constant integer weights in O(n0.2096 ) rounds, via Theorem 5. This round complexity can nevertheless be improved. In the centralized setting it is known that over directed graphs with integer weights in {−M, . . . , M }, but without cycles of negative weights, the diameter can be computed in O(M nω ) time, i.e., faster than the best known centralized algorithm for the corresponding APSP problem. This is a folklore result based on the reductions to the distance product developed in [41, 47] (see also [10]). A close inspection of this approach shows that it can be implemented efficiently in the congested clique model, and Theorem 7 thus implies that the diameter can be computed in Õ(M 2/ω n1−2/ω ) rounds in direct graphs (without cycles of negative weights) with integer weights in {−M, . . . , M } as well. 6.3 Maximum matchings Let G = (V, E) be a simple graph (i.e., an undirected and unweighted graph with no loops or multiple edges), and write V = {v1 , . . . , vn }. The Tutte matrix of G is the n × n symbolic matrix 23 A such that   xij A[i, j] = −xij  0 if i > j and {vi , vj } ∈ E, if i < j and {vi , vj } ∈ E, otherwise, for any (i, j) ∈ [n] × [n]. Let ν(G) denote the number of edges in a maximum matching of G. Lovász [31] showed that rank(A) = 2ν(G). Rabin and Vazirani [38] observed that this equality remains true over any field. As mentioned in [38], this gives a simple randomized algorithm for computing rank(A), and thus ν(G), based on Schwartz-Zippel lemma [39, 46]: take a prime p = Θ(n4 ), substitute the variables xij by random elements from the finite field Zp to obtain a matrix  over Zp , and compute the rank of  over Zp (which will be equal to rank(A) with high probability). This approach can clearly be implemented efficiently in the congested clique mode using the rank algorithm of Theorem 3, giving the following result. Theorem 8. The randomized round complexity of computing the number of edges in a maximum matching of a simple graph is O(n1−2/ω log n). Suppose that the graph G has a perfect matching (i.e., n is even and ν(G) = n/2). We say that an edge of G is allowed if it is contained in a least one perfect matching. Rabin and Vazirani [38] further showed that with high probability the following property holds for all edges {i, j} of G: the edge {i, j} is allowed if and only if Â−1 [i, j] 6= 0. The set of allowed edges can thus be obtained from the inverse of the matrix Â, which can be done in O(n1−1/ω ) rounds in the congested clique model using the algorithm of Theorem 2. An interesting open question is whether finding a perfect matching can be done with the same complexity in the congested clique model. While the best centralized algorithms can find a maximum matching with essentially the same complexity as matrix multiplication [33], they are based on sequential variants of the Gaussian decomposition (e.g., computation of the LUP decomposition) that do not appear to be implementable in parallel. 6.4 Computing the Gallai-Edmonds decomposition of a graph Let G = (V, E) be a simple graph. We say that a vertex v ∈ V is critical if it appears in at least one maximum matching, otherwise we say that v is non-critical. Let D(G) ⊆ V denote the set of non-critical vertices, K(G) be the set of vertices in V \ D(G) that are adjacent to vertices in D(G), and define C(G) = V \ (D(G) ∩ K(G)). Gallai [15] and Edmonds [14] showed that the triple (D(G), K(G), C(G)), called the Gallai-Edmonds decomposition of the graph, gives fundamental information about the structure of the graph, and in particular about its matchings (see, e.g., [32] for a detailed presentation of this theorem). Cheriyan [7] presented efficient algorithms for computing the Gallai-Edmonds decomposition. We adapt this algorithm to the congested clique model to obtain the following result. Theorem 9. The randomized round complexity of computing the Gallai-Edmonds decomposition of a simple graph is O(n1−1/ω ). Proof. We will show how all the nodes of the network can obtain the set of non-critical vertices D(G) in Õ(n1−1/ω ) rounds. Note that K(G) and C(G) can then be computed (and distributed to all the nodes) in a constant number of rounds using the scheme of Lemma 1. The strategy used in [7] to compute the set of non-critical vertices D(G) in the centralized setting is as follows. Take a prime p = Θ(n3 ) and substitute the variables xij in the Tutte matrix 24 of G by random elements from the finite field F = Zp . Let  denote the matrix obtained. For any i ∈ [n], let ei ∈ F1×n be the row vector with coordinate 1 at position i and coordinate zero at all other positions. Cheriyan [7] showed that with large probability the following property holds for all i ∈ [n]: the vertex vi is non-critical if and only if    rank > rank(Â). (16) ei    Here denotes the (n + 1) × n matrix obtained by appending the row ei at the bottom of Â. ei The set D(G) can be computed by checking if Equation (16) holds for each i ∈ [n], but this is not efficient enough. Observe that Equation (16) holds if and only if ei is not in the subspace S spanned by the row vectors of Â. Let M ∈ Fn×(n−rank(Â)) be the matrix representation of a basis for the right null space of  (i.e., each column of M is a basis vector of the vector space S ⊥ = {y ∈ Fn | Ây = 0}). Observe that for any row vector u we have uM = 0 if and only if u ∈ (S ⊥ )⊥ = S. Equation (16) then holds if and only if ei M 6= 0. In order to compute ei M for all i ∈ [n], we simply need to compute the product of the n × n identity matrix In by the matrix Â, and check which rows of the product contain at least one non-zero entry. In the congested clique model this strategy can be implemented in O(n1−2/ω ) rounds assuming that the matrix M is available (and distributed among the nodes). We now explain how to construct this matrix using the ideas from [21, 23]. Let r denote the rank of A. Let U, V be two triangular random Toeplitz matrices as in Lemma 4, and write N = U ÂV . Decompose N as follows:   N11 N12 , N= N21 N22 where N11 ∈ Fr×r , N12 ∈ Fr×(n−r) , N21 ∈ F(n−r)×r and N22 ∈ F(n−r)×(n−r) . Theorem 2 from [23] and the analysis of Section 5 in [21] shows that, with probability at least 1 − r(r + 1)/|F| on the choice of U and V , the submatrix N11 is non-singular and the columns of the n × (n − r) matrix    r×(n−r)  −1 Ir −N11 N12 0 M =V . In−r 0(n−r)×r In−r form a basis of the right null space of Â. The matrix M can thus be computed with high probability in O(n1−1/ω ) rounds by using the algorithm of Theorem 2 for computing the inverse and the algorithm for matrix multiplication of Section 3. As already mentioned, the Gallai-Edmonds decomposition has many applications. In particular, as pointed out by Cheriyan [7], an algorithm computing the Gallai-Edmonds decomposition immediately yields an algorithm computing a minimum vertex cover in a bipartite graph. Cheriyan also presented other graph-theoretic problems that can be solved using variants of his approach for computing the Gallai-Edmonds decomposition: finding the canonical partition of an elementary graph, computing the maximum number of vertex disjoint paths between two subsets of vertices of a graph, and computing a minimal separator between two subsets of vertices of a graph. A close inspection of these variants (Sections 3.3 and 4 in [7]) shows that they can also be implemented efficiently in the congested clique model, giving again algorithms with round complexity O(n1−1/ω ). 25 Acknowkedgments The author is grateful to Arne Storjohann for precious help concerning the computation of the determinant and to anonymous reviewers for their comments. This work is supported by the Grant-in-Aid for Young Scientists (A) No. 16H05853, the Grant-in-Aid for Scientific Research (A) No. 16H01705, and the Grant-in-Aid for Scientific Research on Innovative Areas No. 24106009 of the Japan Society for the Promotion of Science and the Ministry of Education, Culture, Sports, Science and Technology in Japan. References [1] Alfred V. Aho, John E. Hopcroft, and Jeffrey D. Ullman. The design and analysis of computer algorithms. Addison-Wesley Publishing Company, 1974. [2] Noga Alon, Zvi Galil, and Oded Margalit. On the exponent of the all pairs shortest path problem. Journal of Computer and System Sciences, 54(2):255–262, 1997. [3] James R. Bunch and John E. Hopcroft. Factorization and inversion by fast matrix multiplication. Mathematics of Computation, 28(125):231–236, 1974. [4] Peter Bürgisser, Michael Clausen, and Mohammad Amin Shokrollahi. Algebraic complexity theory. Springer, 1997. [5] Keren Censor-Hillel, Petteri Kaski, Janne H. Korhonen, Christoph Lenzen, Ami Paz, and Jukka Suomela. Algebraic methods in the congested clique. In Proceedings of the 34th Symposium on Principles of Distributed Computing, pages 143–152, 2015. [6] Li Chen, Wayne Eberly, Erich Kaltofen, B. David Saunders, William J. Turner, and Gilles Villard. Efficient matrix preconditioners for black box linear algebra. Linear Algebra and its Applications, 343-344:119–146, 2002. [7] Joseph Cheriyan. Randomized Õ(M (|V |)) algorithms for problems in matching theory. SIAM Journal on Computing, 26(6):1635–1669, 1997. [8] Jeff I. Chu and Georg Schnitger. Communication complexity of matrix computation over finite fields. Mathematical Systems Theory, 28(3):215–228, 1995. [9] Laszlo Csanky. Fast parallel matrix inversion algorithms. In Proceedings of the 16th Annual Symposium on Foundations of Computer Science, pages 11–12, 1975. [10] Marek Cygan, Harold N. Gabow, and Piotr Sankowski. Algorithmic applications of BaurStrassen’s theorem: Shortest cycles, diameter and matchings. In 53rd Annual IEEE Symposium on Foundations of Computer Science, pages 531–540, 2012. [11] Anindya De, Piyush P. Kurur, Chandan Saha, and Ramprasad Saptharishi. Fast integer multiplication using modular arithmetic. SIAM Journal on Computing, 42(2):685–699, 2013. [12] Danny Dolev, Christoph Lenzen, and Shir Peled. “Tri, Tri Again”: Finding triangles and small subgraphs in a distributed setting - (extended abstract). In Proceedings of the 26th International Symposium on Distributed Computing, pages 195–209, 2012. 26 [13] Andrew Drucker, Fabian Kuhn, and Rotem Oshman. On the power of the congested clique model. In Proceedings of the ACM Symposium on Principles of Distributed Computing, pages 367–376, 2014. [14] Jack Edmonds. Paths, tree and flowers. Canadian Journal of Mathematics, 17:449–467, 1965. [15] Tibor Gallai. Maximale Systeme unabhängiger Kanten. Publications of the Mathematical Institute of the Hungarian Academy of Sciences, 9:401–413, 1964. [16] Joachim von zur Gathen and Jürgen Gerhard. Modern computer algebra. Cambridge University Press, 2003. [17] James W. Hegeman, Gopal Pandurangan, Sriram V. Pemmaraju, Vivek B. Sardeshmukh, and Michele Scquizzato. Toward optimal bounds in the congested clique: Graph connectivity and MST. In Proceedings of the ACM Symposium on Principles of Distributed Computing, pages 91–100, 2015. [18] James W. Hegeman and Sriram V. Pemmaraju. Lessons from the congested clique applied to MapReduce. In Proceedings of the 21st International Colloqium on Structural Information and Communication Complexity, pages 149–164, 2014. [19] James W. Hegeman, Sriram V. Pemmaraju, and Vivek Sardeshmukh. Near-constant-time distributed algorithms on a congested clique. In Proceedings of the 28th International Symposium on Distributed Computing, pages 514–530, 2014. [20] Monika Henzinger, Sebastian Krinninger, and Danupon Nanongkai. A deterministic almosttight distributed algorithm for approximating single-source shortest paths. In Proceedings of the 48th Annual ACM Symposium on Theory of Computing, pages 489–498, 2016. [21] Erich Kaltofen and Victor Y. Pan. Processor efficient parallel solution of linear systems over an abstract field. In Proceedings of the 3rd Annual ACM Symposium on Parallel Algorithms and Architectures, pages 180–191, 1991. [22] Erich Kaltofen and Victor Y. Pan. Processor-efficient parallel solution of linear systems II: the positive characteristic and singular cases (extended abstract). In Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, pages 714–723, 1992. [23] Erich Kaltofen and B. David Saunders. On Wiedemann’s method of solving sparse linear systems. In Proceedings of the 9th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, pages 29–38, 1991. [24] François Le Gall. Faster algorithms for rectangular matrix multiplication. In Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, pages 514–523, 2012. [25] François Le Gall. Powers of tensors and fast matrix multiplication. In Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, pages 296–303, 2014. [26] Christoph Lenzen. Optimal deterministic routing and sorting on the congested clique. In Proceedings of the ACM Symposium on Principles of Distributed Computing, pages 42–50, 2013. 27 [27] Christoph Lenzen and Roger Wattenhofer. Tight bounds for parallel randomized load balancing: extended abstract. In Proceedings of the 43rd ACM Symposium on Theory of Computing, pages 11–20, 2011. [28] Yuri Vladimirovich Linnik. On the least prime in an arithmetic progression I. The basic theorem. Rec. Math. [Mat. Sbornik] N.S., 15(57):139 – 178, 1944. [29] Yuri Vladimirovich Linnik. On the least prime in an arithmetic progression II. The DeuringHeilbronn phenomenon. Rec. Math. [Mat. Sbornik] N.S., 15(57):347 – 368, 1944. [30] Zvi Lotker, Elan Pavlov, Boaz Patt-Shamir, and David Peleg. MST construction in o(log log n) communication rounds. In Proceedings of the Fifteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, pages 94–100, 2003. [31] László Lovász. On determinants, matchings, and random algorithms. In Fundamentals of Computation Theory, pages 565–574, 1979. [32] László Lovász and Michael D. Plummer. Matching Theory. American Mathematical Society, 2009. [33] Marcin Mucha and Piotr Sankowski. Maximum matchings via Gaussian elimination. In Proceedings of the 45th Symposium on Foundations of Computer Science, pages 248–255, 2004. [34] Danupon Nanongkai. Distributed approximation algorithms for weighted shortest paths. In Proceedings of the 46th Symposium on Theory of Computing, pages 565–573, 2014. [35] Boaz Patt-Shamir and Marat Teplitsky. The round complexity of distributed sorting: extended abstract. In Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, pages 249–256, 2011. [36] David Peleg. Distributed computing: a locality-sensitive approach. Society for Industrial and Applied Mathematics, 2000. [37] Franco P. Preparata and Dilip V. Sarwate. An improved parallel processor bound in fast matrix inversion. Information Processing Letters, 7(3):148–150, 1978. [38] Michael O. Rabin and Vijay V. Vazirani. Maximum matchings in general graphs through randomization. Journal of Algorithms, 10(4):557–567, 1989. [39] Jacob T. Schwartz. Fast probabilistic algorithms for verification of polynomial identities. Journal of the ACM, 27(4):701–717, 1980. [40] Raimund Seidel. On the all-pairs-shortest-path problem in unweighted undirected graphs. Journal of Computer and System Sciences, 51(3):400–403, 1995. [41] Avi Shoshan and Uri Zwick. All pairs shortest paths in undirected graphs with integer weights. In Proceedings of the 40th Annual Symposium on Foundations of Computer Science, pages 605–615, 1999. [42] Tadao Takaoka. Subcubic cost algorithms for the all pairs shortest path problem. Algorithmica, 20(3):309–318, 1998. 28 [43] Virginia Vassilevska Williams. Multiplying matrices faster than Coppersmith-Winograd. In Proceedings of the 44th Symposium on Theory of Computing, pages 887–898, 2012. [44] Douglas H. Wiedemann. Solving sparse linear equations over finite fields. IEEE Transactions on Information Theory, 32(1):54–62, 1986. [45] Ryan Williams. Faster all-pairs shortest paths via circuit complexity. In Proceedings of the 46th Symposium on Theory of Computing, pages 664–673, 2014. [46] Richard Zippel. Probabilistic algorithms for sparse polynomials. In Proceedings of the International Symposium on Symbolic and Algebraic Computation, pages 216–226, 1979. [47] Uri Zwick. All pairs shortest paths using bridging sets and rectangular matrix multiplication. Journal of the ACM, 49(3):289–317, 2002. 29
8cs.DS
arXiv:1711.10328v1 [cs.RO] 28 Nov 2017 Meteorology-Aware Multi-Goal Path Planning for Large-Scale Inspection Missions with Long-Endurance Solar-Powered Aircraft Philipp Oettershagen, Julian Förster, Lukas Wirth, Jacques Ambühl and Roland Siegwart Autonomous Systems Lab Swiss Federal Institute of Technology Zurich (ETH Zurich) Leonhardstrasse 21 8092 Zurich +41 44 632 7395 [email protected] Abstract Solar-powered aircraft promise significantly increased flight endurance over conventional aircraft. While this makes them promising candidates for large-scale aerial inspection missions, their structural fragility necessitates that adverse weather is avoided using appropriate path planning methods. This paper therefore presents MetPASS, the Meteorology-aware Path Planning and Analysis Software for Solar-powered UAVs. MetPASS is the first path planning framework in the literature that considers all aspects that influence the safety or performance of solar-powered flight: It avoids environmental risks (thunderstorms, rain, wind, wind gusts and humidity) and exploits advantageous regions (high sun radiation or tailwind). It also avoids system risks such as low battery state of charge and returns safe paths through cluttered terrain. MetPASS imports weather data from global meteorological models, propagates the aircraft state through an energetic system model, and then combines both into a cost function. A combination of dynamic programming techniques and an A*-search-algorithm with a custom heuristic is leveraged to plan globally optimal paths in station-keeping, point-to-point or multi-goal aerial inspection missions with coverage guarantees. A full software implementation including a GUI is provided. The planning methods are verified using three missions of ETH Zurich’s AtlantikSolar UAV: An 81-hour continuous solar-powered station-keeping flight, a 4000 km Atlantic crossing from Newfoundland to Portugal, and two multi-glacier aerial inspection missions above the Arctic Ocean performed near Greenland in summer 2017. It is shown that integrating meteorological data has significant advantages and is indispensable for the reliable execution of large-scale solar-powered aircraft missions. For example, the correct selection of launch date and flight path across the Atlantic Ocean decreases the required flight time from 106 hours to only 52 hours. 1 Introduction Motivation Solar-powered Unmanned Aerial Vehicles (UAVs) promise significantly increased flight endurance over conventional aircraft. This greatly benefits applications such as large-scale disaster relief, border patrol or aerial inspection in remote areas [12]. Research and development of solar UAVs is ongoing in both academia [39, 26] and industry [1, 8]. Since 2005, multiple solar aircraft have been able to demonstrate multi-day continuous flight [11, 27, 7], with the current world record being a 14-day continuous flight [33]. In our own work [30], we have previously shown an 81-hour continuous solar-powered flight with the AtlantikSolar UAV (Figure 1) which set the current world record in flight endurance for aircraft below 50 kg total mass. However, all solar-powered aircraft necessarily require suitable weather conditions for such long-endurance operations. Thunderstorms, rain and wind gusts can quickly become elementary threats to the aircraft’s integrity. Moreover, clouds and strong winds can significantly reduce the solar power income or increase the required propulsion power such that a landing is required. Solar aircraft, or more generally speaking all aerial vehicles that are sensitive to weather e.g. because they are flying slowly or are structurally fragile, therefore require careful pre-operational planning. Safe and efficient flight requires the consideration of terrain, the internal system state (e.g. battery state of charge), and major weather phenomena (thunderstorms, rain, winds and wind gusts, radiation and clouds). A model-based path planning framework (Figure 1) allows to integrate these effects in a structured manner and is thereby able to generate globally optimal paths for the aerial vehicle. Figure 1: Large-scale aerial sensing missions with fragile solar-powered aircraft such as AtlantikSolar (top left) require careful route planning. MetPASS, the Meteorological Path Planning and Analysis Software for Solar-powered UAVs presented herein, allows to plan optimal point-to-point routes as well as multi-goal routes that allow inspecting multiple areas of interest — for example a set of Arctic glaciers — in one flight. Routes optimized with MetPASS are safe and efficient given the consideration of terrain data and meteorological risk factors such as wind, rain, thunderstorms and clouds. State of the art Literature on path planning for solar-powered aircraft is sparse. The necessary elements (e.g. winddependence, sun-dependence) are only considered separately in relatively unrelated fields of research. On one hand, when focussing only on wind-aware planning a comprehensive body of research is available. For example, Rubio [34] proposes evolutionary approaches and considers forecasted 3D wind fields in a large-scale Pacific crossing mission. A planner for oceanic search missions, which employs meteorological data such as temperature and humidity to predict icing conditions, is presented in subsequent work [35]. Chakrabarty [10] presents a sampling-based planning method for paths through complex time-varying 3D wind fields. All these contributions focus on either fuel-powered or non-solar gliding aircraft. On the other hand, research which does incorporate solar models unfortunately often neglects wind and thus solves a very simplified problem. Rather theoretical approaches are proposed: For example, Klesh [22, 23] uses optimal control techniques to generate paths maximizing the UAV’s final energy state in small-scale point-to-point and loitering problems. The sun position is however assumed constant. Spangelo [37] investigates optimal climb and descent maneuvers during loitering. Hosseini [20] adds sun-position time dependence, but assumes perfect clear-sky conditions instead of considering meteorological data. Dai [14] avoids the clear-sky assumption by deriving an expected solar radiation income based on local precipitation and humidity forecasts. The path planning problem is then solved by a Bellman-Ford algorithm. Overall, there is no literature that covers all the system-related or meteorological aspects that can, as described before, affect solar-powered aircraft. In addition, there is a clear lack of flight test based verification of the developed planning approaches. Contributions This paper presents the Meteorology-aware Path Planning and Analysis Software for Solar-powered UAVs (MetPASS), the first path planning framework in the literature that considers all safety and performance relevant aspects (terrain, system state, meteorological environment) of solar-powered flight. It is able to optimize large-scale station-keeping, point-to-point and multi-goal missions (Figure 1) and focuses on realworld applications. More specifically, this paper and the corresponding framework present and implement the following contributions: • an optimization approach that yields cost-optimal aircraft paths by combining an extended A*algorithm for multi-goal order optimization, a dynamic programming based point-to-point planner and local scan path planner that guarantees area coverage based on a simple camera model. • a cost function for solar-powered aircraft. Both safety and performance are considered: The cost function assesses terrain collision risk, the system state (time since launch, battery state of charge, power consumption and generation) through a comprehensive energetic model, and up-to-date meteorological data (thunderstorms, precipitation, humidity, 2D winds, gusts, sun radiation and clouds) through global weather models. • a full software implementation that features ease-of-use through a GUI and is optimized for computational speed via a custom-designed heuristic and the use of parallelization and caching. As a result, the framework can be used for detailed mission feasibility analysis, pre-flight planning, and in-flight re-planning once updated weather data is available. • an extensive flight-test based verification of the planning results for the 81-hour flight endurance world record of AtlantikSolar [30], a crossing of the Atlantic Ocean from Newfoundland to Portugal, and two multi-goal glacier inspection missions above the Arctic Ocean near Greenland. The point-to-point path planning approach was already presented in our previous work [41]. The novel aspects extended in this paper are the terrain avoidance, the local scan path planning that guarantees coverage using a camera model, the multi-goal path optimization approach and the flight test results. The remainder of this paper is organized as follows: Section 2 presents the fundamentals of the optimization approach, i.e. the cost function, heuristic, the dynamic programming based point-to-point path planning and the A*-based multi-goal optimization. Section 3 describes the software implementation and verification. Section 4 presents the planning results, compares them to the aforementioned flight data, and provides a computation time analysis. Section 5 provides concluding remarks. 2 Design MetPASS plans safe and efficient large-scale aerial inspection missions for fixed-wing aircraft and solarpowered UAVs in particular. Such missions can either be multi-goal missions which inspect multiple areas of interest (Figure 1) or point-to-point missions. The MetPASS architecture is shown in Figure 2. The input data is loaded first. Then, in the multi-goal mission case, the multi-goal path planner performs the scan path optimization to determine the exact scan path within each area of interest. Using these scan paths, the inter-goal path optimization then determines the order in which the areas of interest shall be visited. This process internally calls the point-to-point planner to optimize the individual routes between areas of interest. Input data Multi-Goal Path Planner Problem setup (Start, goal, position and extent of scan areas) Scan path optimization Inter-goal path (order) optimization Aircraft parameters Heuristic Decision tree Optimization loop (modified A*) Optimal multi-goal path with optimal pointto-point paths Terrain-DEM Meteorological forecast data Solar radiation, precipitation, thunderstorms, etc. Point-to-Point Path Planner Optimization algorithm (Dynamic Programming) UAV system model Cost Function Flight kinematics Flight Planner Optimal point-topoint path Power balance Figure 2: MetPASS architecture. Using input data such as meteorological weather forecasts, MetPASS can calculate optimal point-to-point as well as multi-goal paths that allow the inspection of multiple areas of interest. 2.1 Environment-aware Point-to-Point Path Planning The optimization problem solved by the MetPASS point-to-point path planner (Figure 2) can be stated as follows: Given fixed departure and arrival coordinates, find a path which minimizes the total cost as defined by a cost function. The departure time can be either a fixed or free parameter. The cost function includes a term for the proximity to terrain, environmental conditions such as solar radiation or precipitation, and aircraft states like power consumption or State of Charge (SoC). Environmental conditions are estimated based on time-varying meteorological forecast data in a three-dimensional grid. The system model includes flight kinematics with respect to horizontal wind, power generation through the solar modules and the power consumption of the aircraft. 2.1.1 Optimization Algorithm The optimization is based on the well-known dynamic programming [3, 5] technique and extends the implementation by Ambühl [2] with the altitude as an additional optimization variable. The working principle can be shown on a basic example, where the goal is to find the shortest distance between Bell Island, Canada and Lisbon, Portugal (Figure 3). In a first step, a three-dimensional grid, connecting the departure and arrival points, is generated. The grid is horizontally divided into i slices of j vertices, and vertically into k levels. Starting from the departure node, the cost (in this example the travel distance) to each subsequent node is calculated and stored. Then, starting from the nodes in the third slice of the grid, the DP algorithm h i di,j,k = min di−1,n + ∆i,j,k (1) i−1,n n∈slicei−1 is applied to find the shortest total distance di,j,k from the departure point to each node of the grid. This is done by minimizing the sum of the a priori known distances di−1,n and the additional travel distance ∆i,j,k i−1,n . A decision tree consisting of globally optimal sub routes is thus built up which finally reaches the arrival point. The optimal path can then be extracted by going back up the tree from the arrival point. In contrast to this simplified example with a Euclidean distance cost, the real aircraft cost function depends on high-resolution time-varying forecast data and a comprehensive system model. Each path segment thus needs to be simulated using numerical integration, which is a main expansion compared to Ambühl [2]. 55 °N i 50 50 45 45 j 40 40 𝑑𝑖,𝑗,𝑘 = 35 35 30 -60 60 n∈slicei−1 -50 50 min i,j,k di−1,n + ∆i−1,n -40 40 -30 30 -20 20 -10 °E 10 Figure 3: Exemplary route optimization from start (Canada) to goal (Portugal) on a rectangular grid. The dynamic programming algorithm of Eq. (1) is applied to the grid points i,j in horizontal and k in vertical direction (not shown). The thick red line is the optimal path. 2.1.2 Cost Function For solar-powered aircraft in particular, a globally optimal point-to-point path is not necessarily the shortest path, but the path with the highest probability of mission success and thus the lowest risk exposure. The cost function mathematically considers risk through cost terms which can be grouped as follows: • Flight time: A low flight time decreases the risk of spontaneous component failure. This mainly becomes of importance if all other costs are small. • Environmental costs: The environmental (or meteorological) costs indicate an environmental threat to the airplane. This includes strong wind, wind gusts, humidity, precipitation and thunderstorms. • System costs: Includes SoC, power consumption and the radiation factor, which is the ratio between current solar radiation and clear-sky solar radiation and thus indicates clouds. Flight states with low SoC, high power consumption or low radiation factor are avoided by flying at the power-optimal airspeed and evading clouded areas. • Distance to terrain: Based on a Digital Elevation Model (DEM), this term helps to avoid terrain collisions while flying in cluttered terrain. The cost term has been extended with respect to our previous work [41]. The instantaneous flight time cost is simply the so called flight time cost factor, i.e. Ċtime = ctime . All other costs Ċk need to be normalized to allow for a consistent summation and weighting via −αk k ) − 1 exp ( βxkk −α k Ċk = H(x) · exp (k ) − 1 . (2) As illustrated in Figure 4, this normalizes every cost and allows to adjust its influence on the total cost. The parameters αk and βk define the lower threshold and the upper limit, where the generated cost is bounded. Due to the Heaviside function H(x) values xk below the threshold generate no cost as they are not in a critical range. Values above the limit are considered too dangerous for the aircraft and thus cause Precipitationcost a cancellation of the corresponding path. The exponent k determines the curvature of the cost function. Threshold 1.0 1.0 1 Limit 10 Normalized cost 𝐶𝑘ሶ [-] Limit: βk=10 0.80.8 Exponent ϵk 0.60.6 0.5 1 0.4 0.4 0.2 0.2 0.0 0.0 0 0 2 Threshold: αk=1 3 4 5 Precipitation [mm/6h] 2 4 2 6 4 6 8 8 10 precipitation 10 Figure 4: Visualization of a cost function and the parameters available to adjust its sensitivity. The precipitation cost is shown as an example. The accumulated cost for a path segment is finally calculated by summing up all 10 costs to a total cost and integrating it over the flight time, as defined by Z C= 10 t2 X t1 2.1.3 Ċk dt . (3) k=1 Meteorological Forecast Data Accurate meteorological data is essential to plan safe and efficient paths for weather-sensitive solar-powered aircraft. The meteorological data used in MetPASS consists of the parameters in Table 1. Both historical data for mission feasibility analysis and forecast data to pre-plan or re-plan actual missions on site is supported. The data is either obtained from the European Centre for Medium-Range Weather Forecasts (ECMWF) global deterministic IFS-HRES model (horizontal resolution of 0.125 ◦ ) or the European COSMO model (resolution up to 2 km). Data time steps range between 1–6 hours and altitude levels between 0 m and 1600 m above sea-level. The characteristics of all weather data sets are given in Table 2. The data can be linearly interpolated in time as well as in all three spatial dimensions. More details on weather data import and integration are given by Wirth [40]. 2.1.4 System Model The system model (Figure 5) simulates the flight along a chosen route and thereby calculates the states required for the cost function. Both the model and the employed weather data are fully deterministic. Given the large mission time scales of hours or even days, aircraft flight dynamics are neglected. The decisive components that are modeled dynamically are the power balance (including time and temperature dependent Table 1: Forecast parameters received from ECMWF and COSMO models. Parameter Unit Temperature Relative humidity Horizontal wind Wind gusts ◦ C % m/s m/s Total precipitation mm Convective available potential energy Total solar radiation (direct + diffuse) Direct solar radiation J/kg Description Lateral and longitudinal winds Max. wind gust over last time step Accumulated over last time step Causes updrafts and thunderstorms Type 3D 3D 3D 2D 2D 2D J/m2 Accumulated over last time step 2D J/m2 Accumulated over last time step 2D solar power generation, system power consumption and SoC) and the flight kinematics with respect to wind speed and airspeed. The flight kinematics are handled by the Aircraft Kinematic Model, which updates the aircraft position after calculating the wind angle and ground speed. It requires the airspeed, which is determined by the Flight Planner module — a representation of the UAV’s decision logic — as a function of the system state. The airspeed may be increased, first, in presence of strong headwind to maintain a certain ground speed or, second, if there is excess solar power available, the battery is already fully charged and the aircraft is not allowed to gain additional altitude. The flight planner can also increase the altitude once SoC = 100 % either in order to store solar energy into potential energy or to use the wind situation at higher altitude. The power balance is estimated by the Aircraft System Model. For the power generation, direct and diffuse solar radiation are considered separately. The incidence angle ϕk of the direct radiation is calculated for every solar module k using the solar radiation models presented in [13, 15, 40] under consideration of the aircraft geometry. The radiation onto the surface is then calculated using the cosine of the incidence angle. For the diffuse part of the radiation, the surface is assumed to be horizontal and thus the incidence angle is neglected. With the solar module areas Ak and the efficiencies of the solar modules ηsm (which are temperature dependent) and the Maximum Power Point Trackers ηMPPT , the total incoming power is  Psolar,k = Idiff + Idirect · cos(ϕk ) · Ak · ηsm · ηMPPT P Psolar = k Psolar,k (4) (5) The overall level-flight power consumption of the UAV depends on airspeed vair and altitude and thus air density ρ. It is generally given by Plevel (ρ, vair ) = Pprop (ρ, vair ) + Pav + Ppld , ηprop (ρ, vair ) (6) where Pprop/ηprop determines the required electrical propulsion power, and Pav and Ppld are avionics and payload power respectively. In our case, the dependence of Plevel on the airspeed vair is modeled through 2 Plevel (ρ0 , vair ) = C2 · vair + C1 · vair + C0 (7) which is identified directly from AtlantikSolar power measurement test flights performed at constant altitude Figure 5: The MetPASS system model and the interactions with the Flight Planner that determines the current optimal airspeed and altitude. and thus air density ρ0 . The scaling to different altitudes or air densities is done according to [32] using r Plevel (ρ, vair ) =   r ρ0 ρ 2 ρ · C2 vair + C1 vair + C0 . ρ ρ0 ρ0 (8) With regard to the climb rate ḣ, the total flight power Pflight is given by Pflight (ρ, vair ) = Plevel (ρ, vair ) + mtot g ḣ , ηclimb (9) with the airplane mass mtot and the climbing efficiency ηclimb . The SoC is updated based on the power balance given by ˙ = Psolar − Pflight ηcharge , SoC (10) Ebat with the total energy of the battery Ebat and the battery efficiency ηcharge . Note that 0 < SoC < 1 and a charge rate limit for large SoC’s is enforced. More details are presented by Wirth [40]. 2.2 Environment-aware Multi-Goal Path Planning The multi-goal path planning problem can be stated as follows: Given fixed start and goal coordinates S and G as well as a set of convex polygonal areas of interest (also called nodes N hereafter), find the order to visit the nodes and thereof derive the optimal path that minimizes the cost function in Eq. (3) globally over the whole mission. The two sub-functionalities mentioned in Figure 2, i.e. the scan path optimization which calculates the scan path inside each area of interest and the inter goal path planner which determines the order of and trajectories in between the areas of interest, are visualized in more detail in Figure 6 and described in the following. Multi-Goal Path Planner Scan path optimization Inter-goal path (order) optimization Preparation Convert Traveling Salesman Problem to decision tree Heuristic Decision tree Optimization loop (adapted A* algorithm) Update decision tree Determine next parent node Check path metrics MetPASS point-topoint path planner Optimal scan paths & metrics Optimal node order & optimal global path Figure 6: Enlarged view of the MetPASS multi-goal path planning submodule. The complete MetPASS architecture is shown in Figure 2. 2.2.1 Scan Path Optimization The scan path optimization is carried out independently for each area of interest. The problem can be stated as: Given a) the extent of the convex polygonal area of interest, b) fixed scan parameters such as flight altitude, airspeed, camera field of view and desired image overlap, and c) weather data, find a scan path that guarantees complete coverage of the area of interest at minimum cost. For simplicity lawn-mower scan patterns (Figure 7), which are widely used in robotics, are employed. Flight direction (course angle) sun wind Area of interest Figure 7: Schematic lawn-mower scan path covering an area of interest. The black arrow is the flight direction (course), the black rectangles are selected camera images and the red dots are turn points. Environmental factors such as wind and sun are considered during the optimization. The main parameter that needs to be optimized is the course angle. For constant wind, both simple geometric calculations and the simulations in [16] show that for lawn-mower patterns with equal outward/backwarddistances a course perpendicular to the wind direction results in minimum flight time. However, first, in our case the wind is not constant in space, and second, the polygon can be of arbitrary but convex shape such that the outward/backward-distances can differ significantly. Third, we are interested in a minimum total cost instead of a minimum flight time path: For example, the sun position and the resulting solar power income over all course angles need to be considered. The course angle therefore can not be calculated analytically, but it has to be optimized via simulating scan paths over a range of course angles. Both the straight lines and the 180◦ -turns of the lawn-mower pattern are simulated using the system model of Section 2.1.4. The optimal polygon corner to start from is found in the same process. The combination of course angle and polygon start corner with minimum cost is selected as the solution. The details of the optimization process are presented in [16]. The final results are the optimized scan path (Figure 7) and the scan metrics path length, flight time, cost, and change in state of charge ∆SoC. These metrics are required inputs for the inter-goal path planner. 2.2.2 Inter-Goal Path Optimization The inter-goal path optimization finds the optimal order to visit all areas of interest and thereof derives the overall path between them and the base. When aiming only for minimum flight distance, then the trivial circular path shown in Figure 1 is likely a good solution to this well known Traveling Salesman Problem (TSP, [19]). Instead of minimum distance our goal is minimum path cost. In addition, weather changes make this problem time-dependent. The problem is also asymmetric because, for example because of wind, flying from node A to node B can cause a different cost than flying from B to A. We are therefore trying to solve a Time Dependent Asymmetric Traveling Salesman Problem (TDATSP). Both the TSP and TDATSP are NP-hard problems and thus computationally expensive to solve. For example, the brute-force approach to solving the standard TSP is of order O(N !), where N is the number of nodes excluding the start/goal node. For our applications we mostly have N < 10, however, each calculation of a point-to-point path requires MetPASS to solve a dynamic programming problem that takes between 3 seconds and 10 minutes for typical grid resolutions and distances (Table 4). The algorithms used to solve the TDATSP should therefore aim to decrease the required edge cost calculations. Solving the time-dependent asymmetric traveling salesman problem A number of algorithms to solve the time dependent asymmetric traveling salesman problem exist. Dynamic programming approaches were introduced early-on by Bellman [4] for the TSP. More recently, Malandraki introduced an optimal DP approach [24] and a faster restricted [25] DP method for solving the TDATSP. However, these were not selected because the former requires the computation of all edge costs, while the latter does not guarantee optimality. Similarly, the Simulated Annealing approaches introduced by Schneider [36] do not provide optimality guarantees. The genetic algorithms introduced for solving the TDATSP by Testa et al. [38] tend to provide lower computational performance than the DP methods. They are asymptotically optimal, i.e. cannot guarantee to find the optimal solution in finite time. Finally, efficient label correcting methods can be applied if the TDATSP is converted into a Time Dependent Shortest Path Problem (TDSPP) as described by Bertsekas [6]. This approach was chosen for this paper. The resulting tree is visualized in Figure 8. While the original TSP graph contains the N = 3 nodes N = {1, 2, 3} excluding the start/goal nodes, the SPP graph contains the V = 21 vertices V = {S1, S2, S3, S12, . . . , S312G, S321G} excluding the start vertex S but including those vertices1 that finish with the goal node G. The root of the SPP graph represents our start node S, and every branch is a valid (though not necessarily feasible or even optimal) solution path that covers all areas of interest and ends at the start node (called goal G for clarity) again. The cost for traversing an edge in the new graph, i.e. for going from vertex v to a child vertex w, is equal to the cost of going from the node n represented by the last digit in the parent label to the node m represented by the last digit in the child label. These costs are time dependent. Finally, of the many well-known methods that can be applied to the TDSPP graph, a modified version of the A*-algorithm introduced by Hart et al. [18] was selected. When used with a properly designed heuristic, A* can guide the search and can thereby significantly reduce the amount of required edge cost calculations while still providing globally optimal paths. 1 Note that in the following discussions of the graphs, the indices n, m ∈ N always refer to nodes while the indices v, w ∈ V always refer to vertices. S S1 3 S/G S2 1 1 S 12 S 13 S 21 S 23 S 123 S 132 S 213 S 231 2 ...G Traveling Salesman Problem 0 S3 6 S 31 5 3 S 312 2 2 4 2 S 32 7 32 S 321 4 Shortest Path Problem Figure 8: Traveling salesman problem and the equivalent shortest path problem that label correcting methods can be applied to. With the notation of this paper, i.e. excluding the start/goal in the node count and only the start vertex in the vertex count, the TSP has N = 3 nodes and the SPP graph has V = 21 vertices. The SPP graph contains exemplary point-to-point heuristics (red) and cost-to-go heuristics (black). Heuristic calculation For every vertex v ∈ V in the SPP graph of Figure 8, the heuristic hv describes an estimate of the cost to fly to the goal G via all yet unvisited nodes. The heuristic has to be a lower bound on the path cost to avoid discarding optimal paths and to thus retain the optimality guarantees of the A*-algorithm [18]. However, the closer it is to the actual optimal path cost the larger the reduction in edge cost evaluations will be. The calculation of the heuristic is performed in two steps: • First, a lower-bound cost estimate hnm for a path from TSP node n to node m is computed2 . As for the standard edge cost calculation this estimate is calculated using Eq. (3), however, for the heuristic we assume that a) the path is the straight line (or orthodrome) between nodes n and m, b) we start with full batteries and c) have optimal weather conditions (e.g. tail wind, low cloud cover and precipitation, etc.) during the whole flight. The optimal weather conditions are searched over all grid points of the standard DP point-to-point mesh (Figure 3) and all times within a user-specified time horizon. • Second, the cost-to-go heuristic hv is calculated for each vertex v ∈ V by summing up the pointto-point cost estimates hnm from the SPP graph’s lowest level vertices (which represent complete round-trips and are assigned a heuristic value of zero) inside each tree to vertex v. Optimization loop with an extended A* algorithm The A*-algorithm shown in algorithm 2.1 uses the following notation: The current lowest cost to go from S to vertex v ∈ V is gv and the cost to go from vertex v to vertex w is cvw , where w is a successor of v and pv is the parent vertex of v on the shortest path from S to v found so far. In contrast to the standard algorithm by Hart [18], the implementation in MetPASS needs to be extended to consider • The time dependence of the edge costs due to changing weather. Each vertex v is therefore assigned a departure time tv . • The SoC dependence of the edge costs. Each vertex v is assigned a departure state of charge SoCv . The edge costs cvw between the vertices already include both the SoC and time dependency, i.e. cvw = cij (tv , SoCv ). • The scan path metrics, i.e. the time and state of charge changes T and ∆SoC when inspecting an area of interest. Note that both are assumed time-independent for the optimization. The scan 2 Note that hnm can be calculated between the nodes N of the TSP graph instead of the vertices V of the SPP graph because the point-to-point heuristic is time-independent. costs are thus the same for every branch in the SPP Graph and don’t need to be considered in the optimization. This speeds up the optimization significantly. However, it also means that if the ratio between the time spent on the scan paths and the time spent on the inter-goal paths exceeds a certain value, then the global multi-goal path looses its optimality properties. The extended A* algorithm starts with the initialization, in which all vertices are labeled as “unlabeled” and all gk where k ∈ V are set to ∞. Only the start vertex is labeled “open” and gS is set to 0. Time and SoC are initialized to user-specified defaults. Next, in each iteration, the algorithm picks a vertex to process by finding amongst all vertices that are labeled “open” the one with the lowest total expected cost gv + hv . When a vertex v (from now on called “parent” vertex) is selected, the following two equations are checked for each child w of that vertex (note again that the time and SoC dependency of the edge costs are already incorporated in cvw ): gv + cvw < gw (11) gv + cvw + hw < gG (12) If the two checks are passed, gw and pw in the decision tree are updated and w is labeled as “open”. In addition to this standard A*-behaviour, our algorithm also updates the time tw and state of charge SoCw at the vertex using the scan path metrics Tw and ∆SoCw (which are both time-independent and can thus be replaced by the Tm and ∆SoCm of the corresponding node). Otherwise, nothing happens and the next successor vertex is considered. As soon as all successor vertices of the current parent vertex have been processed, the parent vertex is labeled as “closed” and the next iteration is initiated. The algorithm is terminated as soon as the terminal node G is part of the label of the selected parent vertex. Algorithm 2.1: Extended A*-algorithm used in MetPASS() comment: Finds shortest path between start S and goal G. Note that the edge cost cvw and the travel time tvw always incorporate the dependency on (tv ,SoCv ) gS ← 0 lS ← ”open” tS ← 0 SoCS ← initial SoC specified by user gk ← ∞ ∀k ∈ V lk ← ”unlabeled” ∀k ∈ V v←S whileG ∈ /v for each    w ∈ children(v)     vw < gw and gv + cvw + hw < gG  if gv + c          gw ← gv + cvw       lw ← ”open” do tw ← tv + tvw + Tw do then              SoCw ← SoCv + ∆SoCvw + ∆SoCw     pw ← v     l ← ”closed”  v   v ← ”open” node with smallest value gk + hk Note that even after the adapations, this implementation of the A* algorithm is still guaranteed to find the optimal multi-goal path under the assumption that the areas of interest are small compared to the total path length. First, for the A* algorithm to be valid, the principle of optimality in the direction of execution (forward in our case) has to hold [17]. The forward principle of optimality holds for the optimal path PSG (t) from S to G if and only if for an arbitrary intermediate vertex v, the optimal path PSv (t) from S to v is contained in PSG (t). This does not hold for arbitrary paths [17]. However, as our TDSPP graph is an arborescence (a special case of a polytree), there is only a single path from the root S to any other vertex, and the forward principle of optimality thus holds. Second, many comparable extensions of the A* algorithm for time-dependent shortest path problems [9] require satisfying the first-in-first-out (FIFO) property t1 ≤ t2 =⇒ t1 + tvw (t1 ) ≤ t2 + tvw (t2 ). In our case this is not required because the graph is a polytree and waiting at nodes is not allowed. In addition, while the scan paths are considered time independent during the inter-goal optimization, they are afterwards recalculated based on current weather data to have a physically correct state and cost prediction in the planned path. 3 Implementation, Verification and Preliminary Results 3.1 Implementation 3.1.1 Overview MetPASS is not only an abstract trajectory planner, but provides a comprehensive yet easy-to-use software environment for large-scale environment-aware mission planning and analysis. The Graphical User Interface (GUI) shown in Figure 9 supports the in-detail analysis of the path planning decisions. This is important because especially high-performance solar-powered UAVs are usually fragile and expensive, and the operator therefore needs to have maximum confidence in the flight path. Using MetPASS usually involves the following steps: • Setup of the aircraft and inspection mission via standard text files • Pre-inspection of the overall meteorological situation through the GUI • Flight path planning via the algorithms of Section 2 • Post-processing and visualization of the flight path, the terrain, the environmental risks (rain, wind, thunderstorm, etc.) and the system state (power income and consumption, state of charge, speeds) via the GUI. • Upload to UAV: The path’s waypoints can be exported and uploaded to the vehicle autopilot via any compatible ground control station3 . Note that due to its fully parametrized system model, MetPASS can not only be used with solar-powered UAVs but with any battery-powered aircraft. For a typical mission, it will usually be leveraged for, first, mission feasibility analysis using historical data, second, to then pre-plan the actual mission using forecasted weather data (including finding the optimal launch time in a certain launch window) and, third, to re-plan the waypoints (including waypoint upload) once updated weather forecasts have become available during the flight. 3.1.2 Performance Optimization MetPASS is implemented in Wolfram Mathematica. To reduce the computation time for complex missions MetPASS integrates a number of performance optimizations: First, previous calculation results, e.g. the heuristics or pre-planned scanned paths, are cached and automatically re-used. Second, compiled C-code instead of much slower Mathematica-code is used for the computationally expensive DP-based point-to-point path planner. Third, parallel computation with theoretically up to j · k cores (j vertices, k altitude levels, see Figure 3) is supported. In addition, more fundamental approaches to save edge cost evaluations, such as discretizing edge costs both with respect to time as well as state of charge, are integrated. However, 3 e.g. QGroundControl, http://www.qgroundcontrol.org while these are interesting concepts, Förster [16] found that they only yield negligible improvements in computational performance. They are thus not further elaborated on here. Figure 9: MetPASS Graphical User Interface. Top left: Visualization controls used to configure all plots. Top right: Sun, wind and path angle indicator. Center: Main visualization with the areas of interest (black), proposed path (red), current aircraft position (white dot), a terrain altitude map (color bar) and wind vector overlay (grey). Bottom: Expected wind speeds/gusts and solar radiation at the aircraft position over the full flight. 3.2 Validation and Preliminary Results This section presents preliminary results to validate the most fundamental level of the multi-goal mission planning capability, i.e. the MetPASS point-to-point planner. To independently verify the system model and the optimization with respect to individual cost components, first, unit tests that only use a subset of cost components and environmental parameters are performed. Second, several costs or environmental parameters are combined and altitude decision making is added. Third, all cost components and environmental effects are combined and the individual cost parameters are tuned using historical test cases. Departure and arrival points are the same as in Figure 3. More details on the validation process are presented by Wirth [40]. Figure 10: First unit test: 2D, i.e. no altitude changes allowed, only time costs, default weather parameters. The iso-cost points form a circle around the start point. SoC and power income fluctuate with the day/night cycle. The airspeed is increased when SoC = 100 % and excess solar power is available. Unit tests In the first unit test, the required flight time is the only active cost. All forecast parameters are set to default values (no wind and clear-sky solar radiation). Figure 10 shows that the dynamic programming algorithm finds the fastest path (an orthodrome projected onto the grid) successfully and the system model produces the expected results. The flight planner increases the airspeed as soon as the battery is fully charged and excess solar power is available. The flight time under these zero-wind conditions is about 106 hours, the total distance is 3650 km. In the second unit test, the flight time is still the only active cost, but the ECMWF wind forecasts are now considered. Figure 11 shows the optimal path with departure on May 30, 2013 10:00 UTC. The threedimensional path optimization under time-varying wind conditions can be observed. The planner optimizes the altitude to leverage the stronger winds at higher altitude such that, overall, vgnd > vair . The flight time reduces from 106 hours without wind to only 53 hours. A unit test combining only power balance costs, namely solar radiation, power consumption and flight time, is illustrated in Figure 12. The applied meteorological parameters are only direct and total solar radiation. The optimal path follows highly radiated areas during the day and the shortest distance at night. The altitude changes show that the power and flight time cost interaction works as desired: At night, the lowest altitude is chosen to minimize the power consumption. During the day, once SoC = 100 % and excess solar power is available, the top altitude level is chosen to store potential energy and to increase the airspeed at a given power consumption. Parameter refinement After successful unit testing, the cost parameters were refined to balance the influence of individual costs on the overall planning outcome. The process starts with estimated initial values that were either recommended Figure 11: Second unit test: 3D, i.e. altitude changes allowed, only time costs, wind conditions taken into account. The flight time is minimized by exploiting winds (including those at higher altitude) such that vgnd > vair . The flight time reduces from 106 hours without wind to only 53 hours. Figure 12: Third unit test: The costs are solar radiation, power consumption and flight time. Only the radiation weather parameter is applied. Both altitude and airspeed are increased when SoC = 100 % and excess solar power is available. The iso-cost points illustrate the influence of the radiation. by meteorologists or by the aircraft operators. Then, multiple historical test cases were used to iteratively fine tune the parameters. Details on the whole process are available in [40]. As shown in Section 4, the final cost parameter sets (Table 2) allow the planner to exploit advantageous winds and regions with low cloud cover. 4 Results Within the context of ETH Zurich’s solar-powered UAV development efforts, MetPASS was used to plan a demanding set of missions that could later often be executed successfully by ETH’s AtlantikSolar UAV. Table 2 presents an overview over these missions and the main parameters. First, AtlantikSolar ’s 81-hour continuous solar-powered loitering mission [30] that represents the current world record in flight endurance for aircraft below 50 kg mass is described. This flight is mainly used to verify the MetPASS system model. Second, results from planning the first-ever autonomous solar-powered flight over the Atlantic are presented. A feasibility analysis is derived. Third, results from planning two large-scale multi-goal inspection missions for glacier monitoring above the Arctic Ocean are discussed. AtlantikSolar performed such a flight over Greenland in summer 2017. 4.1 Loitering Mission: An 81-hour solar-powered flight As described in our previous work [30] and the corresponding video4 , AtlantikSolar performed its worldrecord 81-hour continuous solar powered flight in summer 2015 to demonstrate that today’s UAV technology allows multi-day solar-powered flights with sufficient energetic safety margins. By demonstrating multi-day station-keeping, the flight set an example for telecommunications relay or aerial observation missions as later on shown in [31]. Clearly, such long-endurance missions require careful planning. While the trajectory is fixed, the overall mission feasibility in terms of environmental and energetic safety margins still needs to be assessed and the optimal launch date needs to be found. MetPASS was used to perform both tasks. Using the weather forecast available before the flight, MetPASS showed that a 4-day weather window could be leveraged. Launch was performed on June 14th 2015 at 9:32 local time (8.00 solar time) at Rafz, Switzerland. The flight was completed successfully 81.5 hours later on July 17th at 18:58. While the weather forecasts were accurate for the first three days, they did not predict the thunderstorms and severe winds on the last day. To analyze and verify the system models of Section 2 using correct weather data, Figure 13 thus shows flight data and the MetPASS output based on historical weather data (i.e. an a-posteriori weather analysis of the COSMO-2 model with 2 km spatial and 1 h time resolution). model Given the clear-sky conditions MetPASS predicts a solar power income Psolar close to the theoretical model model maximum represented by the full solar power model Psolar [FM] developed in [28]. The decrease of Psolar due to clouds on the last day is captured correctly by MetPASS. The measured Psolar also closely follows the MetPASS predictions. It only deviates when SoC ≈ 100 % because Psolar is throttled down as per design to protect the batteries. Solar power is therefore only supplied to cover the fluctuating propulsion demands. The required battery power to sustain flight during the night is Pbat = 41.6 W whereas MetPASS estimates model Pbat = 42.4 W using the measured power-curve fitted to Eq. (8). The overall charge and discharge process is thus represented very accurately. The predicted and measured minimum SoCs averaged over all three nights are 39 % and 40 % respectively. Notable deviations are only caused by unexpected evening thermals, which are visible through altitude fluctuations and a decrease in Pbat , during the first and third night. Overall, the MetPASS predictions represent the measurements very well. Note however that given the mostly excellent weather conditions, these energetic results would not even have required taking weather forecasts into account. 4 https://www.youtube.com/watch?v=8m4_NpTQn0E Table 2: Overview over the missions planned using MetPASS. The airplane parameters differ because three UAV versions (AS-1, AS-2 and AS-3) are used: ηsm and ebat improve over time (but ebat was decreased for the Arctic because of the low temperatures), and Pflight only increases because payload (e.g. cameras, satellite communication) was added. The cost parameters also vary: For example, the Atlantic mission (which was planned first, i.e. in 2014) had higher wind thresholds than the other two missions because constant winds were not considered as dangerous over the open ocean, much lower SoC limits because the AS-1 UAV performance was lower, and a lower time cost factor to put more emphasis on being safe rather than fast. In the Arctic missions, (A) represents Bowdoin and (B) represents the six-glacier mission. Mission 81h-flight (Sec. 4.1) Atlantic (Sec. 4.2) Arctic (Sec. 4.3.1/4.3.2) Path, grid and simulation parameters Mission type Loitering Point-to-point Multi-goal Grid points (LxWxH) 1x1x1 40x113x5 A:30x25x1, B:12x9x1 Altitude range (MSL) 600 m 100–1600 m 800 m Simulation time step 600 s 600 s 600 s Data type Model type Long. resolution Lat. resolution Time resolution Meteorological parameters Forecasts Historical COSMO-2 ECMWF HRES 2 km 0.125◦ 2 km 0.125◦ 1h 6h Forecasts ECMWF HRES 0.2◦ 0.1◦ 3h Aircraft (Year) mtot mbat ebat ηsm opt Pflight (vair ) Airplane AS-2 (2015) 6.9 kg 2.92 kg 240 Wh/kg 23.7 % 42 W AS-3 (2017) 7.4 kg 2.92 kg 222 Wh/kg 23.7 % 57 W State of charge Radiation factor Exc. power cons. CAPE Wind Wind gusts Precipitation Humidity Altitude AGL α 0.4 0.8 0 100 6 9 0.1 80 - Time cost factor 0.05 parameters AS-1 (2014) 7.0 kg 2.92 kg 230 Wh/kg 20.0 % 47 W Cost parameters β  α β 0.2 3 0.2 0.05 0.05 3 0.8 0.05 200 1 0 200 2000 3 100 1000 12 3 20 40 15 3 5 20 10 3 1 10 100 5 80 100 0.01  3 3 1 3 3 3 3 5 - α 0.4 0.8 0 100 6 9 0.1 80 600 0.05 β 0.2 0.05 200 1000 12 15 10 100 170  3 3 1 3 3 3 3 5 5 P model solar P solar 250 P model solar [FM] P model bat P bat Power [W] 200 150 100 50 0 -50 SoC [%] 80 Speed [m/s] 15 Altitude [m] 100 800 60 bat model bat 40 v air v model air v wind v model wind CAPE Wind 10 5 0 h h ref 600 2 CAPE CAPE [J/g] 1 0 Costs [-] 10 0 Time SoC Rain Humidity Radiation 10 -1 10 -2 10 20 30 40 50 60 70 80 90 Local solar time [h] Figure 13: Flight data from AtlantikSolar ’s 81-hour continuous solar-powered loitering mission compared to the MetPASS planning results. The historical weather data used here correctly recovers the clear weather for days one to three and strong winds and thunderstorm clouds for the last day. The top plot shows model model solar power income Psolar (measured), Psolar (MetPASS), the clear-sky full model Psolar [FM] from [28], and battery power. The remaining plots show the state of charge, airspeed, wind conditions, the thunderstorm indicator CAPE and the individual MetPASS costs that especially the strong winds and high CAPE cause. Overall, the MetPASS predictions closely fit the flight data. Used with accurate weather data, MetPASS can thus predict and avoid unsafe situations such as the high winds close to thunderstorms on the last day. In contrast, the wind and airspeed plots show more variety due to the current weather. Strong winds are measured and modeled for the first day. In accordance with the ground operators on the field, at t = 15.4 h solar time MetPASS suggests to increase the airspeed to assure vgnd > 0. The winds decrease for the following nights, but then reach up to 11.4 m/s (model) and 16 m/s (measurement) during the last two flight hours. With a nominal airspeed of only vair ≈ 9 m/s, both MetPASS and the ground operators increase vair to keep vair ≥ vwind to avoid the vehicle’s drift-off. In contrast to MetPASS, the ground operators increase the UAV’s altitude to later convert it into more speed if the wind picks up even more. The higher altitude is one reason why the UAV measures higher wind speeds. In addition, as clearly indicated by the convective available potential energy (CAPE), thunderstorm clouds develop. Overall, the costs for wind and thunderstorms are close to their normalized limit (Ċk = 1). The costs correctly represent the significant danger the UAV is in, both because of a possible drift-off and a structural overload due to the strong wind shear and gusts. As mentioned before, these environmental conditions were unfortunately not predicted by the initial weather forecast from four days earlier and the ground crew did not exploit updated weather data. The main lesson learned from this flight is thus that — especially for multi-day missions during which the weather can change significantly — MetPASS’s re-planning capability is key and needs to be used to avoid all unsafe situations for solar aircraft. In this case, the UAV could have simply been landed before the high winds and thunderstorm clouds arrived. 4.2 Point-to-Point Mission: Crossing the Atlantic Ocean Crossing the Atlantic Ocean is a feat that not many small-scale UAVs can accomplish. It is therefore an excellent demonstration case for long-endurance solar UAVs such as AtlantikSolar 5 . The 4000 km route from Newfoundland, Canada to Lisbon, Portugal was selected as AtlantikSolar ’s prime — and design-driving — mission. Clearly, such a flight involves significant challenges. In addition to careful regulatory planning, extensive ground infrastructure and an efficient yet robust system design, a thorough pre-assessment of the exact times and conditions under which the flight is feasible is required. The fragility and weathersusceptibility of solar UAVs also demands that the weather is carefully monitored along the whole route and new trajectories that avoid upcoming severe weather are generated in flight. MetPASS was used for both these tasks. Historical weather data: Determining optimal and marginal flight conditions To identify the full range of conditions under which an Atlantic crossing is feasible, MetPASS was applied to historical ECMWF weather data from 2012 and 2013. Optimal and marginal border-cases together with their performance metrics minimum SoC, total accumulated cost and required flight time were identified. Figure 14 shows an exemplary optimal border case on July 13th, 2012: The chosen route closely follows the orthodrome, with tailwind reducing the flight time by more than 50 % to 52 hours. Because the planner clear-sky chose the launch time correctly, significant cloud cover can be avoided and Psolar ≈ Psolar . The state of charge therefore always stays above 17.2 %. The accumulated cost is C = 2200 and mainly consists of the time cost, which indicates that all other costs usually stay below their threshold. In contrast, the exemplary June 4th, 2013 test case in Figure 15 exhibits marginal conditions. To avoid unsuitable areas (severe cross and headwind, high humidity and low solar radiation), the planner chooses a path that deviates significantly from the orthodrome. The resulting flight time is 86 h. The minimum state of charge is only 7.1 %. Although none of the costs reaches the critical limit βk , the total accumulated cost are C = 17800. Launch is not recommended under these conditions. As described below, a more optimal nearby launch date can easily be determined using MetPASS. 5 The Atlantic crossing inspired the name AtlantikSolar UAV. While found to be technically feasible, the mission was not executed because of regulatory reasons. More specifically, the 4000 km flight in BVLOS conditions would not have received regulatory approval from the transport authorities because of the requirement for sense-and-avoid capabilities on par with humans, which is technically not feasible on today’s UAVs. Figure 14: A transatlantic flight under optimal weather conditions: MetPASS exploits the easterly winds and thereby retrieves an orthodrome-like path with only 52 hours flight time. The SoC barely falls below the threshold. Except for the time cost, all costs are small. This proves that the Atlantic crossing is feasible even with the AtlantikSolar AS-1 UAV if the right launch time is chosen with the help of the planner. Historical weather data: Determining the seasonal dependency of feasibility Due to the variety of weather conditions above the Atlantic it has to be assessed systematically how many and when launch windows for such a flight exist. The seasonal dependency of the performance metrics was thus assessed via MetPASS trajectory optimizations that were run in 6 h steps for the whole range from May 31st to August 8th for which historical ECMWF data was available. Figure 16 shows the minimum SoC and total accumulated cost for each date. It can be inferred that even the first version of the AtlantikSolar UAV (AS-1, see [29]) provides sufficient feasible launch dates from mid-May to end-July when requiring a state of charge margin of 10 %. Obviously, the later versions of AtlantikSolar (AS-2 and AS-3, see [30] and [31]) would improve the performance metrics. Additional analysis yields a minimum and average flight time of 52 h and 78 h respectively versus the 106 h for the no-wind unit test of Section 3.2. Figure 16 can obviously also be used before a flight to decide how optimal a certain launch date is relative to all other launch dates of the season. Using forecasts: Launch-time optimization and real-time route re-planning Figure 17 shows MetPASS’s ability to perform launch time optimizations as well as in-flight route-corrections using periodically-updated forecast data. For the success of a mission, the optimal launch time is as important as the path itself. In Figure 17, the total cost was therefore calculated for a 50 hour time window around April 21st, 2014. The time with minimum total cost is chosen as the launch time and the corresponding path can then be checked and executed by the aircraft. Given the significant weather fluctuations during long-endurance missions, 9 hours after launch the path optimization is restarted with updated weather data but the current aircraft state (retrieved via telemetry) as initial values. This path correction, also illustrated in Figure 17, is repeated whenever new weather data arrives (every 24 hours in this specific case) until the destination is reached. Figure 15: A transatlantic flight under unsuitable weather conditions: The launch happens in heavy winds and under high cloud coverage. In the first night, the SoC is critically low. The total costs for SoC, power consumption, radiation and environmental dangers are an order of magnitude higher than for the optimal weather case. A feasible path is found, but the result clearly encourages to choose a different launch date using MetPASS. Minimum state of charge [%] 20 25000 15 20000 10 15000 10000 5 0 Total accumulated cost [-] 30000 5000 2012 2013 Jun Aug Jul 0 Jun 2012 2013 Aug Jul Figure 16: Feasibility assessment for the Atlantic crossing over the summer seasons of 2012–2013. Minimum SoC (left) and total accumulated cost (right). Solid lines indicate the average of 20 surrounding days. As expected, feasibility is highest around June 21st. Total cost Total Cost [-] 14000 14000 Initial optimal path Updated after 9 hours flight Updated after 33 hours flight Optimal departure time 12000 12000 10000 10000 8000 8000 9 h flight time 6000 6000 33 h flight time 20.4 14 :00 20 Apr 14:00 21.4 00 :00 21 Apr 00:00 21.4 10 :00 21 Apr 10:00 21.4 20 :00 21 Apr 20:00 Figure 17: MetPASS end-to-end mission planning process: The optimal departure time is determined based on current weather forecasts (left). Once the UAV is airborne, the route is replanned periodically using updated weather forecasts (right) and the waypoints are re-sent to the vehicle. 4.3 Multi-Goal Missions: Inspecting Arctic Glaciers Large-scale missions that involve scanning multiple areas of interest can optimally leverage the longendurance capabilities of solar aircraft. For example, the persistent aerial monitoring of Arctic glaciers and the analysis of their flow and calving characteristics is key to understanding global climate change. Previously, glaciologists needed to use expensive on-site transport (e.g. helicopters) and needed to operate in remote places with limited infrastructure (tents without internet) next to the glaciers [21]. The central goal for AtlantikSolar ’s deployment to the Arctic Ocean in summer 2017 was thus to demonstrate a new paradigm for glacier research: The operation of a complete scanning mission, i.e. take-off, inspection of one or even more remote glaciers, and landing, from an easily-accessible home base. The home base was chosen as Qaanaaq, a village at a latitude of 77 ◦ N in Northwest-Greenland and surrounded by multiple fast-flowing Arctic glaciers (Figure 1). A number of scanning missions with increasing complexity were performed, two of which are described below. MetPASS performed both the initial feasibility assessment as well as the launch date and route optimization over the Arctic Ocean. 4.3.1 Two-glacier mission: Bowdoin Glacier The inspection mission from Qaanaaq to Bowdoin glacier was performed on July 3rd 2017. After days of fog and excessively strong Arctic winds, clear weather with only little high altitude clouds followed. Using weather forecasts from 15 hours before takeoff, a launch window was found, a path was generated and take-off was performed at 16:26 local time (13.76h solar time). The mission objective was to perform two different scans: One higher altitude lawn-mower scan to observe possible glacier calving events at Bowdoin glacier, and one low-altitude station-keeping scan at base. The corresponding MetPASS path planned with the parameters of Table 2 (i.e. 30 slices times 25 vertices per grid) is shown in Figure 18. In contrast to our previous work [41], the planner was extended with the ability to avoid the terrain represented by a 30 m resolution Digital Elevation Model. In addition, while by default the departure and arrival points are initialized at the center of the first and last slice of the grid (see Figure 3), this can lead to large amounts of grid points over inaccessible terrain. Automatic grid shifting, which maximizes the amount of grid points over accessible areas such as the open ocean, was thus implemented. The optimal path found is a shortest-time path that stays safe of terrain. In other words, the cost function components time and terrain dominate the path optimization. This is due to, first, the narrow fjord-like terrain which severely limits the path choices when assuming a fixed altitude. Second, due to the relatively small scale of the planning problem (compared e.g. to Section 4.2) the weather is rather homogeneous over the whole area and exploiting these small weather differences yields less cost advantages than following a time-optimal path. Figure 19 compares the flight data recorded by AtlantikSolar against the MetPASS predictions. On the one model hand, solar and battery power Psolar and Pbat are again represented accurately. We measure Psolar < Psolar for t = [13.8 h, 15.6 h] because SoC ≈ 100 % and Psolar is thus again throttled down by design. The battery model discharge starts around 18.0 h solar time, where Pbat < Pbat because of upcoming high altitude clouds and the setting sun. On the other hand, the wind forecast is subject to significant errors: At t ≈ 16.8 h, model the measured and predicted winds are vwind = 13.3 m/s and vwind = 8.0 m/s (at the northern scan path section at Bowdoin, Figure 18). The time required to complete each flight phase thus differs between the model and flight data. More importantly, wind speeds of this magnitude are a significant threat to the model = 8.0 m/s had already been accounted for by flying aircraft. While the predicted maximum winds of vwind opt at vair ≈ 11 m/s > vair , the flight would have been marked as infeasible by MetPASS had the real wind speeds been known. Again, the higher wind speeds would have been predicted by the forecasts available 3 h before launch. A lesson learned from this flight is therefore that, again, the most up-to-date weather data always needs to be used. More generally speaking, only high quality weather data brings tangible benefits when planning such missions. Overall, using the MetPASS flight plan, this first-ever glacier inspection mission with a solar-powered UAV in the Arctic could be executed successfully (Figure 20). As predicted, the main costs or threats for the airplane were the high wind speeds at t = [15.5 h, 17.0 h] and the high terrain (t = [15.8 h, 16.8 h]), which the MetPASS path avoided successfully were possible. Other environmental costs were not significant. The overall flight duration was 4:52 h during which 230 km were covered. Even after that, the batteries were still almost full (SoC = 97 %). The whole mission was performed fully autonomously, i.e. without any pilot intervention. The scientific results provided to glaciologists were a full 3D reconstruction of Bowdoin glacier (Figure 20b) which showed a developing crack that led to a significant glacier calving event only days after the flight. Overall, the mission objective of demonstrating a fully-autonomous end-to-end aerial scanning mission of remote glaciers from a local home base could thus be fulfilled successfully. 4.3.2 Six-glacier mission MetPASS was also leveraged to plan a multi-goal mission involving the aerial scanning of the six Arctic glaciers A--F in Figure 1. The settings in Table 2 were employed, i.e. the point-to-point grid was reduced to 12 slices and 9 vertices to guarantee low calculation times. The mission was started at 2:30 local time (4:30 Figure 18: The AtlantikSolar glacier inspection mission above the Arctic Ocean planned by MetPASS. The small scale of the problem and the narrow fjords clearly reduce the path choices. The result is thus a compromise that yields the shortest path and avoids terrain. UTC) on July 6th 2017. Two glaciers (Heilprin North and Heilprin South) were scanned successfully, but due to state estimation issues that occurred after 7 hours of flight the scanning of further glaciers had to be canceled. Although the mission could not be completed successfully, the topology of such a solar-powered multi-glacier scanning mission in the Arctic is of course still instructive and is thus described below. Figure 21 shows the optimal path calculated by MetPASS. The total path covers 580 km distance in 16.3 h flight time. The aircraft position is shown both at 6:36 UTC and 17:00 UTC, once overlaid with a total cloud cover map and once with a terrain map. The cloud cover and thus sun radiation situation is very favorable, however, significant winds are indicated next to the areas of interest. The operators therefore increase the opt flight speed from the optimal vair = 8.6 m/s to vair = 9.8 m/s while traveling and vair = 11 m/s inside the areas of interest. The optimal path found by MetPASS is near counter-clockwise and thus clearly exploits the fact that the meso-scale winds exhibit a counter-clockwise rotation. In addition, when the straight-line path between two areas of interest would result in headwind, the aircraft also deviates from the straight line path (i.e. at around t=6:36 UTC, see Figure 21 top left, a path south of the straight line path allows to avoid headwinds). The flight speed and wind plots therefore show that the aircraft is progressing fast. More importantly, the path manages to completely avoid dangerous high-wind areas (except at t=11.2h after launch). The power income is high but is, as before, heavily influenced by the aircraft heading due to the low sun elevation in the Arctic. The state of charge never drops below 68 % despite launching around solar midnight, thus confirming the potential of solar-powered flight in Arctic regions. The total accumulated cost opt is C = 5595. The largest costs are time, excess power consumption (caused when vair > vair ), and altitude Mission phases: Launch Model Attitude [°] Flight 180 90 0 -90 -180 To Glacier To Glacier Scan #1 (glacier) Scan #1 (glacier) Return Return Scan #2 (base) Scan #2 (base) Yaw model Yaw 150 Power [W] 100 50 0 -50 P model solar P solar -100 P model [FM] solar P bat P model bat Costs [-] Altitude [m] Speed [m/s] SoC [%] 100 15 model bat bat 90 v air v model air v wind v model wind 10 5 0 1000 h h ref 500 0 0.2 Time Wind Terrain Power 0.1 0 14 14.5 15 15.5 16 16.5 17 17.5 18 18.5 Local solar time [h] Figure 19: The 4:52 h and 230 km glacier inspection mission performed by AtlantikSolar on July 3rd 2017 above the Arctic Ocean. The flight phases are indicated in blue for the flight data and in red for the MetPASS plan. They include start at the base in Qaanaaq (Greenland), traveling to and scanning Bowdoin glacier and returning to base to perform a second aerial scan before landing. The MetPASS plan uses weather forecasts from 15 hours before launch. The energetic states are represented well, but erroneous wind forecasts cause significant differences in the time required to complete each individual flight phase. To preserve comparability, the MetPASS plan was therefore adapted to the same duration as the actual flight (only through shortening the second scanning phase a-posteriori). (a) (b) Figure 20: Left: The AtlantikSolar UAV operating over the Arctic sea ice next to Bowdoin glacier. Right: The full 3D construction (made with the commercially available Pix4D software) of Bowdoin glacier and the scan path planned by MetPASS. The scan area of 7 km2 was covered with 75 % lateral overlap from 700 m AGL, which took 53 minutes and covered 47.7 km. AGL (due to flight above high terrain next to the glaciers). Overall, the combination of good weather and the path optimized by MetPASS allows to avoid environmental risks and only results in acceptable costs that either increase flight safety (increased airspeed and thus power consumption) or cannot be avoided (altitude AGL next to the glaciers and time). To assess the advantages of this optimal path versus more naive solutions, Table 3 compares the corresponding path metrics cost, distance and time. As expected, the MetPASS path is cost-optimal. Although it is very similar to the counter-clockwise path, the fact that it starts visiting the nodes in the order EF... instead of FE... allows it to better avoid certain bad weather phenomena (in this case strong wind) and altitude AGL costs. However, the total cost difference to the naive solutions is only one percent. The reason is that the weather conditions are favorable and no critical environmental risks (e.g. thunderstorms or precipitation) exist that would be avoided by MetPASS but that would incur high costs in a naive path. The overall distance flown is also similar due to the similarity between the paths. In comparison to the clockwise path, which always commands the aircraft to fly against the counter-clockwise-rotating global winds, the MetPASS path however features a 5 % shorter overall flight time. Note that in such good weather conditions, other less trivial paths (i.e. those not strictly clockwise or counter-clockwise) always result in additional flight time and thus cost and therefore cannot be optimal. Table 3: The optimal path found by MetPASS against the naive solutions. Cost Time Distance Order 4.4 MetPASS Clockwise Counter-clockwise 5595 16.3 h 580 km EFDCBA 5634 (+0.7 %) 17.1 h (+4.9 %) 579 km (-0.2 %) ABCDEF 5650 (+1.0 %) 16.2 h (-0.6 %) 572 km (-1.4 %) FEDCBA Computational Performance Analysis The methods and framework developed in this paper shall be usable for pre-flight mission planning as well as in-flight re-planning. The required computation time, which is shown in Table 4 for the missions presented before, therefore plays a crucial role. First, station-keeping missions do not require actual route planning but only straightforward system state propagation. Even multi-day station-keeping missions such as the 81hflight can therefore be calculated in a couple of seconds. Second, large-scale point-to-point missions such as Total cloud cover Terrain Thu 6 Jul 2017 06:36:00UTC (Flight time: 2.0h) Thu 6 Jul 2017 17:00:00UTC (Flight time: 12.5h) 78.0 78.0 77.8 77.8 [%] 100 77.4 Base Terrain altitude [m] 77.6 77.6 Base 77.4 80 60 77.2 77.2 40 20 0 77.0 77.0 5m/s -71 -70 -69 -68 -67 -66 -65 -64 Flight speed [m/s] vair 15 5m/s -71 -70 -69 -68 -67 wind speed 10 -64 -6 6 max. gusts last 3 h gusts - wind gusts threshold 8 10 -65 Wind [m/s] vgnd -66 wind threshold 6 4 5 2 0 1.0 0 5 10 [-] 15 [h] 0 State of charge 10 15 [h] Power 150 100 0.6 0.4 50 threshold 0 limit 0.2 0 5 10 15 [h] cape wind gusts precipitation power consumption excess power consumption battery power solar power income 50 0 Current environmental cost 0.05 [1/s] 5 [-] humidity 4000 0.03 10 15 [h] Accumulated general cost power cons. SoC time rad. factor altitude AGL environmental 5000 0.04 3000 0.02 2000 0.01 0 5 [W] 0.8 0.0 0 1000 5 10 Time since launch [h] 15 [h] 0 0 5 10 Time since launch [h] 15 [h] Figure 21: The six-glacier scan mission in the Arctic optimized with MetPASS. The path is shown against cloud cover (top left) and terrain (top right). The weather conditions are favorable: The environmental costs are close to zero and the main costs are excess power consumption (due to winds), altitude above ground and time. Despite strong winds the SoC never dips below 68 %, indicating the potential of solar-powered flight in Arctic regions. the 4000 km trajectory across the Atlantic Ocean naturally require point-to-point route optimization. Under the parameters of Table 2, MetPASS completes the route optimization in less than 10 minutes. Third, the multi-goal aerial inspection missions require the scan path optimization, heuristics calculation, and an inter-goal optimization that includes either nheuristic or nnaive point-to-point route optimizations depending on whether the heuristic is used or not. The two-glacier scan mission is optimized within 11 minutes. The heuristic does not provide a computational advantage for this case because a) it takes much longer to calculate the heuristic than all point-to-point optimizations and b) the heuristic does not even reduce the number of edge cost evaluations. For the six-glacier mission, the situation changes drastically: The 9 minutes invested to calculate the heuristic allow to reduce the required edge cost calculations by 94 %. The total calculation time ttotal with heuristic is 17 minutes6 and is thus, based on a simple extrapolation, 8 times shorter than if all edge cost evaluations had to be performed. Table 4: Computation times with a 2.8 GHz quad-core Intel Xeon E3-1505M CPU with 16GB RAM and the parameters from Table 2. The total computation time ttotal consists of the scan path and heuristic computation times tscanpaths and theuristic and the route optimization time topt (which includes the inter-goal and point-to-point optimization). The six-glacier mission benefits significantly from using the heuristic. Mission ttotal , of which • tscanpaths • theuristic • topt nheuristic nnaive nheuristic/nnaive 81h-Flight Atlantic Arctic Two glaciers Arctic Six glaciers 16 s 16 s - 462 s 462 s - 690 s 1s 579 s 110 s 6 6 1.0 1010 s 3s 538 s 469 s 161 2676 0.06 Figure 22a analyzes the effect of the heuristic in more detail. To assess how accurate our heuristic is we define the heuristic quality between vertices v and w as qheuristic = hvw heuristic value . = cvw actual cost (13) Here, qheuristic < 1 must hold for hvw to be a valid heuristic, but the closer qheuristic gets to one the earlier suboptimal paths can be sorted out. The quality of the heuristic implemented in this work was determined through 600 randomized point-to-point route finding problems for which hvw and cvw were computed. In all experiments, the departure time (and thus the weather) was chosen randomly within a 3-day window. The departure and arrival coordinates were chosen randomly across Europe but within 10–50 km of each other. Overall, the mean heuristic quality is only 20 %. Recall however that the heuristic is calculated as the straight line path under the best weather conditions in the whole time interval and area in which the flight happens. Often, there will be a tiny area with good weather in otherwise much worse weather such that hvw is small but cvw is large. Figure 22b evaluates the influence of the heuristic quality qheuristic on the number of edge cost evaluations. The analysis consists of using the developed label correcting algorithm to solve 10 randomly generated problems for each combination of qheuristic and the number of areas of interest N . The resulting averages show that with increasing N the heuristic becomes significantly more effective at reducing the required edge cost calculations. While the number of edge cost function evaluations is heavily dependent on the problem statement and the weather data, it is clear that especially large problems can be sped up if future research improves the heuristic. For example, for N = 7 improving qheuristic to 70 % allows an order-ofmagnitude reduction of edge cost computations. All in all, as shown in Table 4, MetPASS however already calculates station-keeping, point-to-point and large-scale multi-goal missions at sufficient grid resolution in 6 Note however that, compared to the two-glacier mission, the grid resolution was reduced in return for a fast computation. 4 Edge cost evaluations Number of occurences 10 150 Mean~0.2 100 50 0 0 0.2 0.4 0.6 Heuristic quality 0.8 1.0 (a) The heuristic quality distribution computed through 600 experiments with random boundary conditions (departure and arrival coordinates as well as start time). The mean heuristic quality is 20 percent. 1000 x N=7 x N=6 x x x x x x x N=5 100 x N=4 x x x x N=3 x x x N=2 x x 10 0.0 x x 0.2 x x x x x x x x xx x x x x x x x x x x x x x x x x 0.6 0.8 0.4 x Heuristic quality (b) The number of required edge cost evaluations as a function of heuristic quality and areas of interest N . Each data point was obtained by simulating 10 randomly generated problems. Figure 22: Heuristic quality and resulting performance gains through a reduction in edge cost evaluations in MetPASS. below 20 minutes. The approach is thus sufficiently fast for mission analysis, pre-flight planning and in-flight re-planning. 5 Conclusion This paper presented MetPASS, the Meteorology-aware Path Planning and Analysis Framework for Solarpowered UAVs. Using a combination of dynamic programming techniques and an A*-search-algorithm with a custom heuristic, optimal paths can be generated for large-scale station-keeping, point-to-point and multigoal aerial inspection missions. In contrast to previous literature, MetPASS is the first framework which considers all aspects that influence the safety and efficiency of solar-powered flight: By incorporating historical or forecasted meteorological data, MetPASS avoids environmental risks (thunderstorms, rain, humidity and icing, strong winds and wind gusts) and exploits advantageous regions (high sun radiation and tailwind). In addition, it avoids system risks such as low battery state of charge and returns safe paths through cluttered terrain. The loop to actual flight operations is closed by allowing direct waypoint upload to the aerial vehicle. MetPASS has been applied for the feasibility analysis, pre-planning and re-planning of three different missions: AtlantikSolar ’s continuous 2338 km and 81-hour world endurance record flight, a hypothetical 4000 km Atlantic crossing from Newfoundland to Portugal, and a 230 km two-glacier and 580 km six-glacier remote sensing mission above the Arctic Ocean near Greenland. These missions have clearly shown that frameworks such as MetPASS, which combine an aircraft system model with meteorological data in a mathematically structured way, are indispensable for the reliable execution of large-scale solar-powered UAV missions. In addition, the following characteristics and lessons learned can be derived: • Quality of weather data: Only high quality weather data brings tangible benefits in mission planning. High confidence in the weather forecasts is thus required and the most up-to-date forecasts always have to be used. Wrong weather data can even lead to higher costs than the naive paths. • Cost advantages to naive solutions: The cost advantages (i.e. safety and performance) generated by incorporating weather data decrease with – Less weather variability, because less areas with above-average weather conditions exist and can be exploited by MetPASS. This especially applies to good macro weather situations. – Smaller planning area, which also decreases weather variability. – High or cluttered terrain, which limits the valid path choices. References [1] AeroVironment. AeroVironment Solar-Powered Puma AE Small Unmanned Aircraft Achieves Continuous Flight for More Than Nine Hours. Press release, August 12th 2013. http://www.avinc.com/resources/press_release/ aerovironment-solar-powered-puma-ae-small-unmanned-aircraft-achieves-contin. [2] Jacques Ambühl. Sailing the virtual bol d’or. Scientific Report MeteoSwiss 98, MeteoSwiss, 1998. p. 44. [3] Richard Bellman. On a routing problem. Quarterly of applied mathematics, 16(1):87–90, 1958. [4] Richard Bellman. Dynamic Programming Treatment of the Travelling Salesman Problem. Journal of the ACM (JACM), (1):61–63, 1962. [5] Richard Bellman. Dynamic Programming. Courier Corporation, 2013. First published by Princeton University Press, Princeton, New Jersey, 1957. [6] Dimitri P. Bertsekas. Dynamic Programming and Optimal Control, Volume 1. Athena Scientific, Belmont, MA, 3 edition, 1995. [7] British Broadcasting Corporation (BBC). Solar Impulse lands in California after Pacific Crossing, April 2016. http://www.bbc.com/news/science-environment-36122618. Retrieved 10/12/2017. [8] ByeAerospace. Industry First: Solar-Electric Silent Falcon Prepares for Initial Customer Orders. Press release, March 15th 2015. [9] Ismail Chabini and Shan Lan. Adaptations of the A* Algorithm for the Computation of Fastest Paths in Deterministic Discrete-Time Dynamic Networks. IEEE Transactions on Intelligent Transportation Systems, 3(1):60–74, 2002. [10] Anjan Chakrabarty and Jack Langelaan. UAV Flight Path Planning in Time Varying Complex WindFields. In American Control Conference (ACC), 2013. [11] Alan Cocconi. AC Propulsion’s solar electric powered SoLong UAV. Technical report, AC Propulsion, 2005. Retrieved from https://archive.org/details/ACPropulsionSolongUAV2005. [12] N.J. Colella and G.S. Wenneker. Pathfinder: Developing a solar rechargeable aircraft. IEEE Potentials, 15(1):18–23, 1996. [13] C. Cornwall. Solar equations document. Technical report, Earth System Research Laboratory, 2014. [14] Ran Dai. Path planning of solar-powered unmanned aerial vehicles at low altitude. In Circuits and Systems (MWSCAS), 2013 IEEE 56th International Midwest Symposium on, pages 693–696. IEEE, 2013. [15] Hagen S. Fischer and Hans Gilgen. DACHRad - Berechnung der direkten Sonneneinstrahlung in Deutschland, sterreich und der Schweiz. Bulletin of the Geobotanical Institute, ETH Zurich, 2002. [16] Julian Förster. Multi-Goal Meteorological Path Planning for a Solar-Powered Unmanned Aerial Vehicle. Semester thesis, ETH Zurich, 2017. [17] Horst W. Hamacher, Stefan Ruzika, and Stevanus A. Tjandra. Algorithms for time-dependent bicriteria shortest path problems. Discrete Optimization, 3(3):238–254, 2006. [18] Peter E. Hart, Nils J. Nilsson, and Bertram Raphael. A Formal Basis for the Heuristic Determination of Minimum Cost Paths. IEEE Transactions on Systems Science and Cybernetics, 4(2):100–107, 1968. [19] Karla L. Hoffman, Manfred Padberg, and Giovanni Rinaldi. Traveling Salesman Problem, pages 1573– 1578. Springer US, Boston, MA, 2013. [20] Saghar Hosseini, Ran Dai, and Mehran Mesbahi. Optimal Path Planning and Power Allocation for a Long Endurance Solar-Powered UAV. In American Control Conference (ACC), 2013, pages 2588–2593. IEEE, 2013. [21] G. Jouvet, Y. Weidmann, J. Seguinot, M. Funk, T. Abe, D. Sakakibara, H. Seddik, and S. Sugiyama. Initiation of a major calving event on the Bowdoin Glacier captured by UAV photogrammetry. The Cryosphere, 11(2):911–921, 2017. [22] Andrew Klesh and Pierre Kabamba. Energy-optimal path planning for solar-powered aircraft in level flight. 2007. [23] Andrew T. Klesh and Pierre T. Kabamba. Solar-Powered Aircraft: Energy-Optimal Path Planning and Perpetual Endurance. 32, 2009. [24] Chryssi Malandraki and Mark S. Daskin. Time Dependent Vehicle Routing Problems: Formulations, Properties and Heuristic Algorithms. Transportation Science, 26(3):185–200, 1992. [25] Chryssi Malandraki and Robert B. Dial. A restricted dynamic programming heuristic algorithm for the time dependent traveling salesman problem. European Journal of Operational Research, 90(94):45–55, 1996. [26] Alexander Jairo Rojas Malaver, Luis Felipe Gonzalez, Nunzio Motta, and Tommaso Francesco Villa. Design and Flight Testing of an Integrated Solar Powered UAV and WSN for Remote Gas Sensing. In IEEE Aerospace Conference, March 7–14th 2015. [27] André Noth. Design of Solar Powered Airplanes for Continuous Flight. PhD thesis, ETH Zurich, 2008. [28] Philipp Oettershagen. High-Fidelity Solar Power Income Modeling for Solar-Electric UAVs: Development and Flight Test Based Verification. Technical report, ETH Zurich, 2017. Available at http://arxiv.org/abs/1703.07385. [29] Philipp Oettershagen, Amir Melzer, Thomas Mantel, Konrad Rudin, Rainer Lotz, Dieter Siebenmann, Stefan Leutenegger, Kostas Alexis, and Roland Siegwart. A Solar-Powered Hand-Launchable UAV for Low-Altitude Multi-Day Continuous Flight. In IEEE International Conference on Robotics and Automation (ICRA), 2015. [30] Philipp Oettershagen, Amir Melzer, Thomas Mantel, Konrad Rudin, Thomas Stastny, Bartosz Wawrzacz, Timo Hinzmann, Stefan Leutenegger, Kostas Alexis, and Roland Siegwart. Design of small hand-launched solar-powered UAVs: From concept study to a multi-day world endurance record flight. Journal of Field Robotics (JFR), 34(7):1352–1377, October 2017. [31] Philipp Oettershagen, Thomas Stastny, Timo Hinzmann, Konrad Rudin, Thomas Mantel, Amir Melzer, Bartosz Wawrzacz, Gregory Hitz, and Roland Siegwart. Robotic Technologies for Solar-Powered UAVs: Fully-Autonomous Updraft-Aware Aerial Sensing for Multi-Day Search-and-Rescue Missions. Journal of Field Robotics (JFR), 2018. [32] Bandu N. Pamadi. Performance, Stability, Dynamics, and Control of Airplanes. AIAA Education Series, 2nd edition edition, 2004. [33] QinetiQ. QinetiQ files for three world records for its Zephyr Solar powered UAV. Press release, August 24th 2010. http://www.qinetiq.com/media/news/releases/Pages/three-world-records.aspx. [34] Juan Carlos Rubio and Sean Kragelund. The trans-pacific crossing: Long range adaptive path planning for UAVs through variable wind fields. In Digital Avionics Systems Conference, 2003. DASC’03. The 22nd, volume 2, pages 8–B. IEEE, 2003. [35] Juan Carlos Rubio, Juris Vagners, and Rolf Rysdyk. Adaptive path planning for autonomous UAV oceanic search missions. In AIAA 1st Intelligent Systems Technical Conference, pages 20–22, 2004. [36] Johannes Schneider. The time-dependent traveling salesman problem. Physica A: Statistical Mechanics and its Applications, 314(1-4):151–155, 2002. [37] Sara Spangelo, Elmer Gilbert, Andy Klesh, Pierre Kabamba, and Anouck Girard. Periodic energyoptimal path planning for solar-powered aircraft. 2009. [38] Leonard J Testa, Albert C Esterline, Gerry V Dozier, and Abdollah Homaifar. A Comparison of Operators for Solving Time Dependent Traveling Salesman Problems Using Genetic Algorithms. 2000. [39] A Weider, H Levy, I Regev, L Ankri, T Goldenberg, Y Ehrlich, A Vladimirsky, Z Yosef, and M Cohen. SunSailor: Solar powered UAV. Technical report, Aerospace Engineering Faculty, Technion, 2007. [40] Lukas Wirth. Meteorological path planning using Dynamic Programming for a solar-powered Atlanticcrossing Unmanned Aerial Vehicle. Master’s thesis, ETH Zurich, 2014. [41] Lukas Wirth, Philipp Oettershagen, Jacques Ambuehl, and Roland Siegwart. Meteorological Path Planning Using Dynamic Programming for a Solar-Powered UAV. In IEEE Aerospace Conference, 2015.
2cs.AI
arXiv:1709.09723v1 [stat.ME] 27 Sep 2017 1 Estimating a Separably-Markov Random Field (SMuRF) from Binary Observations Yingzhuo Zhang1 , Noa Malem-Shinitski2 , Stephen A Allsop3 , Kay Tye3 and Demba Ba1 1 Harvard University, John A. Paulson School of Engineering and Applied Sciences. 2 Technische Universität Berlin. 3 Massachusetts Institute of Technology, Department of Brain and Cognitive Sciences. Keywords: Spike rasters, Dynamics, Random field, Bayesian Estimation, associative learning. Abstract A fundamental problem in neuroscience is to characterize the dynamics of spiking from the neurons in a circuit that is involved in learning about a stimulus or a contingency. A key limitation of current methods to analyze neural spiking data is the need to collapse neural activity over time or trials, which may cause the loss of information pertinent to understanding the function of a neuron or circuit. We introduce a new method that can determine not only the trial-to-trial dynamics that accompany the learning of a contingency by a neuron, but also the latency of this learning with respect to the onset of a conditioned stimulus. The backbone of the method is a separable two-dimensional (2D) random field (RF) model of neural spike rasters, in which the joint conditional intensity function of a neuron over time and trials depends on two latent Markovian state sequences that evolve separately but in parallel. Classical tools to estimate state-space models cannot be applied readily to our 2D separable RF model. We develop efficient statistical and computational tools to estimate the parameters of the separable 2D RF model. We apply these to data collected from neurons in the pre-frontal cortex (PFC) in an experiment designed to characterize the neural underpinnings of the associative learning of fear in mice. Overall, the separable 2D RF model provides a detailed, interpretable, characterization of the dynamics of neural spiking that accompany the learning of a contingency. 1 Introduction A fundamental problem in the analysis of electrophysiological data from neuroscience experiments is to determine the trial, and time within said trial, when a neuron or circuit first exhibits a conditioned response to a stimulus. This is a challenging problem because neural spike rasters resulting from such experiments can exhibit variability both within a given trial and across trials (Czanner et al., 2008). Fear conditioning experi- 2 ments (Allsop et al., 2014) are a prime example of a scenario when this situation arises: a neutral stimulus, present across all trials of an experiment, gives rises to stereotypical within-trial spiking dynamics, while the associated aversive stimulus leads to changes in spiking dynamics across a subset of the trials. State-of-the-art methods for analyzing neural spike rasters fall primarily within two classes. The most pervasive class of such methods neglect the inherent two-dimensional nature of neural spike rasters by aggregating the raster data either across time or trials, and subsequently applying techniques applicable to one-dimensional signals (Smith & Brown, 2003; Zammit-Mangion et al., 2012; Yuan et al., 2012; Scott & Pillow, 2012). In contrast to these one-dimensional methods, two-dimensional methods model both the within and cross-trial dynamics of neural spiking (Czanner et al., 2008; Rad & Paninski, 2010). Within the class of one-dimensional methods, the past decade has seen a growing interest in approaches based on state-space models of neural spiking activity. These approaches treat neural spiking data as realizations of a stochastic point process whose conditional intensity function obeys a stochastic smoothness constraint in the form of a Markov process followed by a nonlinearity. The main challenge is to estimate the parameters of the model, and various solutions have been proposed towards this end (Smith & Brown, 2003; Zammit-Mangion et al., 2012; Yuan et al., 2012; Scott & Pillow, 2012). The main drawback of one-dimensional approaches applied to the analysis of neural spike rasters is the need, preceding analysis, for aggregation across one of the dimensions. Among one-dimensional methods, non-parametric methods based on rank tests (e.g. Wilcoxon rank sum test) have been the most popular, primarily due to their ease of application. In addition to the need to collapse neural activity of time 3 or trials, two common pitfalls of non-parametric methods are their reliance on large sample assumptions to justify comparing neural spiking rates, and the need to correct for multiple comparisons. For instance, tests that rely on estimates of the neural spiking rate based on empirical averages are hard to justify when it is of interest to characterize the dynamics of neural spiking at the millisecond time scale. Consider a neural spike raster for which it is of interest to assess differences in instantaneous spiking rates between distinct time/trial pair. At the millisecond time scale, there would only be one observation per time/trial pair, violating the large sample assumptions that such nonparametric methods rely upon. To the best of our knowledge, the work of (Czanner et al., 2008) remains the most successful attempt to characterize simultaneously the within and cross-trial dynamics of neural spiking. This approach uses a state-space model of the cross-trial dynamics, in conjunction with a parametric model of the within-trial dynamics. The use of a parametric model for the within-trial dynamics is convenient because it enables the estimation of the model parameters by Expectation-Maximization (EM), using a combination of point-process filtering and smoothing in the E-step (to fill-in the missing cross-trial effect), and an M-step for the within-trial parameters that resembles a GLM (Truccolo et al., 2005). The main drawbacks of this approach are, on the one hand, the high-dimensionality of the state-space model that captures the cross-trial dynamics, and on the other hand the lack of a simple interpretation, as in the one-dimensional models (Smith & Brown, 2003; Zammit-Mangion et al., 2012; Yuan et al., 2012), for the state sequence. Lastly, a two-dimensional approach based on Gaussian processes was proposed in (Rad & Paninski, 2010). One advantage of this approach, which is based on a Gaussian process prior of the neural spiking rate surface, 4 is its ability to model the interaction between the two dimensions through the use of a two dimensional kernel. As is common with kernel methods, it does not scale well to multiple dimensions. We propose a two-dimensional (2D) random field (RF) model of neural spike rasters– termed Separably-Markov Random Field (SMuRF)–in which the joint conditional intensity function of a neuron over time and trials depends on two latent Markovian state sequences that evolve separately but in parallel. Conventional methods for estimating state-space models from binary observations (Smith & Brown, 2003; Zammit-Mangion et al., 2012; Yuan et al., 2012) are not applicable to SMuRF. We derive a Monte Carlo Expectation-Maximization algorithm to maximize the marginal likelihood of observed data under the SMuRF model. In the E-step, we leverage the Polya-Gamma (Polson et al., 2013) representation of Bernoulli random variables to generate samples from the joint posterior distribution of the state sequences by Gibbs sampling. A similar strategy was adopted in (Scott & Pillow, 2012) for a one-dimensional state-space model. The sampler uses a highly efficient forward-filtering backward-sampling algorithm for which the forward step can be implemented exactly and elegantly as Kalman filter, while the backward step uses Bayes’ rule to correct the filter samples. The SMuRF model obviates the need for aggregation across either time or trials, and yields a low-dimensional 2D characterization of neural spike rasters that is interpretable in the sense that the posterior of the two state sequences capture the variability within and across trials respectively. Moreover, being model-based, the SMuRF model, unlike non-parametric methods, yields a characterization of the joint posterior (over all trials and time within a trial) distribution of the instantaneous rate of spiking, thus allowing us to precisely 5 determine the dynamics of neural spiking that accompany the learning of a contingency. To demonstrate this, we apply the model to data collected from neurons in the pre-frontal cortex (PFC) in an experiment designed to characterize the neural underpinnings of the associative learning of fear in mice. We find that the trial at which the cortical neurons begin to exhibit a conditioned response to the auditory conditioned stimulus is robust across cells, occurring 3 to 4 trials into the conditioning period. We also find that the time with respect to conditioned stimulus onset when we observe a significant change in neural spiking compared to baseline activity varies significantly from cell to cell, occurring between 20 to 600 ms after conditioned stimulus onset. These findings are likely reflective of the variability in synaptic strength and connectivity that accompany learning, as well as the location of the neurons in the population. The rest of our treatment begins in Section 2 where we motivate the SMuRF model, define it and introduce our notation. In Section 3, we present the Monte-Carlo EM algorithm for parameter estimation in the SMuRF model, as well as our process for inferring the dynamics of neural spiking that accompany the learning of a contingency by a neuron. The reader may find derivations relevant to this section in the Appendix. We present an application to the cortical data in Section 4, and conclude in Section 5. 2 Notation and SMuRF model We begin this section with a continuous-time point-process formalism of a neural spike raster, characterized by a trial-dependent conditional intensity function (CIF). Then, we introduce the SMuRF model, a model for the discrete-time version of the CIF. 6 2.1 Continuous-time point-process observation model We consider an experiment that consists of R successive trials. During each trial, we record the activity of a neuronal spiking unit. We assume, without loss of generality, that the duration of the observation interval during each trial is (0, T ]. For trial r, r = 1, · · · , R, let the sequence 0 < tr,s < · · · < tr,Sr < T correspond to the times of occurrence of events from the neuronal unit, that is to say the times when the membrane r is the realpotential of the neuron crosses a given threshold. We assume that {tr,s }Ss=1 ization in (0, T ] of a stochastic point-process with counting process Nr (t) = Rt 0 dNr (u), r where dNr (t) is the indicator function in (0, T ] of {tr,s }Ss=1 . A point-process is fully characterized by its CIF. Let λr (t|Ht ) denote the trial-dependent CIF of dNr (t) defined as P [Nr (t + ∆) − Nr (t) = 1|Ht ] , ∆→0 ∆ λr (t|Ht ) = lim (1) where Ht is the history of the point process up to time t. We denote by {∆Nk,r }K,R k=1,r=1 , the discrete-time process obtained by sampling dNr (t) at a resolution of ∆, K = T  . Let {λk,r }K,R k=1,r=1 denote the discrete-time, trial∆ dependent, CIF of the neuron. 2.2 Separably-Markov Random Field (SMuRF) model of within and cross-trial neural spiking dynamics K×R Definition 1 Let {yk,r }K,R be a collection of random variables. We say k=1,r=1 ∈ R that this collection is a separable random field if ∃ x ∈ RK , z ∈ RR s.t. ∀k, r ∃ unique (xk , zr ) ∈ x × z s.t. yk,r |(x, z) ∼ f (xk , zr ). 7 If in addition x and z are Markov processes, we say that {yk,r }K,R k=1,r=1 is a separablyMarkov random field or “SMuRF”. K×R A 2D random field {yk,r }K,R is a collection of random variables ink=1,r=1 ∈ R dexed over a subset of N+ × N+ . We call this collection a separable field if there exists latent random vectors x and z (each indexed over a subset of N+ ) such that {yk,r }K,R k=1,r=1 are independent conditioned on x and z and only a function of the outer product between x and z. If, in addition, x and z are Markov, we say that the field is a SMuRF. Intuitively, a separable random field is a random field that admits a stochastic rank-one decomposition. We propose the following SMuRF model of the discrete-time, trial-dependent, CIF {λk,r }K,R k=1,r=1 of a neuronal spiking unit     xk = ρx xk−1 + αx ux,k + k , k ∼ N (0, σ2 )         zr = ρz zr−1 + αz uz,k + δr , δr ∼ N (0, σδ2 ) (2)  λ ∆   log 1−λk,rk,r ∆ = xk + zr         ∆Nk,r |xk , zr ∼ Bernoulli(λk,r ∆) By construction, this is a SMuRF of the trial-dependent CIF of a neuron. ux,k and uz,k are indicator functions of presence of cue. To provide some intuition, if we assume xk + zr is small, then the SMuRF model approximates the trial-dependent CIF as λk,r ∆ ≈ ezr · exk , that is, as the product of a within-trial component exk in units of Hz (spikes/s) and a unitless quantity ezr . For a given trial r, ezr represents the excess spiking rate above what can be expected from the within-trial component at that trial, which we call the cross-trial component of the CIF. The within and cross-trial components 8 from the SMuRF model are functions of two independent state sequences, (xk )K k=1 and (zr )R r=1 , that evolve smoothly according to a first-order stochastic difference equation. The parameters ρx , αx , σ2 , ρz , αz and σδ2 , which govern the smoothness of (xk )K k=1 and (zr )R r=1 , must be estimated from the raster data. Remark 1: We note that, in its generality, our model does not assume that λk,r ∆ = ezr · exk . In our model, λk,r ∆ = exk +zr . 1+exk +zr The approximation λk,r ∆ ≈ ezr · exk holds for a neuron with small neural spiking rate (Truccolo et al., 2005). Figure 1 shows a graphical representation of the SMuRF model as a Bayesian network. It is not mathematically possible to rewrite the state equations from the SMuRF model in standard state-space form without increasing significantly the dimension of the state space. We give a sketch of an argument as to why in the Appendix. Therefore, in an Expectation-Maximization (EM) algorithm for parameter estimation, one cannot simply apply classical (approximate) binary filtering and smoothing in the E-step (Smith & Brown, 2003). We derive a Monte-Carlo Expectation-Maximization algorithm to maximize the likelihood of observed data under the SMuRF model, with respect to the parameter vector θ = (ρx , αx , σ2 , ρz , αz , σδ2 ). 9 ∆NK,R zR ∆N1,R ∆N2,R ··· ∆Nk,R ··· ··· ··· ··· ··· ··· ··· zr ∆N1,r ∆N2,r ··· ∆Nk,r ··· ∆NK,r ··· ··· ··· ··· ··· ··· ··· z1 ∆N1,1 ∆N2,1 ··· ∆Nk,1 ··· ∆NK,1 x1 x2 ··· xk ··· xK ··· Figure 1: Representation of the SMuRF model as a Bayesian network. The SMuRF model approximates the trial-dependent CIF the product of a within-trial component in units of Hz (spikes/s) and a unitless quantity. The within and cross-trial compoR nents are functions of two independent state sequences, (xk )K k=1 and (zr )r=1 , that evolve smoothly, each according to a first-order stochastic difference equation. Observations from the raster are Bernoulli random variables whose probability of of occurrence is a nonlinear function of the sum of the two sequences. 10 3 Parameter Estimation in the SMuRF by Maximum Likelihood 3.1 Maximum Likelihood Estimation by Expectation-Maximization Let x = (x1 , · · · , xK )T , z = (z1 , · · · , zR )T , and ∆N = {∆Nk,r }K,R k=1,r=1 . The goal is to maximize, with respect to θ, the likelihood L(θ|∆N) of the SMuRF model Z L(θ|∆N) = log p(∆N; θ) = log p(∆N, x, z; θ)dxdz. (3) x,z This is a challenging problem because of the high-dimensional integral that must be carried out in Equation 3. We propose to maximize the likelihood by EM. Remark 2: For the moment, we treat x and z as missing data; in the sequel, we will augment the model with additional missing data that will simplify the EM algorithm. Given a candidate solution θ(`) , EM (Dempster et al., 1977) maximizes L(θ|∆N) by building a sequence of successive approximations Q(θ|θ(`) ) of L(θ|∆N) (the so-called E-step) such that maximizing these approximations, which in general is simpler than directly maximizing L(θ|∆N), is guaranteed to not decrease L(θ|∆N). That is, each iteration of EM generates a new candidate solution θ(`+1) such that L(θ(`+1) |∆N) ≥ L(θ(`) |∆N). By iterating this process, EM generates a sequence of iterates {θ(`) }∞ `=1 that, under regularity conditions, converge to a local optimum of L(θ|∆N) (Dempster et al., 1977). In the context of the SMuRF model, the key challenge of EM is to compute Q(θ|θ(`) ) defined as   Q(θ|θ(`) ) = Ex,z log p(∆N, x, z; θ)|∆N, θ(`) , 11 (4) the expected value of the complete-data likelihood with respect to the joint posterior distribution of the missing data (x, z) conditioned on the observed data ∆N and the candidate solution θ(`) . This expectation is not tractable, i.e. it cannot be computed in closed-form. The intractability stems not only from the lack of conjugacy between the Bernoulli observation model and our Gaussian priors–also an issue for one-dimensional models (Smith & Brown, 2003)–but also because, as mentioned previously, the SMuRF model cannot be reduced to a standard state-space model. We propose to approximate the required expectations using Markov-Chain Monte-Carlo (MCMC) samples from p(x, z|∆N; θ(`) ). In particular, we will use Gibbs sampling (Casella & George, 1992), a Monte-Carlo technique, to generate samples from a distribution by sampling from its so called full conditionals (conditional distribution of one variable given all others), thus generating a Markov chain that, under regularity conditions, can be shown to converge to a sample from the desired distribution. Gibbs sampling is attractive in cases where sampling from the full-conditionals is simple. However, it is prone to the drawbacks of MCMC methods, such as poor mixing and slow convergence, particularly if one is not careful in selecting the full-conditionals from which to generate samples from. Two observations are in order, that will lead to the derivation of an elegant block Gibbs sampler with attractive properties • Conditioned on z, the joint distribution, p(∆N, x|z; θ), of x and ∆N is equivalent to the joint distribution from a one-dimensional state-space model with binary observations (Smith & Brown, 2003). By symmetry, this is also true for p(∆N, z|x; θ). This readily motivates a block Gibbs sampler that alternates between sampling from x|∆N; θ and z|∆N; θ. This leaves us with one chal12 lenge: how to obtain samples from the posterior distribution of the state in a one-dimensional state-space model with Bernoulli (more generally binomial) observations? • We introduce a new collection of i.i.d., Polya-Gamma distributed (Polson et al., 2013) random variables w = {wk,r }K,R k=1,r=1 , such that sampling from x|∆N, w; θ is equivalent to sampling from the posterior of the state in a linear Gaussian state-space model (we will prove this in the Appendix) using a forward-filtering backward-sampling algorithm (Frühwirth-Schnatter, 1994). Moreover, it has been shown that the Gibbs sampler based on this Polya-Gamma augmentation scheme (Choi & Hobert, 2013) is uniformly ergodic and possesses superior mixing properties to alternate data-augmentation scheme for logit-based models (Polson et al., 2013; Choi & Hobert, 2013). The intuition behind the introduction of the Polya-Gamma random variables is the following: they are missing data that, if we could observe, would make the Bernoulli observations Gaussian. Stated otherwise, the PolyaGamma random variables are scale variables in a Gaussian scale mixture (Andrews & Mallows, 1974) representation of Bernoulli random variables. Remark 3: The random vector w in the preceding bullet point is the vector additional missing data alluded to in Remark 2. Together, these two observations form the basis of an efficient block-Gibbs sampler we use for maximum-likelihood estimation of the parameters from the SMuRF model by Monte-Carlo EM, also referred to as empirical Bayes (Casella, 2001). We introduce the basic ideas behind PG augmentation and its utility in Bayesian estimation for logitbased models. In the Appendix, we provide detailed derivations for the PG sampler 13 adapted to the SMuRF model. 3.2 Polya-Gamma augmentation and sampling in one dimension Let ∆N ∈ {0, 1} and X ∈ R and suppose that, conditioned on X = x, ∆N is Bernoulli with mean ex , 1+ex i.e. p(∆N |x) = (ex )∆N 1 + ex (5) We begin with a definition of Polya-Gamma (PG) random variables, followed by a PG augmentation scheme for the Bernoulli/binomial likelihood. We will see that the augmentation scheme leads to an attractive form for the posterior of x given the observation ∆N and the augmented variable. Finally, we will see that the posterior of the augmented variable itself follows a PG distribution. Our treatment follows closely that of (Choi & Hobert, 2013). Definition of Polya-Gamma random variables: Let {Em }∞ m=1 be a sequence of i.i.d. exponential random variable with parameter equal to 1. The random variable d W = ∞ Em 2 X π 2 m=1 (2m − 1)2 (6) d follows a PG(1,0) distribution, where = denotes equality in distribution. The moment generating function of W is −tW E[e ] = cosh −1 √  t . 2 (7) An expression for its density pW (w), expressed as an infinite sum, can be found in (Choi & Hobert, 2013) and (Polson et al., 2013). The PG(1,c) random variable is obtained by exponential tiling of the density of a PG(1,0) random variable. Letting pW (w|c) denote 14 the density of a PG(1,c) random variable, pW (w|c) = cosh c 2 e− c2 w 2 pW (w). (8) PG augmentation preserves the Bernoulli likelihood: Following the treatment of (Choi & Hobert, 2013), conditioned on X = x, let W be a PG(1,|x|) random variable. Further suppose that, conditioned on X = x, ∆N and W are independent. Then p(∆N, w|x) = p(∆N |x)pW (w|x). (9) Integrating out W , we see that the augmentation scheme does not alter p(∆N |x). One may then ask, what is the utility of the augmentation scheme? The answer lies in the following identity, discussed in detail in (Choi & Hobert, 2013), and which is the key ideal behind PG augmentation (ỹ−x)2 (ex )∆N − 21 1/w · PG(1, |x|) ∝ e ∝N p(∆N |x)pW (w|x) = 1 + ex where ỹ = y− 12 w  1 ỹ; x, w  , (10) , and ∝ indicates that we are dropping terms independent of x. Equa- tion 10 states that, given X = x and a logit model, a Bernoulli random variable is, up to a constant independent of x, a scale mixture of Gaussian (Andrews & Mallows, 1974), i.e. a Gaussian random variable with random variance 1/w, where W = w follows a PG distribution (Polson et al., 2013; Choi & Hobert, 2013). If we assume X ∼ pX (x), then (Choi & Hobert, 2013)   1 p(∆N, x, w) = p(∆N |x, w)pW (w|x)pX (x) ∝ N ỹ; x, pX (x). w (11) Implications of augmentation on p(x|∆N, w) and p(w|∆N, x): p(∆N, x, w) p(x|∆N, w) = ∝ p(∆N |x, w)pW (w|x)pX (x) ∝ N p(∆N, w)  1 ỹ; x, w  pX (x), (12) 15 where we make use of Equation 11. If X is Gaussian, then p(x|∆N, w) is Gaussian and available in closed-form! (Appendix). pW (w|∆N, x) = p(∆N, x, w) p(∆N |x)pW (w|x)pX (x) =R = pW (w|x), p(∆N, x) p(∆N |x)p (w|x)p (x) W X w (13) i.e. p(w|∆N, x) = pW (w|x) = PG(1, |x|). Together, Equations 12 and 13 form the basis of a uniformly ergodic (Choi & Hobert, 2013) Gibbs sampler to obtain sample from p(x, w|∆N ). 3.3 Block Gibbs sampler for PG-augmented SMuRF model Consider the following version of the SMuRF model with PG augmentation:     xk = ρx xk−1 + αx ux,k + k , k ∼ N (0, σ2 )         zr = ρz zr−1 + αz uz,k + δr , δr ∼ N (0, σδ2 )     x +zr e k λk,r ∆ = 1+e xk +zr        ∆Nk,r |xk , zr ∼ Bernoulli(λk,r ∆)         wk,r |xk , zr ∼ PG(1, |xr + zr |), k = 1, · · · , K; r = 1, · · · , R. (14) We can apply the basic results from the previous subsection to derive the following result (proof in Appendix): Theorem 2 Suppose w, x, z and ∆N come from the PG-augmented SMuRF model (equation ), then p(∆N, x|w, z; θ) is equivalent in distribution to the following linearGaussian state-space model     xk = ρx xk−1 + αx ux,k + k , k ∼ N (0, σ2 )     ∆Ñk,r = xk + zr + ṽk,r , ṽk,r ∼ N (0, wk,r −1 ), i.i.d. , r = 1, · · · , R     1    ∆Ñk,r = ∆Nk,r − 2 . wk,r 16 (15) Following the discussion from the previous subsection, it is not hard to see that such a result would hold. The proof of this result is in the appendix, as well as the derivation of an elegant forward-filtering backward-sampling algorithm (Frühwirth-Schnatter, 1994) for drawing samples from p(∆N, x|w, z; θ). By symmetry, it is not hard to see that a similar result holds for p(∆N, z|w, x; θ). Block Gibbs sampling from PG-augmented SMuRF model: The E-step of the MonteCarlo EM algorithm consists in sampling from p(x, z|∆N; θ(`) ) by drawing from p(x, z, w|∆N ; θ(`) ) using a block Gibbs sampler that uses the following full-conditionals • p(x|∆N, w, z; θ(`) ), which according to the theorem above is equivalent to the posterior distribution of the state sequence in a linear-Gaussian state-space model. • p(z|∆N, w, x; θ(`) ), which obeys properties similar to the previous full-conditional (by symmetry). • p(wk,r |x, z) = p(wk,r |xk , zr ) = PG(1, |xk +zr |), k = 1, · · · , K, r = 1, · · · , R (Polson et al., 2013). In the Appendix, we detail how we initialize the algorithm and monitor convergence. In practice, we found that estimating ρx and ρz is difficult. We hypothesize that including those parameters yields an unwieldy likelihood function. In the results we report, we assume ρx = ρz = 1, αx = αz = 0 and focus on estimating a simple model with two parameters σ2 and σδ2 . The assumption ρx = ρz = 1 gives the random walk priors more freedom, thus allowing us to be capture the variability of the within 17 and cross-trial processes. We have run simulations, not reported here, that show that the joint estimation of σδ2 , σ2 , αx and αz is stable and that our EM algorithm converges. This demonstrates the ability of the SMuRF model (Equation (14)) to incorporate exogenous input stimuli. Assuming ρx = ρz = 1, in the M-step, the update equations for the parameters σ2 , σδ2 , αx and αz follow standard formulas (Smith & Brown, 2003) PK αx(`+1) = k=1 PR αz(`+1) = r=1   Ex xk − xk−1 |∆N, θ(`) ux,k , PK 2 k=1 ux,k   Ez zr − zr−1 |∆N, θ(`) uz,r , PR 2 r=1 uz,r # K 1 X = Ex (xk − xk−1 − αx(`+1) uz,k )2 |∆N, θ(`) , K k=1 " # R 1X = Ez (zr − zr−1 − αz(`+1) uz,k )2 |∆N, θ(`) , R r=1 (16) (17) " σ2(`+1) 2(`+1) σδ (18) (19) where we set x0 = z0 = 0, and we approximate the expectations with respect to p(x|∆N, θ(`) ) and p(z|∆N, θ(`) ) using Gibbs samples from the E-step. 3.4 Assessment of within-trial and cross-trial spiking dynamics Bayesian estimation of the SMuRF model (Equation (14)) enables us to infer detailed changes in neural dynamics, in particular to extract the within-trial and cross-trial components of the neural spiking dynamics that accompany the learning of a contingency by a neuron. This is because, following estimation, inference in the SMuRF model yields the joint posterior distribution of the instantaneous spiking rate of a neuron as a function of trials, and time within a trial, conditioned on the observed data. We can use this posterior distribution, in turn, to assess instantaneous changes in neural spiking dynam- 18 ics, and without the need to correct for multiple comparisons as with non-parametric methods. In what follows, we let p(x, z|∆N ; θ̂M L ) denote the posterior distribution of x and z, given the raster data ∆N and the maximum likelihood estimate θ̂M L of θ. In what follows, it is understood that we use Gibbs samples (xi , zi )ni=1 from p(x, z|∆N ; θ̂M L ) to obtain an empirical estimate of the distribution. Posterior distribution of the joint CIF over time and trials: We can use these posterior samples to approximate the posterior distribution, at θ̂M L , of any quantities of interest. Indeed, it is well known from basic probability that if (xi , zi ) is a sample from p(x, z|∆N ; θ̂M L ), then f (xi , zi ) is a sample from p(f (x, z)|∆N ; θ̂M L ). In particular, if the instantaneous spiking rate of a neuron a time k and trial r λk,r ∆ = exk +zr , 1+exk +zr we can use the Gibbs samples to approximate the joint posterior distribution of {λk,r ∆}K,R k=1,r=1 given ∆N and θ̂M L . Let {λpk,r ∆}K,R k=1,r=1 be the random variable that represents the a posteriori instantaneous spiking rate of the neuron at time trial r and time k within that trial. The superscript ‘p’ highlights the conditioning on the data ∆N and θ̂M L , and the fact that this quantity is a function of (x, z) distributed according to p(x, z|∆N ; θ̂M L ). Within-trial effect: We define the within-trial effect as the a posteriori instantaneous spiking rate at time k, average over all trials R eWT k = 1X p λ (xk , zr ), k = 1, · · · , K. R r=1 k,r (20) It is important to note that the averaging is performed after characterization of the joint 19 CIF as a function of time and trials, which is not the same as first aggregating the data across trials and applying one of the one-dimensional methods for analyzing neural data (Smith & Brown, 2003; Zammit-Mangion et al., 2012; Yuan et al., 2012). In practice, every Gibbs sample pair (xi , zi ), i = 1, · · · , n leads to a scalar quantity R 1X = λk,r (xi,k , zi,r ), k = 1, · · · , K. R r=1 êWT i,k (21) Performing this computation over all Gibbs samples and times k = 1, · · · , K leads to a T K joint empirical distribution for the within-trial effect {eW k }k=1 . Cross-trial effect: We define the cross-trial effect as the a posteriori excess instantaT neous spiking at trial r and time k (above the within-trial effect effect eW k ) averaged across all times k eCT r p K 1 X λk,r (xk , zr ) , r = 1, · · · , R. = T K k=1 eW k (22) In practice, every Gibbs sample pair (xi , zi ), i = 1, · · · , n leads to a scalar quantity êCT i,r K 1 X λk,r (xi,k , zi,r ) = , r = 1, · · · , R. T K k=1 êW i,k (23) Performing this computation over all Gibbs samples and Rc trials of interest, r = R − Rc + 1, · · · , R, leads to a joint empirical distribution for the cross-trial effect R {eCT r }r=R−Rc . Remark 4: The following paragraph explains the meaning of Rc in the context of an associative learning experiment. 3.5 Assessment of neural spiking dynamics across time and trials Consider an associative learning (conditioning) experiment characterized by the pairing of a conditioned stimulus (e.g. auditory) to an aversive stimulus (e.g. a shock). Let 20 Rc be the number of conditioning trials and Kh the length of the habituation period. Gibbs samples from the SMuRF model (Equation (14)) paramaterized by θ̂M L let us approximate the a posteriori probability that the spiking rate at a given point (Point C in Figure 2) during one of the conditioning trials (trials 16 through 45 in this example) is bigger than the baseline spiking rate at that trial (Region A in Figure 2) and the average spiking rate at the same time during the habituation period (Region B in Figure 2). This yields a probabilistic description of the the intricate dynamics of neural spiking that accompany the learning of the contingency by a neuron. Let   Average rate in Region A   z }| {       R c   X 1 p p λ (xk , zm ) Event U = λk,r (xk , zr ) >   Rc m=1 k,m           Average rate in Region B   z }| {       K h   X 1 p p Event V = λk,r (xk , zr ) > λ (xs , zr )   Kh s=1 s,r         (24) (25) For a given pair (k, r) s.t. k ≥ Kh , r ≥ Rc , this probability is P [Event U ∩ Event V] (26) n 1X ≈ I n i=1 {λpk,r (xi,k ,zi,r )> R1c R Pc m=1 p p λk,m (xi,k ,zi,m )∩λk,r (xi,k ,zi,r )> K1 K Ph h s=1 p , (27) λs,r (xi,s ,zi,r )} where the second line approximates the probability of the event of interest using its frequency of occurrence in the n posterior samples. As we demonstrate in the following section, we thus obtain an detailed characterization of the dynamics of neural spiking that accompany learning. In the following section, we use simulated and real data examples to demonstrate the utility of the SMuRF model (Equation (14)) for the characterization of detailed neural spiking dynamics. 21 45 C: Trial r at time k Cue A: Baseline during conditioning B: Average response at time k during habituation 41 36 Trials 31 26 C 21 A 16 11 B 6 1 -500 0 500 1000 1500 Time (ms) Figure 2: Regions defined to quantify changes in neural spiking dynamics in an associative learning experiment. The SMuRF model lets us approximate the a posteriori probability that the spiking rate at a given point C during one of the conditioning trials (trials 16 through 45 in this example) is bigger than the baseline spiking rate at that trial (Region A) and the average spiking rate at the same time during the habituation period (Region B). This yields a probabilistic description of the the intricate dynamics of neural spiking that accompany the learning of the contingency in the experiment by a neuron. 4 4.1 Applications Simulation studies We simulated neural spike raster data from a neuron that exhibits a conditioned response to the conditioned stimulus (Figure 4) in an associative learning experiment. The exper- 22 iment consists of 45 trials, each of which lasts 2 s. The conditioned stimulus becomes active 1 s into a trial, while the aversive stimulus becomes active after trial 15. We obtain the simulated data by dividing the raster into two pre-defined regions as shown in Figure 3. Region A consists of all trials before trial 16, along with the period from all trials before the conditioned stimulus is presented. We assume that the rate of spiking of the neuron is λA = 60 Hz. Region B consists of the period from trials following trial 15 after the conditioned stimulus is presented. The rate of spiking of the neuron in this region is λB = 20 Hz. We applied the SMuRF model (Equation (14)) to the analysis of this simulated neural spike raster. Figure 4(a) shows that, during conditioning, learning is accompanied by a doubling of the spiking rate above the within-trial spiking rate of the neuron. Indeed, the left hand panel of the figure shows the cross-trial effect which, following conditioning, increases above its average initial value of ≈ 1 to ≈ 2. Figure 4(b) provides a more detailed characterization of the neural spiking dynamics. With probability close to 1, the spiking rate at a given time/trial pair–following the conditioned stimulus and during conditioning (Figure 2 C)–is bigger than the average rate at the same trial (Figure 2 A) and the average rate at the same time (Figure 2 B). We conclude that, with high probability, the simulated neuron exhibits a conditioned response to the conditioned stimulus. 4.2 Neural dynamics during associative learning of fear Basic experimental paradigm: The ability to learn through observation is a powerful means of learning about aversive stimuli without direct experience of said stimuli. 23 45 41 36 Region A: Trials 31 λA = 60 Hz 26 21 16 Region B: λB = 20 Hz 11 6 1 -1000 -500 0 500 1000 Time (ms) Figure 3: Set up used to simulate neural spike raster data from a neuron that exhibits a conditioned response to the conditioned stimulus in an associative learning experiment. The experiment consists of 45 trials, each of which lasts 2 s. The conditioned stimulus becomes active 1 s into a trial, while the aversive stimulus becomes active from the 16th trial onwards. An idealized neuron that exhibits a conditioned response would exhibit two distinct regions of activity. Region A consists of all trials preceding trial 16, along with the period from all trials before the conditioned stimulus is presented. We assume that the rate of spiking of the neuron is λA = 60 Hz. Region B consists of the period from trials following trial 15 after the conditioned stimulus is presented. The rate of spiking of the neuron in this region is λB = 20 Hz. We use the SMuRF model (Equation (14)) to analyze data from a fear conditioning paradigm designed to elucidate the nature of the circuits that facilitate the associative learning of fear. The experimental paradigm is described in detail in (Allsop et 24 Trials 45 41 36 31 26 21 16 11 6 1 45 41 36 31 26 21 16 1.0 0.8 0.6 0.4 0.2 0 -1000 -500 2 1 0 500 1000 Time (ms) (b) 0 Rate (Hz) Trial Effect 60 40 20 0 -1000 -500 0 500 1000 Time (ms) (a) Figure 4: (a) Simulated neural spike raster, along with estimated within and cross trial effects from the SMuRF model. The horizontal red line indicates the beginning of conditioning. The vertical green line indicates the onset of the conditioned stimulus. The left panel of the figure shows the cross-trial effect which, following conditioning, increases above its average initial value of ≈ 1 to ≈ 2. (b) Empirical probability that spiking rate at a given trial and time is bigger than the average rate at the same trial and the average rate during habituation at the same time. With probability close to 1, the spiking rate at a given time/trial pair–following the conditioned stimulus and during conditioning (Figure 2 C)–is bigger than the average rate at the same trial (Figure 2 A) and the average rate at the same time (Figure 2 B) al., 2017). Briefly, an observer mouse observes a demonstrator receive conditioned stimulus-shock pairings through a perforated transparent divider. The experiment consists of 45 to 50 trials, divided into two phases. During the first 15 trials of the exper25 iment, termed the habituation period, both the observer and the demonstrator simply hear an auditory conditioned stimulus. From the 16th trial onwards, the auditory conditioned stimulus is followed by the delivery of a shock to the demonstrator. The data are recorded from the pre-frontal cortex (PFC) of the observer mouse. Results: Figure 5(a) shows the within and cross-trial effects estimated using the SMuRF model applied to a cortical neuron from the experiment described above. The estimated within-trial (bottom) and cross-trial (left) components indicate significant changes respectively in response to the conditioned stimulus and to conditioning. By definition (Equation 22), the cross-trial effects takes into account the increase in spiking rate due to the presentation of the conditioned stimulus. The bottom panel suggests that this neuron exhibits a delayed response to the conditioned stimulus, beginning at ≈ 400 ms following conditioned stimulus presentation. Accounting for this increase in withintrial spiking rate due to the conditioned stimulus, the left panel shows a multiplicative increase in spiking rate due to conditioning from an average initial value of ≈< 1 (indicative of suppression, as can be seen through the sparseness of the raster during trials 1 through 5) to a peak average value of ≈ 4 at trial 23. This increase, however, does not persist as in the case of the simulated data (Figure 4), suggesting that conditioning is accompanied by intricate dynamics in neural modulation. 26 Trials 45 41 36 31 26 21 16 11 6 1 45 41 36 31 26 21 16 1.0 0.8 0.6 0.4 0.2 0 -500 0 500 1000 1500 Time (ms) (b) 8 6 4 2 0 Rate (Hz) Trial Effect 15 10 5 0 -500 0 500 1000 1500 Time (ms) (a) Figure 5: (a) Raster, along with SMuRF within and cross-trial components, from a cortical neuron that exhibits a conditioned response to the conditioned stimulus. The horizontal red line indicates the beginning of conditioning. The vertical green line indicates conditioned stimulus onset. The bottom panel suggests that this neuron exhibits a delayed response to the conditioned stimulus, beginning at ≈ 400 ms following conditioned stimulus presentation. Accounting for this increase in within-trial spiking rate due to the conditioned stimulus, the left panel shows a multiplicative increase in spiking rate due to conditioning from an average initial value of ≈< 1 (indicative of suppression, as can be seen through the sparseness of the raster during trials 1 through 5) to a peak average value of ≈ 4 at trial 23. This increase, however, does not persist as in the case of the simulated data (Figure 4). Figure 5 (b) provides a more detailed characterization of the neural spiking dynamics of this neuron. The figure shows the evolution, as a function of time and trials, of 27 Figure 5: (b) Empirical probability that spiking rate at a given trial in and time is bigger than the average rate at the same trial and the average rate during habituation at the same time (refer to Figure 2). This panel indicates that this neuron exhibit a delayed conditioning to the conditioned stimulus (beginning ≈ 400 ms following conditioned stimulus presentation) and that the extent of the condition is highest first between trials 18 and 24 and then between trials 31 and 41. Panel (a), and panel (b) in particular, suggest that conditioning is accompanied by intricate dynamics in neural modulation. the probability that the spiking rate at a given time/trial pair (Figure 2 C) is bigger than the average rate at the same trial (Figure 2 A) and the average rate at the same time (Figure 2 B). The figure indicates that this neuron exhibit a delayed conditioning to the conditioned stimulus (beginning ≈ 400 ms following conditioned stimulus presentation) and that the extent of the condition is highest first between trials 18 and 24 and then between trials 31 and 41. Figure 6 shows an application of the SMuRF model (Equation (14)) to a cortical neuron that does not exhibit a conditioned response to the conditioned stimulus. The bottom of panel (a) indicates no significant increase in the within-trial spiking rate in response to the conditioned stimulus, while the left panel shows that the cross-trial effect remains constant throughout the experiment an average value of ≈ 1. This indicates that conditioning does not result in a significant increase in spiking rate. Panel (b) corroborates these findings: for all points C following the conditioned stimulus and during conditioning, there is a small probability that the instantaneous spiking rate is significantly different from the average spiking rates in Regions A and B. 28 Trials 50 46 41 36 31 26 21 16 11 6 1 50 46 41 36 31 26 21 16 1.0 0.8 0.6 0.4 0.2 0 -500 6 4 2 0 500 1000 1500 Time (ms) (b) 0 Rate (Hz) Trial Effect 5 0 -500 0 500 1000 1500 Time (ms) (a) Figure 6: (a) Raster, along with SMuRF within and cross-trial components, from a cortical neuron that does not exhibit a conditioned response to the conditioned stimulus. The horizontal red line indicates the beginning of conditioning. The vertical green line indicates the onset of the conditioned stimulus. This neuron does not exhibit a conditioned response to the conditioned stimulus. The bottom of the panel indicates no significant increase in the within-trial spiking rate in response to the conditioned stimulus, while the left panel shows that the cross-trial effect remains constant throughout the experiment an average value of ≈ 1. This indicates that conditioning does not result in a significant increase in spiking rate. Figures 10 and 11 show results for two additional cortical neurons that exhibit a transient conditioned response to the conditioned stimulus. 29 Figure 6: (b) Empirical probability that spiking rate at a given trial and time is bigger than the average rate at the same trial and the average rate during habituation at the same time This panel corroborates the observations from panel (a): for all points C following the conditioned stimulus and during conditioning, there is a small probability that the instantaneous spiking rate is significantly different from the average spiking rates in Regions A and B. Using SMuRF inference to determine a neuron’s learning time and trial The power of the Bayesian approach, and the SMuRF model (Equation (14)) in particular, lies in the fact that it lets us approximate the a posteriori probability that the spiking rate at a given point (point C in Figure 2) during one of the conditioning trials (trials 16 through 45 in this example) is bigger than the baseline spiking rate at that trial (Region A in Figure 2) and the average spiking rate at the same time during the habituation period (Region B in Figure 2) (Equation 27). This yields an instantaneous probabilistic quantification of the extent of learning for any given time and trial pair. Panel (b) of Figures 5, 6, 10 and 11 provide a detailed characterizations of the dynamics of learning and its extent for all times following the onset of the conditioned stimulus, all conditioning trials. Here, we provide some guidance for practitioners to summarize the results of our inference to a single learning time/trial pair. We would like to stress, however, that the power of our methods lies in the detail provided by panel (b) of Figures 5, 6, 10 and 11. Since the SMuRF model enables us to compute a empirical probability that the spiking rate at a given time/trial pair (Figure 2, Point C) is bigger than the average rate at the same trial (Figure 2, Region A) and the average rate at the same time (Figure 2, Region 30 B), we can identify learning time and learning trial for each neuron by finding the first time after cue and after conditioning that this probability exceeds a certain threshold. Table 1 reports the learning time and trial computed using a threshold of of 95%. Note that the learning time is computed with respect to the onset of the conditioned stimulus (time = 0 ms). Learning Neuron in Neuron in Neuron in Neuron in Figure 5 Figure 6 Figure 10 Figure 11 617 1316 202 20 16 34 18 18 time (ms) Learning trial Table 1: Learning trial and time computed for the cortical neurons analyzed. The learning times and trials reported are consistent with the detailed inference provided by the respective Figures for these neurons. The cortical unit from Figure 5, for instance, shows a delayed response, significant 617 ms after conditioned stimulus onset and at trial 16. The cortical unit from Figure 6 only exhibits a significant change in neural spiking 1316 ms following the conditioned stimulus and at trial 34. This is consistent with our previous observation from Figure 6 that this neuron does not exhibit a conditioned response to the stimulus. The learning times and trials reported in Table 1 are consistent with the detailed inference provided by the respective Figures for these neurons. Indeed, the cortical unit from Figure 5 shows a delayed response, significant 617 ms after conditioned stimulus onset and at trial 16. The cortical unit from Figure 6 only exhibits a significant change 31 in neural spiking 1316 ms following the conditioned stimulus and at trial 34. This is consistent with our previous observation from Figure 6 that this neuron does not exhibit a conditioned response to the stimulus. In the Appendix, we perform a simulation that demonstrates the ability of SMuRF inference to identify learning time and trial when learning of a contingency is accompanied by sustained changes in neural spiking following conditioned stimulus onset and during conditioning. We also demonstrate through simulation that the SMuRF model is robust to the presence of error trials. 4.3 Application of SMuRF model to a non-separable example We demonstrate the limitations of the separability assumption in the SMuRF model (Equation (14)) by applying it to the neural spike raster data from (Czanner et al., 2008). We briefly describe the experiment here and refer the reader to (Wirth et al., 2003) for a more detailed description. Panel (a) of Figure 7 shows neural spiking activity from a hippocampal neuron recorded during an experiment designed for a location-scene association learning task. The same scene was shown to a Macaque monkey across 55 trials, and each trial lasted 1700 ms. The first 300 ms of every trial is fixation period, and the scene is presented to the monkey from 300 to 500 ms. A delay period takes place from 800 to 1500 ms, followed by a response period from 1500 to 1700 ms. The data from the experiment are shown in the center of panel (a) from Figure 7. The raster suggests that the time and trial-dependent CIF of this neuron is not separable. this Intuitively, this can be seen from the fact that the region in which there are significant changes in neural spiking does not follow the rectangular form from Figure 3. 32 Nevertheless, the CIF could be well approximated by a separable model. We apply the SMuRF model to these data to uncover some of its limitations in non-separable settings. The bottom panel of Figure 7(a) shows the estimate of the within-trial effect from the SMuRF model, while the left panel shows the cross-trial effect. These two figures indicate that the SMuRF model is able to capture within and cross-trial dynamic changes in the spiking activity of the neuron. Figure 7(b) shows the estimate of the a-posteriori mean instantaneous spiking rate {λ̂pk,r ∆}K,R k=1,r=1 (in Hz) of the neuron at time trial r and time k within that trial. This figure shows that, while the SMuRF model is able to characterize the detailed changes in spiking dynamics, it does not fully capture the non-separable nature of the raster data. Remark 5: Unlike for the cortical neurons, this experiment does not have a condition- Trials ing period. That’s why, it does not make sense to generate plots such as Figure 5(b). 55 51 46 41 36 31 26 21 16 11 6 1 160 140 120 100 80 60 40 20 3 2 1 0 -300 0 Rate (Hz) Trial Effect 12001500 Time (ms) (b) 60 40 20 0 -300 500 0 500 1200 1500 Time (ms) (a) Figure 7: Application of the SMuRF model to neural spiking activity from a hippocampal neuron recorded during an experiment designed for a a location-scene association learning task. 33 Figure 7: The green lines represent the end of the fixation, scene presentation and delay periods respectively. (a) Neural spike raster from the hippocampal neuron. The bottom panel shows the estimate of the within-trial effect from the SMuRF model, while the left panel shows the cross-trial effect. (b) Estimate of the a-posteriori instantaneous spiking rate {λ̂pk,r ∆}K,R k=1,r=1 (in Hz) of the hippocampal neuron at time trial r and time k within that trial. This figure shows that, while the SMuRF model is able to characterize the detailed changes in spiking dynamics of this neuron during the task, it fails to capture the non-separable nature of the raster data. 5 Conclusion We proposed a 2D separably-Markov random field (SMuRF) for the analysis of neural spike rasters that obviates the need to aggregate data across time or trials, as in classical one-dimensional methods (Smith & Brown, 2003; Zammit-Mangion et al., 2012; Yuan et al., 2012), while retaining their interpretability. The SMuRF model approximates the trial-dependent conditional intensify function (CIF) of a neuron as the product of a within-trial component, in units of Hz (spikes/s), and a unitless quantity, which we call the cross-trial effect, that represents the excess spiking rate above what can be expected from the within-trial component at that trial. One key advantage of our 2D model-based approach over non-parametric methods stems from the fact that it yields a characterization of the joint posterior (over all trials and times within a trial) distribution of the instantaneous rate of spiking of as a function of both time and trials given the data. This not only obviates the need to correct for multiple comparisons, but also enables us to compare the instantaneous rate of any two trial time pairs at the millisecond resolution, 34 where non-parametric methods break down because the sample size is 1. We applied the SMuRF model to data collected from neurons in the pre-frontal cortex (PFC) in an experiment designed to characterize the neural underpinnings of the associative learning of fear in mice. We found that, as a group, the recorded cortical neurons exhibit a conditioned response to the auditory conditioned stimulus, occurring 3 to 4 trials into conditioning. We also found intricate and varied dynamics of the extent to which the cortical neurons exhibit a conditioned response (e.g. delays, short-term conditioning). This is likely reflective of the variability in synaptic strength, connectivity and location of the neurons in the population. In future work, we plan to investigate non-separable random field models of neural spike rasters, such as Markov random fields (Besag, 1974) (MRFs). Compared to the SMuRF model, MRFs are 2D models for which the dimensionality of the putative statespace is as large as the dimensionality of the raster, suggesting that MRFs may provide a more detailed characterizations of neural spike rasters. Indeed, the SMuRF model makes the strong assumption that the neural spiking dynamics are decomposable into two time scales, with the additional simplifying assumption that there is only one component per time scale. This simplifying assumption is motivated by one-dimensional state-space models of neural data (Smith & Brown, 2003) in which a neuron’s timedependent CIF is only a function of one hidden state sequence. We will investigate the inclusion of additional components in future work. We also plan to investigate analogues of the SMuRF model for population level data. MRFs, multi-component and population-level SMuRF models, naturally lead to model selection problems, and to the investigation of tools, based on sequential Monte-Carlo methods (Chopin et al., 2013) 35 (aka particle filters), to compare state-space models of neural spike rasters (such as one-dimensional models (Smith & Brown, 2003), the SMuRF model, and MRFs). The development of such tools for model comparisons is, in our opinion, the ultimate measure of the ability of different models to capture the intricate dynamics present in neural spike rasters. Lastly, as previously mentioned, the SMuRF model can be interpreted as a two-dimensional Gaussian process prior on the neural spiking rate surface (Rad & Paninski, 2010), with a separable kernel that is the Kronecker product of kernels from Gauss-Markov processes (one process for each dimension). The choice of kernels in the SMuRF model leads to the very efficient algorithms for estimation and inference derived in this article. Moreover, these algorithms scale well to more than two dimensions unlike classical kernel methods. We plan to explore this connection to Gaussian process inference in future work. Acknowledgements We would like to thank Dr. Anne C. Smith for her generous feedback on this manuscript and extensive discussions regarding the SMuRF model. Demba thanks the Alfred P. Sloan Foundation. K.M.T. is a New York Stem Cell Foundation–Robertson Investigator and McKnight Scholar and this work was supported by funding from the JPB Foundation, the PIIF and PIIF Engineering Award, PNDRF, JFDP, Alfred P Sloan Foundation, New York Stem Cell Foundation, McKnight Foundation, R01-MH102441-01 (NIMH), RF1-AG047661-01 (NIA), R01-AA023305-01 (NIAAA) and NIH Directors New Innovator Award DP2-DK-102256-01 (NIDDK). 36 Appendix The SMuRF model cannot be converted easily to a standard statespace model We focus on the simple case when ρx = ρz = 1, and αx = αz = 0     x =x +  ,  ∼ N (0, σ 2 ), k = 1, · · · , K k k−1 k k     zr = zr−1 + δr , δr ∼ N (0, σδ2 ), r = 1, · · · , R Let t = (r − 1) × K + k, r = 1, · · · , R, k = 1, · · · , K. The index t is obtained by “unstacking” the raster trials and serializing them. The question we ask is whether the state equations from the SMuRF model can be turned into ones of the form st = Ast−1 + vt , (28) where st ∈ R2 . Let st,1 and st,2 denote the first and second components of st respectively. We ask that st ∈ R2 because of the two dimensions present in the SMuRF model. Allowing the dimensionality of st to increase up to K would allow a representation of the form of Equation 28. However, this would become a very high-dimensional, unwieldy state-space model. Intuitively, this cannot be done for the following reason: the dimensionality of the latent states in the SMuRF model is K + R, while the dimensionality of the state sequence in Equation 28 is 2 × (K × R). For there to be an equivalence, the sequence st must necessarily be redundant, i.e. some of the states must be copies of previous states. Storing these copies, would necessarily mean having to increase the dimensionality of the state space! 37   xt−(d Kt e−1)×K     ∈ R2 . The quantity t gives the trial index r correLet st =  K   zd t e K sponding time index t. The within-trial index corresponding to index t is then obtained by substracting (r − 1) × K from  t.    x1  x1   and sK+1 =  . In general, st,1 = st0 ,1 = xk0 Note, for instance, that s1 =      r1 r2 for some 1 ≤ k0 ≤ K if and only if t > t0 s.t. t − t0 = p × K for some integer p, where we assume without loss of generality that t > t0 . That is, two different indices t and t0 share the same within-trial component if and only if they are apart by an integer multiple of K. Stated otherwise, the first component of st exhibit circular symmetry! Therefore, for Equation 28 to hold, st−1,1 must equal st,1 , which is not possible because t and t − 1 are not apart by an integer multiple of p! The argument above shows that, in order to write the SMuRF state equations in the form of Equation 28, one would need to augment the state st to dimension K +1, which would lead to a very high dimensional standard state-space model, thus increasing the complexity of performing inference. Derivation of Gibbs sampler for PG-augmented SMuRF model We first derive Theorem 2, which leads to the forward-filter backward-sampling algorithm from the full-conditionals for x and z in the Gibbs sampler. Since wk,r |xk , zr is drawn from a PG distribution, we can write the log pdf of wk,r |xk , zr as, 38 !    ∞ x2 (2i+1)2 X k wk,r (2i + 1) xk + zr − − 2 + log (−1)i p log p(wk,r |xk , zr ) = log cosh e 8wk,r 2 2 2πw k,r i=1 (29) The complete data likelihood of the SMuRF model is, p(∆N, x, w; θ) = p(∆N|x, w)p(w|x)p(x) = K Y R Y k=1 r=1 (30) {p(∆Nkr |xk , zr )p(wk,r |xk , zr )} K Y k=1 p(xk |xk−1 ; σ2 ) R Y r=1 p(zr |zr−1 ; σδ2 ) (31) The log of the complete data likelihood is therefore, log p(∆N, x, w; θ) = = R K X X {log p(∆Nk,r |xk , zr ) + log p(wk,r |xk , zr )} + π(x, z) k=1 r=1 R  K X X  ∆Nk,r log k=1 r=1 exk +zr 1 + exk +zr   + (1 − ∆Nk,r ) log 1 1 + exk +zr (32)    + log cosh ∞ X xk + zr 2 !# (xk +zr )2 wk,r (2i+1)2 (2i + 1) − − 2 + log e 8wk,r + π(x, z) (33) (−1)i p 2 2πw k,r i=1   K X R  X 1 + exk +zr xk +zr = ∆Nk,r (xk + zr ) − log(1 + e ) + log xk +zr 2e 2 r=1 k=1 !# ∞ (2i+1)2 (xk +zr )2 wk,r X (2i + 1) − 2 + log e− (−1)i p e 8wk,r + π(x, z) (34) 2 2πw k,r i=1 K X R  X xk + zr (xk + zr )2 wk,r = ∆Nk,r (xk + zr ) − log(2) − − 2 2 k=1 r=1 !#  ∞ K  (2i+1)2 X X 1 (xk − xk−1 )2 2 i (2i + 1) − 8wk,r + log e + log(2πσ ) − + π(x, z) (−1) p 2 2 2 2σ 2πw  k,r i=1 k=1 (35) = K log(2) + π(x, z) + K X R  X k=1 r=1 ∆Nkr (xk xk + zr (xk + zr )2 wk,r + zr ) − − 2 2 39   + K X R X ( log k=1 r=1 ∞ X 2 (2i + 1) − (2i+1) (−1)i p e 8wk,r 2 2πwk,r i=1 !) (36) where K  X 1 π(x, z) = 2 log(2πσ2 ) k=1 R  X + r=1 (xk − ρx xk−1 − αx ux,k )2 − 2σ2  1 (zr − ρz zr−1 − αz uz,k )2 log(2πσδ2 ) − 2 2σδ2 (37)  From the complete data log likelihood, we see that  K X R  X xk + zr (xk + zr )2 wk,r r log p(x|∆N, z, w; θ) ∝ ∆Nk (xk + zr ) − − + π(x, z) 2 2 k=1 r=1 (38) ∝− where ∆Ñk,r = ∆Nk,r − 12 wk,r R K X X 1 (∆Ñk,r − (xk + xr ))2 k=1 r=1 2 1/wk,r + π(x, z), (39) . Therefore, we can rewrite the augmented model as a linear Gaussian state space model as stated in Theorem 2.     xk = ρx xk−1 + αx ux,k + k , k ∼ N (0, σ2 )    R −1 !   P ỹk = xk + v˜k , v˜k ∼ N 0, wk,r  r=1     R   ỹ = ∆Ñ = x − K − P x w  k k k 2 r k,r r=1 r Let Hk,r = ∆Ñ1r , . . . , ∆Ñk−1 denote the history of the observed process up-to and including k − 1. We can now write p(x|∆N, z, w; θ) ∝ K Y k=1 p(∆N |xk )p(xk |Hk ) (40) The forward filtering equations for this linear Gaussian state space model are as follows. xk|k−1 = ρx xk−1|k−1 + αx ux,k (41) 2 2 σk|k−1 = ρ2x σk−1|k−1 + σ2 (42) 40 xk|k = ρx xk|k−1 R P + 1+ (43)  wk,r r=1 R P r=1 2 σk|k−1  2 wk,r σk|k−1 R P   αx ux,k   +  P R 2 wk,r σk|k−1 r=1 R 2 ∆Nkr r=1 R P  − − zr wk,r  r=1 R  − ρx xk|k−1   P wk,r r=1 (44) 2 = σk|k  1+ 2 σk|k−1  R P 2 wk,r σk|k−1 (45) r=1 2 After running the forward filtering algorithm, we obtain xK|K and σK|K from the final 2 ). Now we can treat xK iteration of the filter. We can then draw xK ∼ N (xK|K , σK|K as the new observations and use the Kalman filter again to draw samples for xK−1 , and repeat this process iteratively for xK−1 , ..., x1 . The new observation equation reads,     xk = ρx xk−1 + k , k ∼ N (0, σ2 )    xk+1 = xk + k From Bayes Rule we have, p(xk |xk+1 , Hk ) = p(xk+1 |xk )p(xk |Hk ) p(xk+1 |Hk ) (46) Denote the densities of xk |xk+1 , Hk as ∗ 2 xk |xk+1 , Hk ∼ N (xk|k ∗ , σk|k ) Then the update equations are, log p(xk |Hk ) ∝ log p(xk+1 |xk ) + log p(xk |Hk−1 ) xk|k ∗ = ρx xk|k−1 + 41 2 σk|k σ2 (xk+1 − ρx xk|k−1 ) (47) (48) 2 ∗ σk|k = 2 σ2 σk|k−1 (49) 2 σ2 + σk|k−1 ∗ 2 With this backward-sampling algorithm, we can draw xk ∼ N (xk|k ∗ , σk|k ), where i = K −1, ..., 1. The forward-filtering and backward-sampling algorithm are symmetric for xk and zr . Initialization of the EM algorithm and the Gibbs sampler We initialize the Monte-Carlo EM algorithm with values for σ2 and σδ2 obtained by applying the one-dimensional state space model from (Smith & Brown, 2003) to the raster data aggregated across either trials or time. We initialize the Gibbs sampler using trajectories drawn from posterior distribution of the state in the one-dimensional state-space models (Smith & Brown, 2003) used to initialize σ2 and σδ2 . The Gibbs sampler draws 5000 samples for x, z, and w at every iteration. The algorithm reaches convergence when the absolute change in σ2 and σδ2 is less than a certain threshold (10−5 ). Ability of SMuRF model to identify learning time and trial in simulated data The results of our analysis of the cortical data in Section 4 demonstrate that learning of a contingency by a neuron is a dynamic process that cannot be easily quantified in terms of a static time and trial of learning. We also demonstrated (Table 1) how to use inferences from the SMuRF model to identify a learning time and a trial. Here, we use simulated data to determine the ability of the SMuRF model to identify learning time and trial when learning is accompanied by sustained changes in neural 42 spiking following conditioned stimulus onset and during conditioning. In particular, we assess the sensitivity of our method to the extent of the change in neural spiking rate following conditioned stimulus onset and during conditioning. We simulated neural spike raster data in the same manner as described in the Simulation Studies component of our Applications section (Section 4). As in said section, the raster is divided into two regions (Figure 3). We assume that the rate of spiking of the neuron in Region B is fixed and equal λB = 20 Hz. We vary the rate of spiking λA of the neuron in Region A from 20 to 45 Hz in 5 Hz increments. For each value of λA , we simulated 10 independent rasters and determine the learning time and trial as in Table 1. We use the average over the 10 rasters as the learning time/trial pair. When our method detects no change, we declare the learning time and trial as the last time and trail pair in the simulated data, i.e. 1000 ms and trial. Figures 8(a) and 8(b) show the averages of the identified learning times and trials as a function of the ratio λA . λB The true learning time is at 0 ms with respect to conditioned stimulus onset, and true learning trial is trial 16. The figures demonstrate that the inference performed from the SMuRF model is able to detect the true learning time and trial when the rate in Region A is 1.8 and 2 times larger than that in Region B. Moreover, the lower the ratio λA , λB the larger the delay. The intuitive reason why it is easier to determine the learning trial is that, for a given trial, there are many more observations, compared to the number of trials for a give time instant. 43 Average Learning Trial Average Learning Time (ms) 1000 800 600 400 200 0 1.0 1.2 1.4 1.6 1.8 2.0 2.2 45 40 35 30 25 20 15 1.0 1.2 1.4 1.6 λA λB λA λB (a) (b) 1.8 2.0 2.2 Figure 8: Plot of average (a) learning time and (b) learning trial identified by SMuRF inference as a function of ratio of neural spiking rate following and preceding learning. The learning time and trial are defined as the first time and trial pair when then empirical probability (Equation 27) that the spiking rate at a given time/trial pair (Figure 2, Point C) is bigger than the average rate at the same trial (Figure 2, Region A) and the average rate at the same time (Figure 2, Region B) is larger than 95%. The average is taken over 10 independently simulated rasters for each of the values for the ration λA . λB The figure demonstrate the ability of inference performed using the SMuRF model to reliably identify learning. Robustness of SMuRF model to the presence of error trials We simulated neural spike raster data in the same manner as described in the Simulation Studies component of our Applications section (Section 4). We picked three consecutive trials, starting from trial 21, to be a error trials in which all of the observations were 0. Note that the data were simulated in the same manner as in Figure 4, 44 except for the presence of the error trials. Figure 9 shows the result of applying the SMuRF model to these simulated raster data. The presence of the error trials does not Trials affect our remarks for Figure 4. 45 41 36 31 26 21 16 11 6 1 45 41 36 31 26 21 16 1.0 0.8 0.6 0.4 0.2 0 -1000 -500 3 2 1 0 500 1000 Time (ms) (b) 0 Rate (Hz) Trial Effect 80 60 40 20 0 -1000 -500 0 500 1000 Time (ms) (a) Figure 9: (a) Simulated neural spike raster with three consecutive error trials, along with estimated within and cross trial effects from the SMuRF model. The horizontal red line indicates the beginning of conditioning. The vertical green line indicates the onset of the conditioned stimulus. Despite the presence of the error trials, the left panel of the figure shows the cross-trial effect which, following conditioning, increases above its average initial value of ≈ 1 to ≈ 2. 45 Figure 9: (b) Empirical probability that spiking rate at a given trial and time is bigger than the average rate at the same trial and the average rate during habituation at the same time. Despite the presence of the error trials, we can see that with probability close to 1, the spiking rate at a given time/trial pair–following the conditioned stimulus and during conditioning (Figure 2 C)–is bigger than the average rate at the same trial Trials (Figure 2 A) and the average rate at the same time (Figure 2 B). 45 41 36 31 26 21 16 11 6 1 45 41 36 31 26 21 16 1.0 0.8 0.6 0.4 0.2 0 -500 0 500 1000 1500 Time (ms) (b) 6 4 2 0 Rate (Hz) Trial Effect 8 6 4 2 0 -500 0 500 1000 1500 Time (ms) (a) Figure 10: (a) Raster, along with SMuRF within and cross-trial components, from a cortical neuron that exhibits a transient conditioned response to the conditioned stimulus. The horizontal red line indicates the beginning of conditioning. The vertical green line indicates the onset of the conditioned stimulus. The bottom panel suggests that this neuron exhibits a delayed response to the conditioned stimulus, beginning at ≈< 100 ms following conditioned stimulus presentation. The response then decreases and is followed by a slight increase at ≈ 700 ms. 46 Figure 10: Accounting for this increase in within-trial spiking rate due to the conditioned stimulus, the left panel shows a multiplicative increase in spiking rate due to conditioning from an average initial value of ≈ 1 to a peak average value of ≈ 2 between trial ≈ 18 at trial 30. (b) Empirical probability that spiking rate at a given trial in and time is bigger than the average rate at the same trial and the average rate during habituation at the same time (refer to Figure 2). This panel provides a more detailed account of the the intricate dynamics in neural modulation that accompanies conditioning Trials to the stimulus for this neuron. 45 41 36 31 26 21 16 11 6 1 45 41 36 31 26 21 16 1.0 0.8 0.6 0.4 0.2 0 -500 4 2 0 500 1000 1500 Time (ms) (b) 0 Rate (Hz) Trial Effect 30 20 10 0 -500 0 500 1000 1500 Time (ms) (a) Figure 11: (a) Raster, along with SMuRF within and cross-trial components, from a cortical neuron that exhibits a transient conditioned response to the conditioned stimulus. The horizontal red line indicates the beginning of conditioning. The vertical green line indicates the onset of the conditioned stimulus. 47 Figure 11: The bottom panel suggests that this neuron exhibits a delayed response to the conditioned stimulus, beginning at ≈ 20 ms following conditioned stimulus presentation. The response is sustained until ≈ 800 ms, and then decreases. Accounting for this increase in within-trial spiking rate due to the conditioned stimulus, the left panel shows a multiplicative increase in spiking rate due to conditioning from an average initial value of ≈ 1 to a peak average value of ≈< 2 between trial ≈ 18 at trial 30. (b) Empirical probability that spiking rate at a given trial in and time is bigger than the average rate at the same trial and the average rate during habituation at the same time (refer to Figure 2). This panel provides a more detailed account of the the intricate dynamics in neural modulation that accompanies conditioning to the stimulus for this neuron. References Allsop, S. A., Vander Weele, C. M., Wichmann, R., & Tye, K. M. (2014). Optogenetic insights on the relationship between anxiety-related behaviors and social deficits. Frontiers in behavioral neuroscience, 8, 241. Allsop, S. A., Wichmann, R., Mills, F., Felix-Ortiz, A. C., Viennel, A., Beyeler, A., . . . Tye, K. M. (2017). Observational learning requires cortico-amygdala transfer of socially-derived information. Submitted to Cell. Andrews, D. F., & Mallows, C. L. (1974). Scale mixtures of normal distributions. Journal of the Royal Statistical Society. Series B (Methodological), 99–102. Besag, J. (1974). Spatial interaction and the statistical analysis of lattice systems. Journal of the Royal Statistical Society. Series B (Methodological), 192–236. 48 Casella, G. (2001). Empirical bayes gibbs sampling. Biostatistics, 2(4), 485–500. Casella, G., & George, E. I. (1992). Explaining the gibbs sampler. The American Statistician, 46(3), 167–174. Choi, H. M., & Hobert, J. P. (2013). The polya-gamma gibbs sampler for bayesian logistic regression is uniformly ergodic. Electronic Journal of Statistics, 7, 2054– 2064. Chopin, N., Jacob, P. E., & Papaspiliopoulos, O. (2013). Smc2: an efficient algorithm for sequential analysis of state space models. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 75(3), 397–426. Czanner, G., Eden, U. T., Wirth, S., Yanike, M., Suzuki, W. A., & Brown, E. N. (2008). An analysis of between-trial and within-trial neural spiking dynamics. J. Neurophysiol., 99(5), 2672–2693. Dempster, A. P., Laird, N. M., & Rubin, D. B. (1977). Maximum likelihood from incomplete data via the em algorithm. Journal of the royal statistical society. Series B (methodological), 1–38. Frühwirth-Schnatter, S. (1994). Data augmentation and dynamic linear models. Journal of time series analysis, 15(2), 183–202. Polson, N. G., Scott, J. G., & Windle, J. (2013). Bayesian inference for logistic models using pólya–gamma latent variables. Journal of the American statistical Association, 108(504), 1339–1349. 49 Rad, K. R., & Paninski, L. (2010). Efficient, adaptive estimation of two-dimensional firing rate surfaces via gaussian process methods. Network: Computation in Neural Systems, 21(3-4), 142–168. Scott, J., & Pillow, J. W. (2012). Fully bayesian inference for neural models with negative-binomial spiking. In Advances in neural information processing systems (pp. 1898–1906). Smith, A. C., & Brown, E. N. (2003). Estimating a state-space model from point process observations. Neural Computation, 15(5), 965–991. Truccolo, W., Eden, U. T., Fellows, M. R., Donoghue, J. P., & Brown, E. N. (2005). A point-process framework for relating neural spiking activity to spiking history, neural ensemble, and extrensic covariate effects. J. Neurophysiol., 93, 1074–1089. Wirth, S., Yanike, M., Frank, L. M., Smith, A. C., Brown, E. N., & Suzuki, W. A. (2003). Single neurons in the monkey hippocampus and learning of new associations. Science, 300(5625), 1578–1581. Yuan, K., Girolami, M., & Niranjan, M. (2012). Markov chain monte carlo methods for state-space models with point process observations. Neural Computation, 24(6), 1462–1486. Zammit-Mangion, A., Sanguinetti, G., & Kadirkamanathan, V. (2012). Variational estimation in spatiotemporal systems from continuous and point-process observations. IEEE Transactions on Signal Processing, 7(60), 3449–3459. 50
5cs.CE
An algebraic framework for end-to-end physical-layer network coding arXiv:1611.04226v1 [cs.IT] 14 Nov 2016 Elisa Gorla and Alberto Ravagnani∗ Institut de Mathématiques Université de Neuchâtel Emile-Argand 11, CH-2000 Neuchâtel, Switzerland Abstract We propose an algebraic setup for end-to-end physical-layer network coding based on submodule transmission. We introduce a distance function between modules, describe how it relates to information loss and errors, and show how to compute it. Then we propose a definition of submodule error-correcting code, and investigate bounds and constructions for such codes. Introduction and motivation In the framework of physical-layer network coding (PNC) multiple terminals attempt to exchange messages through intermediate relays. The relays collect data from the terminals, and try to decode a function of the transmitted messages. Such function is then broadcasted to the terminals, which combine it with their side information to recover the other messages. In [11] the authors proposed a novel approach to PNC based on nested lattices, known as “compute-and-forward”. Under this approach, the structure of a fixed underlying lattice is exploited by the relays to decode the function of the messages, which is then forwarded to the terminals. As observed in [5], this communication scheme induces an end-to-end network coding channel with channel equation Y = AX + Z. (1) Here X is the transmitted matrix, whose rows are elements from a given ambient space Ω, A is a transfer matrix, and Z is an error matrix. In practice, A and Z are random matrices drawn according to certain distributions, that depend on the application at hand. A general algebraic framework to study and construct nested-lattice-based PNC schemes was recently proposed in [5] and further developed in [4]. Following this algebraic description, which is compatible with any underlying lattice, the message space Ω has the structure of a module over a principal ideal ring Ω = T /(d1 ) × T /(d2 ) × . . . × T /(dn ), where T ⊆ C is a principal ideal domain (PID), d1 , d2 ..., dn ∈ T are nonzero, non-invertible elements, and dn |dn−1 | . . . |d1 . Let R = T /(d1 ), then R is a principal ideal ring (PIR). The ambient space Ω is isomorphic to an R-submodule of Rn : Ω∼ = R × (d1 /d2 ) × . . . × (d1 /dn ) ⊆ Rn . ∗ (2) E-mail addresses: [email protected], [email protected]. The authors were partially supported by the Swiss National Science Foundation through grant no. 200021 150207. 1 In particular, the elements of Ω can be represented via vectors of length n with entries in R. Both R and Ω are usually finite. Examples 1. We include a list of rings R and ambient spaces Ω that have been proposed in the context of physical-layer network coding, producing efficient communication schemes. • R = Ω = Z2 [i], proposed and studied in [15], [12] and [4, Example 1] for BPSK modulation. • R = Ω = Zm [i], with m a positive integer, proposed and studied in [15] and [4, Example 2], and known as “m2 -QAM PNC scheme”. • R = Zp [i], Ω = Rn , where p is a prime number, proposed in [11]. • R = Zps [i], Ω = R . . × R} × (p) × . . . × (p) × . . . × (ps−1 ) × . . . × (ps−1 ), where p is a prime | × .{z {z } {z } | | n1 n2 ns power and s ≥ 1 is an integer, proposed in [4, Section VII.A]. • R = Z[ω]/(β), where Z[ω] are the Eisenstein integers and β ∈ Z[ω] is a suitable element, Ω = Rn , proposed and studied in [13]. As observed in [5], channel equation (1) suggests to define the message to be transmitted as the module generated over R by the rows of the matrix X, which we denote by row(X). A receiver attempts to recover the original transmitted module from the matrix Y . Two important special cases of equation (1) correspond to the noise-free multiplicative matrix channel (MMC), with equation Y = AX, and the multiplication-free additive matrix channel (AMC), with equation Y = X + Z. These two channel equations are studied in [5] in the case where the base ring R is a finite chain ring. The key tool in handling the MMC in [5] is the reduced row-echelon form of a matrix X, which is a canonical invariant of the row-module of X denoted by RREF(X). In practice, a transmitter emits a matrix X in reduced row-echelon form, and a receiver attempts to recover it by computing RREF(Y ) = RREF(AX). Decoding is successful when A is left-invertible. In the same paper, the authors propose a coding/decoding scheme based on error-trapping for the AMC and the general case of a channel with equation (1). In this paper, in analogy with the approach from [8] for random linear network coding, we propose a new algebraic framework for module transmission based on the notion of length of a module. We define a submodule code as a collection of submodules of the ambient space Ω, and propose a notion of distance between submodules based on length, which we call submodule distance. Then we show that the submodule distance captures both information loss and errors in module transmissions. The row-echelon form for modules over a PIR proposed by Buchmann and Neis in [2] allows us to represent messages in a canonical way. Using the same row-echelon form, we reduce the computation of the distance between submodules to the computation of the length of ideals in the base ring. We also prove that, in some cases, the error-trapping decoding scheme from [5] is a minimum-distance decoding with respect to the submodule distance. We derive two bounds on the cardinality of a submodule code of given minimum distance and whose codewords have fixed length. For certain classes of rings, we are able to state our bounds explicitly in terms of the ring and code’s invariants. We also construct submodule codes with maximum error-correction capability. For R a finite chain ring or R = Zp [i], we show that the codes that we construct have asymptotically optimal cardinality for their parameters. This also shows that our bounds are sharp for certain choices of rings and code parameters. We also give some general code constructions, based on the tensor and on the cartesian product. Our constructions can be applied to various choices of rings and code parameters. 2 Finally, we study codes over products of rings. This is relevant, since a finite PIR R is isomorphic to a product of finite fields and finite chain rings. We show that if R ∼ = R1 ×. . .×Rm , then a product of codes on the Ri ’s yields a code on R, whose parameters are determined and whose decoding can be reduced to decoding on each of the Ri ’s. However, not every code over a finite PIR is a product of codes over fields and finite chain rings. We give a construction of a code over R which is not a product and show that decoding cannot be reduced to decoding on each of the Ri ’s. This shows in particular how the study of codes over a finite PIR cannot be reduced to the study of codes over finite fields and finite chain rings. The structure of the paper is as follows: In Section 1 we recall some definitions and results about PIR’s, modules, length, row-echelon forms of matrices over PIR’s. In Section 2 we define submodule codes and submodule distance, and relate it to information loss and errors in module transmissions. We also show how to efficiently compute the submodule distance. In Section 3 we prove that, in some cases, the error-trapping decoding from [5] can be viewed as a minimum-distance decoding in our framework. Section 4 is devoted to bounds on the cardinality of submodule codes, and Section 5 to submodule codes constructions and to codes over products of rings. 1 Algebraic preliminaries Throughout the paper R denotes a finite PIR and (r) denotes the ideal generated by r ∈ R. Recall that elements a, b ∈ R generate the same ideal if and only if they are associate, i.e., there exists an invertible element ε ∈ R with a = εb (see e.g. [1]). An element g ∈ R is a greatest common divisor (gcd) of a1 , ..., as ∈ R if and only if (a1 )+(a2 )+. . .+(as ) = (g). We write g = gcd(a1 , ..., as ). The gcd is unique up to associates. Finite chain rings are a special case of PIR’s. A ring R is a finite chain ring if it is finite and its ideals form a chain with respect to inclusion. It is well-known that finite chain rings are principal and local (see e.g. [10], page 339). Moreover, if π is a generator of the maximal ideal of R, then the ideals of R are 0 ( (π e−1 ) ( (π e−2 ) ( . . . ( (π) ( R, (3) where e is the smallest positive integer with π e = 0. The integer e does not depend on the choice of the generator π of the maximal ideal. The finite field R/(π) is called the residue field of R. Clearly, R/(π) ∼ = Fq for some prime power q. For any PIR R, define the annihilator of a ∈ R as ann(a) = {r ∈ R | ar = 0}. The annihilator is an ideal of R, and we refer to a generator of ann(a) again as the annihilator of a. If R is a finite chain ring with ideal chain as in (3), then every a ∈ R is of the form a = uπ α for some invertible u and some 0 ≤ α ≤ e. Then ann(a) = (π e−α ). Since every finite PIR R is isomorphic to a product of finite fields and finite chain rings, then annihilators are easy to compute. In the sequel, we will take computation of annihilators for granted. Moreover, inclusion of annihilators can be easily tested by checking divisibility. Proposition 2. Let R be a finite PIR, a, b ∈ R. Then ann(a) ⊆ ann(b) if and only if a | b. Proof. By the Zariski-Samuel Theorem, any finite PIR is isomorphic to a product of finite fields and finite chain rings. Hence it suffices to prove the statement for R a finite chain ring. If b = ac for some c ∈ R, then tb = tac = 0 for every t ∈ ann(a). Hence ann(a) ⊆ ann(b). Conversely, if 3 ann(a) ⊆ ann(b) and R is a finite chain ring with ideal chain as in (3), then a = uπ α and b = vπ β for some u, v invertible, 0 ≤ α, β ≤ e. Since (π e−α ) = ann(a) ⊆ ann(b) = (π e−β ), then e − α ≥ e − β, so α ≤ β and a | b. 1.1 Modules and length We fix an R-module Ω ⊆ Rn as in (2) and let M(Ω) denote the set of R-submodules of Ω. Given M, N ∈ M(Ω), denote by M + N the smallest submodule of Ω which contains both M and N . We write M ⊕ N when N ∩ M = 0. Since R is finite, Ω and its submodules are finite. In particular all modules that we consider are finitely generated. Definition 3. Let M be an R-module. If M = {r1 m1 + . . . + rt mt | r1 , . . . , rt ∈ R} for some m1 , . . . , mt ∈ M , then we say that M is generated by m1 , . . . , mt and m1 , . . . , mt are a system of generators for M . We write M = hm1 , . . . , mt iR or M = hm1 , . . . , mt i when there is no ambiguity. A module is finitely generated if it has a finite system of generators. Definition 4. Let M be an R-module. A chain of distinct submodules of M of the form 0 ( M1 ( M2 ( . . . ( Mλ = M has length λ. The length of M is λR (M ) = max{λ | M has a chain of R-submodules of length λ}. A composition series for M is a maximal chain of distinct R-submodules of M . When the ring is clear from context, we will omit the subscript R. Remark 5. Any ring R is an R-module, and its R-submodules coincide with its ideals. Therefore, the length of a ring R is λ(R) = max{λ | R has a chain of ideals of length λ}. For any a ∈ R we denote by λ(a) the length of the ideal generated by a. Since all modules that we consider are finite, they have finite length. The following properties are well-known (see e.g. [9, Section V§2]). Lemma 6. Let R be a ring, let M, N, Ω be R-modules of finite length. Then: 1) λ(M ) = 0 if and only if M = 0. 2) If N ⊆ M , then λ(N ) ≤ λ(M ) and λ(M/N ) = λ(M ) − λ(N ). In particular, λ(M ) = λ(N ) if and only if M = N . 3) If M, N ⊆ Ω, then λ(M + N ) = λ(M ) + λ(N ) − λ(M ∩ N ). 4) λ(M × N ) = λ(M ) + λ(N ). The concept of length for an R-module generalizes the concept of dimension for a vector space. 4 Example 7 (fields). Every field F is a ring of length one, since it has no proper nonzero ideals. An F-module M is an F-vector space with λ(M ) = dimF (M ). Example 8 (finite chain rings). Let R be a finite chain ring. Let π be a generator of its maximal ideal and let e be the smallest positive integer such that π e = 0. Then λ(R) = e and λ(a) = min{i : a ∈ (π e−i )} = min{i : π e−i | a} for all a ∈ R. It can be shown that every R-module M is isomorphic to a product of ideals: ∼ R × . . . × R × (π) × . . . × (π) × . . . × (π e−1 ) × . . . × (π e−1 ), M= {z } | | | {z } {z } µ1 µ2 −µ1 µe −µe−1 where 0 ≤ µ1 ≤ µ2 ≤ . . . ≤ µe are non-negative integers. Following [5], we say that M has shape (µ1 , µ2 , ..., µe ) ∈ Ne . It is easy to show that two R-modules are isomorphic if and only if they have the same shape. Moreover, by Lemma 6 λ(M ) = e−1 X (µi+1 − µi )(e − i), i=0 where µ0 = 0. 1.2 A reduced row-echelon form for matrices over principal ideal rings Every finitely generated module M ⊆ Ω may be represented as the rowspace of a matrix with entries in R, whose row vectors are a system of generators of M . In order to make such a representation unique, we need a row-canonical form for matrices with entries in a PIR. In [7] Howell proposes a definition of row-canonical matrix over the ring Zn , showing that every matrix can be put in row-canonical form by performing invertible row operations. The ideas of Howell were later extended in [2], where canonical generating systems for submodules of Rn are defined for any PIR R. In the rest of the section we recall the main results of [2], stating them in a convenient matrix formulation. Definition 9. For i ∈ {1, ..., n} we denote by vi the i-th entry of a vector v ∈ Rn . The leading position of a vector v ∈ Rn is the position of its first nonzero entry:  min{1 ≤ j ≤ k | vj 6= 0} if v 6= 0, ℓ(v) = +∞ if v = 0. Given a matrix A ∈ Rt×n , we denote by A1 , ..., At the rows of A, and by row(A) = hA1 , ..., At i the R-module generated by the rows of A. For a module M ⊆ Rn we set M (j) = {v ∈ M | vi = 0 for i < j} for j ∈ {1, ..., n + 1}. Every M (j) is an R-submodule of M and 0 = M (n+1) ⊆ M (n) ⊆ . . . ⊆ M (1) = M. Definition 10. Let A ∈ Rt×k be a matrix, and let M = row(A). We say that A is in row-echelon form if the following hold: 1) for all i ∈ {1, ..., t − 1} we have ℓ(Ai+1 ) > ℓ(Ai ), 2) for all j ∈ {1, ..., n + 1} we have M (j) = hAi | ℓ(Ai ) ≥ ji. 5 The nonzero entries of A of the form Ai,ℓ(Ai ) are the pivots of A. Fix canonical generators and representatives for the ideals and the residue classes of R. We say that A is in reduced row-echelon form if it is in row-echelon form and the following hold: 3) every pivot Aij of A is the canonical generator of the ideal (Aij ), 4) if Aij is a pivot of A, then every entry Asj with s < i is the canonical representative of the residue class Asj + (Aij ). Definition 11. Two matrices A, B ∈ Rt×n are row-equivalent if there exists an invertible matrix U ∈ Rt×t such that A = U B. It is easy to show that A and B are row-equivalent if and only if row(A) = row(B). We now prove that every matrix is row-equivalent to a matrix in row-echelon form, and to a unique matrix in reduced row-echelon form. The next lemma is well-known and appears in several references. We include a proof, since we could not find a complete one in the literature. Lemma 12. For any a, b ∈ R \ {0} there exist x, y, z, t ∈ R such that      x y a g = , xt − yz = 1, (g) = (a) + (b). z t b 0 Proof. By [14, Theorem 33, pg. 245], every principal ideal ring is isomorphic to a direct product of quotients of PID’s. Therefore it suffices to prove the result for R = D/(π), where D is a PID and π ∈ D. If π = 0 then R = D is a PID. Let g = gcd(a, b) and write g = ka + hb for some k, h ∈ R. Dividing by g we obtain 1 = k(a/g) + h(b/g). Let x = k, y = h, z = −b/g, t = a/g. Now assume π 6= 0. Recall that every PID D is a unique factorization domain. Consider the projection map ¯· : D → R and choose elements α, β ∈ D with α = a and β = b. Let η = gcd(α, β, π) and P = {p ∈ D | p is irreducible and divides both α/η and π/η}. For all p ∈ P we set ep = max{i | pi divides π/η}. Define  Q (π/η) / p∈P pep if P 6= ∅, γ= (π/η) if P = ∅. We claim that α/η + γ(β/η) and π/η are Q coprime. By contradiction, let p ∈ D be irreducible, β/η, π/η) = 1 p | gcd(π/η, α/η + γ(β/η)). If p ∤ γ, then p | p∈P pep , so p | (α/η). Since gcd(α/η, Q and p | (α/η), (π/η), then p ∤ α/η + γ(β/η), a contradiction. If p | γ, then p ∤ p∈P pep , so p ∤ (α/η). However p | (α/η + γ(β/η)), a contradiction. We conclude that α/η + γ(β/η) and π/η are coprime, hence there exist λ, µ ∈ D such that λ(α/η + γ(β/η)) + µ(π/η) = 1, i.e. λ(α + γβ) + µπ = η. Hence (η) ⊆ (α + γβ, π) ⊆ (α, β, π) = (η). Therefore (α + γβ) + (π) = (α) + (β) + (π), so a + cb = gcd(a, b) in R = D/(π), where c = γ. Write b = h(a + cb), for some h ∈ R. Let x = 1, y = c, z = −h, t = −ch + 1. Remark 13. The element γ ∈ D in the proof of Lemma 12 can be computed (up to associates) via the following algorithm. γ := π/η g := gcd(γ, α/η) while g 6= 1 do 6 γ ← γ/g g ← gcd(γ, α/η) end while Theorem 14 ([2], Algorithm 3.2 and Theorem 3.3). Given a matrix A ∈ Rt×k , we can compute a row-equivalent matrix in row-echelon form in O(tk2 ) operations in R. We describe Algorithm 3.2 from [2], adapting it to our matrix notation. 1) If A is the zero matrix, then it is already in row-echelon form. Otherwise, up to permuting the rows of A, we may assume without loss of generality that +∞ > ℓ(A1 ) ≥ ℓ(A2 ) ≥ . . . ≥ ℓ(At ). 2) If j = ℓ(A1 ) > ℓ(A2 ) then the first step is concluded. Otherwise, let g = gcd(A1j , A2j , ..., Atj ). Applying Lemma 12 iteratively one finds a row-equivalent matrix A′ ∈ Rt×n with A′1j = g and ℓ(A′i ) > j for i > 1. 3) Let x ∈ R be the annihilator of g. We append x · A1 to the matrix A′ , obtaining a matrix A′′ . Notice that row(A′′ ) = row(A). Moreover, if v ∈ row(A′′ ) and vs = 0 for 1 ≤ s ≤ j, then v ∈ hA′′2 , ..., A′′t+1 i. One repeats the three steps above on the matrix obtained from A′′ by deleting the first row, until there are no more rows left. The algorithm produces a matrix in row-echelon form, which is rowequivalent to A. Example 15. Consider the matrix   2 1 3 A= 4 1 2 over R = Z6 . Applying the algorithm that we just described, one computes:         2 1 3 2 1 3 2 1 3 2 1 3 0 5 2 . 0 5 2 4 1 2 0 5 2 0 0 3 0 3 3 Notice that the number of rows increased from two to three. Fix generators and representatives for the ideals and residue classes of R. Every matrix A with entries in R is row-equivalent to a unique matrix in reduced row-echelon form, with respect to the given choice of generators and representatives. Theorem 16 ([2], Algorithm 3.4 and Theorem 3.5). Let A ∈ Rt×n be a matrix. Then A is rowequivalent to a unique matrix in reduced row-echelon form, which we denote by RREF(A). The reduced row-echelon form of A can be computed from a row-echelon form of A in O(n3 ) operations in R. In fact, using the algorithm from Theorem 14, A can be put in row-echelon form. After multiplying it by a diagonal matrix with invertible elements on the diagonal, the matrix satisfies property 3) of Definition 10. Finally, by subtracting suitable multiples of each row from the rows above, one ensures that property 4) of Definition 10 holds. The last operation corresponds to multiplying on the left by an upper triangular matrix with ones on the diagonal. The next result characterizes matrices in row-echelon form over a finite PIR. A proof can be obtained using Proposition 2. 7 Proposition 17. Let A ∈ Rt×n be a matrix with no zero rows. A is in row-echelon form if and only if the following hold: 1. ℓ(Ai+1 ) > ℓ(Ai ) for all i ∈ {1, ..., t − 1}, 2. Atℓ(At ) | Atj for all ℓ(At ) ≤ j ≤ n, 3. ann(Aiℓ(Ai ) ) · Ai ∈ hAi+1 , ..., At i for all i ∈ {1, ..., t − 1}. Proposition 17 and Algorithm 4.1 of [2] lead to the following algorithm to test whether a matrix is in row-echelon form. Input: a matrix A ∈ Rt×n with ℓ(Ai+1 ) > ℓ(Ai ) for all i ∈ {1, ..., t − 1} Output: “YES” if A is in row-echelon form, and “NO” otherwise for i = 1 to t do ji := ℓ(Ai ) end for for j = jt to n do if Atjt ∤ Atj then return NO quit end if end for for i = t − 1 downto 1 do use Algorithm 4.1 of [2] to test if ann(Aiji ) · Ai ∈ hAi+1 , ..., At i if ann(Aiji ) · Ai ∈ / hAi+1 , ..., At i then return NO quit end if end for return YES quit Proposition 18. The previous algorithm terminates correctly. Proof. Algorithm 4.1 of [2] tests whether a given vector belongs to the module generated by the rows of a matrix in row-echelon form. Therefore, we first need to show that the last for cycle of the algorithm is well-defined, i.e., that if the algorithm enters the for cycle for some i, then the matrix whose rows are Ai+1 , ..., At is in row-echelon form. We proceed by backward induction on i ∈ {t − 1, ..., 1}. Assume that the algorithm enters the cycle for i = t − 1. Then by the structure of the algorithm and Proposition 17, the matrix whose row is At is in row-echelon form, as claimed. Now assume i < t − 1. Since the algorithm enters the for cycle for i, it entered the for cycle also for i + 1. By induction hypothesis, the matrix whose rows are Ai+2 , ..., At is in row-echelon form. Since the algorithm enters the for cycle for i, we have ann(Ai+1 ) · Ai+1 ∈ hAi+2 , ..., At i. Therefore by Proposition 17 the matrix whose rows are Ai+1 , ..., At is in row-echelon form. The previous argument also shows that if the algorithm returns YES, then A is in row-echelon form. Finally, using Proposition 17 one can check that if A is in row-echelon form, then the algorithm returns YES. 8 2 Submodule codes and submodule distance Using the length, one can define a distance function between submodules of Ω. Proposition 19. The function d : M(Ω) × M(Ω) → N defined by d(M, N ) = λ(M ) + λ(N ) − 2λ(M ∩ N ) for all M, N ∈ M(Ω) is a distance function. Definition 20. We call d the submodule distance on M(Ω). Proof of Proposition 19. Let M, N, P ⊆ Ω be R-submodules. By Lemma 6 we have d(M, N ) = λ(M + N ) − λ(M ∩ N ). Since M ∩ N ⊆ M + N we have d(M, N ) ≥ 0, and equality holds if and only if M + N = M ∩ N , i.e., if and only if M = N . Moreover, d(M, N ) = d(N, M ) by definition. To prove the triangular inequality, observe that by definition d(M, N ) = d(M, P ) + d(P, N ) − 2(λ(M ∩ N ) + λ(P ) − λ(M ∩ P ) − λ(N ∩ P )). Therefore it suffices to prove that x = λ(M ∩ N ) + λ(P ) − λ(M ∩ P ) − λ(N ∩ P ) ≥ 0. By Lemma 6 we have x = λ(M + P ) + λ(N + P ) − λ(M + N ) − λ(P ). Since (M + P ) + (N + P ) ⊇ M + N and (M + P ) ∩ (N + P ) ⊇ P , by Lemma 6 λ(M + P ) + λ(N + P ) − λ(P ) ≥ λ(M + P ) + λ(N + P ) − λ((M + P ) ∩ (N + P )) ≥ λ(M + N ), hence x ≥ 0. When R = F is a field, the submodule distance on Fn coincides with the subspace distance proposed by Kötter and Kschischang in [8] for error correction in random linear network coding. The concepts of information loss and error from [8] can be extended to our setting as follows. Remark 21. Let M ⊆ Rn be the transmitted module, and let N ⊆ Rn be the received module. The portion of information that was correctly transmitted is M ∩ N . The quotient M/(M ∩ N ) may be regarded as the information loss module, i.e. the original information modulo the portion of information that was correctly transmitted. Similarly, the error module is the quotient N/(M ∩ N ). Using Lemma 6, one can check that d(M, N ) = λ(M/(M ∩ N )) + λ(N/(M ∩ N )). In other words, the distance between M and N is the sum of the lengths of the information loss module and of the error module, similarly to what was shown in [8] in the context of subspace codes. Definition 22. A submodule code is a subset C ⊆ M(Ω) with |C| ≥ 2. The minimum (submodule) distance of C is d(C) = min{d(M, N ) : M, N ∈ C, M 6= N }. Definition 23. Let C ⊆ M(Ω) be a submodule code. Let M ∈ C be the transmitted module, and let N ∈ M(Rn ) be the received module. Define the number of erasures as ρ = λ(M/(M ∩ N )) and the number of errors as e = λ(N/(M ∩ N )). The next result follows from Remark 21 using a standard argument. Proposition 24. Let C ⊆ M(Ω) be a submodule code of minimum distance d. Then a minimum distance decoder successfully corrects N to M , provided that 2(ρ + e) < d(C). 9 2.1 Computing the distance function In this subsection we show that the length of a module is the sum of the lengths of the ideals generated by the pivots of a matrix in row-echelon form, whose rows generate the module. Therefore, computing the length of an R-module can be reduced to computing lengths of ideals in R. This allows us to efficiently compute distances between submodules of Rn . Theorem 25. Let M ⊆ Rn be an R-module. Let A ∈ Rt×n be a matrix in row-echelon form with no zero rows and such that M = row(A). For every j ∈ {1, ..., n + 1} let M (j) = {m ∈ M | vi = 0 for i < j} ⊆ Rn and I (j) = (vj | v ∈ M (j) ) ⊆ R. Let Aiℓ(Ai ) be the pivot of the i-th row of A. Then:  1) I (ℓ(Ai )) = Aiℓ(Ai ) ∼ = M (j) /M (j+1) for all i ∈ {1, ..., t},  P 2) λ(M ) = ti=1 λ Aiℓ(Ai ) . Proof. 1) The map M (j) /M (j+1) → I (j) given by v + M (j+1) 7→ vj is a well-defined R-module isomorphism. Therefore I (j) ∼ = M (j) /M (j+1) . Fix any i ∈ {1, ..., t} and let j = ℓ(Ai ). Since (j) (j) (j) Ai ∈ M we have (Aij ) ⊆ I (j) . On the other hand, Pt let 0 6= x ∈ I and let v ∈ M such that x = vj . Since A is in row-echelon form, v = k=i rk Ak for some ri , ..., rt ∈ R. Therefore x = vj = ri Aij , so x ∈ (Aij ). 2) Applying [9, Corollary V.2.4] to the chain of R-modules 0 = M (n+1) ⊆ . . . ⊆ M (1) = M we obtain n   X λ M (j) /M (j+1) . λ(M ) = j=1  (j+1) 6= 0 if and only if I (j) 6= 0, if and only if j = ℓ(Ai ) for By Lemma 6 one has λ M (j) /M some i ∈ {1, . . . , t}. Then   λ M (j) /M (j+1) = λ(Aij ). Example 26. The module M = h(2, 1, 3), (4, 1, 2)i ⊆ Z36 generated by the rows of the matrix of Example 15 has length λ(M ) = λ(2) + λ(5) + λ(3) = 1 + 2 + 1 = 4. Remark 27. Let M = row(A) be the transmitted module, and let N = row(B) be the received module. By Lemma 6 we have d(M, N ) = 2λ(M + N ) − λ(M ) − λ(N ). Therefore the distance between M and N can be computed from the row-echelon forms of A, B, and of the matrix C obtained by appending the rows of B to A. In fact M + N = row(A) + row(B) = row(C). This allows us to compute the distance function without computing intersections of modules. Example 28. Let R = Z4 . Notice  1  A= 0 0 that the only nonzero, proper ideal of R is (2). Let    1 1 0 1 3 0 2  B= 2 1 2 , 0 0 1 0 0 2 0 10 be matrices in row-echelon form, whose underlined entries are the pivots. Let M = row(A) and N = row(B). Then λ(M ) = λ(1) + λ(2) + λ(2) = 2 + 1 + 1 = 4 λ(N ) = λ(1) + λ(1) = 2 + 2 = 4 Then M + N = row(C), where whose reduced row-echelon form is  1 0  C= 0 1 0 1 2 0 3 0 1 1 2 0 1  0 2  0  2 0   1 1 0 0 0 2 0 2 . 0 0 1 0 Hence λ(M + N ) = λ(1) + λ(2) + λ(1) = 2 + 1 + 2 = 5 and d(M, N ) = 2λ(M + N ) − λ(M ) − λ(N ) = 10 − 8 = 2. One can compute λ(M ∩ N ) = λ(M ) + λ(N ) − λ(M + N ) = 3. Hence the information loss module has length λ(M/(M ∩ N )) = λ(M ) − λ(M ∩ N ) = 1 and the error module has length λ(N/(M ∩ N )) = λ(N ) − λ(M ∩ N ) = 1. 3 Recovering known encoding and decoding schemes In this section we compare our approach to the one proposed by Feng, Nóbrega, Kschischang, and Silva for the multiplicative-additive matrix channel (MAMC) in [4, Section IX]. We show that their encoding scheme remains valid in our setup. We also prove that, in some cases, their decoding scheme corresponds to minimum distance decoding with respect to the distance function that we propose. In our notation, Feng, Nóbrega, Kschischang, and Silva consider the MAMC of equation Y = AX + Z, where R is a finite chain ring, A ∈ RN ×t , X ∈ Rt×n , Z ∈ RN ×n . They assume that n ≥ 2N , row(A) ∼ = Rt , and row(Z) ∼ = Rv for some integer v ≤ N . They represent matrices in row canonical form (see [4, Definition 1] for the definition of row canonical form) and define their codebook to be the set of principal matrices of given shape in row canonical form (see [4, Section V.B and Sections VII, VIII, IX]). Observe that matrices in row canonical form are not in general in reduced row-echelon form according to our Definition 10. Example 29. Let R = Z8 , whose ideals 0 ( (4) ( (2) ( (1) have canonical generators 0, 4, 2, 1. Choose 0, 1, 2, 3 as canonical representatives for residue classes modulo (4), 0, 1 as canonical representatives for residue classes modulo (2), and 0 as canonical representative for the residue class modulo (1). The rows of the following matrices generate the same R-module. The first matrix is in row canonical form (see [4, Example 6]), while the second is in reduced row-echelon form. The pivots are underlined.     0 2 0 1 2 0 0 1 2 2 0 0 0 2 0 1     0 0 2 0 0 0 2 0 . 0 4 0 0 0 0 0 2 11 The authors of [4] propose asymptotically optimal encoding and decoding schemes using principal matrices over a finite chain ring R. A transmitted module M is encoded as a principal matrix in row canonical form, whose rows generate M . In the next proposition we show that principal matrices in row canonical form are in reduced row-echelon form. Therefore, the encoding schemes of [4] remain valid in our setup. Proposition 30. Let R be a finite chain ring, and let A ∈ Rt×n be a principal matrix in row canonical form. Then A is in reduced row-echelon form with respect to the same choices of generators and representatives. Proof. Let π be a generator of the maximal ideal of R, let e be the smallest positive integer such that π e = 0. By the definition of principal row canonical form, the pivot of row Ai is Aii = π ℓi for i ∈ {1, . . . , t}, with 0 ≤ ℓ1 ≤ . . . ≤ ℓt ≤ e. Moreover, Aij = π aij with aij ≥ ℓi for i < j ≤ n, hence ann(Aij ) ⊇ ann(Aii ). Pt Let v ∈ row(A) \ {0}, let j = ℓ(v). Write v = i=1 ri Ai for some r1 , ..., rt ∈ R. Hence v1 = r1 A1,1 = 0, v2 = r1 A1,2 + r2 A2,2 = 0, . . . , vj−1 = r1 Ai,j−1 + . . . + rj−1 Aj−1,j−1 . By induction on iP one can show that ri Aii = 0 for 1 ≤ i < j, hence ri Ai = 0 for 1 ≤ i < j. Therefore v = ti=j ri Ai ∈ hAj , . . . , At i, so A is in reduced row-echelon form according to Definition 10. We conclude this section with Proposition 32, that shows that the error-trapping decoding scheme proposed in [4] for the MAMC can be interpreted as a minimum distance decoding with respect to the distance function from Definition 20. Before stating our result, we recall the scheme of [4, Section IX]. Example 31 (Error-trapping decoding). Let R be a finite chain ring. Fix N such that n ≥ 2N and consider the channel equation Y = AX + Z, where A ∈ RN ×t is left-invertible, X ∈ Rt×n is the matrix whose rows generate the transmitted module, and Z ∈ RN ×n is a noise matrix whose row-module is isomorphic to Rv for some integer v ≤ N . One can write   0 A = P (N −t)×t , It where P ∈ RN ×N is an invertible matrix. Fix u ≥ v. If t + v > N let X ∈ Rt×n be of the form   0 0 , X= 0 X where X is a matrix in principal form of size (N − u) × (n − u). If t + v ≤ N let X ∈ Rt×n be of the form   X= 0 X , where X is a matrix in principal form of size t × (n − u). Under the assumption that error trapping is successful, [4, Section IX.B] shows that the row canonical form of Y = AX + Z is   Z1 Z2  0 X, 0 0 for suitable matrices Z1 ∈ Rv×u and Z2 ∈ Rv×(n−u) . Hence X and X can be obtained by computing the row canonical form of Y . 12 In some cases, the error-trapping decoding from [4] can be seen as an instance of minimum distance decoding according to our definition. Notice that the choice u = v is particularly interesting, since it maximizes the number of codewords for the given channel, without affecting the error-correction capability of the code. Proposition 32. Following the notation of Example 31, and under the assumption that either t + v = N or u = v and t + v > N , we have       0 0 0 0 d row(Y ), row ≥ d row(Y ), row 0 T 0 X for any principal matrix in row canonical form T of the same size as X. Moreover, equality holds if and only if T = X. Proof. Since error-trapping is successful, by [4, Section IX.B] there exist matrices G, H, K such that   H K Y =G· , 0 X where G ∈ RN ×N is invertible, H ∈ Rv×u and row(H) ∼ = Rv , K ∈ Rv×(n−u) . Since row(H) ∼ = Rv ,         H K 0 0 0 0 0 0 row ∩ row = row ∩ row . 0 X 0 T 0 X 0 T Therefore  0 0 = λ(row(Y )) + λ(row(T )) − 2λ(row(X) ∩ row(T )) d row(Y ), row 0 T    0 0 + λ(row(T )) + λ(row(X)) − 2λ(row(X) ∩ row(T )) = d row(Y ), row 0 X         0 0 0 0 0 0 + d row , row . = d row(Y ), row 0 X 0 T 0 X   The result now follows from the fact that both X and T are principal matrices in row canonical form, hence they are in reduced row-echelon form by Proposition 30. 4 Bounds In this section we derive two upper-bounds on the cardinality of a submodule code with given minimum distance. We also discuss in detail some choices of rings or of the code parameters, for which our bound can be made more precise. As in the previous sections, we fix a finite PIR R, an R-module Ω ⊆ Rn of the form (2), and let M(Ω) denote the set of R-submodules of Ω. Notation 33. For M ∈ M(Ω) and 1 ≤ s ≤ λ(M ) let   M = |{N ∈ M(M ) : λ(N ) = s}|. s R For 1 ≤ s ≤ λ let      M λ : M ∈ M(Ω), λ(M ) = λ . = min s R s R 13 When there is no ambiguity, we omit the subscript R. Moreover, we denote by     λ λ = s F s q q the q-ary binomial coefficient. We restrict our attention to submodules codes C ⊆ M(Ω) where all codewords have the same length k, 1 ≤ k ≤ n · λ(R) − 1. Submodule codes of this kind have even minimum distance, and they are the module-analogue of constant-dimension subspace codes. The next result is a natural extension to submodule codes of the Singleton-like bound for subspace codes. Theorem 34. Let C ⊆ M(Ω) be a submodule code with λ(M ) = k for all M ∈ C and minimum distance d(C) = 2δ. Then   λ(Ω) − δ + 1 |C| ≤ . k−δ+1 Proof. Let M ∈ M(Ω) be an R-module with λ(M ) = λ(Ω) − δ + 1. By Lemma 6, for all N ∈ C λ(M ∩ N ) = λ(M ) + λ(N ) − λ(M + N ) ≥ λ(Ω) − δ + 1 + k − λ(Ω) = k − δ + 1. For every N ∈ C choose an R-submodule N ′ ⊆ M ∩ N with λ(N ′ ) = k − δ + 1. For any N, P ∈ C with N 6= P we have 2δ = d(C) ≤ d(N, P ) = 2k − 2λ(N ∩ P ), hence λ(N ∩ P ) ≤ k − δ. Hence d(N ′ , P ′ ) = 2(k − δ + 1) − 2λ(N ′ ∩ P ′ ) ≥ 2(k − δ + 1) − 2(k − δ) = 2, in particular N ′ 6= P ′ . It follows that C ′ = {N ′ : N ∈ C} is a set of submodules of M of length k − δ + 1 with |C ′ | = |C|. Therefore   M ′ |C| = |C | ≤ , k−δ+1 for any M ∈ M(Ω) of length λ(Ω) − δ + 1.   M Remark 35. For a given R and fixed m, ℓ, the quantity may depend on the choice of M of ℓ length m. E.g., let R = Z5 [i] ⊇ I = (2 + i) and Ω = R2 . Then R × 0 and I × I are two R-modules of length 2. The ideals of length one of R are exactly I = (2 + i) and (2 − i), while I × I contains at least three submodules of length one, namely I × 0, 0 × I, and (1, 1)I = h(2 + i, 2 + i)i. Remark 36. Since every R-module of length greater than or equal to λ(Ω) − δ + 1 contains an R-submodule of length λ(Ω) − δ + 1, the bound of Theorem 34 can also be stated as    M |C| ≤ min : M ∈ M(Ω), λ(M ) ≥ λ(Ω) − δ + 1 . k−δ+1 The following is another simple bound for the cardinality of a submodule code. Theorem 37. Let C ⊆ M(Ω) be a submodule code with λ(M ) = k for all M ∈ C, and minimum distance d(C) = 2δ. Then   Ω k−δ+1 . |C| ≤  k k−δ+1 14  k submodules of Ω of length k − δ + 1. Moreover, Proof. Each M ∈ C contains at least k−δ+1 a submodule of Ω of length k − δ + 1 cannot be contained in two distinct M, N ∈ C, as otherwise λ(M ∩ N ) ≥ k − δ + 1, hence d(M, N ) < 2δ. Therefore     Ω k ≥ |C| · , k−δ+1 k−δ+1  which proves the bound. Remark 38. The upper bounds of Theorem 34 and 37 are not comparable. For example, let k = δ, R = Fq , and Ω = Fnq . Assume that k | n. The bound of Theorem 34 is   n−k+1 |C| ≤ = q n−k + q n−k−1 + . . . + q + 1, 1 q while the bound of Theorem 37 is   n 1 q qn − 1 |C| ≤   = k = q n−k + q n−2k + . . . + q k + 1. q −1 k 1 q However, one can also find examples in which Theorem 34 yields a better bound than Theorem 37. E.g., let R = Z12 . The Hasse diagram of the ideals of R is R (2) (3) (4) (6) (0) In particular, λ(R) = 3. Let Ω = R2 and let C ⊆ M(Ω) be a submodule code with k = δ = 2. By Theorem 25, the module   1 0 M = row ⊆Ω 0 3 has λ(M ) = λ(1) + λ(3) = 5. Moreover, the submodules of M of length 1 are precisely those generated by one of the following vectors: (4, 0), (6, 0), (6, 6), (0, 6). Therefore, |C| ≤ 4 by Theorem 34. Now let N = h(0, 3)i ⊆ Ω. Then λ(N ) = 2 and N has a unique submodule of length 1, namely h(0, 6)i. Hence      2 N = min : N ∈ M(Ω), λ(N ) = 2 = 1. 1 1 One can check that the submodules of Ω of length 1 are exactly those generated by one of the following vectors: (4, 0), (4, 4), (4, 8), (6, 0), (6, 6), (0, 4), (0, 6). Therefore the bound of Theorem 37 reads     2 Ω = 7 > 4. / |C| ≤ 1 1 15 The bounds of Theorem 34 and Theorem 37 can be made more explicit for PIR’s which are 2 isomorphic to Zm p for some m ≥ 1. An example of such ring is Zp [i], which is isomorphic to Zp if p ≡ 1 mod 4, as we show next. Notice that in the other cases Zp [i] is either a finite chain ring or a finite field. Remark 39. Let p be a prime. Then   Z2 [x]/(x + 1)2 2 Zp [i] ∼ F 2 = Zp [x]/(x + 1) ∼ =  p Zp × Zp if p = 2, if p ≡ 3 mod 4, if p ≡ 1 mod 4. Indeed, if p = 2, then x2 + 1 = (x + 1)2 . If p is an odd prime, then x2 + 1 is reducible if and only if −1 is a quadratic residue modulo p, if and only if p ≡ 1 mod 4. The thesis now follows from the Chinese Remainder Theorem. We start with a preliminary result on the structure of rings of the form R ∼ = Zm p . Lemma 40. Let R ∼ = Zm p . Then there exist e1 , . . . , em ∈ R such that R = (e1 ) ⊕ . . . ⊕ (em ) and e1 + . . . + em = 1, e2i = ei for all 1 ≤ i ≤ m, and ei ej = 0 if i 6= j. Moreover, λ(R) = m. m Proof. Fix an isomorphism π : R → Zm p between R and Zp . Let ei ∈ R be the inverse image via π m of the i-th element of the standard basis of Zp . Then e1 + . . . + em = 1, e2i = ei for all 1 ≤ i ≤ m, and ei ej = 0 if i 6= j. Notice that R is a Zp -vector space via αr = π −1 (απ(r)) for α ∈ Zp , r ∈ R. This corresponds to identifying Zp with {π −1 (α, . . . , α) : α ∈ Zp } ⊆ R. Since R = (e1 ) ⊕ . . . ⊕ (em ), then every r ∈ R can be written uniquely as r = r1 e1 + . . . + rm em with ri ∈ Zp , where we regard Zp as a subset of R via the identification above. Therefore λ(R) = m and a composition series for R is given by 0 ( (e1 ) ( (e1 , e2 ) ( . . . ( (e1 , . . . , em ) = R. Using the notation of Lemma 40, we can count the number of submodules of fixed length of any given R-module M . For the sake of concreteness we limit our attention to submodules of Rn , but the same proof applies to any finitely generated R-module M . n Theorem 41. Let R ∼ = Zm p , let M ∈ M(R ). The number of R-submodules of M of length ℓ is    m  X Y M dim(ei M ) = . ℓ ℓi m p (ℓ1 , . . . , ℓm ) ∈ N , ℓ1 + . . . + ℓm = ℓ In particular,  i=1  X m pdim(ei M ) − 1 M = . 1 p−1 i=1 Proof. By Lemma 40, for all M ∈ M(Rn ) one has M = e1 M ⊕ . . . ⊕ em M. Pm Therefore λ(M ) = i=1 λ(ei M ). Moreover, for all r = r1 e1 + . . . + rm em ∈ R and v ∈ M we have rei v = ri ei v for all i. Therefore the R-submodules of ei M coincide with its Zp -subspaces, hence λ(ei M ) = dimZp (ei M ). Hence we have shown that for every R-module M ⊆ Rn λ(M ) = m X dimZp (ei M ) = dimZp (M ). i=1 16 Since for every collection of submodules Ni ⊆ ei M the module N = N1 ⊕ . . . ⊕ Nm ∈ M(M ) and the R-submodules of ei M coincide with its Zp -subspaces, then the number of R-submodules of M of length ℓ is    m  Y X M dim(ei M ) . = ℓ ℓi m p (ℓ1 , . . . , ℓm ) ∈ N , ℓ1 + . . . + ℓm = ℓ i=1 Theorem 41 allows us to evaluate the bounds of Theorem 34 and Theorem 37 as follows. ∼ Zm . Let C ⊆ M(Ω) be a submodule code with λ(M ) = k for all M ∈ C Corollary 42. Let R = p and d(C) = 2δ. Let       m     Y X ui m b(λ, k, δ) = min : (u1 , . . . , um ) ∈ N , u1 + . . . + um = λ − δ + 1 . ℓi p     i=1  (ℓ1 , . . . , ℓm ) ∈ Nm ,  ℓ1 + . . . + ℓm = k − δ + 1 Then |C| ≤ b(λ(Ω), k, δ). Moreover, |C| ≤ X (ℓ1 , . . . , ℓm ) ∈ Nm , ℓ1 + . . . + ℓm = k − δ + 1 (4)  m  Y dim(ei Ω) i=1 ℓi b(k + δ − 1, k, δ) If Ω = Rn and δ = k, then |C| ≤ p . (pn − 1)/(p − 1) . ⌈(pk/m − 1)/(p − 1)⌉ (5) (6) If in addition m = 2 and k is odd, then |C| ≤ ⌊2(pn − 1)/(ph + ph−1 − 2)⌋, (7) where h = ⌈k/2⌉. Proof. Let M ∈ M(Ω) be a submodule of length λ(M ) = λ(Ω) − δ + 1 and let ui = dim(ei M ) for all i. By Theorem 41, the number of submodules of M of length k − δ + 1 equals   m   Y X M ui . = k−δ+1 ℓi p m (ℓ1 , . . . , ℓm ) ∈ N , ℓ1 + . . . + ℓm = k − δ + 1 i=1 Hence Theorem 34 implies bound (4). Similarly, bound (5) follows from Theorem 37. Now assume δ = k and Ω = Rn . We have ) ! ( m m X X 1 ui = k . pui − m : (u1 , ..., um ) ∈ Nm , b(2k − 1, k, k) = min p−1 i=1 i=1 P xi m Let f : Rm → R be the function defined by f (x1 , ..., xm ) = m i=1 p for all (x1 , ..., xm ) ∈ R . Using e.g. the method of Lagrange multipliers from Calculus, one can show that the minimum of f in the region of Rm defined by the constraints m X xi = k, xi ≥ 0 for all i ∈ {1, ..., m} i=1 17 is attained for x1 = x2 = . . . = xm = k/m, and that its value is mpk/m . This shows that b(2k − 1, k, k) ≥ ⌈(mpk/m − m)/(p − 1)⌉. Bound (6) now follows from bound (5) and the fact that dim(ei Ω) = n for all i ∈ {1, ..., m}. If in addition m = 2 and k is odd, then without loss of generality we may assume u1 ≥ u2 + 1. Using elementary methods from Calculus, one shows that b(2k − 1, k, k) ≥ ph + ph−1 − 2 , p−1 where h = ⌈k/2⌉. This concludes the proof. We conclude this section by evaluating the bound of Theorem 34 for finite chain rings. We concentrate on codes C ⊆ M(Ω) with λ(M ) = k for all M ∈ C and d(C) = 2k. Theorem 43. Let R be a finite chain ring of length e, let π ∈ R be a generator of the maximal ideal of R, let q be the cardinality of the residue field of R. Let Ω = R × (π a2 ) × . . . × (π an ) for some 0 ≤ a2 ≤ . . . ≤ an ≤ e − 1. Let C ⊆ M(Ω) be a submodule code with d(C) = 2k and whose codewords have length k. Then qm − 1 |C| ≤ q−1 where m = min{1 ≤ i ≤ n | (n − i)e − ai+1 − . . . − an ≤ k − 1}. In particular, if Ω = Rn , then |C| ≤ q n−h+1 − 1 q−1 where k = he − r with 0 ≤ r ≤ e − 1. Proof. We claim that the submodules of length one of an R-module M ⊆ Rn are in bijection with the vectors v ∈ M of the form v = (0, . . . , 0, π e−1 , vi+1 , ..., vn ) | {z } (8) i−1 where 1 ≤ i ≤ n and vi+1 , ..., vn ∈ (π e−1 ). In fact, every module of length one is minimally generated by one vector. If we represent a module generated by one vector by a matrix in reduced row-echelon form, then such a matrix has a unique row by Theorem 25, and by Proposition 17 the row is of the form v = (0, . . . , 0, π s , vi+1 , ..., vn ) with vi+1 , ..., vn ∈ (π s ). Finally, λ(hvi) = λ(π s ) = e − s by Theorem 25. Hence the modules of length one are exactly those generated by vectors of the form (8). By uniqueness of the reduced row-echelon form, two such modules are distinct if and only if they are generated by distinct vectors in reduced row-echelon form. This proves the claim. Notice that there are exactly q n−i vectors of the form (8), for a fixed i ∈ {1, . . . , n}. Let M ⊆ Ω be a submodule of length λ(Ω) − k + 1. Let m be the least integer such that M ⊆ Rm × |0 × .{z . . × 0} . n−m Notice that m depends on M , and not just on its length. Then M contains exactly q m−1 + q m−2 + m −1 vectors of the form (8), since each such vector has vi+1 , . . . , vm ∈ (π e−1 ) . . . + q + 1 = qq−1 18 and vm+1 = . . . = vn = 0, for some 1 ≤ i ≤ m. Since Ω = R × (π a2 ) × . . . × (π an ), then λ(Ω) = ne − a2 − . . . − an . If M ⊆ (Ri × 0 × . . . × 0) ∩ Ω = R × π a2 R × . . . × π ai R × 0 × . . . × 0 for some i, then λ(M ) = ne − a2 − . . . − an − k + 1 ≤ λ(R × π a2 R × . . . × π ai R) = ie − a2 − . . . − ai . Hence m ≥ min{1 ≤ i ≤ n : (n − i)e − ai+1 − . . . − an ≤ k − 1} and equality holds for any M ⊆ R × (π a2 ) × . . . × (π am ) × 0 × . . . × 0. By Theorem 34    M |C| ≤ min : M ⊆ Ω, λ(M ) = λ(Ω) − δ + 1 k−δ+1 = min   qi − 1 qm − 1 i : M ⊆ Ω ∩ R × 0 × . . . × 0, λ(M ) = λ(Ω) − δ + 1 = q−1 q−1 where m = min{1 ≤ i ≤ n | (n − i)e − ai+1 − . . . − an ≤ k − 1}. If Ω = Rn , then a2 = . . . = an = 0. Write k = he − r with 0 ≤ r ≤ e − 1. Then (h − 1)e ≤ k − 1 ≤ he − 1, hence m = min{1 ≤ i ≤ n | (n − i)e ≤ k − 1} = n − h + 1. 5 Constructions In this section we propose some constructions for submodule codes for an ambient space of the form Ω = Rn . Throughout the section we say that a code is asymptotically optimal if its cardinality asymptotically meets one of the bounds of the previous section. We say that a code is optimal if its cardinality exactly meets one of the bounds. We first concentrate on finite chain rings, and show how to construct optimal codes of maximum correction capability. Our codes can be regarded as the submodule code analogue of the partial spread codes from [6]. We then look at finite PIR’s that contain a field F, and show how subspace codes over F can be lifted to submodule codes over R by tensoring them with R. This allows us to construct optimal submodule codes over Zp [i] of maximum correction capability. Finally we show how to obtain submodule codes over a ring of the form R1 × . . . × Rm from submodule codes over R1 , ..., Rm . We propose two constructions of the latter type, and discuss their decoding. For the first construction we take a cartesian product of codes on the Ri ’s and show that this yields a code on R, whose parameters are determined and whose decoding can be reduced to decoding on each of the Ri ’s. However, not every code over a R is a product of codes over the Ri ’s: Our second construction yields a code over R which is not a product. We show that, in that case, decoding cannot be reduced to decoding on each of the Ri ’s. This shows in particular that, although every finite PIR R is isomorphic to a product of finite fields and finite chain rings, the study of codes over R cannot be reduced in general to the study of codes over finite fields and finite chain rings. 5.1 Partial spreads over finite chain rings We start with a construction that can be applied to any PIR. Its optimality relies on the existence of large sets of matrices, in which the length of the difference of any two of them is maximum. In Proposition 46 we will show that such large sets can be constructed over any finite chain ring. Theorem 44. Let R be a finite PIR. Let n, k be positive integers. Write k = h · λ(R) − r with 0 ≤ r ≤ λ(R) − 1, and assume n ≥ 2h. Write n = ν · h + ρ with 0 ≤ ρ ≤ h − 1. Let A ⊆ Rh×h and 19 A′ ⊆ Rh×(h+ρ) be subsets such that λ(row(A − B)) = h · λ(R) for all A, B ∈ A with A 6= B and A, B ∈ A′ with A 6= B. For i ∈ {1, ..., ν − 1} let   Si = 0h×h . . . 0h×h Ih×h Ai+1 . . . Aν−1 Aν : Ai+1 , ..., Aν−1 ∈ A, Aν ∈ A′ ⊆ Rh×n , where Ih×h is the identity matrix of size h×h. Define Sν = an ideal of length λ(R) − r. For all i ∈ {1, ..., ν} let  0h×(n−h) Ih×h  . Let ζ ∈ R generate Si,ζ = {Mζ : M ∈ Si }, where Mζ is the matrix obtained from M by multiplying its last row by ζ. Then C= ν [ {row(M ) : M ∈ Si,ζ } i=1 is a submodule code of length λ(C) = k, minumum distance d(C) = 2k, and cardinality |C| = |A′ | · |A|ν−1 − 1 + 1. |A| − 1 Proof. Let Mζ ∈ Si,ζ . Then Mζ is in row-echelon form and λ(row(Mζ )) = (h − 1) · λ(R) + λ(ζ) = k by Theorem 25. Define the code C′ = ν [ {row(M ) : M ∈ Si }. i=1 Again M is in row-echelon form and λ(row(M )) = h · λ(R). Moreover, arguing as in [6, Theorem 13 and Proposition 17] and replacing the rank with the length, one sees that d(C ′ ) = 2h · λ(R), i.e., the submodules that constitute C ′ have trivial pairwise intersections. Moreover, |C ′ | = |A′ | · |A|ν−1 − 1 + 1. |A| − 1 Now observe that C is obtained from C ′ by taking an appropriate submodule of each codeword. Therefore the codewords of C have trivial pairwise intersection. Hence d(C) = 2k and |C| = |C ′ |. We now show that over a finite chain ring R one can construct large sets A and A′ to be used within the construction from Theorem 44. Lemma 45. Let R be a ring, let s, t > 0. Then for any v1 , ..., vt ∈ Rs we have λ(hv1 , ..., vt i) ≤ t·λ(R). Proof. Let A ∈ Rt×s be the matrix with rows v1 , ..., vt . Right multiplication by A induces an R-homomorphism fA : Rt → Rs , whose image is hv1 , . . . , vt i. Since Im(fA ) ∼ = Rt / ker(fA ), then t t λ(hv1 , . . . , vt i) = λ(R ) − λ(ker(fA )) ≤ λ(R ) = t · λ(R). Proposition 46. Let R be a finite chain ring with residue field of order q. Then for all h > 0 and for all 0 ≤ ρ ≤ h − 1 there exists a set A ⊆ Rh×(h+ρ) with |A| = q h+ρ and λ(row(A − B)) = h · λ(R) for all A, B ∈ A with A 6= B. 20 Proof. We first prove the statement for ρ = 0. Let π be a generator of the maximal ideal of R, and let f : R → R/(π) be the projection map. Let ι : R/(π) → R be such that f ◦ ι is the identity of R/(π). Such a ι can be obtained by mapping each element of R/(π) to one of its representatives in R. Notice that we do not require that ι is a ring homomorphism. We extend f and ι entrywise to f : Rh×h → (R/(π))h×h and ι : (R/(π))h×h → Rh×h . , by [3, Section 6] there exists A′ ⊆ (R/(π))h×h with |A′ | = q h and Since (R/(π))h×h ∼ = Fh×h q ′ ′ ′ A − B invertible for any A , B ′ ∈ A′ with A′ 6= B ′ . Then the set of matrices A = {ι(A′ ) : A′ ∈ A′ } ⊆ Rh×h has the expected properties. Indeed, let A′ , B ′ ∈ A′ with A′ 6= B ′ . Since f is a ring homomorphism, we have f (det(ι(A′ ) − ι(B ′ ))) = det(f (ι(A′ )) − f (ι(B ′ ))) = det(A′ − B ′ ) 6= 0. Therefore det(ι(A′ ) − ι(B ′ )) ∈ / (π). As (π) is the only maximal ideal of R, det(ι(A′ ) − ι(B ′ )) is invertible, hence ι(A′ ) − ι(B ′ ) is invertible. This implies row(ι(A′ ) − ι(B ′ )) ∼ = Rh , which has length ′ h h · λ(R). In addition |A| = |A | = q . Now assume ρ > 0, and set h′ = h+ρ. By the first part of the proof there exists a set of matrices ′ ′ B ⊆ Rh ×h with λ(row(A − B)) = h′ · λ(R) for all A, B ∈ B with A 6= B. For A ∈ B denote by A the matrix obtained from A by deleting the first ρ rows. A simple application of Lemma 45 shows ′ that the set A = {A : A ∈ B} ⊆ Rh×h has the desired properties. Example 47. Let R be a finite chain ring with residue field of order q. Following the notation of Theorem 44, Proposition 46 allows us to construct a submodule code C ⊆ M(Rn ) of constant length λ(C) = k, minimum distance d(C) = 2k, and cardinality |C| = q h+ρ · q n − q h+ρ + q h − 1 q h(ν−1) − 1 + 1 = ∈ O(q n−h ) qh − 1 qh − 1 (as n > h+ρ). Let C be a submodule code with the same parameters as C and maximum cardinality. By Theorem 43 we have |C| ≤ (q n−h+1 − 1)/(q − 1). Therefore 1≥ q−1 |C| q n − q h+ρ + q h − 1 q→∞ −→ 1. · n−h+1 ≥ h q −1 q −1 |C| This shows that C is an asymptotically optimal submodule code. 5.2 Tensor product construction and partial spreads over rings of the form Zm p Assume that R contains a finite field F ⊆ R as a subring and that R and F have the same one. Let V ⊆ Fn be an F-linear space. Recall that the tensor product V ⊗F R ⊆ Rn is the submodule of Rn generated by the elements of V . If V = hv1 , . . . , vm iF , then V ⊗F R = hv : v ∈ V iR = hv1 , . . . , vm iR . Lemma 48. Let V ⊆ Fn be an F-linear space. Then λ(V ⊗F R) = λ(R) · dimF (V ). Proof. Let t = dimF (V ), and let A ∈ Ft×n be a matrix in reduced row-echelon form, whose rows generate V . Regard A as a matrix over R. Then A is still in row-echelon form and row(A) = V ⊗F R. Since all the pivots of A are ones, by Theorem 25 we have λ(V ⊗F R) = λ(1) · t = λ(R) · dimF (V ), as claimed. 21 Lemma 49. Let V, W ⊆ Fn be F-linear spaces. Then (V ⊗F R) ∩ (W ⊗F R) = (V ∩ W ) ⊗F R. Proof. By definition (V ∩ W ) ⊗F R ⊆ (V ⊗F R) ∩ (W ⊗F R). Therefore by Lemma 6 it suffices to show that they have the same length. By Lemma 48 λ((V ∩ W ) ⊗F R) = λ(R) · dimF (V ∩ W ) = λ(R) · (dimF (V ) + dimF (W ) − dimF (V + W )) = λ(V ⊗F R) + λ(W ⊗F R) − λ((V + W ) ⊗F R) = λ((V ⊗F R) ∩ (W ⊗F R)), where the last equality follows from Lemma 6 and from observing that (V + W ) ⊗F R = V ⊗F R + W ⊗F R. From Lemma 48 and 49 one obtains the following construction. Theorem 50. Let C ⊆ M(Fn ) be a subspace code of minimum subspace distance 2δ and dimF (V ) = k for all V ∈ C. Then C ⊗F R = {V ⊗F R : V ∈ C} ⊆ M(Rn ) is a submodule code of cardinality |C ⊗F R| = |C|, whose codewords have length λ(R) · k, and whose minimum distance is 2λ(R) · δ. ∼ Example 51. Let F = Zp and R = Zm p . Then Zp = {(a, a, ..., a) : a ∈ Zp } ⊆ R can be viewed as a subring of R. We have λ(R) = m. Let h be an integer, 1 ≤ h ≤ n/2. By [6, Theorem 13 and Proposition 17], there exists a subspace code C ⊆ M(Znp ) of constant dimension h, minimum distance 2h and cardinality (pn − ph+ρ + ph − 1)/(ph − 1), where ρ is the remainder of the division of n by h. By Theorem 50, C ⊗Zp R ⊆ M(Rn ) is a submodule code whose codewords have length mh and minimum distance 2mh. Moreover, |C ⊗Zp R| = pn − pρ − pρ + 1. ph − 1 Let C be a submodule code with the same parameters as C ⊗Zp R and maximum cardinality. By Theorem 42 (6), |C| ≤ (pn − 1)/(ph − 1). Therefore 1≥ |C ⊗Zp R| |C| ≥ pn − ph+ρ + ph − 1 ph − 1 q→∞ −→ 1. · n ph − 1 p −1 Hence C ⊗Zp R is asymptotically optimal, and it is optimal when ρ = 0. Fix 1 ≤ ℓ ≤ m − 1. For all M ∈ C ⊗Zp R choose a submodule M ′ ⊆ M with λ(M ′ ) = mh − ℓ. Then D = {M ′ : M ∈ C ⊗Zp R} ⊆ M(Rn ) is a submodule code with minimum distance 2mh − 2ℓ and whose codewords have length mh − ℓ. Moreover, |D| = |C ⊗Zp R| = pn − pρ − pρ + 1. ph − 1 Let D be a submodule code with the same parameters as D and maximum cardinality. By Theorem 42 (6) we have |D| ≤ (pn − 1)/(ph−ℓ/m − 1). Therefore 1≥   |D| pn − ph+ρ + ph − 1 ph−ℓ/m − 1 −ℓ/m . · ∈ O p ≥ ph − 1 pn − 1 |D| If in addition m = 2, then by Proposition 42 (7) 1≥ pn − ph+ρ + ph − 1 ph + ph−1 − 2 q→∞ |D| ≥ −→ 1/2. · ph − 1 2(pn − 1) |D| Therefore D is asymptotically optimal, up to a factor 2. 22 Remark 52. Let C ⊆ M(Fn ) be a subspace code over the finite field F, and let W ⊆ Fn be a decodable space for the code C, i.e., an F-linear space for which there exists V ∈ C with d(V, W ) ≤ ⌊(dS (C)−1)/2⌋, where dS (C) denotes the minimum subspace distance of C. Then W ⊗F R is decodable in the submodule code C ⊗F R, and it decodes to V ⊗F R. However, there exist submodules of Rn which are decodable in C ⊗F R but are not of the form W ⊗F R, with W an F-space which is decodable in C. Moreover, if N ⊆ Rn is decodable in C ⊗F R, then N ∩ Fn is not necessarily decodable in C. Let e.g. R = Z5 [i], F = Z5 , and let C = {V1 , V2 } ⊆ M(Z45 ) be the subspace code whose codewords are the 2-dimensional spaces V1 = h(1, 0, 1, 0), (0, 1, 0, 1)iZ5 , V2 = h(1, 0, 2, 1), (0, 1, 1, 0)iZ5 . Then C has subspace distance dS (C) = 4. By Theorem 50 the submodule code C ⊗Z5 Z5 [i] has two codewords of length 4 and submodule distance d(C ⊗Z5 Z5 [i]) = 8. Let N = h(i + 2, 0, i + 2, 0), (0, 1, 0, i − 1)iZ5 [i] ⊆ Z5 [i]4 be a received submodule. Then d(N, V1 ⊗Z5 Z5 [i]) = 3 ≤ ⌊(8 − 1)/2⌋ = 3, so N is decodable in C ⊗Z5 Z5 [i]. However, N is not of the form W ⊗Z5 Z5 [i] for any vector space W . Moreover, N ∩ Z45 = 0, so N ∩ Z45 is not decodable in C with respect to the subspace distance. 5.3 Two constructions over products of rings Let R ∼ = R1 × . . . × Rm , where R1 , . . . , Rm are finite commutative rings with identity. Let πi be the projection on the factor Ri . Then each πi extends componentwise to a map πi : Rn → Rin . Lemma 53. Let R ∼ = R1 × . . . × Rm be a finite ring, let M ⊆ Rn be an R-module. Then M∼ = π1 (M ) × . . . × πm (M ), each πi (M ) is an Ri -module and λR (M ) = m X λRi (πi (M )). i=1 Proof. Let ri ∈ Ri and v ∈ M . Then πi (v) = (πi (v1 ), . . . , πi (vn )) ∈ πi (M ) ⊆ Rin , and ri πi (v) = (ri πi (v1 ), . . . , ri πi (vn )) ∈ πi (M ). This makes πi (M ) into an Ri -module. Moreover, the isomorphism n restricts to an isomorphism M ∼ π (M ) × . . . × π (M ). Hence Rn ∼ = 1 = R1n × . . . × Rm m λR (M ) = m X λR (πi (M )) = m X λRi (πi (M )), i=1 i=1 where the last equality follows from the fact that any R-submodule of πi (M ) is an Ri -submodule, and viceversa. We start with a simple construction, where we produce a code over R1 × . . . × Rm by taking the n. cartesian product of codes over each Ri . For simplicity of notation we identify Rn and R1n × . . . Rm Theorem 54. Let R1 , ..., Rm be finite PIR’s and let R = R1 × . . . × Rm . For i ∈ {1, ..., m} let Ci ⊆ M(Rin ) be a submodule code whose codewords have length ki . Then C = C1 × . . . × Cm = {M1 × . . . × Mm : Mi ∈ Ci for all i } ⊆ M(Rn ) is a submodule code of cardinality |C| = |C1 | . . . |Cm |, whose codewords have length k1 + . . . + km , and with minimum distance d(C) = min{d(Ci ) : 1 ≤ i ≤ m}. 23 We now show that decoding of the product code C = C1 × . . . × Cm over R can be reduced to decoding each of the codes Ci over Ri . Proposition 55. Let R1 , ..., Rm be finite PIR’s and let R = R1 × . . . × Rm . For i ∈ {1, ..., m} let Ci ⊆ M(Rin ) be a submodule code and let C = C1 × . . . × Cm ⊆ M(Rn ) be the product code. Let N ⊆ Rn be a received decodable submodule, i.e., an R-module for which there exists an M = M1 × . . . × Mm ∈ C such that d(N, M ) ≤ ⌊(d(C) − 1)/2⌋. Then for all i ∈ {1, ..., m} we have d(πi (N ), Mi ) ≤ ⌊(d(Ci ) − 1)/2⌋, i.e., πi (N ) decodes to Mi in Ci . Proof. By Lemma 53, N = π1 (N ) × . . . × πm (N ), and Mi = πi (M ) for 1 ≤ i ≤ m. Moreover d(N, M ) = λ(N ) + λ(M ) − 2λ(N ∩ M ) m m m X X X λRi (πi (N ∩ M )) λRi (πi (M )) − 2 λRi (πi (N )) + = ≥ i=1 i=1 m X d(πi (N ), πi (M )), i=1 i=1 where the inequality follows from the fact that πi (N ∩ M ) ⊆ πi (N ) ∩ πi (M ). Therefore for all i we have d(πi (N ), πi (M )) ≤ d(N, M ) ≤ ⌊(d(C) − 1)/2⌋ ≤ ⌊(d(Ci ) − 1)/2⌋, hence πi (N ) decodes to Mi in Ci . Finally, we provide another construction which combines submodule codes over the factors Ri into a submodule code over R = R1 ×. . .×Rm . Compared to the product construction of Theorem 54, this construction produces a code with smaller cardinality and larger minimum distance, whose decoding cannot be reduced to decoding over the Ri ’s. Again, for simplicity we identify Rn and n. R1n × . . . × Rm Theorem 56. Let R1 , ..., Rm be finite PIR’s, and let R = R1 × . . . × Rm . For i ∈ {1, ..., m} let Ci ⊆ M(Rin ) be a submodule code whose codewords have length ki . Let c = min |Ci |, and for all i ∈ {1, ..., m} fix a subcode Ci′ ⊆ Ci with |Ci′ | = c. Enumerate the elements of each Ci′ as Ci′ = {M1,i , ..., Mc,i }. Then C = {Mj,1 × . . . × Mj,m : 1 ≤ j ≤ c} ⊆ M(Rn ) is a submodule code of cardinality |C| = c, with d(C) ≥ d(C1 ) + . . . + d(Cm ), and whose codewords have length k1 + . . . + km . Proof. We only prove the part about the minimum distance. Let j, j ′ ∈ {1, ..., c} with j 6= j ′ . Arguing as in the proof of Proposition 55, one finds d(Mj,1 × . . . × Mj,m , M j ′ ,1 × ... × M j ′ ,m )≥ m X i=1 d(Mj,i , M j ′ ,i )≥ m X d(Ci ), i=1 where the last inequality follows from the fact that Mj,i 6= Mj ′ ,i whenever j 6= j ′ . Remark 57. Notice that an R-module which is decodable with respect to the code C constructed in Theorem 56 is not necessarily a product of Ri -modules that are decodable with respect to the codes Ci . E.g., let m = 2, n = 4, R1 = R2 = Z2 , R = Z2 × Z2 . Let M1,1 = M1,2 = h(1, 0, 1, 0), (0, 1, 0, 1)iZ2 , M2,1 = M2,2 = h(1, 0, 1, 1), (0, 1, 1, 0)iZ2 24 and C1 = C1′ = {M1,1 , M1,2 }, C2 = C2′ = {M2,1 , M2,2 }. Then      (1, 1) (0, 0) (1, 1) (0, 0) (1, 1) (0, 0) (1, 1) (1, 1) C = row , row . (0, 0) (1, 1) (0, 0) (1, 1) (0, 0) (1, 1) (1, 1) (0, 0) The code C has minimum distance d(C) = 8. Let   (1, 0) (0, 0) (1, 0) (0, 0) N = row (0, 0) (1, 1) (0, 1) (1, 1) be a received submodule. Then N decodes to M1,1 ×M1,2 ∈ C, as d(N, M1,1 ×M1,2 ) = 3 ≤ ⌊(8−1)/2⌋. However, π2 (N ) = h(0, 1, 1, 1)iZ2 is not decodable in C2 . In fact, d(π2 (N ), M21 ) = d(π2 (N ), M22 ) = 3. References [1] D. D. Anderson, M. Axtell, S. J. Forman, J. Stickles, When are Associates Unit Multiples?, Rocky Mountain Journal of Mathematics 34 (2004), no. 3, 811–828. [2] J. Buchmann, S. Neis, Algorithms for linear algebra problems over principal ideal rings, technical report, Technische Hochschule Darmstadt (1996). [3] P. Delsarte, Bilinear forms over a finite field, with applications to coding theory, Journal of Combinatorial Theory, Series A, 25 (1978), no. 3, 226 – 241. [4] C. Feng, R. W. Nóbrega, F. R. Kschischang, D. Silva, Communication over finite-chain-ring matrix channels, IEEE Transactions on Information Theory 60 (2014), no. 10, 5899–5917. [5] C. Feng, D. Silva, F. R. Kschischang, An algebraic approach to physical-layer network coding, IEEE Transactions on Information Theory 59 (2013), no. 11, 7576–7596. [6] E. Gorla, A. Ravagnani, Partial spreads in random network coding, Finite Fields and Their Applications 26 (2014), 104–115. [7] J. A. Howell, Spans in the module (Zm )s , Linear and Multilinear Algebra 19 (1986), 67–77. [8] R. Kötter, F. R. Kschischang, Coding for errors and erasures in random network coding, IEEE Transactions on Information Theory 54 (2008), no. 8, 3579–3591. [9] E. Kunz, Introduction to commutative algebra and algebraic geometry, Birkhäuser Boston Inc., Boston (1985). [10] B. R. McDonald, Finite rings with identity, Pure and Applied Mathematics 28, Marcel Dekker Inc., New York (1974). [11] B. Nazer, M. Gastpar, Compute-and-forward: harnessing interference through structured codes, IEEE Transactions on Information Theory 57 (2011), no. 10, 6463–6486. [12] P. Popovski, H. Yomo, The anti-packets can increase the achievable throughput of a wireless multi-hop network, Proceedings of the IEEE International Conference on Communications 2006, ICC ’06, 3885 – 3890. [13] Q T. Sun, J. Yuan, T. Huang, K. W. Shum, Lattice network codes based on Eisenstein integers, IEEE Transactions on Information Theory 61 (2013), no. 7, 2713–2725. 25 [14] 0. Zariski, P. Samuel, Commutative Algebra Vol. 1, Graduate Texts in Mathematics 28, Springer-Verlag, New York-Heidelberg-Berlin, (1975). [15] S. Zhang, S.-C. Liew, P. P. Lam, Hot topic: physical layer network coding, Proceedings of the 12th annual international conference on Mobile computing and networking, MobiCom ’06, 358–365. 26
0math.AC
Ant-Inspired Density Estimation via Random Walks Cameron Musco [email protected] Hsin-Hao Su [email protected] Nancy Lynch [email protected] arXiv:1603.02981v1 [cs.DC] 9 Mar 2016 Massachusetts Institute of Technology March 10, 2016 Abstract Many ant species employ distributed population density estimation in applications ranging from quorum sensing [Pra05], to task allocation [Gor99], to appraisal of enemy colony strength [Ada90]. It has been shown that ants estimate density by tracking encounter rates – the higher the population density, the more often the ants bump into each other [Pra05, GPT93]. We study distributed density estimation from a theoretical perspective. We show that a group of anonymous agents randomly walking on a grid are able to estimatetheir density d to within a multiplicasteps by measuring their encounter tive factor 1 ± ǫ with probability 1 − δ in just Õ log(1/δ)dǫlog(1/dǫ) 2 rates with other agents. Despite dependencies inherent in the fact that nearby agents may collide repeatedly (and, worse, cannot recognize when this happens), this bound nearly matches what is required to estimate d by independently sampling grid locations. From a biological perspective, our work helps shed light on how ants and other social insects can obtain relatively accurate density estimates via encounter rates. From a technical perspective, our analysis provides new tools for understanding complex dependencies in the collision probabilities of multiple random walks. We bound the strength of these dependencies using local mixing properties of the underlying graph. Our results extend beyond the grid to more general graphs and we discuss applications to social network size estimation, density estimation by robot swarms, and random walkedbased sampling of sensor networks. 1 Introduction The ability to sense local population density is an important tool used by many ant species. When a colony must relocate to a new nest, scouts search for potential nest sites, assess their quality, and recruit other scouts to high quality locations. A high enough density of scouts at a potential new nest (a quorum threshold ) triggers those ants to decide on the site and transport the rest of the colony there [Pra05]. When neighboring colonies compete for territory, a high relative density of a colony’s ants in a contested area will cause those ants to attack enemies in the area, while a low relative density will cause the colony to retreat [Ada90]. Varying densities of ants successfully performing certain tasks such as foraging or brood care can trigger other ants to switch tasks, maintaining proper worker allocation within in the colony [Gor99, SHG06]. It has been shown that ants estimate density in a distributed manner, by measuring encounter rates [Pra05, GPT93]. As ants randomly walk around an area, if they bump into a larger number of other ants, this indicates a higher population density. By tracking encounters with specific types of ants, e.g. successful foragers or enemies, ants can estimate more specific densities. This strategy allows each ant to obtain an accurate density estimate and requires very little communication – ants must simply detect when they collide and do not need to perform any higher level data aggregation. 1.1 Density Estimation on the Grid We study distributed density estimation from a theoretical perspective. We model a colony of ants as a set of anonymous agents randomly distributed on a two-dimensional grid. Computation proceeds in rounds, with each agent stepping in a random direction in each round. A collision occurs when two agents reach the same position in the same round and encounter rate is measured as the number of collisions an agent is involved in during a sequence of rounds divided by the number of rounds. Aside from collision detection, the agents have no other means of communication. The intuition that encounter rate tracks density is clear. It is easy to show that, for a set of randomly walking agents, the expected encounter rate measured by each agent is exactly the density d – the number of agents divided by the grid size (see Lemma 3). However, it is unclear if encounter rate actually gives a good density estimate – i.e., if it concentrates around its expectation. Consider agents positioned not on the grid, but on a complete graph. In each round, each agent steps to a uniformly random position and in expectation, the number of other agents they collide with in this step is d. Since each agent chooses its new location uniformly at random in each step, collisions are essentially independent between rounds. The agents are effectively taking Bernoulli samples with success   independent rounds obtain a (1 ± ǫ) multiplicative probability d, and by a standard Chernoff bound, within O log(1/δ) dǫ2 approximation to d with probability 1 − δ. On the grid graph, the picture is significantly more complex. If two agents are initially located near each other on the grid, they are more likely to collide via random walking. After a first collision, due to their proximity, they are likely to collide repeatedly in future rounds. The agents cannot recognize repeat collisions since they are anonymous and even if they could, it is unclear that it would help. On average, compared to the complete graph, agents collide with fewer individuals and collide multiple times with those individuals that they do encounter, causing an increase in encounter rate variance and making density estimation more difficult. Mathematically speaking, on a graph with a fast mixing time [Lov93], like the complete graph, each agent’s location is only weakly correlated with its previous locations. This ensures that collisions are also weakly correlated between rounds and encounter rate serves as a very accurate estimate of density. The grid graph on the other hand is slow mixing – agent positions and hence collisions are highly correlated between rounds. This correlation increases encounter rate variance. 1.2 Our Contributions Surprisingly, despite this increased variance, encounter rate-based density estimation on the grid is nearly as   log(1/δ) log log(1/δ) log(1/dǫ) rounds, each agent’s encounter accurate as on the complete graph. After just O dǫ2 rate is a (1 ± ǫ) approximation to d with probability 1 − δ (see Theorem 2). 1 Technically, to bound accuracy on the grid, we obtain moment bounds on the number of times that two randomly walking agents repeatedly collide over a set of rounds. These bounds also apply to the number of equalizations (returns to starting location) of a single walk. While expected random walk hitting times, return times, and collision rates are well understood [Lov93, ES09], higher moment bounds and high probability results are much less common. We hope our bounds are of general use in the theoretical study of random walks and random-walk based algorithms. Our moment bounds show that, while the grid graph is slow mixing, it has sufficiently strong local mixing to make random walk-based density estimation accurate. Random walks tend to spread quickly over a local area and not repeatedly cover the same nodes. Significant work has focused on showing that random walk sampling is nearly as good as independent sampling for fast mixing expander graphs [Gil98, CLLM12]. We are the first to extend this type of analysis to slowly mixing graphs, showing that strong local mixing is sufficient in many applications. Beyond the grid, we show how to generate moment bounds from a bound on the probability that two random walks re-collide (or analogously, that a single random walk equalizes) after a certain number of steps, and demonstrate application of this technique to d-dimensional grids, regular expanders, and hypercubes. We discuss applications of our results to social network size estimation via random walk [KLS11], obtaining significant improvements over known work for networks with relatively slow global mixing times, but strong local mixing. We also discuss connections to density estimation by robot swarms and random walk-based sensor network sampling [AB04, LB07]. 1.3 Road Map In Section 2 we overview our theoretical model for distributed density estimation on the grid. In Section 3, as a warm up, we give a simple density estimation algorithm that does not employ random walks, is easy to analyze, but is not biologically plausible. In Section 4 we give our main technical results on random walk-based density estimation. In Section 5 we show how to extend our bounds to a number of graphs other than the grid. In Section 6 we discuss applications of our results to social network size estimation, robot swarm, and sensor network algorithms. 2 Theoretical Model for Density Estimation √ √ We consider a two-dimensional torus with A nodes (dimensions A × A) populated with identical anonymous agents. We assume that A is large – larger than the area agents traverse over the runtimes of our algorithms. We feel that this torus model successfully captures the dynamics of density estimation on a surface, while avoiding complicating factors of boundary behavior. Initially each agent is placed independently at a uniform random node in the torus. Computation proceeds in discrete, synchronous rounds. In each round an agent may either remain in its current location or step to any of its four neighboring grid squares. Formally, each agent has an ordered pair position which it may update in each round by adding step s ∈ {(0, 1), (0, −1), (1, 0), (−1, 0), (0, 0)}. A randomly walking agent chooses s uniformly at random from {(0, 1), (0, −1), (1, 0), (−1, 0)} in each round. Of course, in reality ants do not move via pure random walk – observed encounter rates seem to actually be lower than predicted by a pure random walk model [GPT93, NTD05]. However, we feel that our model sufficiently captures the highly random movement of ants while remaining tractable to analysis and applicable to ant-inspired random walk-based algorithms (Section 6). Aside from the ability to move in each round, agents can sense the number of agents other than themselves at their position at the end of each round, formally through calling count(position). We say that two agents collide in round r if they have the same position at the end of the round. Outside of collision counting, agents have no means of communication. They are anonymous (cannot uniquely identify each other) and all execute identical density estimation routines. 2 Density Estimation Problem Let (n + 1) be the number of agents and define population density as def d = n/A. Each agent’s goal is to hestimate d to (1 ± ǫ) accuracy with probability 1 − δ for ǫ, δ ∈ (0, 1) – i i.e., to return an estimate d˜ with P d˜ ∈ [(1 − ǫ)d, (1 + ǫ)d] ≥ 1 − δ. As a technicality, with n + 1 agents we define d = n/A instead of d = (n + 1)/A for convenience of calculation. In the natural case, when n is large, the distinction is minor. 3 Density Estimation via Simulation of Independent Sampling As discussed, the challenge in analyzing random walk-based density estimation arises from increased variance due to repeated collisions of nearby agents. Here we show that, if not restricted to random walking, agents can avoid collision correlations by splitting into ‘stationary’ and ‘mobile’ groups and only counting collisions between members of different groups. This allows them to essentially simulate independent sampling of gird locations to estimate density. This algorithm is not ‘natural’ in a biological sense, however it is easy to analyze, and demonstrates the feasibility of density estimation by anonymous agents on the grid. We give pseudocode in Algorithm 1. Algorithm 1 Independent Sampling-Based Density Estimation input: runtime t Set c := 0 and with probability 1/2, state := walking, else state := stationary. for r = 1, ..., t do if state := walking then position := position + (0, 1) ⊲ Deterministic walk step. end if c := c + count(position) ⊲ Update collision count. end for return d˜ = 2c t 3.1 Independent Sampling Accuracy Bound We now present our main accuracy bound for the independent sampling algorithm. √ Theorem 1 (Independent Sampling Accuracy Bound). After running for t rounds, assuming t < A and d ≤ 1,  Algorithm  1 returns d˜ such that, for any δ > 0, with probability ≥ 1 − δ, d˜ ∈ [(1 − ǫ)d, (1 + ǫ)d] for q   log(1/δ) log(1/δ) , d˜ is a (1 ± ǫ) multiplicative . In other words, for any ǫ, δ ∈ (0, 1) if t = Θ ǫ =O 2 td dǫ estimate of d with probability ≥ 1 − δ. Proof. Our analysis is from the perspective of an agent with state = walking. By symmetry, the distribution of d˜ is identical for walking and stationary agents, so considering this case is sufficient. Initially, assume that no two walking agents start in the same location. Given this assumption, we know that a walking agent never collides with another walking agent – by assumption they all start in different positions and update these positions identically in each round. In the written implementation agents always step up, however any fixed pattern (e.g. a spiral) suffices. In t steps, a walking agent visits t unique squares. Each of the n other agents is located in this set of t squares and stationary with probability 2A . Further, each of these events is entirely independent from the rest, as the agents are positioned and choose their state independently. So, for a walking agent, c is just a t t . Clearly, E c = n · 2A = td sample of n independent random coin flips, each with success probability 2A 2 so 2 E d˜ = E c t = d. Further, by a Chernoff bound, for any ǫ ∈ (0, 1), the probability that d˜ is not a (1 ± ǫ) multiplicative estimate of d is: h i 2 2 δ = P |d˜ − d| ≥ ǫd = P [|c − E c| ≥ ǫ E c] ≤ 2e−ǫ E c/3 ≤ 2e−ǫ td/6 . 3 This gives: log(1/δ) ≥ ǫ2 td/6 so ǫ = O q log(1/δ) td  , yielding the result. We now remove the assumption that no two walking agents start in the same location. We slightly modify the algorithm – each agent sets c := c (mod t) before returning d˜ = 2c t . If an agent starts alone and is involved in < t collisions, this operation has no effect – the above bound holds. If a walking agent is involved in < t ‘true collisions’ but starts in the same position as w ≥ 1 other walking agents, the agents move in lockstep throughout the algorithm and are involved in w · t ‘spurious collisions’ (w in each round). Setting c := c (mod t) exactly corrects for these spurious collisions and since c now only includes collisions with stationary agents, the bound above holds. Finally, if an agent is involved in ≥ t true collisions, this modification cannot worsen their estimate. If c ≥ t and the agent does not set c := c (mod t), they compute d˜ ≥ 2tt ≥ 2. For ǫ < 1, the agent fails since d ≤ 1. So setting c := c (mod t) can only increase probability of success. 4 Density Estimation via Random Walk Collision Rates In Algorithm 1, each pair of agents can only collide once, at a specific location – the starting position of the stationary agent in the pair. Collisions are independent and it is easy to show that the number of collisions (and hence the density estimate) concentrates around its expectation. However, as discussed, independence of collisions is unnecessary! Algorithm 2 describes a simple random walk-based approach that gives a nearly matching bound. Algorithm 2 Random Walk Encounter Rate-Based Density Estimation input: runtime t c := 0 for r = 1, ..., t do position := position + rand{(0, 1), (0, −1), (1, 0), (−1, 0)} c := c + count(position) end for return d˜ = ct 4.1 ⊲ Random walk step. ⊲ Update collision count. Random Walk-Based Density Estimation Analysis Our main result follows; its proof appears at the end of Section 4 after some preliminary lemmas. Theorem 2 (Random Walk Sampling Accuracy Bound). After running for t rounds, assuming t ≤ A, Algorithm 2 returns d˜ such that, for any δ > 0, with probability ≥ 1 − δ, d˜ ∈ [(1 − ǫ)d, (1 + ǫ)d] for q   log(1/dǫ) log(1/δ) log(t) , d˜ is a (1 ± ǫ) . In other words, for any ǫ, δ ∈ (0, 1) if t = Θ log(1/δ) log log(1/δ) ǫ= td dǫ2 multiplicative estimate of d with probability ≥ 1 − δ. Throughout our analysis, we take the viewpoint of a single agent executing Algorithm 2, referred to as ‘agent a’. To start, we show that the encounter rate d˜ is an unbiased estimator of d: Lemma 3 (Unbiased Estimator). E d˜ = d. Proof. We can decompose c as the sum of collisions with different agents over different rounds. Specifically, give the n other agents arbitrary ids 1, 2, ..., n and let cj (r) equal 1 if agent a collides with agent j in round Pn Pt r, and 0 otherwise. By linearity of expectation: E c = j=1 r=1 E cj (r). Since each agent is initially at a uniform random location and after any number of steps, is still at uniform random location, for all j, r, E cj (r) = 1/A. Thus, E c = nt/A = dt and E d˜ = E c/t = d. With Lemma 3 in place, we now must show that the encounter rate is close to its expectation with high probability and hence provides a good estimate of density. 4 4.2 Bounding the Effects of Repeat Collisions P Let cj = tr=1 cj (r) be the total number of collisions with agent j. Due to the initial uniform distribution of the agents, the cj ’s are all independent and identically distributed. Each cj is the sum of highly correlated random variables – due to the slow mixing of the grid, if two agents collide at round r, they are much more likely to collide in successive rounds. However, by bounding the strength of this correlation, we are able to give strong bounds P on the moments of the distribution of each cj , showing that it is sub-exponential. It follows that d˜ = 1t nj=1 cj , is also sub-exponential and hence concentrates strongly around its expectation, the true density d. We first bound the probability of a re-collision in round r + m, assuming a collision in round r: Lemma 4 (Re-collision Probability Consider two agents a1 and a2 randomly walking on a two√ Bound). √ dimensional torus of dimensions A × A. If a1 and in round r, for any m ≥ 0, the  a2 collide again  1 1 probability that a1 and a2 collide in round r + m is Θ m+1 + O A . Proof. From round r to round r + m, a1 and a2 take 2m random steps in total. Let Mx be the total number of steps they take in the x direction and My be the total number in the y direction. Mx + My = 2m. We start by computing the probability that the agents collide in round r + m conditioned on the values of Mx and My . All steps are chosen independently, so we can consider movement in the x and y directions separately. Specifically, let C be the event that the a1 and a2 collide in round r + m, Cx be the event that they have the same x position, and Cy be the event that they have the same y position. We have: P [C|Mx = mx , My = my ] = P [Cx |Mx = mx ] · P [Cy |My = my ] . (1) We first consider P [Cx |Mx = mx ]. All bounds will hold symmetrically for the y dimension. We split our analysis into two cases. Let Cx1 be the event that the two agents have the same x position after round r + m and have identical displacements from their starting locations. Let Cx2 be the event that the two agents have the same x position after round r + m but do not have identical displacements. This requires that the agents ‘wrap’ around the torus, ending at the same position despite moving different amounts in the x direction. We have P[Cx |Mx = mx ] = P[Cx1 |Mx = mx ] + P[Cx2 |Mx = mx ]. P[Cx1 |Mx = mx ] is identical to the probability that a single random walk takes mx steps and has 0 overall displacement – i.e. takes an equal number of clockwise and counterclockwise steps. It is given by:  mx   mx  1 mx ! 1 mx = mx 2 · . (2) P[Cx1 |Mx = mx ] = 2 ( 2 !) 2 mx /2 1 Above mx is even √ we assume   – otherwise Cx cannot occur. By Stirling’s approximation for any n > 0, 1 n n n! = 2πn e 1 + O n . Plugging this into 2:   mx  √   mx    mx 1 + O m1x 2πmx mex 1 1 m ! 1 x 1 . = =Θ √ P[Cx |Mx = mx ] = mx 2 ·  mx  2 ·  ( 2 !) 2 2 mx + 1 1 + O mx1/2 πmx mxe/2 (We use of mx in the denominator so that the bound holds in the case when mx = 0.)   mx + 1 instead P Cx2 |Mx = mx is the probability that two agents have the same x position after round r + m but have different total displacements. It is identical to the probability that a single mx step random walk has overall √ displacement ±c A for some integer c ≥ 1 (and so ‘wraps around’ the torus, ending at its starting location). Roughly, we bound the probability of this event by the probability that the random walk ends  at any other √ location on the torus. There are A such locations, so the probability is bounded by O √1A . We have: j m k √x    mx X A    2 mx 1 √ · P Cx |Mx = mx = 2 · mx −c A . 2 2 c=1 (3) where the extra factor of 2 comes from the fact that the displacement may be either clockwise or counter√ A clockwise. (Note that if mx −c is not an integer we just define the binomial coefficient to equal 0.) 2 5 √ For i ∈ [1, ..., A − 1], let Dxi be the event that a single random walk is i steps clockwise from its starting location after taking Mx steps. We have:  mx 1 i · P[Dx |Mx = mx ] = 2 j mx −i √ A X c=− j √ For any i ∈ [1, ..., A − 1], and any c ≥ 1,  k mx +i √ A k  mx √ mx +i+c A 2   mx 1 · ≥ 2 −1 X c=− j j k m mx +i √ A k  mx √ mx +i+c A 2  √x  mx X  A  mx √ 1 · ≥ mx +i−c A . 2 2 c=1 √ mx +i−c A 2 is closer to m2x than    mx√ mx √ > mx −c A mx +i−c A 2 √ mx −c A 2 (4) is, so (5) 2 √   mx +i−c A is an integer. This allows us to lower bound P[Dxi |Mx = mx ] using P Cx2 |Mx = mx . 2 √ A Ei,c equal 1 if mx +i−c is an integer and 0 otherwise. Since Cx2 and each Dxi are disjoint events: 2 √ A−1 X     2 P Dxi |Mx = mx ≤ 1 P Cx |Mx = mx + i=1 j mx k  √ √   mx X A  A−1   mx √  1 X (applying (4)) P Cx2 |Mx = mx + ·  A  ≤1 m +i−c x 2 2 c=1 i=1 as long as Let j k   m √x  mx X   √X A A−1   2 mx√ 1  · P Cx |Mx = mx + · Ei,c  ≤ 1 mx −c A 2 2 c=1 i=1 √   2 P Cx |Mx = mx · Θ( A) ≤ 1. (by (5) and switching summations) √  √ P√A−1 A A for all c since mx +i−c The last step follows from combining (3) with the fact that i=1 Ei,c = Θ 2   √   is integral for half the possible i ∈ [1, ..., A − 1]. Rearranging, we have P Cx2 |Mx = mx = O √1A .     Combining our bounds for Cx1 and Cx2 , P [Cx |Mx = mx ] = Θ √m1 +1 + O √1A . Identical bounds hold x for the y direction and by (1) we have: P [C|Mx = mx , My = my ] = Θ 1 p (mx + 1)(my + 1) ! +O 1 1 p +p A(my + 1) A(mx + 1) ! +O   1 . A (6) Our final step is to remove the conditioning on Mx and My . Since direction is chosen independently and uniformly at random for each step, E Mx = E My = m. By a standard Chernoff bound:   2 1 . P[Mx ≤ m/2] ≤ 2e−(1/2) ·m/2 = O m+1 (Again using m + 1instead  of m to cover the m = 0 case). An identical bound holds for My , and so, except with probability O 1 m+1 P [C] = Θ  both are ≥ m/2. Plugging into (6) this gives us: 1 m+1  +O 1 p A(m + 1) ! 6       1 1 1 +O =Θ +O . A m+1 A We note that the techniques of Lemma 4 also apply to bounding the probability that a single random walk returns to its origin (equalizes) after m steps. Corollary 5 (Equalization √ √ Probability Bound). Consider agent a1 randomly walking on a two-dimensional torus of dimensions A× A. If a1 is located at position after round r, for any even m ≥ 0, the probability  p  1 1 +O A . that a1 is again at position p after round r + m is Θ m+1 Proof. The analysis of Lemma 4 treats the two walks of a1 and a2 as a single walk with 2m total steps. An identical analysis where 2m is replaced by m yields the corollary. Roughly, assuming as in Theorem   2 that t ≤ A, by Lemma 4, in t rounds, a expects to re-collide with any Pt−1 1 agent it encounters m=0 Θ m+1 = Θ(log t) times. By Lemma 3, a expects to be involved in dt = nt/A   total collisions. So accounting for re-collisions, it expects to collide with Θ A nt log t unique individuals. This is formalized in Lemma 6.   t Lemma 6 (First Collision Probability). Assuming t ≤ A, for all j ∈ [1, ..., n], P [cj ≥ 1] = Θ A log t . Proof. Using the fact that cj is identically distributed for all j, n X n n 1 ci = · E cj = · P [cj ≥ 1] · E[cj |cj ≥ 1] E d˜ = d = · E t t t i=1 n n = · P [cj ≥ 1] · E[cj |cj ≥ 1]. A t Rearranging gives: P [cj ≥ 1] = t . A · E[cj |cj ≥ 1] (7)  4 and linearity of expectation. Since t ≤ A, the O A1 term in To compute E[cj |cj ≥ 1], we use   Lemma 1 Lemma 4 is absorbed into the Θ m+1 . Let r ≤ t be the first round that the two agents collide. We have: E[cj |cj ≥ 1] = t−r X m=0 Θ  1 m+1  = Θ (log(t − r)) . (8) After any round the agents are located at uniformly and independently chosen positions, so collide with probability exactly 1/A. So, the probability of the first collision between the agents being in a given round can only decrease as the round number increases. So, at least 1/2 of the time that cj ≥ 1, there is a collision in thefirst t/2  rounds. So, overall, by (8), E[cj |cj ≥ 1] = Θ (log(t − t/2)) = Θ (log t). Using (7), P [cj ≥ 1] = Θ t A·log t , completing the proof. We now give our main technical lemma – a strong moment bound on the distribution of cj . Intuitively, not only does an agent expect to collide at most O(log t) times with any other agent it encounters, but this bound extends to the higher moments of the collision distribution, and so holds with high probability. In this sense, the grid has strong local mixing – random walks spread quickly over a local area and do not cover the same nodes too many times. def Lemma 7. (Collision Moment Bound) For all j ∈ [1, ..., n], let c̄j = cj − E cj . For all k ≥ 2, assuming    k k−1 t t ≤ A, E c̄j = O A · k! log t . Proof. We expand E[c̄kj ] = P[cj ≥ 1] · E[c̄kj |cj ≥ 1] + P[cj = 0] · E[c̄kj |cj = 0], and so by Lemma 6:         t E c̄kj = O · E c̄kj |cj ≥ 1 + E c̄kj |cj = 0 . A log t 7   k E c̄kj |cj = 0 = (E cj ) = (t/A)k ≤ k−1 t A k! log     t for all k ≥ 2. Further, E c̄kj |cj ≥ 1 ≤ E ckj |cj ≥ 1 , since     E cj = At ≤ 1. So to prove the lemma, it just remains to show that E ckj |cj ≥ 1 = O k! logk t . Conditioning on cj ≥ 1, we know the agents have an initial collision in some round t′ ≤ t. We split cj P P ′ +t−1 over rounds: cj = tr=t′ cj (r) ≤ tr=t cj (r). To simplify notation we relabel round t′ round 1 and so ′ round t′ + t − 1 becomes round t. Expanding ckj out fully using the summation: " t # t t t t t X X X X X X  k E cj = E ... cj (r1 )cj (r2 )...cj (rk ) = ... E [cj (r1 )cj (r2 )...cj (rk )] . r1 =1 r2 =1 rk =1 r1 =1 r2 =1 rk =1 E [cr1 (j)cr2 (j)...crk (j)] is just the probability that the two agents  collide in each of rounds r1 , r2 ,...rk . Assume w.l.o.g. that r1 ≤ r2 ≤ ... ≤ rk . By Lemma 4 this is: O r1 (r2 −r1 +1)(r3 −r21+1)...(rk −rk−1 +1) . So we can rewrite, by linearity of expectation:   t t t X X X  k 1 . O ... E cj = k! r1 (r2 − r1 + 1)(r3 − r2 + 1)...(rk − rk−1 + 1) r =r r =1 r =r 1 2 k 1 k−1 The k! comes from the fact that in this sum we only have ordered k-tuples and so need to multiple by k! to account for the fact that the original sum is over unordered k-tuples. We can bound: t X rk =rk−1 1 1 1 = 1 + + ... + = O(log t) rk − rk−1 + 1 2 t so rearranging the sum and simplifying gives: t X  k 1 E cj = k! r r =1 1 1 t X r2 =r1 t X 1 ... r − r1 r =r +1 2 k k−1 1 r − rk−1 +1 k t t t X X 1 X 1 = k! ... r r2 − r1 + 1 r =r r =1 1 r =r 1 2 k−1 1 k−2 1 · O(log t). rk−2 − rk−1 + 1 P We repeat this simplification for each level of summation replacing tri =ri−1  k ating through the k levels gives E cj = O(k! logk t) giving the lemma. 1 ri −ri−1 +1 with O(log t). Iter- As with Lemma 4, the techniques used in Lemmas 6 and 7 can be applied to a single walk. We give two bounds that may be of independent interest. Corollary 8√(Random Walk Visits Moment Bound). Consider an agent a1 randomly walking on a two√ dimensional A × A torus that is initially located at a uniformly random location and takes t ≤ A steps. Let cj be the number of times that a1 visits node j. For all j ∈ [1, ...A] and all k ≥ 2,     t E c̄kj = O · k! logk−1 t . A Proof. This follows from noting that the expected number of visits to a given node  is t/A and so Lemma 6  t can be used in conjunction with Corollary 5 to show that P[cj ≥ 1] = Θ A log t . We can then just follow the proof of Lemma 7, using Corollary 5 where needed to obtain the result. Corollary √ 9 (Equalization Moment Bound). Consider an agent a1 randomly walking on a two-dimensional √ A × A torus. If a1 takes t ≤ A steps and c is the number of times it returns to its starting position (the number of equalizations), for all k ≥ 2,     E c̄k = O k! logk t . Proof. This follows directly from the proof of the moment bound given in Lemma 7 for the number of collisions between two agents that are assumed to collide at least once: E[ckj |cj ≥ 1] = O(k! logk t). By replacing the application of Lemma 4 with Corollary 5 we obtain the result. 8 4.3 Concentration of Encounter Rate-Based Density Estimate P Armed with the moment bound of Lemma 7 we can finally show that nj=1 c̄j concentrates strongly about Pn Pn its expectation. Since j=1 c̄j is just a mean-centered and scaled version of d˜ = 1t j=1 cj , this is enough P to prove the accuracy of encounter rate-based density estimation. We start by showing that nj=1 c̄j is a sub-exponential random variable. Pn Pn Corollary 10 ( j=1 c̄j is sub-exponential). Assuming t ≤ A, j=1 c̄j is sub-exponential with parameters i h Pn σ 2 λ2 b = Θ(log t) and σ 2 = Θ(td log t). Specifically, for any λ with |λ| < 1b E eλ j=1 c̄j ≤ e 2 . t Proof. By Lemma 7, for σ 2 = Θ( t log A ) and b = Θ(log t), c̄j satisfies the Bernstein condition:   1 E c̄kj ≤ k!σ 2 bk−2 . 2 t This implies that c̄j is sub-exponential with parameters σ 2 = Θ( t log A ) and b = Θ(log t) (see [Wai15], Chapter 2). Since each c̄j is independent, this gives us, for all λ with |λ| ≤ 1b : n i Y h Pn t log t 2 λ2 E eλc̄j ≤ en· 2 ·Θ( A ) = eΘ(λ td log t) . E eλ j=1 c̄j = j=1 This completes the proof by the definition of a sub-exponential random variable. We finally apply a standard sub-exponential tail bound [Wai15] to prove our main result. Lemma 11 (Sub-exponential tail bound). Suppose that X is sub-exponential with parameters (σ 2 , b). Then, for any ∆ ≤ σ2 b , ∆2 P[|X − E X| ≥ ∆] ≤ 2e− 2σ2 . Pn Proof of Theorem 2. Since c̄j is just a mean-centered version of cj , j=1 c̄j deviates from its mean exactly Pn Pn the same amount as j=1 cj . Further, d˜ is just equal to 1t j=1 cj , so the probability that it falls within an Pn ǫ multiplicative factor of its mean is the same as the probability that j=1 cj falls within an ǫ multiplicative factor of its mean. By Corollary 10 and Lemma 11:         2  n n n n X X X X Θ − ǫlogtdt cj − td ≥ ǫtd ≤ 2e cj  = P  cj − E  cj  ≥ ǫ E  δ = P . j=1 ǫ2 td log t 5 j=1 = Θ (log(1/δ)) and so ǫ = Θ q j=1 j=1 log(1/δ) log t td  , yielding the theorem. Extensions to Other Topologies We now extend our results to a broader set of graph topologies, demonstrating the generality of the local mixing analysis discussed above. We illustrate divergence between local and global mixing properties, which can have significant effects on random walk-based algorithms. 5.1 From Repeat Collision Bounds to Estimation Accuracy Our proofs are largely independent of graph structure, using just a re-collision probability bound (Lemma 4) and the regularity (uniform node degrees) of the grid, so agents remain uniformly distributed on the nodes in each round. Hence, extending our results to other regular graphs primarily involves obtaining re-collision probability bounds for these graphs. We consider agents on a graph with A nodes that execute analogously to Algorithm 2, stepping to a random neighbor in each round. Again, we focus on the multi-agent case but similar bounds (resembling Corollaries 8 and 9) hold for single random walk. We start with a general lemma, giving density estimation accuracy in terms of re-collision probability. 9 Lemma 12 (Re-collision Probability to Density Estimation Accuracy). Consider a regular graph with A nodes such that, if two randomly walking agents a1 and a2 collide in round r, for any 0 ≤ m ≤ t, the probability that they collide again in round r + m is Θ (β(m)) for some non-increasing function β(m). Let def Pt B(t) = m=0 β(m). After running for t ≤ A steps,Algorithm 2 returns d˜ such that, for any δ > 0, with  q log(1/δ)B(t) . probability ≥ 1 − δ, d˜ ∈ [(1 − ǫ)d, (1 + ǫ)d] for ǫ = O td Note that in the special case of the grid, by Lemma 4, we can set β(m) = 1/(m + 1) and hence B(t) = Θ(log t), yielding Theorem 2. Proof. E d˜ = d (Lemma 3) still holds as the regularity of the graph ensures that agents remain uniformly distributed on the nodes in every round (the stable distribution of any regular graph is the uniform distribution). Lemma 6 is also analogous except that (8) becomes: ! t−r X E[cj |cj ≥ 1] = Θ β(m) m=0 and using the fact that at least 1/2 the time P that cj ≥1, there is a collision in the first t/2 rounds and that t/2 β(m) is non-increasing, E[cj |cj ≥ 1] = Θ m=0 β(m) = Θ (B(t)) . This gives: P[cj ≥ 1] = Θ  t A · B(t)  .  Following the moment calculations in Lemma 7, E[ckj |cj ≥ 1] = O k!B(t)k and hence: E[c̄kj ] =O   t k−1 . · k!B(t) A   As in Corollary 10, this gives that c̄j is sub-exponential with parameters b = Θ(B(t)) and σ 2 = Θ tB(t) A   P so nj=1 c̄k is sub-exponential with parameters b = Θ(B(t)) and σ 2 = Θ n · tB(t) = Θ (tdB(t)). Plugging A into Lemma 11 gives: ǫ2 td B(t) = Θ(log(1/δ)). Rearranging yields the result. Applying the above bound requires a constant factor approximation to the re-collision probability – the probability is Θ(β(m)). Sometimes however, it is much easier to give just an upper bound – so the probability is O(β(m)). In this case a slightly weaker bound holds: Lemma 13 (Re-collision Probability Upper Bound to Density Estimation Accuracy). Consider a regular graph with A nodes such that, if two randomly walking agents a1 and a2 collide in round r, for any 0 ≤ m ≤ t, the probability that they collide again in round r + m is O (β(m)) for some non-increasing function β(m). def Pt ˜ Let B(t) = m=0 β(m). After running for t ≤ A steps, q Algorithm 2 returns d such that, for any δ > 0, with log(1/δ)·B(t)2 probability ≥ 1 − δ d˜ ∈ [(1 − ǫ)d, (1 + ǫ)d] for ǫ = O . td Proof. The proof is identical to that of Lemma 12 except that, we can only show P[cj ≥ 1] = Θ Therefore, our moment bound becomes:   t k k E[c̄j ] = O · k!B(t) . A 2 t A  . This gives that c̄kj is sub-exponential with parameters b = Θ(B(t)) and σ 2 = Θ( tB(t) A ). Following Lemma 12 we therefore have ǫ2 td B(t)2 = Θ(log(1/δ)). Rearranging yields the proof. 10 5.2 k-Dimensional Tori We first consider k-dimensional tori for general k. As k increases, local mixing becomes stronger, fewer re-collisions occur, and density estimation becomes easier. In fact, for k ≥ 3, although the torus still mixes slowly, density estimation is as accurate as on the complete graph! We first give the 1-dimensional case: 5.2.1 Density Estimation on the Ring Lemma 14 (Re-collision Probability Bound – Ring). If two randomly walking agents a1 and a2 are located on a 1-dimensional torus (a ring) with A nodes, and collide in round r, for any m ≥ 0, the probability that   1 a1 and a2 collide again in round r + m for k ≥ 1 is Θ √m+1 + O A1 . Proof. We have already shown this re-collision of Lemma 4. It is identical to P[Cx |Mx = m]  in the proof  bound  1 1 on an A × A grid, which is bounded by Θ √m+1 + O A .    1 1 For m ≤ A, the O A term. We can estimate the sum of repeat collision is absorbed into the Θ √m+1 probabilities by using the fact that √ √ √ √ 1 2 2( x − x − 1) √ ≤√ √ √ √ = √ = 2( x − x − 1). √ x x+ x−1 ( x + x − 1)( x − x − 1) So: t X √ √ √ √ √  √ √ 1 √ ≤ 1+2 2 − 1) + ( 3 − 2) + ... + ( t + 1 − t) = 2 t + 1 − 1. m+1 m=0 Similarly, √ √ 2 1 √ √ ≥ √ = 2( x − x − 1) x−1 x+ x−1 and so: t X  √ √ √ √ √ √ √ 1 √ 2 − 1) + ( 3 − 2) + ... + ( t + 2 − t + 1) = 2 t + 2 − 2. ≥2 m+1 m=0 √ Pt 1 = Θ( t). Plugging into Lemma 12, on a ring, random walk-based density So, overall m=0 √m+1 q  q 2   √  log(1/δ) t log(1/δ) log(1/δ) √ estimation gives: ǫ = O = O rounds are . Rearranging, t = Θ td ǫ2 d td necessary to obtain a 1 ± ǫ approximation √ with probability ≥ 1 − δ. Local mixing on the ring is much worse than on the torus– we expect to see Θ( t) rather than Θ(log t) repeat collisions with every agent interacted with. Hence, density estimation is much more difficult, requiring t to be quadratic rather than linear in 1/d. 5.2.2 Density Estimation on Higher Dimensional Tori We now cover k ≥ 3. While global mixing time is on the order of A2/k and so is slow if k << A, local mixing is so strong that our accuracy bounds actually match those of independent sampling! Throughout this section, we assume that k is a small constant and hide it in our asymptotic notation. Lemma 15 (Re-collision Probability Bound – High-Dimensional Torus). If two randomly walking agents a1 and a2 are located on a k-dimensional torus with A nodes, and collide in round r, for any constant k ≥ 3,    1 m ≥ 0, the probability that a1 and a2 collide in round r + m is Θ (m+1)k/2 + O A1 . Proof. We closely follow the proof of Lemma 4. In total, a1 and a2 take 2m steps: Mi in each dimension for i ∈ [1, ..., k]. Let Ci be the event that the agents have the same position in the ith dimension in round r + m. By the analysis of Lemma 4,     1 1 +O . P[Ci |Mi = mi ] = Θ √ A1/k mi + 1 11 So,           1 1 1 1 P[C|M1 = m1 , ..., Mk = mk ] = Θ √ · .... · Θ √ . +O +O A1/k A1/k m1 + 1 mk + 1 (9) In expectation, Mi = 2m/k. So by a Chernoff bound, P[Mi ≤ m/k] ≤ 2e −(1/2)2 ·2m/3k =O  1 (m + 1)k/2  again assuming k is a small  constant.  Union bounding over all k dimensions, we have Mi ≥ m/k for all i 1 except with probability O (m+1) and hence by (9): k/2 P[C] = O  1 (m + 1)k/2  " + Θ 1 p m/k + 1 ! +O  1 A1/k #k =Θ  1 (m + 1)k/2    1 +O A giving the lemma (again, asymptotic notation hides multiplicative factors in k since it is constant).   Pt 1 1 < 1+ We can plug the above bound into Lemma 13. For t ≤ A and k ≥ 3, m=0 (m+1)k/2 + A √  P∞ log(1/δ) 1 . Rearranging, we require m=0 (m+1)k/2 = O(1). So we can set B(t) = 1 and have ǫ = O td   . This matches the performance of independent sampling up to constants. t = Θ log(1/δ) ǫ2 d 5.3 Regular Expanders When a graph does mix well globally, it also mixes well locally. The number of repeat collisions is low and accurate density estimation is possible. The most obvious example is the complete graph, on which random-walk based density estimation is equivalent to density estimation via independent sampling. We generalize this intuition to any regular expander . Lemma 16 (Re-collision Probability Bound – Regular Expander). Let G be a k-regular expander with A nodes and adjacency matrix M. Let W = k1 · M be its random walk matrix, with eigenvalues λ1 ≥ λ2 ≥ ... ≥ λA . Let λ = max{|λ2 |, |λA |}. If two randomly walking agents a1 and a2 collide in round r, for any m ≥ 0, the probability that they collide again in round r + m is at most λm + 2/A. Proof. Suppose that a1 and a2 collide at node i in round r. The probability they re-collide at round r + m m is ||Wm ei ||22 , since for each j, Wi,j = (Wm ei )j is the probability an agent is at node j after round r + m given that it is at node i after round r. We bound this norm using the following lemma on how rapidly an expander random walk converges to its stable distribution: Lemma 17 ([Lov93]). Let G be a k-regular expander with A nodes, adjacency matrix M, and random walk matrix W = k1 · M. Let λ1 ≥ λ2 ≥ . . . ≥ λA be the eigenvalues of W and λ = max{|λ2 |, |λA |}. For each 1 ≤ j ≤ n, 1 (Wm · ei )j − ≤ λm . A Now we can bound ||Wm ei ||22 by: ||W m ei ||22 = A X (W m ei )2j = A  X 1 j=1 j=1 12 A + χj 2 def where χj = (Wm · ei )j − A · (1/A) = 0. Therefore, 1 A so that χj ∈ [−1/A, λm ] due to Lemma 17. We have ||Wm ei ||22 = A  X 1 j=1 A + χj P j χj = P j (W m ei )j − 2 !  2 A A X 1 2χj 1 X 2 2 ≤ + + χj = + χ . A A A j=1 j j=1 m χ2j is maximized when χP the indices j = λ is maximized. Let S ⊂ [1, A] beP P j with Pthe number of possible m m m χ = 0. Therefore, |S| · λ ≤ − j with χj = λ . Since j χj = 0, we have j∈S λ + j ∈S j j ∈A / χj ≤ / 1 1 − |S|/A and so |S| ≤ λm +1/A . Therefore, P j A X j=1 χ2j ≤ ≤ X λ2m + j∈S X χ2j j ∈S / 2m A − |S| λ ≤ λm + 1/A. + λm + 1/A A2 Thus, ||Wm ei ||22 ≤ λm + 2/A, giving the lemma. Pt 1 + 2t/A. Assuming t = O(A), We now apply Lemma 13, with B(t) = m=0 β(m) ≤ 1−λ s ! ! r log(1/δ)(1/(1 − λ) + 2t/A)2 log(1/δ) =O . ǫ=O td td(1 − λ)2   2 Rearranging, t = Θ ǫ2log(1/δ) d(1−λ)2 , matching independent sampling up to a factor of O(1/(1 − λ) ). 5.4 k-Dimensional Hypercube Finally, we give bounds for a k-dimensional hypercube. Such a graph has A = 2k vertices mapped to the elements of {±1}k , with an edge between any two vertices that differ by hamming distance 1. The hypercube is relatively fast mixing. Its adjacency matrix eigenvalues are [−k, −k + 2, −k + 4, ..., k − 4, k − 2, k]. Since it is bipartite, we can effectively ignore eigenvalues and apply Lemma 16 with λ = Θ(1 − 2/k) =  the negative log(1/δ) log2 (A) . However, it is possible to remove the dependence on A Θ(1 − 1/ log A). This yields t = Θ ǫ2 d via a more refined analysis – while the global mixing time of the graph increases as A grows, local mixing becomes stronger! Lemma 18 (Re-collision Probability Bound – k-Dimensional Hypercube). If two randomly walking agents a1 and a2 are located on a k-dimensional hypercube with A = 2k vertices and collide  inround r, for any m ≥ 0, the probability that a1 and a2 collide in round r + m is at most (7/10)m + O √1A . Proof. A node of the hypercube can be represented as a k-bit string and each random walk step seen as choosing one of the bits uniformly at random and flipping it. If a1 and a2 collide, for each of the bit, the total number of times a1 and a2 chose that bit must be even. The total number of possible ways for re-collision to occur at round r + m is exactly the number of ways 2m flips can be placed into k buckets, where each bucket has even number of elements. This quantity is: X (2m)! . a ! · . . . · ak ! 1 a +...+a =2m 1 (ai k mod 2)≡0 This value is equal to the coefficient of x2m in the exponential generating function k k  x  k   (2m)! X k x(2i−k) x4 e + e−x x2 = e . + + ... = (2m)! (2m)! 1 + 2! 4! 2 2k i=0 i 13 By differentiating 2m times, we find that the coefficient of x2m is:  k   k   X 1 X k k k 2m /2 · (2i − k)2m . (2i − k) = i 2k i=0 i i=0 This summation is exactly E[X 2m ], where X is a sum of k i.i.d. random variables each equal to 1 with probability 1/2 and −1 otherwise. For any c ∈ (0, 1], we can split the expectation: E[X 2m ] = E[X 2m ||X| ≥ ck] · P[|X| ≥ ck] + E[X 2m ||X| ≤ ck] · P[|X| ≤ ck] ≤ k 2m · P[|X| ≥ ck] + (ck)2m . To bound the return probability bound, we this count by the the total number of possible paths taken by a1 and a2 in m steps, k 2m , giving an upper bound of: P[|X| ≥ ck] + c2m . By a Hoeffding bound, P[|X| ≥ ck] ≤ 2e−c So our final probability bound is: 2 k/2 . If we set c = p √ √ ln A/k = ln 2 then P[|X| ≥ ck] ≤ 1/ A. √ 1 1 P[|X| ≥ ck] + c2m ≤ √ + ( ln 2)2m < √ + (7/10)m A A yielding the lemma. Note that, by adjusting c, it is possible trade off the terms in the above bound, giving stronger inverse dependence on A at the expense of slower exponential decay in m. √ √ Pt 10 + t/ Plugging into Lemma 13, we have B(t) = β(m) ≤ A. If we assume t = O( A), this gives m=0 3  q   log(1/δ) log(1/δ) and so t = Θ , matching independent sampling. ǫ=O td ǫ2 d 6 Applications We conclude by discussing algorithmic applications of our ant-inspired density estimation algorithm (Algorithm 2), variations on this algorithm, and the analysis techniques we develop. 6.1 Social Network Size Estimation Random walk-based density estimation is closely related to work on estimating the size of social networks and other massive graphs using random walks [KLS11, KBM12, LL12, LW14]. In these applications, one does not have access to the full graph (so cannot exactly count the nodes), but can simulate random walks by following links between nodes [MMG+ 07, GKBM09]. One approach is to run a single random walk and count repeat node visits [LL12, KBM12]. Alternatively, [KLS11] proposes running multiple random walks and counting their collisions. This can be significantly more efficient since the dominant cost is typically in link queries to the network. With multiple random walks, this cost can be trivially distributed to multiple servers simulating walks independently. Walks are first run for a ‘burn-in period’ so that their locations are distributed approximately by the stable distribution of the network. The walks are then halted, and the number of collisions in this final round are counted. The collision count gives an estimate of the walks’ density. Since the number of walks is known, this yields an estimate for network size. We show that ant-inspired algorithms can give runtime improvements over this method. After burn-in, instead of halting the walks, it is possible to run the random walks for multiple rounds, recording encounter rates as in Algorithm 2. This allows the use of fewer random walks, decreasing total burn-in cost, and leading to faster runtimes when mixing time is relatively slow, as is common in social network graphs [MYK10]. 14 6.1.1 Random Walk-Based Algorithm for Network Size Estimation Consider an undirected, connected, non-bipartite graph G = (V, E). Let S be the set of vertices of G that are ‘known’. Initially, S = {v} where v is a seed vertex. We can access G by looking up the neighborhood Γ(vi ) of any vertex vi ∈ S and adding Γ(vi ) to S. To compute the number of nodes |V | in the network, we could scan S, looking up the neighbors of each vertex and adding them to the set. After querying all nodes in S we will have S = V and will know the network size. However, the number of queries required equals |V |. The goal is to estimate network size using a significantly more efficient random-walk based approach. A number of challenges are introduced by this application. While we can simulate many random walks on G, we can no longer assume these random walks start at randomly chosen nodes, as we do not have the ability to uniformly sample nodes from the network. Instead, we must allow the random walks to run for a burn-in phase of length proportional to the mixing time of G. After this phase, the walks are distributed approximately according to the stable distribution of G. In general, G is not regular. In the stable distribution, a random walk is located at a vertex with probability proportional to its degree. Hence, collisions tend to occur more at higher degree vertices. To correct for this bias, we count a collision at vertex vi with weight 1/ deg(vi ). As we will see, with this modification, we must adjust our final estimate by the average degree of the graph, which we must estimate. Our results depend on a natural generalization of re-collision probability. For any i, j ∈ |V |, let p(vi , vj , m) be the probability of an m step random walk starting at vi ending at vj . Define: def β(m) = maxi,j p(vi , vj , m) deg(vj ) Intuitively, this is the maximum m step collision probability, weightedP by degree since higher degree vertices t are more likely to be visited in the stable distribution. Let B(t) = m=1 β(m). Note that this weighted B(t) is upper bounded by the unweighted B(t) used in Lemmas 12 and 13. For simplicity, we initially ignore burn-in and assume that our walks start distributed exactly by the def deg(vi ) i) and initial stable distribution of G. A walk starts at vertex vi with probability pi = Pdeg(v deg(vi ) = 2|E| i locations are independent. We also assume knowledge of the average degree deg = 2|E|/|V |. We later rigorously analyze burn-in and show to estimate deg, completing our analysis. Algorithm 3 Random Walk-Based Network Size Estimation input: step count t, average degree deg, n random starting locations [w1 , ..., wn ] distributed according to the network’s stable distribution [c1 , ..., cn ] := [0, 0, ..., 0] for r = 1, ..., t do ∀j, set wj := randomElement(Γ(wj )) ⊲ Γ(wj ) denotes the neighborhood of wj . count(wj ) ⊲ count(wj ) returns number of other walkers currently at wj . ∀j, set cj := cj + deg(wj ) end for P deg c C := ·n(n−1)tj return à = 1/C Theorem 19. If n2 t = Θ  à ∈ [(1 − ǫ)|V |, (1 + ǫ)|V |]. B(t)deg ǫ2 δ  · |V | , then with probability at least 1 − δ, Algorithm 3 returns Throughout this section, we work directly with the weighted total collision count C, showing that it is close to its expectation with high probability and hence giving the accuracy bound for Ã. As in the density estimation case, we start by showing that C is correct in expectation. Lemma 20. E C = 1/|V |. 15 Proof. Let cj (r) be the number of collisions, weighted by inverse vertex degree, walk j expects to be involved i) in at round r. In each round all walks are at vertex vi with probability pi = deg(v 2|E| , so: E cj (r) =  |V |  |V | X n−1 deg(vi ) (n − 1) deg(vi ) n−1X 1 deg(vi ) = = · · . 2 2|E| 2|E| deg(v ) 4|E| 2|E| i i=1 i=1 By linearity of expectation: E cj = t(n−1) 2|E| , E P cj = tn(n−1) 2|E| and hence, E C = deg 2|E| = 1/|V |. We now need to show concentration of C about its expectation. Let ci,j be the weighted collision count between walks wi and wj where i 6= j. It is possible to closely follow the moment bound proof of Lemma 7 and show that ci,j is sub-exponential. However, unlike in the case of regular graphs, we will not be able to claim that the different ci,j ’s are independent. Hence, we will not be able to use the same sub-exponential tail bounds employed in Section 4.3. Instead, we bound the second moment (the variance) of each ci,j and obtain our concentration results via Chebyshev’s inequality. This leads to a linear rather than logarithmic dependence on the failure probability 1/δ. However, we note that we can simply perform log(1/δ) estimates each with failure probability 1/3 and return the median, which will be correct with probability 1 − δ. def Lemma 21. (Degree Collision Variance Bound) For all i, j ∈ [1, ..., n] with i 6= j, let c̄i,j = ci,j −  Weighted   2  tB(t) E ci,j . E c̄i,j = O |E| . Proof. We can split E c̄2i,j over rounds as:  E t X r=1 !2  t t−1 X t X X   ci,j (r)  = E c̄i,j (r)2 + 2 E [c̄i,j (r)c̄i,j (r′ )] r=1 r=1 r ′ =r+1    |V | |V | 2 ′ 2 X X p(vi , vj , r − r )  1 1  deg(vi ) ·  +2 =t · · 2 2 2 (2|E|) deg(v ) (2|E|) deg(v ) deg(vj ) i i r=1 r ′ =r+1 i=1 i=1 j=1    |V | |V | t−1 X X X t|V |  deg(vi ) · β(m)  p(vi , vj , m) + 2t ≤ 4|E|2 (2|E|)2 m=1 i=1 j=1 |V |  X deg(vi )2  t−1 X t X   t−1 X β(m) t tB(t) ≤ . + 2t =O 4|E| 2|E| |E| m=1 Lemma 22 (Total Collision Variance Bound). Let C = Proof. Pn j=1 c̄j = P   E  i,j∈[1,...,n],i6=j c̄i,j . X i,j∈[1,...,n],i6=j P deg j c̄j n(n−1)t .    E C̄ 2 = O n12 t · B(t)|E| |V |2  . We closely follow the variance calculation in [KLS11]: 2   c̄i,j   = X i,j∈[1,...,n],i6=j   X i′ ,j ′ ∈[1,...,n],i6=j  c̄i,j · c̄i′ ,j ′         2  n n n 2 =2 (E c̄i,j ) + 2 · 3! E c̄i,j + 4! E c̄i,j c̄i,k . 4 2 3 The first term corresponds to the cases when i = i′ and j = j ′ . The second corresponds to i 6= i′ and j 6= j ′ ,  in which case c̄i,j and c̄i′ ,j ′ are independent and identically distributed. The 4! n4 multiplier is the number of ways to choose an ordered set  of four distinct indices. The last term corresponds to all cases when either i = i′ or j = j ′ . There are 3! n3 ways to choose an ordered set of three distinct indices, multiplied by two to 16 account for the repeated index being in either the first or second position. Using E c̄i,j = 0 and the bound on E[c̄2i,j ] from Lemma 21:  2   2    X n tB(t) n   c̄i,j   = O E  + 0 + 2 · 3! E c̄i,j c̄i,k . (10) |E| 3 i,j∈[1,...,n],i6=j When j 6= k, c̄i,j and c̄i,k are independent and identically distributed conditioned on the path that walk wi traverses. Let Ψi be the t step path chosen by wi . X P [Ψi = ψi ] · E [c̄i,j |Ψi = ψi ] · E [c̄i,k |Ψi = ψi ] E [c̄i,j c̄i,k ] = ψi = X ψi = X ψi P [Ψi = ψi ] · E [c̄i,j |Ψi = ψi ] 2 P [Ψi = ψi ] · (E [ci,j |Ψi = ψi ] − E [ci,j ])2 . (11) Pt t i (r)) E [ci,j |Ψi = ψi ] = r=1 deg(ψ · deg(ψ1i (r)) = 2|E| = E [ci,j ]. That is, the expected number of collisions is 2|E| identical for every path of wi . Plugging into (11), E [c̄i,j c̄i,k ] = 0.  2   2 P tB(t) and thus: = O n |E| So finally, plugging back into equation (10), E i,j∈[1,...,n],i6=j c̄i,j h 2i E C =O n2 tB(t) · |E|  deg n(n − 1)t 2 ! =O  1 B(t)|E| · n2 t |V |2  . With this variance bound in place, we can now finally prove Theorem 19. Proof of Theorem 19. Note that C̄ = C − E C. By Chebyshev’s inequality Lemma 22 gives: P [|C − E C| ≥ ǫ E C] ≤ Rearranging gives us that, in order to have C̄ ∈ 2 h n t=Θ 1 ǫ 2 n2 t (1−ǫ) 1+ǫ |V | , |V |  i · B(t)|E|. with probability δ, we must have:  1 B(t)|E| . ǫ2 δ As long as we have ǫ < 1/4 then this immediately gives à ∈ [(1 − 2ǫ)|V |, (1 + 2ǫ)|V |], giving the lemma after adjusting constants on ǫ. 6.1.2 Estimating The Average Degree we need a (1 ± ǫ) apWe now show how to estimate the value of deg used in Algorithm 3. Specifically, P cj j 1 proximation to deg . If we then substitute this into the formula à = deg·n(n−1)t , we still have a (1 ± O(ǫ)) approximation to the true network size. We use the algorithm and analysis of [KLS11], which gives a simple approximation via inverse degree sampling. Algorithm 4 Average Degree Estimation input: n random starting locations [w1 , ..., wn ] distributed according to the network’s stable distribution. 1 ∀j, set dj := deg(w ⊲ Sampling j) return D := P dj ·n 17 Theorem 23 (Average Degree Estimation). If n = Θ h i 1+ǫ probability at least 1 − δ, D ∈ 1−ǫ . , deg deg  1 ǫ2 δ · deg degmin  , Algorithm 4 returns D such that, with Proof.  |V |  n X 1 |V | deg(vi ) 1 1 1X . E dj = · n · = · = ED = n j=1 n 2|E| deg(vi ) 2|E| deg i=1 Since each dj is independent, letting D̄ = D − E D, |V |   1 1 1 1 1 X deg(vi ) |V | 1 1 E D̄2 = E[d¯2j ] ≤ E[d2j ] = . ≤ · = · n n n i=1 (2|E|) deg(vi )2 n 2|E| degmin n degmin deg h i deg 1 ǫ Applying Chebyshev’s inequality: P D − deg ≤ deg and rearranging, to succeed with proba≤ ǫ2 n deg min bility at least 1 − δ it suffices to set:   1 deg . n=Θ 2 · ǫ δ degmin 6.1.3 Handling Burn-In Error Finally, we remove our assumption that walks start distributed exactly according to the network’s stable distribution, rigorously bounding the length of burn-in required before running Algorithm 3. n Let D∗ ∈ R|V | be a vector representing the true stable distribution of n random walks on G and n Dt ∈ R|V | be a vector representing the distribution of the walks after running for t burn-in steps. Specifically, each walk w1 , ..., wn is initialized at a single seed vertex v. For t rounds we then update the location of each walk independently by moving to a randomly chosen neighbor. Both vectors are probability distributions: they have all entries in [0, 1] and kD∗ k1 = kDk1 = 1. Let ∆ = D∗ − Dt and assume that k∆k1 ≤ δ. We can consider two equivalent algorithms: draw an initial set of locations W = w1 , ..., wn from D∗ , run Algorithm 3, and then artificially fail with probability max{0, ∆(W )}. Alternatively, draw W = w1 , ..., wn from Dt , run Algorithm 3, and then artificially fail with probability max{0, −∆(W )}. These algorithms are clearly equivalent. The first obtains a good estimator with probability 1 − 2δ - probability δ that Algorithm 3 fails when initialized via the stable distribution D∗ by Theorem 19 plus an artificial failure probability of ≤ k∆k1 ≤ δ. The second then clearly also fails with probability 2δ. This can only be higher than if the we did not perform the artificial failure after running Algorithm 3. Therefore, running Algorithm 3 with a set of random walks initially distributed according to Dt yields success probability ≥ 1 − 2δ. How long must the burn-in period be to ensure kD∗ − Dt k1 ≤ δ? Let W be the random walk matrix of G. Let λ1 ≥ λ2 ≥ . . . ≥ λA be the eigenvalues of W and λ = max{|λ2 |, |λ|V | |}. Let Ct ∈ R|V | denote the location distribution for a single random walk after burn-in and C ∗ ∈ R|V | denote the stable distribution of a single random walk. If we have, for all i, |Ct (vi ) − C ∗ (vi )| ≤ δ/n · C ∗ (vi ) then we have for any W : |Dt (W ) − D∗ (W )| = ≤ n Y i=1 n Y i=1 Ct (wi ) − n Y i=1 C ∗ (wi ) (C ∗ (wi ) + δ/n · C ∗ (wi )) − n Y i=1 C ∗ (wi ) n n   X X n δ i ≤ 2δ · D∗ (W ) (δ/n)i ≤ D∗ (W ) < D∗ (W ) i i=1 i=1 as long as δ < 1/2. This multiplicative bound gives kD∗ − Dt k1 ≤ 2δ. mixing time    bounds  By standard log(|E|/δ) log(n|E|/δ) δ ∗ ∗ ([Lov93], Theorem 5.1), |Ct (vi ) − C (vi )| ≤ n|E| · C (vi ) for all i after O =O burn-in 1−λ 1−λ steps (since n < |E| or else we could have scanned the full graph.) 18 6.1.4 Overall Runtime and Comparision to Previous Work   Let M = O log(|E|/δ) denote the burn-in time required before running Algorithm 3. In order to obtain a 1−λ (1 ± ǫ) estimate of network size with probability 1 − δ we must run n random walks for M + t steps, making n(M + t) link queries, where by Theorems 19 and 23:    s  deg |V | · B(t)deg  n = Θ max , . (12) 2  degmin ǫ δ  t · ǫ2 δ Typically, the second term dominates since deg << |V |. Hence, by increasing t, we are able to use fewer random walks, significantly decreasing the number of link queries required if M is large. In the special case with t = 1 we obtain a somewhat simpler bound. Instead of using the more general analysis of Lemma 21 we can directly calculate: |V |   X deg(vi )2 1 1 . = E c̄2i,j = 2 deg(v )2 (2|E|) deg · 2|E| i i=1 2 Plugging this into Lemma 22 gives E[C ] = n2 deg·2|E| ·  deg n(n−1) 2 = O  |E|  . So, to have, C ∈ [(1 −     deg ǫ) E C, (1 + ǫ) E C] with probability 1 − δ by Chebyshev’s inequality, we need: n = Θ |E| ǫ2 δ = Θ ǫ2 δ · |V | . So overall require:    s  deg |V | · deg  n = Θ max , . (13) 2  degmin ǫ δ ǫ2 δ  n2 |V |2 2 [KLS11] also halts random walks after burn-in (uses t = 1), but uses a different estimator, tracking average degree, average inverse degree, and unweighted collisions. They require: )! (s P 3 P pi 1/pi 1 P , . (14) n = Θ max , P ǫ2 δ p2i ǫ2 δ ( p2i )2 ǫ2 δ|V |2 i) Where pi = deg(v 2|E| . Their third term comes from deg estimation and can be upper bounded by our first, although, by giving a tighter analysis in Theorem 23 we match this term. Their first term can be rewritten: s s s s 1 2|E| 2|E| |V | · deg = P|V | . · P|V | 2 = P|V | 2 2 2 2 ǫ2 δ ǫ δ p ǫ δ deg(vi ) /(2|E|) deg(vi ) i=1 i i=1 i=1 P|V | This will always be somewhat smaller than our second term as 2|E| ≤ i=1 deg(vi )2 . Their second term is a bit harder to compare, however, can be easily upper bounded by: P 3 deg3max 2|E| pi 1 deg3max ≤ · 2 = P 2 4 3 · ǫ2 δ|V | . 2 2 ǫ δ 2 ǫ δ ( pi ) deg |V | deg Assuming degmax /deg is not too large, this term will be small. However, a few very high degree nodes in an otherwise sparse graph can make it very large. In sum, while our bounds are not directly comparable to those of [KLS11], in the t = 1 case, assuming reasonably bounded degrees, they are of the same order of magnitude. Further, 12 gives an important tradeoff for graphs with relatively slow mixing time – we can increase the number of steps in our random walks, decreasing the total number of walks. As an illustrative example, consider a k-dimensional torus graph for k ≥ 3 (for k = 2 mixing time is Θ(|V |) so we might as well census the full graph). For any δ > 0, the mixing time required for kD∗ − DM k1 = O(δ) 19 (see Section 6.1.3) is M = Θ(log(|V |/δ)|V |2/k ). All nodes have degree 2k, and using the bounds above, to obtain a (1 ± ǫ) estimate of |V |, the algorithm of [KLS11] requires: ( )! r 1 |V | n = Θ max 2 , , ǫ δ ǫ2 δ   |/δ) (k+4)/(2k) √ Assuming |V | is large so the second term dominates, they require M · n = Θ log(|V · |V | ǫ d link queries to obtain a size estimate. In contrast, we require:    s )! ( r   deg |V | · B(t)deg |V | 1   . n = Θ max , = Θ max 2 ,   degmin ǫ2 δ t · ǫ2 δ ǫ δ t · ǫ2 δ since by Lemma 15, B(t) = O(1/k) and deg = degmin = k. If we set t = Θ(M ), and again assume that the second term dominates since |V | is large, the total number of link queries we need is: ! p log(|V |/δ) (k+1)/2k √ · |V | . n(M + t) = O ǫ d This beats [KLS11] by decreasing the polynomial in |V | and the logarithmic burn-in term. Ignoring error dependences, if k = 3, [KLS11] requires Θ(n7/6 ) queries which is more expensive than fully censusing the graph, whereas we require O(n2/3 ) queries, which is sublinear in the graph size. We leave it as an open question to compare our bounds with those of [KLS11] on more natural classes of graphs, and to determine either experimentally or theoretically, typical values of B(t) on these graphs. As used above, any of the bounds obtained in Section 5 apply since the degree weighted B(t) is upper bounded by the unweighted B(t) used in our regular graph analysis. However, bounds for real networks or popular random graph models used to study these networks would be very interesting. 6.2 Distributed Density Estimation by Robot Swarms Algorithm 2 can be directly applied as a simple and robust density estimation algorithm for robot swarms. Additionally, the algorithm can be used to estimate the frequency of certain properties within the swarm. Let d be the overall population density and dP be the density of agents with some property P . Let fP = dP /d be the relative frequency of P . Assuming that agents with property P are distributed uniformly in population and that agents can detect this property (through direct communication or some other signal), then they can separately track encounters with these agents. They can compute an estimate d˜ of d and d˜P of dPh. ByTheorem i   2, after  log(1/δ) log log(1/δ) log(1/dǫ) 1−ǫ 1+ǫ ˜ ˜ steps, with probability 1 − 2δ, d / d ∈ f , running for t = Θ P P d P ǫ2 1+ǫ 1−ǫ fP = [(1 − O(ǫ))fP , (1 + O(ǫ))fP ] for small ǫ. In a biological setting, properties may include if an ant has recently completed a successful food foraging trip [Gor99], or if an ant is a nestmate or enemy [Ada90]. In a robotics setting, properties may include whether a robot is part of a certain task group, whether a robot has completed a certain task, or whether a robot has detected a certain event or environmental property. 6.3 Random Walk-Based Sensor Network Sampling Finally, we believe our moment bounds for a single random walk (Corollaries 8 and 9) can be applied to random walk-based distributed algorithms for sensor network sampling. We leave obtaining rigorous bounds in this domain to future work. Random walk-based sensor network sampling [LB07, AB04] is a technique in which a query message (a ‘token’) is initially sent by a base station to some sensor. The token is relayed randomly between sensors, which are connected via a grid network, and its value is updated appropriately at each step to give an answer to the query. This scheme is robust and efficient - it easily adapts to node failures and does not require setting up or storing spanning tree communication structures. 20 However, if attempting to estimate some quantity, such as the percentage of sensors that have recorded a specific condition, as in density estimation, unless an effort is made to record which sensors have been previously visited, additional variance is added due to repeat sensor visits. Recording previous visits introduces computational burden – either the token message size must increase or nodes themselves must remember which tokens they have seen. We are hopeful that our moment bounds can be used to show that this is unnecessary – due to strong local mixing, the number of repeat sensor visits will be low, and increased variance due to random walking will be limited. 6.4 Generalization to Data Aggregation We note that, estimating the percentage of sensors in a network or the density of robots in a swarm with a property that is uniformly distributed is a special case of a more general data aggregation problem: each agent or sensor holds a value vi drawn independently from some distribution D. The goal is to estimate some statistic of D - e.g. its expectation. In the case of density estimation vi is simply an indicator random variable which is 1 with probability d and 0 otherwise. Ideally, to estimate the expectation of D, one would independently sample the agents and compute the sample mean. As in the case of density estimation, if instead, one simply takes an average of values encountered via a random walk, additional variance is added due to repeated encounters with many agents. However, it is likely that the effect of this variance can be bounded, as we have done in the special case of density estimation. We believe extending our results to more general data aggregation problems via random walk is an interesting future direction. 7 Acknowledgements We thank Amartya Shankha Biswas, Christopher Musco, and Mira Radeva for helpful discussions. This work was partially supported by NSF Grants BIO-1455983 and CCF-1461559, the NSF Center for Science of Information grant CCF-0939370, and AFOSR grant FA9550-13-1-0042. References [AB04] Chen Avin and Carlos Brito. Efficient and robust query processing in dynamic environments using random walk techniques. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pages 277–286. ACM, 2004. [Ada90] Eldridge S Adams. Boundary disputes in the territorial ant Azteca trigona: effects of asymmetries in colony size. Animal Behaviour, 39(2):321–328, 1990. [CLLM12] Kai-Min Chung, Henry Lam, Zhenming Liu, and Michael Mitzenmacher. Chernoff-hoeffding bounds for markov chains: Generalized and simplified. arXiv preprint arXiv:1201.0559, 2012. [ES09] Robert Elsässer and Thomas Sauerwald. Tight bounds for the cover time of multiple random walks. In Automata, Languages and Programming, pages 415–426. Springer, 2009. [Gil98] David Gillman. A chernoff bound for random walks on expander graphs. SIAM Journal on Computing, 27(4):1203–1220, 1998. [GKBM09] Minas Gjoka, Maciej Kurant, Carter T Butts, and Athina Markopoulou. A walk in facebook: Uniform sampling of users in online social networks. arXiv preprint arXiv:0906.0060, 2009. [Gor99] Deborah M Gordon. Interaction patterns and task allocation in ant colonies. In Information Processing in Social Insects, pages 51–67. Springer, 1999. [GPT93] Deborah M Gordon, Richard E Paul, and Karen Thorpe. What is the function of encounter patterns in ant colonies? Animal Behaviour, 45(6):1083–1100, 1993. 21 [KBM12] Maciej Kurant, Carter T Butts, and Athina Markopoulou. Graph size estimation. arXiv preprint arXiv:1210.0460, 2012. [KLS11] Liran Katzir, Edo Liberty, and Oren Somekh. Estimating sizes of social networks via biased sampling. In Proceedings of the 20th International Conference on World Wide Web, pages 597– 606. ACM, 2011. [LB07] Luisa Lima and Joao Barros. Random walks on sensor networks. In 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007, pages 1–5. IEEE, 2007. [LL12] Jianguo Lu and Dingding Li. Sampling online social networks by random walk. In Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research, pages 33–40. ACM, 2012. [Lov93] László Lovász. Random walks on graphs: A survey. Combinatorics, Paul Erdos is Eighty, 2(1):1–46, 1993. [LW14] Jianguo Lu and Hao Wang. Variance reduction in large graph sampling. Information Processing & Management, 50(3):476–491, 2014. [MMG+ 07] Alan Mislove, Massimiliano Marcon, Krishna P Gummadi, Peter Druschel, and Bobby Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pages 29–42. ACM, 2007. [MYK10] Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim. Measuring the mixing time of social graphs. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pages 383–389. ACM, 2010. [NTD05] Stamatios C Nicolis, Guy Theraulaz, and Jean-Louis Deneubourg. The effect of aggregates on interaction rate in ant colonies. Animal Behaviour, 69(3):535–540, 2005. [Pra05] Stephen C Pratt. Quorum sensing by encounter rates in the ant Temnothorax albipennis. Behavioral Ecology, 16(2):488–496, 2005. [SHG06] Robert J Schafer, Susan Holmes, and Deborah M Gordon. Forager activation and food availability in harvester ants. Animal Behaviour, 71(4):815–822, 2006. [Wai15] Martin J Wainwright. High-dimensional statistics: A non-asymptotic viewpoint, draft. http://www.stat.berkeley.edu/~mjwain/stat210b/Chap2_TailBounds_Jan22_2015.pdf, 2015. 22
8cs.DS
Safe & Robust Reachability Analysis of Hybrid Systems Eugenio Moggi1a , Amin Farjudianb , Adam Duracz2c , Walid Taha3b arXiv:1709.05658v1 [cs.LO] 17 Sep 2017 a DIBRIS, Genova Univ., v. Dodecaneso 35, 16146 Genova, Italy, Email: [email protected] University, Halmstad, Sweden, Email: [email protected] c Rice University, Houston, TX, USA, Email: [email protected] b Halmstad Abstract Hybrid systems—more precisely, their mathematical models—can exhibit behaviors, like Zeno behaviors, that are absent in purely discrete or purely continuous systems. First, we observe that, in this context, the usual definition of reachability—namely, the reflexive and transitive closure of a transition relation—can be unsafe, ie, it may compute a proper subset of the set of states reachable in finite time from a set of initial states. Therefore, we propose safe reachability, which always computes a superset of the set of reachable states. Second, in safety analysis of hybrid and continuous systems, it is important to ensure that a reachability analysis is also robust wrt small perturbations to the set of initial states and to the system itself, since discrepancies between a system and its mathematical models are unavoidable. We show that, under certain conditions, the best Scott continuous approximation of an analysis A is also its best robust approximation. Finally, we exemplify the gap between the set of reachable states and the supersets computed by safe reachability and its best robust approximation. Keywords: Domain theory; Models of hybrid systems; Reachability. Introduction In a transition system—ie, a binary relation → on a set of states—reachability is a clearly defined notion, namely, the reflexive and transitive closure →∗ of →. Reachability analysis plays an important role in computer-assisted verification and analysis [ACH+ 95], since safety (a key system requirement) is usually formalized in terms of reachability, namely: state s is safe ⇐⇒ it is not possible to reach a bad state from s. 1 Research partially supported by the Swedish Knowledge Foundation. done while the author was a PhD student at Halmstad University. 3 Research partially supported by US NSF award #1736754 “A CPS Approach to Robot Design” and the Swedish Knowledge Foundation project “AstaMoCA: Model-based Communications Architecture for the AstaZero Automotive Safety Facility”. 2 Work Preprint submitted to Journal of TCS August 7, 2017 For a hybrid system one can define a transition relation → on a continuous and uncountable state space, but →∗ captures only the states reachable in finitely many transitions, and they can be a proper subset of those reachable in finite time! Hybrid systems with Zeno behaviors—where infinitely many events occur in finite time—are among the systems in which the two notions of reachability differ. Zeno behaviors arise naturally when modeling rigid body dynamics with impacts, as illustrated by the system consisting of a bouncing ball (Example 2.8), whose Zeno behavior is due to the modeling of impacts as discrete events. Contributions The first contribution of this paper is the notion of safe reachability (Def 3.6), which gives an over-approximation—ie, a superset—of the states reachable in finite time, including the case where the hybrid system has Zeno behaviors. Mathematical models are always simplifications, through abstractions and approximations, of real systems. Simplifications are essential to making analyses manageable. In safety analysis, over-approximations are acceptable, since they can only lead to false negatives, ie, the analysis may wrongly conclude that (a state s of) the system in unsafe, because the over-approximation includes some unreachable bad states. The second contribution is to show, under certain assumptions, that the best Scott continuous approximation of safe reachability coincides with its best robust approximation. In safety analysis robust over-approximations are important, because inaccuracies in the modeling of a cyber-physical system (as well as in its building and testing) are unavoidable, as convincingly argued in [Frä99]. Related Work Reachability maps are arrows in the category of complete lattices and monotonic maps, which is the standard setting for defining and comparing abstract interpretations [CC92]. We build directly on the following papers. • [GST09] is an excellent tutorial on hybrid systems, from which we borrow the definition of hybrid system (Def 2.1), but avoid the use of hybrid arcs, since they cannot reach nor go beyond Zeno points. • [CR04, Cui07] introduce topological transition systems (TTS), which we use for defining safe reachability (Def 3.6). In TTSs on discrete spaces, standard reachability (Def 3.1) and safe reachability (Def 3.6) coincide. • [Eda95] is one among several papers, where Edalat recasts mainstream mathematics in Domain Theory, and shows what is gained by doing so. In this context Domain Theory becomes particularly relevant when the Scott and Upper Vietoris topologies on certain hyperspaces coincide. • [Frä99, GKC13] show that proving δ-safety, ie, safety of a hybrid system subject to some noise bounded by δ, can make the verification task easier, besides excluding systems that are safe only under unrealistic assumptions. 2 Summary The rest of the paper is organized as follows: • Sec 2 recalls the definition of a hybrid system from [GST09], defines the corresponding transition relation (Def 2.3), and gives some examples. • Sec 3 introduces two reachability maps Rf and Rs (Def 3.1 and 3.6, respectively), establishes their properties and how they relate to each other. • Sec 4 uses the poset-enriched category of complete lattices and monotonic maps (see Def 4.4) as a framework to discuss approximations and relate reachability maps defined on different complete lattices. We also give a systematic way to turn a monotonic map f between complete lattices into a Scott continuous map f ✷ (see Prop 4.14). • Sec 5 introduces the notion of robustness (see Def 5.1) and says when robustness and Scott continuity coincide (see Thm 5.7). • Sec 6 analyses (with the aid of pictures) the differences between the underapproximation Rf and several over-approximations (from Rs to Rs✷ ) of sets of reachable states, for the hybrid systems introduced in Sec 2. Appendix A contains some proofs that were too long to inline into the text. 1. Mathematical preliminaries We assume familiarity with the notions of Banach, metric, and topological spaces, and the definitions of open, closed, and compact subsets of a topological space (see, eg, [Con90, Kel75]). The three notions of space are related as follows: • Every Banach space is a Cauchy complete metric space whose distance is △ d(x, y) = |y − x|, where |x| is the norm of x; • Every metric space is a topological space whose open subsets are given by △ unions of open balls B(x, δ) = {y|d(x, y) < δ}. Throughout the paper, for the sake of simplicity, one may replace Banach spaces with Euclidean spaces Rn . For membership we may write x:X instead of x ∈ X, and we use the following notations: • R is the Euclidean space of the real numbers; • N and ω denote the natural numbers with the usual linear order; • P(S) is the set of subsets of a set S (we use the same notation also when S is a set with additional structure, eg, a Banach or topological space); • O(S) is the set of open subsets of a topological space S, and C(S) is the set of closed subsets (we use the same notation also when S is a set with additional structure that induces a topology, eg, a Banach or metric space); 3 • Set is the category of sets and (total) maps; • Setp is the category of sets and partial maps; • Top is the category of topological spaces and continuous maps. Finally, we recall some definitions and their basic properties: △ • x is a limit of a sequence (xn |n:ω) in the topological space S ⇐⇒ ∀O:O(S).x:O =⇒ ∃m.∀n > m.xn :O. The limits of a sequence form a closed subset of S. In a metric space a sequence has at most one limit. • x is an accumulation point of a sequence (xn |n:ω) in the topological △ space S ⇐⇒ ∀O:O(S).x:O =⇒ ∀m.∃n > m.xn :O. The accumulation points of a sequence form a closed subset of S, every limit is also an accumulation point, and every accumulation point is a limit of a sub-sequence (xf (n) |n:ω) for some strictly increasing f :Set(ω, ω), ie, ∀n.f (n) < f (n + 1). In a metric space, if a sequence has a limit, then the limit is the only accumulation point. • The derivative f˙:Setp (R, S) of a partial map f :Setp (R, S) from R to a △ Banach space S is given by f˙(x) = v ⇐⇒ ∃δ > 0 st B(x, δ) is included in the domain of f , and for any sequence (xn |n:ω) in B(x, δ) − {x}, if x (x) is the limit of (xn |n:ω) in R, then v is the limit of ( f (xxnn)−f |n:ω) in S. −x If f˙(x) is defined, then f must be continuous at x. A stronger requirement is that f˙ is defined and continuous in B(x, δ), in this case f is called continuously differentiable in B(x, δ). 2. Hybrid Systems and Topological Transition Systems In this section, we define what is a hybrid system (cf. [GST09]), namely, a mathematical model suitable for describing cyber-physical systems; what is a topological timed transition system (cf. [CR04]), namely, an abstraction of hybrid systems useful for defining various reachability maps; and, finally, we introduce some example hybrid systems that will be used throughout the paper. Definition 2.1. A Hybrid System (HS for short) H on a Banach space S is a pair (F, G) of binary relations on S, ie, F, G:P(S×S), respectively called flow and jump relation. We say that H is open/closed/compact, when the relations F and G—as subsets of the topological space S × S—are open/closed/compact. Remark 2.2. In [GST09], the authors restrict S to a Euclidean space Rn , and show that HS subsume Hybrid Automata [ACH+ 95] and Switching Systems. 4 The flow and jump relations are constraints for the trajectories describing how the HS evolves over time (see the definition of hybrid arc in [GST09, page 39]). Trajectories are not needed to define reachability (Sec 3), since a simpler notion of timed transition suffices (see also [ACH+ 95, Sec 2] and [Pla08, Def 5]). Definition 2.3. A Topological Timed Transition System (TTTS) is a pair ✲ ) consisting of a topological space S and a timed transition relation (S, △ ✲ :P(S × T × S), where T = {d:R|d ≥ 0} is the continuous time line. Its d △ corresponding transition relation on S is given by s ✲ s′ ⇐⇒ ∃d.s ✲ s′ . d △ A HS H = (F, G) on S induces a TTTS (S, ✲ ) such that s ✲ s′ ⇐⇒ H H ′ 1. d = 0 and s G s , or, 2. d > 0 and there exists a continuous map f :Top([0, d], S) such that: • the derivative f˙ of f is defined and continuous in (0, d); • s = f (0), s′ = f (d) and ∀t:(0, d).f (t) F f˙(t). In this case we say that f realizes the transition. Remark 2.4. The Banach space structure is just what is needed to define derivatives. Hybrid arcs (cf. [GST09]) could be defined in term of a transition relation where the labels d > 0 are replaced by their realizer maps f . In [GST09] the requirements on f are more relaxed than ours, namely: f must be absolutely continuous (which, in our case, is implied by the continuity of f˙), and the flow relation must hold almost everywhere in (0, d). However, the safe evolution and safe reachability maps (see Def 3.6) are insensitive to these changes. Thus, we have adopted the requirements on f that are mathematically simpler to express. In [Dur16] the requirements on f are stricter than ours, namely: f˙ must extend continuously to [0, d], and the flow √ relation must hold also at the endpoints. For instance, the map f (t) = t is continuous in [0, d], its derivative f˙(t) = 2∗1√t is continuous in (0, d), but it cannot be extended continuously to 0. d The main rationale for the stricter requirements is that a transition s ✲ s′ with d > 0 can only start from a state in the domain of the flow relation F . Notation 2.5. Given a first-order language with an interpretation in a Banach space S, a HS on S can be described by two formulas, a flow formula F (x, ẋ) and a jump formula G(x, x+ ), with two free variables each: x denotes the current state, ẋ denotes the derivative of a trajectory flowing through x, and x+ denotes a state reachable from x with one jump. Similarly, given a two sorted language, with one sort interpreted in R and the other in a topological space S, a timed transition relation can be described by a formula T (x, d, x′ ) with three free variables: x denotes the starting state, d:R the duration of the transition, and x′ the final state. We introduce some hybrid systems, and give explicit descriptions of their timed transition relations (see also the Figures in Sec 6). 5 Example 2.6 (Expand). HE is a HS on R describing the expansion of a quantity m until it reaches a threshold M > 0. The flow and jump relations are: F = {(m, ṁ)|0 ≤ m = ṁ ≤ M }, G = ∅. It has two kinds of trajectories depending on the start state m0 (see Fig 1). 1. When m0 = 0, the quantity remains 0 forever, ie, f (t) = 0 when t ≥ 0. 2. When m0 :(0, M ), there is an exponential growth f (t) = m0 ∗ et until f (t) becomes M , then the trajectory cannot progress further. The timed transition relation • m ✲ consists of the transitions HE ✲ m′ with 0 < d and 0 ≤ m ≤ m′ = m ∗ ed ≤ M . d Removing (M, M ) from F does not change the timed transitions, while adding d (M, 0) to F entails the addition of the transitions M ✲ M with d > 0. Example 2.7 (Decay). The hybrid system HD on R describes the decay of a quantity when m > 0, and a ‘refill’ to M > 0 when m = 0. The flow and jump relations are: F = {(m, ṁ)|m > 0 ∧ ṁ = −m}, G = {(0, M )}. It has two kinds of trajectories, depending on the start state m0 (see Fig 2): 1. When m0 = 0, there is a refill followed by a decay f (t) = M ∗ e−t . 2. When m0 > 0, there is a decay f (t) = m0 ∗ e−t . Thus, f (t) > 0 when t ≥ 0, and f (t) → 0 as t → +∞. ✲ consists of the transitions The timed transition relation HD • 0 • m ✲ M , and 0 ✲ m′ with 0 < d and m > m′ = m ∗ e−d > 0. d Adding (0, 0) to F entails the addition of the transitions 0 ✲ 0 with d > 0. d Example 2.8 (Bouncing ball). The hybrid system HB on R2 describes a bouncing ball with height h ≥ 0 and velocity v, which is kicked when it stops, ie, when h = v = 0. We assume the force of gravity to be −1 (for the sake of simplicity), a coefficient of restitution b (we do not restrict its value, but b:[−1, 0] would be the obvious restriction), and a velocity V > 0 given to the ball when it is kicked. Formally: • F = {((h, v), (ḣ, v̇))|h > 0 ∧ ḣ = v ∧ v̇ = −1}. • G = {((0, v), (0, v + ))|v < 0 ∧ v + = b ∗ v} ⊎ {((0, 0), (0, V ))}. It has seven kinds of trajectories starting from (h = 0, v > 0), depending on the value of b (see Fig 3). 6 1. When b < −1, the ball never stops (its energy increases at each bounce). 2. When b = −1, the ball never stops (its energy remains constant). 3. When b:(−1, 0), the ball stops in finite time, but after infinitely many bounces (this is a Zeno behavior), then it is kicked, ie, (h = 0, v = V ). 4. When b = 0, the ball stops as it hits the ground, then it is kicked. 5. When b:(0, 1), as the ball hits the ground, it stops after infinitely many instantaneous slowdowns 0 > bn ∗ v → 0 (this is a chattering Zeno behavior), then it is kicked. 6. When b = 1, as the ball hits the ground, the trajectory cannot progress further in time. 7. When b > 1, as the ball hits the ground, its velocity drifts to −∞ after an infinite sequence of instantaneous accelerations 0 > bn ∗ v → −∞, and the trajectory cannot progress further in time. ✲ consists of the following transitions: The timed transition relation HB • (0, v) • (0, 0) ✲ (0, v ′ ) with v < 0 and v ′ = b ∗ v, this is a bounce; 0 ✲ (0, V ), this is when the ball is kicked; 0 • (h, v) ✲ (h′ , v ′ ), with 0 < d and 0 ≤ h, h′ = h+v∗d− d2 ∧v ′ = v−d, this 2 is when the ball moves while the energy E(h, v) = h + v2 stays constant. d 2 2∗v In particular, (0, v) ✲ (0, −v) is the transition between two bounces. Adding {((0, v), (ḣ, v̇))|ḣ = v ∧ v̇ = −1} to F does not change the timed transitions, 0 while adding ((0, 0), (0, 0)) to G entails the addition of (0, 0) ✲ (0, 0). The following construction adds a clock to a HS to record the passing of time. Definition 2.9. Given a HS H = (F, G) on S, the derived HS t(H) = (F ′ , G′ ) on R × S adds a clock to H, namely: △ • F ′ = {((t, s), (1, ṡ))|s F ṡ}, because dt/dt = 1; △ • G′ = {((t, s), (t, s+ ))|s G s+ }, because jumps are instantaneous. Proposition 2.10. (t, s) ✲ (t′ , s′ ) ⇐⇒ t′ = t + d ∧ s ✲ s′ . d d t(H) H Proof. Only the case d > 0 is non-trivial. • If f ′ :Top([0, d], R × S) realizes the transition (t, s) d ✲ (t′ , s′ ), then t(H) f ′ (x) = (t + x, f (x)) for a unique f :Top([0, d], S), and moreover this f d realizes the transition s ✲ s′ . H • Conversely, if f :Top([0, d], S) realizes s realizes (t, s) ✲ (t′ , s′ ). d ✲ s′ , then f ′ (x) = (t + x, f (x)) d H ✷ t(H) 7 3. Evolution and Reachability Transition systems (TS for short) provide the main formalism for modeling discrete systems. The formalism does not mention time explicitly, but it assumes that time is discrete, and each transition takes one time unit (or alternatively, it abstracts from time and describes only the order of discrete state changes). Given a TS (S, →), ie, a binary relation → on a set S (aka a directed graph), we identify the discrete time line with the set N of natural numbers and define the following notions related to the TS. • A trajectory is a map f :Set([0, n], S) such that ∀i < n.f (i) → f (i + 1) for some n:N, or equivalently, a path f :S+ in the graph. The length of f is n and f (0) is its starting state. △ • The evolution map Ef :P(S) → P(N × S) is Ef (I) = {(n, s′ )|∃s:I.s →n s′ }, or equivalently the union of (the graphs of) all trajectories starting from the set I of initial states. Therefore, Ef (I) says at what time a state is reached, but forgets the trajectories used to reach it. However, when → is deterministic, there is at most one trajectory of length n from s to s′ , which can be recovered from Ef ({s}). △ • The reachability map Rf :P(S) → P(S) is Rf (I) = {s′ |∃s:I.s →∗ s′ }, or equivalently {s′ |∃n.(n, s′ ):Ef (I)}. Therefore, Rf (I) says whether a state is reachable from I, but forgets at which time instances it is reached. For TTTS (and HS) one would like to reuse as much as possible the theory available for TS. The main point of this section is that naive reuse can result under-approximating what is reachable in finite time. To address this problem, we present a solution that computes an over-approximation (see Sec 3.1). This solution exploits the topological structure of the state space S and the continuous time line T. We choose to cast analyses (eg reachability) as monotonic maps (like Rf ) rather than as relations (like →∗ ). This becomes essential in Def 3.6 and for defining approximability (Sec 4) and robustness (Sec 5) of an analysis. Definition 3.1. The evolution map Ef :P(S) → P(T×S) and the reachability ✲ ) are: map Rf :P(S) → P(S) for a TTTS (S, △ • Ef (I) = the smallest S:P(T × S) such that {0} × I ⊆ S and S is closed d wrt timed transitions, ie, (t, s) ∈ S ∧ s ✲ s′ =⇒ (t + d, s′ ) ∈ S. △ • Rf (I) = the smallest S:P(S) such that I ⊆ S and S is closed wrt transitions, ie, s ∈ S ∧ s ✲ s′ =⇒ s′ ∈ S. We denote with Ef H and Rf H the evolution and reachability maps for the TTTS induced by the HS H. 8 Remark 3.2. The ”f” in Ef and Rf stands for ”finite”, because these maps consider only states that are reachable in finitely many transitions. There is an important difference between discrete systems and continuous/hybrid systems. In a discrete (time) system the transition relation suffices to define trajectories, the evolution, and the reachability maps. In a continuous (time) system: to define trajectories, the structure of a HS is needed; to define the evolution map, the timed transition relation suffices; and to define the reachability map, the transition relation suffices. Theorem 3.3. The following properties hold: 1. Ef is monotonic, ie, I0 ⊆ I1 =⇒ Ef (I0 ) ⊆ Ef (I1 ), and preserves unions, ie, ∀K ⊆ P(S).Ef (∪K) = ∪{Ef (I)|I:K}. 2. Rf is monotonic, preserves unions, is a closure, ie, I ⊆ Rf (I) = Rf 2 (I), and π(Ef (I)) = Rf (I). 3. If H is a HS on S, then ∀I:P(S).Ef H (I) = Rf t(H) ({0} × I) and ∀J:P(R × S).π(Rf t(H) (J)) = Rf H (π(J)). Here, π:R × S △ ✲ S is π(t, s) = s, and π(J) is the image of J ⊆ R × S. Proof. See Appendix A. A pair (t, s′ ) is in Ef H (I) exactly when s′ is reached at time t in finitely many transitions starting from some s:I. In Zeno systems there are states that are reached at a finite time t, but not in a finite number of transitions. Therefore, Ef H and Rf H may under-approximate what we would like to compute. Definition 3.4. A Zeno behavior of H is a sequence ((dn , sn )|n:ω) in T × S such that: dn 1. ∀n.sn ✲ sn+1 , XH △ 2. d = dn is defined and finite, and, n:ω 3. the sequence has infinitely many jumps, ie, {n|dn = 0} is infinite. d The last requirement excludes fragmentations of a flow transition s ✲ s′ , ie, d sequences ((f (tn ), tn+1 − tn )|n:ω), where f :Top([0, d], S) realizes s ✲ s′ , and (tn |n:ω) is a strictly increasing sequence with t0 = 0 and supn:ω tn = d. The accumulation points of (sn |n:ω) in the topological space S are called the Zeno points, and d is called the Zeno time, since it is the time needed to reach a Zeno point from s0 . HB of Example 2.8 is the classical case of a HS with Zeno behavior. When b is in the interval (−1, 0), the stop state s = (0, 0) is reached in finite time from s0 = (0, v) with v < 0, but after infinitely many bounces (see Fig 3 in Sec 6). When b is in the interval (0, 1), HB has a chattering Zeno behaviour, ie, the stop state is reached after infinitely many instantaneous slowdowns. On the other hand, Prop 3.5 shows that the stop state is not in Rf HB ({s0 }) when b 6= 0. 9 2 △ Proposition 3.5. Let S = {(h, v)|h ≥ 0 ∧ E(h, v) > 0}, where E(h, v) = h + v2 is the energy in state (h, v). Then, Rf HB (S) = S, provided that b 6= 0. Proof. We prove that S is closed wrt the transition relation analysis. There are three cases: ✲ by case HB • bounce, ie, (0, v) ✲ (0, b ∗ v) with v < 0: (0, v) ∈ S, because E(0, v) = v2 2 > 0, and (0, b ∗ v) ∈ S, because E(0, b ∗ v) > 0 when b 6= 0; • ball kicked, ie, (0, 0) ✲ (0, V ): there is nothing to prove, as (0, 0) 6∈ S; • move, ie, (h, v) ✲ (h′ , v ′ ) with h, h′ ≥ 0 ∧ v > v ′ ∧ E(h, v) = E(h′ , v ′ ): (h, v) ∈ S =⇒ (h′ , v ′ ) ∈ S holds, because the energy stays constant. ✷ We propose a key change to Def 3.1 that exploits the topology on S and T by considering reachable also a state that is arbitrarily close to reachable states. Definition 3.6 (Safe maps). Let C(S) be the set of closed subsets of a topological space S. The safe evolution map Es:C(S) → C(T × S) and the safe ✲ ) are: reachability map Rs:C(S) → C(S) for a TTTS (S, △ • Es(I) = the smallest S:C(T × S) such that {0} × I ⊆ S and closed wrt timed transitions. △ • Rs(I) = the smallest S:C(S) such that I ⊆ S, and closed wrt transitions. We denote with EsH and RsH the safe evolution and safe reachability maps for the TTTS induced by the HS H, respectively. Remark 3.7. If s0 :I and ((dn , sn )|n:ω) is a Zeno behavior of H, then the set S = RsH (I) includes every Zeno point s (similarly EsH (I) includes (d, s), where d is the Zeno time and s is a Zeno point). In fact, the sequence (sn |n:ω) is included in S, and all its accumulation points must be in S, because S is closed. The set S also includes asymptotically reachable points—ie, accumulation points dn ✲ sn+1 and P dn = +∞—that of a sequence (sn |n:ω) such that ∀n.sn n:ω H may not be reachable in finite time. The safe maps include other points that should be considered reachable in finite time, but are not reachable in a finite number of transitions. For instance, consider a HS H = (F, ∅) on Rn that can only flow—thus, it cannot have Zeno behaviors—and a continuous map f :Top([0, d), Rn ) such that: • the derivative f˙ of f is defined and continuous in (0, d), • ∀t:(0, d).f (t) F f˙(t), but, • there is no way to extend f to a continuous map on [0, d]. If f (0):I, then EsH (I) includes {(t, f (t))|t < d} and also the pairs (d, s) with s 1 ) satisfies accumulation point of f (t) as t → d. For instance, f (x) = x ∗ sin( x−1 the above properties for d = 1. 10 There is an analogue of Thm 3.3 for the safe maps, but with weaker properties, mainly because the set of closed subsets is closed only wrt finite unions. Theorem 3.8. The following properties hold: 1. Es is monotonic and preserves finite unions. 2. Rs is monotonic, preserves finite unions, is a closure, and π(Es(I)) ⊆ Rs(I). 3. ∀I:P(S).Ef (I) ⊆ Es(I), and ∀I:P(S).Rf (I) ⊆ Rs(I). 4. If H is a HS on S, then ∀I:C(S).EsH (I) = Rst(H) ({0} × I), and ∀J:C(R × S).π(Rst(H) (J)) ⊆ RsH (π(J)). Here, S:C(S) is the closure of S:P(S), ie, the smallest S ′ :C(S) such that S ⊆ S ′ . Proof. See Appendix A. 3.1. Summary of inclusion relations We provide a summary of the inclusion relations among the sets computed by the four maps defined in this section. Given a hybrid system H on S and a subset I:P(S) of initial states, there are two subsets E:P(T × S) and R:P(S) informally defined as: • E: the set of (t, s) such that s is reached at time t, ie, there is a trajectory of H starting from a state in I and reaching s at time t. • R: the set of states reachable (from I) in finite time, ie, R = π(E). The monotonic maps in Def 3.1 and 3.6 allow to define four subsets: • Ef H (I): the set of (t, s) such that s is reached at time t in finitely many transitions. • Rf H (I): the set of states reachable in finitely many transitions, ie, π(Ef H (I)). • EsH (I):C(T × S) a closed over-approximation of E. • RsH (I):C(S) a closed over-approximation of R. When I:C(S), the inclusion relations among these six subsets are: Ef H (I) ⊂ ❄ Ef H (I) ✲ E ∩ ∩ ⊂ Rf H (I) ⊂ ❄ ❄ ✲ EsH (I) Rf H (I) ✲ R ⊂ ✲ π(EsH (I)) ∩ ∩ ⊂ ❄ ✲ RsH (I) By suitable choices of closed HS H on R and singletons I we show that no other inclusion holds. In particular, Ef H and Rf H may compute proper underapproximations, while EsH and RsH may compute proper over-approximations. 11 1. Ef H (I) ⊂ Ef H (I) ⊂ E = EsH (I) and Rf H (I) ⊂ Rf H (I) ⊂ R = RsH (I). △ Take H = (∅, G) with G = {(x, x/2)|0 ≤ x} ⊎ {(0, 2)} and I = {1}, then • Rf H (I) = {2−n |n:N} and Ef H (I) = {0} × Rf H (I) • Rf H (I) = {2−n |n:N} ⊎ {0} and Ef H (I) = {0} × Rf H (I) • RsH (I) = {2−n |n:N} ⊎ {0, 2} and EsH (I) = {0} × RsH (I) 2. Ef H (I) = E ⊂ Ef H (I) ⊂ EsH (I) and Rf H (I) = R ⊂ Rf H (I) ⊂ π(EsH (I)). △ Take H = (∅, G) with G = {(2, x)|x ≥ 2} ⊎ {(x, 1/x)|x ≥ 2} ⊎ {(0, 1)} and I = {2}, then • Rf H (I) = [2, +∞) ⊎ (0, 1/2] and Ef H (I) = {0} × Rf H (I) • Rf H (I) = [2, +∞) ⊎ [0, 1/2] and Ef H (I) = {0} × Rf H (I) • RsH (I) = [2, +∞) ⊎ [0, 1/2] ⊎ {1} and EsH (I) = {0} × RsH (I) 3. Rf H (I) = R = π(EsH (I)) ⊂ Rf H (I) ⊂ RsH (I). △ Take H = (F, {(0, 2)}) with F = {(x, −x)|0 ≤ x} and I = {1}, then • Ef H (I) = E = EsH (I) = {(t, e−t )|0 ≤ t} • Rf H (I) = (0, 1] • Rf H (I) = [0, 1] • RsH (I) = [0, 2] 4. A Framework for Approximability All maps introduced in Sec 3 (see Def 3.1 and 3.6) are monotonic maps between complete lattices. Thus, they live in the poset-enriched category Po of complete lattices (more generally of posets) and monotonic maps. In fact, one can stay within Po, by defining a complete lattice of hybrid systems on S (this can be done also for timed transition relations), by exploiting its cartesian closed structure, and by using the order relation to express when something is an overor under-approximation of something else. Po is also the natural setting for defining and comparing abstract interpretations [CC92], with adjunctions giving a systematic way to relate more concrete to more abstract interpretations. Therefore, Po will be used as a framework in which to place and compare the reachability (and evolution) maps introduced so far, as well as their variants. Definition 4.1. A poset-enriched category A (see [Kel82]) consists of: • a class of objects, notation X:A; • a poset A(X, Y ) of arrows from X to Y , notation X ✲ Y and f1 ≤ f2 ; f idX ✲ X and composition X g◦f✲ Z of composable arrows • identities X f g ✲ Z satisfying the usual equations and monotonicity, ie, X ✲ Y f1 ≤ f2 :X → Y ∧ g1 ≤ g2 :Y → Z =⇒ (g1 ◦ f1 ) ≤ (g2 ◦ f2 ):X → Z. 12 ✲ f An adjunction f ⊣ g is a pair X ✛ g Y of maps st f ◦ g ≤ idY ∧ idX ≤ g ◦ f . If A has a terminal object 1 and h:A(X, X), then: △ • µ:A(1, X) is an initial algebra (aka least prefix-point) for h ⇐⇒ h ◦ µ ≤ µ and ∀x:A(1, X).h ◦ x ≤ x =⇒ µ ≤ x. △ • ν:A(1, X) is a final co-algebra (aka greatest postfix-point) for h ⇐⇒ ν ≤ h ◦ ν and ∀x:A(1, X).x ≤ h ◦ x =⇒ x ≤ ν. Remark 4.2. The terminology in Def 4.1 comes from Category Theory, in particular from 2-categories, since posets are a degenerate form of categories. Ordinary categories amount to a poset-enriched categories where the order on A(X, Y ) is equality. If A is poset-enriched, then Aop denotes A with the direction of arrows reversed, ie, Aop (X, Y ) = A(Y, X), and Aco denotes A with the order on A(X, Y ) reversed, ie, Aco (X, Y ) = A(X, Y )op . Any notion in A has a dual notion in Aop and a co-notion in Aco , in particular: • f ⊣ g in A ⇐⇒ g ⊣ f in Aco . • x initial algebra for h in A ⇐⇒ x final co-algebra for h in Aco . The following facts are instances of more general results valid in 2-categories. Proposition 4.3. In any poset-enriched category A: 1. If f ⊣ g, then g is uniquely determined by f , and when g exists it is denoted by f R , and called the right adjoint to f . 2. If f :X → Y is an isomorphism, then f ⊣ f −1 . Definition 4.4. The poset-enriched category Po is defined as follows: • Objects X:Po are complete lattices, ie, such that every F posets (|X|, ≤X ) F subset S of |X| has a sup, denoted as S. In paricular, ∅ is the least element ⊥X of X. • Arrows f :Po(X, Y ) are monotonic maps f :|X| → |Y |, ie, ∀x0 , x1 :|X|.x0 ≤X x1 =⇒ f (x0 ) ≤Y f (x1 ) (sups are irrelevant). • The poset-enrichment f ≤ g:Po(X, Y ) is given by the point-wise order. Remark 4.5. Po is cartesian closed in the enriched sense, ie, it has a terminal object and the following poset isomorphisms natural in Z: • Po(Z, X × Y ) ∼ = Po(Z, X) × Po(Z, Y ), where X × Y is the cartesian product of the complete lattices X and Y . • Po(Z, Y X ) ∼ = Po(Z × X, Y ), where Y X is the complete lattice Po(X, Y ). 13 Moreover, f ⊣ g in Po exactly when f and g form a Galois connection, ie: ∀x:|X|.∀y:|Y |.x ≤X g(y) ⇐⇒ f (x) ≤Y y. Restricting the objects of Po to complete lattices allows to characterize the arrows f :Po(X, Y ) that have right adjoints, and implies that every h:Po(X, X) has an initial algebra and a final co-algebra (the proofs of Thm 3.3 and 3.8 make systematic use of the universal property of initial algebras). Proposition 4.6. Given a map f :Po(X, Y ) the following are equivalent: F F • f preserves all sups, ie, f ( S) = (f S) when S ⊆ |X|. F • f has a right adjoint f R , namely, f R (y) = {x|f (x) ≤Y y}. For a HS on S, the complete lattices X of interest should have as underlying set a subset of P(S), but there are two choices for ≤X : inclusion ⊆; and reverse inclusion ⊇. When ≤X is an information order, the correct choice is reverse inclusion, since a smaller over-approximation is more informative. Definition 4.7. Given a topological space S, define: △ • P(S) = (P(S), ≤), complete lattice of subsets of S ordered by reverse inF T △ clusion, ie, U ≤ V ⇐⇒ U ⊇ V . Thus, S = S. △ • C(S) = (C(S), ≤), complete lattice of closed subsets of S ordered by ≤. △ • H(S) = P(S2 ) × P(S2 ), complete lattice of all HS on S. △ • Hc (S) = C(S2 ) × C(S2 ), complete lattice of all closed HS on S. Given a complete lattice X and x:|X|, the complete lattice X ↑ x is the set {x′ |x ≤X x′ } ordered by ≤X . When X is one of the complete lattices from Def 4.7, instead of X ↑ x, we write x in place of S, eg, P(S) stands for P(S) ↑ S when S:P(S), and H(H) stands for H(S) ↑ H when H:H(S). Proposition 4.8. In Po one has the following isomorphisms: Y X Y X i:I.P(Si ) ∼ i:I.Si ), i:I.C(Si ) ∼ i:I.Si ), = P( = C( ∼ P(S′ ) and with isomorphism maps (Ai |i:I) 7→ {(i, a)|i:I ∧ a:Ai }. Thus, H(S) = ′ ′ 2 2 Hc (S) ∼ = 2 × S × S. = C(S ), where S is the topological space S + S ∼ Given C:C(S), equivalently, a closed subspace of S, (1) below is a commuting diagram in Po of sup-preserving maps, and (2) is the commuting diagram of right adjoints to the maps in (1), where g(U ) = U ∩ C, and f R (U ) = U . C(C) ✻ ⊂ g C(S) f ✲ P(C) ✻ (1) ⊂ C(C) ✛f R ∩ gR g ∩ (2) ❄ C(S) ✛ f R f ✲ P(S) 14 P(C) gR ❄ P(S) P Proof. By definition of sum S = i:I.Si of topological spaces, a subset A of S is closed exactly when each Ai = {a|(i, a):A} is a closed subset of Si . The set C(S) of closed subsets of a topological space S is closed wrt intersections computed in P(S), thus the inclusion f preserves sups. Since C is closed, g(U ) = U ∩ C is closed when U is closed. ✷ Definition 4.9. Given a Banach space S, we define the following maps in Po: 1. t:Po(H(S), H(R × S)) is the construction on HS in Def 2.9. 2. T:Po(H(S) × P(S), P(S)) is given by T(H, S) = {s′ |s ✲ s′ }. H 3. Rf :Po(H(S) × P(S), P(S)) is the reachability map in Def 3.1. 4. Rs:Po(H(S) × C(S), C(S)) is the safe reachability map in Def 3.6. 5. S:Po(H(S), P(S)) is given by S(F, G) = {s|∃s′ .s F s′ ∨ s G s′ ∨ s′ G s}. We call T(H):Po(P(S), P(S)) transition map of H and S(H):P(S) its support. The transition map of H corresponds to the transition relation and suffices for defining the maps Rf (H) and Rs(H). The support of H does not include the values in the image of F , because they represent velocities, instead of states. Proposition 4.10. Given a Banach space S, the following hold: 1. t(H) = t(H), for every H:H(S). 2. If H:Hc (S) and T(H, C) ⊆ C:C(S), then T:Po(H(H) × P(C), P(C)), Rf :Po(H(H) × P(C), P(C)), and Rs:Po(H(H) × C(C), C(C)). 3. S(H) = Rf (H, S(H)), for every H:H(S). 4. S(H) = S(H) ≤ S(H) ≤ S(H):P(S), for every H:H(S). 5. If H is compact (therefore, closed), then S(H) is compact (therefore, closed). Proof. See Appendix A. f ✲ X in Po such that g ◦ f = idY , one can ⊥ ✛ g identify Y with its image in X. Then, the right adjoint g maps every x:X to its best approximation in Y , ie, ∀y:Y.y ≤ x ⇐⇒ y ≤ g(x). Clearly a smaller Y means that the g(x) are less accurate. In static analysis it is customary to take as Y a finite lattice, in order to get decidablility. In the case of safe reachability we take Y = C(S) in place of X = P(S). Also in this case there is a reduction in cardinality: when S is a Banach space with the cardinality of the continuum, C(S) has the cardinality of the continuuum, while P(S) has a bigger cardinality. Given an adjunction Y Definition 4.11. Given X = (|X|, ≤X ):Po and a subset F ⊆ |X|, define: • |X|(F ) the smallest subset of |X| containing F and closed wrt sups in X; • X(F ) the poset |X|(F ) ordered by ≤X ; △ F • ✷F (x) = {y:F |y ≤X x}:X(F ) the best approximation of x:X. 15 It is quite easy to establish the following basic properties. Proposition 4.12. X(F ) is a complete lattice. Moreover: F ⊆ |X|(F ) = |X|(|X|(F )). F is finite =⇒ |X|(F ) is finite. F1 ⊆ F2 =⇒ |X|(F1 ) ⊆ |X|(F2 ) and |X|(F1 ) = |X(F2 )|(F1 ). The inclusion f :X(F ) ⊂ ✲ X is sup-preserving and f R (x) = ✷F (x). f ✲ 5. Y X and F image of f =⇒ F = |X|(F ) and ✷F (x) = f (g(x)). ⊥ ✛ g 1. 2. 3. 4. Example 4.13. When Z is the complete lattice Po(X, Y ), there are several subsets F of |Z| satisfying F = |Z|(F ) which consist of monotonic maps that preserve certain types of sups. For instance: 1. strict maps, which preserve the sup of the empty set, ie, f (⊥) = ⊥. F F 2. additive maps, which preserve all sups, ie, f ( S) = f (S) for S ⊆ |X|. 3. Scott D-continuous maps, which preserve sups of directed subsets, ie, non-empty D ⊆ |X| satisfying ∀x, y:D.∃z:D.x, y ≤X z. 4. Scott ω-continuous maps, which preserve sups of ω-chains, ie, sequences (xn |n:ω) such that ∀n.xn ≤ xn+1 . The following implications always hold: strict ⇐=== additive ===⇒ D-continuous ===⇒ ω-continuous. Requirements can be combined, eg, by defining the strict D-continuous maps. Proposition 4.14. The best D-continuous approximation f ✷ of f satisfies ✷ ✷ ✷ ✷ ✷ ✷ the properties: idX = id✷ X and (g ◦ f ) = g ◦ f ≤ (g ◦ f ) . Proof. Like any best approximation ✷F (−) on Po(X, Y ), −✷ is monotonic and satisfies (f ✷ )✷ = f ✷ ≤ f . The D-continuous maps form a sub-category of Po, ie, they include identities and are closed wrt composition, thus id✷ X = idX and (g ✷ ◦ f ✷ )✷ = g ✷ ◦ f ✷. Finally g ✷ ◦ f ✷ ≤ (g ◦ f )✷ follows from monotonicity of composition and −✷ . ✷ 4.1. Best Approximations on Continuous Lattices Thm 4.20 gives a simple way to compute f ✷ of f :Po(X, Y ) when X is a continuous lattice. Moreover, all continuous lattices for which we want to compute f ✷ have a countable base, which implies that D- and ω-continuous maps over these lattices coincide. Remark 4.15. [Eda95] advocates the use of Domain Theory for the study of dynamical systems. In this context, the complete lattice C(S) becomes relevant when S is a compact metric space. In fact, under this assumption, C(S) is a 16 continuous lattice with a countable base (see [Eda95, Prop 3.4]).4 Thus, one can address computability issues, and the Scott topology coincides with the Upper topology (see [Eda95, Prop 3.2 and 3.3]). We recall some basic notions and facts on continuous lattices. For more details, the reader is referred to [GHK+ 03, AJ94]. Definition 4.16. Given two complete lattices X and Y , define: △ • the way-below relation: x ≪X x′ ⇐⇒ for any directed D ⊆ |X|, if F ′ x ≤X D, then ∃d:D.x ≤X d. △ ′ ′ ′ • the subset ↓ ↓x = {x|x ≪X x } of elements way-below x . △ The step map [x, y]:Po(X, Y ) is [x, y](x′ ) = if (x ≪X x′ ) then y else ⊥Y . Proposition 4.17. For any complete lattices X and Y , the following hold: 1. 2. 3. 4. x′0 ≤X x0 ≪X x1 ≤X x′1 =⇒ x′0 ≪X x′1 . x0 ≪X x1 =⇒ x0 ≤X x1 . x0 , x1 ≪X x =⇒ x0 ⊔ x1 ≪X x and ⊥ ≪X x. ↓ ↓x is directed. F △ Definition 4.18. A complete lattice X is continuous ⇐⇒ ∀x:X.x = ↓↓x. A F △ subset B ⊆ |X| is a base for X ⇐⇒ ∀x:X. B∩↓ ↓x is directed and x = (B∩↓↓x). Proposition 4.19. Given a continuous lattice X and a complete lattice Y : F 1. D ⊆ |X| is directed and x ≪X D =⇒ ∃d:D.x ≪X d. 2. The step map [x, y]:Po(X, Y ) is D-continuous. 3. if X has a countable base, then f :Po(X, Y ) is ω-continuous =⇒ f is Dcontinuous. Proof. 1. [GHK+ 03, Thm I-1.9]. 2. [AJ94, Prop 4.0.1] and {x′ |x ≪X x′ } Scott open when X is continuous, by the previous point. 3. [AJ94, Prop 2.2.14]. ✷ The following theorem says that f ✷ :Po(X, Y ) is the sup of step maps when X is a continuous lattice, and more specifically, f ✷ (x) is the sup of {f (b)|b ≪X x}. F Theorem 4.20. If f :Po(X, Y ) and B is a base for X, then f ✷ = b:B [b, f (b)]. 4 There are some minor differences between our work and that of [Eda95], namely, in [Eda95], U X is a hyperspace on the set of non-empty compact subsets of X, while our C(S) is a complete lattice on the closed subsets of S. However, for compact Hausdorff spaces, the only difference is given by the empty subset. 17 △ F Proof. As X is a continuous lattice, the maps [b, f (b)] and f ′ = b:B [b, f (b)] are D-continuous. We prove that for any given D-continuous map g ≤ f , we F △ have g ≤ f ′ ≤ f . For x:X, the subset B(x) = B∩↓↓x is directed and x = B(x). Therefore: • ∀b:B(x).g(b) ≤Y f (b) ≤Y f (x), since g ≤ f and ∀b:B(x).b ≤X x. F • g(x) = b:B(x) g(b) by continuity of g. F • f ′ (x) = b:B(x) f (b) by definition of f ′ . Thus, one concludes that g(x) ≤Y f ′ (x) ≤Y f (x). ✷ 5. Robustness The safe reachability maps introduced in Def 3.6 and 4.9 are of the form A:Po(C(S1 ), C(S2 )), with S1 and S2 metric spaces. We say that such an A is robust at C when small extensions to C cause small extensions to A(C). Definition 5.1 (Robustness). Given two metric spaces (Si , di ), i ∈ {1, 2}, we △ say that a map A:Po(C(S1 ), C(S2 )) is robust ⇐⇒ ∀C:C(S1 ).∀ǫ > 0.∃δ > 0.A(Cδ ) ⊆ A(C)ǫ , △ where Sδ :C(Si ) is the closure of the open subset B(S, δ) = {y|∃x:S.di (x, y) < δ}. For discrete systems, robustness is not an issue (when the metric space S1 is discrete every monotonic map is robust), while robustness of safe reachability RsH :Po(C(S), C(S)) for a HS H on S is very sensitive to the HS, and restricting to purely continuous systems does not help either (see Example 5.9). The main result of this section is that robustness and D-continuity coincide when the Si are compact metric spaces. In this case, an analysis A becomes robust when replaced by its best D-continuous approximation. Remarkable instances of A, for which the main result applies, are safe reachability maps Rs:Po(Hc (H0 ) × C(S0 ), C(S0 )), where H0 is a compact HS on S with support S0 and Hc (H0 ) is the complete lattice of closed hybrid systems that refine H0 , ie, H ≥ H0 :Hc (S). In order to relate different properties of monotonic maps in Po(X, Y ), it is conceptually useful to move to the category Top of topological spaces, by considering suitable topologies on the underlying sets |X| and |Y |. For a complete lattice X, one can define two topologies on |X|: Alexandrov topology OA (X), and Scott topology OS (X) ⊆ OA (X). The partial order ≤X can be recovered as the specialization order of the two topologies. Thus, topologies are more informative than partial orders: the Alexandrov continuous maps, ie, the maps in Top(OA (X), OA (Y )), are the monotonic maps from X to Y , while the Scott continuous maps Top(OS (X), OS (Y )) are the D-continuous maps from X to Y . Furthermore, for robustness one can identify a suitable topology on C(S). 18 Definition 5.2 (Topologies). When S is a topological space and S:P(S), let △ ↑ S = {C:C(S)|S ≤ C}. We define three topologies on C(S): △ • U Alexandrov open ⇐⇒ U is upward closed, ie, C:U =⇒ ↑ C ⊆ U . F △ • U Scott open ⇐⇒ U is upward closed and ( D):U =⇒ ∃C:D.C:U , for any directed subset D of closed subsets. △ • U open in the Upper topology ⇐⇒ C:U =⇒ ∃O:O(S).C: ↑ O ⊆ U . Moreover, when (S, d) is a metric space, we define a fourth topology on C(S): △ • U open in the Robust topology ⇐⇒ C:U =⇒ ∃δ > 0. ↑ B(C, δ) ⊆ U . Lemma 5.3. In a metric space (S, d), the following implications hold: 1. 2. 3. 4. U U U U Scott open =⇒ open for the Robust topology =⇒ open for the Upper topology =⇒ Alexandrov open. Proof. We exploit the following facts, which are valid in any metric space: (F1) B(B(S, δ), δ ′ ) ⊆ B(S, δ + δ ′ ). (F2) S ⊆ S = ∩δ>0 B(S, δ). △ (F3) B(S, δ) ⊆ Sδ = B(S, δ) ⊆ B(S, δ ′ ) whenever δ < δ ′ . Now we prove the implications: △ • (1) =⇒ (2). If U is Scott open and C:U , let On = B(C, 2−n ), we prove that ↑ On ⊆ U for some n. △ Let Cn = On . Then, Cn ⊇ On ⊇ Cn+1 , and C = C = (∩n Cn ):U . Thus, Cn :U , for some n. Since On ⊆ Cn :U and U is upward closed, then ↑ On ⊆ U . • (2) =⇒ (3). If U is open in the Robust topology and C:U , by definition, there exists a δ > 0 for which ↑ B(C, δ) ⊆ U . Then, B(C, δ) is the open subset that witnesses that U is open in the Upper topology. • (3) =⇒ (4). If U is open in the Upper topology, then U is the union of upward closed subsets of the form ↑ O, therefore it is Alexandrov open. ✷ As anticipated, the Robust topology captures the robustness property: Theorem 5.4. Given two metric spaces (Si , di ), and a map A:Set(C(S1 ), C(S2 )), the following properties are equivalent: 1. A is monotonic and robust in the sense of Def 5.1. 19 2. A is continuous wrt the Robust topologies. Proof. See Appendix A. Lemma 5.5. We have the following inclusions among topologies on C(S): 1. The Upper topology is included in the Scott topology, when S is compact. 2. The Alexandrov topology is included in the Robust topology, when S is a discrete metric space (eg, d(x, y) = 1 when x 6= y). Proof. When S is a compact topological space, any closed subset of S is compact. To prove that the Upper topology is included in the Scott topology, it suffices to show that for any open subset O of S, the subset ↑ O of C(S) is Scott open. Clearly ↑ O is upward closed. Now, let C be the complement of O. If {Ki |i:I} is an I-indexed directed set of closed subsets such that K = (∩i:I Ki ) ⊆ O, then Ki′ = Ki ∩ C is another I-indexed directed subset D′ of closed subsets whose intersection is ∅. Since compact subsets (therefore, also the closed subsets) have the finite intersection property and D′ is directed, some Ki′ must be ∅, or equivalently, Ki : ↑ O. If (S, d) is discrete, then S = S = B(S, 1), as all subsets are both open and closed. Therefore, when U is Alexandrov open, ie, U is the union of all ↑ C with C:U , it is also open in the Robust topology, because ↑ C =↑ B(C, 1). ✷ Remark 5.6. The Robust topology depends on the metric d, while the other topologies on C(S) are definable for any topological space S. There are metric spaces (S, d) where the four topologies on C(S) differ. For instance, in the space S = {x|x > 0} of positive reals with the usual metric d(x, y) = |y − x|, △ △ let xn = 2−n and δn = xn+1 . Then, C = {xn |n:ω} is a closed subset of S, O = ∪n B(xn , δn ) is an open subset of S, and the following counter-examples show that the four topologies differ: • ↑ C is Alexandrov open, but it is not open in the other topologies. • ↑ O is open in the Upper topology, but it is not open in the Robust topology, because C: ↑ O but there is no δ > 0 such that B(C, δ) ⊆ O, because (0, δ) ⊆ B(C, δ) but (0, δ) 6⊆ O. • ↑ ∅ = {∅} is open in the Robust topology, because B(∅, δ) = ∅, but it is not Scott open, because Cn = {x|x ≥ 2n } is an ω-chain of closed non-empty subsets of S whose intersection is ∅. In finite dimensional Banach spaces like Rn , the compact subsets are exactly the closed subsets C that are bounded, ie, C ⊂ B(0, δ) for some δ > 0. On the contrary, in infinite dimensional Banach spaces (under the strong topology) they form a proper subset of the closed bounded ones. For instance, neither the closure nor the boundary of a ball B(0, δ) is compact. Theorem 5.7. Given a map A:Po(C(S1 ), C(S2 )), with S1 and S2 metric spaces: 20 1. If S1 and S2 are compact, then, A is robust ⇐⇒ A is Scott continuous. 2. If S1 and S2 are discrete, then, A is robust. Proof. We use Lemma 5.3 and 5.5: 1. If Si is a compact metric space, the Upper and Scott topologies on C(Si ) coincide. The result follows as the Robust topology is between the two. 2. If Si is a discrete metric space, the Alexandrov and Robust topologies on C(Si ) coincide. The result follows as every the monotonic map is Alexandrov continuous. ✷ Remark 5.8. Theorem 5.7 says that for discrete metric spaces robustness is not an interesting notion, because every monotonic map A:Po(C(S1 ), C(S2 )) is robust, and moreover C(Si ) = P(Si ). When the metric spaces are compact, there is a best robust approximation of A given by A✷ . In all other cases robustness is an interesting property, but there is no best way to approximate A with a robust map, because the subset of robust maps is not closed wrt arbitrary sups computed in Po(C(S1 ), C(S2 )). Example 5.9. We give an example of a compact HS H with support C, whose safe reachability map RsH :Po(C(C), C(C)) is not robust. Let H be HE of Example 2.6—which can only flow—and let C = [0, M ]. Since C is compact, robustness is equivalent to Scott continuity. Consider the ω-chain (In |n) with In = [0, M/2n ], whose sup is the singleton {0}. Then: RsH ({0}) = {0}. RsH (In ) = [0, M ], Thus, RsH does not preserve the sup of the ω-chain (In |n). Consider its best Scott continuous approximation Rs✷ H (see Thm 4.14), which is given by: • Rs✷ H (∅) = ∅. • Rs✷ H (U ) = [m, M ] with m = min(U ), when U 6= ∅ is compact. Then, RsH ({0}) = {0} ⊂ [0, M ] = Rs✷ H ({0}). 6. Figures and Examples We go through the hybrid systems introduced in Sec 2 and for each of them we compare the sets computed by different analyses. More precisely, given a HS H on S and a state s0 in the support S(H) of H, take as set of initial states I = {s0 }, then define four subsets Sf ⊆ Ss ⊆ Sr ⊆ SR of S: △ • Sf = Rf H (I) set of states reachable in finitely many transition. △ • Ss = RsH (I) safe approximation of the set of states reachable in finite time. One should use I in place of I, but a singleton is already closed. 21 M M m0 t t m0 0 0 (a) m0 > 0 (b) m0 = 0 Figure 1: Trajectories and reachable states of HE (Expand). In each case the set of states reachable from I = {m0 } is on the left of the trajectory starting from m0 . To define Sr one must restrict RsH to a map in Po(C(S0 ), C(S0 )), where S0 is a sufficiently large compact subset of S. When H is compact, the canonical choice for S0 is S(H). △ • Sr = Rs✷ H (I) approximation of Ss robust wrt perturbations to I. To define SR one must restrict Rs to a map in Po(Hc (H0 )×C(S0 ), C(S0 )), where H0 is a sufficiently large compact HS on S and S0 = S(H0 ). There is no canonical choice. H0 must capture the allowed perturbations to H, thus H0 ≤ H in Hc (S), where H is the closure of H. △ △ ✷ (I) robust wrt perturbations • SR = Rs✷ (H, I) approximation of Sr′ = RsH to H & I allowed by H0 . In Figures we adopt the following color coding for states and trajectories: • a bullet indicates the initial state s0 • blue - Sf and the part of a trajectory reachable in finitely many transitions • green - Ss − Sf and the rest of a trajectory not reachable in finitely many transitions, like Zeno points and beyond • red - Sr − Ss , there is no analogue for a trajectory starting from s0 . 6.1. Expand HE of Example 2.6 is a compact deterministic HS on R, whose behavior is depicted in Fig 1. The canonical choice for S0 is the interval [0, M ]. For H0 we take F0 = S0 × [−M, M ] and G0 = ∅, whose support is still S0 . • Sf = Ss = Sr = SR = [m0 , M ] when 0 < m0 ≤ M • Sf = Ss = [0] ⊂ [0, M ] = Sr = SR when 0 = m0 . We now explain why making the set of reachable states robust wrt perturbations to H does not make a difference in the case 0 < m0 ≤ M . To approximate SR we take a small δ > 0 and define Iδ ≪ I in C(S0 ) and Hδ ≪ H in Hc (H0 ). Let Iδ = [m0 − δ, M ] and Fδ = {(m, ṁ)|0 ≤ m ≤ M ∧ m − δ ≤ ṁ ≤ M }. By taking 2 ∗ δ < m0 we can ensure that Fδ (m) ⊂ (0, M ] for any m:Iδ , therefore SR = Rs✷ (H, I) ⊆ Rs(Hδ , Iδ ) = [m0 − δ, M ] → Sr when δ → 0. 22 6.2. Decay HD of Example 2.7 is a deterministic HS on R, whose behavior is depicted in Fig 2. Its closure is compact but it is no longer deterministic. The canonical choice for S0 is the interval [0, M ]. For H0 we take F0 = S0 × [−M, M ] and G0 = S0 × S0 , whose support is still S0 . M M m0 t t m0 0 0 (a) m0 > 0 (b) m0 = 0 Figure 2: Trajectories and reachable states of HD (Decay). In each case the set of states reachable from I = {m0 } is on the left of the trajectory starting from m0 . • Sf = (0, m0 ] ⊂ [0, M ] = Ss = Sr = SR when 0 < m0 ≤ M • Sf = Ss = Sr = SR = [0, M ] when 0 = m0 . Ss = Sr = SR = S0 , because Ss = S0 and these subsets cannot be bigger than the support of H0 . This result does not change, when H0 is replaced with a HS with a bigger support, but the proof is not as simple (see Sec 6.1). 6.3. Bouncing Ball HB of Example 2.8 is a deterministic HS on R2 , its behavior depends on the coefficient of restitution b (see Fig 3). The closure of HB is not compact and its support is the closed subset {(h, v)|0 ≥ h}. However, compactness is irrelevant to define and compare Sf and Ss . Let s0 = (0, v0 ) with 0 < v0 < V △ and S(u) = {(h, v)|0 ≥ h ∧ E(h, v) = E(0, u)} be the set of states whose energy 2 E(h, v) = h + v2 is exactly E(0, u), then the sets Sf and Ss are (see Fig 4): S 1. Sf = Ss = n S(bn v0 ) when b < −1 2. Sf = S Ss = S(v0 ) when b = −1 (elastic bounce) S 3. Sf = n S(bn v0 ) ⊂ Sf ∪ S(0) ∪ ( n S(bn V )) = Ss when −1 < b < 0 4. Sf = Ss = S(v0 ) ∪ S(0) ∪ S(V ) when b = 0 (inelastic bounce) 5. Sf = S(v0 ) ∪ S ′ (b, v0 ) ⊂ Sf ∪ S(0) ∪ S(V ) ∪ S ′ (b, V ) = Ss when 0 < b < 1, △ with S ′ (b, u) = {(0, −bnu)|0 ≤ n} sequence of instantaneous slowdowns 6. Sf = Ss = S(v0 ) when b = 1 7. Sf = Ss = S(v0 ) ∪ S ′ (b, v0 ) when 1 < b, now S ′ (b, u) is a sequence of instantaneous accelerations. To make HB compact, the simplest is to put an upper bound to the energy of the system, say E0 = E(0, V0 ) with V0 > V , and allow only b st |b| ≤ 1, so that the energy cannot increase when the ball bounces. So we replace HB with the following compact HS H, whose support is S0 = {(h, v)|0 ≤ h ∧ E(h, v) ≤ E0 } 23 h 0 h t 0 0 2 4 6 8 v h t 0 0 2 4 6 8 t 0 2 4 6 8 v −bv0 v0 V v0 t (a) b < −1 h 0 v (b) b = −1 t t 0 0 2 4 6 8 0 v V v0 t h V t v0 (c) −1 < b < 0 2 4 v V v0 t (d) b = 0 t (e) 0 < b < 1 Figure 3: Trajectories of HB (Bouncing ball). All trajectories start from (h = 0, v = v0 ). bV h h −bV −bv0 −bV v v0 V v −v0 v0 (a) b < −1 −V−v0 (b) −1 < b < 0 −bv0 h −bV −V−v0 v v0 V (c) 0 < b < 1 Figure 4: Set of reachable states of HB (Bouncing ball). The set I is always {(h = 0, v = v0 )}. In case (a) there is an expanding sequence of parabolas (−b)n v0 → +∞. In case (b) there are two shrinking sequences of parabolas (−b)n v0 → 0 and (−b)n V → 0. • F = {((h, v), (ḣ, v̇))|(h, v):S0 ∧ ḣ = v ∧ v̇ = −1} • G = {((0, v), (0, v + ))|0 ≤ −v ≤ V0 ∧ v + = b ∗ v} ⊎ {((0, 0), (0, V ))}. To define SR we fix a compact HS H0 with support S0 . The simplest choice is to take F0 = F and replace G with a G0 independent from b, namely • G0 = {((0, v), (0, v + ))|0 ≤ −v ≤ V0 ∧ |v + | ≤ −v} ⊎ {((0, 0), (0, V ))}. The relations among Ss , Sr and SR , when |b| ≤ 1 and 0 < v0 < V < V0 , are S 1. Ss = Sr = S(v0 ) ⊂ {S(v)|v:[0, V ]} = SR when b = −1 (elastic bounce) S S 2. Sf = Sr = SR = n S(bn v0 ) ∪ S(0) ∪ ( n S(bn V )) when −1 < b < 0 3. Ss = Sr = SR = S(v0 ) ∪ S(0) ∪ S(V ) when b = 0 (inelastic bounce) 4. Ss = Sr = SR = S(v0 ) ∪ S ′ (b, v0 ) ∪ S(0) ∪ S(V ) ∪ S ′ (b, V ) when 0 < b < 1 5. Ss = Sr = S(v0 ) ⊂ S(v0 ) ∪ S(V ) ∪ {(0, v)| − v:[0, V ]} = SR when b = 1. There is an informal explanation for SR in the case b = −1 (elastic bounce). After each bounce the ball may lose a bit of energy, thus after sufficiently many bounces it may stop (minimum energy). After a kick the energy will reach the maximum value allowed, and then it may decrease again after each bounce. Thus any level of energy in [0, E(0, V )] is reachable, assuming 0 < v0 < V . 24 More formally we define Hδ ≪ H in Hc (H0 ) st Hδ → H when δ → 0. Since H0 allows only perturbations in G, we define Gδ (for δ > 0) as {((0, v), (0, v + ))|0 ≤ −v ≤ V0 ∧ |v + | ≤ −v ∧ −v − δ ≤ v + } ⊎ {((0, 0), (0, V ))} When −v is small, ie 0 ≤ −v ≤ δ ≤ V , |v + | ≤ −v and the energy is ≤ 2 Otherwise, 0 < δ < −v, v + :[−v − δ, −v] and the energy loss is ≤ V δ − δ2 . δ2 2 . Remark 6.1. It is important what H0 is chosen to capture the hard constrains on the HS H of interest, because it can affect how SR is computed. For instance, for the bouncing ball one may replace H0 with a more relaxed H0′ • G′0 = {((0, v), (0, v + ))|0 ≤ −v ≤ V0 ∧ |v + | ≤ V0 } ⊎ {((0, 0), (0, V ))} H0′ has the same support of H0 , but H0′ < H0 , because after a bounce the ball can increase its energy as far as it stays below the upper bound E(0, V0 ). This change results in a bigger subset SR when |b| = 1, namely • S0 = SR when b = −1, ie any state in the support of H is reachable because of the more permissive perturbations • S(v0 ) ∪ S(V ) ∪ {(0, v)| − v:[0, V0 ]} = SR when b = 1. Conclusions and Future Work The main contributions of this paper concern reachability analysis in the context of hybrid (and continuous) systems. Firstly, we have proposed safe reachability RsH (I), which computes an overapproximation of the set of states reachable in finite time from the set I of initial states by the hybrid system H, and compared it with the more naive reachability Rf H (I), which computes only an under-approximation. Secondly, and more importantly, we have addressed the issue of robustness of an analysis A cast as a monotonic map A:Po(X, Y ) between complete lattices X and Y of a particular form (ie, hyperspaces of metric spaces). Robustness of A means that A(xδ ) → A(x) as δ → 0, where xδ is a small perturbation of x depending on a δ > 0, which measures the level of inaccuracy. In some cases (ie, when the metric spaces are compact) robustness amounts to Scott continuity, and one can exploit the following facts: • Every monotonic map A:Po(X, Y ) between complete lattices has a best Scott continuous approximation A✷ ≤ A:Po(X, Y ). • When X is a continuous lattice, A✷ (x) is the sup of {A(b)|b ≪X x}, ie, it is computed by applying A to way-below approximations of x. While the importance of safe/sound analyses is widely recognized, the issue of robustness is mostly overlooked (one reason being that for discrete systems it is not an issue). In our view, robustness has at least two immediate implications: 25 Modeling languages. There should be syntactic support to distinguish between hard and soft constraints on a hybrid system H. Hard constraints must be satisfied also by small perturbations Hδ . Thus, they identify the complete lattice (hyperspace) X where H is placed, while soft constraints provide the additional information to identify H uniquely within X. The distinction would be needed by tools that implement a robust analysis and can be ignored by other tools. In [GKC13] there is no explicit annotation for soft constraints, instead there is a re-interpretation of logical formula, which injects δ-noise in specific sub-formulas. Finite model checking. Counterexample-guided Abstraction & Refinement (CEGAR) is a general way of analyzing a system H with an infinite state space by leveraging finite model checking tools (see [CGJ+ 00, CFH+ 03]). In the setting of abstract interpretation, CEGAR amounts to approximating an analysis A:Po(X, X) with finite analyses A′ :Po(Xf , Xf ), ie: X ✻ A γ ≤ ∪ Xf ✲ X ✻ γ γ sub-lattice inclusion ∪ A′ ✲ Xf Xf finite (complete) lattice Whenever Xf is fixed, there is a best approximation Af :Po(Xf , Xf ) of A △ given by Af = γ R ◦ A ◦ γ. If H is a HS on S = Rn and its support is included in a compact subset K, then there are three reachability analyses Rs✷ H ≤ RsH ≤ Rf H :Po(X, X), where X = C(K) is a continuous lattice with a countable base, but uncountably many elements (unless K is finite). One may wonder whether replacing X with a finite sub-lattice Xf would make the three analyses indistinguishable: the answer is no (counterexamples can be given using HE and HD in Examples 2.6 and 2.7). However, there is a way to turn a finite approximation A′ :Po(Xf , Xf ) of A:Po(X, X) into a finite approximation A′′ of A✷ , provided that X is a △ continuous lattice, namely, A′′ (x) = A′ (xb ) where xb is the biggest element in Xf such that γ(b) ≪X γ(x). As future work we plan to address computability issues. More specifically, given a compact HS H0 on S with support S0 , is Rs✷ :Po(Hc (H0 )×C(S0 ), C(S0 )) computable? When S has a countable dense subset, all continuous lattices involved have a countable base, and the question can be formulated in a wellestablished setting. In [EP07] the authors study computability of the evolution map for a compact and continuous flow automaton (ccFA for short). In our setting, a ccFA is a tuple (C, f, G, I), with C a compact subset of Rn called invariant, f :Top(C, Rn ) the flow function, G:C(C × C) the jump relation, and I:C(C) the set of initial states. The graph of f is flow relation f :C(C × V ), with 26 V = f (C). Therefore, (f, G) is a compact HS on Rn with support included in the compact subset K = C ∪ V . The main contributions in [EP07] are: the definition of the denotational semantics [[(C, f, G, I)]]:Top(T, C(C)) ∼ = C(T × C) of a ccFA (C, f, G, I), which is computable for effectively given ccFA (cf. [EP07, Thm 38]); and computational adequacy, ie [[C, f, G, I]] = Ef (f,G) (I), for separated ccFA (cf. [EP07, Thm 25]). Most of the steps in defining the denotational semantics of a ccFA use Scott continuous maps, but for the lack of a continuous lattice/domain of ccFA. It would be interesting to see if their denotational semantics extends to compact HS, giving a Scott continuous computable map [[−]]:Po(Hc (H0 ) × C(S0 ), C(S0 )), and then compare it with the map Rs✷ between the same lattices. References [ACH+ 95] Rajeev Alur, Costas Courcoubetis, Nicolas Halbwachs, Thomas A Henzinger, P-H Ho, Xavier Nicollin, Alfredo Olivero, Joseph Sifakis, and Sergio Yovine. The algorithmic analysis of hybrid systems. Theoretical computer science, 138(1):3–34, 1995. [AJ94] S. Abramsky and A. Jung. Domain theory. In S. Abramsky, D. M. Gabbay, and T. S. E. Maibaum, editors, Handbook of Logic in Computer Science, volume 3, pages 1–168. Clarendon Press, Oxford, 1994. [CC92] Patrick Cousot and Radhia Cousot. Abstract interpretation frameworks. Journal of logic and computation, 2(4):511–547, 1992. [CFH+ 03] Edmund Clarke, Ansgar Fehnker, Zhi Han, Bruce Krogh, Olaf Stursberg, and Michael Theobald. Verification of hybrid systems based on counterexample-guided abstraction refinement. In TACAS, volume 3, pages 192–207. Springer, 2003. [CGJ+ 00] Edmund Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, and Helmut Veith. Counterexample-guided abstraction refinement. In Computer aided verification, pages 154–169. Springer, 2000. [Con90] John B. Conway. A Course in Functional Analysis. Springer, 2nd edition edition, 1990. [CR04] Pieter Jan Laurens Cuijpers and Michel Adriaan Reniers. Topological (bi-) simulation. Electronic Notes in Theoretical Computer Science, 100:49–64, 2004. [Cui07] Pieter J. L. Cuijpers. On bicontinuous bisimulation and the preservation of stability. In Alberto Bemporad, Antonio Bicchi, and Giorgio Buttazzo, editors, Hybrid Systems: Computation and Control, volume 4416 of Lecture Notes in Computer Science, pages 676–679. Springer, 2007. 27 [Dur16] Adam Duracz. Rigorous Simulation: Its Theory and Applications. PhD thesis, Halmstad University Press, 2016. [Eda95] Abbas Edalat. Dynamical systems, measures and fractals via domain theory. Information and Computation, 120(1):32–48, July 1995. [EP07] Abbas Edalat and Dirk Pattinson. Denotational semantics of hybrid automata. The Journal of Logic and Algebraic Programming, 73(1):3–21, 2007. [Frä99] Martin Fränzle. Analysis of hybrid systems: An ounce of realism can save an infinity of states. In Computer Science Logic, pages 126–139. Springer, 1999. [GHK+ 03] G. Gierz, K. H. Hofmann, K. Keimel, J. D. Lawson, M. W. Mislove, and D. S. Scott. Continuous Lattices and Domains, volume 93 of Encycloedia of Mathematics and its Applications. Cambridge University Press, 2003. [GKC13] Sicun Gao, Soonho Kong, and Edmund M Clarke. Delta-complete reachability analysis (part 1). Technical report, Carnegie-Mellon Univ. School of Computer Science, 2013. [GST09] Rafal Goebel, Ricardo G Sanfelice, and A Teel. Hybrid dynamical systems. Control Systems, IEEE, 29(2):28–93, 2009. [Kel75] John L Kelley. General topology. Springer, 1975. [Kel82] Gregory Maxwell Kelly. Basic concepts of enriched category theory. Number 64 in Lecture Notes in Mathematics. CUP Archive, 1982. [Pla08] André Platzer. Differential dynamic logic for hybrid systems. Journal of Automated Reasoning, 41(2):143–189, 2008. 28 Appendix A. Proofs Proof (of Thm 3.3). Ef (I) and Rf (I) are the least prefix-points of some monotonic maps on complete lattices of the form (P(S), ⊆). Thus, we can exploit the universal property of the least prefix-point X for a monotonic map F , ie, F (Y ) ≤ Y =⇒ X ≤ Y . 1. Consider the monotonic maps F and FI on P(T × S): △ F (S) = {(t + d, s′ )|∃s.(t, s):S ∧ s ✲ s′ }, d △ FI (S) = ({0} × I) ∪ F (S). Ef (I) is the least prefix-point of FI . Since FI0 (S) ⊆ FI1 (S) when I0 ⊆ I1 , a prefix-point for FI1 is also a prefix-point for FI0 . Hence, we conclude that Ef (I0 ) ⊆ Ef (I1 ). Since I ⊆ ∪K when I:K, then Ef (I) ⊆ Ef (∪K). Now, let U = {Ef (I)|I:K}. To prove Ef (∪K) ⊆ ∪U , observe that: • F preserves unions, thus F (∪U ) = ∪{F (S)|S:U }; • ∀S:U.F (S) ⊆ S, thus F (∪U ) = ∪U ; • ∀I:K.∃S:U.{0} × I ⊆ S, thus {0} × (∪K) ⊆ ∪U . Therefore, ∪U is a prefix-point for F∪K . 2. Consider the monotonic maps G and GI on P(S): △ G(S) = {s′ |∃s:S.s ✲ s′ }, △ GI (S) = I ∪ G(S). Rf (I) is the least prefix-point of GI . By analogy with the previous point, one can prove that Rf is monotonic and preserves unions. Let S be a prefix-point of GI , ie, GI (S) ⊆ S. Then: • I ⊆ S, because I ⊆ GI (S). • GS (S) ⊆ S, because G(S) ⊆ GI (S) and GS (S) = S ∪ G(S). By taking S = Rf (I), we conclude I ⊆ Rf (I) ⊆ Rf (Rf (I)) ⊆ Rf (I). To prove π(Ef (I)) = Rf (I), observe that: • ∀E:P(T × S).π(FI (E)) = GI (π(E)). Hence, π(Ef (I)) ⊇ Rf (I). • ∀S:P(S).GI (S) ⊆ S =⇒ FI (T × S) ⊆ T × S. Therefore, Ef (I) ⊆ T × Rf (I), and consequently, π(Ef (I)) ⊆ Rf (I). 3. Consider the monotonic maps FI on P(T×S), GI on P(S), GtJ on P(R×S), whose least prefix-points are Ef H (I), Rf H (I), and Rf t(H) (J), respectively. ✲ (t + d, s′ ) ⇐⇒ 0 ≤ d ∧ s d✲ s′ , by Prop 2.10, these Since (t, s) H t(H) maps are related as follows: • ∀E:P(T × S).FI (E) = Gt{0}×I (E), so Ef H (I) = (Rf t(H) ({0} × I). • ∀S:P(R × S).π(GtJ (S)) = Gπ(J) (π(S)), so π(Rf t(H) (J)) ⊇ Rf H (π(J)). • ∀S:P(S).Gπ(J) (S) ⊆ S =⇒ GtJ (R × S) ⊆ R × S. 29 As a result, Rf t(H) (J) ⊆ R × Rf H (π(J)), and π(Rf t(H) (J)) ⊆ Rf H (π(J)). ✷ Proof (of Thm 3.8). Es(I) and Rs(I) are defined as least prefix-points of monotonic maps on complete lattices of the form (C(S), ⊆), C(S) is closed wrt arbitrary intersections and finite unions computed in P(S), and the monotonic map S 7→ S from P(S) to C(S) preserves finite unions. 1. Es(I) is the least prefix-point of a monotonic map FI′ on C(T × S) given by: d △ F ′ (S) = ({0} × I) ∪ {(t + d, s′ )|∃s.(t, s):S ∧ s ✲ s′ }, I and the properties of Es are proved similar to those of Ef , except for the need to restrict to finite unions. 2. Rs(I) is the least prefix-point of a monotonic map G′I on C(S) given by: △ G′I (S) = I ∪ {s′ |∃s:S.s ✲ s′ }, and the properties of Rs are proved by analogy with those of Rf . In particular, π(Es(I)) ⊆ Rs(I) follows from: ∀S:C(S).G′I (S) ⊆ S =⇒ FI′ (T × S) ⊆ T × S. As a result, Es(I) ⊆ T × Rs(I), and consequently π(Es(I)) ⊆ Rs(I). 3. If I:P(S) and S:P(T × S), then I ⊆ I:C(S) and FI (S) ⊆ FI′ (S):C(T × S). Hence, Ef (I) ⊆ Es(I):C(T × S), and consequently Ef (I) ⊆ Es(I). The inclusion Rf (I) ⊆ Rs(I) follows from Ef (I) ⊆ Es(I), since: • Rf (I) = π(Ef (I)), by Thm 3.3. • π(Es(I)) ⊆ Rs(I), by the previous point. 4. Consider the monotonic maps FI′ on C(T × S), G′I on C(S), and GtJ on C(R × S), whose least prefix-points are EsH (I), RsH (I) and Rst(H) (J), ✲ (t + d, s′ ) ⇐⇒ 0 ≤ d ∧ s d✲ s′ , by respectively. Since (t, s) t(H) Prop 2.10, these maps are related as follows: H • ∀E:C(T × S).FI′ (E) = Gt{0}×I (E), so EsH (I) = (Rst(H) ({0} × I). ′ • ∀S:C(S).Gπ(J) (S) ⊆ S =⇒ GtJ (R × S) ⊆ R × S. Hence, Rst(H) (J) ⊆ R × RsH (π(J)), and π(Rst(H) (J)) ⊆ RsH (π(J)). ✷ Proof (of Thm 4.10). A Banach space is a metric space, and one can rely on characterizations of topological notions or exploit properties that are specific to metric spaces, eg, x:U ⇐⇒ x is the limit of a sequence (xn |n:ω) in U . 1. t(F, G) = (F ′ , G′ ), where F ′ = C1 ×F and G′ = C2 ×G with C1 = R×{1} and C2 = {(t, t)|t:R}, modulo the isomorphism (R × S)2 ✛ R2 × S2 . C1 and C2 are closed subsets of R2 . Thus, F ′ = C1 × F and G′ = C2 × G, ie, t(H) = t(H). 30 2. T(H, C) ⊆ C means that C ≤ T(H, C). Hence, C ≤ T(H, C) ≤ T(H′ , S ′ ) when H ≤ H′ and C ≤ S ′ , because T is monotonic. For Rf and Rs one can proceed as above, by observing that T(H, C) ⊆ C ✲ ”, and therefore means “C is closed wrt the transition relation H C ⊆ Rf (H, C) ⊆ Rs(H, C) ⊆ C, by the assumptions on C and by definition of Rf (H, C) and Rs(H, C). ✲ : 3. We prove that S(H) is closed under the transition relation ✲ s′ , then s G s′ . Therefore, s′ :S(H) ⊆ S(H). H 0 • If s H • If s H ✲ s′ with d > 0, then there exists f :Top([0, d], S) such that d f (0, d) ⊆ S(H) and s′ = f (d). Hence, s′ :S(H), because f is continuous. 4. It should be clear that S(H) ≤ S(H), S(H) ≤ S(H):P(S), as the maps S and f R (U ) = U are monotonic. To prove S(H) = S(H), it suffices to show that S(H) ≤ S(H), since U = U . • H = F + G = F + G. Therefore, s:S(H) ⇐⇒ ∃x.(x:F ∧ s = π1 (x)) ∨ (x:G ∧ s = π1 (x)) ∨ (x:G ∧ s = π2 (x)). • Assume wlog that x:F ∧ s = π1 (x), we have to show that s:S(H). • x:F implies that there exists a sequence (xn |n:ω) in F with limit x. • Let sn = π1 (xn ). Then (sn |n:ω) is a sequence in S(H) with limit s, because π1 is continuous. Thus, s:S(H). 5. S(H) is the union π1 (F ) ∪ π1 (G) ∪ π2 (G), and projections πi :S × S ✲ S are continuous maps. The image of a compact set along a continuous map is always compact. Therefore, if H is compact—ie, F and G are compact—then S(H) is compact, because it is the union of three compact subsets. Moreover, in metric spaces compact subsets are always closed. ✷ Proof (of Thm 5.4). We exploit the facts (F1-F3) in the proof of Lemma 5.3. (1) =⇒ (2). Given U2 ⊆ C(S2 ) open (for the Robust topology), we have to △ prove that U1 = A−1 (U2 ) ⊆ C(S1 ) is open. U1 is upward closed, because U2 is upward closed and A is monotonic. If C:U1 , ie, A(C):U2 , we have to find δ > 0 such that↑ B(C, δ) ⊆ U1 , ie, C ′ ⊆ B(C, δ) =⇒ A(C ′ ):U2 : • A(C):U2 and U2 open imply that ↑ B(A(C), δ ′ ) ⊆ U2 for some δ ′ > 0. • Now, let ǫ be in (0, δ ′ ). By (F3), we get A(C)ǫ ⊆ B(A(C), δ ′ ). • By robustness of A, there exists δ > 0 such that A(Cδ ) ⊆ A(C)ǫ . • By monotonicity of A, we have A(C ′ ) ⊆ B(A(C), δ ′ ), ie, A(C ′ ):U2 , when C ′ ⊆ B(C, δ) ⊆ Cδ . 31 (2) =⇒ (1). The Robust topology on C(Si ) is between Scott and Alexandrov topologies, which have the same specialization order, ie, reverse inclusion. Thus, A is monotonic wrt the specialization orders, because it is continuous wrt the Robust topologies. △ For C:C(S1 ) and ǫ > 0, let U2 = {C ′ :C(S2 )|∃ǫ′ > 0.B(C ′ , ǫ′ ) ⊆ B(A(C), ǫ)}. Clearly A(C):U2 ⊆↑ B(A(C), ǫ) ⊆↑ A(C)ǫ . We prove that U2 is open for the Robust topology, ie, ∀C ′ :U2 .∃δ > 0. ↑ B(C ′ , δ) ⊆ U2 : • C ′ :U2 implies B(C ′ , ǫ′ ) ⊆ B(A(C), ǫ) for some ǫ′ > 0. • By (F1), B(B(C ′ , δ), δ) ⊆ B(C ′ , ǫ′ ), where δ = ǫ′ /2. • Therefore, ↑ B(C ′ , δ) ⊆ U2 . △ U1 = A−1 (U2 ) is open in the Robust topology, because U2 is open and A is continuous. But C:U1 . Therefore, there exists δ ′ > 0 such that ↑ B(C, δ ′ ) ⊆ U1 . If δ is in (0, δ ′ ), then (F3) implies that Cδ ⊆ B(C, δ ′ ). Hence, Cδ :U1 and A(Cδ ):U2 ⊆↑ A(C)ǫ , which means that A(Cδ ) ⊆ A(C)ǫ . ✷ 32
3cs.SY
Visual Interpretability for Deep Learning: a Survey arXiv:1802.00614v2 [cs.CV] 7 Feb 2018 Quanshi Zhang and Song-Chun Zhu University of California, Los Angeles Abstract This paper reviews recent studies in understanding neural-network representations and learning neural networks with interpretable/disentangled middlelayer representations. Although deep neural networks have exhibited superior performance in various tasks, the interpretability is always the Achilles’ heel of deep neural networks. At present, deep neural networks obtain high discrimination power at the cost of low interpretability of their black-box representations. We believe that high model interpretability may help people to break several bottlenecks of deep learning, e.g. learning from very few annotations, learning via humancomputer communications at the semantic level, and semantically debugging network representations. We focus on convolutional neural networks (CNNs), and we revisit the visualization of CNN representations, methods of diagnosing representations of pre-trained CNNs, approaches for disentangling pre-trained CNN representations, learning of CNNs with disentangled representations, and middle-to-end learning based on model interpretability. Finally, we discuss prospective trends in explainable artificial intelligence. 1 Introduction Convolutional neural networks (CNNs) [LeCun et al., 1998a; Krizhevsky et al., 2012; He et al., 2016; Huang et al., 2017] have achieved superior performance in many visual tasks, such as object classification and detection. However, the endto-end learning strategy makes CNN representations a black box. Except for the final network output, it is difficult for people to understand the logic of CNN predictions hidden inside the network. In recent years, a growing number of researchers have realized that high model interpretability is of significant value in both theory and practice and have developed models with interpretable knowledge representations. In this paper, we conduct a survey of current studies in understanding neural-network representations and learning neural networks with interpretable/disentangled representations. We can roughly define the scope of the review into the following six research directions. • Visualization of CNN representations in intermediate network layers. These methods mainly synthesize the image that maximizes the score of a given unit in a pretrained CNN or invert feature maps of a conv-layer back to the input image. Please see Section 2 for detailed discussion. • Diagnosis of CNN representations. Related studies may either diagnose a CNN’s feature space for different object categories or discover potential representation flaws in conv-layers. Please see Section 3 for details. • Disentanglement of “the mixture of patterns” encoded in each filter of CNNs. These studies mainly disentangle complex representations in conv-layers and transform network representations into interpretable graphs. Please see Section 4 for details. • Building explainable models. We discuss interpretable CNNs [Zhang et al., 2017c], capsule networks [Sabour et al., 2017], interpretable R-CNNs [Wu et al., 2017], and the InfoGAN [Chen et al., 2016] in Section 5. • Semantic-level middle-to-end learning via humancomputer interaction. A clear semantic disentanglement of CNN representations may further enable “middle-toend” learning of neural networks with weak supervision. Section 7 introduces methods to learn new models via human-computer interactions [Zhang et al., 2017b] and active question-answering with very limited human supervision [Zhang et al., 2017a]. Among all the above, the visualization of CNN representations is the most direct way to explore network representations. The network visualization also provides a technical foundation for many approaches to diagnosing CNN representations. The disentanglement of feature representations of a pre-trained CNN and the learning of explainable network representations present bigger challenges to state-of-the-art algorithms. Finally, explainable or disentangled network representations are also the starting point for weakly-supervised middle-to-end learning. Values of model interpretability: The clear semantics in high conv-layers can help people trust a network’s prediction. As discussed in [Zhang et al., 2018b], considering dataset and representation bias, a high accuracy on testing images still cannot ensure that a CNN will encode correct represen- tations. For example, a CNN may use an unreliable context— eye features—to identify the “lipstick” attribute of a face image. Therefore, people usually cannot fully trust a network unless a CNN can semantically or visually explain its logic, e.g. what patterns are used for prediction. In addition, the middle-to-end learning or debugging of neural networks based on the explainable or disentangled network representations may also significantly reduce the requirement for human annotation. Furthermore, based on semantic representations of networks, it is possible to merge multiple CNNs into a universal network (i.e. a network encoding generic knowledge representations for different tasks) at the semantic level in the future. In the following sections, we review the above research directions and discuss the potential future of technical developments. 2 Visualization of CNN representations Visualization of filters in a CNN is the most direct way of exploring visual patterns hidden inside a neural unit. Different types of visualization methods have been developed for network visualization. First, gradient-based methods [Zeiler and Fergus, 2014; Mahendran and Vedaldi, 2015; Simonyan et al., 2013; Springenberg et al., 2015] are the mainstream of network visualization. These methods mainly compute gradients of the score of a given CNN unit w.r.t. the input image. They use the gradients to estimate the image appearance that maximizes the unit score. [Olah et al., 2017] has provided a toolbox of existing techniques to visualize patterns encoded in different conv-layers of a pre-trained CNN. Second, the up-convolutional net [Dosovitskiy and Brox, 2016] is another typical technique to visualize CNN representations. The up-convolutional net inverts CNN feature maps to images. We can regard up-convolutional nets as a tool that indirectly illustrates the image appearance corresponding to a feature map, although compared to gradient-based methods, up-convolutional nets cannot mathematically ensure that the visualization result exactly reflects actual representations in the CNN. Similarly, [Nguyen et al., 2017] has further introduced an additional prior, which controls the semantic meaning of the synthesized image, to the adversarial generative network. We can use CNN feature maps as the prior for visualization. In addition, [Zhou et al., 2015] has proposed a method to accurately compute the image-resolution receptive field of neural activations in a feature map. The actual receptive field of neural activation is smaller than the theoretical receptive field computed using the filter size. The accurate estimation of the receptive field helps people to understand the representation of a filter. 3 Diagnosis of CNN representations Some methods go beyond the visualization of CNNs and diagnose CNN representations to obtain insight understanding of features encoded in a CNN. We roughly divide all relevant research into the following five directions. Studies in the first direction analyze CNN features from a global view. [Szegedy et al., 2014] has explored semantic meanings of each filter. [Yosinski et al., 2014] has analyzed the transferability of filter representations in intermediate conv-layers. [Lu, 2015; Aubry and Russell, 2015] have computed feature distributions of different categories/attributes in the feature space of a pre-trained CNN. The second research direction extracts image regions that directly contribute the network output for a label/attribute to explain CNN representations of the label/attribute. This is similar to the visualization of CNNs. Methods of [Fong and Vedaldi, 2017; Selvaraju et al., 2017] have been proposed to propagate gradients of feature maps w.r.t. the final loss back to the image plane to estimate the image regions. The LIME model proposed in [Ribeiro et al., 2016] extracts image regions that are highly sensitive to the network output. Studies of [Zintgraf et al., 2017; Kindermans et al., 2017; Kumar et al., 2017] have invented methods to visualize areas in the input image that contribute the most to the decision-making process of the CNN. [Wang et al., 2017; Goyal et al., 2016] have tried to interpret the logic for visual question-answering encoded in neural networks. These studies list important objects (or regions of interests) detected from the images and crucial words in questions as the explanation of output answers. The estimation of vulnerable points in the feature space of a CNN is also a popular direction for diagnosing network representations. Approaches of [Su et al., 2017; Koh and Liang, 2017; Szegedy et al., 2014] have been developed to compute adversarial samples for a CNN. I.e. these studies aim to estimate the minimum noisy perturbation of the input image that can change the final prediction. In particular, influence functions proposed in [Koh and Liang, 2017] can be used to compute adversarial samples. The influence function can also provide plausible ways to create training samples to attack the learning of CNNs, fix the training set, and further debug representations of a CNN. The fourth research direction is to refine network representations based on the analysis of network feature spaces. Given a CNN pre-trained for object classification, [Lakkaraju et al., 2017] has proposed a method to discover knowledge blind spots (unknown patterns) of the CNN in a weakly-supervised manner. This method grouped all sample points in the entire feature space of a CNN into thousands of pseudo-categories. It assumed that a well learned CNN would use the sub-space of each pseudo-category to exclusively represent a subset of a specific object class. In this way, this study randomly showed object samples within each sub-space, and used the sample purity in the sub-space to discover potential representation flaws hidden in a pre-trained CNN. To distill representations of a teacher network to a student network for sentiment analysis, [Hu et al., 2016] has proposed using logic rules of natural languages (e.g. I-ORG cannot follow B-PER) to construct a distillation loss to supervise the knowledge distillation of neural networks, in order to obtain more meaningful network representations. Finally, [Zhang et al., 2018b] has presented a method to discover potential, biased representations of a CNN. Fig. 1 shows biased representations of a CNN trained for the estima- Ours 95.4 % 80.6 % 76.2 % Purity of part semantics Pattern of Node 3 Pattern of Node 4 Score of “wearing lipstick” a filter ... Peak of a filter Peak of wearing a filter Feature maps Original +16.93 of a filter Pasted +19.77 Feature maps Masked +12.17 Feature maps lipstick Peak of Figure 1: Biased representations in a CNN [Zhang et al., 2018b]. a filter Considering potential dataset bias, a high accuracy on testing images cannot always ensure that a CNN learns correct representations. The CNN may use unreliable co-appearing contexts to make predictions. For example, people may manually modify mouth appearances of two faces by masking mouth regions or pasting another mouth, but such modifications do not significantly change prediction scores for the lipstick attribute. This figure shows heat maps of inference patterns of the lipstick attribute, where patterns with red/blue colors are positive/negative with the attribute score. The CNN mistakenly considers unrelated patterns as contexts to infer the lipstick. tion of face attributes. When an attribute usually co-appears with specific visual features in training images, then the CNN may use such co-appearing features to represent the attribute. When the used co-appearing features are not semantically related to the target attribute, these features can be considered as biased representations. Given a pre-trained CNN (e.g. a CNN that was trained to estimate face attributes), [Zhang et al., 2018b] required people to annotate some ground-truth relationships between attributes, e.g. the lipstick attribute is positively related to the heavy-makeup attribute, and is not related to the black hair attribute. Then, the method mined inference patterns of each attribute output from conv-layers, and used inference patterns to compute actual attribute relationships encoded in the CNN. Conflicts between the ground-truth and the mined attribute relationships indicated biased representations. 4 Disentangling CNN representations into explanatory graphs & decision trees 4.1 Disentangling CNN representations into explanatory graphs Compared to the visualization and diagnosis of network representations in previous sections, disentangling CNN features into human-interpretable graphical representations (namely explanatory graphs) provides a more thorough explanation of network representations. [Zhang et al., 2018a; Zhang et al., 2016] have proposed disentangling features in conv-layers of a pre-trained CNN and have used a graphical model to represent the semantic hierarchy hidden inside a CNN. As shown in Fig. 2, each filter in a high conv-layer of a CNN usually represents a mixture of patterns. For example, the filter may be activated by both the head and the tail parts of an object. Thus, to provide a global view of how visual knowledge is organized in a pre-trained CNN, studies of [Zhang et al., 2018a; Zhang et al., 2016] aim to answer the following three questions. • How many types of visual patterns are memorized by each convolutional filter of the CNN (here, a visual pat- of a filter of a filter Feature maps of a filter Figure 2: Feature maps of a filter obtained using different input images [Zhang et al., 2018a]. To visualize the feature map, the method propagates receptive fields of activated units in the feature map back to the image plane. In each sub-feature, the filter is activated by various part patterns in an image. This makes it difficult to understand the semantic meaning of a filter. Head pattern Neck pattern … Peak of Input image Feature maps Explanatory Parts corresponding to of different graph each graph node conv-layers Figure 3: Explanatory graph [Zhang et al., 2018a]. An explanatory graph represents the knowledge hierarchy hidden in conv-layers of a CNN. Each filter in a pre-trained CNN may be activated by different object parts. [Zhang et al., 2018a] disentangles part patterns from each filter in an unsupervised manner, thereby clarifying the knowledge representation. tern may describe a specific object part or a certain texture)? • Which patterns are co-activated to describe an object part? • What is the spatial relationship between two co-activated patterns? As shown in Fig. 3, the explanatory graph explains the knowledge semantic hidden inside the CNN. The explanatory graph disentangles the mixture of part patterns in each filter’s feature map of a conv-layer, and uses each graph node to represent a part. • The explanatory graph has multiple layers. Each graph layer corresponds to a specific conv-layer of a CNN. • Each filter in a conv-layer may represent the appearance of different object parts. The algorithm automatically disentangles the mixture of part patterns encoded in a single filter, and uses a node in the explanatory graph to represent each part pattern. • Each node in the explanatory graph consistently represents the same object part through different images. We can use the node to localize the corresponding part on Figure 4: Image patches corresponding to different nodes in the explanatory graph [Zhang et al., 2018a]. L=1 L=2 L=3 L=4 L=1 L=2 L=3 L=4 Figure 5: Heat maps of patterns [Zhang et al., 2018a]. A heat map visualizes the spatial distribution of the top 50% patterns in the L-th layer of the explanatory graph with the highest inference scores. the input image. To some extent, the node is robust to shape deformation and pose variations. • Each edge encodes the co-activation relationship and the spatial relationship between two nodes in adjacent layers. • We can regard an explanatory graph as a compression of feature maps of conv-layers. A CNN has multiple convlayers. Each conv-layer may have hundreds of filters, and each filter may produce a feature map with hundreds of neural units. We can use tens of thousands of nodes in the explanatory graph to represent information contained in all tens of millions of neural units in these feature maps, i.e. by which part patterns the feature maps are activated, and where the part patterns are localized in input images. • Just like a dictionary, each input image can only trigger a small subset of part patterns (nodes) in the explanatory graph. Each node describes a common part pattern with high transferability, which is shared by hundreds or thousands of training images. Fig. 4 lists top-ranked image patches corresponding to different nodes in the explanatory graph. Fig. 5 visualizes the spatial distribution of object parts inferred by the top 50% nodes in the L-th layer of the explanatory graph with the highest inference scores. Fig. 6 shows object parts inferred by a single node. Application: multi-shot part localization There are many potential applications based on the explanatory graph. For example, we can regard the explanatory graph as a visual dictionary of a category and transfer graph nodes to other applications, such as multi-shot part localization. Given very few bounding boxes of an object part, [Zhang et al., 2018a] has proposed retrieving hundreds of nodes that are related to the part annotations from the explanatory graph, and then use the retrieved nodes to localize object parts in previously unseen images. Because each node in the explanatory graph encodes a part pattern shared by numerous training images, the retrieved nodes describe a general appearance of the target part without being over-fitted to the limited annotations of part bounding boxes. Given three annotations for each object part, the explanatory-graph-based method has exhibited superior performance of part localization and has decreased by about 1/3 localization errors w.r.t. the second-best baseline. 4.2 Disentangling CNN representations into decision trees [Zhang et al., 2018c] has further proposed a decision tree to encode decision modes in fully-connected layers. The decision tree is not designed for classification. Instead, the decision tree is used to quantitatively explain the logic for each CNN prediction. I.e. given an input image, we use the CNN to make a prediction. The decision tree tells people which fil- ResNet50 ResNet152 % 22.1 % 19.6 % % 36.7 % 39.2 % % 80.6 % 76.2 % part semantics Pattern of Node 1 Pattern of Node 2 Pattern of Node 3 Pattern of Node 4 maps graph [Zhang et al., 2018a]. The method of [Zhang et al., 2018a] successfully Figure 6: Image regions inferred by each node in anFeature explanatory masked disentangles object-part patterns from representations every single filter. of aof filter x Masks Feature maps Input image of a filter y=0.9 … ReLU Feature maps Conv A head filter contribute 23.2% A feet filter contribute 7.2% A torso filter contribute 12.1% ... Mode for standing birds Mode for longneck birds x ReLU Feature maps of a filter Mode for flying birds ... Disentangled representations of a filter Loss for filter 1 Loss for filter 2 Loss for filter 3 Traditional Conv-layer Most generic rationales (the target) Interpretable Conv-layer Conv Figure 8: Structures of an ordinary conv-layer and an interpretable conv-layer [Zhang et al., 2017c]. Green and red lines indicate the forward and backward propagations, respectively. Most specific rationales ࢏ ࢏ ࢏ Figure 7: Decision tree that explains a CNN prediction at the semantic level [Zhang et al., 2018c]. A CNN is learned for object classification with disentangled representations in the top conv-layer, where each filter represents a specific object part. The decision tree encodes various decision modes hidden inside fully-connected layers of the CNN in a coarse-to-fine manner. Given an input image, the decision tree infers a parse tree (red lines) to quantitatively analyze rationales for the CNN prediction, i.e. which object parts (or filters) are used for prediction and how much an object part (or filter) contributes to the prediction. ters in a conv-layer are used for the prediction and how much they contribute to the prediction. As shown in Fig. 7, the method mines potential decision modes memorized in fully-connected layers. The decision tree organizes these potential decision modes in a coarseto-fine manner. Furthermore, this study uses the method of [Zhang et al., 2017c] to disentangle representations of filters in the top conv-layers, i.e. making each filter represent a specific object part. In this way, people can use the decision tree to explain rationales for each CNN prediction at the semantic level, i.e. which object parts are used by the CNN to make the prediction. Figure 9: Templates [Zhang et al., 2017c]. Each template Tµi matches to a feature map when the target part mainly triggers the i-th unit in the feature map. 5 Learning neural networks with interpretable/disentangled representations Almost all methods mentioned in previous sections focus on the understanding of a pre-trained network. In this section, we review studies of learning disentangled representations of neural networks, where representations in middle layers are no longer a black box but have clear semantic meanings. Compared to the understanding of pre-trained networks, learning networks with disentangled representations present more challenges. Up to now, only a few studies have been published in this direction. Interpretable CNNs Interpretable R-CNN Ordinary CNNs arXiv:1711.05226v1 [cs.CV] 14 Nov 2017 Tianfu Wu1,3 , Xilai Li1 , Xi Song, Wei Sun1 , Liang Dong2 and Bo Li4 Department of ECE1 and CS2 , and the Visual Narrative Cluster3 , North Carolina State University YunOS BU, Alibaba Group4 Figure 10: Visualization of interpretable filters in the top conv-layer [Zhang et al., 2017c]. We used [Zhou et al., 2015] to estimate the {tianfu wu, field xli47, wsun12, ldong6}@ncsu.edu, {xsong.lhi, boli.lhi}@gmail.com image-resolution receptive of activations in a feature map to visualize a filter’s semantics. An interpretable CNN usually encodes head patterns of animals in its top conv-layer for classification. 5.1 Abstract Interpretable convolutional neural networks Parse tree Parse tree This paperinpresents a method of learning qualitatively As shown Fig. 8, [Zhang et al., 2017c] has developed a method to modify to obtain interpretable modelsaninordinary object CNN detection usingdisentangled popular representations in high ConvNet conv-layers by adding a loss to each two-stage region-based detection systems (i.e., filter in[22, the conv-layers. loss isconsists used to ofregularize R-CNN) 61, 9, 26]. The R-CNN a regionthe feature map towards the representation of a specific object proposal network and a RoI (Region-of-Interest) predicpart. tion network.By interpretable models, we focus on weaklyNote that people do not need to annotate anyisobject parts supervised extractive rationale generation, that learning or textures to supervise the learning of interpretable CNNs. to Instead, unfold latent discriminative part configurations of obthe loss automatically assigns an object part to each ject instances automatically simultaneously in shown detec- in filter during the end-to-end and learning process. As tion without anydesigns supervision part configurations. Fig. 9, thisusing method some for templates. Each template WeTutilize top-down andofcompositional withhierarchical the same size feature map. gramTµi deµi is aamatrix scribes theembedded ideal distribution of activations for the feature map mar model in a directed acyclic AND-OR Graph whento theexplore target part the i-th unit inpart the feature (AOG) andmainly unfoldtriggers the space of latent conmap. figurations of RoIs. We propose an AOGParsing operathe joint fitting a feature temtor toGiven substitute theprobability RoIPoolingofoperator widelymap usedtoina Rplate,sothe of a filter is formulated as thetomutual CNN, theloss proposed method is applicable manyinformastatetion between the based featuredetection map andsystems. the templates. This loss of-the-art ConvNet The AOGParsencourages a low entropy of inter-category activations. I.e. ing operator aims to harness both the explainable rigor of each filter in the conv-layer is assigned to a certain category. top-down hierarchical and compositional grammar models If the input image belongs to the target category, then the loss and the discriminative power of bottom-up neural netexpects the filter’s feature map to match a deep template well; othworks through end-to-end In detection, a bound-the erwise, the filter needs to training. remain inactivated. In addition, ingloss boxalso is interpreted theentropy best parse tree derived from of encourages abylow of spatial distributions I.e. when the input image belongsratiothe tartheneural AOG activations. on-the-fly, which is treated as the extractive getgenerated category, the map isdetection. supposed to fit a nale for feature interpreting In exclusively learning, we single template. In other words, the filter needs to activate propose a folding-unfolding method to train the AOG and a single location on the feature map. ConvNet end-to-end. In experiments, we build on top of the This[9] study if a filter repetitively varR-FCN andassumes test thethat proposed method on theactivates PASCAL ious feature-map regions, then this filter is more likely to VOC 2007 and 2012 datasets with performance compara-describe low-level textures (e.g. colors and edges), instead of ble to state-of-the-art methods. high-level parts. For example, the left eye and the right eye may be represented by different filters, because contexts of the two eyes are symmetric, but not the same. 1. Introduction Fig.10 shows feature maps produced by different filters of an interpretable CNN. Each filter consistently represents the 1.1. Motivation Objective same object part and through various images. Recently, dramatic success has been made through big data driven deep neural networks [45, 40] which advance prediction accuracy significantly, and even outperform humans in image classification tasks [27, 69]. In the lit1 Configuration Configuration An end user: Why do youexamples predict thatof thethe twoproposed bounding boxes contain [Wuperson Figure 11: Detection method et al., and bicycle ]. In respectively? 2017 addition to predicted bounding boxes, the method also outputs the latent parse tree and part configurations as the qualitaMachine.: Not only are the detection scores highest among all categories I have tively rationale in detection. The parse are inferred seen in extractive training across all candidate bounding boxes I havetrees compared in on-the-fly in the space of latent structures, which follow a top-down inference, but also the parse trees are consistent with the unified model learned. compositional grammar of an AOG. Figure 1. Top: Detection examples by the proposed method tested in the PASCAL VOC 2007 test dataset. In addition to predicted 5.2 Interpretable R-CNN bounding boxes and detection scores, our method also outputs the latent parse trees andthe partlearning configurations as qual[Wu discriminative ] et al., 2017 has proposed of qualitatively itatively extractive rationale detection, whichbased are computed interpretable models for in object detection on the in RaCNN. weakly-supervised way,isthat only object boxes areof The objective to isunfold latentbounding configurations available in training. The parseduring trees arethe inferred on-the-fly in prothe object parts automatically object-detection space of latent full structures represented by a top-down hierarcess. This method is learned without using any part anchical and compositional grammar model. imagined [Wu notations for supervision. et al.,Bottom: 2017]An uses a topconversation between and the algorithm and an grammar, end user who was trydown hierarchical compositional namely an ing to understand the prediction results. Seeconfigurations text for details. of (Best And-Or graph (AOG), to model latent obviewed in color andmethod magnification) ject parts. This uses an AOG-based parsing opera- tor to substitute for the RoI-Pooling operator used in the RCNN. The AOG-based parsing harnesses explainable compositional structures of objects and maintains the discrimination erature of aobject detection, there has been a critical shift power of R-CNN. This idea is related to the disentanglefrom representation and models such ascomthe mentmore of theexplicit local, bottom-up, and top-down information mixture part-based models (DPMs) [18] ponents of for deformable prediction [Wu et al., 2007; Yang et al., 2009; Wu its andmany Zhu, variants, 2011]. and hierarchical and compositional and During graphs the detection process, a bounding interpreted AND-OR (AOGs) models [66, 82, box 73, is 74], to less as the best parse tree derived from the AOG on-the-fly. transparent but much more accurate ConvNet based Duraping the learning a folding-unfolding method used proaches [61, 9, process, 60, 50, 26, 10]. Meanwhile, it hasisbeen shown that deep neural networks can be easily fooled by so-called adversarial attacks which utilize visually imperceptible, carefully-crafted perturbations to cause networks to misclassify inputs in arbitrarily chosen ways [57, 2], even to train the AOG and R-CNN in an end-to-end manner. Fig. 11 illustrates an example of object detection. The proposed method detects object bounding boxes. The method also determines the latent parse tree and part configurations of objects as the qualitatively extractive rationale in detection. 5.3 Capsule networks [Sabour et al., 2017] has designed novel neural units, namely capsules, in order to substitute for traditional neural units to construct a capsule network. Each capsule outputs an activity vector instead of a scalar. The length of the activity vector represents the activation strength of the capsule, and the orientation of the activity vector encodes instantiation parameters. Active capsules in the lower layer send messages to capsules in the adjacent higher layer. This method uses an iterative routing-by-agreement mechanism to assign higher weights with the low-layer capsules whose outputs better fit the instantiation parameters of the high-layer capsule. Experiments showed that when people trained capsule networks using the MNIST dataset [LeCun et al., 1998b], a capsule encoded a specific semantic concept. Different dimensions of the activity vector of a capsule controlled different features, including 1) scale and thickness, 2) localized part, 3) stroke thickness, 3) localized skew, and 4) width and translation. 5.4 Information maximizing generative adversarial nets The information maximizing generative adversarial net [Chen et al., 2016], namely InfoGAN, is an extension of the generative adversarial network. The InfoGAN maximizes the mutual information between certain dimensions of the latent representation and the image observation. The InfoGAN separates input variables of the generator into two types, i.e. the incompressible noise z and the latent code c. This study aims to learn the latent code c to encode certain semantic concepts in an unsupervised manner. The InfoGAN has been trained using the MNIST dataset [LeCun et al., 1998b], the CelebA dataset [Liu et al., 2015], the SVHN dataset [Netzer et al., 2011], the 3D face dataset [Paysan et al., 2009], and the 3D chair dataset [Aubry et al., 2014]. Experiments have shown that the latent code has successfully encoded the digit type, the rotation, and the width of digits in the MNIST dataset, the lighting condition and the plate context in the SVHN dataset, the azimuth, the existence of glasses, the hairstyle, and the emotion in the CelebA dataset, and the width and 3D rotation in the 3D face and chair datasets. 6 Evaluation metrics for network interpretability Evaluation metrics for model interpretability are crucial for the development of explainable models. This is because unlike traditional well-defined visual applications (e.g. object detection and segmentation), network interpretability is more difficult to define and evaluate. The evaluation metric of network interpretability can help people define the concept of network interpretability and guide the development of learning interpretable network representations. Up to now, only very few studies have discussed the evaluation of network interpretability. Proposing a promising evaluation metric is still a big challenge to state-of-the-art algorithms. In this section, we simply introduce two latest evaluation metrics for the interpretability of CNN filters, i.e. the filter interpretability proposed by [Bau et al., 2017] and the location instability proposed by [Zhang et al., 2018a]. 6.1 Filter interpretability [Bau et al., 2017] has defined six types of semantics for CNN filters, i.e. objects, parts, scenes, textures, materials, and colors. The evaluation of filter interpretability requires people to annotate these six types of semantics on testing images at the pixel level. The evaluation metric measures the fitness between the image-resolution receptive field of a filter’s neural activations1 and the pixel-level semantic annotations on the image. For example, if the receptive field of a filter’s neural activations usually highly overlaps with ground-truth image regions of a specific semantic concept through different images, then we can consider that the filter represents this semantic concept. For each filter f , this method computes its feature maps X = {x = f (I)|I ∈ I} on different testing images. Then, the distribution of activation scores in all positions of all feature maps is computed. [Bau et al., 2017] set an activation threshold Tf such that p(xij > Tf ) = 0.005, to select top activations from all spatial locations [i, j] of all feature maps x ∈ X as valid map regions corresponding to f ’s semantics. Then, the method scales up low-resolution valid map regions to the image resolution, thereby obtaining the receptive field of valid activations on each image. We use SfI to denote the receptive field of f ’s valid activations w.r.t. the image I. The compatibility between a filter f and a specific semantic concept is reported as an intersection-over-union score I IoUf,k = I I kSf ∩Sk k I ∪S I k kSf k , where SkI denotes the ground-truth mask of the k-th semantic concept on the image I. Given an image I I, filter f is associated with the k-th concept if IoUf,k > 0.04. The probability of the k-th concept being associated with the I filter f is given as Pf,k = meanI:with k-th concept 1(IoUf,k > 0.04). Thus, we can use Pf,k to evaluate the filter interpretability of f. 6.2 Location instability Another evaluation metric is location instability. This metric is proposed by [Zhang et al., 2018a] to evaluate the fitness between a CNN filter and the representation of an object part. Given an input image I, the CNN computes a feature map x ∈ RN ×N of filter f . We can regard the unit xi,j (1 ≤ i, j ≤ N ) with the highest activation as the location inference of f , where N × N is referred to as the size of the feature map. We use p̂ to denote the image position that corresponds to the inferred feature map location (i, j), i.e. the 1 The method propagates the receptive field of each activated unit in a filter’s feature map back to the image plane as the imageresolution receptive field of a filter. ࢊࢎࢋࢇࢊ ࡵ૚ ࢊ࢚ࢇ࢏࢒ ࡵ૚ ࢊࢎࢋࢇࢊ ࡵ૛ Inferred position ࢊ࢚ࢇ࢏࢒ ࡵ૜ Annotated landmark Figure 12: Notation for the computation of a filter’s location instability [Zhang et al., 2018a]. 7.1 Active question-answering for learning And-Or graphs Based on the semantic And-Or representation proposed in [Zhang et al., 2016], [Zhang et al., 2017a] has developed a method to use active question-answering to semanticize neural patterns in conv-layers of a pre-trained CNN and build a model for hierarchical object understanding. Deformation range Vunt Input image Conv-layer Heatmap of the selected CNN units in all conv-layers Conv-layer sub-part Conv-layer Image reconstructed context using CNN responses Figure 13: And-Or graph grown on a pre-trained CNN as a semantic branch [Zhang et al., 2017a]. The AOG associates specific CNN units with certain image regions. The red lines indicate the parse graph. Layer 4 (terminals) Layer 3 (OR) Deformation range for a latent pattern CNN units latent patterns As shown in Fig. 13, the CNN is pre-trained for object classification. The method aims to extract a four-layer interpretable And-Or graph (AOG) to explain the semantic hierarchy hidden in a CNN. The AOG encodes four-layer semantics, ranging across the semantic part (OR node), part templates (AND nodes), latentConv-layer patterns (OR nodes), and neuConv-layer Conv-layer ral units (terminal nodes) on feature maps. In the AOG, AND nodes represent compositional regions of a part, and OR nodes encode a list of alternative template/deformation candidates for a local part. The top part node (OR node) uses its children to represent some template candidates for the part. Each part template (AND node) in the second layer uses children latent patterns to represent its constituent regions. Each latent pattern in the third layer (OR node) naturally corresponds to a certain range of units within the feature map of a filter. The latent pattern selects a unit within this range to account for its geometric deformation. To learn an AOG, [Zhang et al., 2017a] allows the computer to actively identify and ask about objects, whose neural patterns cannot be explained by the current AOG. As shown in Fig. 14, in each step of the active question-answering, the current AOG is used to localize object parts among all the unannotated images. The method actively selects objects that cannot well fit the AOG, namely unexplained objects. The method predicts the potential gain of asking about each unexplained object, and thus determines the best sequence of questions (e.g. asking about template types and bounding boxes of unexplained object parts). In this way, the method uses the answers to either refine an existing part template or mine latent patterns for new object-part templates, to grow AOG branches. Fig. 15 compares the part-localization performance of different methods. The QA-based learning exhibits significantly higher efficiency than other baselines. The proposed method uses about 1/6–1/3 of the part annotations for training, but achieves similar or better part-localization per- Layer 2 ( appearance c FC Based on studies discussed in Sections 4 and 5, people may either disentangle representations of a pre-trained CNN or learn a new network with interpretable, disentangled representations. Such interpretable/disentangled network representations can further enable middle-to-end model learning at the semantic level without strong supervision. We briefly review two typical studies [Zhang et al., 2017a; Zhang et al., 2017b] of middle-to-end learning as follows. Terminals FC Network interpretability for middle-to-end learning Vlat FC 7 (OR) latent patterns output √ part and the k-th landmark pk on image I. w2 + h2 denotes the diagonal length of the input image. Thus, Df,k = p varI [dI (pk , p̂)] is reported as the relative location deviation image of filter f w.r.t. the k-th landmark, where varI [dInput I (p k , p̂)] is referred to as the variation of the distance dI (pk , p̂). Because each landmark cannot appear in all testing images, for each filter f , the metric only uses inference results with the topM highest activation scores on images containing the k-th landmark to compute Df,k . In this way, the average of relative location deviations of all the filters in a conv-layer w.r.t. all landmarks, i.e. meanf meanK k=1 Df,k , measures the location instability of a CNN, where K denotes the number of landmarks. Vtmp (AND) part template FC center of the unit xi,j ’s receptive field when we backward propagated the receptive field to the image plane. The evaluation assumes that if f consistently represented the same object part (the object part may not have an explicit name according to people’s cognition) through different objects, then distances between the image position p̂ and some object landmarks should not change much among different objects. For example, if filter f represents the shoulder, then the distance between the shoulder and the head should remain stable through different objects. Therefore, people can compute the deviation of the distance between the inferred position p̂ and a specific groundtruth landmark among different images. The average deviation w.r.t. various landmarks can be used to evaluate the location instability of f . As shown in Fig. 12, let dI (pk , p̂) = kpk −p̂k √ denote the normalized distance between the inferred 2 2 w +h Vsem (OR) semantic part ࢊࢎࢋࢇࢊ ࡵ૜ ࢊ࢈ࢇࢉ࢑ ࡵ૜ Visualization ࢊ࢈ࢇࢉ࢑ ࡵ૚ 0.12 0.1 Patterns in the original AOG 0.04 0.02 0 Different object samples 0 50 100 150 Part localization Appearance type A1 Correct Correct A2 Incorrect Correct A3 Incorrect Incorrect A4 Incorrect New appearance A5 Do not contain ‐‐‐ Q: Is it a correct localization of the head ? Is it a flipped head belonging to part template 1? Annotations of existing part templates 0.06  KL (I ) 0.08 Part template 1 Part template 2 200 Patterns in convlayers 8-10 after interactions Part annotation 1) Part template 4 2) Flipped pose Part template 3 Part template 4 Figure 14: Illustration of the QA process [Zhang et al., 2017a]. (top) The method sorts and selects unexplained objects. (bottom) Questions for each target object. Normalized distance Interactive‐DPM PL‐DPM‐Part SS‐DPM‐Part fc7+linearSVM fc7+RBF‐SVM CNN‐PDD CNN‐PDD‐ft Fast‐RCNN (2 fts) Fast‐RCNN (1 ft) AoG w/o QA Ours+fastRCNN Part annotation number Figure 15: Part localization performance on the Pascal VOC Part dataset [Zhang et al., 2017a]. formance than fast-RCNN methods. 7.2 Patterns in convlayers 5-7 after interactions Interactive manipulations of CNN patterns Let a CNN be pre-trained using annotations of object bounding boxes for object classification. [Zhang et al., 2017b] has explored an interactive method to diagnose knowledge representations of a CNN, in order to transfer CNN patterns to model object parts. Unlike traditional end-to-end learning of CNNs that requires numerous training samples, this method mines object part patterns from the CNN in the scenario of one/multi-shot learning. More specifically, the method uses part annotations on very few (e.g. three) object images for supervision. Given a bounding-box annotation of a part, the proposed method first uses [Zhang et al., 2016] to mine latent patterns, which are related to the annotated part, from conv-layers of the CNN. An AOG is used to organize all mined patterns as the representation of the target part. The method visualizes the mined latent patterns and asks people to remove latent patterns unrelated to the target part interactively. In this way, people can simply prune incorrect latent patterns from AOG branches to refine the AOG. Fig. 16 visualizes initially mined patterns and the remaining patterns after human interaction. With the guidance of human interactions, [Zhang et al., 2017b] has exhibited superior performance of part localization. Figure 16: Visualization of patterns for the head part before and after human interactions [Zhang et al., 2017b]. 8 Prospective trends and conclusions In this paper, we have reviewed several research directions within the scope of network interpretability. Visualization of a neural unit’s patterns was the starting point of understanding network representations in the early years. Then, people gradually developed methods to analyze feature spaces of neural networks and diagnose potential representation flaws hidden inside neural networks. At present, disentangling chaotic representations of conv-layers into graphical models and/or symbolic logic has become an emerging research direction to open the black-box of neural networks. The approach for transforming a pre-trained CNN into an explanatory graph has been proposed and has exhibited significant efficiency in knowledge transfer and weakly-supervised learning. End-to-end learning interpretable neural networks, whose intermediate layers encode comprehensible patterns, is also a prospective trend. Interpretable CNNs have been developed, where each filter in high conv-layers represents a specific object part. Furthermore, based on interpretable representations of CNN patterns, semantic-level middle-to-end learning has been proposed to speed up the learning process. Compared to traditional end-to-end learning, middle-to-end learning allows human interactions to guide the learning process and can be applied with very few annotations for supervision. In the future, we believe the middle-to-end learning will continuously be a fundamental research direction. In addition, based on the semantic hierarchy of an interpretable network, debugging CNN representations at the semantic level will create new visual applications. Acknowledgement This work is supported by ONR MURI project N00014-16-12007 and DARPA XAI Award N66001-17-2-4029, and NSF IIS 1423305. References [Aubry and Russell, 2015] Mathieu Aubry and Bryan C. Russell. Understanding deep features with computergenerated imagery. In ICCV, 2015. [Aubry et al., 2014] M. Aubry, D. Maturana, A. Efros, B. Russell, and J. Sivic. Seeing 3d chairs: Exemplar part- based 2d-3d alignment using a large dataset of cad models. In CVPR, 2014. [Bau et al., 2017] David Bau, Bolei Zhou, Aditya Khosla, Aude Oliva, and Antonio Torralba. Network dissection: Quantifying interpretability of deep visual representations. In CVPR, 2017. [Chen et al., 2016] Xi Chen, Yan Duan, Rein Houthooft, John Schulman, Ilya Sutskever, and Pieter Abbeel. Infogan: Interpretable representation learning by information maximizing generative adversarial nets. In NIPS, 2016. [Dosovitskiy and Brox, 2016] Alexey Dosovitskiy and Thomas Brox. Inverting visual representations with convolutional networks. In CVPR, 2016. [Fong and Vedaldi, 2017] Ruth C. Fong and Andrea Vedaldi. Interpretable explanations of black boxes by meaningful perturbation. In ICCV, 2017. [Goyal et al., 2016] Yash Goyal, Akrit Mohapatra, Devi Parikh, and Dhruv Batra. Towards transparent ai systems: Interpreting visual question answering models. In arXiv:1608.08974, 2016. [He et al., 2016] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In CVPR, 2016. [Hu et al., 2016] Zhiting Hu, Xuezhe Ma, Zhengzhong Liu, Eduard Hovy, and Eric P. Xing. Harnessing deep neural networks with logic rules. In ACL, 2016. [Huang et al., 2017] Gao Huang, Zhuang Liu, Kilian Q. Weinberger, and Laurens van der Maaten. Densely connected convolutional networks. In CVPR, 2017. [Kindermans et al., 2017] Pieter-Jan Kindermans, Kristof T. Schütt, Maximilian Alber, Klaus-Robert Müller, Dumitru Erhan, Been Kim, and Sven Dähne. Learning how to explain neural networks: Patternnet and patternattribution. arXiv: 1705.05598, 2017. [Koh and Liang, 2017] PangWei Koh and Percy Liang. Understanding black-box predictions via influence functions. In ICML, 2017. [Krizhevsky et al., 2012] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In NIPS, 2012. [Kumar et al., 2017] Devinder Kumar, Alexander Wong, and Graham W. Taylor. Explaining the unexplained: A classenhanced attentive response (clear) approach to understanding deep neural networks. In CVPR Workshop on Explainable Computer Vision and Job Candidate Screening Competition, 2017. [Lakkaraju et al., 2017] Himabindu Lakkaraju, Ece Kamar, Rich Caruana, and Eric Horvitz. Identifying unknown unknowns in the open world: Representations and policies for guided exploration. In AAAI, 2017. [LeCun et al., 1998a] Yann LeCun, Lèon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-based learning applied to document recognition. In Proceedings of the IEEE, 1998. [LeCun et al., 1998b] Yann LeCun, Corinna Cortes, and Christopher JC Burges. The mnist database of handwritten digits. Technical report, 1998. [Liu et al., 2015] Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. Deep learning face attributes in the wild. In ICCV, 2015. [Lu, 2015] Yao Lu. Unsupervised learning on neural network outputs. In arXiv:1506.00990v9, 2015. [Mahendran and Vedaldi, 2015] Aravindh Mahendran and Andrea Vedaldi. Understanding deep image representations by inverting them. In CVPR, 2015. [Netzer et al., 2011] Yuval Netzer, Tao Wang, Adam Coates, Alessandro Bissacco, Bo Wu, and Andrew Y. Ng. Reading digits in natural images with unsupervised feature learning. In NIPS Workshop on Deep Learning and Unsupervised Feature Learning, 2011. [Nguyen et al., 2017] Anh Nguyen, Jeff Clune, Yoshua Bengio, Alexey Dosovitskiy, and Jason Yosinski. Plug & play generative networks: Conditional iterative generation of images in latent space. CVPR, 2017. [Olah et al., 2017] Chris Olah, Alexander Mordvintsev, and Ludwig Schubert. Feature visualization. Distill, 2017. https://distill.pub/2017/feature-visualization. [Paysan et al., 2009] P. Paysan, R. Knothe, B. Amberg, S. Romdhani, and T. Vetter. A 3d face model for pose and illumination invariant face recognition. In AVSS, 2009. [Ribeiro et al., 2016] Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. “why should i trust you?” explaining the predictions of any classifier. In KDD, 2016. [Sabour et al., 2017] Sara Sabour, Nicholas Frosst, and Geoffrey E. Hinton. Dynamic routing between capsules. In NIPS, 2017. [Selvaraju et al., 2017] Ramprasaath R. Selvaraju, Michael Cogswell, Abhishek Das, Ramakrishna Vedantam, Devi Parikh, and Dhruv Batra. Grad-cam: Visual explanations from deep networks via gradient-based localization. In ICCV, 2017. [Simonyan et al., 2013] Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. Deep inside convolutional networks: visualising image classification models and saliency maps. In arXiv:1312.6034, 2013. [Springenberg et al., 2015] Jost Tobias Springenberg, Alexey Dosovitskiy, Thomas Brox, and Martin Riedmiller. Striving for simplicity: the all convolutional net. ICLR workshop, 2015. [Su et al., 2017] Jiawei Su, Danilo Vasconcellos Vargas, and Sakurai Kouichi. One pixel attack for fooling deep neural networks. In arXiv:1710.08864, 2017. [Szegedy et al., 2014] Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. Intriguing properties of neural networks. In arXiv:1312.6199, 2014. [Wang et al., 2017] Peng Wang, Qi Wu, Chunhua Shen, and Anton van den Hengel. The vqa-machine: Learning how to use existing vision algorithms to answer new questions. In CVPR, 2017. [Wu and Zhu, 2011] Tianfu Wu and Song-Chun Zhu. A numerical study of the bottom-up and top-down inference processes in and-or graphs. International journal of computer vision, 93(2):226–252, 2011. [Wu et al., 2007] Tian-Fu Wu, Gui-Song Xia, and SongChun Zhu. Compositional boosting for computing hierarchical image structures. In CVPR, 2007. [Wu et al., 2017] Tianfu Wu, Xilai Li, Xi Song, Wei Sun, Liang Dong, and Bo Li. Interpretable r-cnn. In arXiv:1711.05226, 2017. [Yang et al., 2009] Xiong Yang, Tianfu Wu, and Song-Chun Zhu. Evaluating information contributions of bottom-up and top-down processes. ICCV, 2009. [Yosinski et al., 2014] Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. How transferable are features in deep neural networks? In NIPS, 2014. [Zeiler and Fergus, 2014] Matthew D. Zeiler and Rob Fergus. Visualizing and understanding convolutional networks. In ECCV, 2014. [Zhang et al., 2016] Q. Zhang, R. Cao, Y. N. Wu, and S.-C. Zhu. Growing interpretable part graphs on convnets via multi-shot learning. In AAAI, 2016. [Zhang et al., 2017a] Quanshi Zhang, Ruiming Cao, Ying Nian Wu, and Song-Chun Zhu. Mining object parts from cnns via active question-answering. In CVPR, 2017. [Zhang et al., 2017b] Quanshi Zhang, Ruiming Cao, Shengming Zhang, Mark Edmonds, Ying Nian Wu, and SongChun Zhu. Interactively transferring cnn patterns for part localization. In arXiv:1708.01783, 2017. [Zhang et al., 2017c] Quanshi Zhang, Ying Nian Wu, and Song-Chun Zhu. Interpretable convolutional neural network. In arXiv:1710.00935, 2017. [Zhang et al., 2018a] Q. Zhang, R. Cao, F. Shi, Y.N. Wu, and S.-C. Zhu. Interpreting cnn knowledge via an explanatory graph. In AAAI, 2018. [Zhang et al., 2018b] Q. Zhang, W. Wang, and S.-C. Zhu. Examining cnn representations with respect to dataset bias. In AAAI, 2018. [Zhang et al., 2018c] Quanshi Zhang, Yu Yang, Ying Nian Wu, and Song-Chun Zhu. Interpreting cnns via decision trees. arXiv:1802.00121, 2018. [Zhou et al., 2015] Bolei Zhou, Aditya Khosla, Agata Lapedriza, Aude Oliva, and Antonio Torralba. Object detectors emerge in deep scene cnns. In ICRL, 2015. [Zintgraf et al., 2017] Luisa M Zintgraf, Taco S Cohen Tameem Adel, and Max Welling. Visualizing deep neural network decisions: prediction difference analysis. ICLR, 2017.
1cs.CV
Generative Adversarial Text to Image Synthesis arXiv:1605.05396v2 [cs.NE] 5 Jun 2016 Scott Reed, Zeynep Akata, Xinchen Yan, Lajanugen Logeswaran REEDSCOT 1 , AKATA 2 , XCYAN 1 , LLAJAN 1 Bernt Schiele, Honglak Lee SCHIELE 2 , HONGLAK 1 1 University of Michigan, Ann Arbor, MI, USA (UMICH . EDU) 2 Max Planck Institute for Informatics, Saarbrücken, Germany (MPI - INF. MPG . DE) Abstract Automatic synthesis of realistic images from text would be interesting and useful, but current AI systems are still far from this goal. However, in recent years generic and powerful recurrent neural network architectures have been developed to learn discriminative text feature representations. Meanwhile, deep convolutional generative adversarial networks (GANs) have begun to generate highly compelling images of specific categories, such as faces, album covers, and room interiors. In this work, we develop a novel deep architecture and GAN formulation to effectively bridge these advances in text and image modeling, translating visual concepts from characters to pixels. We demonstrate the capability of our model to generate plausible images of birds and flowers from detailed text descriptions. this small bird has a pink this magnificent fellow is breast and crown, and black almost all black with a red primaries and secondaries. crest, and white cheek patch. the flower has petals that are bright pinkish purple with white stigma this white and yellow flower have thin white petals and a round yellow stamen Figure 1. Examples of generated images from text descriptions. Left: captions are from zero-shot (held out) categories, unseen text. Right: captions are from the training set. 1. Introduction In this work we are interested in translating text in the form of single-sentence human-written descriptions directly into image pixels. For example, “this small bird has a short, pointy orange beak and white belly” or ”the petals of this flower are pink and the anther are yellow”. The problem of generating images from visual descriptions gained interest in the research community, but it is far from being solved. properties of attribute representations are attractive, attributes are also cumbersome to obtain as they may require domain-specific knowledge. In comparison, natural language offers a general and flexible interface for describing objects in any space of visual categories. Ideally, we could have the generality of text descriptions with the discriminative power of attributes. Traditionally this type of detailed visual information about an object has been captured in attribute representations distinguishing characteristics the object category encoded into a vector (Farhadi et al., 2009; Kumar et al., 2009; Parikh & Grauman, 2011; Lampert et al., 2014), in particular to enable zero-shot visual recognition (Fu et al., 2014; Akata et al., 2015), and recently for conditional image generation (Yan et al., 2015). Recently, deep convolutional and recurrent networks for text have yielded highly discriminative and generalizable (in the zero-shot learning sense) text representations learned automatically from words and characters (Reed et al., 2016). These approaches exceed the previous stateof-the-art using attributes for zero-shot visual recognition on the Caltech-UCSD birds database (Wah et al., 2011), and also are capable of zero-shot caption-based retrieval. Motivated by these works, we aim to learn a mapping directly from words and characters to image pixels. While the discriminative power and strong generalization Proceedings of the 33 rd International Conference on Machine Learning, New York, NY, USA, 2016. JMLR: W&CP volume 48. Copyright 2016 by the author(s). To solve this challenging problem requires solving two subproblems: first, learn a text feature representation that captures the important visual details; and second, use these fea- Generative Adversarial Text to Image Synthesis tures to synthesize a compelling image that a human might mistake for real. Fortunately, deep learning has enabled enormous progress in both subproblems - natural language representation and image synthesis - in the previous several years, and we build on this for our current task. However, one difficult remaining issue not solved by deep learning alone is that the distribution of images conditioned on a text description is highly multimodal, in the sense that there are very many plausible configurations of pixels that correctly illustrate the description. The reverse direction (image to text) also suffers from this problem but learning is made practical by the fact that the word or character sequence can be decomposed sequentially according to the chain rule; i.e. one trains the model to predict the next token conditioned on the image and all previous tokens, which is a more well-defined prediction problem. This conditional multi-modality is thus a very natural application for generative adversarial networks (Goodfellow et al., 2014), in which the generator network is optimized to fool the adversarially-trained discriminator into predicting that synthetic images are real. By conditioning both generator and discriminator on side information (also studied by Mirza & Osindero (2014) and Denton et al. (2015)), we can naturally model this phenomenon since the discriminator network acts as a “smart” adaptive loss function. Our main contribution in this work is to develop a simple and effective GAN architecture and training strategy that enables compelling text to image synthesis of bird and flower images from human-written descriptions. We mainly use the Caltech-UCSD Birds dataset and the Oxford-102 Flowers dataset along with five text descriptions per image we collected as our evaluation setting. Our model is trained on a subset of training categories, and we demonstrate its performance both on the training set categories and on the testing set, i.e. “zero-shot” text to image synthesis. In addition to birds and flowers, we apply our model to more general images and text descriptions in the MS COCO dataset (Lin et al., 2014). 2. Related work Key challenges in multimodal learning include learning a shared representation across modalities, and to predict missing data (e.g. by retrieval or synthesis) in one modality conditioned on another. Ngiam et al. (2011) trained a stacked multimodal autoencoder on audio and video signals and were able to learn a shared modality-invariant representation. Srivastava & Salakhutdinov (2012) developed a deep Boltzmann machine and jointly modeled images and text tags. Sohn et al. (2014) proposed a multimodal conditional prediction framework (hallucinating one modality given the other) and provided theoretical justification. Many researchers have recently exploited the capability of deep convolutional decoder networks to generate realistic images. Dosovitskiy et al. (2015) trained a deconvolutional network (several layers of convolution and upsampling) to generate 3D chair renderings conditioned on a set of graphics codes indicating shape, position and lighting. Yang et al. (2015) added an encoder network as well as actions to this approach. They trained a recurrent convolutional encoderdecoder that rotated 3D chair models and human faces conditioned on action sequences of rotations. Reed et al. (2015) encode transformations from analogy pairs, and use a convolutional decoder to predict visual analogies on shapes, video game characters and 3D cars. Generative adversarial networks (Goodfellow et al., 2014) have also benefited from convolutional decoder networks, for the generator network module. Denton et al. (2015) used a Laplacian pyramid of adversarial generator and discriminators to synthesize images at multiple resolutions. This work generated compelling high-resolution images and could also condition on class labels for controllable generation. Radford et al. (2016) used a standard convolutional decoder, but developed a highly effective and stable architecture incorporating batch normalization to achieve striking image synthesis results. The main distinction of our work from the conditional GANs described above is that our model conditions on text descriptions instead of class labels. To our knowledge it is the first end-to-end differentiable architecture from the character level to pixel level. Furthermore, we introduce a manifold interpolation regularizer for the GAN generator that significantly improves the quality of generated samples, including on held out zero shot categories on CUB. The bulk of previous work on multimodal learning from images and text uses retrieval as the target task, i.e. fetch relevant images given a text query or vice versa. However, in the past year, there has been a breakthrough in using recurrent neural network decoders to generate text descriptions conditioned on images (Vinyals et al., 2015; Mao et al., 2015; Karpathy & Li, 2015; Donahue et al., 2015). These typically condition a Long Short-Term Memory (Hochreiter & Schmidhuber, 1997) on the top-layer features of a deep convolutional network to generate captions using the MS COCO (Lin et al., 2014) and other captioned image datasets. Xu et al. (2015) incorporated a recurrent visual attention mechanism for improved results. Other tasks besides conditional generation have been considered in recent work. Ren et al. (2015) generate answers to questions about the visual content of images. This approach was extended to incorporate an explicit knowledge base (Wang et al., 2015). Zhu et al. (2015) applied sequence models to both text (in the form of books) and movies to perform a joint alignment. Generative Adversarial Text to Image Synthesis In contemporary work Mansimov et al. (2016) generated images from text captions, using a variational recurrent autoencoder with attention to paint the image in multiple steps, similar to DRAW (Gregor et al., 2015). Impressively, the model can perform reasonable synthesis of completely novel (unlikely for a human to write) text such as “a stop sign is flying in blue skies”, suggesting that it does not simply memorize. While the results are encouraging, the problem is highly challenging and the generated images are not yet realistic, i.e., mistakeable for real. Our model can in many cases generate visually-plausible 64×64 images conditioned on text, and is also distinct in that our entire model is a GAN, rather only using GAN for post-processing. Building on ideas from these many previous works, we develop a simple and effective approach for text-based image synthesis using a character-level text encoder and class-conditional GAN. We propose a novel architecture and learning strategy that leads to compelling visual results. We focus on the case of fine-grained image datasets, for which we use the recently collected descriptions for Caltech-UCSD Birds and Oxford Flowers with 5 humangenerated captions per image (Reed et al., 2016). We train and test on class-disjoint sets, so that test performance can give a strong indication of generalization ability which we also demonstrate on MS COCO images with multiple objects and various backgrounds. 3. Background In this section we briefly describe several previous works that our method is built upon. 3.1. Generative adversarial networks Generative adversarial networks (GANs) consist of a generator G and a discriminator D that compete in a twoplayer minimax game: The discriminator tries to distinguish real training data from synthetic images, and the generator tries to fool the discriminator. Concretely, D and G play the following game on V(D,G): min max V (D, G) = Ex∼pdata (x) [log D(x)]+ G D (1) Ex∼pz (z) [log(1 − D(G(z)))] Goodfellow et al. (2014) prove that this minimax game has a global optimium precisely when pg = pdata , and that under mild conditions (e.g. G and D have enough capacity) pg converges to pdata . In practice, in the start of training samples from D are extremely poor and rejected by D with high confidence. It has been found to work better in practice for the generator to maximize log(D(G(z))) instead of minimizing log(1 − D(G(z))). 3.2. Deep symmetric structured joint embedding To obtain a visually-discriminative vector representation of text descriptions, we follow the approach of Reed et al. (2016) by using deep convolutional and recurrent text encoders that learn a correspondence function with images. The text classifier induced by the learned correspondence function ft is trained by optimizing the following structured loss: N 1 X ∆(yn , fv (vn )) + ∆(yn , ft (tn )) N n=1 (2) where {(vn , tn , yn ) : n = 1, ..., N } is the training data set, ∆ is the 0-1 loss, vn are the images, tn are the corresponding text descriptions, and yn are the class labels. Classifiers fv and ft are parametrized as follows: fv (v) = arg max Et∼T (y) [φ(v)T ϕ(t))] (3) y∈Y ft (t) = arg max Ev∼V(y) [φ(v)T ϕ(t))] (4) y∈Y where φ is the image encoder (e.g. a deep convolutional neural network), ϕ is the text encoder (e.g. a characterlevel CNN or LSTM), T (y) is the set of text descriptions of class y and likewise V(y) for images. The intuition here is that a text encoding should have a higher compatibility score with images of the correspondong class compared to any other class and vice-versa. To train the model a surrogate objective related to Equation 2 is minimized (see Akata et al. (2015) for details). The resulting gradients are backpropagated through ϕ to learn a discriminative text encoder. Reed et al. (2016) found that different text encoders worked better for CUB versus Flowers, but for full generality and robustness to typos and large vocabulary, in this work we always used a hybrid characterlevel convolutional-recurrent network. 4. Method Our approach is to train a deep convolutional generative adversarial network (DC-GAN) conditioned on text features encoded by a hybrid character-level convolutionalrecurrent neural network. Both the generator network G and the discriminator network D perform feed-forward inference conditioned on the text feature. 4.1. Network architecture We use the following notation. The generator network is denoted G : RZ × RT → RD , the discriminator as D : RD × RT → {0, 1}, where T is the dimension of the text description embedding, D is the dimension of the image, and Z is the dimension of the noise input to G. We illustrate our network architecture in Figure 2. In the generator G, first we sample from the noise prior z ∈ RZ ∼ N (0, 1) and we encode the text query t using text encoder ϕ. The description embedding ϕ(t) is first compressed using a fully-connected layer to a small dimension (in practice we used 128) followed by leaky-ReLU and φ φ(t) x := G(z,φ(t)) z ~ N(0,1) D(x’,φ(t)) Generative Adversarial Text to Image Synthesis This flower has small, round violet petals with a dark purple center Generator Network φ This flower has small, round violet petals with a dark purple center Discriminator Network Figure 2. Our text-conditional convolutional GAN architecture. Text encoding ϕ(t) is used by both generator and discriminator. It is projected to a lower-dimensions and depth concatenated with image feature maps for further stages of convolutional processing. then concatenated to the noise vector z. Following this, inference proceeds as in a normal deconvolutional network: we feed-forward it through the generator G; a synthetic image x̂ is generated via x̂ ← G(z, ϕ(t)). Image generation corresponds to feed-forward inference in the generator G conditioned on query text and a noise sample. In the discriminator D, we perform several layers of stride2 convolution with spatial batch normalization (Ioffe & Szegedy, 2015) followed by leaky ReLU. We again reduce the dimensionality of the description embedding ϕ(t) in a (separate) fully-connected layer followed by rectification. When the spatial dimension of the discriminator is 4 × 4, we replicate the description embedding spatially and perform a depth concatenation. We then perform a 1 × 1 convolution followed by rectification and a 4 × 4 convolution to compute the final score from D. Batch normalization is performed on all convolutional layers. 4.2. Matching-aware discriminator (GAN-CLS) The most straightforward way to train a conditional GAN is to view (text, image) pairs as joint observations and train the discriminator to judge pairs as real or fake. This type of conditioning is naive in the sense that the discriminator has no explicit notion of whether real training images match the text embedding context. However, as discussed also by (Gauthier, 2015), the dynamics of learning may be different from the nonconditional case. In the beginning of training, the discriminator ignores the conditioning information and easily rejects samples from G because they do not look plausible. Once G has learned to generate plausible images, it must also learn to align them with the conditioning information, and likewise D must learn to evaluate whether samples from G meet this conditioning constraint. In naive GAN, the discriminator observes two kinds of inputs: real images with matching text, and synthetic images with arbitrary text. Therefore, it must implicitly separate two sources of error: unrealistic images (for any text), and Algorithm 1 GAN-CLS training algorithm with step size α, using minibatch SGD for simplicity. 1: Input: minibatch images x, matching text t, mismatching t̂, number of training batch steps S 2: for n = 1 to S do 3: h ← ϕ(t) {Encode matching text description} 4: ĥ ← ϕ(t̂) {Encode mis-matching text description} 5: z ∼ N (0, 1)Z {Draw sample of random noise} 6: x̂ ← G(z, h) {Forward through generator} 7: sr ← D(x, h) {real image, right text} 8: sw ← D(x, ĥ) {real image, wrong text} 9: sf ← D(x̂, h) {fake image, right text} 10: LD ← log(sr ) + (log(1 − sw ) + log(1 − sf ))/2 11: D ← D − α∂LD /∂D {Update discriminator} 12: LG ← log(sf ) 13: G ← G − α∂LG /∂G {Update generator} 14: end for realistic images of the wrong class that mismatch the conditioning information. Based on the intuition that this may complicate learning dynamics, we modified the GAN training algorithm to separate these error sources. In addition to the real / fake inputs to the discriminator during training, we add a third type of input consisting of real images with mismatched text, which the discriminator must learn to score as fake. By learning to optimize image / text matching in addition to the image realism, the discriminator can provide an additional signal to the generator. Algorithm 1 summarizes the training procedure. After encoding the text, image and noise (lines 3-5) we generate the fake image (x̂, line 6). sr indicates the score of associating a real image and its corresponding sentence (line 7), sw measures the score of associating a real image with an arbitrary sentence (line 8), and sf is the score of associating a fake image with its corresponding text (line 9). Note that we use ∂LD /∂D to indicate the gradient of D’s objective with respect to its parameters, and likewise for G. Lines 11 and 13 are meant to indicate taking a gradient step to update network parameters. Generative Adversarial Text to Image Synthesis 4.3. Learning with manifold interpolation (GAN-INT) Deep networks have been shown to learn representations in which interpolations between embedding pairs tend to be near the data manifold (Bengio et al., 2013; Reed et al., 2014). Motivated by this property, we can generate a large amount of additional text embeddings by simply interpolating between embeddings of training set captions. Critically, these interpolated text embeddings need not correspond to any actual human-written text, so there is no additional labeling cost. This can be viewed as adding an additional term to the generator objective to minimize: Et1 ,t2 ∼pdata [log(1 − D(G(z, βt1 + (1 − β)t2 )))] (5) where z is drawn from the noise distribution and β interpolates between text embeddings t1 and t2 . In practice we found that fixing β = 0.5 works well. Because the interpolated embeddings are synthetic, the discriminator D does not have “real” corresponding image and text pairs to train on. However, D learns to predict whether image and text pairs match or not. Thus, if D does a good job at this, then by satisfying D on interpolated text embeddings G can learn to fill in gaps on the data manifold in between training points. Note that t1 and t2 may come from different images and even different categories.1 4.4. Inverting the generator for style transfer If the text encoding ϕ(t) captures the image content (e.g. flower shape and colors), then in order to generate a realistic image the noise sample z should capture style factors such as background color and pose. With a trained GAN, one may wish to transfer the style of a query image onto the content of a particular text description. To achieve this, one can train a convolutional network to invert G to regress from samples x̂ ← G(z, ϕ(t)) back onto z. We used a simple squared loss to train the style encoder: Lstyle = Et,z∼N (0,1) ||z − S(G(z, ϕ(t)))||22 (6) where S is the style encoder network. With a trained generator and style encoder, style transfer from a query image x onto text t proceeds as follows: s ← S(x), x̂ ← G(s, ϕ(t)) where x̂ is the result image and s is the predicted style. 5. Experiments In this section we first present results on the CUB dataset of bird images and the Oxford-102 dataset of flower images. CUB has 11,788 images of birds belonging to one of 1 In our experiments, we used fine-grained categories (e.g. birds are similar enough to other birds, flowers to other flowers, etc.), and interpolating across categories did not pose a problem. 200 different categories. The Oxford-102 contains 8,189 images of flowers from 102 different categories. As in Akata et al. (2015) and Reed et al. (2016), we split these into class-disjoint training and test sets. CUB has 150 train+val classes and 50 test classes, while Oxford-102 has 82 train+val and 20 test classes. For both datasets, we used 5 captions per image. During mini-batch selection for training we randomly pick an image view (e.g. crop, flip) of the image and one of the captions. For text features, we first pre-train a deep convolutionalrecurrent text encoder on structured joint embedding of text captions with 1,024-dimensional GoogLeNet image embedings (Szegedy et al., 2015) as described in subsection 3.2. For both Oxford-102 and CUB we used a hybrid of character-level ConvNet with a recurrent neural network (char-CNN-RNN) as described in (Reed et al., 2016). Note, however that pre-training the text encoder is not a requirement of our method and we include some end-to-end results in the supplement. The reason for pre-training the text encoder was to increase the speed of training the other components for faster experimentation. We also provide some qualitative results obtained with MS COCO images of the validation set to show the generalizability of our approach. We used the same GAN architecture for all datasets. The training image size was set to 64 × 64 × 3. The text encoder produced 1, 024-dimensional embeddings that were projected to 128 dimensions in both the generator and discriminator before depth concatenation into convolutional feature maps. As indicated in Algorithm 1, we take alternating steps of updating the generator and the discriminator network. We used the same base learning rate of 0.0002, and used the ADAM solver (Ba & Kingma, 2015) with momentum 0.5. The generator noise was sampled from a 100-dimensional unit normal distribution. We used a minibatch size of 64 and trained for 600 epochs. Our implementation was built on top of dcgan.torch2 . 5.1. Qualitative results We compare the GAN baseline, our GAN-CLS with imagetext matching discriminator (subsection 4.2), GAN-INT learned with text manifold interpolation (subsection 4.3) and GAN-INT-CLS which combines both. Results on CUB can be seen in Figure 3. GAN and GANCLS get some color information right, but the images do not look real. However, GAN-INT and GAN-INT-CLS show plausible images that usually match all or at least part of the caption. We include additional analysis on the robustness of each GAN variant on the CUB dataset in the supplement. 2 https://github.com/soumith/dcgan.torch Generative Adversarial Text to Image Synthesis an all black bird GT with a distinct thick, rounded bill. this small bird has a yellow breast, brown crown, and black superciliary a tiny bird, with a tiny beak, tarsus and feet, a blue crown, blue coverts, and black cheek patch this bird is different shades of brown all over with white and black spots on its head and back the gray bird has a light grey head and grey webbed feet GAN GAN - CLS GAN - INT GAN - INT - CLS Figure 3. Zero-shot (i.e. conditioned on text from unseen test set categories) generated bird images using GAN, GAN-CLS, GAN-INT and GAN-INT-CLS. We found that interpolation regularizer was needed to reliably achieve visually-plausible results. GT this flower is white and pink in color, with petals that have veins. these flowers have petals that start off white in color and end in a dark purple towards the tips. bright droopy yellow petals with burgundy streaks, and a yellow stigma. a flower with long pink petals and raised orange stamen. the flower shown has a blue petals with a white pistil in the center GAN GAN - CLS GAN - INT GAN - INT - CLS Figure 4. Zero-shot generated flower images using GAN, GAN-CLS, GAN-INT and GAN-INT-CLS. All variants generated plausible images. Although some shapes of test categories were not seen during training (e.g. columns 3 and 4), the color information is preserved. Results on the Oxford-102 Flowers dataset can be seen in Figure 4. In this case, all four methods can generate plausible flower images that match the description. The basic GAN tends to have the most variety in flower morphology (i.e. one can see very different petal types if this part is left unspecified by the caption), while other methods tend to generate more class-consistent images. We speculate that it is easier to generate flowers, perhaps because birds have stronger structural regularities across species that make it easier for D to spot a fake bird than to spot a fake flower. Many additional results with GAN-INT and GAN-INTCLS as well as GAN-E2E (our end-to-end GAN-INT-CLS without pre-training the text encoder ϕ(t)) for both CUB and Oxford-102 can be found in the supplement. 5.2. Disentangling style and content In this section we investigate the extent to which our model can separate style and content. By content, we mean the visual attributes of the bird itself, such as shape, size and color of each body part. By style, we mean all of the other factors of variation in the image such as background color and the pose orientation of the bird. The text embedding mainly covers content information and typically nothing about style, e.g. captions do not mention the background or the bird pose. Therefore, in order to generate realistic images then GAN must learn to use noise sample z to account for style variations. To quantify the degree of disentangling on CUB we set up two prediction tasks with noise z as the input: pose verifi- Generative Adversarial Text to Image Synthesis Text descriptions Images (style) (content) The bird has a yellow breast with grey features and a small beak. This is a large white bird with black wings and a red head. A small bird with a black head and wings and features grey wings. This bird has a white breast, brown and white coloring on its head and wings, and a thin pointy beak. Figure 5. ROC curves using cosine distance between predicted style vector on same vs. different style image pairs. Left: image pairs reflect same or different pose. Right: image pairs reflect same or different average background color. cation and background color verification. For each task, we first constructed similar and dissimilar pairs of images and then computed the predicted style vectors by feeding the image into a style encoder (trained to invert the input and output of generator). If GAN has disentangled style using z from image content, the similarity between images of the same style (e.g. similar pose) should be higher than that of different styles (e.g. different pose). A small bird with white base and black stripes throughout its belly, head, and feathers. A small sized bird that has a cream belly and a short pointed bill. This bird is completely red. This bird is completely white. This is a yellow bird. The wings are bright blue. Figure 6. Transfering style from the top row (real) images to the content from the query text, with G acting as a deterministic decoder. The bottom three rows are captions made up by us. To recover z, we inverted the each generator network as described in subsection 4.4. To construct pairs for verification, we grouped images into 100 clusters using K-means where images from the same cluster share the same style. For background color, we clustered images by the average color (RGB channels) of the background; for bird pose, we clustered images by 6 keypoint coordinates (beak, belly, breast, crown, forehead, and tail). we can combine previously seen content (e.g. text) and previously seen styles, but in novel pairings so as to generate plausible images very different from any seen image during training. Another way to generalize is to use attributes that were previously seen (e.g. blue wings, yellow belly) as in the generated parakeet-like bird in the bottom row of Figure 6. This way of generalization takes advantage of text representations capturing multiple visual aspects. For evaluation, we compute the actual predicted style variables by feeding pairs of images style encoders for GAN, GAN-CLS, GAN-INT and GAN-INT-CLS. We verify the score using cosine similarity and report the AU-ROC (averaging over 5 folds). As a baseline, we also compute cosine similarity between text features from our text encoder. 5.4. Sentence interpolation We present results on Figure 5. As expected, captions alone are not informative for style prediction. Moreover, consistent with the qualitative results, we found that models incorporating interpolation regularizer (GAN-INT, GANINT-CLS) perform the best for this task. 5.3. Pose and background style transfer We demonstrate that GAN-INT-CLS with trained style encoder (subsection 4.4) can perform style transfer from an unseen query image onto a text description. Figure 6 shows that images generated using the inferred styles can accurately capture the pose information. In several cases the style transfer preserves detailed background information such as a tree branch upon which the bird is perched. Disentangling the style by GAN-INT-CLS is interesting because it suggests a simple way of generalization. This way Figure 8 demonstrates the learned text manifold by interpolation (Left). Although there is no ground-truth text for the intervening points, the generated images appear plausible. Since we keep the noise distribution the same, the only changing factor within each row is the text embedding that we use. Note that interpolations can accurately reflect color information, such as a bird changing from blue to red while the pose and background are invariant. As well as interpolating between two text encodings, we show results on Figure 8 (Right) with noise interpolation. Here, we sample two random noise vectors. By keeping the text encoding fixed, we interpolate between these two noise vectors and generate bird images with a smooth transition between two styles by keeping the content fixed. 5.5. Beyond birds and flowers We trained a GAN-CLS on MS-COCO to show the generalization capability of our approach on a general set of images that contain multiple objects and variable backgrounds. We use the same text encoder architecture, same GAN architecture and same hyperparameters (learning rate, minibatch size and number of epochs) as in CUB Generative Adversarial Text to Image Synthesis GT a group of people on skis stand on the snow. a table with many plates of food and drinks two giraffe standing next to each other in a forest. a large blue octopus kite flies above the people having fun at the beach. Ours GT Ours GT a man in a wet suit riding a surfboard on a wave. a pitcher is about to throw the ball to the batter. two plates of food that include beans, guacamole and rice. a picture of a very clean living room. a green plant that is growing out of the ground. a sheep standing in a open grass field. there is only one horse in the grassy field. a toilet in a small room with a window and unfinished walls. Ours Figure 7. Generating images of general concepts using our GAN-CLS on the MS-COCO validation set. Unlike the case of CUB and Oxford-102, the network must (try to) handle multiple objects and diverse backgrounds. ‘Blue bird with black beak’ → ‘Red bird with black beak’ ‘This bird is completely red with black wings’ ‘Small blue bird with black wings’ → ‘Small yellow bird with black wings’ ‘this bird is all blue, the top part of the bill is blue, but the bottom half is white’ ‘This bird is bright.’ → ‘This bird is dark.’ ‘This is a yellow bird. The wings are bright blue’ Figure 8. Left: Generated bird images by interpolating between two sentences (within a row the noise is fixed). Right: Interpolating between two randomly-sampled noise vectors. and Oxford-102. The only difference in training the text encoder is that COCO does not have a single object category per class. However, we can still learn an instance level (rather than category level) image and text matching function, as in (Kiros et al., 2014). Samples and ground truth captions and their corresponding images are shown on Figure 7. A common property of all the results is the sharpness of the samples, similar to other GAN-based image synthesis models. We also observe diversity in the samples by simply drawing multiple noise vectors and using the same fixed text encoding. From a distance the results are encouraging, but upon close inspection it is clear that the generated scenes are not usually coherent; for example the human-like blobs in the baseball scenes lack clearly articulated parts. In future work, it may be interesting to incorporate hierarchical structure into the image synthesis model in order to better handle complex multi-object scenes. A qualitative comparison with AlignDRAW (Mansimov et al., 2016) can be found in the supplement. GANCLS generates sharper and higher-resolution samples that roughly correspond to the query, but AlignDRAW samples more noticably reflect single-word changes in the selected queries from that work. Incorporating temporal structure into the GAN-CLS generator network could potentially improve its ability to capture these text variations. 6. Conclusions In this work we developed a simple and effective model for generating images based on detailed visual descriptions. We demonstrated that the model can synthesize many plausible visual interpretations of a given text caption. Our manifold interpolation regularizer substantially improved the text to image synthesis on CUB. We showed disentangling of style and content, and bird pose and background transfer from query images onto text descriptions. Finally we demonstrated the generalizability of our approach to generating images with multiple objects and variable backgrounds with our results on MS-COCO dataset. In future work, we aim to further scale up the model to higher resolution images and add more types of text. Acknowledgments This work was supported in part by NSF CAREER IIS-1453651, ONR N00014-13-1-0762 and NSF CMMI1266184. References Akata, Z., Reed, S., Walter, D., Lee, H., and Schiele, B. Evaluation of Output Embeddings for Fine-Grained Image Classification. In CVPR, 2015. Ba, J. and Kingma, D. Adam: A method for stochastic optimization. In ICLR, 2015. Bengio, Y., Mesnil, G., Dauphin, Y., and Rifai, S. Better Generative Adversarial Text to Image Synthesis mixing via deep representations. In ICML, 2013. Denton, E. L., Chintala, S., Fergus, R., et al. Deep generative image models using a laplacian pyramid of adversarial networks. In NIPS, 2015. Donahue, J., Hendricks, L. A., Guadarrama, S., Rohrbach, M., Venugopalan, S., Saenko, K., and Darrell, T. Longterm recurrent convolutional networks for visual recognition and description. In CVPR, 2015. Dosovitskiy, A., Tobias Springenberg, J., and Brox, T. Learning to generate chairs with convolutional neural networks. In CVPR, 2015. Farhadi, A., Endres, I., Hoiem, D., and Forsyth, D. Describing objects by their attributes. In CVPR, 2009. Fu, Y., Hospedales, T. M., Xiang, T., Fu, Z., and Gong, S. Transductive multi-view embedding for zero-shot recognition and annotation. In ECCV, 2014. Gauthier, J. Conditional generative adversarial nets for convolutional face generation. Technical report, 2015. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. Generative adversarial nets. In NIPS, 2014. Gregor, K., Danihelka, I., Graves, A., Rezende, D., and Wierstra, D. Draw: A recurrent neural network for image generation. In ICML, 2015. Hochreiter, S. and Schmidhuber, J. Long short-term memory. Neural computation, 9(8):1735–1780, 1997. Ioffe, S. and Szegedy, C. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In ICML, 2015. Karpathy, A. and Li, F. Deep visual-semantic alignments for generating image descriptions. In CVPR, 2015. Mansimov, E., Parisotto, E., Ba, J. L., and Salakhutdinov, R. Generating images from captions with attention. ICLR, 2016. Mao, J., Xu, W., Yang, Y., Wang, J., and Yuille, A. Deep captioning with multimodal recurrent neural networks (m-rnn). ICLR, 2015. Mirza, M. and Osindero, S. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784, 2014. Ngiam, J., Khosla, A., Kim, M., Nam, J., Lee, H., and Ng, A. Y. Multimodal deep learning. In ICML, 2011. Parikh, D. and Grauman, K. Relative attributes. In ICCV, 2011. Radford, A., Metz, L., and Chintala, S. Unsupervised representation learning with deep convolutional generative adversarial networks. 2016. Reed, S., Sohn, K., Zhang, Y., and Lee, H. Learning to disentangle factors of variation with manifold interaction. In ICML, 2014. Reed, S., Zhang, Y., Zhang, Y., and Lee, H. Deep visual analogy-making. In NIPS, 2015. Reed, S., Akata, Z., Lee, H., and Schiele, B. Learning deep representations for fine-grained visual descriptions. In CVPR, 2016. Ren, M., Kiros, R., and Zemel, R. Exploring models and data for image question answering. In NIPS, 2015. Sohn, K., Shang, W., and Lee, H. Improved multimodal deep learning with variation of information. In NIPS, 2014. Srivastava, N. and Salakhutdinov, R. R. Multimodal learning with deep boltzmann machines. In NIPS, 2012. Kiros, R., Salakhutdinov, R., and Zemel, R. S. Unifying visual-semantic embeddings with multimodal neural language models. In ACL, 2014. Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., and Rabinovich, A. Going deeper with convolutions. In CVPR, 2015. Kumar, N., Berg, A. C., Belhumeur, P. N., and Nayar, S. K. Attribute and simile classifiers for face verification. In ICCV, 2009. Vinyals, O., Toshev, A., Bengio, S., and Erhan, D. Show and tell: A neural image caption generator. In CVPR, 2015. Lampert, C. H., Nickisch, H., and Harmeling, S. Attributebased classification for zero-shot visual object categorization. TPAMI, 36(3):453–465, 2014. Wah, C., Branson, S., Welinder, P., Perona, P., and Belongie, S. The caltech-ucsd birds-200-2011 dataset. 2011. Lin, T.-Y., Maire, M., Belongie, S., Hays, J., Perona, P., Ramanan, D., Dollár, P., and Zitnick, C. L. Microsoft coco: Common objects in context. In ECCV. 2014. Wang, P., Wu, Q., Shen, C., Hengel, A. v. d., and Dick, A. Explicit knowledge-based reasoning for visual question answering. arXiv preprint arXiv:1511.02570, 2015. Generative Adversarial Text to Image Synthesis Xu, K., Ba, J., Kiros, R., Courville, A., Salakhutdinov, R., Zemel, R., and Bengio, Y. Show, attend and tell: Neural image caption generation with visual attention. In ICML, 2015. Yan, X., Yang, J., Sohn, K., and Lee, H. Attribute2image: Conditional image generation from visual attributes. arXiv preprint arXiv:1512.00570, 2015. Yang, J., Reed, S., Yang, M.-H., and Lee, H. Weaklysupervised disentangling with recurrent transformations for 3d view synthesis. In NIPS, 2015. Zhu, Y., Kiros, R., Zemel, R., Salakhutdinov, R., Urtasun, R., Torralba, A., and Fidler, S. Aligning books and movies: Towards story-like visual explanations by watching movies and reading books. In ICCV, 2015.
9cs.NE
arXiv:1612.06499v2 [math.GR] 21 Dec 2016 Invariable generation of certain groups of piecewise linear homeomorphisms of the interval Yoshifumi Matsuda and Shigenori Matsumoto Abstract. Let P be the group of all the orientation preserving piecewise linear homeomorphisms of the interval [0, 1]. Given any a > 1, let P a be the subgroup of P consisting of all the elements with slopes in aZ , and let P Q be the subgroup of P consisting of all the elements with slopes and breaks in Q. We show that the groups P , P a , P Q , as well as Thompson group F , are invariably generated. 1. Introduction The concept of invariable generation for a group G was introduced by J. Wiegold in [9]. Notation 1.1. we denote: 1 For elements g and h of a group G, and a subgroup H of G, hg = ghg −1 , hG = {hg | g ∈ G}, H g = {hg | h ∈ H}. Definition 1.2. (1) A subgroup H of G is called classful if H ∩ g G 6= ∅ for any g ∈ G, or equivalently, [ (1.1) H g = G. g∈G (2) A group G is said to be invariably generated if there are no classful subgroups other than G itself. Any finite group is invariably generated, as is shown by a counting argument on (1.1). Much easier is the fact that any abelian group is invariably generated. In [9], it is shown that the invariable generation is extension closed. Therefore any virtually solvable group is invariably generated. It is also projection closed. Given a prime number p > 1075 , an infinite group whose arbitrary proper nontrivial subgroup is of order p is constructed in [8]. Such groups are necessarily generated by arbitrary two elements not from the same proper subgroup, and is invariably 2010 Mathematics Subject Classification. Primary 20F65. secondary 20F05. Key words and phrases. Invariable generation, piecewise linear homeomorphism, Thompson group. The first author is partially supported by Grant-in-Aid for Young Scientists (B) No. 25800036, and the second by Grant-in-Aid for Scientific Research (C) No. 25400096. 1The convention g h is not the same as the customary one. 1 2 YOSHIFUMI MATSUDA AND SHIGENORI MATSUMOTO generated, provided there are more than one nontrivial conjugacy classes. The Grigorchuk group [5] is also invariably generated [7]. However the invariable generation is not subgroup closed: an example is given in [10]. It is also not direct union closed: the group of the permutations of N with finite support is not invariably generated, since the stabilizer of 1 ∈ N is classful. Infinite groups with one nontrivial conjugacy class, constructed in [6], are not invariably generated. Free groups of generators ≥ 2 are not invariably generated [9]. More generally, nonelementary convergence groups are not invariably generated [3]. Acylindrically hyperbolic groups are not invariably generated [2]. Invariable generation of linear groups are discussed in [7]. The current paper is concerned with groups of piecewise linear (PL) homeomorphisms of the interval. Theorem 1. Thompson group F is invariably generated. Our method cannot give the finite invariance generation of F obtained in [4]. Denote by P the group formed by all the orientation preserving PL homeomorphisms of the unit interval [0, 1], and by P Q the subgroup of P formed by elements with slopes and breaks in Q. Fix an arbitrary real number a > 1. Let P a be the subgroup of P consisting of all the elements with slopes in aZ . Theorem 2. The group P a is invariably generated. Theorem 3. The group P is invariably generated. Theorem 4. The group P Q is invariably generated. The proofs of the above theorems are quite similar. In Section 2, we summarize conditions for a subgroup G of P to be invariably generated. In later sections we show that F , P a , P and P Q satisfy these conditions independently. 2. Conditions for invariable generation Let G be any subgroup of the group P of all the orientation preserving PL homeomorphisms of the interval [0, 1]. We shall raise three conditions for G to be invariably generated. Let X be a dense subset of (0, 1) which is left invariant by G, and let X ∗ = X ∪ {0, 1}. A closed interval I ⊂ [0, 1] is called an X-interval (resp. X ∗ -interval) if the endpoints of I are contained in X (resp. X ∗ ). Definition 2.1. For an X ∗ -interval I, let us denote G(I) = {g|I | g ∈ G, Supp(g) ⊂ I} and G|I = {g|I | g ∈ G, g(I) = I}. The first condition is to fix the relation between G and X. Condition A: (1) The breaks of any g ∈ G are contained in X. (2) The group G acts on X transitively. (3) For any X-interval I, G|I = G(I). (4) For any X ∗ -interval I, there is a PL homeomorphism ψI : [0, 1] → I such that ψI (X ∗ ) = X ∗ ∩ I and GψI = G(I). The other two conditions are concerned with an arbitrary classful subgroup H of G. Condition B: Any classful subgroup H acts on X transitively. INVARIABLE GENERATION 3 Definition 2.2. For an X ∗ -interval I, let us denote H(I) = {h|I | h ∈ H, Supp(h) ⊂ I} and H|I = {h|I | h ∈ H, h(I) = I}. Condition C: For any classful subgroup H, there is an X-interval I0 such that H|I0 = G(I0 ). In this section, we show that if a subgroup G of P satisfies conditions A, B and C, then G is invariably generated. Henceforth in this section, we assume G satisfies conditions A, B and C. For f ∈ G, define s(f ) ∈ [0, 1] by s(f ) = sup{s | f |[0,s] = id}. By condition A(1), s(f ) is contained in X ∗ . Let H be an arbitrary classful subgroup of G Lemma 2.3. For any X ∗ -interval I = [t, 1] ⊂ [0, 1], H(I) is a classful subgroup of G(I). Proof: Given any f |I ∈ G(I) where f ∈ G with Supp(f ) ⊂ I, let us show that there is g ∈ G such that Supp(g) ⊂ I and f g ∈ H. Since H is classful, there is g1 ∈ G such that f g1 ∈ H. Now s(f g1 ) = g1 (s(f )) ∈ X. Notice that s(f ) ≥ t since Supp(f ) ⊂ I. By condition B, there is g2 ∈ H such that g2 (g1 (s(f ))) = s(f ). Then f g2 g1 = (f g1 )g2 is an element in H since f g1 ∈ H and g2 ∈ H. Moreover f g2 g1 |I belongs to H(I) since it satisfies s(f g2 g1 ) = s(f ) ≥ t. Notice that s(f ) is a fixed point of g2 g1 . Now by condition A(3), there is an element g ∈ G which is the identity on [0, s(f )] and is equal to g2 g1 on [s(f ), 1]. Then we have f g = f g2 g1 ∈ H, as is required.  For any X ∗ -interval I = [t, 1], choose a PL homeomorphism ψI : [0, 1] → I such that ψI (X) = X ∩ (t, 1) and GψI = G(I) (condition A(4)). Since H(I) is −1 −1 −1 classful in G(I), H(I)ψ is classful in G(I)ψ = G. By condition B, H(I)ψ acts transitively on X. Therefore H(I) acts transitively on X ∩ (t, 1). This way we get the following lemma. Lemma 2.4. The classful subgroup H acts doubly transitively on X.  By the same argument as Lemma 2.3, applied to the inclusion of an X-interval I = [t, t′ ] into an X ∗ -interval = [t, 1], we get the following. Lemma 2.5. For any X-interval I of (0, 1), the group H(I) is a classful subgroup of G(I).  We shall discuss consequences of condition C. Let I0 be an X-interval such that H|I0 = G(I0 ). Lemma 2.6. We have H(I0 ) = G(I0 ). Proof: Choose an arbitrary f |I0 ∈ G(I0 ), where f ∈ G with Supp(f ) ⊂ I0 . Then since H(I0 ) is classful in G(I0 ) (Lemma 2.5), there is g ∈ G such that Supp(g) ⊂ I0 and f g ∈ H. Since g|I0 ∈ G(I0 ) = H|I0 , there is h ∈ H such that h(I0 ) = I0 and h|I0 = g|I0 . Then since Supp(f ) ⊂ I0 , we have f g = f h , and hence −1 f = (f g )h ∈ H. This, together with the assumption Supp(f ) ⊂ I0 , implies that  f |I0 ∈ H(I0 ). Corollary 2.7. For any X-interval I in (0, 1), we have H(I) = G(I). 4 YOSHIFUMI MATSUDA AND SHIGENORI MATSUMOTO Proof. By double transitivity of the action of H on X (Lemma 2.4), there is h ∈ H such that h(I0 ) = I. Now H(I) = H(I0 )h = G(I0 )h = G(I), as is required.  Finally we shall prove that H = G. Let G0 = {g ∈ G | g ′ (0) = g ′ (1) = 1}, H0 = {h ∈ H | h′ (0) = h′ (1) = 1}. Let {Jn }n∈N be an increasing sequence of X-intervals such that ∪n Jn = (0, 1). We have [ [ H0 = H(Jn ) and G0 = G(Jn ). n∈N n∈N Since by the previous lemma, H(Jn ) = G(Jn ) for any n ∈ N, we get G0 = H0 . Now for any f ∈ G, there is g ∈ G such that f g ∈ H. But then f g f −1 = [g, f ] ∈ G0 ⊂ H, and therefore f ∈ H. This finishes the proof that if G satisfies conditions A, B and C, then G is invariably generated. In the rest of the paper, we use the following terminology. Definition 2.8. For f ∈ P , an interval [0, ǫ] or [1 − ǫ, 1] on which f is linear is called an end linear zone of f . . 3. The group F Let us denote by Z[2 ] ⊂ R the set of dyadic rationals. Thompson group F is the subgroup of P consisting of all the elements with slopes in 2Z and breaks in Z[2−1 ]. For F , we define X in the previous section as X = Z[2−1 ] ∩ (0, 1). It is well known that F satisfies condition A. For A(4), we can take ψI to be any PL homeomorphism from [0, 1] to I with slopes in 2Z and breaks in Z[2−1 ]. See [1] for the existence. −1 Definition 3.1. Define a homomorphisms α : F → Z2 by α(f ) = (log2 f ′ (0), log2 f ′ (1)). Notice that f ∈ Ker(α) if and only if Supp(f ) ⊂ (0, 1). It is well known [1] that Ker(α) = [F, F ]. Of course α is a class function: α(f ) = α(f g ). Let F1,−1 = {f ∈ F | f (x) > x, ∀x ∈ (0, 1), α(f ) = (1, −1)}. Given f ∈ F1,−1 , points 2−i from an end linear zone of f at 0 are contained in a single orbit of the hf i-action. Their images by high iterates of f which lie in an end linear zone at 1 are of the form 1 − k2−j for some positive odd integer k. Definition 3.2. Define a map β : F1,−1 → 2N − 1, by setting β(f ) to be the above odd integer k. Lemma 3.3. The map β is surjective. INVARIABLE GENERATION 5 Proof. Let k ∈ 2N − 1 be given. Choose a large integer j, and define g ∈ F by setting g(x) = 2x on [0, 2−j ], g(x) = 2−1 (x − 1) + 1 on [1 − k2−j .1], and g is a PL homeomorphism with slopes in 2Z and breaks in Z[2−1 ] from the interval [2−j , 2−j+1 ] to [2−j+1 , 1 − k2−j ]. Then we have β(g) = k.  Lemma 3.4. The map β is class invariant, that is, β(g f ) = β(g) for any g ∈ F1,−1 and any f ∈ F . Proof. Assume β(g) = k ∈ 2N − 1 for g ∈ F1,−1 . Then there is an orbit O of g which contains 2−j and 1 − k2−j for any large j. Choose an arbitrary element f ∈ F and assume that the slopes of f are 2j0 near 0 and 2j1 near 1. Then f maps O to an orbit of g f which contains 2−j+j0 and 1 − k2−j+j1 for any large j, showing that β(g f ) = k.  Let H be an arbitrary classful subgroup of F . 1. Corollary 3.5. The map β restricted to H ∩ F1,−1 is surjective onto 2N −  The next lemma shows that condition B of Section 2 is satisfied by F . Lemma 3.6. The classful subgroup H acts transitively on X = Z[2−1 ] ∩ (0, 1). Proof. By Corollary 3.5, there is an element h0 ∈ H such that β(h0 ) = 1. Thus for any large j, the points 2−j , as well as 1−2−j , are on one orbit of h0 . Again by Corollary 3.5, the H orbit of these points contains 1 − ka−j for any k ∈ 2N − 1 and any large j. Applying negative iterates of h0 , we get that the H orbit contains all the points in X.  We need more in order to establish condition C for F . For n large, let In = [2−n−1 , 2−n ], Jn = [1 − 2−n , 1 − 2−n−1 ] and let φn : [0, 1] → In , ψn : [0, 1] → Jn be the orientation preserving surjective linear map of slope 2−n−1 . Let F1,−1,1 = {g ∈ F1,−1 | β(g) = 1}. Given any g ∈ F1,−1,1 , if we choose n large enough, some iterate g N maps In onto Jn . The map ψn−1 ◦ g N ◦ φn is independent of the choice of n. In fact, if k > 0, g k φn+k = φn and g k ψn = ψn+k . Therefore we have −1 −1 ψn+k g N +2k φn+k = (ψn+k g k )g N (g k φn+k ) = ψn−1 g N φn . Notice also that ψn−1 g N φn is an element of F . Definition 3.7. Define a map γ : F1,−1,1 → F by γ(f ) = ψn−1 ◦ g N ◦ φn . Lemma 3.8. The map γ is surjective. We shall adopt a bit longer proof, which is applicable also to the group P a in the next section. Proof. Choose an arbitrary element g ∈ F1,−1,1 which is linear on [0, 2−n ] and [1−2−n, 1]. There is N > 0 such that g N maps In onto Jn . Let f0 = ψn−1 g N φn ∈ F . Any element of F can be written as f f0 for some f ∈ F . The map fˆ = ψn f ψn−1 is a PL homeomorphism of the interval Jn with slopes in 2Z and breaks in Z[2−1 ]. 6 YOSHIFUMI MATSUDA AND SHIGENORI MATSUMOTO Define an element g1 ∈ F1,−1,1 to be equal to fˆg on Jn−1 and equal to g elsewhere. Notice that fˆg is still linear on [0, 2−n ] and [1 − 2−n , 1]. We also have ψn−1 g1N φn = ψn−1 fˆg N φn = (ψn−1 fˆψn )(ψn−1 g N φn ) = f f0 . Since f f0 is an arbitrary element of F , we are done.  Lemma 3.9. The map γ is class invariant. Precisely, if g ∈ F1,−1,1 and f ∈ F , then γ(g f ) = γ(g). Proof. Choose n large enough so that g and f are linear on the intervals [0, 2−n ] and [1 − 2−n , 1]. Since g ∈ F1,−1,1 , some iterate g N of g maps In to Jn . Put k = γ(g) = ψn−1 g N φn , and let us show that γ(g f ) = k. We assume f is of slope 2j0 on [0, 2−n ] and of slope 2j1 on [1 − 2−n , 1]. Then g f is linear (of slope 2) on [0, 2−n+j0 ], and is linear (of slope 2−1 ) on [1 − 2−n+j1 , 1]. The map g f maps In−j0 onto Jn−j1 . Since φn−j0 = f φn and ψn−j1 = f ψn , we have −1 ψn−j (g f )N φn−j0 = ψn−1 f −1 (f gf −1 )N f φn = ψn−1 g N φn = k. 1 If n is big enough compared with j0 and j1 , we have φn−j0 = (g f )j0 −j1 φn−j1 . Therefore −1 −1 k = ψn−j (g f )N φn−j0 = ψn−j (g f )N +j0 −j1 φn−j1 . 1 1 This shows γ(g f ) = k, as is required.  Corollary 3.10. The map γ restricted to H1,−1,1 = H ∩ F1.−1,1 is surjective onto F .  Fix once and for all an element h0 ∈ H1,−1,1 such that γ(h0 ) = id. Thus there is n > 0 such that h0 is linear on [0, 2−n ] and [1 − 2−n , 1], that some iterate hN 0 maps In onto Jn and that ψn−1 hN 0 φn = id. The next lemma shows that the group F satisfies condition C of Section 2. Lemma 3.11. We have H|In = F (In ). ˆ Proof: Choose an arbitrary element fˆ ∈ F (In ) and let f = φ−1 n f φn ∈ F . By Corollary 3.10, there is h1 ∈ H1,−1,1 such that γ(h1 ) = f . More precisely, for some −1 N big m > 0, there is N > 0 such that hN 1 (Im ) = Jm and that ψm h1 φm = f . One 0 can choose m to be greater than n in the lemma. Then some iterate hN of h0 0 N −1 0 maps Im onto Jm and ψm h0 φm is still the identity. Thus −N0 N −1 N0 −1 N φ−1 h1 φm = (ψm h0 φm )−1 (ψm h1 φm ) = id−1 f = f, m h0 and since h0n−m φn = φm , m−n −N0 N φ−1 (h0 h1 )h0n−m φn = f. n h0 But this means 0 N hm−n (h−N h1 )h0n−m |In = fˆ. 0 0 Since fˆ ∈ F (In ) is arbitrary and the LHS is in H|In , we are done.  INVARIABLE GENERATION 7 4. The group P a Let a > 1 be an arbitrary real number. Definition 4.1. Given two compact intervals I and J, we denote by P La (I, J) the space of the PL homeomorphisms from I to J with slopes in aZ . Such a map is called a P La homeomorphism. Lemma 4.2. For any compact interval I and J, the space P La (I, J) is nonempty. Proof. Let I = [p, q] and J = [r, s]. Consider a line L ⊂ R2 of slope an , n > 1, passing through the point (p, r), and another line L′ of slope a−m , m > 1, passing through (q, s). If n and m are sufficiently large, L and L′ intersect at a point in the open rectangle (p, q) × (r, s), yielding the graph of a desired map in P La (I, J).  Definition 4.3. Define a group P a by P a = P La ([0, 1], [0, 1]). We choose X = (0, 1) in condition A. Then the group P a satisfies A(1), A(2) and A(3) by virtue of Lemma 4.2. For A(4), we just take ψI : [0, 1] → I to be the orientation preserving linear homeomorphism. Therefore in this section, X ∗ intervals are just closed intervals. In the rest we shall establish conditions B and C for P a by almost the same method as in Section 3. Define a homomorphism α : P a → Z2 by α(f ) = (loga f ′ (0), loga f ′ (1)). Clearly α is a surjective class function. Let a P1,−1 = {g ∈ P a | g(x) > x, ∀x ∈ (0, 1), α(g) = (1, −1)}. a Given g ∈ P1,−1 , points a−i for i large are contained in a single orbit of g. Consider their images by high iterates of g which are near 1. They are of the form 1 − ξa−j for some number ξ ∈ (a−1 , 1]. a → (a−1 , 1], by setting β(g) to be the Definition 4.4. Define a map β : P1,−1 above number ξ. Then one can show that the map β is a surjective class function just as Lemmas a is surjective 3.3 and 3.4 in Section 3. In particular, the map β restricted to H ∩P1,−1 −1 a onto (a , 1], where H is an arbitrary classful subgroup of P . Then by the same method as Lemma 3.6, we get the following lemma, which establishes condition B. Lemma 4.5. Any classful subgroup H acts transitively on (0, 1). For a positive integer n, let In = [a−n−1 , a−n ], Jn = [1 − a−n , 1 − a−n−1 ] and let φn : [0, 1] → In , ψn : [0, 1] → Jn be the orientation preserving linear homeomorphism of the same slope a−n (1 − a−1 ). Let a a P1,−1,1 = {g ∈ P1,−1 | β(g) = 1}. a Given any g ∈ P1,−1,1 , if we choose n large enough, then g is linear on the intervals −n a [0, a ] and [1 − a−n , 1]. By the definition of P1,−1,1 , some iterate g N sends In to Jn , and the map ψn−1 ◦ g N ◦ φn is independent of the choice of n. Notice also that ψn−1 g N φn is an element of P a , since φn and ψn are linear homeomorphisms of the same slope. a Definition 4.6. Define a map γ : P1,−1,1 → P a by γ(f ) = ψn−1 ◦ g N ◦ φn . 8 YOSHIFUMI MATSUDA AND SHIGENORI MATSUMOTO One can show that the map γ is a surjective class function just as in Lemmas a 3.8 and 3.9. Fix once and for all an element h0 ∈ H ∩ P1,−1,1 such that γ(h0 ) = id. −n Thus there is n > 0 such that h0 is linear on [0, a ] and [1 − a−n , 1], that some −1 N iterate hN 0 maps In onto Jn and that ψn h0 φn = id. Just as in Lemma 3.11, we get the following lemma which establishes condition C. Lemma 4.7. We have H|In = P a (In ). 5. The groups P and P Q In this section, we mainly deal with the group P of all the orientation preserving PL homeomorphisms of [0, 1]. In the last part, we remark one word for necessary modifications with the group P Q . For P , put X = (0, 1) as in Section 4. Then condition A is trivially fulfilled. Let H be an arbitrary classful subgroup of P . First we shall establish conditions B. Lemma 5.1. The group H acts transitively on (0, 1). Proof. There is an element h0 ∈ H such that h′0 (0) = 2 and that h(x) > x for any x ∈ (0, 1). Assume h0 (x) = 2x on the interval [0, 2−n ] for some n > 0. The interval [2−n−1 , 2−n ] is a fundamental domain of the action of the group hh0 i. Thus it suffices to show that for any ξ ∈ (2−1 , 1], there is an element of H which maps 2−n to ξ2−n . Choose an element h1 ∈ H such that h′1 (0) = ξ. Assume h1 is linear on an interval [0, 2−m ] for some m > n. Then h1 (2−m ) = ξ2−m , and hence hm−n h1 h0n−m (2−n ) = ξ2−n , as is required.  0 In the rest of this section, we shall establish condition C by the following lemma. Lemma 5.2. For some closed interval I0 ⊂ (0, 1), we have H|I0 = P (I0 ). For any closed interval I ⊂ [0, 1], denote by φI : [0, 1] → I the orientation preserving bijective linear map. Define P1,−1 = {g ∈ P | g(x) > x, ∀x ∈ (0, 1), g ′ (0) = 2, g ′ (1) = 2−1 }. Let I (resp. J) be a fundamental domain of g ∈ P1,−1 contained in an end linear zone of g (Definition 2.8) at 0 (resp. at 1). Thus I = [a, 2a] for some a > 0 and J = [1 − 2b, 1 − b] for some b > 0. If there is N > 0 such that g N (I) = J, we say N that the pair I and J are monitoring intervals for g. The map f = φ−1 J g φI ∈ P is called the information of g monitored by I and J. We also say that I and J monitor the information f . Definition 5.3. For any g ∈ P1,−1 , denote by I(g) ⊂ P the set of all the monitored informations of g. Lemma 5.4. For any f ∈ P , there is g ∈ P1,−1 such that f ∈ I(g). Proof. The proof is almost the same as Lemma 3.8.  Lemma 5.5. Given g ∈ P1,−1 and f ∈ I(g), the intervals which monitor the information f can be chosen arbitrarily near 0 and 1. Proof. If the intervals I and J monitor the information f , and if n > 0, then clearly the intervals g −n (I) and g n (J) monitor the same information f .  Lemma 5.6. If g ∈ P1,−1 and g1 ∈ P , then I(g g1 ) = I(g). INVARIABLE GENERATION 9 Proof. Let g and g1 be as in the lemma, and let f ∈ I(g). It suffices to show that f ∈ I(g g1 ). By Lemma 5.5, one can choose the monitoring intervals I, J of g which monitor the information f in the end linear zones of g1 . Then g1 (I) and g1 (J) are monitoring intervals of g g1 , with information f since φg1 (I) = g1 φI and φg1 (J) = g1 φJ .  Corollary 5.7. For any f ∈ P , there is h ∈ H ∩P1,−1 such that f ∈ I(h).  Choose an element h0 ∈ H ∩ P1,−1 so that id ∈ I(h0 ), and let I0 and J0 be monitoring intervals of h0 with information id. That is, there is N0 > 0 such that −1 N0 0 ˆ hN 0 (I0 ) = J0 and φJ0 h0 φI0 = id. Let f be an arbitrary element of P (I0 ), and let −1 ˆ f = φI0 f φI0 ∈ P . By Corollary 5.7, there is h1 ∈ H ∩ P1,−1 such that f ∈ I(h1 ). 1 Let I1 , J1 be the corresponding monitoring intervals: we assume hN 1 (I1 ) = J1 for −1 N1 some N1 > 0 and φJ1 h1 φI1 = f . Put I0 = [a, 2a], J0 = [1 − 2b, 1 − b], I1 = [c, 2c] and J1 = [1 − 2d, 1 − d] for some a, b, c, d > 0. Choose an element h2 ∈ H such that h′2 (0) = c/a and n h′2 (1) = d/b. Choose a big n > 0 so that both intervals h−n 0 (I0 ) and h0 (J0 ) are in −n the end linear zones of h2 . Direct computation shows that h2 (h0 (I0 )) = h−n 1 (I1 ) and h2 (hn0 (J0 )) = hn1 (J1 ). See the figure. I0 h0−n (I0 ) hn0 h2 h−n 1 (I1 ) hn0 (J0 ) J0 hn0 0 hN 0 I1 J1 1 hN 1 hn1 h2 hn1 (J1 ) hn1 N0 The equality φ−1 J0 h0 φI0 = id implies (cf. the proof of Lemma 5.5) N0 +2n φ−1 φh−n (I0 ) = id. hn (J0 ) h0 0 0 Likewise we have N1 +2n φ−1 φh−n (I1 ) = f. hn (J1 ) h0 1 1 These equalities show N1 +2n φ−1 h−N0 −2n φhn0 (J0 ) φh−1 φh−n (I1 ) = f. n (J ) h0 1 h−n (I ) 0 0 1 1 0 h−n 0 (I0 ) Since h2 is linear on the intervals and h2 φhn0 (J0 ) = φhn1 (J1 ) . Therefore and hn0 (J0 ), we have h2 φh−n (I0 ) = φh−n (I1 ) 0 1 +2n φ−1 h−N0 −2n h2−1 hN h2 φh−n (I0 ) = f. 1 h−n (I ) 0 0 Finally since hn0 φh−n (I0 ) 0 0 0 = φI0 , we get −N0 −n −1 N1 +2n h2 h1 h2 h−n φ−1 0 φI0 = f. I0 h0 This implies N1 +2n ˆ h0−N0 −n h−1 h2 h−n 2 h1 0 |I0 = f . 1 10 YOSHIFUMI MATSUDA AND SHIGENORI MATSUMOTO Since fˆ ∈ P (I0 ) is arbitrary, and the map on the LHS is from H|I0 , the proof of Lemma 5.2 is now complete. For the subgroup P Q of P consisting of all the elements with slopes and breaks in Q, we define X = Q ∩ (0, 1). The argument for P Q is the same for P under necessary modifications. References [1] J. M. Belk, Thompson’s group F , Thesis, Cornell University. [2] M. Bestvina and K. Fujiwara, Handlebody subgroups in a mapping class group, preprint, arXiv:1412.7847v2. [3] T. Gelander, Convergence groups are not invariably generated, Int. Math. Res. Notices 19(2014), 9806-9814. [4] T. Gelander, G. Golan and K. Juschenko, Invariable generation of Thompson groups, preprint, arXiv:1611.08264v2. [5] R. I. Grigorchuk, On Burnside’s problem on periodic groups, Funktional Anal. i Prilozhen 14(1980), 53-54. [6] G. Higman, B. H. Neumann and H. Neumenn, Embedding theorems for groups, J. London Math. Soc. 24(1949), 247-254. [7] W. M. Kantor, A. Lubotzky and A. Shalev, Invariance generations on infinite groups, J. Algebara 421(2015), 296-310. [8] A. Yu. Ol’shanskii, Groups of bounded period with subgroups of prime order, Algebra i Logika 21(1982), 553-618. [9] J. Wiegold, Transformation groups with fixed-point-free permutations, Arch. Math. (Basel) 27(1976), 473-475. [10] J. Wiegold, Transformation groups with fixed-point-free permutations, II, Arch. Math. (Basel) 29(1977), 571-573. Department of Physics and Mathematics, College of Science and Engineering, Aoyama Gakuin University, 5-10-1 Fuchinobe, Chuo-ku, Sagamihara-shi, Kanagawa, 2525258 E-mail address: [email protected] Department of Mathematics, College of Science and Technology, Nihon University, 1-8-14 Kanda-Surugadai, Chiyoda-ku, Tokyo, 101-8308 Japan E-mail address: [email protected]
4math.GR
1 Linear Programming Bounds for Distributed Storage Codes Ali Tebbi† , Terence H. Chan‡ , Chi Wan Sung† arXiv:1710.04361v1 [cs.IT] 12 Oct 2017 † Department of Electronic Engineering, City University of Hong Kong Email: {ali.tebbi,[email protected]} ‡ Institute for Telecommunications Research, University of South Australia Email: [email protected] Abstract A major issue of locally repairable codes is their robustness. If a local repair group is not able to perform the repair process, this will result in increasing the repair cost. Therefore, it is critical for a locally repairable code to have multiple repair groups. In this paper we consider robust locally repairable coding schemes which guarantee that there exist multiple alternative local repair groups for any single failure such that the failed node can still be repaired locally even if some of the repair groups are not available. We use linear programming techniques to establish upper bounds on the code size of these codes. Furthermore, we address the update efficiency problem of the distributed data storage networks. Any modification on the stored data will result in updating the content of the storage nodes. Therefore, it is essential to minimise the number of nodes which need to be updated by any change in the stored data. We characterise the update-efficient storage code properties and establish the necessary conditions that the weight enumerator of these codes need to satisfy. Index Terms Robust locally repairable codes, update-efficient codes, linear programming I. I NTRODUCTION Significant increase in the internet applications such as social networks, file, and video sharing applications, results in an enormous user data production which needs to be stored reliably. In a An earlier conference versions of the paper appeared at ICICS 2013 [1] and ITW 2014 [2]. In this journal version, we present more details on deriving linear programming bounds and update cost of storage codes. 2 data storage network, data is usually stored in several data centres, which can be geographically separated. Each data centre can store a massive amount of data, by using hundreds of storage disks (or nodes). The most common issue with all storage networks is failure. The failure in storage networks is the result of the failed components which are varied from corrupted disk sectors to one or a group of failed disks or even the entire data centre due to the physical damages or natural disasters. The immediate consequence of failure in a storage network is data loss. Therefore, a recovery mechanism must be in place to handle these failures. Protection against failures is usually achieved by adding redundancies [3]. The simplest way to introduce redundancy is replication. In this method multiple copies of each data block are stored in the network. In the case of any failure in the network, the content of the failed node can be recovered by its replica. Because of its simplicity in storage and data retrieval, this method is used widely in conventional storage systems (e.g., RAID-1 where each data block is duplicated and stored in two storage nodes) [4], [5]. However, replication is not an efficient method in term of the storage requirement [6], [7]. Another method for data storage is erasure coding which has gained a wide attention in distributed storage [8]–[12]. In this method as a generalisation of replication, a data block is divided into K fragments and then encoded to N (N > K) fragments via a group of mapping functions to store in the network [13]. Erasure coding is capable of providing more reliable storage networks compared to replication with the same storage overhead [14]. It is noteworthy to mention that replication can also be considered as an erasure code (i.e., repetition code [3]). One of the challenges in storage networks using erasure codes is the repair bandwidth. When a storage node fails, the replaced node (i.e., newcomer) has to download the information content of the survived nodes to repair the lost data. In other word, the repair bandwidth of a distributed storage network is the total amount of the information which is needed to be retrieved to recover the lost data. Compared to the replication, It has been shown in [14] that for the same system parameters such as mean time to failure (MTTF), erasure coding reduces the storage overhead and the repair bandwidth significantly. From coding theory, it is well known that in a storage network employing an erasure code for data storage the minimum amount of information which has to be downloaded to repair a single failure is at least the same size of the original data [13]. In other words, the amount of data transmitted in the network to repair a failed node is much more than the storage capacity of the node. Regenerating codes which have been introduced in [15] provide coding techniques 3 to reduce the repair bandwidth by increasing the number of nodes which the failed node has to be connected during the repair procedure. It has been shown that there exists a tradeoff between the storage and repair bandwidth in distributed storage networks [15]. Many storage codes in literature assume that lost data in a failed data centre can be regenerated from any subset (of size greater than a certain threshold) of surviving data centres. This requirement can be too restrictive and sometimes not necessary. Although these methods reduce the repair bandwidth, it seems that high I/O traffic is the bottleneck of these networks. The number of nodes which involve in repairing a failed node is defined as the code locality [16]. The concept of code locality relaxes the repairing requirement so that any failed node can be repaired by at least one set (of size smaller than the threshold) of surviving nodes. We refer to these sets as the ”local repair groups”. Moreover, any erasure code which satisfies this property is referred as ”locally repairable code”. One significant issue of locally repairable codes is their robustness. Consider a distributed storage network with N storage nodes such that there exists only one local repair group for each node in the network. Therefore, if any node fails, the survived nodes in its repair group can locally repair the failure. However, if any other node in the repair group is also not available (for example, due to the heavy loading), then the repair group cannot be able to repair the failed node anymore which will result in increase of repair cost. To avoid this problem, it is essential to have multiple local repair groups which can be used for repairing the failure if additional nodes fail or become unavailable in the repair groups. The concept of locally repairable codes with multiple repair groups (or alternatives) was studied in [17] where codes with multiple alternatives were also constructed. Locally repairable code construction with multiple disjoint repairing groups was investigated in [18]. In [19], locally repairable codes with multiple erasure tolerance have been constructed using combinatorial methods. A lower bound on the code size was derived and some code examples provided which are optimal with respect to this bound. A class of locally repairable codes with capability of repairing a set of failed nodes by connecting to a set of survived nodes are studied in [20]. Bounds on code dimension and also families of explicit codes were provided. The main contributions of this paper are as follows: • We investigate the linear (r, Γ, ζ, β) robust locally repairable codes where any failed node can be repaired by ζ different repair groups at the presence of any Γ extra failures in the network. Moreover, these codes can tolerate any β simultaneous failures. 4 • By employing the criteria from the definition of our robust locally repairable codes, we establish a linear programming bound to upper bound the code size. • We investigate the update efficiency of storage codes. In an erasure code, each encoded symbol is a function of the data symbols. Therefore, the update complexity of an erasure code is proportional to the number of encoded symbols that have to be changed in regard of any change in the original data symbols. In other words, in a storage network the content of the storage nodes must be updated by any change in the stored data. We characterise the properties of update-efficient storage codes and establish the necessary conditions that the code need to satisfy. This work is partially presented in 2013 9th International Conference on Information, Communications & Signal Processing (ICICS) [1] and 2014 IEEE Information Theory Workshop (ITW) [2]. This work presents more detailed discussions on characterising robust locally repairable and update-efficient storage codes. The remaining of the paper is organised as follows. In Section II, we review the related works on the locally repairable codes. In Section III, we introduce our robust locally repairable codes and propose their criteria. In Section IV, we establish a linear programming problem to upper bound the code size. We also exploit symmetry on the linear programming bound to reduce its complexity. Section V studies the update efficiency of the locally repairable codes. We establish the necessary conditions for distributed storage codes in order to satisfy the locality and update efficiency at the same time. Examples and numerical results are provided in Section VI. The paper then concludes in Section VII. II. BACKGROUND AND R ELATED WORKS The high I/O overhead in regenerating codes due to use N − 1 storage nodes to minimise the repair bandwidth, seems to be the bottleneck of the storage networks. Therefore, the number of nodes which help to repair a failed node is a major metric to measure the repair cost in storage networks. Locally repairable codes aim to optimise this metric (i.e., the number of helper nodes needed to repair a failed node). The locality of a code is defined as the number of code coordinates r such that any code coordinate is a function of them [16]. Consequently, in a storage network employing a locally repairable code, any failed node can be repaired using only r survived nodes. In the case of the linear locally repairable storage codes which are the topic of this paper, the content of any storage node is a linear combination of the contents of a group 5 of r other nodes. Usually two types of code locality are defined in the literature as information symbol locality and all symbol locality which means that just the information symbols in a systematic code have locality r and all symbols have locality r, respectively. In this paper, the code locality is referred to all symbol locality since we do not impose any systematic code constraint on the locally repairable storage codes. The problem of storage codes with small locality has been initially proposed in [21]–[23], independently. The pyramid codes introduced in [21] are an example of initial works on practical locally repairable storage codes. A basic pyramid code is constructed using an existing erasure code. An MDS erasure code will be an excellent choice in this case, since they are more tolerable against simultaneous failures. To construct a pyramid code using an MDS code, it is sufficient to split K data blocks into K r disjoint groups. Then, a parity symbol is calculated for each group as a local parity. In other words, one of the parity symbols from the original code is split into K r blocks and the other parity symbols are kept as global parities. Therefore, any single failure in data nodes can be repaired by r survived nodes in the same group instead of retrieving data from K nodes. Generally, for a pyramid code with data locality r constructed from an (N, K, d) MDS code, the code length (i.e., number of storage nodes) is   1 + d − 2. N =K 1+ r (1) Obviously, low locality is gained in the cost of ( Kr − 1) extra storage. To obtain all symbol locality for the code, it is sufficient to add a local parity to each group of the global parities of size r where will result in a code length of   1 N = (K + d − 2) 1 + . r Both of the code lengths in (1) and (2) show a linear increase in storage overhead. (2) The pioneer work of Gopalan et al. in [16] is an in-depth study of codes locality which results in presenting a trade-off between the code length N, data block size K, minimum distance of code d, and code locality r. It has been shown that for any [N, K, d]q linear code with information locality r,   K N −K ≥ + d − 2. (3) r In other words, to have a linear storage code with locality r, we need a linear overhead of at   least Kr + d − 2. As a special case of locality r = K, the bound in (3) is reduced to N −K ≥d−1 (4) 6 which is the singleton bound and is achievable by MDS codes such as Reed-Solomon codes. According to (1) and (2), pyramid codes can achieve the bound in (3) which shows their optimality. Due to their importance in minimising the number of helper nodes to repair a single failure, locally repairable codes have received a fair amount of attention in literature. Different coding schemes to design explicit optimum locally repairable codes has been proposed in [24]–[26]. For the bound in (3), the assumption is that any storage node has entropy equal to α = is also mentioned that low locality r << K affects the distance d indicated by term K . r M . K It It has been shown in [27] that there exist erasure codes which have high distance and low locality if storage nodes store an additional information of factor 1r , such that     K K − + 2, d≤N− 1+ǫ r (1 + ǫ) (5) where ǫ > 0. The main issue with locally repairable codes is that they mostly tend to repair a single node failure. This means that if any of the helper nodes in the repairing group of a failed node is not available, the locally repair process will be failed. Therefore, it is critical to have multiple repairing groups for each node in the storage network. The concept of locally repairable codes with multiple repair alternatives has been studied initially in [17]. The main idea in [17] is to obtain the parity check matrix of the code from a partial geometries. However, there are only a few such explicit codes due to the limited number of known constructions of partial geometries with desirable parameters. A lower and upper bound is also obtained for the rate of these codes with different locality and repair alternativity. Rawat et al. investigated the availability in storage networks employing locally repairable codes [18]. The notion of availability is useful for applications involving hot data since it gives the ability of accessing to a certain information by different users simultaneously. Therefore, each information node must have t disjoint repair groups of size at most r (i.e., (r, t)-Information local code). An upper bound for the code minimum distance has been obtained in [18] as dmin ≤ N − K + 1 −    Kt −t , r (6) which is a generalised version of the bound in (3). However, this bound only stands for information symbols availability with the assumption of only one parity symbol for each repair 7 group. Different bounds on the rate and minimum distance of storage codes with locality r and availability t have been obtained independently in [28] as 1  j=1 1 + K ≤Q t N and 1 jr   t  X K −1 . d≤N− i r i=0 (7) (8) The minimum distance upper bound in (8) reduces to (3) for t = 1. However, the bounds in (6) and (8) seem to be incomparable since the bound in (8) is tighter than (6) in some cases and vice versa. An upper bound on the codebook size of locally repairable codes which is dependent on the alphabet size has been obtained in [29] as i h (q) K ≤ min tr + Kopt (n − t(r + 1), d) t∈Z+ (9) (q) where, Kopt is the maximum dimension of a linear or non-linear code of length N and minimum distance d with alphabet size of q. This bound is tighter than the bound in (3). Locally repairable codes with small availability t = 2, 3 are investigated in [30]. The smallest the availability the highest the code rate would be since the dependency among the code symbols is less while the code is still comparable to the practical replication codes. The rate optimal binary (r, t)-availability codes are designed and it has been shown that for (r, 2)-availability codes which their rate is upper bounded by K N ≤ r r+2 for N ≥ r + 1 and r + 1 | 2N in [31], such a construction is unique. The equality on the boubd holds if and only if the code is a direct , r + 1] codes, each generated by the complete graph on r + 2 points. sum of [ (r+1)(r+2) 2 The locally repairable codes with multiple (ri , δi )-localities are presented in [32]. The locally repairable codes with (r, δ)-locality are first introduced in [33] where any systematic code symbol can be recovered by at most r other code symbols even if there exists δ − 2 other failures. The minimum distance of these codes is upper bounded as    K d ≤N −K +1− − 1 (δ − 1). r (10) Note that (10) is reduced to (3) for δ = 2. Locally repairable codes with multiple localities are introduced in [34] and [35] such that coded symbols have different localities. An upper bound 8 on the minimum distance of these codes with multiple locality of the information symbols is derived as d≤N −K−  r  X Kj j=1 j + 2, where, Kj is the number of the information symbols with locality j. The work in [32] is a generalisation of [33] and [34]. Locally repairable codes with multiple (ri , δi )-localities ensures different locality for coded symbols at the presence of extra failures. A Singleton-like bound on the minimum distance has been derived and explicit codes have been proposed. Notation: Let N = {1, 2, 3, . . . , N} and 2N be the set of all possible subsets of N . In this paper we represent a subset ν of N as a binary vector w = [w1 , . . . , wn ] such that wi = 1 if and only if i ∈ N . In our convention, ν and w can be used interchangeably. Similarly, we use zero vector 0 to present an empty set ∅. Also, we will make no distinction between an index i and {i} for a single element set. III. L INEAR L OCALLY R EPAIRABLE C ODES A. Linear Storage Codes Let FN q = {[z1 , . . . , zN ] : zi ∈ Fq for all i ∈ N } be the vector space of all N-tuples over the field Fq . A linear storage code C generated by a K × N full rank (i.e. rank K) generator matrix G is a subspace of FN q over the field Fq . Here, K is the dimension of the subspace. The linear  is defined as the set of all linear combinations (i.e. spans) of the row code C = uG : u ∈ FK q vectors of the generator matrix G. To store a data block of size M in a storage network using a linear code C, the original data is first divided into k data blocks of size M/K. We may assume without loss of generality that the original data is a matrix with M/K rows and k columns. Then each block (or row) will be encoded using the same code. In this paper, we may assume without loss of generality that there is only one row (and thus M = K). Let u = M be the information to be stored. Then the storage node i will store the symbol ugi where gi is the ith column of the generator matrix G. Notice that if Xi is the content that the storage node i stores, then (X1 , . . . , XN ) is a codeword in C. To retrieve the stored information, it is sufficient to retrieve the information content of K nodes (which are indexed by I) such that the columns gi for i ∈ I are all independent. Specifically, u = cI G−1 I (11) 9 where cI is the row vector whose ith entry equals to ugi and GI is a submatrix of the generator matrix G formed by the columns gi for i ∈ I. Definition 1 (Support). For any vector c = [c1 , . . . , cN ] ∈ FN q , its support λ(c) is defined as a subset of N = {1, . . . , N} such that i ∈ λ(c) if and only if ci 6= 0. For a linear storage code C over Fq , any codeword c is a vector of n symbols [c1 , . . . , cN ] where ci ∈ Fq for all i = 1, . . . , N. Since we assume that code C is linear, for any codeword c ∈ C the vector ac for all a ∈ Fq and a 6= 0 is also a codeword in C. Therefore, there exists at least q − 1 codewords in C with the same support (excluding the zero codeword). Definition 2 (Support Enumerator). The support enumerator ΛC (w) of the code C is the number of codewords in C with the same support w, i.e., ΛC (w) , |{c ∈ C : λ(c) = w}| , ∀w ⊆ N . The support enumerator of a code is very useful to characterise the relation between a code C and its dual code C ⊥ via MacWilliam theorem, hence we aim to bound the size of the locally repairable codes using the dual code properties. Any linear code C can be specified by a (N − K) × N parity check matrix H which is orthogonal to the generator matrix G such that GH ⊤ = 0, where 0 is a K × (N − K) zero matrix. Then, this parity check matrix H can generate another linear code C ⊥ called dual code. It is well known that  ⊤ C ⊥ = h ∈ FN q : hc = 0 for all c ∈ C . In other words, a linear code C can be uniquely determined by its dual code C ⊥ . The number of the codewords in C ⊥ for any support w (i.e., support enumerator ΛC ⊥ (w)) can also be determined uniquely by the support enumerator ΛC (w) of the code C via the well-known MacWilliams identities. There are various variation or extensions of MacWilliams identity, all based on association scheme. In the following, we will restate the MacWilliam identity. 10 Proposition 1 (MacWilliams identity [3]). Let C be an (N, K) linear code and C ⊥ be its dual. Then for any codeword support w = [w1 , . . . , wN ] ⊆ N , 1 ΛC ⊥ (w) = |C| X s=[s1 ,...,sN ΛC (s) ]∈2N N Y κq (sj , wj ) ≥ 0 (12) j=1 where    1    κq (s, w) = q − 1     −1 if w = 0 if s = 0 and w = 1 (13) otherwise. Remark 1. Here, subsets w and s of N are considered as binary vectors with nonzero coordinates corresponding to the indices indexed in them. In the next subsection we will show the significance of dual code support enumerator in our definition of robust locally repairable codes. B. Locality of Linear Storage Codes A linear storage code has locality r, if for any failed node i, there exists a group of survived nodes of size at most r (i.e., repair group) such that the failed node can be repaired by this group of nodes [16]. To be precise, consider a linear code C and its dual code C ⊥ . Let h = [h1 , . . . , hN ] and c = [c1 , . . . , cN ] be the codewords in C ⊥ and C, respectively. Then, from the definition of the dual code hc⊤ = 0, ∀h ∈ C ⊥ , c ∈ C. (14) hj Xj = 0, (15) Consequently, X j∈λ(h) where λ(h) is the support of the dual codeword h. Now, if the node i fails and i ∈ λ(h), the content of the failed node can be recovered from the set of surviving nodes indexed by λ(h) \ i. P In particular, Xi = −h−1 i j∈λ(h)\i Xj hj . As such, the set λ(h) \ i can be seen as a repair group for node i. Definition 3 (Locally repairable code [27]). An (r, β) locally repairable code C is a linear code which satisfies 11 1) Local Recovery (LR). for any i ∈ N , there exists h ∈ C ⊥ such that i ∈ λ(h) and |λ(h)| − 1 ≤ r. 2) Global Recovery (GR). ΛC (w) = 0, for all w ⊆ N such that 1 ≤ |w| ≤ β. For a (r, β) locally repairable code, the local recovery criterion implies that any failed node i, can always be repaired by retrieving the contents stored in at most r nodes. On the other hand, the global recovery criterion guarantees that the storage network can be regenerated as long as there are at most β simultaneous node failures. Remark 2. The LR criterion requires the existence of a set of r surviving nodes which can be used to repair a failed node. However, under the criteria, there is no guarantee that a failed node can still be efficiently repaired1 if a few additional nodes also fail (or become unavailable). Therefore, it is essential to have alternative repair groups in case of multiple node failures. Definition 4 (Robust locally repairable code). An (r, β, Γ, ζ) robust locally repairable code is a linear code satisfying the following criteria: 1) Robust Local Recovery (RLR). for any i ∈ N and γ ⊂ N \ i such that |γ| = Γ, there exists h1 , . . . , hζ ∈ C ⊥ such that for all j = 1, . . . , ζ, a) i ∈ λ(hj ), γ ∩ λ(hj ) = ∅, and |λ(hj )| − 1 ≤ r. b) λ(hj ) 6= λ(hℓ ) for ℓ 6= j. 2) Global Recovery (GR). ΛC (w) = 0, for all w ⊆ N such that 1 ≤ |w| ≤ β. The RLR criterion guarantees that a failed node can be repaired locally from any one of the ζ groups of surviving nodes of size r even if Γ extra nodes fail. In the special case when Γ = 0, then the robust locally repairable codes are reduced to locally repairable codes with multiple repair alternatives as in [17]. When ζ = 1, then it further reduces to the traditional locally repairable codes. The GR criterion is the same as that for locally repairable codes. IV. L INEAR P ROGRAMMING B OUNDS One of the most fundamental problems in storage network design is to optimise the tradeoff between the costs for storage and repair. For a storage network using an (N, K) linear code 1 Strictly speaking, by the GR criterion, the failed node can still be repaired if there are no more than β node failures. However, the global recovery cannot guarantee that each failed node can be repaired efficiently. In other words, one may need a much larger set of surviving nodes to repair one failed node. 12 the capacity of each node is M K where M is the information size. In other words, the storage cost (per information per node) is given by M . logq |C| Since our coding scheme is linear locally repairable, a group of r nodes participate in repairing a failed node. Thus, the repair cost of a single failure is given by rM . logq |C| Consequently, by maximising the codebook size |C| the cost will be minimised. In this section, we will obtain an upper bound for the maximal codebook size, subject to robust local recovery and global recovery criteria in Definition 4. Theorem 1. Consider any (r, β, Γ, ζ) robust locally repairable code C. Then, |C| is upper bounded by the optimal value of the following optimisation problem. P maximize w⊆N Aw subject to Aw ≥ 0 Bw = P s⊆N Q κq (sj ,wj ) As n P j=1 s⊆N As ∀w ⊆ N ∀w ⊆ N Bw ≥ 0 ∀w ⊆ N Aw = 0 1 ≤ |w| ≤ β A∅ = 1 X Bs ≥ ζ(q − 1) (16) ∀i ∈ N , γ ∈ ∆i s∈Ωi :γ∩s=∅ where Ωi is the collection of all subsets of N that contains i and of size at most r + 1 and ∆i is the collection of all subsets of N \ i of size at most Γ. Proof. Let C be a (r, β, Γ, ζ) robust locally repairable code. Then, we define Aw , ΛC (w), Bw , ΛC ⊥ (w), w⊆N w ⊆ N. The objective function of the optimisation problem in (16) is the sum of the number of all codewords with support w, which is clearly equal to the size of the code C. Since Aw and Bw are enumerator functions of the code C and C ⊥ respectively, Aw , Bw ≥ 0 for all w ⊆ N . The constraint A∅ = 1 follows from the fact that the zero codeword is contained in any linear code. P The second constraint follows from (12) by substituting |C| and ΛC (s) with s⊆N As and As , respectively. The fourth constraint follows directly from GR criterion which says that there are no codewords with support of size ≤ β (i.e., the minimum distance of code is d = β + 1). 13 Finally, the last constraint follows from the RLR criterion. Since the repair groups are specified by dual code C ⊥ , this constraint bounds the number of codewords in the dual code with support of size at most r + 1. The support of the corresponding codewords must contain the index of the failed node i chosen from set Ωi . However, none of the extra failed nodes indexed in γ can be included in these supports. As mentioned earlier, due to the fact that C is a linear code, for any nonzero h ∈ C ⊥ , then ah ∈ C ⊥ for all nonzero a ∈ Fq . Let w = λ(h). Then, Bw ≥ (q − 1) (i.e., there exist at least q − 1 codewords in dual code with support w). Consequently, X Bw ≥ ζ(q − 1). s∈Ωi :γ∩s=∅ In other words, this constraint guarantees that there exist at least ζ repair groups to locally repair a failed node at the presence of |γ| = Γ extra failures. Therefore, (Aw , Bw : w ⊆ N ) satisfies the constraints in the maximisation problem in (16) and the theorem follows. The optimisation problem in Theorem 1 derives an upper bound on the codebook size |C| (i.e., Code dimension k) of a robust linear locally repairable code with minimum distance of d = β + 1 over Fq such that any failed node can be repaired with a repair group of size r at the presence of any Γ extra failure. Although the maximisation problem in (16) is not a linear programming problem, it can be converted to one easily with a slight manipulation as follows: P maximize w⊆N Aw subject to Aw ≥ 0 P Qn j=1 κq (sj , wj ) ≥ 0 s⊆N As ∀w ⊆ N ∀w ⊆ N 1 ≤ |w| ≤ β Aw = 0 A∅ = 1 X w∈Ωi :γ∩w=∅ X As s⊆N ≥ ζ(q − 1) n Y κq (sj , wj ) j=1 P w⊆N (17) ! Aw ∀i ∈ N , γ ∈ ∆i . The complexity of the linear programming problem in (17) will increase exponentially with the number of storage nodes N. In the following, we will reduce the complexity of the Linear Programming problem in (17) by exploiting the symmetries. To this end, suppose a (r, β, Γ, ζ) linear storage code C is generated by the matrix G with columns gi , i = 1, 2, . . . , N. Let SN be the symmetric group on N whose elements are all 14 the permutations of the elements in N which are treated as bijective functions from the set of symbols to itself. Clearly, |SN | = N!. Let σ be a permutation on N (i.e., σ ∈ SN ). Together with the code C, each permutation σ defines a new code C σ specified with the generator matrix columns fi , i = 1, 2, . . . , N, such that for all i ∈ N , fi = gσ(i) . Since all the codewords are the linear combinations of the generator matrix rows and the permutation σ just changes the generator matrix columns position, the permutation cannot affect the minimum distance of the code (i.e., every codeword cσ ∈ C σ is just a permuted version of the corresponding codeword c ∈ C). Therefore, the code C σ is still a (r, β, Γ, ζ) linear storage code and we have the following proposition. Proposition 2. Suppose (aw : w ⊆ N ) satisfies the constraint in the optimisation problem (17). For any σ ∈ SN , let (aσw : w ⊆ N ) = aσw = aσ(w) , where σ(w) , {σ(i) : i ∈ w}. Then (aσw : w ⊆ N ) also satisfies the constraint in (17). Corollary 1. Let a∗w = 1 X σ a . |SN | σ∈S w N Then (a∗w : w ⊆ N ) satisfies the constraint in (17) and X X a∗w = aw . w⊆N w⊆N Proof. From Proposition 2, for any feasible solution (aw : w ⊆ N ) in (17), there exists |SN | σ(i) feasible solutions (aw : w ⊆ N , and σ (i) ∈ SN ). Since (17) is a linear programming problem, a∗w (the average of all feasible solutions) is also a feasible solution. The result then follows. Proposition 2 can be used to reduce the complexity in solving the optimisation problem (17). Proposition 3. If |w| = |s|, then a∗w = a∗s . Proof. Direct verification due to symmetry. By Proposition 2, it is sufficient to consider only “symmetric” feasible solution (a∗w : w ⊆ N ). Therefore, we can impose additional constraint Aw = As , ∀|w| = |s|. (18) 15 to (17) without affecting the bound. These equality constraint will significantly reduce the number of variables in the optimisation problem. Specifically, we have the following theorem. Theorem 2. Consider a (r, β, Γ, ζ) robust locally repairable code C. Then, |C| is upper bounded by the optimal value in the following maximisation problem Maximize N   X N t t=0 at Subject to    at ≥ 0,     P PN −t t N −t    ai+j (−1)i (q − 1)t−i bt = ti=0 j=0  i j      bt ≥ 0,  Pβ  a =0   t=1 t      a0 = 1      N   r  X X  N N −1−Γ   at . bt+1 ≥ ζ(q − 1)  t t t=0 t=1 ∀t = 0, . . . , N ∀t = 0, . . . , N ∀t = 0, . . . , N (19) Proof. Due to Proposition 3, we can simplify the LP in (17) by rewriting the variables as follows: at = Aw bt = Bw for t = |w| ! X As for t = |w|. s⊆N Using the new variables, the objective function (i.e., the number of codewords in code C) is reduced to sum of the number of codewords with a support of size t (i.e., at ) multiplied by the  number of subsets with size t (i.e., Nt ) on all t = 0, . . . , N. The first constraint follows by the fact that the number of codewords with support of size t is not negative. For any w ⊆ N with the size of t, the second constraint corresponds to that the number of codewords in dual code C ⊥ is nonnegative. To rewrite the second constraint, notice that N Y j=1 κ(sj , wj ) = (−1)|s∩w| (q − 1)|w−s| (20) 16 for any pair (s, w) such that |s ∩ w| = i and |w − s| = t − i. In addition, the number of s such that |s ∩ w| = i and |w − s| = t − i is equal to    t N −t . j i The third constraint follows by the fact that the number of codewords in dual code C ⊥ with support of size t is not negative. The forth constraint follows from the GR criterion and is equivalent to the third constraint in (17). According to the GR criterion, there exist no codewords with the support size ≤ β (i.e., at = 0, 1 ≤ t ≤ β). Since (at ≥ 0, ∀t = 0, . . . , N), then Pβ t=1 at = 0. The constraint a0 = 1 is equivalent to the fourth constraint in (17) which states that there exists only one codeword in code C with a support of size t = 0 (i.e., zero codeword). The last constraint is equivalent to the last constraint in (17) which follows from the RLR  criterion where there are N −1−Γ subsets (i.e., supports) of size t chosen from (N − 1 − Γ) t survived nodes. Remark 3. The number of variables and constraint now scales only linearly with N (the number of nodes in the network). V. C OST FOR U PDATE In previous sections, criteria evaluating performance of storage codes include 1) storage efficiency, 2) local recovery capability and 3) global recovery capability. However, data are rarely static but will be updated from time to time. The fundamental question is how efficient an scheme can be? A. Update Model and Code Definition To answer this question, we assume that the data M consists of multiple files of identical size. In our previous model, we assume that each file will be encoded using the same storage code. Therefore, to update each file, one needs make request to each individual storage node to update the content (regarding that updated file) stored there, leading to excessive overheads. In this section, we consider a variation of our scheme in the sense that we treat each systematic codeword symbol as a single file (which can be updated individually). The whole collection of files will still be robust and efficient as in the original model. However, one can now consider the problem of update as a single systematic codeword symbol and evaluate how many parity-check codeword symbols are required to be updated. 17 Definition 5 (Update-efficient storage code). A K-symbol update-efficient storage code is specified by a K × (N + K) generator matrix G with columns (g1 , . . . , gN +K ) which satisfy the following criteria: 1) Pseudo-Systematic – The submatrix formed by the columns (gN +1 , . . . , gN +K ) is an identity matrix. 2) Full Rank: The matrix formed by (g1 , . . . , gN ) is full rank (i.e., of rank equal to K). The first N columns correspond to the ”coded symbols” stored in the N storage nodes, while the last K columns correspond to the K source symbols. Let [u1 , . . . , uK ] be the K source symbols. In our context, each source symbol may correspond on a file which can be separately updated. Then, any codeword c = [c1 , . . . , cN , cN +1 , . . . , cN +K ] in the update efficient storage code C is generated by ci = K X uj gj,i , ∀i = 1, . . . , N + K, j=1 where gi = [g1,i , . . . , gK,i]⊤ . However, only the first N coordinates of the codeword c will be stored in the network. Therefore, for any i ∈ N the content of the storage node Xi , is the coded symbol ci . In particular, Xi = K X uj gj,i , ∀i = 1, . . . , N. (21) j=1 For any vector v = [v1 , . . . , vN +K ], we will often rewrite it as v = [v1 , v2 ] where v1 = [v1 , . . . , vN ] and v2 = [vN +1 , . . . , vN +K ]. Definition 6 (support). For any vector v = [v1 , v2 ] where v1 = [v1 , . . . , vN ] and v2 = [vN +1 , . . . , vN +K ], its support λ(v) is defined as two subsets (w1 ⊆ N , w2 ⊆ K) where i ∈ w1 if vi 6= 0 i ∈ w2 if vi+N 6= 0, and K = {1, . . . , K}. As before, it is also instrumental to view w1 and w2 as binary vectors w1 = [w1,1 , . . . , w1,N ] and w2 = [w2,1 , . . . , w2,K ] such that w1,i = 1 if vi 6= 0 and w2,i = 1 if vi+N 6= 0. 18 K N  ... ... .. . g1,N g2,N .. . gK,1 . . . gK,N g1,1  g2,1  G= .  ..  0 ... 0 1 . . . 0  .. . . ..  K . . . 0 0 ... 1 1 0 .. . Fig. 1. Generator matrix of an update efficient storage code. K N  p1,1 .. .     pN −K,1 H= pN −K+1,1   ..  . pN,1 ... .. . ... ... .. . p1,K .. . pN −K+1,K .. . 1 ... .. . . . . 0 ... 0 ... .. . . . . ... pN,K 0 ... pN −K,K 0 0 ... .. .. . . . . . 1 0 ... 0 1 ... .. .. . . . . . 0 0 ...  0 ..  N −K .  0  0  ..  . K 1 Fig. 2. Parity check matrix of an update efficient storage code. Lemma 1. Let G be the generator matrix of an update efficient storage code, as depicted in Figure 1. Then 1) For any i = 1, . . . , K, there exists a dual codeword h = (h1 , h2 ) such that all entries of h2,j is non-zero if and only if j 6= i. 2) The rank of the last K column of the parity check matrix must be K. 3) If h = (h1 , h2 ) is a dual codeword, and h2 is non-zero, then h1 must be non-zero as well. 4) If c = (c1 , c2 ) is a codeword, and c2 is non-zero, then c1 must be non-zero as well. Proof. Rank of G is clearly K and hence rank of H must be N. By construction, the first N columns of G has rank K. This implies 1), which in turns also implies 2). Next, 3) follows from that the last K columns of G has rank K. Finally, 4) follows from that the matrix formed by (g1 , . . . , gN ) is of rank K. Remark 4. Assume without loss of generality that the last N columns of the generator matrix G has rank N. We can assume that the parity check matrix H of the update-efficient storage code can be taken the form in Figure 2 such that for any 1 ≤ ℓ ≤ K, the N − K + ℓth row of 19 H has at least two non-zero entries. In other words, entries pN −K+ℓ,1, . . . , pN −K+ℓ,K cannot be all zero. Proposition 4 (Code Properties). Let C be a K-symbol update efficient locally repairable code. Then    (22.a)        (22.b)    P w2 ⊆K:|w2 |≥1 ΛC (0, w2 ) P =0 w2 ⊆K:|w2 |≥1 ΛC ⊥ (0, w2 ) =0 P |w2 | N −K (22.c) q , ∀w2 ⊆ K, |w2 | ≥ 0 w1 ⊆N ΛC ⊥ (w1 , w2 ) = (q − 1)    P   |w2 |  (22.d) , ∀w2 ⊆ K, |w2 | ≥ 0  w1 ⊆N ΛC (w1 , w2 ) = (q − 1)     (22.e) Λ (0, 0) = Λ ⊥ (0, 0) = 1 C C (22) Proof. Direct verification from the generator matrix and the parity check matrix in Figures 1 and 2, respectively. Definition 7 (Update efficient locally repairable storage code). A K − symbol update efficient locally repairable code C is a (r, β, δ) storage code if satisfies the following criteria: 1) Local Recovery (LR): for any i ∈ {1, . . . , N}, there exists h = [h1 , h2 ] ∈ C ⊥ where h1 = [h1 , . . . , hN ] and h2 = [hN +1 , . . . , hN +K ] such that i ∈ λ(h1 ), λ(h2 ) = ∅, and |λ(h1 )| − 1 ≤ r. 2) Global Recovery (GR): ΛC (w1 , w2 ) = 0, for all w1 ⊆ N such that 1 ≤ |w1 | ≤ β and w2 ⊆ K. 3) Efficient Update (EU): For any w2 ⊆ K and |w2 | = 1, ∀w1 ⊆ N and |w1 | > δ. ΛC (w1 , w2 ) = 0, The LR criterion guarantees that for any failed node Xi there exists a local repair group specified by the support of the first N symbols of the corresponding dual codeword. In other words, while hc⊤ = N +K X hi ci = 0, i=1 only (h1 , . . . , hN ) and (c1 , . . . , cN ) are participating in the repair process such that N X i=1 hi Xi = 0. 20 Therefore, the support of h1 = [h1 , . . . , hN ] specifies the repair groups while h2 must be a zero vector. The GR criterion guarantees that the stored data is recoverable at the presence of severe failure pattern. More specifically, in the worst case of β simultaneous node failures, data stored in the network can still be repaired from the survived nodes. Finally, the EU criterion ensures that if any of the source symbols is modified, then no more than δ storage nodes need to be updated. In particular, for any singleton w2 , there exists a unique w1 such that X ΛC (w1′ , w2 ) = q − 1. ΛC (w1 , w2 ) = w1′ The w1 corresponds to codewords where only the single data file (indexed by the support of w2 ) is non-zero. In that case, if the data file has been changed, only the codeword symbols corresponding to the support of w1 need to be updated. In order to maintain the update cost efficiency (i.e., equal or less than δ nodes per any source symbol change), the code C must not include any codeword with support |w1 | > δ for any |w2 | = 1. Proposition 5. For a (r, β, δ) update efficient locally repairable code C, we have  P   (23.a)  w1 ⊆N :ℓ∈w1 and |w1 |≤r+1 ΛC ⊥ (w1 , ∅) ≥ (q − 1), ∀ℓ ∈ N   (23.b) ΛC (w1 , w2 ) = 0, ∀w1 ⊆ N , w2 ⊆ K, 1 ≤ |w1 | ≤ β      (23.c) ΛC (w1 , w2 ) = 0, ∀w1 ⊆ N and |w1 | > δ and |w2 | = 1 (23) Remark 5. It is worth to notice that these parameters may depend on each other. For example, it can be directly verified that there is no (r, β, δ) storage code where β ≥ δ. Remark 6. For notation convenience, we will first consider only the case of local recovery. However, the extension to include robust local recovery is straightforward. We will present the results afterwards. The following theorem characterises an update efficient locally repairable code based on its generator matrix specifications in Definition 7. Theorem 3 (Necessary condition). Let C be a (N, K, r, β, δ) update-efficient locally repairable 21 storage code.     (C1)        (C2)        (C3)       (C4)        (C5)       (C6) Then there exists (Aw1 ,w2 , Cw1 ,w2 : w1 ⊆ N , w2 ⊆ K) such that P QN +K κq (sj , wj ), ∀w1 ⊆ N , w2 ⊆ K Cw1 ,w2 = s1 ⊆N ,s2⊆K As1 ,s2 j=1 Aw1 ,w2 ≥ 0, ∀w1 ⊆ N , w2 ⊆ K Cw1 ,w2 ≥ 0, ∀w1 ⊆ N , w2 ⊆ K A∅,w2 = 0 ∀w2 ⊆ K, |w2 | ≥ 1 C∅,w2 = 0 P |w2 | N q , w1 ⊆N Cw1 ,w2 = (q − 1) P  |w2 |  (C7) ,  w1 ⊆N Aw1 ,w2 = (q − 1)       (C8) A∅,∅ = 1,        (C9) C∅,∅ = q K ,      P  K  (C10)  w1 ⊆N :ℓ∈w1 and |w1 |≤r+1 Cw1 ,∅ ≥ (q − 1)q ,       (C11) Aw1 ,w2 = 0,       (C12) Aw1 ,w2 = 0, ∀w2 ⊆ K, |w2 | ≥ 1 ∀w2 ⊆ K, |w2 | ≥ 0 (24) ∀w2 ⊆ K, |w2 | ≥ 0 ∀ℓ ∈ N ∀1 ≤ |w1 | ≤ β ∀|w1 | > δ, |w2 | = 1 Proof. Let C be a (r, β, δ) update efficient linear storage code. We define Aw1 ,w2 , ΛC (w1 , w2 ) (25) Cw1 ,w2 , q K ΛC ⊥ (w1 , w2 ). (26) Constraint (C1) follows directly from the MacWilliams identity in Proposition 1. Constraint (C2) and (C3) follow from (25) and (26) and that enumerating functions are non-negative. Constraints (C4) - (C9) are consequences of Proposition 4 and Constraints (C10)-(C12) are due to Proposition 5. As before, the constraints in (24) are overly complex. Invoking symmetry, we will to simplify the above set of constraints. Proposition 6. Suppose the generator matrix specified with the column vectors (g1 , . . . , gN +K ) defines a (r, β, δ) code C. For any σ1 ∈ SN (i.e., symmetric group of N ) and σ2 ∈ SK (i.e., symmetric group of K), let C σ1 ,σ2 be another code specified by (fi , i = 1, . . . , N + K) such that fi = gσ1 (i) fN +j = gN +σ2 (j) for i ∈ N for j ∈ K. 22 Then C σ1 ,σ2 is still a (r, β, δ) code. Proof. Let c = [c1 , c2 ] be a codeword in C where c1 = [c1 , . . . , cN ] and c2 = [cN +1 , . . . , cN +K ]. Then, the vector cσ1 ,σ2 = [cσ1 1 , cσ2 2 ] is a codeword in C σ1 ,σ2 where cσ1 1 = [σ1 (c1 ), . . . , σ1 (cN )] and cσ2 2 = [cN +σ2 (1) , . . . , cN +σ2 (K) ]. In other words, any codeword cσ1 ,σ2 ∈ C σ1 ,σ2 is a permutation of a codeword c ∈ C for all σ1 ∈ SN and σ2 ∈ SK . Equivalently, the new code C σ1 ,σ2 is obtained from C by relabelling or reordering the codeword indices. The proposition thus follows. Corollary 2. Suppose (aw1 ,w2 , cw1 ,w2 : w1 ⊆ N , w2 ⊆ K) satisfies (24). Let X X 1 a∗w1 ,w2 = aσ1 (w1 ),σ2 (w2 ) |SN ||SK | σ ∈S σ ∈S 1 c∗w1 ,w2 = 1 |SN ||SK | σ N 2 K X X 1 ∈SN (27) cσ1 (w1 ),σ2 (w2 ) . (28) σ2 ∈SK Then (a∗w1 ,w2 , c∗w1 ,w2 : w1 ⊆ N , w2 ⊆ K) also satisfies (24). Furthermore, for any w1 , s1 ⊆ N and w2 , s2 ⊆ K such that |w1 | = |s1 | and |w2 | = |s2 |. Then a∗w1 ,w2 = a∗s1 ,s2 (29) c∗w1 ,w2 = c∗s1 ,s2 . (30) Proof. From Proposition 6, if (aw1 ,w2 , cw1 ,w2 : w1 ⊆ N , w2 ⊆ K) satisfy constraints (24), then (aσ1 (w1 ),σ2 (w2 ) , cσ1 (w1 ),σ2 (w2 ) : w1 ⊆ N , w2 ⊆ K) will satisfy them for all σ1 ∈ SN and σ2 ∈ K. Since all the constraints in (24) are convex, any convex combination of all these feasible solutions is still feasible. Hence, (a∗w1 ,w2 , c∗w1 ,w2 : w1 ⊆ N , w2 ⊆ K) is still feasible. Also, {(σ1 (w1 ), σ2 (w2 )) : ∀σ1 ∈ SN , σ2 ∈ SK } = {(σ1 (s1 ), σ2 (s2 )) : ∀σ1 ∈ SN , σ2 ∈ SK } if |w1 | = |s1 | and |w2 | = |s2 | for any w1 , s1 ⊆ N and w2 , s2 ⊆ K. Theorem 4 (Necessary condition). Let C be a (N, K, r, β, δ) update-efficient storage code. Then there exists real numbers (at1 ,t2 , ct1 ,t2 : t1 = 0, . . . , N, t2 = 0, . . . , K) satisfying (31). 23    (D1)        (D2)        (D3)       (D4)        (D5)       (D6) ct1 ,t2 = Pt1 u1 =0 at1 ,t2 ≥ 0, u2 =0 v1 =0 PK−t2 v2 =0 Ξ(u1 , v1 , u2 , v2 )au1 +v1 ,u2 +v2 ∀0 ≤ t1 ≤ N, 0 ≤ t2 ≤ K ct1 ,t2 ≥ 0, ∀0 ≤ t1 ≤ N, 0 ≤ t2 ≤ K a0,t2 = 0, ∀t2 ≥ 1 c0,t2 = 0  PN N ∀t2 ≥ 1 t1 =0   (D7)        (D8)        (D9)        (D10)        (D11)       (D12) PN −t1 Pt2 PN t1 =0 t1 N t1 a0,0 = 1,  ct1 ,t2 = (q − 1)t2 q N , ∀t2 at1 ,t2 = (q − 1)t2 , ∀t2 c0,0 = q K Pr+1 N −1 t1 =2 t1 −1 ct1 ,0 ≥ (q − 1)q K at1 ,t2 = 0, ∀1 ≤ t1 ≤ β at1 ,1 = 0, ∀t1 > δ (31) where Ξ(u1 , v1 , u2 , v2 ) = (−1) u1 +u2 (q − 1) t1 +t2 −u1 −u2      k − t2 t2 N − t1 t1 . v2 u2 v1 u1 Proof. The theorem is essentially a direct consequence of Theorem 3 and Corollary 2, which guarantees that there exists a “symmetric” feasible solution (a∗w1 ,w2 , c∗w1 ,w2 : w1 ⊆ N , w2 ⊆ K) satisfying (24). Due to symmetry, we can rewrite a∗w1 ,w2 as at1 ,t2 and c∗w1 ,w2 as ct1 ,t2 where t1 = |w1 | and t2 = |w2 |. The set of constraints in (31) is basically obtained by rewriting (24) and grouping like terms. Most rephrasing is straightforward. The more complicated one is (D1), where we will show how to rewrite it. Recall the constraint (C1) in (24) Cw1 ,w2 = X s1 ⊆N ,s2 ⊆K Let |w1 | = t1 , |w2 | = t2 . For any As1 ,s2 NY +K κq (sj , wj ), ∀w1 ⊆ N , w2 ⊆ K. (32) j=1 0 ≤ u1 ≤ t1 , and 0 ≤ v1 ≤ N − t1 (33) 0 ≤ u2 ≤ t2 , and 0 ≤ v2 ≤ K − t2 , (34) 24 the number of pairs of (s1 , s2 ) such that u1 = |w1 ∩ s1 | and v1 = |s1 \ w1 | u2 = |w2 ∩ s2 | and v2 = |s2 \ w2 | is equal to      K − t2 t2 N − t1 t1 . v2 u2 v1 u1 Also, for each such pair, by (20), NY +K κq (sj , wj ) = (−1)u1 +u2 (q − 1)t1 +t2 −u1 −u2 . j=1 Grouping all like terms together, (32) can be written as in (D1) in (31). Notice that the complexity of the constraints in Theorem 3 is increased exponentially by the number of the storage nodes N and the number of the information symbols K. However, the symmetrisation technique which is applied to the constraints significantly reduces the number of the variables to 2(N + 1)(K + 1). Remark 7. Theorem 4 can be used to prove the existence of an updated efficient code, which in turn can be used to search and determine performance bounds for the codes. Remark 8. In the previous linear programming bound, we consider only the local recovery criteria. Extension to robust local recovery criteria is similar. For the robust local recovery criteria, recall from Definition 4, it requires that for any failed node i ∈ N and additional Γ failed nodes γ, there exists at least ζ dual codewords (with different supports). In other words, for any i ∈ N and γ ⊂ N \ i such that |γ| = Γ, X ΛC ⊥ (w1 , ∅) ≥ ζ(q − 1). (35) w1 ⊆N ,i∈w1 ,γ∩w1 =∅ As before, the constraint can be rewritten as follows, after symmetrisation  r+1  X N −Γ−1 ct1 ,0 ≥ ζ(q − 1)q K . t − 1 1 t =2 1 (36) 25 VI. N UMERICAL R ESULTS A ND D ISCUSSION In this section, we present two examples of robust locally repairable codes. We will show that these codes can repair a failed node locally when some of the survived nodes are not available. Using our bound, we prove that these codes are optimal. Example 1: Consider a binary linear storage code of length n = 16 with k = 9 as defined by the following parity check equations 0 = P1 + C 1 + C 2 + C 3 (37) 0 = P2 + C 4 + C 5 + C 6 (38) 0 = P3 + C 7 + C 8 + C 9 (39) 0 = P4 + C 1 + C 4 + C 7 (40) 0 = P5 + C 2 + C 5 + C 8 (41) 0 = P6 + C 3 + C 6 + C 9 (42) 0 = P7 + C 1 + C 2 + C 3 + C4 + C5 + C6 + C7 + C8 + C9 . (43) Here, (C1 , . . . , C9 , P1 , . . . , P7 ) correspond to the content stored at the 16 nodes. In particular, we might interpret that C1 , . . . , C9 are the systematic bits while P1 , . . . , P7 are the parity check bits. The code can also be represented by Figure 3. In this case, the parity check equations are equivalent to that the sum of rows and the sum of columns are all zero. According to (37)-(43), every failed node (either systematic or parity) can be recovered by two different repair groups of size r = 3. For instance, if C1 is failed, it can be repaired by repair group RC1 1 = {C2 , C3 , P1 } or repair group RC2 1 = {C4 , C7 , P4 }. Notice that the two repair groups are disjoint. Therefore, even if one of the repair groups is not available, there exists an alternative repair group to locally repair the failed node. It can be verified easily that our code has a minimum distance of 4 and it is a (3, 3, 1, 1) robust locally repairable code. Therefore, any failed node can be repaired by at least ζ = 1 repairing group of size r = 3 in the presence of any Γ = 1 extra failure. Also, the original data can be recovered even if there are β = 3 simultaneous failure. In fact, it is also a (3, 3, 0, 2) robust locally repairable code. 26 Group 1 C1 C2 C3 P1 C4 C5 C6 P2 C7 C8 C9 P3 P4 P5 P6 P7 Group 2 Fig. 3. A (3,3,1,1) robust locally repairable code of length N = 16 and dimension K = 9. Now, we will use the bound obtained earlier to show that our code is optimal. We have plotted our bound in Figure 4 when n = 16 and β = 3. The horizontal axis is the code locality (i.e., r) and the vertical axis is the dimension of the code (or log |C|). From the figure, when r = 3, the dimension of a (3, 3, 1, 1) robust locally repairable code is at most 9. And our constructed code has exactly 9 dimensions. Therefore, our code meets the bound and is optimal. In fact, our bound also indicates that the dimension of a (3, 3, 0, 2) robust locally repairable code is also at most 9. Therefore, our code is in fact an optimal (3, 3, 1, 1) and (3, 3, 0, 2) robust locally repairable code. Maximum numb er of data blocks 11 Γ =0 and ζ=2 Γ =1 and ζ=1 10 r =3 k=9 9 8 7 0 1 2 3 4 5 6 7 8 9 10 11 12 Repairing group size r Fig. 4. Upper bounds for (3, 3, Γ, ζ) binary robust locally repairable code of length n = 16. 27 Example 2: Consider a binary linear code of length n = 8 and dimension k = 4 defined by the following parity check equations: P1 = C 1 + C 2 + C 3 (44) P2 = C 1 + C 2 + C 4 (45) P3 = C 2 + C 3 + C 4 (46) P4 = C 1 + C 3 + C 4 (47) Again, C1 , . . . , C4 are the information bits while P1 , . . . , P4 are the parity check bits. The code can be represented by Figure 5. The above parity check equations imply that the sum of any node and its three adjacent nodes in Figure 5 is always equal to zero. This code has a minimum distance of 4. According to the Equations (44)-(47), for every single node failure, there exists 7 repair groups with size r = 3. For example, suppose C1 fails. Then, the repair groups are R1C1 = {3, 4, 8}, R2C1 = {2, 4, 6}, R3C1 = {2, 3, 5} R4C1 = {2, 7, 8}, R5C1 = {3, 6, 7}, R6C1 = {4, 5, 7} R7C1 = {5, 6, 8} Hence, our code is a (3, 3, 0, 7) robust locally repairable code. Furthermore, it can be directly verified that for any distinct i, j 6= 1,  ℓ : i 6∈ RℓC1 and  =4 ℓ : {i, j} ∩ RℓC1 = ∅ (48) = 2. (49) Therefore, if any one of the surviving nodes is not available, (48) implies that there are still 4 alternative repair groups. This means that our code is also a (3, 3, 1, 4) robust locally repairable code. Similarly, by (49), our code is also a (3, 3, 2, 2) robust locally repairable code. As shown in our bound (see Figure 6), our code has the highest codebook size for the given parameters among all binary (3, 3, 0, 7), (3, 3, 1, 4) and (3, 3, 2, 2) robust locally repairable codes. 28 1 6 C1 5 2 P1 C2 8 3 C3 P2 4 P4 C4 7 P3 Fig. 5. A robust locally repairable code of length n = 8 and dimension k = 4 with ζ = 7 repair group for any failure. Maximum numb er of data blocks k 4 r =3 k =4 Γ=0 and ζ=7 Γ=1 and ζ=4 Γ=2 and ζ=2 3 2 1 1 2 3 4 Repairing Group Size r Fig. 6. Upper bounds for (3, 3, Γ, ζ) binary robust locally repairable code of length n = 8. VII. C ONCLUSION In this paper, we characterised the coding scheme for robust locally repairable storage codes. This coding scheme overcomes a significant issue of the locally repairable codes which is their repair inefficiency under the circumstances when there exist extra failures or unavailability in the network. This coding scheme guarantees the local repairability of any failure at the presence of extra failures by constructing multiple local repair groups for each node in the network. In this 29 case, if any of the repair groups is not available during the repair process, there exist alternative groups to locally repair the failed node. We also established a linear programming problem to upper bound the size of these codes. This practical bound can optimise the trade-off between different parameters of the code such as minimum distance, code length, locality, the number of alternative repair groups, and the number of the extra failures. The update efficiency of the storage networks was addressed. We characterised an update efficient storage code such that any changes in the stored data will result in a small number of node updates. The necessary conditions was established which can be used to prove the existence of an updated efficient code. We also showed how the symmetries in the codes can be exploit to significantly reduce the complexity of the constraints in the linear programming problem and in the necessary conditions. R EFERENCES [1] T. H. Chan, M. A. Tebbi, and C. W. Sung, “Linear programming bounds for storage codes,” in 9th International Conference on Information, Communication, and Signal Processing (ICICS 2013), Dec. 2013. [2] M. A. Tebbi, T. H. Chan, and C. Sung, “Linear programming bounds for robust locally repairable storage codes,” in proc. Information Theory Workshop (ITW), 2014 IEEE, Nov. 2014, pp. 50–54. [3] F. J. Macwilliams and N. J. A. Sloane, The Theory of Error Correcting Codes, North Holland, Amsterdam, 1977. [4] W. J. Bolosky, J. R. Douceur, D. ELY, and M. Theimer, “Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs,” in Proc. of Sigmetrics, June 2000. [5] P. Druschel and A. Rowstron, “Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility,” in Proc. of ACM SOSP, 2001. [6] Y. Chen, J. Edler, A. Goldberg, S. S. A. Gottlieb, and P. Yianilos, “Prototype implementation of archival intermemory,” in Proc. of IEEE ICDE, Feb. 1996, pp. 485–495. [7] S. Rhea, C. Wells, P. Eaton, D. Geels, B. Zhao, H. Weatherspoon, and J. Kubiatowicz, “Maintenance free global storage in oceanstore,” in Poc. of IEEE Internet Computing, 2001, pp. 40–49. [8] D. A. Patterson, G. Gibson, and R. Katz, “A case for redundant arrays of inexpensive disks (raid),” Computer Science Division, Department of Electrical Engineering and Computer Science, University of California, Berkeley, CA 94720, Tech. Rep. CSD-87-391, Dec. 1987. [9] J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao, “Oceanstore: An architecture for global-scale persistent storage,” in Proc. 9th Int. Conf. Architectural Support Programm. Lang. Oper. Syst., Boston, MA, Nov. 2000, pp. 190–201. [10] R. Bhagwan, K. Tati, S. S. Y. Cheng, and G. Voelker, “Total recall: System support for automated availability management,” in Proc. NSDI ’04. [11] M. Blaum, J. Brady, J. Bruck, and J. Menon, “Evenodd: An efficient scheme for tolerating double disk failures in raid architectures,” IEEE Trans. Inf. Theory, vol. 44, pp. 192–202, 1995. [12] M. Blaum, J. Bruck, and A. Vardy, “Mds array codes with independent parity symbols,” IEEE Trans. Inf. Theory, vol. 42, pp. 529–542, 1996. 30 [13] S. B. Wicker, Error Control Systems for Digital Communication and Storage. Englewood Cliffs, NJ: Prentice Hall, 1995. [14] H. Weatherspoon and J. D. Kubiatowicz, “Erasure coding vs. replication: A quantitative comparison,” in Proc. Int. Workshop Peer-to-Peer Syst., 2002. [15] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4539–4551, Sep 2010. [16] P. Gopalan, C. Huang, H. Simitci, and S. Yekhanin, “On the locality of codeword symbols,” IEEE Trans. Inf. Theory, vol. 58, no. 11, pp. 6925–6934, Nov. 2012. [17] L. Pamies-Juarez, H. D. Hollmann, and F. Oggier, “Locally repairable codes with multiple repair alternatives,” in proc. IEEE Int. Symp. Information Theory, 2013, pp. 892–896. [18] A. S. Rawat, D. S. Papailiopoulos, A. G. Dimakis, and S. Vishwanath, “Locality and availability in distributed storage,” in proc. IEEE Int. Symp. Information Theory, 2014, pp. 681–685. [19] A. Wang and Z. Zhang, “Repair locality from a combinatorial perspective,” in proc. IEEE Int. Symp. Information Theory, July 2014, pp. 1972–1976. [20] A. S. Rawat, A. Mazumdar, and S. Vishwanath, “On cooperative local repair in distributed storage,” in 48th Annual Conference on Information Sciences and Systems (CISS), March 2014, pp. 1–5. [21] C. Huang, M. Chen, and J. Li, “Pyramid codes: Flexible schemes to trade space for access efficiency in reliable data storage systems,” Microsoft Research, Tech. Rep. MSR-TR-2007-25, March 2007. [22] F. Oggier and A. Datta, “Self-repairing homomorphic codes for distributed storage systems,” in proc. IEEE INFOCOM, 2011, pp. 1251–1223. [23] D. Papailiopoulos, J. Luo, A. Dimakis, C. Huang, and J. Li, “Simple regenerating codes: Network coding for cloud storage,” in proc. IEEE INFOCOM, March 2012, pp. 2801–2805. [24] I. Tamo, D. Papailiopoulos, and A. Dimakis, “Optimal locally repairable codes and connections to matroid theory,” in proc. IEEE Int. Symp. Information Theory, Istanbul, July 2013, pp. 1814–1818. [25] N. Silberstein, A. Rawat, O. Koyluoglu, and S. Vishwanath, “Optimal locally repairable codes via rank-metric codes,” in proc. IEEE Int. Symp. Information Theory, Istanbul, July 2013, pp. 1819–1823. [26] I. Tamo and A. Barg, “A family of optimal locally recoverable codes,” IEEE Trans. Inf. Theory, vol. 60, no. 8, pp. 4661–4676, July 2014. [27] D. S. Papailiopoulos and A. G. Dimakis, “Locally repairable codes,” in proc. IEEE Int. Symp. Information Theory, Cambridge, MA, July 2012, pp. 2771–2775. [28] I. Tamo and A. Barg, “Bounds on locally recoverable codes with multiple recovering sets,” in proc. IEEE Int. Symp. Information Theory, Honolulu, HI, July 2014, pp. 691–695. [29] V. Cadambe and A. Mazumdar, “An upper bound on the size of locally recoverable codes,” in proc. Int. Symp. Network Coding (NetCod), Calgary, AB, June 2013, pp. 1–5. [30] S. Kadhe and R. Calderbank, “Rate optimal binary linear locally repairable codes with small availability,” in Proc. IEEE Int. Symp. Information Theory, Aachen, Germany, June 2017, pp. 166–170. [31] N. Prakash, V. Lalitha, and P. Kumar, “Codes with locality for two erasures,” in Proc. IEEE Int. Symp. Information Theory (ISIT), June 2014, pp. 1962–1966. [32] B. Chen, S.-T. Xia, and J. Hao, “Locally repairable codes with multiple (ri , δi )-localities,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Aachen, Germany, June 2017, pp. 2038–2042. [33] N. Prakash, G. M. Kamath, V. Lalitha, and P. V. Kumar, “Optimal linear codes with a local-error-correction property,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Cambridge, MA, U.S.A., Jul. 2012, pp. 2776–2780. 31 [34] A. Zeh and E. Yaakobi, “Bounds and constructions of codes with multiple localities,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Barcelona, Spain, Jul. 2016, pp. 640–644. [35] S. Kadhe and A. Sprintson, “Codes with unequal locality,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Barcelona, Spain, Jul. 2016, pp. 435–439.
7cs.IT
An accurate finite element method for the numerical solution of isothermal and incompressible flow of viscous fluid, part I: computational analysis arXiv:1709.00913v2 [cs.CE] 21 Mar 2018 B. Emek Abali ∗† Abstract Despite its numerical challenges, finite element method is used to compute viscous fluid flow. A consensus on the cause of numerical problems has been reached; however, general algorithms—allowing a robust and accurate simulation for any process—are still missing. Either a very high computational cost is necessary for a direct numerical solution (DNS) or some limiting procedure is used by adding artificial dissipation to the system. These stabilization methods are often applied relative to the element size such that a local monotonous convergence cannot be observed. We need a computational strategy for solving viscous fluid flow using only the balance equations. In this work, we present a general procedure solving fluid mechanics problems without use of any stabilization or splitting schemes. Hence its generalization to multiphysics applications is straight-forward. We discuss several numerical problems and present the methodology rigorously. Implementation is achieved by using open-source packages and the accuracy as well as the robustness is demonstrated by comparing results to the closed-form solutions and by solving benchmarking problems. 1 Introduction Isothermal flow of viscous fluid is governed by balance equations of mass and linear momentum: ∂ρ ∂vi ρ + =0, ∂t ∂xi  ∂ρvj ∂  + vi ρvj − σij = ρgj , ∂t ∂xi (1) in Cartesian coordinates, where ρ denotes the mass density, vi the velocity, σij the non-convective flux term (Cauchy’s stress), gi the specific supply (gravitational forces); here and henceforth we apply Einstein’s summation convention to repeated indices. In the case of Newtonian fluids such as water, oil, or alcohol, a linear relation for stress furnishes the governing equations with accurate detail. This linear relation is the well-known Navier–Stokes equation: σij = (−p + λdkk )δij + 2µdij , dij = ∂vj  1  ∂vi + , 2 ∂xj ∂xi (2) with the material constants λ, µ; and a new parameter p called hydrostatic pressure. Consider a control volume initially filled with homogeneous water, i.e., initial mass density is constant in space. Under conventional pressure differences, we assume an incompressible flow, thus, the mass density remains constant in time. For the constant (in space and time) mass density, we obtain from the mass balance, ∂vi =0, ∂xi (3) which is used for computing the pressure p. For an incompressible flow, the mechanical pressure − 13 σii becomes identical to the hydrostatic pressure p such that we handle p as the pressure generated in a pump. Velocity and ∗ Corresponding † Technische author, email: [email protected] Universität Berlin, Institute of Mechanics 1 pressure fields have to satisfy Eqs. (1)2 and (3). In analytical mechanics, the aforementioned equations are fulfilled locally (in every infinitesimal point in space). For a computation we discretize the space, for example with elements in finite size called the finite element method (FEM). Within each element, the analytical functions for the unknowns vi and p are represented by form (shape) functions with a local support, i.e., by means of a discrete element. The shape functions are not smooth, they belong to C n with a finite n. In other words, the unknowns are finitely differentiable and depending on the governing equations and constitutive relations—from the mathematical analysis in [7]—we know that the correct choice of the form functions for velocity and pressure is of paramount importance for a robust computation. This so-called Ladyzhenskaya–Babuska–Brezzi (inf-sup compatibility) condition (LBB condition) tells us how to adjust the shape functions of velocity and pressure in the case of an isothermal and incompressible flow. The prominent Taylor–Hood element is often used for the isothermal and incompressible fluid flow problems. If one wants to include temperature deviation and electromagnetism into the computation, we fail to know the corresponding LBB condition for all shape functions (velocity, pressure, temperature, and electromagnetic fields). For practical purposes, a robust computation without exploiting the LBB condition is useful for a straight-forward extension to multiphysics applications. Within a finite element, the governing equations are satisfied globally (over the domain of the element). There exists a general assumption that we can use the same local governing equations holding globally in finite elements; however, this strategy leads to several numerical problems and to various proposals in [11, 29, 30, 48, 45, 21, 10, 13, 25], for a review of such suggestions see [37]. These so-called stabilization methods introduce a numerical parameter depending on the underlying mesh. This parameter induces an artificial viscosity in the direction of the velocity change for suppressing and eliminating the numerical oscillations. Otherwise, a computation is not possible since the numerical oscillations cause divergence of any numerical solution scheme. There are several successful implementations as in [32, 42, 31, 19, 28, 36, 20, 6]. From a practical point of view, such a stabilization method is very useful; however, introducing numerical parameters is problematic. These parameters are mesh dependent or they need to be tuned depending on the application. Tunable parameters cannot be measured such that an error estimation is not possible and most of the methods are conditionally stable, see [8]. A computation depending on the mesh size fails to show a local convergence, see references in [12] about accuracy problems of different techniques. We need to design a computation strategy for viscous fluid flows by using only physical (measurable) parameters such that a local monotonous convergence can be achieved by using FEM. Indeed, numerical strategies exist for performing accurate simulations without numerical parameters. By using small elements—smaller than the characteristic length scale, for example Kolmogorov scale—we can overcome the numerical problems. This direct numerical simulation (DNS) is accurate and robust; however, it is often not feasible without access to super-computers. There is another class of so-called splitting or projection methods such as Chorin’s method or its derivatives as in [17, 46, 47, 24, 9, 49, 14]. These methods are reliable but it is challenging to adopt a splitting method in multiphysics. The briefly mentioned problems are well known in the literature such that various new computation methods are suggested for viscous flow problems. The (numerical) parameter free approach in [18] shows 2D and 3D results for stationary viscous flows without the nonlinear convection term (often called Stokes’s problem). Based on this idea an under-integrated mass matrix is used in [26, 34] to perform simulations without stabilization terms in 2D. Several mesh-dependent stabilization terms and their connections to mesh-independent stabilization methods are investigated in [15]. In [40] vorticity is used instead of velocity such that a new kind of splitting scheme is proposed for solving 3D problems. In [2] balance equations of mass, momentum, angular momentum, and energy are used for performing 3D computations without numerical parameters; however, the method already uses the energy equation making a generalization for the non-isothermal case quite difficult. In [41] vorticity is introduced as an independent term ensuring that the balance of moment of momentum is satisfied, only in 2D numerical solutions are performed without necessitating any (numerical) parameters. In [16] different strategies are performed for establishing 3D simulations. They are all based on writing the nonlinear convection term in a different (mathematically equivalent) form. In [22] a gradient-velocity-pressure formulation is suggested to solve 2D numerical experiments. In this work, we discuss a special yet general case, namely an isothermal and incompressible flow. For understanding the numerical problems, often, the pressure related numerical problems and velocity related numerical problems are studied separately. We use one balance equation for calculating the pressure and 2 another balance equation for calculating the velocity. These balance equations are coupled such that we fail to uniquely identify which balance equation is to be used for pressure and velocity. Therefore, more robust numerical strategies use both balance equations for both of the unknowns, this approach has already been undertaken in Chorin’s method and then extensively used by the pressure stabilized Petrov–Galerkin method (PSPG). We use essentially the same strategy herein by motivating this approach from a different perspective. Numerical problems are surpassed by incorporating the balance of angular momentum delivering the necessary smoothness for the pressure. Conventionally, the balance of angular momentum is neglected since it is already fulfilled locally by the balance of linear momentum (for the case of non-polar fluids). Furthermore, we discuss the integration by parts and suggest another approach than usually see in the literature. We explain in detail how to generate the weak form. Additionally, we emphasize that the weak form can be extended to fluid structure interaction or multiphysics problems very easily. We use open-source packages developed under the FEniCS project1 and solve some academic examples in order to present the accuracy, local monotonous convergence, and robustness of the proposed methodology. All codes are made public on the web site in [3] to be used under the GNU Public license as in [23] for promoting an efficient scientific exchange as well as further studies. 2 Variational formulation Consider the following general balance equation: !• Z Z Z z dv + ψ dv = (f + φ) da , (4) ∂Ω Ω Ω where the rate of the variable ψ is balanced with the supply term z acting volumetrically and with the flux terms—convective f and non-convective φ—applying on the surface ∂Ω of a domain (control volume) Ω. By using Table 1 we can obtain the balance equations of mass, linear momentum, and angular momentum. The Table 1: Volume densities, their supply and flux terms in the balance equations. ψ z f φ ρ 0 ni (wi − vi )ρ 0 ρvj ρgj ni (wi − vi )ρvj σij ρ(sj + jkl xk vl ) ρ(`j + jkl xk gl ) ni (wi − vi )ρ(sj + jkl xk vl ) mij + jkl xk σil domain may have its own velocity x•i = wi independent on the velocity of the fluid particle, vi . For a discussion of the balance equations in a control volume with the domain velocity, we refer to [38, 39]. This domain velocity can be chosen arbitrarily without affecting the underlying physics. For the sake of clarity, consider an experiment where we record the motion of fluid by means of a high-speed camera. We may move the camera arbitrarily, the motion of the fluid fails to alter. Normally we fix the camera to the laboratory frame such that the domain has no velocity, wi = 0. We will use this assumption of a fixed domain having two consequences. First, the time rate reads ∂(·) ∂(·) ∂(·) ∂(·) ∂(·) (5) + x•i = + wi = . (·)• = ∂t ∂xi ∂t ∂xi ∂t Second, the rate of the infinitesimal volume element vanishes dv• = ∂wi dv = 0 . ∂xi (6) The domain velocity becomes important in computer methods for fluid structure interaction. We start with the balance of mass for a fixed domain and apply the Gauss–Ostrogradskiy theorem Z Z ∂ρ dv = − ni vi ρ da , Ω ∂t ∂Ω Z Z (7) ∂ρ ∂vi ρ dv = − dv . Ω ∂t Ω ∂xi 1 The FEniCS computing platform, https://fenicsproject.org/ 3 We assume that initially the fluid rests, vi (x, t = 0) = 0, and it is a homogeneous material, ρ(x, t = 0) = const. Moreover, we assume that the flow is incompressible, i.e., the mass density remains constant in time, ∂ρ/∂t = 0. Then the mass density is constant in space and time throughout the simulation leading to Z ∂vi dv = 0 . ρ (8) Ω ∂xi We multiply the latter with an arbitrary test function with the same rank of the integrand, i.e., a scalar. Having an arbitrary test function ensures that the global condition holds locally as well. According to the Galerkin approach, we will choose the test functions from the same space as the unknowns vi and p. Therefore, it is natural to use δp and δvi as possible test functions. We emphasize that the choice of the scalar test function is critical and we suggest to use Z ∂vi δp dv = 0 , ρ (9) Ω ∂xi which is also the common procedure in the literature. Actually, by multiplying with the test function, we started to utilize the discrete representation of the continuous velocity field. We omit a clear distinction in the notation since we never use continuous and discrete functions together in one equation. For the balance of linear momentum, the procedure is the same, we acquire for a fixed domain and incompressible flow   Z  Z  ∂vi vj ∂σij ∂vj dv = ρgj − ρ + dv . (10) ρ ∂t ∂xi ∂xi Ω Ω The integrand is a vector, hence, we use the test function δvi as being the usual case in the literature,  Z  ∂vi vj ∂vj ∂σij − ρgj + ρ ρ − δvj dv = 0 . ∂t ∂xi ∂xi Ω (11) We refrain ourselves from inserting the mass balance, ∂vi /∂xi = 0, into the latter formulation. Since this condition is tested by δp, we cannot expect that it is fulfilled for the velocity distribution such that we choose to enforce it by leaving the formulation as it is. The same formalism is applied for the balance of angular momentum—for an incompressible flow ρ = const|x,t within a fixed domain x•i = wi = 0—leading to Z  Z Z  ∂sj ∂vl  ρ + ρjkl xk dv = (ρ`j + ρjki xk gi ) dv + ni − vi ρ(sj + jkl xk vl ) + mij + jkl xk σil da , ∂t ∂t Ω Ω ∂Ω  Z   ∂sj ∂ ∂vl ρ + ρjkl xk − ρ`j − ρjki xk gi − − vi ρ(sj + jkl xk vl ) + mij + jkl xk σil dv = 0 , ∂t ∂t ∂xi Ω  Z  ∂sj ∂vl ∂vi sj ∂vi vl ∂mij ∂σil ρ + ρjkl xk − ρ`j − ρjki xk gi + ρ + ρjkl xk − − jil σil − jkl xk dv = 0 , ∂t ∂t ∂xi ∂xi ∂xi ∂xi Ω (12) where ∂xi /∂xj = δij and the spin density si , its flux term (couple stress) mij , and its supply `i vanish for a non-polar medium like water (furnishing a symmetric stress). Then the angular momentum is identical to the moment of (linear) momentum,   Z ∂vi vl ∂σil ∂vl − ρgl + ρ − dv = 0 , jkl xk ρ ∂t ∂xi ∂xi Ω  (13) Z  ∂vl ∂vi vl ∂σil ρ − ρgl + ρ − dv = 0 , ∂t ∂xi ∂xi Ω hence, in analytical mechanics, we can neglect it. However, we observe this term as an important term for resolving numerical challenges. Thus, we want to enforce it by multiplying the balance of angular momentum by a vector test function. If we multiply the balance of angular momentum for non-polar medium by δvl , then the outcome is identical to the variational form in Eq. (11). However, if we multiply by ∂δp/∂xl we obtain a restriction about the gradient of pressure, which is indeed the missing condition for the necessary numerical smoothness for pressure. We may see this condition related to the LBB condition; however, we enforce it by using an additional integral form instead of changing the order of shape functions. The same term multiplied by the mesh size is added in PSPG for the sake of a pressure stabilization. Herein we use it in equal manner for 4 every finite element independent of their size. The variational formulation for the balance of angular momentum reads  Z  ∂vl ∂vi vl ∂σil ∂δp ρ − ρgl + ρ − dv = 0 , (14) ∂t ∂xi ∂xi ∂xl Ω which is one of the key contribution of this work providing stability and robustness. We solve the transient integral forms in discrete time slices with a time step ∆t, this discretization in time can be established by using Euler backwards method vi − vi0 ∂vi = , ∂t ∆t (15) where vi0 indicates the value from the last time step. This implicit method is stable (for real valued problems) and easy to implement. 3 Generating the weak form We have to bring integral forms in Eqs. (9), (11), (14) into the same unit such that they can be summed up. We divide Eq. (9) by the mass density ρ and bring it to the unit of power. Equation (11) is already in the unit of power. We divide Eq. (14) by the mass density and multiply it by the time step ∆t and bring it also to the unit of power. We rewrite the constitutive equation, σij = −pδij + τij , by combining all terms with dij into τij . The symmetric part of the velocity gradient, dij , thus, the term τij , include already velocity’s first derivative in space. Therefore, we need to have a representation of the velocity function, which is at least C 1 continuous. In the integral forms we observe another space derivative to τij leading to class C 2 for velocity approximation. This condition can be weakened by integrating by parts. We emphasize that the integration by parts is applied only on the terms already including a differentiation in order to switch one differentiation to the test function. This strategy is not conventional. Often, integration by parts is used to all flux terms. We observe numerical problems by using an integration by parts to all flux terms such that we suggest the method presented herein, which is another key contribution of this work. After bringing to the same unit and integrating by parts where necessary, we obtain Z F1 = vi,i δp dv , Ω  Z vj − vj0 δvj − ρgj δvj + ρ(vi vj ),i δvj + p,i δvi + τij δvj,i dv − ρ ni τij δvj da , ∆t ∂Ω Z   ∆t F3 = (vj − vj0 ) − ∆tgj + ∆t(vi vj ),i − (−pδij + τij ),i δp,j dv , ρ Ω Z  F2 = Ω (16) by using the usual comma notation for space derivative (),i = ∂()/∂xi . The weak form Form Ω = F1 + F2 + F3 (17) for one finite element reads zero by inserting the correct pressure and velocity distribution. A control volume is P decomposed into several elements such that the assembly over all elements, Form = e F Ω , is the weak form for the whole control volume. The sum over elements generate on the element boundaries the following term Jni τij K = Jni (σij + pδij )K (18) with jump brackets J(·)K indicating the difference between the values of the quantity computed in adjacent elements. We use continuous form elements for pressure and velocity such that Jni pK = 0, moreover, we enforce Jni σij K = 0 relying on the balance of linear momentum on singular surfaces. Therefore, the integral term along the element boundaries vanish within the control volume. On the boundaries of the control volume either velocity or pressure is given. For the parts, where velocity is given, we choose δvi = 0 such that the boundary term vanishes. For the parts, where the water enters the domain with a prescribed pressure p against the plane outward, ti = −pni , we obtain ni τij = ni (σij + pδij ) = tj + nj p = 0. Therefore, all boundary terms vanish in the weak form for an incompressible flow. 5 4 Algorithm and computation Continuous finite elements are used for all simulations in three-dimensional (3D) space. We use tetragonal elements with form functions of degree n = 1, hence, every element in 3D consists of four nodes. The primitive variables are pressure and velocity and they are represented with their nodal values interpolated using the form functions. Concretely, 4 primitive variables P = {p, v1 , v2 , v3 } in three-dimensional space belong to  (19) V = P ∈ [Hn (Ω)]4 : P |∂Ω = given , where [Hn ]4 is a 4-dimensional Hilbert space of class C n as defined in [27] with additional differentiability properties such that it is called a Sobolev space. The test functions, δP = {δp, δv1 , δv2 , δv3 }, stem from the same space  (20) V̂ = δP ∈ [Hn (Ω)]4 : δP |∂Ω = given , which is the Galerkin approach. We use n = 1 for all simulations, in other words, we use the same linear form functions for pressure and for velocity. The spurious oscillations do not occur owing to the additional governing equation restricting the pressure gradient as well as the careful choice of terms to integrate by parts. The weak form is nonlinear and coupled such that we need to linearize and solve it monolithically. For the linearization we follow the ideas in [35, Part I, Sect. 2.2.3] and perform an abstract linearization using Newton’s method at the partial differential level. The functional Form= F (P , δP ) is an integral of the function depending on the primitive variables P and their variations (test functions) δP . We know the correct values of P at t0 . The weak form is initially zero—we obtained it by subtracting left-hand sides from right-hand sides in the balance equations. We search for the next time step, t = ∆t + t0 , by using the known P . This algorithm holds for every time steps, since we compute subsequently in time. We may describe the algorithm: given: P (t) for x , find: P (t + ∆t) at x , (21) satisfying: F (P (t + ∆t), δP ) = 0 . Now, by rewriting the unknowns P (t + ∆t) in terms of the known values P (t + ∆t) = P (t) + ∆P (t) , (22) we redefine the objective to searching for ∆P (t) instead of P (t + ∆t). If ∆t is chosen sufficiently small, then the solution is near to the known solution such that ∆P (t) is small. This condition leads to a Taylor expansion around the known values, P (t), up to the (polynomial) order one F (P + ∆P , δP ) = F (P , δP ) + ∇P F (P , δP ) · ∆P , (23) where we omit the time argument for the sake of clarity in notation. The expansion is linear in ∆P , hence we need to construct a linear in ∆P differentiation operator, ∇P , which is established by the so-called Gateaux derivative: d (24) F (P + ∆P , δP ) , ∇P F (P , δP ) · ∆P = lim →0 d where  is an arbitrary parameter. Since we first differentiate in  and then set the parameter  equal to zero, only terms of order one in ∆P remain in the solution. By introducing the so-called Jacobian: J (P , δP ) = ∇P F (P , δP ) , (25) we rewrite the algorithm, given: P for x , find: ∆P at x , (26) satisfying: F (P , δP ) + J (P , δP ) · ∆P = 0 . The last line is a linear function in ∆P such that we can solve the equation by obtaining ∆P and update the solution in an iterative manner, P := P + ∆P , (27) where “:=” is an assign operator in computational algebra. Here is the ultimate algorithm: while |∆P | > TOL. solve ∆P , where F (P , δP ) + J (P , δP ) · ∆P = 0 P := P + ∆P 6 (28) The term J · ∆P is computed automatically by means of symbolic differentiation implemented under the name SyFi within the FEniCS project, see [4], [5]. This automatic linearization procedure allows us to use any nonlinear constitutive equation in the code. Herein we use a linear constitutive equation in order to achieve a comparison with closed-form solutions. The geometry is constructed in Salome2 by using NetGen algorithms3 for the triangulation. Then the mesh is transformed as explained in [1, Appendix A.3] and implemented in a Python code using packages developed by the FEniCS project, which is wrapped in C++ and solved in a Linux machine running Ubuntu.4 5 Comparative analysis The suggested weak form is implemented and solved for various problems. First, we examine the accuracy and convergence behavior by comparing to semi-analytical closed-form solutions for simple geometries, we call them analytical solutions. They are well-known and can be found in different textbooks, for example see [43]. This analysis is of importance to present the local monotonous convergence that is the important feature of the FEM. For a flow problem, we increase the accuracy at every point by decreasing the mesh size. Second, we present benchmarking problems in 2D and 3D in order to verify the robustness of the method. 5.1 Steady state Hagen–Poiseuille flow Consider a laminar flow in an infinite pipe as a result of the given pressure difference. This configuration is called the Hagen–Poiseuille flow and it has a steady-state solution obtained in cylindrical coordinates, r, θ, z, under the assumption that the flow is only along the pipe. The pipe is oriented along z, which is set as the axis of the pipe. No-slip condition, vi = 0, is applied on the outer walls, r = a. The steady-state solution reads   0   0  (29) vi =  2  ,  dp a2  r 1− 2 − dz 4µ a for an incompressible flow of a linear viscous fluid like water of viscosity µ. We use this solution for an analysis of the convergence and accuracy. A pipe of length ` is constructed and on the inlet and outlet the pressure is given as Dirichlet boundary conditions, p(z = 0) = pin and p(z = `) = pout . The flow is driven by the pressure difference such that the gravity is neglected. Moreover, we are interested in the steady-state where the inertial term vanishes. In order to mimic the infinite pipe, we set the radial and circumferential velocities zero on the inlet and outlet. FEM computation is realized in Cartesian coordinates, so we basically allow vz on inflow plane x = 0 and outflow plane x = ` by setting vx = vy = 0 as Dirichlet conditions. The pressure distribution is expected to be linear along z, hence, for the analytic solution dp/ dz = (pout − pin )/`. For a better comparison we use the diameter D as the characteristic length and half of the maximum velocity, vzM = vz (r = 0), as the characteristic velocity for calculating the Reynolds number: Re = vzM Dρ . 2µ (30) For a small pipe of an inch long and a quarter inch wide, we construct the mesh by using a global element length h. We use SI units such that ` = 25.4 mm and D = 6.35 mm and water as the fluid with ρ = 998.2 · 10−6 g/mm3 , µ = 1001.6 · 10−6 Pa s , λ = 0.6 Pa s . (31) Especially the choice of λ is of importance since this parameter is not measured directly. Although λ is a physical and measurable quantity, for the conventional pressure the incompressibility makes the measurement of λ very challenging. In the constitutive equation in Eq. (2), the term λdkk vanishes for the correct velocity solution. Therefore, for the numerical sense, λ has to be great enough that dkk is enforced to vanish. Hence, we choose λ multiple times greater than µ, in reality (for compressible flows) λ and µ are independent parameters. Interestingly, we have observed that choosing λ greater than suggested value slows down the convergence. In other words, by doubling λ the same accuracy of the solution is obtained with more degrees of freedom (DOF). 2 Salome, the open-source integration platform for numerical simulation, http://www.salome-platform.org Mesh Generator, https://sourceforge.net/projects/netgen-mesher/ 4 Ubuntu, open source software operating system, https://www.ubuntu.com/ 3 Netgen 7 Its value does not change the convergence behavior, as long as it is great enough. In order to determine the value of λ, we simply decreased until the maximum Re was achieved. Less than the used value leads to numerical problems in the Newton–Raphson iterations. By using a standard convergence analysis, we compare three different meshes starting with a global edge length of tetrahedrons, h = 0.6 mm, then reducing it by half. Every time a new mesh is generated such that the number of nodes fail to increase exactly by 23 times in 3D. We use an unstructured mesh and the mesh quality is nearly identical because of using the same algorithm on the relatively simple geometry. The expected monotonic convergence has been attained and can be seen in Fig. 1 for 2 different Reynold numbers. Two (a) Re = 313 (b) Re = 940 Figure 1: Computation of steady state solution and its comparison to the analytic solution in a pipe for two different Reynolds numbers. important facts need to be underlined. First, the parabolic distribution of the velocity along the diameter is achieved even with a coarse mesh. Second, the relative error is 1.1% at r = 0 for a low Reynolds number and 4.1% at r = 0 for a high Reynolds number by using mumps direct solver. 5.2 Starting Hagen–Poiseuille flow In order to test the accuracy in the transient simulation, we use the same configuration and solve it transiently in time. Since we have obtained the expected convergence in space discretization for the steady-state solution, we expect to have a monotonic convergence in time discretization, too. Therefore, we solve the same example with different time steps from t = 0 to t = 10 s with the initially applied pressure difference. For this case there is a closed-form solution under the same assumptions as before,   0   0    N vi =  (32)  , r 2 2 X J0 (Λn a ) r  dp a  − 1− 2 − 8 3 exp(−Λ2n τ ) dz 4µ a Λn J1 (Λn ) n=1 with τ = tµ/(ρa2 ) and Bessel functions (of the first kind) J0 and J1 with Λn being the roots of J0 . We compute the (semi-)analytical solution by using SciPy packages for Bessel functions as well as its roots and choose N = 50. By choosing the best mesh obtained from the convergence analysis in the steady-state case, namely the mesh with h = 0.15 mm, we compute the solution transiently in time by using different time steps. We present in Fig. 2 the maximum value vz (r = 0, t) over time for different time steps showing the expected convergence with decreasing time steps as well as the distribution at different time instants for the smallest time step. In addition to the convergence in time, the relative error remains unchanged over time. We conclude that the suggested formalism is capable of simulating a simple, laminar, three-dimensional flow of a linear viscous fluid accurately under a monotonic loading. The velocity and pressure distributions show no artifacts or mesh dependency as presented in Fig. 3. We have used mumps direct solver for achieving the highest accuracy in the numerical solution. We emphasize that the pressure difference is applied instantaneously, which is numerically challenging. For transient loading scenarios, there are various assumptions used for obtaining a closed-form solution such that we omit to examine further. Based on the presented examples, we conclude that the approach delivers an accurate solution. 8 (a) ∆t = {1, 0.5, 0.25} s (b) ∆t = 0.25 s Figure 2: Computation of transient solution and its comparison to the analytic solution in a pipe for Re = 313. Figure 3: Velocity solution (direction as scaled arrows and magnitude as colors) and pressure solution (as colors) of the transient pipe flow at t = 5 s, shown on the half of the pipe (upper part: velocity and lower part: pressure) for Re = 313. 9 5.3 Flow over an obstacle As suggested in [44] we implement a benchmarking problem in 2D and 3D. These benchmarking problems are designed to test a new method or code. They are well analyzed and the expected results are known. Both problems compute the viscous flow around an obstacle. The first problem is in 2D and we use the scaling as in [44] (for the 2D-2 case) such that the geometry is in meter length scale. A rectangle of ` = 2.2 m × H = 0.41 m has a circular obstacle of radius 0.05 m located at (0.2, 0.2). On the upper and lower walls as well as on the obstacle fluid adheres to the resting walls. Fluid is pumped in from left and because of the unsymmetrical placement of the obstacle, fluid around the hole gets perturbed. After a short amount of time, repeating pattern of vortices appear behind the obstacle. This so-called von Karman vortex street is well-known in the literature and a new numerical method has to be capable of reconstructing this phenomenon. On the right the Dirichlet boundary condition for the pressure p = pref. is set. On the left the velocity profile: ! 4y(H − y) v m , (33) vi = H2 0 is applied with vm = 1.5 m/s leading to the Reynolds number Re = 100 (inlet) for a linear viscous fluid of ρ = 1 kg/m3 and µ = 0.001 Pa s. Of course, such a fluid performing an incompressible flow is difficult to find in reality; however, the benchmark problem needs to be seen as a computationally challenging problem showing the strength and robustness of the proposed code since a computation in such a low kinematic viscosity ν = µ/ρ is known to generate numerical problems. By using ∆t = 0.001 s and bicgstab iterative solver with hypre-amg preconditioner, we have computed up to 5 s as presented in Fig. 4. For a comparison, the same problem is solved in [33, Section 3.4] by using the so-called incremental pressure correction scheme (IPCS) providing the same solution as herein. This splitting method is powerful for isothermal case, but difficult to apply for non-isothermal cases. The vortex shedding behind the obstacle occurs due to the boundary layer separation. This separation is due to the changing pressure gradients as seen in Fig. 4(f). There are two stagnation points visible in front of and behind the obstacle. Along the boundary of the obstacle, pressure gradient changes its sign at the top point. This change in pressure gradient resolves a so-called wake behind the obstacle, where the pressure is low such that the flow separates. We have modeled this phenomenon with the same element type and size around the boundary, in other words, without any special boundary layer modeling or whatsoever. Choosing Re = 100 gives us an oscillating flow, between t = 2 s and t = 5 s one full cycle is surpassed. The pressure distribution also shows the emerging vortices far away from the obstacle as moving wakes. The second benchmark problem is in 3D. In analogy with the latter geometry, this time we simulate a pulsating flow over a circular cylinder. The geometry is taken from the case 3D-3Z in [44] and rescaled to millimeter length scale. The geometry is a box of 2500 mm x-length and H × H cross section on yz-plane. A through hole of 100 mm diameter is placed asymmetrically, its center is at y = 200 mm and the y-length is H = 410 mm. This configuration leads to the same type of boundary layer separation. We apply a pulsating flow as follows   t  16yz(H − y)(H − z) vm sin π  H4 8  vi =  (34)  , 0 0 with the mean velocity of vm = 2250 mm/s. This parabolic function reads vm at the middle of the inflow plane y = z = H/2 at t = 4 s. On the outflow plane x = 2500 mm we set the pressure as the reference pressure. On the walls and around the cylinder, no-slip condition, vi = 0, is implemented as Dirichlet boundaries. We visualize in Fig. 5 the velocity field and in Fig. 6 the pressure field at t = 4 s, when the maximum velocity on the inflow plane has reached 2250 mm/s leading to a Reynolds number of Re = 100 with the diameter of the cylinder used as the characteristic length. As expected, in the velocity solution we see the same distribution on the xy-plane as in 2D solution. In yz-plane the distribution is manipulated because of the no-slip condition on the walls along z-axis. Behind the cylinder the distribution is separated. In the middle there is a relatively slow back-flow. There is a small difference in the upper and lower distribution because of the non-symmetric placement of the obstacle. This fact can be seen in the pressure distribution as a difference between the highest and lowest position along the 10 (a) Velocity, t = 1 s (b) Velocity, t = 2 s (c) Velocity, t = 3 s (d) Velocity, t = 4 s (e) Velocity, t = 5 s (f) Pressure, t = 5 s Figure 4: 2D computation of a viscous flow with the typical vortex shedding behind the obstacle, colors denote the magnitude of the velocity or pressure as indicated. Figure 5: Velocity solution (direction as scaled arrows and magnitude as colors) of the transient flow at the quarter period, t = 4 s. 11 Figure 6: Pressure solution as colors of the transient flow at the quarter period, t = 4 s. cylinder. The pressure distribution along z-axis varies again effected by the no-slip condition on the walls along z-axis. The total number of degrees of freedom (DOFs) for the 3D problem is 483 548 that is relatively small for such a computation in this detail. By using again bicgstab iterative solver with hypre-amg preconditioning, with the fixed time step, ∆t = 0.001 s, we could simulate on 13 CPUs via openmpi without facing any numerical problems. 6 Conclusion A new method is proposed to compute fluid dynamics of isothermal and incompressible flows by means of FEM. We have rigorously investigated the convergence and the accuracy of the proposed approach by using closedform solutions. Convergence in space and time is difficult to achieve in FEM for flow problems. The accuracy is only possible by using extremely high degrees of freedom. With the proposed method, we have attained a good accuracy with relatively coarse meshes. Local monotonic convergence in space and time is a remarkable quality of FEM and our method exploits this feature such that the proposed method is reliable. Moreover, we have demonstrated the robustness of the implementation in open-source packages called FEniCS by solving flow around the cylinder benchmark problems in 2D and 3D. Further research is being conducted as a second part including solution of real-life problems and verification of the proposed method with the aid of experimental results. Acknowledgement B. E. Abali had the pleasure to have discussed and worked together with Prof. Ömer Savaş at the University of California, Berkeley. References [1] B. E. Abali. Computational Reality, Solving Nonlinear and Coupled Problems in Continuum Mechanics. Advanced Structured Materials. Springer, 2017. [2] B. E. Abali, W. H. Müller, and D. V. Georgievskii. A discrete-mechanical approach for computation of three-dimensional flows. ZAMM-Journal of Applied Mathematics and Mechanics/Zeitschrift für Angewandte Mathematik und Mechanik, 93(12):868–881, 2013. [3] B. Emek Abali. Technical University of Berlin, Institute of Mechanics, Chair of Continuum Mechanics and Material Theory, Computational Reality. http://www.lkm.tu-berlin.de/ComputationalReality/, 2017. [4] Martin S. Alnaes and Kent-Andre Mardal. On the efficiency of symbolic computations combined with code generation for finite element methods. ACM Transactions on Mathematical Software, 37(1), 2010. 12 [5] Martin S. Alnaes and Kent-Andre Mardal. SyFi and SFC: Symbolic Finite Elements and Form Compilation, chapter 15. Springer, 2012. [6] Amirhossein Arzani and Shawn C Shadden. Characterizations and correlations of wall shear stress in aneurysmal flow. Journal of Biomechanical Engineering, 138(1):014503, 2016. [7] I. Babuska and W.C. Rheinboldt. Error estimates for adaptive finite element computations. SIAM Journal on Numerical Analysis, 15(4):736–754, 1978. [8] Teri Barth, Pavel Bochev, Max Gunzburger, and John Shadid. A taxonomy of consistently stabilized finite element methods for the stokes problem. SIAM Journal on Scientific Computing, 25(5):1585–1607, 2004. [9] John B Bell, Phillip Colella, and Harland M Glaz. A second-order projection method for the incompressible navier-stokes equations. Journal of Computational Physics, 85(2):257–283, 1989. [10] Henrik Blank, Michael Rudgyard, and Andrew Wathen. Stabilised finite element methods for steady incompressible flow. Computer methods in applied mechanics and engineering, 174(1-2):91–105, 1999. [11] David L Book, Jay P Boris, and K Hain. Flux-corrected transport ii: Generalizations of the method. Journal of Computational Physics, 18(3):248–283, 1975. [12] Abigail L Bowers, Benjamin R Cousins, Alexander Linke, and Leo G Rebholz. New connections between finite element formulations of the navier–stokes equations. Journal of Computational Physics, 229(24):9020–9025, 2010. [13] Franco Brezzi and Michel Fortin. A minimal stabilisation procedure for mixed finite element methods. Numerische Mathematik, 89(3):457–491, 2001. [14] David L Brown, Ricardo Cortez, and Michael L Minion. Accurate projection methods for the incompressible navier–stokes equations. Journal of computational physics, 168(2):464–499, 2001. [15] Erik Burman. Pressure projection stabilizations for galerkin approximations of stokes’ and darcy’s problem. Numerical Methods for Partial Differential Equations, 24(1):127–143, 2008. [16] Sergey Charnyi, Timo Heister, Maxim A Olshanskii, and Leo G Rebholz. On conservation laws of navier–stokes galerkin discretizations. Journal of Computational Physics, 337:289–308, 2017. [17] Alexandre Joel Chorin. On the convergence of discrete approximations to the navier-stokes equations. Mathematics of computation, 23(106):341–353, 1969. [18] Clark R Dohrmann and Pavel B Bochev. A stabilized finite element method for the stokes problem based on polynomial pressure projections. International Journal for Numerical Methods in Fluids, 46(2):183–201, 2004. [19] J. Donea and A. Huerta. Finite element methods for flow problems. John Wiley & Sons, Ltd, Chichester, UK., 2005. [20] Ch Förster, WA Wall, and E Ramm. Stabilized finite element formulation for incompressible flow on distorted meshes. International Journal for Numerical Methods in Fluids, 60(10):1103–1126, 2009. [21] Leopoldo P Franca and Charbel Farhat. Bubble functions prompt unusual stabilized finite element methods. Computer Methods in Applied Mechanics and Engineering, 123(1-4):299–308, 1995. 13 [22] Guosheng Fu, Yanyi Jin, and Weifeng Qiu. Parameter-free superconvergent h(div)-conforming hdg methods for the brinkman equations. IMA Journal of Numerical Analysis, 2018. [23] GNU Public. Gnu general public license. http://www.gnu.org/copyleft/gpl.html, June 2007. [24] Katuhiko Goda. A multistep technique with implicit difference schemes for calculating two-or three-dimensional cavity flows. Journal of Computational Physics, 30(1):76–95, 1979. [25] Volker Gravemeier. The variational multiscale method for laminar and turbulent flow. Archives of Computational Methods in Engineering, 13(2):249, 2006. [26] Yinnian He and Jian Li. A stabilized finite element method based on local polynomial pressure projection for the stationary navier– stokes equations. Applied Numerical Mathematics, 58(10):1503–1514, 2008. [27] David Hilbert. The Foundations of Geometry. The Open Court Publishing Co., 1902. (transl. by Townsend, E.J.). [28] Johan Hoffman and Claes Johnson. Computational turbulent incompressible flow, applied mathematics: body and soul 4. Springer, 2007. [29] T. J. R. Hughes and A. Brooks. A theoretical framework for petrov-galerkin methods with discontinuous weighting functions: Application to the streamline-upwind procedure. Finite elements in fluids, 4:47–65, 1982. [30] T. J. R. Hughes, L. P. Franca, and M. Balestra. A new finite element formulation for computational fluid dynamics: circumventing the Babuska- Brezzi condition: a stable Petrov- Galerkin formulation of the Stokes problem accommodating equal-order Interpolation. Computer Methods in Applied-Mechanics and Engineering, 59:85–99, 1986. [31] Thomas J. R. Hughes, Guglielmo Scovazzi, and Leopoldo P. Franca. Encyclopedia of computational mechanics, volume 3, chapter 2 Multiscale and stabilized methods, pages 5–59. John Wiley & Sons, Ltd., 2004. [32] Dmitri Kuzmin and Stefan Turek. Flux correction tools for finite elements. Journal of Computational Physics, 175(2):525–558, 2002. [33] Hans Petter Langtangen and Anders Logg. Solving PDEs in Python: The FEniCS Tutorial I. Springer, 2016. [34] Jian Li and Yinnian He. A stabilized finite element method based on two local gauss integrations for the stokes equations. Journal of Computational and Applied Mathematics, 214(1):58–65, 2008. [35] Anders Logg, Kent-Andre Mardal, and Garth Wells. Automated solution of differential equations by the finite element method: The FEniCS book, volume 84. Springer Science & Business Media, 2012. [36] Rainald Löhner. Applied computational fluid dynamics techniques: an introduction based on finite element methods. John Wiley & Sons, 2008. [37] K. W. Morton. Finite element methods for non-self-adjoint problems. 14 In Peter Turner, editor, Topics in Numerical Analysis, volume 965, pages 113–148. Springer Berlin / Heidelberg, 1982. [38] Wolfgang H. Müller and W. Muschik. Bilanzgleichungen offener mehrkomponentiger Systeme I. Massen- und Impulsbilanzen. Journal of Non-Equilibrium Thermodynamics, 8:29–46, 1983. [39] W. Muschik and Wolfgang H. Müller. Bilanzgleichungen offener mehrkomponentiger Systeme II. Energie- und Entropiebilanz. Journal of Non-Equilibrium Thermodynamics, 8:47–66, 1983. [40] Maxim A Olshanskii and Leo G Rebholz. Velocity–vorticity–helicity formulation and a solver for the navier–stokes equations. Journal of Computational Physics, 229(11):4291–4303, 2010. [41] Artur Palha and Marc Gerritsma. A mass, energy, enstrophy and vorticity conserving (meevc) mimetic spectral element discretization for the 2d incompressible navier–stokes equations. Journal of Computational Physics, 328:200–220, 2017. [42] R. Rannacher. Encyclopedia of computational mechanics, volume 3, chapter 6 Incompressible viscous flows, pages 155–181. John Wiley & Sons, Ltd., 2004. [43] Ömer Savaş. Lecture notes, ME-260 A/B, Advanced Fluid Mechanics, Fall 2017. University of California, Berkeley, 2017. [44] Michael Schäfer, Stefan Turek, Franz Durst, Egon Krause, and Rolf Rannacher. Benchmark computations of laminar flow around a cylinder. In Flow simulation with high-performance computers II, pages 547–566. Springer, 1996. [45] David J Silvester and N Kechkar. Stabilised bilinear-constant velocity-pressure finite elements for the conjugate gradient solution of the stokes problem. Computer Methods in Applied Mechanics and Engineering, 79(1):71–86, 1990. [46] Roger Temam. Sur l’approximation de la solution des équations de navier-stokes par la méthode des pas fractionnaires (i). Archive for Rational Mechanics and Analysis, 32(2):135–153, 1969. [47] Roger Temam. Sur l’approximation de la solution des équations de navier-stokes par la méthode des pas fractionnaires (ii). Archive for Rational Mechanics and Analysis, 33(5):377–385, 1969. [48] T. E. Tezduyar, S. Mittal, S.E. Ray, and R. Shih. Incompressible flow computations with stabilized bilinear and linear equal order interpolation velocity pressure elements. Computer Methods in Applied Mechanics and Engineering, 95:221–242, 1992. [49] Olgierd C Zienkiewicz and Ramon Codina. A general algorithm for compressible and incompressible flow—part i. the split, characteristic-based scheme. International Journal for Numerical Methods in Fluids, 20(8-9):869–885, 1995. 15
5cs.CE
Relaxed Locally Correctable Codes in Computationally Bounded Channels arXiv:1803.05652v1 [cs.DS] 15 Mar 2018 Jeremiah Blocki∗ Venkata Gandikota† Elena Grigorescu‡ Samson Zhou§ March 16, 2018 Abstract Error-correcting codes that admit local decoding and correcting algorithms have been the focus of much recent research due to their numerous theoretical and practical applications. The goal is to obtain the best possible tradeoffs between the number of queries the algorithm makes to its oracle (the locality of the task), and the amount of redundancy in the encoding (the information rate). In Hamming’s classical adversarial channel model, the current tradeoffs are dramatic, allowing either small locality, but superpolynomial blocklength, or small blocklength, but high locality. However, in the computationally bounded, adversarial channel model, proposed by Lipton (STACS 1994), constructions of locally decodable codes suddenly exhibit small locality and small blocklength. The first such constructions are due to Ostrovsky, Pandey and Sahai (ICALP 2007) who build private locally decodable codes under the assumption that one-way functions exist, and in the setting where the sender and receiver share a private key. We study variants of locally decodable and locally correctable codes in computationally bounded, adversarial channels, under the much weaker assumption that collision-resistant hash functions exist, and with no public-key or private-key cryptographic setup. Specifically, we provide constructions of relaxed locally correctable and relaxed locally decodable codes over the binary alphabet, with constant information rate, and poly-logarithmic locality. Our constructions compare favorably with existing schemes built under much stronger cryptographic assumptions, and with their classical analogues in the computationally unbounded, Hamming channel. Our constructions crucially employ collision-resistant hash functions and local expander graphs, extending ideas from recent cryptographic constructions of memory-hard functions. 1 Introduction Classically, an error-correcting code is a tuple (Enc, Dec) of encoding and decoding algorithms employed by a sender to encode messages, and by a receiver to decode them, after potential corruption by a noisy channel during transmission. Specifically, the sender encodes a message m of k symbols ∗ Department of Computer Science, Purdue University, West Lafayette, IN. Email: [email protected]. Department of Computer Science, Johns Hopkins University, Baltimore, MD. Email: [email protected]. ‡ Department of Computer Science, Purdue University, West Lafayette, IN. Research supported by NSF CCF1649515. Email: [email protected]. § Department of Computer Science, Purdue University, West Lafayette, IN. Research supported in part by NSF CCF-1649515. Email: [email protected]. † 1 from an alphabet Σ into a codeword c of block-length n consisting of symbols over the same alphabet, via Enc : Σk → Σn . The receiver uses Dec : Σn → Σk to recover the message from a received word w ∈ Σn , a corrupted version of some Enc(m). Codes over the binary alphabet Σ = {0, 1} are preferred in practice. The quantities of interest in designing classical codes are the information rate, defined as k/n, and the error rate, which is the tolerable fraction of errors in the received word. Codes with both large information rate and large error rate are most desirable. In modern uses of error-correcting codes, one may only need to recover small portions of the message, such as a single bit. In such settings, the decoder may not need to read the entire received word w ∈ Σn , but only read a few bits of it. Given an index i ∈ [n] and oracle access to w, a local decoder must make only q = o(n) queries into w, and output the bit mi . Codes that admit such fast decoders are called locally decodable codes (LDCs) [KT00, STV99]. The parameter q is called the locality of the decoder. A related notion is that of locally correctable codes (LCCs). LCCs are codes for which the local decoder with oracle access to w must output bits of the codeword c, instead of bits of the message m. LDCs and LCCs have widespread applications in many areas of theoretical computer science, including private information retrieval, probabilistically checkable proofs, self-correction, fault-tolerant circuits, hardness amplification, and data structures (e.g., [BFLS91, LFKN92, BLR93, BK95, CKGS98, CGdW13, ALRW17]). See surveys [Tre04, Gas04]. However, constructions of such codes suffer from apparently irreconcilable tension between locality and rate: existing codes with constant locality have slightly subexponential blocklength [Yek08, Efr12, DGY11], and codes of linear blocklength have slightly subpolynomial query complexity [KMRS17]. See surveys by Yekhanin [Yek12] and by Kopparty and Saraf [KS16]. Ben-Sasson et al. [BGH+ 06] propose the notion of relaxed locally decodable codes (RLDCs) that remedies the dramatic tradeoffs of classical LDCs. In this notion the decoding algorithm is allowed to output ⊥ sometimes, to signal that it does not know the correct value; however, it should not output an incorrect value too often. More formally, given i ∈ [k] and oracle access to the received word w assumed to be relative close to some codeword c = Enc(m) ∈ Σn , the local decoder (1) outputs mi if w = c; (2) outputs either mi or ⊥ with probability 2/3, otherwise; (3) the set of indices i such that the decoder outputs mi (the correct value) with probability 2/3 is of size > ρ · k for some constant ρ > 0. The relaxed definition allows them to achieve RLDCs with constant query complexity and blocklength n = k1+ǫ . Recently, Gur et al. [GRR18] introduce the analogous notion of relaxed locally correctable codes (RLCCs). In particular, upon receiving a word w ∈ Σn assumed to be close to some codeword c, the decoder: (1) outputs ci if w = c; (2) outputs either ci or ⊥ with probability 2/3, otherwise; and (3) the set of indices i such that the decoder outputs ci with probability 2/3 is of size ρ · k, for some ρ > 0. In fact, [GRR18] omits condition (3) in their definition, since the first two conditions imply the 3rd, for codes with constant locality that can withstand a constant fraction of error [BGH+ 06]. The reduction from [BGH+ 06], however, does not maintain the asymptotic error rate, and in particular, in the non-constant query complexity regime, the error rate becomes subconstant. Since our results work in the ω(1)-query regime, we will build codes that achieve the 3rd condition as well (for constant error rate). The results in [GRR18] obtain significantly better parameters for RLCCs than for classical LCCs; namely, they construct RLCCs with constant query complexity, polynomial block length, and constant error rate, and RLCCs with quasipolynomial query complexity, linear blocklength (constant rate), with the caveat that the error rate is subconstant. These results immediately extend to RLDCs, since their codes are systematic, meaning that the initial part of the encoding consists of the message itself. 2 Computationally bounded, adversarial channels In this work we study RLDCs and RLCCs in the more restricted, yet natural, computationally bounded adversarial channel, introduced by Lipton [Lip94]. All the above constructions of local codes assume a channel that may introduce a bounded number of adversarial errors, and the channel has as much time as it needs to decide what positions to corrupt. This setting corresponds to Hamming’s error model, in which codes should be resilient to any possible error pattern, as long as the number of corruptions is bounded. Hence, codes built for the Hamming channel are safe for data transmission, but the drastic requirements lead to coding limitations. By contrast, in his foundational work, Shannon proposes a weaker, probabilistic channel in which each symbol is corrupted independently, with some fixed probability. In [Lip94], Lipton argues that many reasonable channels stand somewhere in between these two extremes, and one may assume that in reality adversaries are computationally bounded, and can be modeled as polynomial time probabilistic (PPT) algorithms. Variants of this model have been initially studied for classical error-correcting codes [Lip94, DGL04, MPSW05, GS16] to show better error rate capabilities than in the Hamming model. Ostrovsky et al. [OPS07] introduce the study of “private” locally decodable codes against computationally bounded channels, and build codes with constant information and error rates over the binary alphabet, which can correct every message bit using only a small (superconstant) number of queries to the corrupted word. Their results assume the existence of one-way functions, and require that the encoding and decoding algorithms share a secret key that is not known to the channel. Hemenway and Ostrovky [HO08] and Hemenway et al. [HOSW11] construct public-key LDCs assuming the existence of Φ-hiding schemes [CMS99] and of IND-CPA secure cryptosystems, respectively. By contrast, our constructions of RLDCs and RLCCs do not require the sender and receiver to exchange cryptographic keys. Instead our constructions are based on the existence of collision-resilient hash functions, a standard cryptographic assumption. Because the parameters of a collisionresistant hash function are public, any party (sender/receiver/attacker) is able to compute it. 2 Our Contributions We start by defining the version of relaxed locally correctable codes that is relevant for our model. We remark that our codes are systematic as well, and therefore the results also apply to the RLDCs analogue. Since these codes interact with an adversarial channel, the strength of the codes is not only measured in its error correction and locality capabilities (as is the case for RLCCs/RLDCs in the Hamming channel), but also in the security they provide against the channel. We present these codes while describing how they interact with the channel, in order to make the analogy with the classical setting. We use the notation Enc and Dec to denote encoding and decoding algorithms. Definition 2.1 A local code is a tuple (Gen, Enc, Dec) of probabilistic algorithms such that • Gen(1λ ) takes as input security parameter λ and generates a public seed s ∈ {0, 1}∗ . This public seed s is fixed once and for all. • Enc takes as input the public seed s and a message x ∈ Σk and outputs a codeword c = Enc(s, x) with c ∈ Σn . 3 • Dec takes as input the public seed s, an index i ∈ [n], and is given oracle access to a word w ∈ Σn . Decw (s, i) outputs a symbol b ∈ Σ (which is supposed to be the value of the closest codeword to w at position i) We say that the (information) rate of the code (Gen, Enc, Dec) is k/n. We say that the code is efficient if Gen, Enc, Dec are all probabilistic polynomial time (PPT) algorithms. Definition 2.2 A computational adversarial channel A with error rate τ is an algorithm that interacts with a local code (Gen, Enc, Dec) of rate k/n in rounds, as follows. In each round of the execution, given a security parameter λ, (1) Generate s ← Gen(1λ ); s is public, so Enc, Dec, and A have access to s (2) The channel A on input s hands a message x to the sender. (3) The sender computes c = Enc(s, x) and hands it back to the channel (in fact the channel can compute c without this interaction). (4) The channel A corrupts at most τ n entries of c to obtain a word w ∈ Σn ; w is given to the receiver’s Dec with query access, together with a challenge index i ∈ [n] (5) The receiver outputs b ← Decw (s, i). (6) We define A(s)’s probability of fooling Dec on this round to be pA,s = Pr[b 6∈ {⊥, ci }], where the probability is taken only over the randomness of the Decw (s, i). We say that A(s) is γ-successful at fooling Dec if pA,s > γ. We say that A(s) is ρ-successful at limiting Dec if |GoodA,s | < ρ·n, where GoodA,s ⊆ [n] is the set of indices j such that Pr[Decw (s, j) = cj ] > 32 . We use FoolA,s (γ, τ, λ) (resp. LimitA,s (ρ, τ, λ)) to denote the event that the attacker was γsuccessful at fooling Dec (resp. ρ-successful at limiting Dec) on this round. We now define our secure RLCC codes against computational adversarial channels. Definition 2.3 ((Computational) Relaxed Locally Correctable Codes (CRLCC)) A local code (Gen, Enc, Dec) is a (q, τ, ρ, γ, µ(·))-CRLCC against a class A of adversaries if Decw makes at most q queries to w and satisfies the following: (1) For all public seeds s if w ← Enc(s, x) then Decw (s, i) outputs b = (Enc(s, x))i . (2) For all A ∈ A we have Pr[FoolA,s (γ, τ, λ)] ≤ µ(λ), where the randomness is taken over the selection of s ← Gen(1λ ) as well as A’s random coins. (3) For all A ∈ A we have Pr[LimitA,s (ρ, τ, λ)] ≤ µ(λ), where the randomness is taken over the selection of s ← Gen(1λ ) as well as A’s random coins. When µ(λ) = 0 and A is the set of all (computationally unbounded) channels we say that the code is a (q, τ, ρ, γ)-RLCC. When µ(·) is a negligible function and A is restricted to the set of all probabilistic polynomial time (PPT) attackers we say that the code is a (q, τ, ρ, γ)-CRLCC (computational relaxed locally correctable code). We say that a code that satisfies conditions 1 and 2 is a Weak CRLCC, while a code satisfying conditions 1, 2 and 3 is a Strong CRLCC code. 4 We construct Weak and Strong CRLCCs against PPT adversaries, under the assumption that Collision-Resistant Hash Functions (CRHF) exist. Briefly, a CRHF function is a pair (GenH, H) of probabilistic polynomial time (PPT) algorithms, where GenH takes as input a security parameter 1λ and outputs a public seed s ∈ {0, 1}∗ ; the function H : {0, 1}∗ × Σ∗ → Σℓ(λ) , takes as input the seed s and a long enough input that is hashed into a string of length ℓ(λ). We note that H is deterministic upon fixing s. The value ℓ(λ) is the length of the hash function. (GenH, H) is said to be collision-resistant if for all PPT adversaries that take as input the seed s generated by Gen(1λ ), the probability that they produce a collision pair (x, x′ ), i.e. such that H(s, x) = H(s, x′ ) and x 6= x′ , is negligible in 1λ . Theorem 2.4 Assuming the existence of a collision-resistant hash function (GenH, H) with length ℓ(λ), there exist constants 0 < τ, ρ, γ < 1 and a negligible function µ, such that there exists a constant rate (ℓ(λ) · polylog n, τ, ρ, γ, µ(·))-Weak CRLCC of blocklength n over the binary alphabet. In particular, if ℓ(λ) = polylog λ and λ ∈ Θ(n) then the code is a (polylog n, τ, ρ, γ, µ(·))-Weak CRLCC. We note that in the above constructions the codes withstand a constant error rate. The classical RLCCs of [GRR18] achieve (log n)O(log log n) query complexity, constant information rate, but subconstant error rate, in the Hamming channel. In order to obtain Strong CRLCC we need further technical insights, that builds upon the Weak CRLCCs. Our Strong CRLCCs have the same parameters, with only a polylog n loss in query complexity. Theorem 2.5 Assuming the existence of a collision-resistant hash function (GenH, H) with length ℓ(λ), there exist constants 0 < τ, ρ, γ < 1 and a negligible function µ, such that there exists a constant rate (polylog n, τ, ρ, γ, µ(·))-Strong CRLCC of blocklength n over the binary alphabet. In particular, if ℓ(λ) = polylog λ and λ ∈ Θ(n) then the code is a (polylog n, τ, ρ, γ, µ(·))-Strong CRLCC. Our constructions are systematic, so they immediately imply the existence of CRLDCs with the same parameters. 2.1 Technical Ingredients At a technical level our construction uses two main building blocks: local expander graphs and collision resistant hash functions. Local Expander Graphs Intuitively, given a graph G = (V, E) and distinguished subsets A, B ⊆ V of nodes such that A and B are disjoint and |A| = |B| we say that the pair (A, B) contains a δ-expander if for all X ⊆ A and Y ⊆ B with |X| > δ|A| and |Y | > δ|B| there is an edge connecting X and Y i.e., (X × Y ) ∩ E 6= ∅. A δ-local expander is a directed acyclic graph (DAG) G with n nodes V (G) = {1, . . . , n} with the property that for any radius r > 0 and any node v ≥ 2r the sets A = {v − 2r + 1, . . . , v − r} and B = {v − r + 1, . . . , v} contain a δ-expander. For any constant δ > 0 it is possible to construct a δ-local expander with the property that indeg(G) ∈ O (log n) and outdeg(G) ∈ O (log n) i.e. no node is has more that O (log n) incoming or outgoing edges [EGS75, ABP18]. Local expanders have several nice properties that have been recently exploited in the design and analysis of secure memory hard functions [ABH17, ABP17, BZ17, ABP18]. For example, these 5 graphs are maximally depth-robust [ABP18]. Even if we delete a large number of nodes S ⊆ V the graph still contains a directed path of length n − (1 + ǫ) |S| for some small constant ǫ dependent on δ — the constant ǫ can approach 0 as δ approaches 0 [ABP18]. More specifically, if we delete a large number of nodes S  ⊆ V at least n − (1 + ǫ) |S| of the nodes have the property that they are 2−α α-good (with ǫ = α ) with respect to the deleted set S and any pair of α-good nodes u and v are connected by a directed path (provided that δ is sufficiently small) — a node v is α-good with respect to S if for any radius r < v we have at most αr nodes in S ∩ [v − r + 1, v] and for any radius r ≤ n − v + 1 we have at most αr nodes in S ∩ [v, v + r − 1]. Suppose that each node is colored red or green and that we are only allowed to query each node to obtain its color. If we let S denote the set of red nodes then we can develop an efficient randomized testing algorithm to check if a node v is α-good or not. The tester will make O (polylog n) queries and, with high probability, will accept any node v that is α1 -good and will reject any node w that is not α2 -good for any constants α2 > 4 · α1 . Intuitively, for each r ∈ {21 , 22 , . . . , 2log n } the tester will sample O (polylog n) nodes in the intervals [v, r − 1] and [v − r + 1, v] to make sure that the fraction of red nodes is at most 2α1 . If the tester determines that a node v is at least α2 -good for an appropriately small constant α2 then there is a long directed path of length at least n − (1 + ǫ)|S| containing all α2 -good nodes and in particular containing v. Furthermore, if v < 3n/4 then v has at least n/4 − (1 + ǫ)|S| descendants in this path. Collision Resistant Hash Functions Our constructions employ collision resistant hash functions as a building block. While most of the recent progress on memory hard functions in cryptography combines local expanders (depth-robust graphs) with random oracles (e.g., see [AS15, AT17, ABP18]), we stress that we do not need to work in the random oracle model1 . Indeed, our constructions only assume the existence of collision resistant hash functions. Weak CRLCCs We first explain our construction of Weak CRLCCs, which involves labeling a δ-local expander with k nodes. In particular, given an input word x = (x1 , . . . , xk ) (broken up into bit strings of length ℓ(λ)) and a k node local expander graph G, the label of node v is computed as ℓv,s = H (s, xv ◦ ℓv1 ,s ◦ · · · ◦ ℓvd ,s ) ∈ {0, 1}ℓ(λ) , where ℓv1 ,s , . . . , ℓvd ,s are the labels of the parents v1 , . . . , vd of node v, and ◦ denotes string concatenation. When ℓ(λ) ∈ O (polylog λ) we will select λ ∈ O (n) to ensure that ℓ(λ) ∈ O (polylog n). We use the notation Enc and Dec for the encoding and decoding of our construction, while we use ECC and ECCD to denote the efficient encoding and decoding algorithms for a good binary code with constant rate and relative distance (e.g., [Jus72, SS96]) which can decode efficiently from some constant fractions of errors. We first apply ECC to x1 , . . . , xk to obtain codewords c1 , . . . , ck ∈ {0, 1}O(ℓ(λ)) where ci = ECC(xi ). Also, for v ∈ [k] we let cv+k = ECC(ℓv,s ) which is the encoding of the label corresponding to the node v in G. The final output is c = (c1 , . . . , c2k−1 , c2k , c2k+1 , . . . , c3k ) where c2k+1 = . . . = c3k = c2k consists of k copies of the last codeword c2k . The final word is an n bit message with n = O (3kℓ (λ)). By repeating this last codeword k times we ensure that it is not possible for the attacker to irreparably corrupt the final label ℓk,s . Given a (possibly corrupted) codeword c′ produced by a PPT attacker A we let x′ = (x′1 , . . . , x′k ) with x′i = ECCD(c′i ) (possibly ⊥) and we let ℓ′v,s = ECCD(c′v+k ) for v ∈ [k] and ℓ′k,s,j = ECCD(c′2k+j ) 1 The random oracle model is a source of some controversy among cryptographers [KM07, Men12, Gol06, KM15] with some arguing that the framework can be used to develop cryptographic protocols that are efficient and secure [BR93], while others argue that the methodology is flawed e.g. [BL13, KM15]. 6 for each j ∈ [k]. We say that a node v is green if it is locally consistent i.e.,  ℓ′v,s = H s, x′v ◦ ℓ′v1 ,s ◦ . . . ◦ ℓ′vd ,s , otherwise we say that the node is red. We first show that if a green node has the correct label ℓ′v,s = ℓv,s then it must be the case that x′v = xv and ℓ′vi ,s = ℓvi ,s for each i ≤ d — otherwise A would have found a hash collision! If a graph contains too many red nodes then this is easily detectable by random sampling and our weak local decoder is allowed to output ⊥ if it detects any red nodes. Our local decoder will first obtain the final label ℓk,s by random sampling some labels from ℓ′k,s,1, . . . , ℓ′k,s,k and checking to make sure each of these labels is equal to ℓ′k,s . If this check passes then with high probability we must have ℓ′k,s = ℓk,s since the attacker cannot corrupt too many of these labels. Second, our local decoder will test to make sure that the last node k is at least α2 -good. If this node is not α2 -good then we must have found a red node and our weak decoder may output ⊥; otherwise the last node serves as an anchor point. In particular, since since label ℓk,s = ℓ′k,s in this case collision resistance now implies that for any α2 -good node v then we must have x′v = xv and ℓv,s = ℓ′v,s since v must be connected to the node k by a green path. Strong CRLCCs The reason that the previous construction fails to yield a strong CRLCCs is that it is possible for an attacker to change every node to a red-node by tampering with at most O (k · ℓ(λ)/ log k) bits. In particular, since the δ-local expander G has outdegree O (log k) an attacker who tampers with just O (ℓ(λ)) bits could tamper with one of the labels so that x′v 6= xv . Now for every w ∈ [k] s.t. G contains the directed edge (v, w) the node w will be red and there are up to O (log k) = O (log n) such nodes w. We address this issue by first applying a degree reduction gadget to our family {Gt }∞ t=1 of δ-local  k expanders, where t = O ℓ(λ)·log k , to obtain a new family of DAGs as follows: First, we replace every node u ∈ [t] from Gt with a chain u1 , . . . , um of m = O (log t) nodes — we will refer to node u ∈ [t] as the meta-node for this group. The result is a new graph with k = m · t nodes. Each of the nodes u1 , . . . , um−1 will have constant indegree and constant outdegree. However, for i < m we include the directed edges (ui , ui+1 ) and (ui , um ) — the node um will have indeg(um ) ∈ Θ(m). Furthermore, if we have an edge (u, v) in Gt then we will add an edge of the (um , vj ) for some j < m — this will be done in such a way that maintains indeg(vj ) ≤ 2 for each j < m. Therefore, the node um will have outdeg(um ) ∈ Θ(log t). We now note that if the label ℓ′um ,s = ℓum ,s and the node um is green then, by collision resistance, it must be the case that ℓ′ui ,s = ℓui ,s and x′ui = xui for every ui with i ≤ m. With this observation in mind we tweak our last construction by grouping the values ℓvi ,s and xvi into groups of size m ∈ O (log t) before applying the error correcting code. In particular, given our input word x divided into k = m · t distinct ℓ(λ)-bit strings xvi for i ≤ m and v ≤ t, our final output will consist of c = (c1 , . . . , c3t ) where ci = ECC(x(i−1)m+1 , . . . , xim ) for i ≤ t and cv+t = ECC (ℓv1 ,s ◦ . . . ◦ ℓvm ,s ) and c2t+1 = . . . = c3t = c2t consists of t copies of c2t . The final codeword c will have length n ∈ O (tm · ℓ(λ)) = O (k · ℓ(λ)) bits. By grouping blocks together we get the property that an attacker that wants to alter an individual label ℓvi ,s must pay to flip at least Ω (ℓ(λ) · m) bits of cv+t . Thus, the attacker is significantly restricted in the way he can tamper with the labels e.g., the attacker cannot tamper with one label in every group. We now define a meta-node u ∈ [t] containing u1 , . . . , um , to be green if (1) node um is green, and (2) at least 2m/3 of the nodes u1 , . . . , um are green. Even if we flip a (sufficiently small) constant fraction of the bits in c we can show that most of the meta-nodes must be green — in fact, most of 7 these meta-nodes must also be α2 -good. In particular, there are only two ways to turn a meta-node u red: (1) by paying to flip O (ℓ(λ) · m) bits in cu or cu+t , and (2) by corrupting at least m/3 other meta-nodes w such that the directed edge (w, u) is in Gt . Finally, we are able to argue that, by collision resistance, if a meta-node u ∈ [t] is green and the meta-node u is correct (i.e., x′uj = xuj and ℓ′uj ,s = ℓuj ,s for each j ≤ m) and if we have the directed edge (w, u) in Gt then the label ℓ′wm ,s must also be correct (thus, if the meta-node w is green then the meta-node must be correct). As long as the number of red nodes S is sufficiently small. It follows that any α2 -good meta-node u < 3t/4 is connected to at least t/4 − (1 + ǫ)|S| green meta-nodes. Since the attacker does not have the budget to corrupt all t/4 − (1 + ǫ)|S| of these meta-nodes it follows that the meta-node u must be correct. Once we determine that a meta-node u is correct (x′uj = xuj and ℓ′uj ,s = ℓuj ,s for each j ≤ m) we can easily recover cu = ECC(x′u1 ◦ . . . ◦ x′um ) and/or cu+t = ECC(ℓ′u1 ,s ◦ . . . ◦ ℓ′um ,s ) 2 . 3 Related work Classical LDCs/LCCs and relaxed variants in the Hamming channel The current best constructions for LDCs/LCCs can achieve any constant rate R < 1, any constant relative distance Hamming distance between codewords) δ < 1 − R, and query complexity  √ (i.e., minimum  log n log log n O 2 [KMRS17]. In the constant query complexity regime, for q ≥ 3, the best codes achieve blocklength subexponential in the message length [Yek08, Efr12, DGY11]. For q = 2, Kerenidis and deWolf [KdW04] show an exponential in k lower bound for the blocklength of any LDC. A notion similar to RLDCs, called Locally Decode/Reject code, was studied by Moshkovitz and Raz [MR10] in the context of building better PCPs. The notion concerns decoding batches of coordinates jointly, and it allows as output a list of possible messages. In the context of simplifying the proofs in [MR10], a related notion of decodable PCPs was studied in [DH09]. Non-local codes in computationally bounded channels In their initial works in the computationally bounded channel, Lipton [Lip94] and Ding, Gopalan and Lipton [DGL04] obtain errorcorrecting codes uniquely decodable (in the classical, global setting) with error rates beyond what is possible in the adversarial Hamming channel. Their model requires that the sender and receiver share a secret random string, unknown to the channel. This is a strong cryptographic assumption, as the model is unsuitable to common settings such as message broadcast. Micali et al. [MPSW05] address this drawback by proposing public-key error-correcting codes against computationally bounded channels. Their model is based on the observation that if one starts with a code that is list-decodable, encoding messages using a secret key and digitally signing them, one can prevent a PPT channel from producing valid signatures, while allowing the receiver to pick the unique message from the list with a valid signature. In follow-up work, Guruswami and Smith [GS16] removes the public-key setup, and obtains optimal rate error-correcting codes for channels that can be described by simple circuits. Their channels are either “oblivious”, namely the error is independent of the actual message being sent, or they are describable by polynomial size circuits. Their results are based on the idea that the sender can choose a permutation and a “blinding 2 If we want to recover c2t+j we can simply draw r ∈ O (polylog k) samples s1 , . . . , sr from the set c2t , . . . , c3t , decode to obtain y1 , . . . , yr with yj = ECCD(sj ), take a majority vote to obtain ymaj and output ECC(ymaj ). 8 factor” that are then embedded into the codeword together with the message. The channel cannot distinguish the hidden information since it operates with low complexity, while the receiver can. LDCs in computationally bounded channels The notion of LDCs over computationally bounded channels was introduced in [OPS07], where the authors define private LDCs. In these constructions the sender and the receiver share a private key. They obtain codes of constant rate and O (polylog λ) query complexity, where λ is the security parameter. Hemenway and Ostrovsky  [HO08] build LDCs in the public-key model, and obtain codes of constant rate, and O λ2 locality. Hemenway et al. [HOSW11] improve on these results and obtain public-key LDCs with constant rate, constant error rate and O (λ) locality, which work under a weaker cryptographic assumption than that of [HO08]. 4 Preliminaries We use the notation [n] to represent the set {1, 2, . . . , n}. For any x, y ∈ Σn , let dist(x) denote the Hamming weight of x, i.e. the number of non-zero coordinates of x. Let dist(x, y) = dist(x − y) denote the Hamming distance between the vectors x and y. For any vector x ∈ Σn , let x[i] be the ith coordinate of x. We also let x ◦ y denote the concatenation of x with y. We denote a directed acyclic graph G with n vertices labelled in topological order by G = ([n], E). A node v ∈ V has indegree δ = indeg(v) if there exist δ incoming edges δ = |(V × {v})∩ E|. Thus, we say that graph G has indegree δ = indeg(G) if the maximum indegree of any node of G is δ. A node with indegree 0 is called a source node and a node with no outgoing edges is called a sink. A node v ∈ V has outdegree δ = outdeg(v) if there exist δ outgoing edges δ = |(V × {v}) ∩ E|. Thus, we say that graph G has outdegree δ = outdeg(G) if the maximum outdegree of any node of G is δ. Finally, we say that graph G has degree δ = deg(G) if the maximum degree of any node of G is δ, or equivalently maxv∈V outdeg(v)+ indeg(v) = δ. We use parentsG (v) = {u ∈ V : (u, v) ∈ E} to denote the parents of a node v ∈ V . We will often consider graphs obtained from other graphs by removing subsets of nodes. Therefore if S ⊂ V , then we denote by G − S the DAG obtained from G by removing nodes S and incident edges. Let C be a (n, k) code that maps any k-length message over alphabet Σ to a unique n-length codeword over alphabet Σ. We say n is the block length of the code, and k/n is the information rate. Let Enc : Σk → Σn denote the encoding map of C. We define the minimum distance of C to be the quantity minc1 ,c2∈C dist(c1 , c2 ) and the relative minimum distance of C to be the quantity minc1 ,c2∈C dist(cn1 ,c2 ) . We shall use Enc and Dec to refer to the encoding and decoding algorithms of our construction, and ECC and ECCD to refer to the encoding and decoding algorithms for a binary code CJ with constant rate and relative distance. We will use Justesen codes [Jus72] in what follows. Theorem 4.1 [Jus72] For any 0 < R < 1, there exist binary linear codes of rate R, that are efficiently decodable from ∆J (R) fraction of errors, where ∆J (R) is a function that only dependents on R. In particular, we use ECC and ECCD to denote the efficient encoding and decoding algorithms of a Justesen binary linear code of rate R = 14 , and we let ∆J = ∆J (1/4) in the construction that follows. 9 Collision Resistant Hash Functions (CRHF) Our code constructions involve the use of collision-resistant hash functions. We use the following definitions from Katz and Lindell [KL14]. Definition 4.2 [KL14, Definition 4.11] A hash function with alphabet Σ and blocklength ℓ(.) is a pair Π = (GenH, H) of probabilistic polynomial time algorithms satisfying: • GenH is a probabilistic algorithm which takes as input a security parameter 1λ and outputs a public seed s ∈ {0, 1}∗ , where the security parameter 1λ is implicit in the string s. • H is a deterministic algorithm that takes as input a seed s and a string Σ∗ and outputs a string H(s, x) ∈ Σℓ(λ) . A collision resistant hash function can be defined using the following experiment for a hash function Π = (GenH, H), an adversary A, and a security parameter λ: The collision-finding experiment Hash − collA,Π (λ): (1) s ← GenH(1λ ) (2) (x, x′ ) ← A(s) (3) The output of the experiment is 1 if and only if A successfully finds a collision, i.e. x 6= x′ and H(s, x) = H(s, x′ ). Then this experiment implicitly defines a collision resistant hash function. Definition 4.3 [KL14, Definition 4.12] A hash function Π = (GenH, H) is collision resistant if for all probabilistic polynomial time adversaries A there exists a negligible function negl such that Pr [Hash − collA,Π (λ) = 1] ≤ negl(λ). Background on δ-Local Expander Graphs We now begin to describe the underlying DAGs in our code construction. We first define the class of graphs δ-expanders and δ-local expanders. Definition 4.4 Let δ > 0. A bipartite graph G = (U, V, E) is called a δ-expander if for all M1 ⊆ U , M2 ⊆ V such that |M1 | ≥ δ|U | and |M2 | ≥ δ|V |, there exists an edge e ∈ M1 × M2 . Definition 4.5 Let δ > 0 and G = ([n], E) be a directed acyclic graph. G is called a δ-local expander if for every vertex x ∈ [n] and every r ≤ min{x, n − x}, the bipartite graph induced by U = [x, . . . , x + r − 1] and V = [x + r, . . . , x + 2r − 1] is a δ-expander. Theorem 4.6, due to Alwen et al. [ABP18], states that δ-local expanders exist with degree O (log n). Theorem 4.6 [ABP18] For any n > 0, δ > 0, there exists a δ-local expander G = ([n], E) with indegree O (log n) and outdegree O (log n). 10 The construction of Alwen et al. [ABP18] is probabilistic. In particular, they show that there is a random distribution over DAGs such that any sample from this distribution is a δ-local expander with high probability. The randomized construction of Alwen et al. [ABP18] closely follows an earlier construction of Erdos et al. [EGS75] 3 . We now list some properties of the δ-local expander graphs shown in [ABP18]. We will use these properties to construct the Dec algorithm for the CRLCC scheme. Definition 4.7 (α-good node) Let G = ([n], E) be a DAG and let S ⊆ [n] be a subset of vertices. Let 0 < c < 1. We say v ∈ [n] − S is α-good under S if for all r > 0: |[v − r + 1, v] ∩ S| ≤ αr, |[v, v + r − 1] ∩ S| ≤ αr. Intuitively, we can view the subset S to be a set of “deleted” vertices. A vertex in the remaining graph is called α-good if at most α fraction of vertices in any of its neighborhood are contained in the deleted set. In our case, we will ultimately define S to be the nodes with the inconsistent labels. The following result of [ABP18] shows that in any DAG G, even if we deleted a constant fraction of vertices, there still remain a constant fraction of vertices that are α-good. Lemma 4.8 (Lemma 4.4 in [ABP18]) Let G = ([n], E) be a directed acyclic graph. For any S ⊂ [n] and any 0 < α < 1, at least n − |S| 2−α nodes in G − S are α-good under S. α Alwen et al. [ABP18] also show that in a δ-local expander graph G any two α-good vertices in G − S are connected. Lemma 4.9 (Lemma 4.3 in [ABP18]) Let G = ([n], E) be a δ-local expander, S ⊆ [n] and 0 ≤ α ≤ 1. If δ < min((1 − α)/2, 1/4), then any two α-good vertices u, v ∈ G − S are connected in G − S. 5 Construction of Weak-CRLCC In this section we overview the construction of a constant rate weak-CRLCC scheme. In order to show the existence of a CRLCC scheme, we need to construct the PPT algorithms Gen, Enc and Dec.  λ Our construction will use a CRHF Π = (GenH, H). In particular, Gen 1 simply runs GenH 1λ to output the public seed s. The Enc algorithm uses the CRHF to create labels for the vertices of a δ-local expander. We now define the recursive labeling process for the vertices of any given DAG G using H. Definition 5.1 (Labeling) Let Σ = {0, 1}ℓ(λ) . Given a directed acyclic graph G = ([k], E), a  λ seed s ← GenH 1 for a collision resistant hash function H : {0, 1}∗ → {0, 1}ℓ(λ) , and a message x = (x1 , x2 , · · · , xk ) ∈ Σk we define the labeling of graph G with x, labG,s : Σk → Σk as labG,s (x) = (ℓ1,s , ℓ2,s , · · · , ℓk,s ), where ( H(s, xv ), indeg(v) = 0 ℓv,s = H(s, xv ◦ ℓv1 ,s ◦ · · · ◦ ℓvd ,s ), 0 < indeg(v) = d, 3 While Alwen et al. [ABP18] only analyze the indegree of this construction it is trivial to see that the outdegree is also O (log n) since the construction of Erdos et al. [EGS75] overlays multiple bipartite expander graphs on top of the nodes V = [n]. Each bipartite expander graph has indeg, outdeg ∈ O (1) and each node is associated with O (log n) expanders. 11 where v1 , . . . , vd are the parents of vertex v in G, according to some predetermined topological order. We omit the subscripts G, s when the dependency on the graph G and public hash seed H is clear from context. 5.1 Enc Algorithm  In this section we describe the Enc algorithm which takes as input a seed s ← Gen 1λ and a message x ∈ {0, 1}k , and returns a codeword c ∈ {0, 1}n . For a security parameter λ, let H : {0, 1}∗ → {0, 1}ℓ(λ) be a CRHF (see Definition 4.3). We will assume that Enc has access to H. In this section we also let ECC : {0, 1}ℓ(λ) → {0, 1}4·ℓ(λ) be a standard binary code with message length ℓ(λ) and block length 4 · ℓ(λ) (such as Justesen code [Jus72]) and let ECCD : {0, 1}4·ℓ(λ) → {0, 1}ℓ(λ) be the decoder that efficiently decodes from ∆J fraction of errors. Let s ← Gen(1λ ). Let k′ = k/ℓ(λ) and for δ = 1/100, let G = ([k′ ], E) be a δ-local expander graph with indegree O (log k′ ). Enc(s, x): Input: x = (x1 , · · · , xk′ ) ∈ {0, 1}k where each xi ∈ {0, 1}ℓ(λ) and k = k′ · ℓ(λ). Output: c = (c1 , · · · , c3k′ −1 ) ∈ {0, 1}n where each ci ∈ {0, 1}4·ℓ(λ) and n = 4(3k′ − 1) · ℓ(λ)  • Let labG,s (x) = ℓ1,s , · · · , ℓk′ ,s be the labeling of the graph G with input x and seed s. • The codeword c consists of the group-wise encoding of message x, followed by the encoded labeling of the graph using ECC, followed by k′ − 1 copies of encoded ℓk′ .   c = (ECC(x1 ), · · · , ECC(xk′ ), ECC(ℓ1,s ), · · · , ECC(ℓk′ ,s ), ECC ℓk′ ,s , · · · , ECC ℓk′ ,s ) . | {z } k ′ −1 times ... ECC(ℓ1,s ) ECC(ℓ2,s ) ECC(ℓ3,s ) ECC(ℓ4,s ) ECC(ℓk′ ,s ) ECC(ℓ5,s ) ECC(ℓk′ ,s ) ECC(ℓk′ ,s ) ECC(ℓk′ ,s ) k′ − 1 Fig. 1: An example of an encoding with an underlying graph with k′ = k/ℓ(λ) nodes The parameter δ = 1/100 is arbitrary, and simply chosen to satisfy Lemma 4.9. Also, note that the codeword length is n = 4 · (3k′ − 1) · ℓ(λ) over the binary alphabet {0, 1}, where ℓ(λ) is the length of the output of the CRHF H and the original message had length k = k′ · ℓ(λ). Therefore, the rate nk of CRLCC scheme obtained from Enc is Θ(1). 5.2 Dec Algorithm In this section, we detail a randomized algorithm Dec : {0, 1}n × [n] → {⊥} ∪ {0, 1} for Enc : {0, 1}k → {0, 1}n described in Section 5.1. We assume Dec has access to the same public seed s 12 used by Enc as well as the δ-local expander used by Enc. We focus on the key ideas first and then provide the formal description of Dec. The notion of a green node is central to Dec. ′ Given a word (corrupted codeword) w = (w1 , . . . , w3k′ −1 ) ∈ ({0, 1}4·ℓ(λ) )3k −1 we define x′i = ECCD(wi ) ∈ {0, 1}ℓ(λ) for i ≤ k′ and ℓ′v,s = ECCD(wk′ +v ) for v ≤ k′ and ℓ′k′ ,s,i = ECCD(w2k′ +i ) for i < k′ . Definition 5.2 (Green/red node) We say that a node v ∈ [k′ ] with parents v1 , . . . , vd is green if the label ℓ′v,s is consistent with the hash of its parent labels i.e., ℓ′v,s = H(s, xv ◦ℓ′v1 ,s ◦ℓ′v2 ,s ◦· · ·◦ℓ′vd ,s ). A node that is not green is a red node. We say that a node v is correct if ℓ′v,s = ℓv,s and x′v = xv . Lemma 5.3 highlights one of the key reasons why green nodes are significant in our construction. Lemma 5.3 Suppose that node v is green and correct (i.e., ℓ′v,s = ℓv,s ) and suppose that there is a directed path from node u to node v consisting entirely of green nodes. Then either the node u is also correct (i.e., ℓ′u,s = ℓu,s ) or the PPT adversary has produced a hash collision. Proof : If node v is green, then by definition ℓ′v,s = H(s, x′v ◦ ℓ′v1 ,s ◦ · · · ◦ ℓ′vd ,s ) where v1 , . . . , vd are the parents of node v. Moreover, if ℓ′v,s is unaltered, then ℓ′v,s = ℓv,s = H(s, xv ◦ℓv1 ,s ◦ℓv2 ,s ◦· · ·◦ℓvd ,s ). Thus, H(s, xv ◦ ℓv1 ,s ◦ ℓv2 ,s ◦ · · · ◦ ℓvd ,s ) = H(s, x′v ◦ ℓ′v1 ,s ◦ · · · ◦ ℓ′vd ,s ). Either xv = x′v and ℓvj ,s = ℓ′vj ,s for each j ∈ [d] or we have found a hash collision. In particular, let vj be the node that lies on the green path from u to v. Assuming we have no hash collision the node vj is correct and green. We can extend the same argument inductively to argue that node u must be correct.  Our local decoder will output ⊥ if it ever detects any red nodes (Note that when the codeword is not corrupted we will have 0 red nodes). We now consider two cases. Case 1: The input index i ≥ 8k − 4ℓ(λ). This corresponds to a bit query within the last k′ blocks. From the construction of the code, we know that the last k′ blocks of the encoding are the same, i.e. c2k′ +j = c2k′ for all 1 ≤ j ≤ k′ . In this case, Decw simply queries O (log k′ ) blocks in [2k′ , 3k′ − 1], finds the decodes them to the nearest codeword and returns the majority codeword. Since the adversary cannot corrupt many blocks beyond decoding radius, the majority will return the correct block with high probability. See Section 5.2.1 for the formal proof. Case 2: If the input index i < 8k − 4ℓ(λ), Decw uses the properties of the δ-local expander ′ graph to detect whether the corresponding label has been tampered m or not. Let i denote the index l i mod k′ . We check to make sure of the node in G associated with the queried bit i i.e., i′ = 4·ℓ(λ) that (1) the node k′ is at least α-good, and (2) the node i′ is also α-good. If either check fails then we will output ⊥. Otherwise, by Lemma 5.3 the node i′ must be correct (with high probability) since (1) there is a green path connecting any two α-good nodes in a δ-local expander, and (2) the node k′ must be correct (with high probability). The core part of the Decw then is the probabilistic procedure to verify that a node v is α-good. First, it is clear that there is a deterministic procedure IsGreenw (v) that checks whether a given node v ∈ [k′ ] is green or not in O (log n) coordinate queries to w (see Lemma 5.5 for the formal statement). Now in order to verify if a node v is α-good, we need to estimate the fraction of green nodes in any neighborhood of it. This is achieved by designing a tester that accepts v if it is 13 α/4-good with respect to the set S of red nodes and rejects with high probability if v is not α-good (formalized in Lemma 5.6). The key observation behind Lemma 5.6 is that it suffices to check that [v, v + 2j − 1] ∩ S ≤ α · 2j /4 for each j ≤ log k′ and that [v − 2j + 1, v] ∩ S ≤ α · 2j /4 for each j ≤ log k′ . For each j we can sample r = O (polylog k′ ) random nodes in each of the intervals [v − 2j + 1, v] and [v, v + 2j − 1] and use the subroutine IsGreen to count the number of red (resp. green) nodes in each interval. If for every j ≤ log k′ the number of red nodes is both intervals at most α · 2j /2 we accept. Otherwise, we reject. We now proceed to formalize the decoder Dec for the Weak-CRLCC described above. 5.2.1 Query Procedure for i ≥ 8k − 4ℓ(λ) In this section, we describe the procedure for recovering a coordinate for input i ≥ 8k − 4ℓ(λ). We show that regardless of the underlying graph, any adversary that can change at most ∆4J k coordinates of a codeword obtained from Enc, cannot prevent relaxed local correction for a query on the last k′ blocks. Consider the following algorithm Decw 1 (s, i) for any i ≥ 8k − 4ℓ(λ): Decw 1 : Input : Index i ∈ [n] such that i ≥ 8k − 4ℓ(λ).  3  k (1) Sample Θ log blocks {wt } of w for t between 2k′ and 3k′ uniformly at random. ℓ(λ) (2) Decode each of the queried blocks wt to the corrected codeword, ct := ECC(ECCD(wt )). (could possibly be a ⊥ if ECCD fails to decode). (3) Let cmaj = majority{ct } be the codeword of ECC which occurs majority of the times in Step (2) above. (4) Output symbol (i mod 4ℓ(λ)) of cmaj . 3 We show in Lemma 5.4 that Pr [Decw 1 (s, i) = c[i]] ≥ 1 − negl(n) and uses at most O log n queries.  Lemma 5.4 Let Enc be as described in Section 5.1. For any 8k − 4ℓ(λ) ≤ i ≤ n, Decw 1 does the following: (1) For any x ∈ {0, 1}k and c = Enc(s, x), it holds that Decc1 (s, i) = c[i]. (2) For any x ∈ {0, 1}k , c = Enc(s, x) and w ∈ {0, 1}n generated by any PPT adversary such that dist(c, w) ≤ ∆4J k , it holds that Pr [Decw 1 (s, i) = c[i]] ≥ 1 −  3 Moreover, Decw 1 makes at most O log n queries to w. Proof : symbol. 1 2 nlog n . First, note that for any codeword obtained from Enc, Dec1 will always output the correct 14 Let w be the received word which is obtained by altering at most ∆4J k coordinates of some codeword c obtained from Enc, i.e., 0 < dist(c, w) ≤ ∆4J k . From Enc, we know that the last k′ blocks of any codeword are exactly the same. Since dist(c, w) ≤ ∆4J k , at most 14 fraction of these blocks are modified in more than ∆J fraction of their coordinates. Therefore, at least 43 fraction of the last k′ blocks can be corrected to a unique codeword closest to them. Thus, each query 3 finds an correct codeword block with probability at least 4 . Then by standard Chernoff bounds,  3 k queries are correct is at least 1 − e−Ω(s) , where the probability that the majority of the Θ log ℓ(λ)  3  k is the number of sampled blocks. s = Θ log ℓ(λ)  3  k Since Dec1 queries O log blocks each of length 4ℓ(λ) bits, the complexity of Dec1 is at most ℓ(λ)   3 3 O log k = O log n .  5.2.2 Query Procedure for i < 8k − 4ℓ(λ) In this section, we describe the algorithm for recovering a coordinate for input i < 8k−4ℓ(λ). Before we describe the algorithm, we need a few definitions and properties of the code we constructed in Section 5.1. Recall that for a codeword obtained from Enc, the first k′ blocks of length 4ℓ(λ) each, corresponds to the encoding of the message symbols, and the next k′ blocks correspond to the encoding of labels of the nodes of a fixed δ-local expander graph G = ([k′ ], E) generated using the k′ message blocks. In the next lemma, we describe an algorithm which verifies whether a given node of G is green with respect to the labels obtained from the received vector w ∈ {0, 1}n . Recall from the definition of a green node that we need to query only the labels of the parents of a given vertex v to verify if it is green. Since the indegree of G is O (log k′ ), we can check if a particular node is green by making at most O (log k′ ) block queries to w. We now formalize the verification procedure. Lemma 5.5 Let G = ([k′ ], E) be δ-local expander with indegree O (log k′ ) used by Enc and let w = (w1 , . . . , w3k′ −1 ) ∈ {0, 1}n be the corrupted word obtained from the PPT adversary. There exists an algorithm IsGreen that uses O (ℓ(λ) log (n/ℓ(λ))) coordinate queries to w and outputs whether a given node v ∈ [k′ ] of G is green or not. Proof : We claim the following algorithm achieves the desired properties: IsGreen: Input: Node v ∈ [k′ ] of G with indegree d = O (log k′ ). (1) Query and decode the blocks wk′ +vj for vj ∈ parentsG (v). Let ℓ′k′ +vj := ECCD(wk′ +vj ). Return ‘Red’ if ECCD fails on any input. (2) Query and decode the block wv . Let x′v := ECCD(wv ). Return ‘Red’ if ECCD fails. (3) If ECCD(wk′ +v ) = H(s, x′v ◦ wk′ +v1 ◦ wk′ +v2 ◦ · · · ◦ wk′ +vd ), where vj ∈ parentsG (v) for j ∈ [d], then output ‘Green’ (4) Else output ‘Red’. 15 IsGreen outputs whether or not the label of node v, i.e. ECCD(wk′ +v ), is green by querying at most O (log k′ ) blocks of w. Since each block is 4ℓ(λ) bits long, and k′ = k/ℓ(λ) = O (n/ℓ(λ)), the number of bits queried is equivalently O (ℓ(λ) log (n/ℓ(λ))).  Let w ∈ {0, 1}n be the received word obtained from the PPT adversary. Let S ⊆ [k′ ] be the set of red nodes of G with respect to its labeling obtained from w. Let 0 < α < 1. Recall from Definition 4.7 that we call a node i ∈ [k ′ ] of G to be α-good under the set S ⊆ [k′ ] if for all r > 0, the number of nodes of S in any r-sized neighborhood of i is at most α·r. We now give an algorithm to locally verify if a given node of G is α-good with high probability.    n Lemma 5.6 For any α < 34 , there exists a procedure that makes O ℓ(λ) log3+ǫ ℓ(λ) coordinate queries to w and for any node i ∈ [k′ ] of G does the following: • Accepts if i is α 4 -good under S with probability 1 − negl(n). • Rejects if i is not α-good under S with probability 1 − negl(n). Proof : Consider the following algorithm IsGood, where S is defined to be the set of red nodes: IsGood: Input: Node i ∈ [k′ ] of G, α < 34 , space parameter ǫ > 0. (1) If i is not green, then Reject. (2) For every p ∈ {1, . . . , log k′ } do: • Sample log1+ǫ k′ nodes U1p ⊆ [i − 2p + 1, i] and U2p ⊆ [i, i + 2p − 1]. • If the fraction of red nodes in U1p or U2p is larger than 34 α, then Reject. (3) Accept otherwise.  Note that IsGood samples at most O log2+ǫ k′ nodes of G and for each of those nodes, we check if it is green. Using Algorithm IsGreen described in Lemma 5.5, we can verify if a node is green using only O (log k′ ) block queries to w. Therefore the number of coordinates of w queried by IsGood is at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) . If the node i is red, then i ∈ S and therefore by definition it is not α-good for any α. On the other hand, if i is α/4-good, then we know that for any r-sized neighborhoods of i, i.e [i − r + 1, i] and [i, i + r − 1] have at most α · r/4 red nodes. In particular, for all p ∈ [log k′ ], the neighborhoods U1p = [i − 2p + 1, i] and U2p = [i, i + 2p − 1] contain at most α · 2p−2 red nodes. So on sampling log1+ǫ k′ nodes uniformly at random from these intervals of size 2p , the probability that we sample 1+ǫ ′ at least 43 α log1+ǫ k′ red nodes is at most e−13α log (k )/12 . Taking a union bound over all log k′ intervals, IsGood accepts any α/4-good node with probability at least 1 − negl(k′ ) = 1 − negl(n) for ℓ(λ) = polylog n. We now show that any node which is not α-good under S is not α/4-good for some interval of size 2p , p > 0. Therefore, IsGood rejects any node which is not α-good with probability at least 1 − negl(k′ ). If node i is not α-good under S, then there exists a neighborhood I of i such that the number of red nodes in I is at least α|I|. Let R(X) denote the number of red nodes for some ∗ ∗ subset X ⊆ V . Let U1 ⊆ I ⊆ U2 where |U1 | = 2p and |U2 | = 2p +1 for some integer p∗ > 0. Then ∗ ∗ R(U2 ) ≥ R(I) ≥ α|I| ≥ α|U1 | = α · 2p ≥ 16 α p∗ +1 ·2 . 4 where the inequality (*) results from i not being α-good.  Let (w, i, x) be the challenge provided by any PPT adversary such that dist(c, w) ≤ τ , where c = Enc(x). Recall that using Algorithm Dec1 we can successfully correct any index i ≥ 8k − 4ℓ(λ). Therefore, to design Dec2 , we assume the correctness of node k′ using Dec1 . The procedure Dec2 first checks whether nodes i and node k′ are α-good for some α < 3/4. If they are both α-good, then by Lemma 4.9 there is a path of green nodes connecting i and node k′ . Node k′ now serves as an anchor point by being both α-good and correct due to the repetition code, so then Lemma 5.3 implies node i is also unaltered. We now formalize this and describe Dec2 in Lemma 5.7. Lemma 5.7 Let Enc be as described in Section 5.1. For any 1 ≤ i < 8k − 4ℓ(λ), there exists a procedure Dec2 with the following properties: (1) For any x ∈ {0, 1}k and c = Enc(s, x), Decc2 (s, i) = c[i]. (2) For any x ∈ {0, 1}k , c = Enc(s, x) and w ∈ {0, 1}n generated by any PPT adversary such that dist(c, w) ≤ ∆4J k , Pr [Decw 2 (s, i) ∈ {c[i], ⊥}] ≥ 1 − negl(n).  Moreover, Dec2 makes at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) queries to input w for any constant ǫ > 0. Proof : We claim the following procedure has the desired properties. Decw 2 : Input: Index i < 8k − 4ℓ(λ). (1) Let S be the set of red nodes of G with respect to the labels obtained from w. (2) Let α < 43 . (3) Reconstruct the label of k′ -th node, ℓk′ ,s using a call to Dec1 . m l i mod k′ are α-good under S, then return (4) If node k′ of G with label ℓk′ ,s and node 4·ℓ(λ) wi , (5) Else return ⊥.  First we show that the query complexity of Dec2 is at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) . Observe that Dec1 described in Lemma 5.4 uses majority decoding  to reconstruct the entire block w2k′ +j , for any 0 ≤ j ≤ k′ − 1. Moreover, it uses at most O log3 n coordinate queries to w in order to reconstruct any of the last k′ blocks with 1 − negl(n). Therefore we can assume that after Step (3), the label ℓk′ ,s of G is correct with very high probability. Also, using the procedure described in Lemma 5.6,  we can check if both the nodes k′ and i are α-good using at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) queries for any ǫ > 0. Therefore the query complexity of Dec2 is O ℓ(λ) log3+ǫ (n/ℓ(λ)) . To show (1), observe that if w is a codeword produced by Enc, then the label ℓk′ ,s is reconstructed correctly with probability 1 by Dec1 in the first step. Also since S = ∅, all the nodes of G are α-good. Therefore, Dec2 always returns the correct codeword symbol. Now, if w is any string produced by a PPT adversary such that 0 < dist(c, w) ≤ ∆4J k , then from the analysis of Dec1 in Lemma 5.4, we know that ℓk′ ,s is reconstructed correctly with probability at least 1 − negl(n). If both nodes i and k′ of G are α-good under S, then by Lemma 4.9, we know 17 that there exists a path in G from node i to node k′ in G which consists of only green nodes. So,  node i is a green ancestor of node k′ . The correctness of wi then follows from Lemma 5.3. We now combine the two correctors described above to obtain our local corrector Dec as follows: Decw : Input : Index i. (1) If i ≥ 8k − 4ℓ(λ), return Decw 1 (s, i) (2) Else return Decw 2 (s, i). Lemma 5.8 Let Enc be as described in Section 5.1. For any i ∈ [n], Dec does the following: (1) For any x ∈ {0, 1}k and c = Enc(s, x), Decc (s, i) = c[i]. (2) For any x ∈ {0, 1}k , c = Enc(s, x) and w ∈ {0, 1}n generated by any PPT adversary such that dist(c, w) ≤ ∆4J k , Pr [Decw (s, i) ∈ {c[i], ⊥}] ≥ 1 − negl(n).  Moreover, Dec makes at most O ℓ(λ) log 3+ǫ (n/ℓ(λ)) queries to input w for any constant ǫ > 0. Proof : The proof follows from Lemma 5.7 and Lemma 5.4. Since n = (3k′ − 1) · 4ℓ(λ), any query on an index i < 8k − 4ℓ(λ) is handled by Lemma 5.7 while a query on an index i ≥ 8k − 4ℓ(λ) uses at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) queries, the is handled by Lemma 5.4. Since each scenario  3+ǫ algorithm also uses O ℓ(λ) log (n/ℓ(λ)) queries. Note that for ℓ(λ) = polylog n, the query complexity of the decoder is polylog n.  We now show that our construction Π = (Gen, Enc, Dec) is a CRLCC scheme. Proof of Theorem 2.4: Gen on input a security parameter λ simulates the generator algorithm GenH of the CRHF to output a random seed s. Consider s ← Gen(1λ ), Enc described in Section 5.1 and the decoder Dec described in Section 5.2 above. We claim that the triple Π = (Gen, Enc, Dec) is a CRLCC scheme. From the construction of Enc, we know that the block length of a codeword produced by Enc is n = (3k′ − 1) · 4 · ℓ(λ) < 12k. Therefore, the information rate of the CRLCC is O (1). From Lemma 5.8 we know that on input (w, i, x) generated by any PPT adversary such that dist(Enc(x), w) ≤ ∆4J k , Decw queries at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) coordinates of w and returns d ∈ {Enc(x)[i], ⊥} with probability at least 1 − negl(n). Also, Dec on input any valid encoding (Enc(x), i, x) returns Enc(x)[i] with probability 1.  6 Strong-CRLCC In this section, we give an improved construction that locally corrects a majority of input coordinates. The Barrier: The challenge in correcting a constant fraction of  the nodes in the previous  n construction is that an adversary that is permitted to change O log n symbols can turn all nodes red in a graph that has outdegree O (log n). 18 Key Idea: We overcome the above mentioned barrier using three ideas. First, we run the original δ-local expander Gt through an indegree reduction gadget to obtain a new graph G with k′ = t · m nodes in which almost every node has at most 2 incoming/outgoing edges and each node u in Gt (called the meta-node) corresponds to m nodes u1 , . . . , um in G. Second, we introduce the notion of green meta-node u and show that the same key properties we used for the construction of Weak-CRLCC still hold with respect to the meta-nodes. A meta-node u = {u1 , . . . , um } is defined to be correct if all of its corresponding nodes u1 , . . . , um are correct (i.e., ℓ′uj ,s = ℓuj ,s and x′uj = xuj for each j ≤ m). However, we stress that the definition of a green meta-node does not require that all uj are green. Instead we require that um is green and most of the nodes u1 , . . . , um−1 are green. Crucially, this definition transfers the depth robustness properties of the δ-local expander Gt to G. In particular, if a meta-node v is green and correct and there is a directed path from u to v in Gt containing only green meta-nodes, then u must also be correct (or we will find a hash collision). Third, we group the labels ℓu1 ,s , . . . , ℓum ,s into blocks before encoding them using a good error correcting code with constant rate and constant distance. This forces the attacker to flip at least Ω (m · ℓ(λ)) bits to tamper any of the meta-nodes. In this way we can ensure that an attacker must tamper with at least Ω (t · m · ℓ(λ)) bits to make Ω(t) meta-nodes red. Therefore, by choosing appropriate parameters t and m, we get the Strong-CRLCC. Metagraph We will define the notion of a metagraph used in our approach to construct Strong-CRLCCs. For any graph G = (V, E), let M1 , M2 , . . . Mm be a partition of the vertex set V . We call the graph Gm = (Vm , Em ) with the following properties to be the metagraph of G. Nodes: For every partition Mi of V , there is a unique node vi ∈ Vm . We call vi the simple node and Mi its meta-node. Edges: There exists an edge between vi and vj in Gm if and only if there exists an edge between u and v in G for some u ∈ Mi and v ∈ Mj . Graph Degree Reduction We now describe our procedure ReduceDegree that reduces the degree of many nodes in a graph, while simultaneously yielding a desirable meta-graph. ReduceDegree: (Let G0 be a δ-local expander with δ = 1/100.) Input: Graph G0 with t vertices and m = max{indeg(G0 ), outdeg(G0 )} + 1 Output: Graph G with m · t vertices. • For each node u in G0 we add m nodes u1 , . . . , um to G. Along with each of the directed edges (ui , ui+1 ) and (ui , um ) for i < m. • For each directed edge (u, v) in G0 we connect the final node um to the first node vj that currently has indegree at most 1. Again, the choice of δ = 1/100 is only to satisfy Lemma 4.9. 19 ·G· 0· ··· u G u1 u2 ··· ··· um v v−1 ··· v1 v2 ··· vm Fig. 2: An example of a degree reduction graph 6.1 Enc Algorithm  In this section we describe the Enc algorithm which takes as input a seed s ← Gen 1λ and a message x ∈ {0, 1}k and returns a codeword c ∈ {0, 1}n . For a security parameter λ, let H : {0, 1}∗ → {0, 1}ℓ(λ) be a CRHF (see Definition 4.3). Recall that, ECC and ECCD denote the encoding and decoding algorithms of a good code of rate 1/4 that can decode efficiently from ∆J fraction of errors.   k For t = O ℓ(λ)·log k , let G0 = ([t], E) be a δ-local expander graph on t vertices and degree (indegree and outdegree) m = O (log t). Let G := ReduceDegree(G0 ) be the graph with k′ := nodes output by the degree reducing procedure applied to G0 . k ℓ(λ) Let s ← Gen(1λ ) Enc(s, x): Input: x = (x1 , · · · , xk′ ) ∈ {0, 1}ℓ(λ) k′ , where k = k′ · ℓ(λ) 3t−1 , where t = k′ /m and n = O (k). Output: c = (c1 , · · · , c3t−1 ) ∈ {0, 1}4m·ℓ(λ • Let (ℓ11 ,s , . . . , ℓ1m ,s , . . . , ℓt1 ,s . . . , ℓtm ,s ) = labG,s (x) be the labeling of the graph G with input x using the CRHF (see Definition 5.1). • Let U1 := (ℓ11 ,s , ℓ12 ,s , · · · , ℓ1m ,s ), . . . , Ut := (ℓt1 ,s , ℓt2 ,s , · · · , ℓtm ,s ). • Let T1 := (x1 , x2 , . . . , xm ), . . . , Tt := (x(t−1)m+1 , x(t−1)m+2 , · · · , xtm ). • The codeword c consists of the encoding of groups of message bits, followed by encoding k′ using ECC of groups of labels, followed by t = m copies of the last encoding. c = (ECC(T1 ), ECC(T2 ), · · · , ECC(Tt ), ECC(U1 ), ECC(U2 ), · · · , ECC(Ut ), ECC(Ut ), · · · , ECC(Ut )), | {z } t times where ECC(Ui ) = ECC(ℓi1 ,s , . . . , ℓim ,s ) for all i ∈ [t]. Lemma 6.3 is the key lemma that did not hold for our previous construction. It states that if for any w ∈ {0, 1}n , dist(w, c) ≤ ∆J4 ·k then the number of red meta-nodes is very small. Lemma 6.6 20 is analogous to Lemma 5.3 and asserts that if there is a green path from meta-node u to meta-node v and v is correct then meta-node u must also be correct. It follows that any meta-node v < 4t that is α-good must also be correct because v is connected to all other α-good meta nodes, and there are too many α-good meta nodes for the attacker to corrupt them all. With this observation it is relatively straightforward to extend the ideas from the previous section to build a strong Dec with locality O (polylog n). We also remark that it is possible to allow the rate of our code to approach 1. For example, we can split the initial input x into chunks of size xi ∈ {0, 1}100λ so that the size of each label ℓi,s is significantly smaller than the size of the corresponding chunk (We would also need to modify the underlying ECC so the rate of this code is also close to 1). 6.2 Dec Algorithm Observe that at the end of the construction, each meta-node contains exactly one node (i.e. the final node) with indegree more than 2 (it has indegree m) and outdegree more than 2 (it has outdegree O (m)). The codeword c = Enc(x) consists of 3 parts. The first 4k bits correspond to the message symbols x passed m · ℓ(λ) bits at a time through ECC. The next 4k bits correspond to t codewords ECC(Uj ), and finally the last 4k − 4m · ℓ(λ) bits correspond to the repetitions of the final ECC codeword, ECC(Ut ). Therefore the length of any codeword produced by Enc is O (n) since m = O (log k). Claim 6.1 outdeg(G0 ) = Θ(log k). Definition 6.2 We call a meta-node Mi green if both: • At least 1 − ∆J fraction of the underlying nodes in Mi are green. • The final node in Mi is green. We call a meta-node red if the meta-node is not green. Similarly, we call a meta-node Mi correct if we are able to correctly decode Mi . Observe that Mi can contain tampered nodes but still be correct. Observe that encoding the labels of a meta node using a good code, we ensure that a meta-node can only be corrupted by changing 4m · ℓ(λ) · ∆J bits of the meta-node or finding a hash collision: Lemma 6.3 If dist(w, c) ≤ ∆J k 4 , then at most t 4 meta-nodes in G are red. Proof : Observe that a meta-node can be made red by changing at least 4m · ℓ(λ) · ∆J bits or by finding a hash collision. Therefore, by changing at most ∆4J k bits of a codeword, an adversary k′ k = 4m can make at most 4mℓ(λ) = 4t meta-nodes in G red.  Similar to the decoder Dec of Section 5.2, which splits the decoding procedure for the first 8k−4ℓ(λ) indices and a separate decoding procedure for the remaining indices, the current decoding procedure has separate subroutine to handle indices corresponding to the first 2t − 1 blocks and a separate decoding procedure for the remaining indices. In the following, we define m(i) to be the meta-node corresponding to index i. That is, m l i   l 4mℓ(λ) m, i ≤ 4k i−4k m(i) = 4mℓ(λ) , 4k < i ≤ 8k,    t, i > 8k 21 6.2.1 Query Procedure for m(i) = t In the case that m(i) = t, we run a procedure Decw ≥t (s, i) that takes advantage of the fact that any ∆J k adversary that can change at most 4 coordinates of any codeword obtained from Enc. Thus, the adversary cannot prevent local correction for a query on the last t groups corresponding to the w repetition of ECC codeword. Similar to Decw 1 in Section 5.2, the algorithm Dec≥t (s, i) randomly samples a number of points, takes the majority of the samples, and performs decoding using ECCD. Lemma 6.4 Let Enc be as described in Section 6.1. For any i ∈ [n] such that m(i) = t, there exists an algorithm Decw ≥t that does the following: (1) For any x ∈ {0, 1}k and c = Enc(s, x), Decc≥t (s, i) = c[i]. (2) For any x ∈ {0, 1}k , c = Enc(s, x) and w ∈ {0, 1}n generated by any PPT adversary such that dist(c, w) ≤ ∆4J k ,   n Pr Decw ≥t (s, i) = c[i] ≥ 1 − log n . n  2 Moreover, Decw ≥t makes at most O ℓ(λ) · log n queries to input w. Proof : Consider the following algorithm Decw ≥t (i) for any i ∈ [n] with m(i) ≥ t: Decw ≥t : Input : Index i ∈ [n] with m(i) ≥ t. (1) For each 0 ≤ j < 4mℓ(λ), sample O (log n) indices of w greater than 8k − 4mℓ(λ) and congruent to j (mod 4mℓ(λ)) uniformly at random. (2) For each 0 ≤ j < 4mℓ(λ), choose the symbol w̃j that corresponds to the majority of the samples from Wj . (3) Correct the word (w̃1 , · · · , w̃4mℓ(λ) ) using ECCD and output index i (mod 4mℓ(λ)). First, note that for any codeword obtained from Enc, Dec≥t will always output the correct symbol. Let w be received word which is obtained by altering at most ∆4J k coordinates of some codeword i.e, 0 < dist(c, w) ≤ ∆4J k for some codeword c obtained from Enc. We know that the last t coordinates (mod 4mℓ(λ)) of any codeword are exactly the same, c[j] = c[j + 4mℓ(λ)] for all j ≥ 8k − 4mℓ(λ). Since dist(c, w) ≤ ∆4J k , at most ∆8J of such coordinates j (mod 4mℓ(λ)) are corrupted in more than 1/4 fraction of the blocks. For the remaining j, each query finds an unmodified symbol with probability at least 1 − ∆4J . Then by standard Chernoff bounds over the O (log n) random queries for each j (mod 4m), the probability that the majority of the O log2 n 1 queries are unmodified is at least 1 − nlog n . Then by a simple union bound, the probability that n the majority of the symbols in meta-node Mt are corrected is at least 1 − nlog n. Since Dec≥t makes O (log n) queries for each of the m·ℓ(λ) congruence classes and m = O (log n),  then O ℓ(λ) · log2 n queries are made in total.  22 6.2.2 Query Procedure for m(i) < t Observe from the construction that G0 is the metagraph of G Since G0 is a δ-local expander, then for any 0 < α < 1 and subset S of vertices, the metagraph G0 − S contains at least t − |S| α2 − 1 α-good nodes by Lemma 4.8. Also, from Lemma 4.9, we know that any two α-good nodes are connected by a path in G0 − S. Thus, by letting S be the set of all red meta-nodes, any two α-good meta-nodes in G0 are connected by a path of green meta-nodes. We use these observations to design the corrector for m(i) < t. First, we claim the existence of a procedure to test whether a meta-node is green. Lemma 6.5 Let w = (w1 , · · · w3t−1 ) ∈ {0, 1}n . There exists a procedure IsGreenMeta that uses coordinate O ℓ(λ) · log2 n queries to w and checks whether a meta-node i of G0 with labels corresponding to w is green. Proof : We claim the following procedure satisfies the desired properties: IsGreenMeta(i): Input : Meta-node index i ∈ [t]. (1) Check if the final node in meta-node i is green: • Query coordinates of wt+i and retrieve (ℓ′i1 , . . . , ℓ′im ) := ECCD(wt+i ). • Query the coordinates of wi and retrieve (x′i1 , . . . , x′im ) := ECCD(wi ). • Check whether ℓ′im = H(s, x′im ◦ ℓ′i1 ◦ · · · ◦ ℓ′im−1 ) for the final node im in meta-node i, where i1 , . . . , im−1 are the parents of im , which are all in meta-node i. • If ℓ′im is not consistent, then output ‘Red’. (2) For each node ij in meta-node i, check whether ij is green: • Let ij−1 (in meta-node i) and p(j)r (in meta-node p(j)) be the parents of ij . • Query wt+r and retrieve ℓ′p(j)r using ECCD(wt+p(j) ). • Check whether ℓ′ij = H(s, x′ij ◦ ℓ′ij−1 ◦ ℓ′p(j)r ). (3) If at least 1 − ∆J of the nodes in meta-node i are green, then output ‘Green’. (4) Else, output ‘Red’. Recall from Definition 6.2 that a green meta-node first requires that at least 1−∆J of the underlying nodes in meta-node i are green. Since a node is green if its label is consistent with the labels of its parents, then the procedure IsGreenMeta properly recognizes whether at least 1 − ∆J of the underlying nodes in i are green after decoding using ECCD. Secondly, a green meta-node requires that the final node in i is green. In this case, the final node im has m − 1 parents, and again the procedure recognizes whether ℓ′im = H(s, x′im ◦ ℓ′i1 ◦ · · · ◦ ℓ′im−1 ) after obtaining the labels using ECCD.  To see that the IsGreenMeta does at most O ℓ(λ) · log2 n coordinate queries, we observe that in Step (1), we query two blocks of w each of length 4mℓ(λ) bits. Also, in Step (2), for each of the m − 1 nodes in the meta-node i we queryone additional block  of w to check if it is green. Therefore the total query complexity is O m2 ℓ(λ) = O ℓ(λ) · log2 n .  23 We now introduce the algorithm for recovering a coordinate for input i whose meta-node m(i) is less than t. Decw <t : Input : Index i ∈ [n] with m(i) < t of G, 1 2 < α < 34 , space parameter ǫ > 0. (1) If meta-node m(i) is not green, then return ⊥. (2) For every p ∈ {1, . . . , log t} do: • Sample log1+ǫ k meta-nodes U1p ⊆ [i − 2p + 1, i] and U2p ⊆ [i, i + 2p − 1]. • Use the procedure IsGreenMeta to check the fraction of red meta-nodes in U1p or U2p . • If the fraction of red meta-nodes in U1p or U2p is larger than 34 α, then return ⊥. (3) Otherwise, compute ECCD(wm(i) ) if i ≤ 4k or, ECCD(wt+m(i) ) if i > 4k and return the i (mod 4mℓ(λ))-th coordinate. We crucially use the following lemma to prove the correctness of Dec<t procedure given in Lemma 6.7. Lemma 6.6 The meta-node parents of a meta-node v of G0 that is green and correct must also be correct unless a hash collision was found. Proof : Let v ∈ [t] be a meta-node that is green and correct and let u be a green meta-node parent of v in the metagraph G0 . Let the nodes in v be v1 , . . . , vm and the nodes in u be u1 , . . . , um . Let (x′v1 , . . . , x′vm ) := ECCD(wv ) and ℓ′ = (ℓ′v1 , . . . , ℓ′vm ) := ECCD(wt+v ). If v is green and correct, then ℓ′vt ,s = ℓvt ,s and x′vt = xvt for each 1 ≤ t ≤ m − 1. Let vu be the node of v connected to u so that ℓ′vu ,s = H(s, x′vu ◦ ℓ′vu−1 ,s ◦ · · · ℓ′vum ,s ). Similarly, ℓvu ,s = H(s, xvu ◦ ℓvu−1 ,s ◦ · · · ℓvum ,s ), so the label for um must be correct. Since u is green, then ℓ′um ,s = H(s, x′um ◦ ℓ′u1 ,s ◦ · · · ◦ ℓ′um−1 ,s ). Similarly, ℓ′um ,s = H(s, xum ◦ ℓu1 ,s ◦ · · · ◦ ℓum−1 ,s ). Assuming no hash collisions are found, then xum = x′um and ℓ′ut ,s = ℓut ,s for each 1 ≤ t ≤ m − 1, so u is both green and correct (after decoding using ECCD).  We now justify the correctness of the Dec<t procedure. Lemma 6.7 Let Enc be as described in Section 6.1. For any i ∈ [n] such that m(i) < t, Dec<t does the following: (1) For any x ∈ {0, 1}k and c = Enc(s, x), Decc<t (s, i) = c[i]. (2) For any x ∈ {0, 1}k , c = Enc(s, x) and w ∈ {0, 1}n generated by any PPT adversary such that dist(c, w) ≤ ∆4J , Pr [Decw <t (s, i) ∈ {c[i], ⊥}] ≥ 1 − negl(n).  4+ǫ Moreover, Decw n queries to input w. <t makes at most O ℓ(λ) · log  Proof : First we show that the query complexity of Dec<t is at most O log4+ǫ n . Observe that we query log t indices p. For each p, we sample log1+ǫ k meta-nodes to test whether the meta- nodes are green. The IsGreenMeta procedure checks if a meta-node is green using O ℓ(λ) · log2 n coordinate queries to w. Therefore, the total number of queries is O ℓ(λ) · log4+ǫ n . 24 Note that if w is a codeword produced by Enc, then the meta-node m(i) containing index i is reconstructed correctly by Dec<t by ECCD(wm(i) ) or ECCD(wm(i)+t ) accordingly. Therefore, Dec<t always returns the correct codeword symbol. On the other hand, if w is any string produced by a PPT adversary such that 0 < dist(c, w) ≤ ∆J k 4 , then Dec<t first checks whether the meta-node m(i) containing i is α-good. Recall that G0 is a δ-local expander by construction. Thus if meta-node m(i) is α-good under the set of red meta-nodes S, then by Lemma 4.9, that there exists a path in G0 from meta-node m(i) to a later meta-node that is α-good that consists of only green nodes. Hence, node m(i) is a green ancestor of a green and correct meta-node. The correctness of w[i] then follows by applying a simple induction on Lemma 6.6. We can without loss of generality assume that the last meta-node i.e. t is correct and green using the Dec≥t described in Section 6.2.1. Therefore, we know the existence of such a later node which is green and correct.  Combining the two decodersin Section 6.2.1 and Section 6.2.2, we get a decoder for CRLCC which uses at most O ℓ(λ) · log2 n = polylog n for ℓ(λ) = polylog n. Now we show that we indeed get a Strong-CRLCC and the decoder does not return a ⊥ for majority of the coordinate queries. w Lemma 6.8 Let Dec be defined by running Decw <t on inputs i ∈ [n] where m(i) < t and Dec≥t on inputs i such that m(i) = t. Then 1 Pri [Decw (s, i) 6= c[i]] > . 4 ′ k Proof : Recall from Lemma 6.3 that the number of red meta-nodes is at most 4m . By Lemma 4.8  ′ ′ k 2 k the number of α-good nodes in G0 is at least m − 4m α − 1 . Thus, there exists α < 1 so that the 7k ′ number of α-good nodes in G0 is greater than 12m . Since the adversary can only corrupt a small constant fraction of coordinates of the codeword, then by a simple Pigeonhole argument there is an α-good meta-node j that is also correct, for j > 4t . Therefore, each index i such that m(i) ≤ 4t that is in an α-good meta node has a descendant that is both α-good and correct. Hence, applying  an induction on Lemma 6.6 shows that i is correctable. References [ABH17] Joël Alwen, Jeremiah Blocki, and Ben Harsha. Practical graphs for optimal sidechannel resistant memory-hard functions. In Bhavani M. Thuraisingham, David Evans, Tal Malkin, and Dongyan Xu, editors, ACM CCS 17, pages 1001–1017. ACM Press, October / November 2017. 2.1 [ABP17] Joël Alwen, Jeremiah Blocki, and Krzysztof Pietrzak. Depth-robust graphs and their cumulative memory complexity. In Jean-Sébastien Coron and Jesper Buus Nielsen, editors, EUROCRYPT 2017, Part II, volume 10211 of LNCS, pages 3–32. Springer, Heidelberg, May 2017. 2.1 [ABP18] Joël Alwen, Jeremiah Blocki, and Krzysztof Pietrzak. Sustained space complexity. In Advances in Cryptology - EUROCRYPT - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, 2018. (to appear). 2.1, 2.1, 4, 4.6, 4, 4, 4.8, 4, 4.9, 3 25 [ALRW17] Alexandr Andoni, Thijs Laarhoven, Ilya P. Razenshteyn, and Erik Waingarten. Optimal hashing-based time-space trade-offs for approximate near neighbors. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017, Barcelona, Spain, Hotel Porta Fira, January 16-19, pages 47–66, 2017. 1 [AS15] Joël Alwen and Vladimir Serbinenko. High parallel complexity graphs and memoryhard functions. In Rocco A. Servedio and Ronitt Rubinfeld, editors, 47th ACM STOC, pages 595–603. ACM Press, June 2015. 2.1 [AT17] Joël Alwen and Björn Tackmann. Moderately hard functions: Definition, instantiations, and applications. In Yael Kalai and Leonid Reyzin, editors, TCC 2017, Part I, volume 10677 of LNCS, pages 493–526. Springer, Heidelberg, November 2017. 2.1 [BFLS91] László Babai, Lance Fortnow, Leonid A. Levin, and Mario Szegedy. Checking computations in polylogarithmic time. In Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, USA, pages 21–31, 1991. 1 [BGH+ 06] Eli Ben-Sasson, Oded Goldreich, Prahladh Harsha, Madhu Sudan, and Salil P. Vadhan. Robust pcps of proximity, shorter pcps, and applications to coding. SIAM J. Comput., 36(4):889–974, 2006. A preliminary version appeared in the Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC). 1 [BK95] Manuel Blum and Sampath Kannan. Designing programs that check their work. J. ACM, 42(1):269–291, 1995. 1 [BL13] Daniel J. Bernstein and Tanja Lange. Non-uniform cracks in the concrete: The power of free precomputation. In Kazue Sako and Palash Sarkar, editors, ASIACRYPT 2013, Part II, volume 8270 of LNCS, pages 321–340. Springer, Heidelberg, December 2013. 1 [BLR93] Manuel Blum, Michael Luby, and Ronitt Rubinfeld. Self-testing/correcting with applications to numerical problems. J. Comput. Syst. Sci., 47(3):549–595, 1993. 1 [BR93] Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In V. Ashby, editor, ACM CCS 93, pages 62–73. ACM Press, November 1993. 1 [BZ17] Jeremiah Blocki and Samson Zhou. On the depth-robustness and cumulative pebbling cost of Argon2i. In Yael Kalai and Leonid Reyzin, editors, TCC 2017, Part I, volume 10677 of LNCS, pages 445–465. Springer, Heidelberg, November 2017. 2.1 [CGdW13] Victor Chen, Elena Grigorescu, and Ronald de Wolf. Error-correcting data structures. SIAM J. Comput., 42(1):84–111, 2013. 1 [CKGS98] Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. Private information retrieval. J. ACM, 45(6):965–981, 1998. 1 [CMS99] Christian Cachin, Silvio Micali, and Markus Stadler. Computationally private information retrieval with polylogarithmic communication. In Advances in Cryptology - EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic 26 Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pages 402–414, 1999. 1 [DGL04] Yan Ding, Parikshit Gopalan, and Richard Lipton. Error correction against computationally bounded adversaries. Manuscript, 2004. 1, 3 [DGY11] Zeev Dvir, Parikshit Gopalan, and Sergey Yekhanin. Matching vector codes. SIAM J. Comput., 40(4):1154–1178, 2011. 1, 3 [DH09] Irit Dinur and Prahladh Harsha. Composition of low-error 2-query pcps using decodable pcps. In 50th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2009, October 25-27, 2009, Atlanta, Georgia, USA, pages 472–481, 2009. 3 [Efr12] Klim Efremenko. 3-query locally decodable codes of subexponential length. SIAM J. Comput., 41(6):1694–1703, 2012. 1, 3 [EGS75] Paul Erdös, Ronald L. Graham, and Endre Szemeredi. On sparse graphs with dense long paths. Technical report, Stanford University, Stanford, CA, USA, 1975. 2.1, 4, 3 [Gas04] William I. Gasarch. A survey on private information retrieval (column: Computational complexity). Bulletin of the EATCS, 82:72–107, 2004. 1 [Gol06] Oded Goldreich. On post-modern cryptography. Cryptology ePrint Archive, Report 2006/461, 2006. http://eprint.iacr.org/2006/461. 1 [GRR18] Tom Gur, Govind Ramnarayan, and Ron D. Rothblum. Relaxed locally correctable codes. In 9th Innovations in Theoretical Computer Science Conference, ITCS, pages 27:1–27:11, 2018. 1, 2 [GS16] Venkatesan Guruswami and Adam D. Smith. Optimal rate code constructions for computationally simple channels. J. ACM, 63(4):35:1–35:37, 2016. 1, 3 [HO08] Brett Hemenway and Rafail Ostrovsky. Public-key locally-decodable codes. In Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Proceedings, pages 126–143, 2008. 1, 3 [HOSW11] Brett Hemenway, Rafail Ostrovsky, Martin J. Strauss, and Mary Wootters. Public key locally decodable codes with short keys. In 14th International Workshop, APPROX, and 15th International Workshop, RANDOM, Proceedings, pages 605–615, 2011. 1, 3 [Jus72] Jørn Justesen. Class of constructive asymptotically good algebraic codes. IEEE Trans. Information Theory, 18(5):652–656, 1972. 2.1, 4, 4.1, 5.1 [KdW04] Iordanis Kerenidis and Ronald de Wolf. Exponential lower bound for 2-query locally decodable codes via a quantum argument. J. Comput. Syst. Sci., 69(3):395–420, 2004. 3 [KL14] Jonathan Katz and Yehuda Lindell. Introduction to Modern Cryptography, Second Edition. CRC Press, 2014. 4, 4.2, 4.3 27 [KM07] Neal Koblitz and Alfred J. Menezes. Another look at “provable security”. Journal of Cryptology, 20(1):3–37, January 2007. 1 [KM15] Neal Koblitz and Alfred Menezes. The random oracle model: A twentyyear retrospective. Cryptology ePrint Archive, Report 2015/140, 2015. http://eprint.iacr.org/2015/140. 1 [KMRS17] Swastik Kopparty, Or Meir, Noga Ron-Zewi, and Shubhangi Saraf. High-rate locally correctable and locally testable codes with sub-polynomial query complexity. J. ACM, 64(2):11:1–11:42, 2017. 1, 3 [KS16] Swastik Kopparty and Shubhangi Saraf. Guest column: Local testing and decoding of high-rate error-correcting codes. SIGACT News, 47(3):46–66, 2016. 1 [KT00] Jonathan Katz and Luca Trevisan. On the efficiency of local decoding procedures for error-correcting codes. In Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, USA, pages 80–86, 2000. 1 [LFKN92] Carsten Lund, Lance Fortnow, Howard J. Karloff, and Noam Nisan. Algebraic methods for interactive proof systems. J. ACM, 39(4):859–868, 1992. 1 [Lip94] Richard J. Lipton. A new approach to information theory. In STACS, 11th Annual Symposium on Theoretical Aspects of Computer Science, Proceedings, pages 699–708, 1994. 1, 3 [Men12] Alfred Menezes. Another look at provable security (invited talk). In David Pointcheval and Thomas Johansson, editors, EUROCRYPT 2012, volume 7237 of LNCS, page 8. Springer, Heidelberg, April 2012. 1 [MPSW05] Silvio Micali, Chris Peikert, Madhu Sudan, and David A. Wilson. Optimal error correction against computationally bounded noise. In Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pages 1–16, 2005. 1, 3 [MR10] Dana Moshkovitz and Ran Raz. Two-query PCP with subconstant error. J. ACM, 57(5):29:1–29:29, 2010. A preliminary version appeared in the Proceedings of 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2008). 3 [OPS07] Rafail Ostrovsky, Omkant Pandey, and Amit Sahai. Private locally decodable codes. In Automata, Languages and Programming, 34th International Colloquium, ICALP, Proceedings, pages 387–398, 2007. 1, 3 [SS96] Michael Sipser and Daniel A. Spielman. Expander codes. IEEE Trans. Information Theory, 42(6):1710–1722, 1996. 2.1 [STV99] Madhu Sudan, Luca Trevisan, and Salil P. Vadhan. Pseudorandom generators without the XOR lemma (abstract). In Proceedings of the 14th Annual IEEE Conference on Computational Complexity, Atlanta, Georgia, USA, May 4-6, 1999, page 4, 1999. 1 [Tre04] Luca Trevisan. Some applications of coding theory in computational complexity. CoRR, cs.CC/0409044, 2004. 1 28 [Yek08] Sergey Yekhanin. Towards 3-query locally decodable codes of subexponential length. J. ACM, 55(1):1:1–1:16, 2008. 1, 3 [Yek12] Sergey Yekhanin. Locally decodable codes. Foundations and Trends in Theoretical Computer Science, 6(3):139–255, 2012. 1 29
8cs.DS
1 Semantic Web Today: From Oil Rigs to Panama Papers arXiv:1711.01518v1 [cs.AI] 5 Nov 2017 RIVINDU PERERA∗ , PARMA NAND, and BORIS BAČIĆ, Auckland University of Technology WEN-HSIN YANG, Industrial Technology Research Institute KAZUHIRO SEKI, Kobe University RADEK BURGET, Brno university of technology The next leap on the internet has already started as Semantic Web. At its core, Semantic Web transforms the document oriented web to a data oriented web enriched with semantics embedded as metadata. This change in perspective towards the web offers numerous benefits for vast amount of data intensive industries that are bound to the web and its related applications. The industries are diverse as they range from Oil & Gas exploration to the investigative journalism, and everything in between. This paper discusses eight different industries which currently reap the benefits of Semantic Web. The paper also offers a future outlook into Semantic Web applications and discusses the areas in which Semantic Web would play a key role in the future. CCS Concepts: • Information systems → Semantic web description languages; • Computing methodologies → Ontology engineering; Semantic networks; Additional Key Words and Phrases: Semantic Web, Linked Open Data, Ontology Engineering, SPARQL Reference format: Rivindu Perera, Parma Nand, Boris Bacic, Wen-Hsin Yang, Kazuhiro Seki, and Radek Burget. 2017. Semantic Web Today: From Oil Rigs to Panama Papers. (October 2017), 21 pages. http://www.rivinduperera.com/publications 1 INTRODUCTION The concept of Semantic Web is fast becoming a key instrument in diverse fields since its inception in 2001 through the seminal paper by Berners-lee et al. [7]. Semantic Web extends the current web infrastructure by transforming the document web to a data web (Web of Data) which is machine readable. It also enables us to create links within and across the data as it operates at the data level and thus is more granular than the document level linking in the traditional web. Since the Semantic Web works at the data level with a well specified meaning, this approach makes it widely applicable throughout diverse domains with seamless integration with a variety of technologies. The two paragraphs below discuss case studies to illustrate the potential of Semantic Web in two different areas. A single offshore oil rig produces terabytes of data in a single day, making Oil and Gas industry one of the most data intensive industries on the earth today. According to Chevron, a leading oil and gas company, the current data load is over 6000 TB and growing at a rate of 80% annually. [9]. Instead of the traditional document collections, Chevron started employing the Semantic Web to manage the excessive data load. The company has came up with number of tools and techniques, and among them the ontology-driven information integration ∗ Corresponding author: [email protected] The work reported in this paper is part of the RealText project funded by Auckland University of Technology. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact Rivindu Perera. © 2017 Copyright held by Rivindu Perera. XXXX-XXXX/2017/10-ART1 http://www.rivinduperera.com/publications 1:2 • R. Perera et al. case study [8] clearly shows the flexibility and the scalability of the data model. It also reports a number of other benefits which support easy handling of the massive data load. On 16 April 2016, "John Doe", a whistle-blower released 2.6 Tb of data (including 320,166 text documents, 2.15 million PDF files, and 4.8 million emails) which is commonly known as Panama Papers and describes how politicians, business entities, and other individuals evade taxes and other international sanctions. After exactly one month, on 17 May 2016, a leading Semantic Web company, Ontotext, transformed the Panama Papers into Linked Data form and introduced this new data collection as Linked Leaks dataset [31] which is entirely based on the Semantic Web technologies. One of the main advantage of Linked Leaks dataset is that it is easy to query and identify how different entities mentioned in the dataset interrelate with each other, which was very difficult to carry out with the original unstructured text documents. The aforementioned two case studies illustrate the integration of Semantic Web into two diverse fields in order to represent and process information originally encoded as natural text. The objective of this paper is to present an overview of applications and other areas where Semantic Web has contributed to improve the workflow with its wide range of technology stack. The rest of the paper is structured as follows. The next section is devoted for an introduction to the Semantic Web. We describe the essence and the foundations of the Semantic Web concepts and interested readers can follow the references to refer to extended discussions. Section 3 to Section 10 focus on eight different domains which have benefited widely from the Semantic Web technologies. We present an overview of cutting-edge research being carried out in these areas as well as some future research opportunities and remaining gaps. Section 11 provides a brief overview of how the semantic web can contribute to other areas which are not investigated so far. We conclude the paper in Section 12 with an analysis on the presented information. 2 SEMANTIC WEB: A GENTLE INTRODUCTION This section provides a brief introduction into the Semantic Web technology stack which provides the foundation for a number of applications in a wide variety of industries. The origin of the Semantic Web addresses a number of drawbacks of the traditional document oriented web. Firstly, the documents which contain unstructured text are indexed and retrieved using text matching algorithms which do not take semantics of the document into account. This results in irrelevant documents in the search result. Secondly, the websites that generate the content based on structured backend data thus the underlying data remains hidden, hence is not available for consumption directly by machines. The third and the most important factor is that current web does not incorporate semantics as metadata. For example, headings in a HTML page are merely special appearances of text and has no metadata that denotes how that information is related to the core of the document. Semantic Web addresses all of the above issues by providing the access to the data together with the metadata that enables a semantic view of the information contained in the web page. This is enabled by a range of technologies which specifies guidelines on how this data should be presented. Figure 1 depicts the technology stacks of the Semantic Web which is a layered diagram containing all major technologies used in the Semantic Web today. The foundation of the technology stack is the identifiers denoted in URIs and characters represented in Unicode. Then XML is selected as the main syntax form and on which RDF layer is placed. The RDF is a simple yet powerful knowledge representation in the form of triples. A RDF triple is composed of a subject, predicate and an object which are represented in URI form. Current RDF schema allows objects to be denoted as literal values instead URIs, however, subjects must be represented in URIs pointing to entities being mentioned. Triples in Semantic Web represents the basic element of information which are collectively organized under ontologies specified in OWL. In addition, RDFS can also be used to denote a simple taxonomy, however, it is not powerful as OWL when specifying complex relationships. Semantic Web also provides a querying language, SPARQL which is similar to the relational database querying language SQL, Semantic Web Today: From Oil Rigs to Panama Papers • 1:3 Fig. 1. Layered Technology stack of the Semantic Web however, it is more expressive and has a number of constructs specific to the Semantic Web infrastructure. Semantic Web also contains the logic specified in Description Logic and also has its roots in Graph theory. However more importantly, covering all of the layers in the technology stack, the security layer enables the privacy and protection for the Semantic Web data. The collection of the aforementioned technology stack helps the Semantic Web to be applied in number of data intensive application areas. Furthermore, it is also supported by number of active communities, conferences (e.g., ISWC, ESWC) and W3C (and its working groups) which set the standards for the Semantic Web. 3 OIL AND GAS INDUSTRY As introduced briefly at the start, Oil and Gas industry is one of the most data intensive industries in the world. This has influenced a number of Oil and Gas companies to manage the massive data load using the Semantic Web technology stack. The Semantic Web applications in the Oil and Gas industry can be described under four main categories. Table 1 describes these criteria where first three were initially proposed by Chum [8] and we have added the new category,data security, which focuses on the ways of improving the privacy and security of the data when applying the Semantic Web infrastructure. Although applications related to all these areas are not overly prevalent in the industry today, there are several case studies that focus on different aspects of the four mentioned categories in Table 1. Specifically, Chevron has carried out number of projects to investigate how Semantic Web can be beneficial to their oil exploration and management workflow. 1:4 • R. Perera et al. Table 1. The categories where Semantic Web applications considered in the oil and gas industry Category Description Data standardization This factor focus on how current oil and gas data can be standardized through a Semantic Web inspired solution Data integration This covers how Semantic Web can combine data coming from different processes in oil and gas industry and providing a unified view to analysts. Data sharing and enhancement This covers how Semantic Web technologies help to share data among users, applications, and other processes. And it further discuss the chances of enhancing the oil and gas data. Data security This will discuss security issues which can arise in Semantic Web enabled oil and gas industry. Soma et al. [55] present the semantic web solution for real-time reservoir management system developed at Chevron. The approach uses the semantic web to access data efficiently and to enhance a consistent view of the information. The core of the system is relying on a meta-catalog which is a knowledgebase powered by semantic web technologies. The system first extracts information from the repositories and enhances the data using OWL inference before being uploaded to the knowledgebase. Furthermore, a SPARQL based querying function is also provided, so that information can be accessed more efficiently compared to searching the semi-structured information. Fluor Corporation’s Accelerating Deployment of ISO 15926 (ADI) project [43, 44] describes how RDF/OWL and ISO 159263 Part 4 Reference Data Library can be utilized to enhance the information available in the whole life cycle of a plant. The ISO 159263 Part 4 contains definitions of plant objects and is considered as a main resource in oil and gas industry. However, as this information is text based, its usability in computerized systems is very low. Therefore, the ADI project transforms this information into RDF/OWL form so that computer systems can understand and further enhance the data. In addition, the OWL form of the definitions also helps corporate level data sharing as well as update the information on demand. Similar to ADI project, Norwegian Daily Production Report (DPR) project also uses the ISO 15926 to standardize the production data reporting. DPR also receives number of benefits by applying the ISO standard based ontology. Mainly, as the production data reports use the computer understandable form of classification (i.e., ontology), the reports can be queried easily and even the data can be compared automatically supporting automated decision analysis. It has also become an important goal to integrate ontologies with the increase in ontology schema to organize oil field information. The Integrated Information Platform (IIP) project focuses on this special objective where a platform is designed to integrate ontologies and generate new ontologies. The IIP project currently contains the information from Petrotechnical Open Software Corporation (POSC) which provides number of ontology classes based on ISO 15926. Furthermore it is also important to increase the awareness of such projects, so that the ontology integration can be carried out broadly resulting a conformance within the oil and gas industry for data definitions. The case studies discussed in this section illustrated number of different ways that Semantic Web is employed in the Oil and Gas industry. However, still there are many opportunities to utilize the Semantic Web concepts in Oil and Gas to improve the workflow and the quality. For instance, Semantic Web can be combined with Internet Semantic Web Today: From Oil Rigs to Panama Papers • 1:5 of Things (IoT) devices and other hardware accessories that are used to generate information in structured from with underlying metadata. Such information generation can enhance the information quality as well as supports the underlying information infrastructure. Furthermore, the need of human friendly systems to access these information has also become a serious need. As Semantic Web data is represented in triple form unlike natural text presented in a document (as in traditional approach), the accessibility of the data for human users has decreased. Due to this, middle-tier frameworks to transform SPARQL, triples, and ontology specifications to natural language and vice versa has become an important need. 4 MILITARY TECHNOLOGY With the invention of novel military technologies that range from weaponized mobile robots to armed predator drones, the amount of information produced is massive and grows exponentially with the number of instances placed in the battle. More importantly, all the information produced by these automated military units are important in making decisions on the battle. Military technologists are now very keen on Semantic Web to manage the growing data load and support the decision analysis phase during the battle. Halvorsen and Hansen [24] introduce a military information integration approach using Semantic Web technologies. Military systems that are placed in a battle or towards a common goal often need to share the information to carry out successful interconnected mission. It is also important that human agents or computerized agents involved in the battle get background information on the objects and environment of the mission is taken place. Halvorsen and Hansen [24] utilize the RDF and the information presentation and serialization mechanism between agents and SPAQL as the communication protocol. The proposed communication protocol contains both the one-off SPARQL queries as well as streaming queries which offers agents to share information or get updates continuously on a certain task or change in the environment. In a case study presented by Halvorsen and Hansen [24] shows how this Semantic Web based information integration system can be used for threat detection. The case study includes number of information sources including DBpedia which is an open domain Linked Data source. Using these information source, the system attempts to identify the threats nearby by reasoning over number of information units which are provided as the RDF triples and acquired through SPARQL queries. Figure 2 shows an example scenario where threat detection is taken place using the RDF triples and simple reasoning over the triples. The Military domain is also keen on applying the Semantic Web techniques to standardize the information that it generates. For instance, MilInfo [59] is an ontology that contains the military information and is currently comprised of 188 concepts. The main benefit of developing MillInfo is that the information can be shared between the systems and information from different systems can be integrated to support the automated decision analysis. As described previously in the approach presented by Halvorsen and Hansen [24], the information required for a battle may reach the decision analysis system from different devices, soldiers and even from external systems. The availability of an ontology such as MillInfo makes the information integration process easier and more accurate. Similarly, numerous efforts have been taken to develop ontologies to conceptualize the battlefield information. Air Tasking Order (ATO) ontology [20] is used as the formal document to assign aircrafts to missions. Since ATO is a rich terminology, the corresponding ontology also contains number of classes which presents the formal definition of the knowledge. Figure 3 illustrates the aircraft mission ontology which is a part of the ATO and it also utilizes another two ontologies developed as a part of ATO, aircraft and aircraft configuration load ontology. Frantz and Franco [20] also describe the process of building the ATO ontology which uses the OWL and has also carried out reasoning experiments which shows good potential in numerous military applications. Several other ontologies such as Tactics, Techniques, and Procedures ontology [36]; Air Mobility Command (AMC) ontology [39, 40]; Computer Generated Forces (CGF) ontology collection [36] which is comprised of 4 different ontologies; and as well as Battle Management Language (BML) ontology [58] also provide a formal 1:6 • R. Perera et al. Fig. 2. Military Information Integration Example Fig. 3. A portion of the aircraft mission ontology which is designed by Frantz and Franco [20] Semantic Web Today: From Oil Rigs to Panama Papers • 1:7 conceptualization of the military information which can be used for machine-to-machine interaction for enhancing the mission effectiveness and enabling rapid situational awareness [49]. The analysis shows that Semantic Web has number of applications in the military operations in order to make the safety as well as to achieve the goals in ease. However, there are also some opportunities to integrate Semantic Web to further improve the military operations as well as to come up with informed decisions. One of the areas that needs immediate attention is the transformation of information about soldiers to Semantic Web format (i.e., Linked Data). This has number of benefits as the data can be used to select soldiers who are ready to include in a particular battle as well as can also be used to keep track of the soldiers who are retired. The selection of soldiers for a particular battle can be extremely challenging when the mission is in a critical stage. Thus it may require selecting soldiers who have prior training on a similar terrain, fluency of a particular language, or even who have similar physical appearance so that they can reach to the enemy without being noticed. In such scenario it is important to record all the information of a particular soldier as well as an expressive querying mechanism to easily select limited number of candidates from a large group (e.g., selecting 5 most suitable soldiers from a 10000 group to execute a critical mission). Secondly, the retired soldiers (mostly high grade officers) have reasonable knowledge about the battle field as well as sensitive data, it is vital to keep track of these members in a constantly updated and linked information source which supports advanced querying mechanisms. The Semantic Web fulfills these gap with its graph storage and SPARQL querying which is expressive than traditional relational database querying such as SQL queries. AKTiveSA project [52, 53] investigates the Semantic Web application in Military Operations Other Than War (MOOTW). MOOTW covers situations such as humanitarian relief, re-establishing normalcy in an area, noncombatant evacuation operation, and no-fly zone enforcement. Since a number of diverse agencies are connected in such scenarios, the MOOTW operational team has to deal with a large number of heterogeneous data sources. AKTiveSA project employs Semantic Web to improve situational awareness in such operations with a full stack of semantic technologies. In essence, the ontologies are used as the basis for knowledge conceptualization and to integrate information rapidly, while RDF store is used to store the information with a SPARQL endpoint which is provided to access information with high expressive power. 5 E-GOVERNMENT The concept of government has evolved from the first simple form of government created by the Sumerians using clay tablets as a reporting tool to the 196 governments in the world today which operate based on complex and advanced technologies including Artificial Intelligence (AI). However, with the advancement of the government processes and amount of data produced in various departments, arises the need for scalable and enhanced data managing platforms. Semantic Web addresses this growth of government data with the new concept of e-Government where process is largely based on IT related processes. Yang et al. [62] present the semantic information portal and the semantic search algorithm for the e-government domain. The implementation of a semantic information portal has numerous benefits compared to the traditional information portal which is based on unstructured text. A semantic information portal can offer advanced search mechanisms as the information is organized on a domain ontology which defines the conceptual representation of the data. The underlying search mechanism can utilize the ontology to come up with search results which are more specific to the query instead of a text search as carried out in traditional information portals. Furthermore, a semantic information portal supports the decentralization of information by defaults unlike a centralized traditional information portal. This decentralization is a major advantage when scaling the information portal to keep massive amount of information and serving exponentially growing user base. In addition, semantic information portal also supports the automation of the services as the information can be understood by the computer program as the information is unambigiously associated with the underlying metadata. Therefore, applications such as decision analysis systems can be developed using the 1:8 • R. Perera et al. information recorded in the semantic information portal which enables the e-Government services to operate increased efficiency. Yang et al. [62] also implement the semantic search algorithm to retrieve results for a given query. Instead of a traditional search approach which with text search, semantic search algorithm can also associate the metadata associated with information and can hence can achieve a deeper search on the units of information. Building ontologies for the e-Government is also at the center of the semantic web based e-Government applications. Haav [23] describes the process of developing domain ontologies targeting semantic annotation of e-Government data services. Haav [23] introduces a process comprised of seven steps to build domain ontologies for e-Government which starts with the collection of concepts and then follows an iterative development. The advantage of such specified ontology design is that it supports the changes with minimum effort and the process can be reused in a number of scenarios with minimum modifications. Several other researchers [18, 22, 25, 28, 50, 51] also discuss how ontologies can be successfully utilized for e-Government applications. The core advantage as pointed out by these researchers is that an ontology offers the conceptualization of information which was earlier recorded as unstructured text with no associated meaning. In addition to the ontologies and the applications, governments are now voluntarily engaged in the open data initiatives where government data is published to the public to be accessed freely.. Majority of this data is statistical data which describes the performance factors as well as some figures related to the government operations. Therefore, RDF Data Cube vocabulary which is introduced to model statistical data has become the defacto data model for open data published by governments. For instance, United Kingdom has made major effort towards releasing its data as open linked data utilizing the RDF Data Cube form accessible via 19 publicly accessible APIs [54]. This approach increases the transparency of the government as well as open new research opportunities to increase the quality of the government based on the historical data. One of the significant example is the analysis and visualization carried out on how UK government spending money. Figure 4 shows a portion of this visualization where distribution of money among different governments is presented in a graph view. This section discussed a number of different ways in which the Semantic Web is applied in e-Governence in order to increase the accessibility of the data as well as to open new opportunities for research and as a result the quality of the governance is improved. The approaches mentioned here mainly focused on ontologies, semantic services, data representation, and visualization. However, the structured form of the government data also generates a number of other benefits towards intelligent use of this data for predictive analysis and future resource planning. Although such intelligent analysis can be carried out at the government level, it will become even more important to look at this from the global perspective which enables us to get ready for any upcoming global challenge. In addition, the core factor behind such global analysis is to improve the linkage of government datasets. In essence, we also need to focus on automated models to align and link government data thus generating a massively interlinked government Linked Data cloud which provides a view on how different governments perform in the globalized world. 6 E-BUSINESS AND E-COMMERCE E-Business and e-Commerce are also key areas that handle massive amounts of data and utilize this data to make important decisions which have substantial impact on the future of the organization. Although data is central these applications, a large proportion is still kept as unstructured data. However in recent times, there has also a steady trend towards the use of Semantic Web in business and commerce areas.. In this section we discuss how e-Business and e-Commerce employ Semantic Web to to implement smart solutions that reduce the cost and increase efficiently leading to higher overrall benefits. One of the key requirements to enhance the business process with Semantic Web is to come up with ontologies that can conceptualize the business workflow. Hepp [26] introduces the GoodRelations ontology which can Semantic Web Today: From Oil Rigs to Panama Papers • 1:9 Fig. 4. A portion of the UK government open data visualization to analyze the money distribution among different departments act as a core requirement for a successful Semantic Web based e-commerce platform. GoodRelations ontology can be used to model e-commerce information about products, prices, offers, and many other concepts that are frequently used in the commercial environment. This extensive representation of e-commerce entities makes the GoodRelations ontology one of the fundamental tool in applying Semantic Web in e-commerce domain [4, 27, 41]. Akanbi [1] presents the LB2CO, an integrated e-Commerce ontology framework. The LB2CO introduces two types of agents, namely, search agent and ontology agent to increase the usability of the e-Commerce applications. The search agent is the main communication point to the consumer and it is capable of analyzing metadata associated with the products. The ontology agents manages the information where products are described ontologically, so that search agent can utilize the information and answer queries efficiently. Akanbi also evaluates the system with a case study where a prototype is built based on the ontological framework. The approach presents promising results where the consumers queries can be appropriately processed using the semantics embedded in the query and also there is a wide range of future enhancements for such ontological framework based e-Commerce platform. Matchmaking in e-Commerce is yet another area which has widely benefited from Semantic Web. Matchmaking in the e-Commerce context corresponds to narrowing down the search space of product or service offers in order to select the best compatible one available. Hence, matchmaking systems need to deal with a number of different factors which can be numerical scales as well as categorical variables which define requirements which ultimately need to be aligned with the offer. This offers a good opportunity to employ Semantic Web as it can work on the structured level of data and have the flexibility of defining the data with semantics which is very important in the matchmaking process. Paolucci et al. [45] describe the implementation of DAML-S 1:10 • R. Perera et al. sec:Threat ent:Infrastructure sec:ThreatPrevention sec:Attribute Fig. 5. A portion of the security ontology introduced by Ekelhart et al. [14] Matchmaker which is comprised of ontologies, DAML-OIL reasoner, and a matching engine. DAML-S Matchmaker is capable of automating business processes by interacting with the web services by utilizing the DAML annotated data. For instance, a user can automate the entire process of planning a trip by initiating the process with a date. DAML-S Matchmaker is then capable enough to interact with e-commerce applications including airline services, car rentals, and even accommodation services and complete the rest of the process for the specified date. The ontology reasoning and other semantic technologies are cornerstones of this process as they helps the matchmaker to come up with possible solutions for the user needs. Trastour et al. [57] focus on utilizing DAML+OIL to develop an expressive and flexible web service description language to support business-to-business e-commerce domain. Trastour et al.’s proposed system contains the entire lifecycle of e-commerce which includes matchmaking, negotiation, contract formation, and contract fulfillment. The systems is demonstrated using a prototype matchmaking system that uses FaCT++ (OWL DL Reasoner) and operates on service descriptions in DAML+OIL. The security of e-Commerce applications based on Semantic Web has also become a key area to focus as the application of Semantic Web can significantly change the information management and sharing strategy. . A detailed discussion on security issues that can be present in the Semantic Web based e-Commerce can be found in analysis carried out by Ekelhart et al. [14]. According to Ekelhart et al. [14], one of the extremely necessary need in Semantic Web based e-commerce is to protect the integrity and availability of the ontologies. Ekelhart et al. [14] propose XML access control as well as introduce the security ontology that helps to model security issues in the e-commerce domain. Fig. 5 illustrates a portion of the security ontology introduced by Ekelhart et al.. The figure indicates only the threat section of the security ontology which is composed of three main sub-ontologies, namely, Threat, Threat Prevention, and Infrastructure. This section illustrated how Semantic Web can be utilized in e-Business and e-Commerce domains to conceptualize data, build applications, as well as to improve security. However, there is an obvious need for movement towards Semantic Web based data representation within business organizations. One of the major factors that influence this movement is the difficulty in employing unstructured text in the decision making process. In essence, unstructured text is ambiguous and finding the correct information using token matching takes time and manual effort in a large text corpus related to the business processes. On the other hand, Semantic Web triples encoded with semantics and schema specifications are much more precise and in addition the triples can be queried directly hence eliminating the need for errorenous for token-matching based search. Semantic Web Today: From Oil Rigs to Panama Papers • 7 1:11 E-HEALTH AND LIFE SCIENCES The Entire health and life science industry is now in the transition to the e-Health movement where patient data will be kept and analyzed electronically (possible using AI in the future) rather than paper based documents. However, to develop solutions that work efficiently with electronic patient data that can cater for millions of users, it needs to have scalable and queryable forms of data representation. In addition, to support integration of AI in the future for the automation of the decision making process, this data representation should also support holding metadata which describes the semantics of the data supporting automated systems to understand the data. Krummenacher et al. [35] describes the process of building the European Patient Summary (EPS) infrastructure based on Semantic Web technologies. The EPS project focuses on building a European eHealth infrastructure that is capable of providing a data accessing and processing platform for primary clinical data stored in eHealth applications across the European healthcare delivery network. This aim require EPS to develop a scalable infrastructure that can integrate information in an efficient manner. The EPS project, therefore has selected Semantic Web that has already shown the capability of information integration in a massive scale. Semantic Web has also been employed by Podgorelec and Pavlič [48] to integrate and store diagnostic data of Mitral Valve Prolapse (MVP) syndrome. The architecture of the system is based on inter-connected modules where RDF provider plays the main role of data acquisition from different sources and integrate them to increase the accessibility of the data. The data integration framework can also interface with a web portal where the data can be easily accessed and searched. Specifically, searching of the data which is associated with metadata can significantly decrease the ambiguity level of the search results.. In addition to the RDF data storage, the ontologies also provide a number of benefits to the eHealth application by presenting a conceptualization of the domain knowledge. For instance, Kim and Choi [30] present the design of the knowledge base for heart disease detection. The knowledge base encodes knowledge acquired from ECG and other information sources using the semantic web as the underlying technology and more specifically focusing on ontologies to conceptually organize the knowledge. The ECG ontology which is introduced in the research provides the conceptual overview of the wave properties of ECG such as polarity, lasting period, amplitude, and shape of wave. This type of conceptualization can ultimately support the automated decision analysis based on the knowledge base and can vastly reduce the workload of the medical practitioners in the future. Although, ontologies can contribute to eHealth in a positively beneficial way compared to a simple taxonomy, mismatches can also occur which could lead underlying knowledge infrastructure into confusions. The research proposed by Ganguly et al. [21] focusrd on addressing the interoperability issues in ontology based eHealth applications by resolving mismatches between the conceptual hierarchies. The case studies discussed above shows how Semantic Web has contributed to eHealth by leveraging the information accessibility and integration. Some workshops such as Semantic Web for Life Science (SW4LS) are specifically devoted to discuss the impact of the Semantic Web in the eHealth domain. However, still number of research challenges and opportunities exist in integration of Semantic Web with eHealth domain. Firstly, a movement towards rapid conceptualization of medical and health terminologies is essential. Although, Human Phenotype Ontology (HPO) [33], Systemized Nomenclature of Medicine Clinical Terms (SNOMED- CT) [10] and several other ontologies have contributed to come up with a detailed specification of conceptualization, there still remains large amount of medical and clinical knowledge that is not included in the ontologies. In addition, certain standards and protocols need to be devised before introducing Semantic Web as a consensus data storage (i.e. in triple stores) medium for eHealth applications as data usage in eHealth domain has number of ethical and security constraints. 1:12 8 • R. Perera et al. MULTIMEDIA AND E-CULTURE Netflix, Spotify, Vevo and other related entertainment services have transformed the entire way we consume multimedia content, boosting the industry with advanced technologies including AI based recommendation algorithms. However, with approximately 2500 movies and 1 million songs released to the public annually, the metadata which carries important information about these releases such as producers, actors, musicians, and even recording companies are also growing at lightning speed. The multimedia services need this metadata to be able to offer quality services to their users will also need to be able to handle the growing data load. Fan and Li [17] propose an image retrieval approach utilizing ontology-guided reasoning. The proposed approach uses the ontology to identify the semantics associated with user queries and Bayesian Network (BN) to calculate the relevance of the images to the initial query. The ontology in this approach plays a significant role on conceptualizing the user query by enhancing it with subclasses, superclass, and the equivalence classes. This semantics-enabled approach significantly deviates from the traditional approach which focuses on mapping the user query keywords to the images with no underlying semantics or conceptualization of the query terms. Ontology utilization in image retrieval is investigated further by Wang et al. [61], introducing the multimodality ontology to annotate and retrieve animal images. The multimodality ontology is comprised of an animal domain ontology, textual description ontology, and a visual description ontology. All these three ontologies provide conceptualization of the animal information and are utilized to annotate and retrieve animal images. Such an approach can further fine tune and enhance the image retrieval systems, however, it is also important to focus on how these ontologies can align with each other resolving any mismatches. The aforementioned two approaches focused on Semantic Web ontologies to retrieve image ontologies. However, Liu et al. [37] focus on reverse engineering the process by generating the image ontology from the images. The core of the research resides on building the ontology using the SIFT feature vector which is used as properties. In addition. Color, texture, and shape are also used to build the ontology. The importance of building the image ontology in this way is that retrieval of images can be fine-tuned using the feature vector which is more specific in image annotation. The Semantic Web concepts are also applied in the video annotation and retrieval to increase the accuracy by associating the underlying semantics. For instance, Ballan et al. [5] present a framework to annotate and retrieve videos using ontologies and rules expressed in Semantic Web Rule Language (SWRL). The annotation process proposed in this research automatically annotates events in a video with semantic annotations using a rule based approach. The system learns these rules using rules specified in SWRL which can also be used to reasoning which makes the Ballan et al.’s approach scalable in the video annotation domain. This section introduced existing methods that Semantic Web is employed in multimedia and eCulture domain. However, there is also an opportunity to use Semantic Web to improve the user interaction by improved suggestion algorithms that work based on Linked Data triples. For example, a user may be watching a particular set of movies or TV series due to a reason such as a common actor/actress, genre, or even the filming location. One of the future tasks that Semantic Web should focus on is that associating this type of information with multimedia content as Linked Data, and build a user model which can be represented as a Linked Data graph. Once such model is available, machine learning algorithms can consume this information as features and can come up with predictive data analytic models to provide suggestions for a user. In addition, the production companies can also utilize Semantic Web enabled multimedia data platforms and machine learning models to decide on what themes they should focus in the future and which actors/actress they should use for the upcoming movies. 9 GEO INFORMATION SYSTEMS Geo Information Systems (GISs) rarely act individually — in general they are interconnected, and data from different sources have to interact in order to achieve an objective. This data interaction becomes extremely Semantic Web Today: From Oil Rigs to Panama Papers • 1:13 challenging with the massively increasing amount of data coming from multiple geo information systems. In some cases when adapting an already available geo information systems for a different domain, terminology matching is needed which ultimately requires data re-purposing. Another key feature required from existing geo information systems is querying of the integrated interconnected data. Semantic Web as a single technology stack offers unique solution for the aforementioned key challenges in Geo information systems. Semantic Web enabled ontologies have become a key component in geospatial data conceptualization. GeoNames ontology derives geospatial information from the GEOnet Names Server (GNS) and the Geographic Names Information System (GNIS) and presents the data in an ontology that can be processed by machine. One of the key advantages in using ontologies in GIS is that they provide an opportunity to carry out required reasoning which enables GIS to derive new information as well as better analyze the existing information. In addition, the ontologies also support the integration of information from different GISs to build a scalable geographical knowledge infrastructure. To support this information integration using ontologies, a number of researches are now investigating the geospatial ontology matching as a key task in GIS development [11, 13, 60]. In addition to the data conceptualization, there is a clear surge in Semantic Web vocabularies for Geospatial data. For instance, GeoSPARQL [6] focuses on designing a SPARQL standard which is more appropriate for geospatial Semantic Web data. GeoSPARQL extends the current SPARQL formalism by providing topological SPARQL extension functions and Rule Interchange Format (RIF) Core inference rules. These additions become essential when quantitative reasoning and query interpretation using Geospatial data. In addition to GeoSPARQL, number of vocabularies such as stRDF, Geom are also implemented focusing on Geospatial Semantic Web. Interestingly, these new vocabularies are also integrated into a number of commercial and open source Semantic Web frameworks (e.g., Apache Marmotta [2], Parliament [34]) to achieve a scalable and intelligent Geospatial Semantic Web. O’Dea et al. [42] describe the Semantic Information Demonstration Environment (SIDE) project which is designed to explore the possibilities of using Semantic Web in the Geospatial analysis services. The SIDE project allows users to query heterogeneous data sources with the single query client which is provided with a query interface which can be used to formulate the query. The query is then executed on data sources including Relational Database Management Systems (RDBMS), web data sources, and RDF instances which are stored locally. In addition, the SIDE employs acore ontology, Description Logic (DL) reasoner, and a rule based reasoner. Although SIDE is not available to access, the proposed system offers promising insight into the usage of semantic web based technologies to make the geospatial information widely accessible. This section showed the importance and usage of Semantic Web in geo information systems. The future work in Semantic Web frameworks for geo information systems should focus more on enriching raw data with additional semantics. In addition, there is a definite need for a systematic method of designing ontologies which can conceptualize the the rich knowledge essential for Semantic Web frameworks. 10 INVESTIGATIVE AND DIGITAL JOURNALISM Investigative Journalism is the new face of the journalism that uses deeper level research on a specific case and compiles a report in with information that would otherwise be either unattainable or difficult to attain manually by a journalist. The wide ranging availability of data and a smart and focused approach makes the derived information much more richer and insightful than the information that can be compiled by a journalist usually working under extreme time constraint. Although the information is important and the approach is novel from the journalism perspective, the presentation mode still contains inherent accessibility issues. For instance, an investigative journalist can reveal a serious crime and compile a report mentioning a number of previously hidden reports/communication while making them public. However, the full benefit of these important documents is usually not reaped as these documents are based on unstructured text which need significant amount of effort to read, understand, and link entities. 1:14 • R. Perera et al. Semantic Web comes into play a significant role when investigative journalism faces such hurdles of presenting the information in an accessible manner. Panama Papers is the largest known document list that investigative journalists ever worked on. The document list — which belongs to the the Panamanian law firm and corporate service provider Mossack Fonseca — was leaked by an anonymous group. The information encoded in this document list contained how individuals and organizations evade taxes and other sanctions. Although the document list contained very important information that can generate number of interesting articles, it was a great challenge to analyze and link the natural language information. For example, a mention of a person appears in number of different locations in the document list and sometimes referred as his/her associated organization (e.g., the company he/she owns). Meanwhile, Ontotext — a company that focuses on Linked Data tools — transformed the document list to Linked Data form and released the new dataset which was introduced as “Linked Leaks dataset” [31]. The Linked Leaks dataset contains the data in the structured form and can be queried using SPARQL. These two features make the Panama Papers information easily accessible and also automatically include all the links between different entities. Figure 6 shows an example of the linked entities which is adapted from the technical report published by Kiryakov [31] and class relationships in Linked Leaks dataset. Listing 1 shows a SPARQL query that can be executed on the Linked Leaks dataset to find the politicians mentioned in the dataset. PREFIX o n t o : < h t t p : / / www. o n t o t e x t . com / > PREFIX l e a k s : < h t t p : / / d a t a . o n t o t e x t . com / r e s o u r c e / l e a k s / > PREFIX d b r : < h t t p : / / d b p e d i a . o r g / r e s o u r c e / > PREFIX dbo : < h t t p : / / d b p e d i a . o r g / o n t o l o g y / > PREFIX r d f s : < h t t p : / / www. w3 . o r g / 2 0 0 0 / 0 1 / r d f −schema #> PREFIX r d f : < h t t p : / / www. w3 . o r g / 1 9 9 9 / 0 2 / 2 2 − r d f −s y n t a x −ns #> SELECT DISTINCT ? l e a k _ e n t i t y ? d b p _ e n t i t y ? country_name FROM o n t o : d i s a b l e −sameAs { ? l e a k _ e n t i t y l e a k s : mapped− e n t i t y ? d b p _ e n t i t y . ? d b p _ e n t i t y ?p dbr : P o l i t i c i a n . ? d b p _ e n t i t y ? p2 ? c o u n t r y . ? c o u n t r y a dbo : Country . ? c o u n t r y r d f s : l a b e l ? country_name . FILTER ( l a n g ( ? country_name ) = " en " ) } ORDER BY ? country_name Listing 1. SPARQL query that can be executed to find the politicians mentioned in the Linked Leaks dataset Fern et al. [19] describe the NEWS (News Engine Web Services) project which introduces the Semantic Web to the news agencies. The NEWS project introduces a semantic annotation component to associate news items with metadata and an intelligence information retrieval component. The NEWS project also defines an ontology which is expressed as a lightweight RDFS ontology which is comprised of three modules, namely, a categorization module, a management metadata module, and a content annotation module. The categorization module supports the automatic news categorization by providing a vocabulary which contains 12 different top level subjects and contains 1300 categories. The management metadata module annotates the news items with information such as authorship, news item priority, and media type. The content annotation module is also focused on annotating news items with basic information. Semantic Web Today: From Oil Rigs to Panama Papers • 1:15 (a) Links between different entities in the Linked Leaks dataset as reported by Kiryakov [31] (b) Class relationships in Linked Leaks dataset Fig. 6. Links between different entities in the Linked Leaks dataset Trump World Data [32] is another Linked Data resource that is currently subjected to very controversial discussions. The dataset contains the public declarations and investigations (carried out by journalists) of Donald J. Trump. Since Trump has significant amount of corporate connections which include a hotel in Azerbaijan and a poker company in Las Vegas. The dataset was initially released as tables and further analysis which can reveal deep relations was resource expensive on such dataset. However, Ontotext. a company which focuses on Linked 1:16 • R. Perera et al. Data, converted this dataset into RDF form and with a detailed ontology. Furthermore, the dataset was linked to open domain Linked Data resources such as DBpedia which increased both the value and validity of the data. This section explained a number of investigative and digital journalism approaches which use Semantic Web concepts to increase the usability of the data. However, there is also a large open space to try different Semantic Web approaches in this domain. Specifically, there is a need for a systematic ontology design method for digital and investigative journalism. This will provide a unique and accessible modeling experience for the journalism, so that the data can be organized more clearly and consistently across different news agencies. 11 SEMANTIC WEB TOMORROW The previous sections discussed eight different application domains where Semantic Web is already applied with numerous benefits. This section focuses on presenting our view on future application areas of Semantic Web and some initial work carried out in these areas. 11.1 Linking the Unlinked Crimes The famous quote, “There is nothing new under the sun. It has all been done before”, is credited to the fictional private detective created by British author Sir Arthur Conan Doyle [12]. The core idea of this quote is that every crime that takes place in present or in future has some link through similar characteristics to a previous one that has already taken place. Hence identifying these characteristics and building a linked cloud of crimes helps help us identify the nexus between cases and which would enhance and increase the effciency of crime resolution.. Semantic Web data infrastructure (i.e., Linked Data) supports this kind of data linking capability which can be directly used in criminal investigations. Although some research is already being carried out in similar areas like human trafficking [56] utilizing Semantic Web technologies, criminology remains largely untouched area for Semantic Web researchers. In particular, there is a clear shortage of ontologies developed (the only existing crime ontology we found is Italian crime ontology [3]) to conceptualize the criminology domain and no effort has been taken to map unstructured text based detailed crime reports to structured form (i.e., triples) using Natural Language Processing (NLP) technologies including scalable relation extraction approaches such as OpenIE [16, 38], entity disambiguation, feature based machine learning and deep learning approaches. 11.2 Connecting the Dots in Paintings One of the predominant skills of humans is being able to express a real or conceptual world artistically by way of paintings. Thus it has become one of the major areas which follows a number of styles (e.g., Western, far Eastern, African, Asian) using diverse set of media (e.g., oil, pastel, ink, acrylic), and influenced by number of artists (e.g., Pablo Picasso, Leonardo da Vinci, Rembrandt van Rijn). However, the conceptualization of this information (i.e., in the form of an extended ontology) as well as organization of this information (i.e., in the form of Linked Data) has still not been taken into consideration. For example, such conceptualization can pave a way to advanced as well as more accurate search function for paintings. For example, if a user wants to search portraits from Pablo Picasso during 1903 to 1908 period, then the only available method currently exist is a text based search using the information as keywords (e.g, Pablo Picasso painting 1903 to 1908). The accuracy of this search depends on the way the search engine understands the query as well as the available information. However, by forming a SPARQL query on a triple store which contains the information about paintings, a user can retrieve accurate information in structured form and reduces the burden of analyzing the web documents as in traditional search engine. Semantic Web Today: From Oil Rigs to Panama Papers • 11.3 1:17 Planning before reaping the harvest The modern agriculture is a science and unlike the traditional approaches, it currently employs number of complex scientific processes in order to reach the optimal harvest. However, one of the significant gaps that exists in agriculture today is the utilization of information in the automated decision analysis process. Since automated decision analysis is a computational process which needs information in a way that computers can understand, there is a clear need to transform unstructured agricultural information into a structured form before implementing automated decision analysis systems. This is a good opportunity to employ Semantic Web as it is designed specifically to prepare the information in order to make them computer understandable. 11.4 Building the Tower of Babel again Some work has been already done in the area of linguistics and language processing which uses the Semantic Web. However, given that linguistics is a very advanced area, the contributions are not significant to state that linguistics has reasonably used the Semantic Web. Hence, we have included the linguistics and language processing as an area that Semantic Web should focus more in the future. The work carried out in the area include lexicalizing triples [47], generating triples using unstructured text [46], SPARQL query verbalization [15], and transforming natural language questions to SPARQL queries [29]. However, there is no significant effort being made on building relationship between multiple languages using the interlinked Semantic Web triples (i.e., as a Linked Data cloud). For instance, languages that belong to one family shares a number of similarities in both lexical and semantic aspects. Identifying and connecting these similarities using structured form can form a good foundation for language translations tasks as well as some other deep language processing tasks. In addition, we also need a detailed conceptualization of language families in the form of an extensive ontology which will also support the aforementioned task as well as to understand the science behind the languages more clearly. 11.5 Connected Fashions The fashion and textile industry is embracing the digital world in a very rapid pace. The information which is related to the industry has become a cornerstone in this new transformation. For instance, the new trends in the fashion industry originated from different corners in the world, by different designers, promoted by different groups, and target different social groups. The information units which is related to a particular fashion is extremely important for business entities to make decisions, identify regions for promoting them, and even to design advertisements. Semantic Web offers the exact solution that needs to address this gap using interlinked information infrastructure and conceptualizations of knowledge in the form of ontologies. 11.6 Maritime Web Maritime information systems manage vast amount of information ranging from geo spatial information to vessel tracking information. Every bit of information is important as the future planning significantly depend on the provided information. However, the current maritime information management systems work in isolation and and use significant amount of human hours during the decision making process. This is mainly due to the fact that the information is not stored with associated semantics, so that computers cannot understand the information without human intervention. This opens a clear opportunity for Semantic Web technologies which are designed to make the information understandable for the computers. In particular, the future maritime information management should focus on four different aspects: conceptualization of the information, extracting structured information from the unstructured information sources, information integration within different maritime service providers by linking the structured information, and integrating Semantic Web enabled geo spatial information. These four aspects lead the maritime information systems towards a Semantic Web powered maritime web. 1:18 • R. Perera et al. 11.7 From Connected Drive to Linked drive Intelligent driver assistance systems such as ConnectedDrive, UConnect, and Entune, transform the automotive industry to the next dimension by offering a range of services which process vast amount of information. This information is structured as they are produced mostly by hardware systems or pulled from external web services. This makes these systems a step closer to integration of Semantic Web, however, this information is not represented in an interlinked form. The interlinking of information can consider ways of linking of the information produced by automobile to other external services as well as interlinking the information within different driver assistance systems. The latter approach is a timely need as such information integration between the systems is a way forward to collective intelligence in the automotive industry to make the self-driving cars with a high precision. Furthermore, the integration of Semantic Web in automotive industry will also support a range of benefits which will inherit from technologies that power up the Semantic Web. For example, the voice enabled driver assistance systems will be able to use the SPARQL as a information querying mechanism which will combine the expressive power of SPARQL and communication power of natural language. 11.8 Interpreting Annual Reports An annual report presents a summary of information in natural language. The summary of the information illustrates the current status of an organization and its future plans, hence such reports contain critical information in a condensed form. However, the information is presented in natural language which required more processing time than structured information. This is because a reader has to read the whole report to get a clear overview of the information and how the information links to previous reports or to another information source. On the other hand, interpreting the information encoded in natural language is difficult and onerous during the decision analysis process based on annual reports which is required by financial advisers. These drawbacks can be successfully addressed by Semantic Web which focuses on linking information and associating data with semantics. Some initial work on transforming annual reports into Semantic Web format can be found in the recent work carried out by Perera and Nand [46]. However, further research on extracting triples from reports, linking them, and organizing the triples under a rich ontology schema is essential in order to apply Semantic Web to interpret reports. 12 CONCLUSION This paper discussed the applications of Semantic Web in eight different genre of industries, including data intensive industries such as oil and gas exploration to trending industries such as investigative journalism. From the discussions, we illustrated that Semantic Web has contributed significantly to improve the state-of-the-art in these industries through the semantic web technology stack. However, we also noticed some of the gaps that need to be addressed in these industries, and they are also reported at the end of each section. In addition to the current applications of Semantic Web, in Section 11 we introduced another eight industries that we think will reap the benefits of the Semantic Web in the future. Although the list is not complete as Semantic Web will play a role in almost every industry on the earth in the future, however, we only focused on industries where direct and some fast integration of Semantic Web is feasible. REFERENCES [1] Adeyinka K Akanbi. 2014. Lb2co: a semantic ontology framework for b2c ecommerce transaction on the internet. arXiv preprint arXiv:1401.0943 (2014). [2] Apache. 2017. Apache Marmotta: Open Platform for Linked Data. Technical Report. The Apache Software Foundation. http://marmotta. apache.org/ [3] Carmelo Asaro, Maria Angela Biasiotti, Paolo Guidotti, Maurizio Papini, Maria-Teresa Sagri, Daniela Tiscornia, and Others. 2003. A domain ontology: Italian crime ontology. In ICAIL 2003 Workshop on Legal Ontologies & Web based legal information management. ACM Semantic Web Today: From Oil Rigs to Panama Papers • 1:19 Press, Scotland, UK. [4] Jamshaid Ashraf, Richard Cyganiak, Seán O’Riain, and Maja Hadzic. 2011. Open eBusiness Ontology Usage: Investigating Community Implementation of GoodRelations.. In LDOW. [5] L Ballan, M Bertini, A Del Bimbo, and G Serra. 2010. Video annotation and retrieval using ontologies and rule learning. IEEE MultiMedia 17, 4 (2010), 80–88. https://doi.org/10.1109/MMUL.2010.4 [6] Robert Battle and Dave Kolas. 2012. Enabling the geospatial semantic web with parliament and GeoSPARQL. Semantic Web 3, 4 (2012), 355–370. https://doi.org/10.3233/SW-2012-0065 [7] Tim Berners-lee, James Hendler, and Ora Lassila. 2001. The Semantic Web. Scientific American 284, 5 (2001), 35–43. https://doi.org/10. 1007/978-3-642-29923-0 arXiv:1204.6441 [8] Frank Chum. 2009. Ontology Driven Information Integration and Delivery. In W3C Workshop on Semantic Web in Oil & Gas Industry. 3–7. [9] Jim Crompton. 2008. Putting the FOCUS on Data. In W3C Workshop on Semantic Web in Oil & Gas Industry. [10] Thuppahi Sisira De Silva, Don MacDonald, Grace Paterson, Khokan C Sikdar, and Bonnie Cochrane. 2011. Systematized nomenclature of medicine clinical terms (SNOMED CT) to represent computed tomography procedures. Computer methods and programs in biomedicine 101, 3 (2011), 324–329. [11] Francisco Delgado, M. Mercedes Martínez-González, and Javier Finat. 2013. An evaluation of ontology matching techniques on geospatial ontologies. International Journal of Geographical Information Science 27, 12 (2013), 2279–2301. https://doi.org/10.1080/13658816.2013. 812215 [12] Arthur Conan Doyle. 2013. Sherlock Holmes: The complete novels and stories. Vol. 1. Bantam classics. [13] Heshan Du, Natasha Alechina, Mike Jackson, and Glen Hart. 2013. Matching formal and informal Geospatial Ontologies. In Lecture Notes in Geoinformation and Cartography, Vol. 2013-Janua. 155–171. https://doi.org/10.1007/978-3-319-00615-4_9 [14] Andreas Ekelhart, Stefan Fenz, A Min Tjoa, and Edgar R Weippl. 2007. Security Issues for the Use of Semantic Web in E-Commerce. Springer Berlin Heidelberg, Berlin, Heidelberg, 1–13. https://doi.org/10.1007/978-3-540-72035-5_1 [15] Basil Ell, Denny Vrandečić, and Elena Simperl. 2012. Spartiqulation: Verbalizing sparql queries. In Extended Semantic Web Conference. Springer, 117–131. [16] Oren Etzioni, Michele Banko, Stephen Soderland, and Daniel S. Weld. 2008. Open information extraction from the web. Commun. ACM 51, 12 (dec 2008), 68–74. https://doi.org/10.1145/1409360.1409378 [17] L Fan and B Li. 2006. A Hybrid Model of Image Retrieval Based on Ontology Technology and Probabilistic Ranking. In 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI’06). 477–480. https://doi.org/10.1109/WI.2006.16 [18] L Fang, S Tang, Y Yang, R Xiao, L Li, X Deng, Y Xu, and Y Xu. 2007. An User-Driven Slight Ontology Framework Based on Meta-Ontology for Change Management. In Advanced Information Networking and Applications Workshops, 2007, AINAW ’07. 21st International Conference on, Vol. 1. 1007–1014. https://doi.org/10.1109/AINAW.2007.93 [19] Norberto Fern, Michael Sintek, Ansgar Bernardi, Manuel Fuentes, Angelo Marrara, and Zohar Ben-asher. 2006. NEWS: Bringing Semantic Web Technologies into News Agencies. In International Semantic Web Conference (ISWC). Springer Berlin Heidelberg, Athens, United States, 778–791. https://doi.org/10.1007/11926078_56 [20] Albert Frantz and Milvio Franco. 2005. A semantic web application for the air tasking order. Technical Report. DTIC Document. [21] Pronab Ganguly, Subhagata Chattopadhyay, N. Paramesh, and Pradeep Ray. 2008. An ontology-based framework for managing semantic interoperability issues in e-health. In 2008 10th IEEE Intl. Conf. on e-Health Networking, Applications and Service, HEALTHCOM 2008. 73–78. https://doi.org/10.1109/HEALTH.2008.4600114 [22] Asunción Gómez-Pérez, Fernando Ortiz-Rodríguez, and Boris Villazón-Terrazas. 2006. Legal ontologies for the spanish e-government. In Current Topics in Artificial Intelligence. Springer-Verlag, 301–310. https://doi.org/10.1007/11881216_32 [23] Hele-Mai Haav. 2011. A Practical Methodology for Development of a Network of e-Government Domain Ontologies. Springer Berlin Heidelberg, Berlin, Heidelberg, 1–13. https://doi.org/10.1007/978-3-642-27260-8_1 [24] Jonas Halvorsen and Bjørn Jervell Hansen. 2012. Integrating Military Systems using Semantic Web Technologies and Lightweight Agents. In NATO RTO AVT-208 Symposium on Technical Advances and Changes in Tactical Missile Propulsion for Air, Sea and Land Applications. NATO Science & Technology Organization, San Diego, California. [25] Liquan Han and Ming Li. 2010. Application and research on ontology in e-Government workflow model. In 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering, CMCE 2010, Vol. 1. 474–477. https://doi.org/10.1109/CMCE.2010.5610459 [26] Martin Hepp. 2008. Goodrelations: An ontology for describing products and services offers on the web. In International Conference on Knowledge Engineering and Knowledge Management. Springer, 329–346. [27] Martin Hepp. 2012. The web of data for e-commerce in brief. In International Conference on Web Engineering. Springer, 510–511. [28] Knut Hinkelmann, Barbara Thönssen, and Daniela Wolff. 2010. Ontologies for e-government. In Theory and Applications of Ontology: Computer Applications. Springer International Publishing, 429–462. https://doi.org/10.1007/978-90-481-8847-5_19 [29] Esther Kaufmann, Abraham Bernstein, and Renato Zumstein. 2006. Querix: A natural language interface to query ontologies based on clarification dialogs. In 5th International Semantic Web Conference (ISWC 2006). Springer, 980–981. 1:20 • R. Perera et al. [30] Ki-Hyeon Kim Ki-Hyeon Kim and Ho-Jin Choi Ho-Jin Choi. 2007. Design of a Clinical Knowledge Base for Heart Disease Detection. In 7th IEEE International Conference on Computer and Information Technology (CIT 2007). 610–615. https://doi.org/10.1109/CIT.2007.172 [31] Atanas Kiryakov. 2016. Diving in Panama Papers and Open Data to Discover Emerging News. Technical Report. Ontotext AD, Sofia, Bulgaria. http://ontotext.com/knowledgehub/webinars/discover-emerging-news-with-open-data/ [32] Atanas Kiryakov. 2017. FactForge Debuts: Trump World Data and Instant Ranking of Industry Leaders. Technical Report. Ontotext AD. https://ontotext.com/knowledgehub/webinars/fact-forge-debutes-trump-world-data-and-instant-ranking/ [33] Sebastian Köhler, Sandra C Doelken, Christopher J Mungall, Sebastian Bauer, Helen V Firth, Isabelle Bailleul-Forestier, Graeme CM Black, Danielle L Brown, Michael Brudno, Jennifer Campbell, et al. 2013. The Human Phenotype Ontology project: linking molecular biology and disease through phenotype data. Nucleic acids research 42, D1 (2013), D966–D974. [34] Dave Kolas, Ian Emmons, and Mike Dean. 2009. Efficient linked-list rdf indexing in parliament. SSWS 9 (2009), 17–32. [35] Reto Krummenacher, Elena Simperl, L. J B Nixon, Dario Cerizza, and Emanuele Della Valle. 2007. Enabling the European patient summary through triplespaces. In Proceedings - IEEE Symposium on Computer-Based Medical Systems. 319–324. https://doi.org/10.1109/ CBMS.2007.45 [36] Lee Lacy, Gabriel Aviles, Karen Fraser, William Gerber, Alice M Mulvehill, and Robert Gaskill. 2005. Experiences Using OWL in Military Applications. Technical Report. CEUR-WS. [37] Xuejun Liu, Zhenfeng Shao, and Jun Liu. 2010. Ontology-based image retrieval with SIFT features. In Proceedings - 2010 1st International Conference on Pervasive Computing, Signal Processing and Applications, PCSPA 2010. 464–467. https://doi.org/10.1109/PCSPA.2010.118 [38] Mausam, Michael Schmitz, Robert Bart, Stephen Soderland, and Oren Etzioni. 2012. Open language learning for information extraction. In Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning. Association for Computational Linguistics, Jeju Island, 523–534. http://dl.acm.org/citation.cfm?id=2390948.2391009 [39] Alice Mulvehill, Brett Benyo, and Edward DePalma. 2005. Enhancing Decision Support System Development with Semantic Web Technology. In 9th World Multi-Conference on Systemics, Cybernetics, and Informatics (WMSC). Florida, USA. [40] Alice Mulvehill, Brett Benyo, David Rager, and Edward DePalma. 2004. ACT-The Automated Clearance Tool: Improving the Diplomatic Clearance Process for AMC. Technical Report. DTIC Document. [41] Mehrdad Niknam and Saeed Karshenas. 2013. A semantic web service approach to construction cost estimating. In Computing in Civil Engineering. American Society of Civil Engineers, 484–491. [42] D O’Dea, Sean Geoghegan, and Chris Ekins. 2005. Dealing with geospatial information in the semantic web. AOW ’05 Proceedings of the 2005 Australasian Ontology Workshop - Volume 58 (2005), 69–73. http://dl.acm.org/citation.cfm?id=1151945 [43] Onno Paap. 2006. Accelerating Deployment of ISO 15926 (ADI). Technical Report. FIATECH Member Meeting. [44] Onno Paap and Fluor Corporation. 2008. ISO 15926 for interoperability. In W3C Workshop on Semantic Web in Oil & Gas Industry. [45] Massimo Paolucci, Katia Sycara, Takuya Nishimura, and Naveen Srinivasan. 2003. Toward a Semantic Web e-commerce. In Business Information Systems. [46] Rivindu Perera and Parma Nand. 2016. KiwiLOD: A Framework to Transform New Zealand Open Data to Linked Open Data. International Journal of Digital Information and Wireless Communications 6, 3 (2016), 206. [47] Rivindu Perera, Parma Nand, and Gisela Klette. 2016. RealText-lex: A Lexicalization Framework for RDF Triples. The Prague Bulletin of Mathematical Linguistics 106, 1 (2016), 45–68. [48] V. Podgorelec and L. Pavlič. 2007. Managing diagnostic process data using semantic web. In IEEE Symposium on Computer-Based Medical Systems. 127–132. https://doi.org/10.1109/CBMS.2007.68 [49] Mary Pulvermacher, Salim Semy, Leo Obrst, and Suzette Stoutenburg. 2005. Perspectives on Applying Semantic Web Technologies in Military Domains. (2005). [50] Peter Salhofer, Bernd Stadlhofer, and Gerald Tretter. 2009. Ontology driven e-government. In Proceedings of the European Conference on e-Government, ECEG. 540–549. https://doi.org/10.1109/ICSEA.2009.61 [51] Farzad Sanati and Jie Lu. 2012. An ontology for e-government service integration. Computer Systems Science and Engineering 27, 2 (2012), 89–101. [52] Paul R. Smart, Alistair Russell, and Nigel R. Shadbolt. 2007. AKTiveSA: Supporting civil-military information integration in Military Operations Other Than War. In 2007 International Conference on Integration of Knowledge Intensive Multi-Agent Systems, KIMAS 2007. 434–439. https://doi.org/10.1109/KIMAS.2007.369849 [53] Paul R. Smart, Alistair Russell, Nigel R. Shadbolt, M. C. Shraefel, and Leslie A. Carr. 2007. AKTiveSA: A technical demonstrator system for enhanced situation awareness. Computer Journal 50, 6 (2007), 703–716. https://doi.org/10.1093/comjnl/bxm067 [54] Tom Smith, Stefan Noble, David Avenell, and Graham Lally. 2009. DataViz: improving data visualisation for the public sector. Technical Report. Data team - Cabinet Office. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/7611/1318351.pdf [55] Ram Soma, Amol Bakshi, and Kanwal Gupta. 2008. Design and Implementation of a Semantic Web Solution for Real-time Reservoir Management About CiSoft. Technical Report. World Wide Web Consortium. [56] Pedro Szekely, Craig A. Knoblock, Jason Slepicka, Andrew Philpot, Amandeep Singh, Chengye Yin, Dipsy Kapoor, Prem Natarajan, Daniel Marcu, Kevin Knight, David Stallard, Subessware S. Karunamoorthy, Rajagopal Bojanapalli, Steven Minton, Brian Amanatullah, Semantic Web Today: From Oil Rigs to Panama Papers • [57] [58] [59] [60] [61] [62] 1:21 Todd Hughes, Mike Tamayo, David Flynt, Rachel Artiss, Shih-Fu Chang, Tao Chen, Gerald Hiebel, and Lidia Ferreira. 2015. Building and Using a Knowledge Graph to Combat Human Trafficking. Springer International Publishing, Cham, 205–221. https://doi.org/10.1007/ 978-3-319-25010-6_12 David Trastour, Claudio Bartolini, and Chris Preist. 2002. Semantic web support for the business-to-business e-commerce lifecycle. In Proceedings of the 11th international conference on World Wide Web. ACM, 89–98. Charles Turnitsa and Andreas Tolk. 2006. Battle management language: A triangle with five sides. In Proceedings of the Simulation Interoperability Standards Organization (SISO) Spring Simulation Interoperability Workshop (SIW), Huntsville, AL, USA, Vol. 27. A. Valente, D. Holmes, and F.C. Alvidrez. 2005. Using a Military Information Ontology to Build Semantic Architecture Models for Airspace Systems. In IEEE Aerospace Conference. Dalia E Varanka and Michelle Cheatham. 2016. Spatial Concepts for Hydrography Ontology Alignment. In AutoCarto Proceedings Papers. 224–237. http://www.cartogis.org/publications/proceedings.php?year=2016 H Wang, L T Chia, and S Liu. 2007. Semantic Retrieval with Enhanced Matchmaking and Multi-Modality Ontology. In Proceedings of IEEE International Conference on Multimedia and Expo. 516–519. https://doi.org/10.1109/ICME.2007.4284700 Rui Yang, Nengcheng Chen, and Zhixue Liu. 2006. A new approach to a local E-government portal for information management and deep searching. Wuhan University Journal of Natural Sciences 11, 5 (2006), 1161–1166. https://doi.org/10.1007/BF02829229
2cs.AI
1 Dynamic Connectivity Game for Adversarial Internet of Battlefield Things Systems arXiv:1708.05741v2 [cs.IT] 22 Dec 2017 Nof Abuzainab and Walid Saad, Senior Member, IEEE, Abstract—In this paper, the problem of network connectivity is studied for an adversarial Internet of Battlefield Things (IoBT) system in which an attacker aims at disrupting the connectivity of the network by choosing to compromise one of the IoBT nodes at each time epoch. To counter such attacks, an IoBT defender attempts to reestablish the IoBT connectivity by either deploying new IoBT nodes or by changing the roles of existing nodes. This problem is formulated as a dynamic multistage Stackelberg connectivity game that extends classical connectivity games and that explicitly takes into account the characteristics and requirements of the IoBT network. In particular, the defender’s payoff captures the IoBT latency as well as the sum of weights of disconnected nodes at each stage of the game. Due to the dependence of the attacker’s and defender’s actions at each stage of the game on the network state, the feedback Stackelberg solution (FSE) is used to solve the IoBT connectivity game. Then, sufficient conditions under which the IoBT system will remain connected, when the FSE solution is used, are determined analytically. Numerical results show that the expected number of disconnected sensors, when the FSE solution is used, decreases up to 46% compared to a baseline scenario in which a Stackelberg game with no feedback is used, and up to 43% compared to a baseline equal probability policy. I. I NTRODUCTION HE Internet of Things (IoT) is expected to revolutionize the military battlefield in various aspects [1]–[3]. By interconnecting all military units, including soldiers and vehicles, with various IoT devices, sensors, and actuators, the IoT provides autonomy in the battlefield and increases the efficiency of military networks. An IoT-enabled battlefield will allow military commanders to acquire instanteneous information on the status of the military units. For instance, wearables can provide instant updates on the situation of soldiers, and sensors mounted on vehicles can provide real-time information on the status of each vehicle. Another important IoT feature that makes it suitable for the battlefield is its support for mobile crowdsensing. In mobile crowdsensing, various IoT devices such as handheld devices, wearables, vehicles, and sensors collaborate in sensing a particular type of information. In traditional military networks, on the other hand, dedicated sensors are deployed for each application. Thus, a dense deployment of IoT devices can provide more T N. Abuzainab and W. Saad are with the department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA, e-mail: {nof, walids}@vt.edu This research was sponsored by the Army Research Laboratory and was accomplished under Grant Number W911NF-17-1-0021. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein. Copyright (c) 2012 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to [email protected]. accurate and detailed information about the battlefield, which can, in turn, allow building comprehensive situation awareness and enabling more accurate decision making. This imminent integration of the IoT with military networks forms the nexus of the so-called Internet of Battlefield Things (IoBT) [1]. Naturally, in an IoBT, connectivity is very critical for the successful operation of the military network as it is essential to maintain the autonomy of the system. Military missions, such as surveillance and situational awareness, will heavily rely on the information collected for the battlefield, and, thus, any disconnection in the IoBT system will result in inaccurate decision making and poor situational awareness. In fact, the IoBT is more vulnerable than commercial IoT networks due to the adversarial nature of the battlefield, in which the devices are continuously subject to security attacks. Moreover, IoBT devices are typically small and low-cost devices that do not support strong security mechanisms, and, hence, they can be easily compromised by adversaries. The vulnerability of the IoBT devices necessitates the design of novel security solutions that are robust to adversaries and that can maintain the connectivity of the IoBT in adversarial settings. Connectivity reconstruction solutions were initially designed for wireless networks such as in [4] in which the nodes select their transmission powers to maintain network connectivity. In [5] and [6], connectivity establishment mechanisms are proposed to reestablish connectivity between sensors that were isolated, due to faults or attacks, and a central sink in a sensor network. In [5], the connectivity problem is formulated as a single leader, multiple followers Stackelberg game in which a cloud acts as the leader and chooses to activate sleep nodes in order to maintain full connectivity, whereas the sleep nodes act as followers with each seeking to maximize the number of isolated nodes that it reconnects to the network. In [6], stochastic geometry is used to design a relay-based connectivity recovery scheme for a wireless sensor network whose the goal is to optimize the tradeoff between the number of selected relays and the energy spent to restore connectivity. In [7], the authors derive conditions for regional connectivity in an IoT industrial system while optimizing sensor coverage. The work In [8] proposes a dynamic clustering and routing algorithm to maintain connectivity and achieve energy efficiency in a large scale sensor network. In [9], a dynamic mobileaware IoT topology control scheme, based on a potential game, is proposed in order to optimize IoT connectivity. The work in [10] introduces a resilience mechanism to maintain percolation-based connectivity in an IoT network in which an adversary seeks to attack highly connected IoT nodes in order to achieve the maximum possible damage. In the model of [10], the IoT nodes report a one bit estimate of their attack status to a common fusion center. Then, the objective of the 2 fusion center is to choose the nodes to survey such that the number of nodes with highest degree under attack is kept below a required threshold. The problem is formulated as a zero-sum game between the fusion center and the attacker. In [11], a time-reversal scheme is proposed in an IoT network to enable connectivity between devices with heterogeneous bandwidth requirements. However, most of these existing works [4]–[11] consider the connectivity problem in conventional sensor networks in which all the nodes are simple sensors of the same type and capabilities, whereas in the IoBT, the nodes can have heterogeneous roles and capabilities. In fact, each IoBT device can possess multiple sensors each of which is collecting different types of information. Thus, the importance of each device is dependent on the number of types of information it is sensing. Further, the IoBT will integrate high end nodes, commonly known as sinks, that collect the different information from the IoBT devices and perform complex operations in order to obtain useful information needed by the military commanders [1]–[3]. Thus, the effect of disconnection on the IoBT depends on the type of the node that gets isolated from the network. Further, prior art such as in [4]–[11] does not adequately capture the dynamics of interaction between defenders and adversaries in a battlefield. Thus, there is a need to introduce new dynamic connectivity solutions that consider the heterogeneity of the IoBT nodes and dynamically adapt to the actions of adversaries in the battlefield. The main contributions of this paper are summarized next: • We develop a novel adaptive framework for dynamically optimizing the connectivity of an adversarial IoBT network. In particular, we consider the connectivity problem in an IoBT that includes a set of heterogeneous devices that sense different types of information. The IoBT devices must transmit their information, through intermediary local sinks, to the general sink. We consider an adversarial IoBT in which an attacker is interested in causing disconnection to the network by choosing to compromise one of the IoBT nodes at each time epoch. Meanwhile, the IoBT operator acts as a defender that strives to maintain the connectivity of the IoBT network by either deploying new IoBT nodes or changing the roles of the nodes. The objective of the attacker and the defender is to maximize their sum of payoffs until the end of the military operation. • We formulate the connectivity problem in the IoBT using the framework of connectivity games [12] which are game-theoretic frameworks suitable for addressing problems that involve the maintenance and restoration of a network in presence of adversaries. However, in classical connectivity games, the sole objective is to restore or maintain the network connectivity, whereas in the IoBT, there are other performance metrics that must be considered such as the latency of communication. Thus, we propose a novel IoBT connectivity game that is tailored to the characteristics and requirements of the IoBT. In particular, the attacker’s payoff is expressed as the sum of weights of disconnected nodes minus the cost of compromising a node. The defender’s payoff, on • the other hand, is expressed as the utility of deploying a new node minus the sum of weights of disconnected nodes, the time required to deliver the information to the IoBT general sink, and the cost of deploying a new node. Further, in the studied IoBT connectivity problem, the defender must maintain the number of IoBT devices sensing the same type of information above a certain required threshold. Thus, the defender’s strategy set is coupled with the attacker’s action at each time epoch. Consequently, we cast the problem as a dynamic multistage Stackelberg connectivity game in which, at each stage of the game, the attacker acts as a leader, and the defender acts as a follower. Due to the dependence of the attacker’s and defender’s actions in each stage of the game on the network state, the feedback Stackelberg equilibrium (FSE) is used to solve the IoBT connectivity game. We analytically derive sufficient conditions for the IoBT network to remain connected at each stage of the game when the FSE solution is used. Numerical results show that the expected number of disconnected sensors, when the FSE solution is used, decreases up to 43% compared to a baseline scenario in which a Stackelberg game with no feedback is used, and up to 46% compared to a baseline equal probability policy. The paper is organized as follows: Section I describes the adversarial IoBT system model. Section II presents the formulation of the IoBT connectivity game. Section III presents the feedback Stackelberg solution of the IoBT game. Section IV presents sufficient connectivty conditions of the IoBT network when the FSE is used. Section V presents the simulations results and analysis. Finally, conclusions are drawn in Section VI. A complete list of the notations used is in Appendix A. II. S YSTEM M ODEL Consider an IoBT network composed of a set D of heterogeneous devices that can be of different types within a set K of size K. Each IoBT device can possibly represent a vehicle, a drone, a robot, a surveillance camera, a sensor dedicated for a certain type of application, a sensor-actuator pair or soldier equiped with wearable sensors. Each device of type τ ∈ K encompasses Nτ sensors (and their corresponding actuators) sensing a subset Hτ of a set I of types of information. Due to the heterogeneity of the IoBT nodes, in terms of roles and capabilities, we consider a hierarchical tree structure [15] 1 . The hierarchical IoBT structure provides scalability and allows the system operator to easily add new devices, which is suitable for a large-scale IoBT system. The area that the IoBT network spans is divided into subareas A1 , A2 ,...AH . Within each area Ah , devices sensing the same type of information j ∈ I are organized into a cluster Djh . Thus, an IoBT device equipped with multiple sensors can belong to several clusters. Within each cluster, one of the devices is chosen to be a cluster head (CH), and, thus, the rest of the devices transmit their sensed data to the CH. The CH then collects the information 1 Although the hierarchical network structure is chosen, in general, our proposed approach can accomodate any network topology 3 GS LS LS Type 1 Information Type 2 Information Attacker Fig. 1: An example of the considered IoBT hierarchical system with two subareas and two types of information. received from the devices in the cluster and sends it to a local sink (LS) serving subarea Ah . In each subarea Ah , multiple LSs can be deployed for redundancy. At any time epoch t, only one LS is activated in each subrea Ah . Deploying redundant LSs ensures that there is a substitute for the activated LS in case of failure or malfunction. At each time epoch t, each activated LS processes its information and performs more sophisticated operations such as augmented sensing and extraction of useful information as requested by the global sink (GS). The GS is a high end node that eventually processes the information received from the activated LSs in order to identify events requested by the military commanders and provide situational awareness. Since the nodes in the considered IoBT are of heterogeneous capabilities and roles, each node i is assigned a weight wi depending on its importance. The weight wi of each device i ∈ D of type τ is measured in terms of the number of different sensors that the device includes i.e. wi = Nτ . LSs, on the other hand, perform more sophisticated operations. Thus, each LS i is assigned a weight wL,i that is higher than the weights of the devices i.e. wL,i > max1≤τ ≤K Nτ . In this IoBT, an attacker is interested in minimizing the connectivity of the network to prevent the GS from detecting important events thus ultimately impairing its decisions. To achieve this goal, the attacker chooses at each time t to compromise i.e. gain control over one of the nodes in B = ∪H h=1 Lh ∪ D where Lh is the set of LSs in subarea Ah . In order to compromise each node, an attacker needs to spend time and computations to complete the attack [13]. Thus, it is assumed at any time t, the attacker can only compromise one of the IoBT nodes. Thus, at time t, the attacker chooses the node which maximizes its payoff which is expressed as the sum of weights of all nodes that will be disconnected from the GS, and the cost of compromising each node. This cost pertains to the resources needed to compromise any given targeted node. Let cτ be the cost of compromising device of type τ and cL be the cost of compromising an LS. The attacker also incurs additional costs cCH and caL in order to determine the CH of each cluster or the activated LS in each subarea. The costs cCH and caL can represent, for example, the security costs of intercepting the beacon messages sent by the CH or the activated LS to the remaining devices. Thus, the total cost of attacking device i of type τ in subarea Ah PM is given by: ci = cτ + j=1 xijh cCH whereM = |I| and xijh = 1 indicates that device i is the CH of cluster Djh or xijh = 0, otherwise. The total cost incurred by attacking LS i in subarea Ah is given by: cL,i = cLS + yih caL where yih is the indicator that LS i is activated in subarea Ah . In order to thwart the attacks made at each time epoch t, the defender can choose one of the following actions: 1) Deploys a new device of type τ in subarea Ah ; 2) Changes the cluster head in cluster Djh ; 3) Changes the activated LS in subarea Ah ; 4) Deploys a new LS in area Ah . Action 1) helps in maintaining the number of sensors necessary to maximize the amount of useful information gathered within an area. Actions 2) and 3) ensure the robustness of the network in case the currently activated LS or CH fails or is destroyed by the attacker. In practice, the newly deployed devices are typically brought from a warehouse that is in the proximity of the battlefield. Action 4) ensures that there will always exist an LS that could serve the sensors in any subarea in case the activated LS fails or is compromised by the attacker. For actions 1) and 4), the defender will incur a cost of deploying a device or an LS. Let dτ be the cost of deploying a device of type τ and let dL be the cost of deploying an LS. In an IoBT, the newly deployed devices and LSs are intially stored, prior to deployment, in a storage facility (or a military base) that is in the proximity of the IoBT network that is assumed to be secured from the attacker. The objective of the defender is to maximize a payoff that captures the difference between the achieved utility and the sum of its costs until the end of the military operation at time epoch T . This maximization will be subject to the constraint that the number of sensors Njh (t) sensing information of type j in subarea Ah at each time epoch t does not fall below a certain threshold Nth,jh . This constraint ensures that the GS as well as the LSs obtain the necessary information of type j in a certain subarea Ah . The utility achieved from deploying a device of type τ in subarea Ah is expressed in terms of the number of clusters that will restore their numberPof sensors above the threshold and is given by M uτ = j=1 I(j ∈ Hτ )I(Njh (t) < Nth,jh ) where I(.) is an indicator function. The utility achieved from deploying an LS in subarea Ah is given by uL = B − Lh where Lh = |Lh | and B is a constant that reflects the recommended number of LSs in each subarea. The defender’s utility is the utility of deploying a new device or an LS. The defender’s cost at each time epoch t is expressed in terms of the sum of weights of disconnected nodes, the time spent to deliver the information to the GS, and the cost of deploying a new node. Due to the clear dependence between the goals and the actions of the attacker and the defender as well as the impact of the attacker and defender’s actions on the IoBT network graph, the problem will be formulated as a noncooperative positional game [12] and [14], as explained next. III. I O BT C ONNECTIVITY G AME Connectivity games are game-theoretic models [12] that capture situations which require the maintainenance and 4 restoration of the normal operations of a given network. Connectivity games typically involve two players: a constructor who is responsible for restoration of nodes as well as the addition of new nodes, and a destructor who removes nodes from the network. The constructor in our game is the IoBT defender whereas the destructor is the attacker. A connectivity game [12] is an interactive game in which the constructor and the destructor play in alternation until one of the players wins the game. The winning condition for the constructor involves maintaining the connectivity of the network. In particular, there are two types of objectives considered in classsical connectivity games [12]: 1) A safety objective in which the constructor must maintain the connectivity of the network in every step of the game and 2) A reachability objective in which the constructor must obtain a connected network starting from a disconnected network. However, in the IoBT setting, the objective is not only to maintain the network connectivity but also to maximize the network efficiency (for example in terms of energy efficiency and latency). Further, in the IoBT network, devices sense different types of information, and in order to obtain the necessary information of each type in a certain area, there is a need to ensure that the number of devices sensing the same type of information does not drop below a required threshold. Moreover, in a real-world IoBT, there is a cost incurred when a device is destroyed by the attacker or deployed by the defender, which is not considered in a classical connectivity game [12]. The heterogeneity of the IoBT devices, in terms of their importance and roles, is also not taken into account in classical connectivity games [12]. Given these requirements and characteristics of the IoBT network, we consider an IoBT connectivity game that extends classical connectivity games. The IoBT connectivity game is formulated as a discrete-time deterministic dynamic game (P, T , X , (Sa,t , Sd,t )t∈T ) with a finite number of stages, where the set of players P includes the attacker and the defender, and the set of stages T = {1, 2, ..., T }. In this IoBT connectivity game, the defender must observe the attacker’s action before choosing its optimal action in order to maintain the number of devices in each area above the required threshold. Thus, the IoBT connectivity game is formulated as a Stackelberg game in which, at each stage t of the game, the attacker acts as the leader, and the defender acts as the follower. The state space X = Xa × Xd is the set of all IoBT networks observed by the attacker and the defender up to stage T . The state of the game at stage t is ψt = (ψa,t , ψd,t ) ∈ X where ψa,t is the network observed by the attacker and ψd,t is the network observed by the defender. The network state observed by the attacker is given by: ψa,t = (Da (t), {La,h (t), 1 ≤ h ≤ H}, {Da,jh (t), 1 ≤ j ≤ I, 1 ≤ h ≤ H}, {fa,jh (t), 1 ≤ j ≤ I, 1 ≤ h ≤ H}, {sa,h (t), 1 ≤ h ≤ H}) where Da (t) represents the set of devices, La,h (t) is the set of LSs in subarea Ah , Da,jh (t) is the cluster of devices sensing information type j in subarea Ah , fa,jh (t) is the index of the device that is the CH of Da,jh (t), and sa,h (t) is the index of the activated LS in subarea Ah . Similarly, the network state ψd,t observed by the defender is given by: ψd,t = (Dd (t), {Ld,h (t), 1 ≤ h ≤ H}, {Dd,jh (t), 1 ≤ j ≤ I, 1 ≤ h ≤ H}, {fd,jh (t), 1 ≤ j ≤ I, 1 ≤ h ≤ H}, {sd,h (t), 1 ≤ h ≤ H}) where Dd (t) represents the set of devices, Ld,h (t) is the set of LSs in subarea Ah , Dd,jh (t) is the cluster of devices sensing information type j in subarea Ah , fd,jh (t) is the index of the device that is the CH of Dd,jh (t), and sd,h (t) is the index of the activated LS in subarea Ah . fa,jh (t) and fd,jh (t) are set to be zero if the CHs of Da,jh (t) and Dd,jh (t) are compromised, respectively. Similarly, sa,h (t) and sd,h (t) are set to be zero if the activated LS of subarea Ah is compromised in ψa,t and ψd,t respectively. The defender and the attacker are assumed to have perfect knowledge on the IoBT network. Assuming perfect knowledge by the attacker about the IoBT network allows the defender to account for the worst-case scenario as is typical in existing works such as in [10]. In our game, the set of pure strategies of the attacker Sa,t (ψt ) at stage t is Sa,t (ψt ) = {ad,i , i ∈ Da (t)}∪{aL,lh , l ∈ La,h (t), 1 ≤ h ≤ H}, where action ad,i corresponds to destroying device i, and action aL,lh corresponds to destroying LS l in subarea Ah . Due to the constraint on the number of devices in each cluster, the strategy set of the defender at each stage t is coupled to the attacker’s action at and is a function of the network state ψt . Hence, the strategy set Sd (ψt , at ) of the defender is  Sd,t (ψt , at ) = {bd,τ h , ∀τ | j ∈ Hτ ∀j ∈ Yih (t)} if E1 (at ), Qd , otherwise, (1) where condition E1 (at ) is at = ad,i , ∃j s.t. i ∈ Da,jh (t), Na,jh (t) ≤ Nth,jh , the set Yih (t) = {j ∈ I | i ∈ Da,jh (t), Nd,jh (t) < Nth,jh }, Nd,jh (t) is the number of devices in cluster Dd,jh (t) in network ψd,t , Na,jh (t) is the number of devices in cluster Da,jh (t) in network ψa,t , and the set Qd is the set of all possible strategies of the defender given by Qd = {bc,ijh , i ∈ Dd,jh (t), 1 ≤ j ≤ M, 1 ≤ h ≤ H} ∪{bd,τ h , 1 ≤ τ ≤ K, 1 ≤ h ≤ H} ∪ {bL,h , 1 ≤ h ≤ H} ∪{ba,lh , l ∈ Ld,h (t), 1 ≤ h ≤ H}. (2) Action bd,τ h corresponds to deploying a new device of type τ in subarea Ah , action bc,ijh corresponds to assigning device i to be the CH of cluster Dd,jh (t), action bL,h corresponds to deploying a new LS in subarea Ah , and action ba,lh corresponds to activating LS l in subarea Ah . According to (25), if the attacker destroys a device and causes the number of devices in some clusters to drop below the required threshold, the strategy set of the defender will only include the actions of deploying a device that restores the number of devices in each affected cluster to the required threshold. Otherwise, the defender can choose to either change the CHs, change the LSs, deploy a new device, or deploy a new LS. The evolution of the attacker’s state ψa,t is given by  Da (t + 1) = Da (t) \ {i} if at = ad,i bt 6= bd,τ h , Da (t), otherwise,  La,h (t + 1) = La,h (t) \ {l} if at = aL,lh , bt 6= bL,h , La,h (t), otherwise, (3) (4) 5   Da,jh (t) \ {i} if at = ad,i i ∈ Da,jh (t) bt 6= bd,τ h , Da,jh (t+1) =  D otherwise, a,jh (t), fa,jh (t+1) =  0       (5) if at = ad,i , i ∈ Da,jh (t), fa,jh (t) = i, bt 6= bc,i0 jh i if bt = bc,ijh , at ∈ Sa (ψt ), i ∈ Da,jh (t),       fa,jh (t), otherwise, (6)  0 if at = aL,lh , sa,h (t) = l, bt 6= ba,lh ,     l if bt = ba,lh , at ∈ Sa (ψt ), sa,h (t + 1) =     sa,h (t), otherwise. (7) Similarly, the evolution of the defender’s state ψd,t is  Dd (t + 1) =  Ld,h (t+1) = Dd (t) \ {i} if at+1 = ad,i bt 6= bd,τ h , Dd (t), otherwise, (8) Cd,t (at , bt , ψt ) and Ud (at , bt , ψt ) in terms of each pair of the attacker’s and defender’s pure strategies at and bt are given in Appendix B. To increase the uncertainty of its action and improve its payoff, the attacker will use a mixed strategy q t at each stage t, thus randomizing its choices across its pure strategies. The defender, on the other hand, responds with a pure strategy bt [17]. It is assumed that the defender can perfectly observe the strategy of the attacker at each stage t. The objective of the attacker is then to find the optimal mixed strategies q 1 , q 2 , ..., q T that maximize the sum of its expected payoffs until stage T T X X max qat Pa,t (at , bt , ψt ) s.t. 1 · q t = 1 ∀t, (15) q 1 ,q 2 ,...,q T where qat is the probabilitiy with which the attacker chooses action at . Similarly, the objective of the defender is to find the optimal strategies b1 , b2 , ..., bT that maximizes the sum of its expected payoffs up to stage T i.e. max Ld,h (t) \ {l} if at+1 = aL,lh , bt 6= bL,h , Ld,h (t), otherwise, t=1 at ∈Sa,t b1 ,b2 ,...,bT (9)   Dd,jh (t) \ {i} if at+1 = ad,i i ∈ Dd,jh (t) bt 6= bd,τ h , Dd,jh (t + 1) =  D otherwise, d,jh (t), (10) T X X qat Pd,t (at , bt , ψt ) s.t. bt ∈ Sd,t (ψt , at ) ∀t. t=1 at ∈Sa,t (16) Since the attacker’s and the defender’s actions are coupled to the current stage t and the state ψt , the feedback Stackelberg equilibrium will be used as a solution, as discussed next. IV. F EEDBACK S TACKELBERG S OLUTION The FSE applies for situations in which the leader first  0 if a t+1 = ad,i , i ∈ Da,jh (t + 1),  chooses its strategy at time instant t t, and, then, the follower    fa,jh (t + 1) = i, bt ∈ Sd,t (ψt , at ),  chooses its strategy based on the current state and the leader’s  fd,jh (t + 1) = action. In the proposed IoBT connectivity game, the strategy i if bt = bc,ijh , at+1 6= ad,i ,    sets S (ψ ) and S (ψ , a ) a,t t d,t t t of both the attacker and the    defender depend on the current state ψt . Further, the defender fd,jh (t), otherwise, (11) strategy set Sd,t (ψt , at ) at time instant t is dependent only on the attacker’s action at at the current time instant t according  0 if a t+1 = aL,lh , sd,h (t) = l, bt ∈ Sd,t (ψt , at ),  to (25) [16]. Thus, the FSE is a suitable solution for our    IoBT connectivity game. The FSE is subgame perfect and time l if bt = ba,lh , at+1 6= aL,lh , sd,h (t+1) =  consistent. Thus, at each stage t of the game, the FSE considers    the immediate payoff at stage t as well as the expected sum of sd,h (t), otherwise. (12) payoffs of the subsequent stages up to T , in contrast to static The attacker’s payoff at each stage t is expressed in terms Stackelberg games which only consider the immediate payoff of its utility which is the sum SD,t (at , bt , ψt ) of weights of at stage t. Hence, the FSE solution is obtained recursively all nodes that will be disconnected from the GS, and the cost using dynamic programing and solving a Stackelberg game Ca,t (at , bt ) of destroying node i, as follows: at each stage t of the game. Further, the dynamic nature of Pa,t (at , bt , ψt ) = SD,t (at , bt , ψt ) − νCa,t (at , bt , ψt ), (13) the FSE solution makes it adaptive to system changes at any instant t. In [18], it is shown that the FSE remains stable where ν is a normalization constant. The defender’s payoff under stochastic Markovian perturbations of the system. The at stage t is expressed in terms of its utility minus its costs. robustness and adaptability of the FSE solution is desirable for The costs include the sum of weights of disconnected nodes a dynamic IoBT system that is constantly subject to random SD,t (at , bt , ψt ), the transmission time Λt (at , bt , ψt ) required changes due to adversarial conditions. to deliver the information to the GS, and the cost of deploying Let q = (q 1 , q 2 , ..., q T ) and b = (b1 , b2 , ..., bT ) be respeca new node Cd,t (at , bt , ψt ), as follows: tively the strategy vectors of the attacker and the defender respectively. The FSE strategy will be Pd,t (at , bt , ψt ) = Ud,t (at , bt , ψt ) − ηSD,t (at , bt , ψt ) ∗ ∗ −µΛt (at , bt , ψt ) − λCd,t (at , bt , ψt ), (14) Definition 1. The strategy profile (q , b ) constitute a feedback Stackelberg equilibrium if ∀ψt ∈ X , t ∈ T , where η, µ and λ are normalization constants. For readability, Ωa,t (q ∗t , b∗t , ψt ) = max max Ωa,t (q t , bt , ψt ), (17) the expressions of SD,t (at , bt ), Λt (at , bt , ψt ), Ca,t (at , bt , ψt ), q t ∈Ma,t bt ∈Rd (q ) t 6 where Ma,t is the space of mixed strategies of the attacker at stage t, Ωa,t (q t , bt , ψt ) is the expected payoff of the attacker starting from stage t and for a state ψt , and Rd (q t ) is the optimal strategy set of the defender to the mixed strategy q t of the attacker and is given by Rd (q t ) = {b0t s.t. b0t = arg max Ωd,t (q t , bt , ψt )}, bt Ωa,t (q t , bt , ψt ) = qat Ωa,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt )) X qat Pa,t (at , bt ), (19) at ∈Sa,t Ωd,t (q t , bt , ψt ) = X qat Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt )) at ∈Sa,t + X qat Pd,t (at , bt ), (20) with Ωa,T +1 = 0, Ωd,T +1 = 0. From (18) and (20), we can directly find the optimal action of the defender for a given attacker action at stage t as follows. Remark 1. Given an attacker strategy profile q t , the defender chooses the action b0t such that qat (Pd,t (at , bt ) + Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt ))) at ∈Sa,t ≤ X qat (Pd,t (at , b0t ) + Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , b0t ))), at ∈Sa,t ∀bt ∈ ∩at s.t. qat >0 Sd,t (ψt , at ). (21) In order to find the optimal mixed strategy of the attacker (i.e. the leader) at each stage t, the leader usually solves a linear program for each particular strategy b0t chosen by the follower (as in [19]). Then, it chooses, as optimal solution, the mixed strategy of the optimization problem that has the highest payoff. The proposed solution in [19] is considered when the leader and follower’s actions are not coupled. However, in our problem and as shown in (25), the follower’s strategy set is coupled to the network state ψt and to the attacker’s action at . In other words, if the follower chooses action b0t as its optimal action and when the network state ψt , it means that the attacker has chosen its action from the subset S 0 a,t (b0t , ψt ) of the strategy set Sa,t . We define Jψa,t = {(j, h) s.t. Na,jh (t) = Nth,jh }. Then, the set S 0 a,t (b0t , ψt ) is obtained as ( S 0 0 a,t (bt , ψt ) = Sa,t \ Ra,t , if Jψa,t 6= φ, b0t ∈ Vt , Sa,t , otherwise, s.t. X qat = 1, + Ωa,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , b0t ))), at ∈S 0 a,t (b0t ,ψt ) X qat (Pd,t (at , bt ) + Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt ))) at ∈S 0 a,t (bt ,ψt ) ≤ X qat (Pd,t (at , b0t ) + Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , b0t ))).(23) at ∈S 0 a,t (b0t ,ψt ) In the proposed linear program, for each strategy b0t of the defender and for a given state ψt , the attacker determines the optimal probability for each one of its actions according to (23) while taking into account the best response of the defender defined in (21). The proposed linear program holds under the assumption that the attacker has full knowedge of the defender’s actions and payoffs at each time epoch t. The conditions under which the IoBT network remains connected are derived in the following section. V. C ONNECTIVITY C ONDITIONS at ∈Sa,t X X qat (Pa,t (at , b0t ) qa,t 0 at ∈S a,t (b0t ,ψt ) ∀bt , at ∈Sa,t + max (18) for every bt ∈ ∩at s.t. qat >0 Sd,t (ψt , at ), where Ωd,t (q t , bt , ψt ) is the expected payoff of the defender starting from stage t. At an FSE, the expected payoffs at stage t and for state ψt are computed recursively as X following linear program for each strategy b0t of the defender and given a network state ψt (22) where Ra,t = {ad,i s.t. i ∈ Djh (t), (j, h) ∈ Jψa,t }, Vt = Qd \ {bd,ih , ∀i s.t j ∈ Hi ∀j ∈ Yih (t)}, the set Yih (t) = {j ∈ I | i ∈ Da,jh (t), Nd,jh (t) < Nth,jh }, and the set Qd is defined in (2). Thus, at each stage t, the attacker solves the In the IoBT, maintaining connectivity at any time is critical for the successful operation of the network. Thus, the safety objective of connectivity games is more suitable to the IoBT than the reachability objective. In our game, the connectivity of the IoBT network is maintained at each stage t if the attacker does not choose an action that causes disconnection. Disconnection occurs if neither a cluster nor an entire subarea gets disconnected from the GS. To determine the connectivity conditions under which the IoBT network remains connected, when the FSE solution is used, we first determine, for each action b0t of the defender, the set ZD (b0t ) of attacker’s actions that cause disconnection:   V1 ,   V , , 2 ZD (b0t ) = S 0 a,t (b0t , ψt ) ∩  V3 ,   V , 4 if if if if b0t b0t b0t b0t = bc,ijh , = bd,τ h , = ba,lh , = bL,h . (24) where the set V1 = {afj0 h0 (t) , j 0 6= j or h0 6= h}∪{ash (t) , ∀h}, V2 = {afjh (t) , ∀j, h} ∪ {ash (t) ∀h}, V3 = {afjh (t) , ∀j, h} ∪ {as0h (t) , h0 6= h} and V4 = {afjh (t) , ∀j, h} ∪ {ash (t) , ∀h}. Thus, given that the optimal action of the defender is b0t , disconnection does not occur if the attacker does not choose an action from the set ZD (b0t ). Let Fd,t (at , bt ) = and Pd,t (at , bt ) + Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt ))) Fa,t (at , bt ) = Pa,t (at , bt ) + Ωa,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt ))). The following proposition provides sufficient conditions for the IoBT network to remain connected when the FSE solution is used. Proposition 1. The proposed FSE solution(q ∗ , b∗ ) maintains connectivity of the IoBT network if for every ψt ∈ X , t ∈ T . For each attacker’s action adt in ZD (b∗t ), there exists ant in S 0 a,t (b∗t , ψt )\ZD (b∗t ) in which one of the following conditions hold: 1) B3,t (b∗t ) = φ. 7 ∗ d ∗ 2) If B1,t (b∗t ) ∪ B2,t (b∗t ) 6= φ, W · Fa,t (an t , bt ) > Fa,t (at , bt ). 3) If B1,t (b∗t ) minbt ∈B1,t (b∗t ) 6= φ, B2,t (b∗t ) 6= d ∗ Fd,t (ad t ,bt )−Fd,t (at ,bt ) < 1, n n ∗ Fd,t (at ,bt )−Fd,t (at ,bt ) d ∗ Fd,t (ad t ,bt )−Fd,t (at ,bt ) arg minbt ∈B1,t (b∗t ) Fd,t n ∗ (an t ,bt )−Fd,t (at ,bt ) d ∗ Fd,t (ad t ,bt )−Fd,t (at ,bt ) ≤ arg maxbt ∈B2,t (b∗t ) Fd,t (an ,bt )−Fd,t (an ,b∗ ) . t t t φ, and 4) If B1,t (b∗t ) minbt ∈B1,t (b∗t ) φ, and 6= φ, B2,t (b∗t ) 6= d ∗ Fd,t (ad ,b )−F d,t (at ,bt ) t t n ∗ ≥ 1, Fd,t (an t ,bt )−Fd,t (at ,bt ) d ∗ Fd,t (ad t ,bt )−Fd,t (at ,bt ) arg maxbt ∈B2,t (b∗t ) Fd,t (an ,bt )−Fd,t (an ,b∗ ) ≥ 1. t t t VI. S IMULATION R ESULTS AND A NALYSIS ∗ 5) If B1,t (b∗t ) ∪ B2,t (b∗t ) = φ, Fa,t (an t , bt ) > 0. where n ∗ B1,t (b∗t ) = {bt ∈ Sdn,t | Fd,t (an t , bt ) − Fd,t (at , bt ) ≥ d d ∗ 0, Fd,t (at , bt ) − Fd,t (at , bt ) ≥ 0}, n ∗ B2,t (b∗t ) = {bt ∈ Sdn,t | Fd,t (an t , bt ) − Fd,t (at , bt ) < d d ∗ 0, Fd,t (at , bt ) − Fd,t (at , bt ) ≤ 0}, n ∗ B3,t (b∗t ) = {bt ∈ Sdn,t | Fd,t (an t , bt ) − Fd,t (at , bt ) ≥ d d ∗ 0, Fd,t (at , bt ) − Fd,t (at , bt ) < 0}, Sdn,t = Sd,t (ψt , adt ) ∩ Sd,t (ψt , ant ), W = bm t = d ∗ Fd,t (adt , bm t ) − Fd,t (at , bt ) , n m Fd,t (at , bt ) − Fd,t (ant , b∗t )    arg minbt ∈B1,t (b∗t )   arg max bt ∈B2,t (b∗ t) d ∗ Fd,t (ad t ,bt )−Fd,t (at ,bt ) n ,b∗ ) , Fd,t (an ,b )−F (a t d,t t t t d ∗ Fd,t (ad t ,bt )−Fd,t (at ,bt ) n ∗ , Fd,t (an t ,bt )−Fd,t (at ,bt ) Proposition 1 shows that maintaining connectivity at each time epoch t depends on the payoffs of the attacker and the defender. Further, the payoff of the defender in (14) depends on the IoBT network parameters. For example, the time required to deliver the information to the GS is a function of the IoBT network capacity, as shown in Appendix B, which can be controlled by adjusting the transmission bandwidth in a wireless setting. Thus, in order to maintain connectivity at each time epoch t, the IoBT operator adjusts its payoffs such that one of the conditions in Proposition 1 is met. if C1 (b∗t ), if C2 (b∗t ), the condition C1 (b∗t ) = B1,t (b∗t ) 6= φ, B1,t (b∗t ) = φ, the condition C2 (b∗t ) = B2,t (b∗t ) 6= φ, and the set Qd is defined in (2). Proof. Since the attacker uses mixed strategies in our problem, disconnection does not occur at stage t if qat = 0 for every at in ZD (b0t ), i.e. the actions in ZD (b∗t ) are dominated. In [20, Corollary 4], the conditions are derived for the case in which a variable has a zero value in any optimal solution for a given linear program. In particular, Pn Pn given a linear program of the form max j=1 cj xj s.t. j=1 aij xj ≤ bj , xj ≥ 0, the variable xr = 0 in the optimal solution of the linear program if there exists q 6= r such that one of the following conditions hold: 1) I3 6= φ, 2) If I1 ∪ I2 6= φ then Hcq ≤ cr c ≥ maxi∈I2 aair 3) If I1 6= φ and I2 6= φ then mini∈I1 b aair iq iq 4) if I1 ∪ I2 = φ then cq > 0, where I1 = {i|aiq > 0 and air ≥ 0}, I2 = {i|aiq < 0 and air ≤ 0}, I3 = {i|aiq ≥ 0 and air < 0},  air  arg min aiq if I1 6= φ, k=  arg max aair if I1 = φ and I2 6= φ iq  akr  b akq c if I1 6= φ, H=  arg max aakr if I1 = φ and I2 6= φ kq Thus, by applying these conditions to each qat in ZD (b∗t ) our proposed linear program in (23), the result follows. For our simulations, we consider an IoBT network containing 1000 devices of seven types: Type 1 corresponds to a radiological sensor, type 2 corresponds to a chemical sensor, type 3 corresponds to an infrared (IR) camera, type 4 corresponds to an explosives detector, type 5 corresponds to a surveillance camera, type 6 corresponds to a mititary robot containing a chemical sensor, a radiological sensor, an infrared camera and an explosives detector, and type 7 corresponds to a military unmanned vehicle containing a surveillance camera, an IR camera, a radiological sensor and a chemical sensor. The number of subareas considered is H = 5. The number of LSs available in each subarea is Lh = 2, the weight of each LS i is set to wL,i = 15, which is chosen to be greater than the weight of any of the devices at a lower hierarchy level. The threshold on the number of sensors in each cluster Djh is set to Nth,jh = 15. The normalizing coefficients are set to: µ = 100, ν = 1, and λ = 1. The costs of deploying a device of type τ and an LS are set to be dτ = 0.5Nτ and dL = 50. All normalization constants and cost values are chosen such that the costs are comparable to the number of sensors. For detailed analysis, the following scenarios are considered: 1) The cost of compromising an LS cL is varied between 0 and 200 in steps of 50. The considered value of the cost caL of determining the activated LS by the attacker is set to 0. The maximum number of stages considered is T = 1, 2, 3, where T = 1 corresponds to the case of Stackelberg equilibrium with no feedback (NFSE). The cost of determining the CH is set to be cCH = 20 while the cost of compromising a device of type τ is set to be cτ = 0.5Nτ . 2) The cost of finding the CH is varied between 0 and 100 in steps of 20. The costs of compromising an LS and determining the activated LS (caL , cL ) is set to (100, 50). The maximum number of stages considered are T = 1, 2, 3. 3) The maximum number of stages T is varied between 1 and 5 in steps of 1. The considered cost values are cτ = 0.5Nτ and cCH = 20, and the LS costs (caL , cL ) are to set to (0, 50) and (150, 50), respectively. Fig. 2 shows, for the NFSE, the FSE, and a baseline policy which assigns equal probabilities to attacking the activated LSs, the average probability pH of attacking the LS in the subarea with the highest weight as a function of the cost cL of compromising an LS. Fig. 2 first shows that the NFSE probability of attacking the activated LS with the highest Probability of attacking the LS with highest weight 0.3 Stackelberg equilibrium (No feedback) Feedback Stackelberg equilibrium, T=2 Feeback Stackelberg equilibrium, T=3 Equal probability policy 0.25 0.2 0.15 0.1 0.05 0 0 50 100 150 200 Cost of compromising a local sink Expected number of disconnected sensors per stage Stackelberg equilibrium (No feedback) Feedback Stackelberg equilibrium, T=2 Feedback Stackelberg equilibrium, T=3 Equal probability policy 160 140 120 100 80 60 0 50 100 150 0.2 Stackelberg equilibrium (no feedback) Feedback Stackeleberg equilibrium, T=2 Feedback Stackelberg equilibrium, T=3 0.15 0.1 0.05 0 0 20 40 60 80 100 Cost of finding the cluster head Fig. 2: Probability of attacking the LS with the highest weight vs the cost of compromising an LS 180 Probability of attacking the CH with highest weight 8 200 Cost of compromising a local sink Fig. 3: Expected number of disconnected nodes respectively vs the cost of compromising an LS weight is 0.19 for cL values less than 100. In this case, the attacker’s payoff obtained from attacking any activated LS is considerably higher than the attacker’s payoff achieved from attacking any other device. Thus, the attacker chooses to compomise only the five activated LSs. As a result, the NFSE mixed strategy of the attacker is comparable to the equal probability policy. As cL increases to 150, the payoffs achieved by attacking an activated LS and the CHs become comparable, and the attacker chooses to attack both the LSs and the CHs. Thus, the probability of attacking the LS with highest weight decreases to 0.09. When cL increases further to 200, the payoff resulting from attacking an activated LS becomes considerably lower than the payoff achieved by attacking any of the CHs, and, thus, the attacker chooses to attack only the CHs. Next, when using the FSE with T = 2, the FSE probability of attacking the activated LS with the highest weight decreases to 0.163 for cL values less than 100. This is due to the fact that, by using a FSE, the attacker, as well as the defender, will take into account the expected sum of payoffs from t + 1 to T , when computing the FSE probabilities at time t according to (19). Thus, the attacker’s payoff received from an attack on any IoBT node increases compared to the NFSE case, which results in increasing the probability of attacking some of the IoBT nodes which are not LSs. Hence, the probability of attacking the LS having the highest weight decreases. Then, the probability of attacking the LS with the highest weight decreases as cL increases to 200. However, the probability is higher than the case of the NFSE. This is because the expected sum of payoffs achieved by attacking the LS with highest weight increases compared to the NFSE according to (19). Finally, when using the FSE with T = 3 and for cL values less than 100, the probability pH decreases to 0.112 compared Fig. 4: Probability of attacking the CH with the highest weight vs the cost of compromising an LS to the case with T = 2. This is because the expected payoff of attacking any IoBT node increases with the number of stages according to (19), which causes pH to decrease. Then, as cL increases to 200, pH decreases, but it remains higher than the case when T = 2, since the expected sum of payoffs received from attacking the LS with the highest weight increases with T. Fig. 3 shows the average number ND of disconnected sensors per stage resulting from the NFSE, the FSE, and the equal probability policy as function of the cost of compromising an LS. First, using the NFSE and when cL ≤ 100, the expected number of disconnected sensors is 141 since the attacker chooses to compromise only the activated LSs. Also, the expected number of disconnected sensors is slightly higher than when the attacker chooses to attack each of the activated LSs with equal probability, since this policy is not optimal. Fig. 3 also shows that, for cL = 150, the expected number of disconnected sensors decreases to 83 since the attacker chooses to compromise either the LSs or the CHs. Thus, the value of the expected number of disconnected sensors drops below the value of the equal probability policy. When cL increases to 200, the expected number of disconnected sensors decreases to 62 since the attacker will now compromise CHs. Next, using FSE with T = 2 and for cL < 100, ND decreases by 9% compared to NFSE, since pH decreases as shown in Fig. 2. Then, as cL increases to 200, the expected number of disconnected sensors decreases yet becomes higher than the NFSE case since pH is higher according to Fig.2. Finally, when using the FSE with T = 3, the expected number ND is 107 when cL < 100. This is because, for the considered cost values, the probability pH decreases with T as shown in Fig. 2. Then, as cL increases to 200, the expected number of disconnected sensors decreases, but it remains greater than the case in which T = 2. This is due to the fact that the probability pH increases with T when cL is greater than 150 as shown in Fig. 2. Fig 4 shows the average probability pc,max of attacking the CH of the cluster with highest number of sensors resulting from the NFSE and the FSE versus the cost of finding the CH. Using NFSE and when cCH is 0, pc,max is 0.17 since the payoffs resulting from an attack on the CHs are the highest. As the value of cCH increases to 40, pc,max decreases to 0.09 since the attacker chooses to compromise both LSs and CHs. Then, pc,max becomes zero as cCH increases up to 100 since the payoffs achieved by compromising the CHs Stackelberg equilibrium (No feeback) Feedback Stackelberg equilibirum, T=2 Feedback Stackelberg equilibrium, T=3 Equal probability policy 160 140 120 100 80 60 0 20 40 60 80 100 Cost of finding the cluster head Fig. 5: Expected number of disconnected sensors per stage vs the cost of finding the CH will be considerably lower than the payoffs obtained from compromising the LSs. Hence, in this case, the attacker will be compromising the LSs. Next, using the FSE with T = 2 and when cCH is 0, pc,max is 0.155. Then, when cCH increases up to 40, pc,max decreases to 0.078. Thus, when cCH is less than 40, the value of pc,max is less than its value when NFSE is used. This is because the expected sum of payoffs achieved by attacking any IoBT node is higher than the NFSE according to (19), which yields a decrease in the probability pc,max . As cL increases from 40 to 100, pc,max decreases yet its value becomes higher than the NFSE. This is because the expected sum of payoffs received from attacking a CH, when using the FSE, is higher than the case in which the NFSE is used, which causes the probability to remain positive. Finally, when using the FSE with T = 3, pc,max varies similar to the case in which T = 2. However, for cCH less than 40, pc,max is smaller than the case when T = 2 since the expected sum of payoffs achieved by attacking any IoBT node increases with T . Also, for cCH greater than 40, pc,max is higher than the case when T = 2 since the expected sum of payoffs obtained from attacking a CH increases with T according to (19). Finally, Fig. 4 shows that, for the equal probability policy, the probability of attacking a CH is zero since the attacker only compromises the activated LSs. Fig. 5 shows, for both the FSE and the equal probability policy, the average number of disconnected sensors ND per stage versus the cost of finding the CH. When using the NFSE and when cCH = 0, the expected number of disconnected sensors is 63 since the attacker will be compromising the CHs. Then, the expected number of disconnected sensors is 82 as the value of cCH increases to 40, since the attacker will choose proper (non-deterministic) mixed strategies over both the LSs and CHs. Then, as cCH becomes higher than 40, the expected number of disconnected sensors increases to 141 and exceeds the value of the equal probability policy since the attacker will be compromising the activated LSs and the equal probability policy is not optimal. Next, when using the FSE with T = 2 and when cCH = 0, the expected number of disconnected sensors ND is 65. In this case, the value of ND is slightly higher than the one resulting from the NFSE since the probability of attacking an LS is positive with FSE. As cCH increases to 40, the value of ND increases to 81. Then, as cCH increases to 100, the value of ND increases to 129. For cCH values higher than 40, the value of ND resulting from FSE is lower than the NFSE case since the probability Expected number of disconnected sensors 180 800 Stackelberg equilibrium (No feedback) Feedback Stackelberg equilibrium Equal probability policy 700 600 500 400 300 200 100 1 2 3 4 5 Maximum number of stages (T) Fig. 6: Expected number of disconnected nodes respectively vs number of stages Expected number of disconnected sensors Expected number of disconnected sensors per stage 9 700 Stackelberg equilirbium (No feedback) Feedback Stackelberg equilibrium Equal probability policy 600 500 400 300 200 100 0 1 2 3 4 5 Maximum number of stages (T) Fig. 7: Expected number of disconnected nodes respectively vs number of stages of attacking a device which is not a CH is positive with FSE. When using the FSE with T = 3, the value of ND varies as function of cCH in a similar way as when T = 2. Yet, when cCH is 0, the value of ND is slightly higher than when T = 2. This is because in this case the probability of attacking an LS increases with T . Also, for cCH values greater than 40, the value of ND is lower than when T = 2 since the probability of attacking a device which is not a CH increases with T for the considered cost values. Figs. 6 shows, for the case when the LSs costs (caL , cL ) are (0, 50), the expected number of disconnected sensors versus the maximum number of stages T when FSE, the NFSE, and the equal probabilitiy policy are used, respectively. The NFSE solution corresponds to finding the Stackelberg equilibrium for a one stage game played at each time epoch t (1 ≤ t ≤ T ). In Fig. 6, the expected number of disconnected sensors increases with the maximum number of stages using the three solutions. However, the expected number of disconnected sensors, when the FSE is used, increases at a rate considerably slower than when either the NFSE or the equal probability power policy are used. Thus, the results confirm that, using the FSE, the number of disconnected sensors per stage decreases with T as opposed to the NFSE in which the attacker chooses its mixed strategy only over the LSs. The decrease in the number of disconnected sensors when using the FSE reaches up to 43% compared to the equal probability policy and up to 46% compared to the Stackelberg equilibrium with no feedback, when T is 5. Fig. 7 shows, for the case when the LSs costs (caL , cL ) are (150, 50), the expected number of disconnected sensors versus the maximum number of stages T when FSE, the NFSE solution, and the equal probabilitiy policy are used, respectively. In this case, the expected number of disconnected sensors also 10 increases with the maximum number of stages using the three solutions. However, the number of disconnected sensors using the FSE is slightly higher than the case of NFSE. This is due to the fact that, in the case of no feedback, the attacker’s mixed strategy does not include attacking the LSs whereas, using the FSE, the attacker’s mixed strategy includes attacking the LSs, and the probability of attacking the LSs increases with the number of stages. The increase in the number of disconnected sensors reaches up to 14% when T is 5. Nonetheless, the number of disconnected sensors, using the FSE, decreases by 47% compared to the equal probability policy. Thus, Figs. 6 and 7 show that the FSE yields a significant decrease in the number of disconnected sensors when the LS costs are low. The performance is slightly degraded compared to the NFSE when the costs of attacking the LSs increase. However, the number of disconnected sensors remains significantly lower than the equal probability policy. VII. C ONCLUSION In this paper, we have considered the connectivity problem in an Internet of Battlefield Things network in which an adversary attempts to cause disconnection by compromising one of the IoBT nodes at each time epoch while a defender tries to restore the connectivity of the IoBT by deploying new IoBT nodes or changing the roles of nodes. We have formulated the problem as a multistage Stackelberg game in which the attacker is the leader and the defender is the follower. Due to the reliance of the attacker’s and the defender’s actions on the network state at each stage t, we have adopted the feedback Stackelberg equilibrium to solve the game. We have obtained sufficient condition to maintain connectivity at each stage t when the FSE solution is used. Numerical results show that the expected number of disconnected sensors, when the FSE solution is used, decreases up to 46% compared to a baseline scenario in which a Stackelberg game with no feedback is used, and up to 43% compared to a baseline equal probability policy. R EFERENCES [1] N. Suri, M. Tortonesi, J. Michaelis, P. Budulas, G. Benincasa, S. Russell, C. Stefanelli, and R. Winkler, “Analyzing the applicability of internet of things to the battlefield environment,” in Proc. of International Conference on Military Communications and Information Systems (ICMCIS), Brussels, Belgium, May 2016, pp. 1-8. [2] M. Tortonesi, A. Morelli , M. Govoni, J. Michaelis, N. Suri, C. Stefanelli, and S. Russell“Leveraging Internet of Things within the military network environment — Challenges and solutions," in Proc. of IEEE World Forum on Internet of Things (WF-IoT), Reston, VA, Dec. 2016, pp. 111-116. [3] P. P. Ray, “Towards an Internet of Things based architectural framework for defence," in Proc. of International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Dec. 2015, Kumaracoil, India, pp. 411-416. [4] W. H. Lee, J. Choi, J. H. Lee, Y. H. Kim and S. C. Kim, “Distributed Power Control-Based Connectivity Reconstruction Game in Wireless Localization," in IEEE Communications Letters, vol. 21, no. 2, pp. 334337, Feb. 2017. [5] A. Roy, A. Mondal and S. Misra, “Connectivity Re-establishment in the Presence of Dumb Nodes in Sensor-Cloud Infrastructure: A Game Theoretic Approach," in Proc. of IEEE 6th International Conference on Cloud Computing Technology and Science, Singapore, Dec. 2014, Singapore, Singapore pp. 847-852. [6] L. Goratti, T. Baykas, T. Rasheed and S. Kato, “NACRP: A Connectivity Protocol for Star Topology Wireless Sensor Networks," in IEEE Wireless Communications Letters, vol. 5, no. 2, pp. 120-123, Apr. 2016. [7] R. Dou and G. Nan, “Optimizing Sensor Network Coverage and Regional Connectivity in Industrial IoT Systems," in IEEE Systems Journal, no. 99, pp. 1-10, May 2017. [8] Z. Xu, L. Chen, C. Chen and X. Guan, “Joint Clustering and Routing Design for Reliable and Efficient Data Collection in Large-Scale Wireless Sensor Networks," in IEEE Internet of Things Journal, vol. 3, no. 4, pp. 520-532, Aug. 2016. [9] X. Zhao, Y. Zhang, C. Jiang, J. Yuan and J. Cao, “Mobile-Aware Topology Control Potential Game: Equilibrium and Connectivity," in IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1267-1273, Dec. 2016. [10] P. Y. Chen, S. M. Cheng and K. C. Chen, “Information Fusion to Defend Intentional Attack in Internet of Things," in IEEE Internet of Things Journal, vol. 1, no. 4, pp. 337-348, Aug. 2014. [11] Y. Han, Y. Chen, B. Wang and K. J. Ray Liu, “Enabling Heterogeneous Connectivity in Internet of Things: A Time-Reversal Approach," in IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1036-1047, Dec. 2016. [12] S. Grüner, F. G. Radmacher, and W. Thomas. “Connectivity games over dynamic networks,” in Theoretical Computer Science, vol. 493, Jul. 2013, pp. 46-65. [13] Y. Zhang, J. Zheng, and M. Ma, Handbook of Research on Wireless Security, Information Science Reference, 2008. [14] Z. Han, D. Niyato, W. Saad, T. Başar, and A. Hjørungnes, Game Theory in Wireless and Communication Networks: Theory, Models, and Applications, Cambridge University Press, 2012. [15] W. Pawgasame, “A survey in adaptive hybrid wireless Sensor Network for military operations,” in Proc. of 2016 Second Asian Conference on Defence Technology (ACDT), Chiang Mai, Thailand, Jan. 2016, pp. 78-83. [16] T. Başar and G. J. Olsder, Dynamic Noncooperative Game Theory, 2nd Edition, Society for Industrial and Applied Mathematics, 1998. [17] B. An, M. Tambe, A. Sinha. “Stackelberg Security Games (SSG) Basics and Application Overview”, in Improving Homeland Security Decisions, Cambridge University Press, 2016. [18] T. Başar and A. Haurie, “Feedback equilibria in differential games with structural and modal uncertainties,” Advances in Large Scale Systems, ch. 1, pp. 163–201. JAE Press Inc., Connecticut, May 1984. [19] V. Conitzer, “On Stackelberg mixed strategies,” Synthese, vol. 193, no. 3, pp. 689–703, Mar. 2016. [20] D. A. Babayev and S. S. Mardanov,“Reducing the number of variables in Integer and Linear Programming Problems ," in Computational Optimization and Applications, vol. 3, no. 2, pp. 99–109, May 1994. A PPENDIX A PPENDIX A: S UMMARY OF N OTATION D Set of IoBT devices. K Set of devices’ types. K Size of set K I Set of information types. M Size of set I Nτ Number of devices of type τ . Hτ Information set of a device of type τ . Ah IoBT subarea h. Djh Cluster sensing information j in subarea Ah . Nth,jh Minimum required number of sensors in cluster Djh . wi Weight of device i. wL,i Weight of LS i. Lh Set of LSs in subarea Ah . cτ Cost of compromising a device of type τ . cL Cost of compromising an LS. cCH Cost of determining the cluster head. caL Cost of determining the activated LS. dτ Cost of deploying a device of type τ . dL Cost of deploying an LS. P Set of players. T Set of stages. X State space. Sa,t Attacker’s strategy set at time t. Sd,t Defender’s strategy set at time t. ψt State of the game at time t. 11 ψa,t Network observed by the attacker at time t. Da (t) Set of devices in ψa,t . Da,jh (t) Cluster Djh in ψa,t . fa,jh (t) Index of the device that is CH of cluster Da,jh (t). La,h (t) Set of LSs in subarea Ah at time t. sa,h (t) Index of the activated LS in La,h (t). ψd,t Network observed by the defender at time t. Dd (t) Set of devices in ψd,t . Dd,jh (t) Cluster Djh in ψd,t . fd,jh (t) Index of the device that is CH of cluster Dd,jh (t). Ld,h (t) Set of LSs in subarea Ah in ψd,t . sa,h (t) Index of the activated LS in La,h (t). at Attacker’s action at time t. bt Defender’s action at time t. ad,i Attacking device i. aL,lh Attacking LS l in subarea Ah . bc,ijh Assigning device i to be the CH of Djh . bd,τ h Deploying a device of type τ in subarea Ah . ba,lh Activating LS l in subarea Ah . qt Attacker’s mixed strategy at time t. Pa,t Attacker’s payoff at time t. Pd,t Defender’s payoff at time t. SD,t Sum of weights of disconnected sensors at time t. Λt Delay to deliver the information at time t. the single hop delay between i and j and is given by: Λ(i, j) = Rmiji where Rij is the capacity of the link (i, j) and mi is the packet size of node i. • If at = ad,i , bt = bd,kh0 , i ∈ Dh00 (t), h00 6= h0 , M X SD,t (at , bt ) = I(i ∈ Djh00 (t) )(xijh00 (t)Wjh00 (t) + x̄ijh00 (t)), j=1 Λt (at , bt ) = max z̄h (t)I(h 6= h0 ) max z̄jh (t) 1≤h≤H 1≤j≤M ×(I(i ∈ / Djh (t))(Λjh (fjh (t), sh (t), Djh (t)) +I(i ∈ Djh (t))I(fjh (t) 6= i)(Λjh (fjh (t), sh (t), Djh (t) \ {i}) +Λg (sh (t))) + I(h = h0 ) max I(j ∈ / Hk )(fjh0 (t), s0h (t), Djh0 (t)) 1≤j≤M + +I(j ∈ Hk )Λjh0 (fjh0 (t), sh0 (t), Djh 0 (t)) + Λg (sh0 (t))), + where Dh (t) is the set of devices in subarea Ah , Djh (t) = Djh (t) ∪ {N (t) + 1}, and N (t) + 1 is the index of the newly deployed device and N (t) is the total number of devices. • If at = ad,i , bt = bd,kh0 , i ∈ Dh0 (t), SD,t (at , bt ) = M X I(i ∈ Djh0 (t), j ∈ / Hk )xijh0 (t)Wjh0 (t) j=1 + I(i ∈ Djh0 (t), j ∈ Hk )xijh0 (t)(Wjh0 (t) + 1) + x̄ijh0 (t), Λt (at , bt ) = max I(h = h0 )z̄h (t) max I(i ∈ Djh0 (t))I(fjh0 (t) 6= i) 1≤h≤H A PPENDIX B: E XPRESSIONS OF PAYOFF F UNCTIONS The expressions of SD,t (at , bt ), Λt (at , bt ) in terms of each pair of the attacker’s and defender’s pure strategies at and bt are given as follows. • SD,t (at , bt ) = I(i ∈ Djh (t)) xijh (t)Wjh (t) + x̄ijh (t)) +(I(j ∈ / Hk )z̄jh (t)Λjh0 (fjh0 (t), sh0 (t), Djh (t) \ {i})) +I(h 6= h0 ) max z̄jh (t)Λjh (fjh (t), sh (t), Djh (t)) 1≤j≤M + Λg (sh (t)). If at = ad,i , bt = bc,kj 0 h0 , H X M X • If a = ad,i , bt = ba,kh00 ,  SD,t (at , bt ) = h=1 j=1 H X M X I(i ∈ Djh (t))(xijh (t)Wjh (t) + x̄ijh (t)) h=1 j=1 −zj 0 h0 (t)Wj 0 h0 (t), +I(h = h00 )(−zh00 (t)Wh00 (t)), Λt (at , bt ) = max z̄h (t) max (1 − I(h = h0 , j = j 0 ))z̄jh (t) 1≤h≤H 1≤j≤M + ×(I(j ∈ Hk )z̄jh (t)Λjh0 (fjh0 (t), sh0 (t), Djh (t) \ {i}) 1≤j≤M Λt (at , bt ) = max (I(h 6= h00 )z̄h (t) + I(h = h00 )) ×(I(i ∈ Djh (t))x̄ijh (t)Λjh (fjh (t), sh (t), Djh (t) \ {i}) +I(i ∈ / Djh (t))Λjh (fjh (t), sh (t), Djh (t))) 1≤h≤H × max I(i ∈ Djh (t))I(fjh (t) 6= i) +I(h = h0 , j = j 0 )(I(i ∈ Djh (t))Λjh (k, sh (t), Djh (t) \ {i}) +(I(i ∈ / Dj 0 h (t))Λjh (k, sh (t), Djh (t))) + Λg (sh (t)), where for any variable x, x̄ = 1 − x, I(.) is the indicator function. In this part, all the network variables pertains to network ψa,t , and the index a is dropped for ease of notation. xijh (t) is an indicator whether device i is the CH in cluster Djh (t), fjh (t) is the CH of Djh (t), sh (t) is the activated LS in subarea h, Wjh (t) is given by Wjh (t) = Njh (t), zh (t) is an indicator if subrea Ah is currently disconnected from the GS, zjh (t) is an indicator if cluster Djh (t) is currently disconnected from the network, Λjh (fjh (t), sh (t), Djh (t)) is the time to transmit the information from cluster Njh (t) to LS sh (t) and is given by Λjh (fjh (t), sh (t), Djh (t)) = Λ(fjh (t), sh (t))+ maxn∈Djh (t) Λ(n, fjh (t)), Λ(fjh (t), sh (t)) is the time needed to transmit the information from CH fjh (t) to LS sh (t), Λ(n, fjh (t)) is the time needed to transmit the information from device n to CH fjh (t), and Λg (sh (t)) is the time required to deliver the information from sh (t) to the GS. For any two IoBT nodes i and j, Λ(i, j) is 1≤j≤M ×Λjh (fjh (t), sh (t), Djh (t) \ {i})) −I(i ∈ / Djh (t))Λjh (fjh (t), sh (t), Djh (t)) + Λg (sh (t)), • where Wh (t) is given by: Wh (t) = If at = ad,i , bt = bL,h00 , SD,t (at , bt ) = H X M X P i∈Dh (t) wi +wL,sh (t) . I(i ∈ Djh (t))(xijh (t)Wjh (t) + x̄ijh (t)), h=1 j=1 Λt (at , bt ) = max z̄h (t) max I(i ∈ Djh )I(fjh (t) 6= i) 1≤h≤H 1≤j≤M ×Λjh (fjh (t), sh (t), Djh (t) \ {i})) −I(i ∈ / Djh )Λjh (fjh (t), sh (t), Djh (t))) + Λg (sh (t))). • If at = aL,mh0 , bt = ba,kh00 , h0 = h00 , SD,t (at , bt ) = −zh00 (t)Wh00 (t), Λt (at , bt ) = max I(h = h0 ) max Λjh0 (fjh0 (t), k, Djh0 (t)) 1≤h≤H 1≤j≤M +I(h 6= h0 )z̄h (t)( max z̄jh (t)Λjh (fjh (t), sh (t), Djh (t)) 1≤j≤M +I(h = h0 )Λg (k) + I(h 6= h0 )z̄h (t)Λg (sh (t)). 12 • If at = aL,mh0 , bt = ba,kh00 , h0 6= h00 , SD,t (at , bt ) = ymh0 (t)Wh (t) + ȳmh (t)wL,m − zh00 (t)Wh00 (t), Λt (at , bt ) = max (I(sh0 (t) 6= m, h = h0 ) + I(h 6= h0 )) 1≤h≤H ×z̄h (t)(Λg (sh (t)) + max z̄jh (t)Λjh (fjh (t), sh (t), Djh (t))) 1≤j≤M +I(h = h00 )( max z̄jh00 (t)Λjh00 (fjh00 (t), k, Djh00 (t)) + Λg (k)), 1≤j≤M where ymh (t) is an indicator that LS m is the activated LS in subarea Ah . • If at = aL,mh0 , bt = bL,h00 , SD,t (at , bt ) = ymh0 (t)Wh0 (t) + ȳmh0 wL,m , Λt (at , bt ) = max z̄h (t)(I(sh0 (t) 6= k, h = h0 ) + I(h 6= h0 )) 1≤h≤H × max (z̄jh (t)Λjh (fjh (t), sh (t), Djh ) + Λg (sh (t)). 1≤j≤M • If at = aL,mh0 , bt = bd,kh00 , h0 6= h00 , SD,t (at , bt ) = ymh0 (t)Wh0 (t) + ȳmh0 (t)wL,m , Λt (at , bt ) = max (I(sh0 (t) 6= m, h = h0 ) + (h 6= h0 , h 6= h00 )) 1≤h≤H ×z̄h (t) M X z̄jh (t)(Λjh (fjh (t), sh (t), Djh (t)) j=1 + +I(h = h00 ))z̄h (t)( max I(j ∈ Hk )z̄jh (t)Λjh (fjh (t), sh (t), Djh (t)) 1≤j≤M +I(j ∈ / Hk )z̄jh (t)Λjh (jh (t), sh (t), Djh (t)) + Λg (sh (t))). • If at = aL,mh0 , bt = bd,kh00 , h0 = h00 , SD,t (at , bt ) = ymh (t)(Wh0 (t) + Nk ) + ȳmh0 (t)wL,m , Λt (at , bt ) = max (I(s0h (t) 6= m, h = h0 )z̄h (t) 1≤h≤H + ×( max I(j ∈ Hk )z̄jh (t)Λjh (fjh (t), sh (t), Djh (t)) 1≤j≤M +I(j ∈ / Hk )z̄jh (t)Λjh (fjh (t), sh (t), Djh (t) + Λg (sh (t)))) +I(h 6= h0 )z̄h (t)( max z̄jh (t)Λjh (fjh (t), sh (t), Djh (t)) + Λg (sh (t))). 1≤j≤M • If at = aL,mh0 , bt = bc,kj 0 h00 , SD,t (at , bt ) = ymh0 (t)Wh0 (t) + ȳmh0 (t)wL,m , Λt (at , bt ) = max (I(sh (t) 6= m, h = h0 ) + I(h 6= h0 )) 1≤h≤H ×z̄h (t)( max I(h = h00 , j = j 0 )Λjh (k, sh (t), Djh (t)) 1≤j≤M +(1 − I(h = h00 , j = j 0 ))z̄jh (t)Λjh (fjh (t), sh (t), Djh (t)) +Λg (sh (t))). The expressions of Ca,t (at , bt ), Cd,t (at , bt ) and Ud,t (at , bt ) in terms of the pure strategies of the attacker and the defender are given as follows:  ci , cL,k ,  di , Cd,t (at , bt ) = dL ,  0, Ca,t (at , bt ) = if at = ad,i , if at = aL,kh . if bt = bd,ih , if bt = bL,h , otherwise. The expression of the defender’s utility is given by  ui , Ud,t (at , bt ) = uL ,  0, if bt = bd,ih , if bt = bL,h , otherwise.
7cs.IT
336 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 КОМПЛЕКСНЫЕ ИНСТРУМЕНТАЛЬНЫЕ СРЕДСТВА ИНЖЕНЕРИИ ОНТОЛОГИЙ Виталий Величко, Кирилл Малахов, Виталий Семенков, Александр Стрижак Аннотация: В статье представлен обзор актуальных специализированных инструментальных средств инженерии онтологий, а также средств аннотирования текстов на основе онтологий. Рассмотрены основные функции и возможности данных инструментальных средств, их достоинства и недостатки. Описываются основные компоненты системы формирования онтологий на основе семантического анализа текстовых массивов. Дается системный сравнительный анализ средств инженерии онтологий. Ключевые слова: онтология, инженерия знаний, проектирование онтологии предметной области, инструментальный комплекс онтологического назначения. ACM Classification Keywords: I.2 ARTIFICIAL INTELLIGENCE - I.2.4 Knowledge Representation Formalisms and Methods, H. Information Systems – H.2 DATABASE MANAGEMENT – H.2.4 Systems Введение Методология проектирования онтологии предметной области (ПрО) [Палагин, 2012] основывается на конструктивном использовании следующих категорий – множества концептов, отношений, функций интерпретации и аксиом. Построение указанных множеств является трудоёмким процессом, как по времени, так и по количеству вовлечённых в процесс проектирования высококвалифицированных специалистов. Особенно трудоемко ручное проектирование онтологий, которое мало чем отличается от тематического проектирования экспертных систем. Понимание важности решения проблемы создания эффективных инструментальных средств поддержки процессов проектирования онтологии заданной ПрО, пришло практически одновременно с осознанием парадигмы компьютерных онтологий. В настоящее время известно более ста инструментальных программных систем [Гаврилова, 2000; Палагин, 2009], но только ограниченное количество комплексных программных систем включают редактор онтологических структур, автоматизированное построение онтологий ПрО, средства поверхностного семантического анализа текстовых документов, используемых для построения онтологии. Основные характеристики комплексных программных систем проектирования онтологий К основным характеристикам комплексных программных систем онтологического инжиниринга можно отнести: поддерживаемые формализмы и форматы представления онтологий, архитектура программного обеспечения, интерфейс пользователя, функционал редактора онтологии, средства хранения онтологий, доступность, дополнительные возможности. Ниже рассмотрим более подробно некоторые из приведенных характеристик. International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 337 Поддерживаемые формализмы и форматы представления онтологий Под формализмом понимается некоторая формальная теория [Клини, 1957], лежащая в основе способа представления онтологических знаний (логика предикатов, фреймовые модели, дескриптивная логика, концептуальные графы и др.). Выбранный формализм существенно влияет на организацию внутренних (компьютерных) структур данных и может определять их формат представления. Формат представления онтологий задаёт вид их хранения в библиотеке, способ передачи онтологических описаний другим потребителям и метод обработки ее концептов. В качестве форматов онтологических описаний разработаны определенные языки представления онтологий, наиболее известными из которых являются OWL, RDFS, KIF. Некоторые из известных редакторов онтологий поддерживают работу с несколькими формализмами представления, однако следует учитывать тот факт, что обычно конкретный формализм является предпочтительным для конкретного редактора [Палагин, 2009]. Функциональность редактора онтологии Функциональность редактора онтологии является одной из самых важных характеристик, под которой понимается множество предоставляемых пользователю сервисов работы с онтологическими структурами. Базовый набор функций редактора онтологии обычно обеспечивает: работу с одним или несколькими онтологическими описаниями (проектами) одновременно; графический интерфейс пользователя; редактирование онтологии (создание, редактирование, удаление концептов, отношений, аксиом и прочих структурных элементов онтологии); инкапсулирование онтологий в среду информационных систем. Дополнительные возможности К дополнительным возможностям относят поддержку языка запросов, анализ целостности, использование механизма логического вывода, поддержку удалённого доступа через Интернет, документирование. Известны три группы инструментальных средств (ИнС) онтологического инжиниринга [Овдей, 2006]. К первой группе относят инструменты создания онтологий, которые предполагают поддержку совместной разработки и просмотра, создание онтологии в соответствии с заданной (произвольной) методологией, поддержку рассуждений. Ко второй группе относят инструменты объединения, отображения и выравнивания онтологий. Объединение предполагает нахождение сходств и различий между исходными онтологиями и создание результирующей онтологии, которая содержит элементы исходных онтологий. Для этого ИнС автоматически определяют соответствия между концептами или обеспечивают графическую среду, в которой пользователь сам находит эти соответствия. Процедура отображения заключается в нахождении семантических связей между концептами различных онтологий. Процедура выравнивания онтологий устанавливает различные виды соответствия между двумя онтологиями, информация о которых сохраняется для дальнейшего использования в приложениях пользователя [Noy, 1999]. 338 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 К третьей группе относят инструменты для аннотирования Web-ресурсов на основе онтологий. Содержательный обзор известных инструментов инженерии онтологий, в котором рассмотрены основные функции и возможности ИнС, их достоинства, недостатки, сравнительный анализ и описание известных доступных онторедакторов, также приведен в [Овдей, 2006; Noy, 1999; Calvanese, 2007; Филатов, 2007]. Общими недостатками большинства известных инструментальных средств являются: отсутствие процедур автоматического (автоматизированного) формирования компонент онтологии; англоязычный интерфейс с пользователем, в котором (для большинства ИнС) не предусмотрено присвоение имён компонентам онтологии на русском или украинском языке; структуризация концептов выполняется только по одному типу отношений; для большинства общедоступных ИнС не предусмотрена работа с большими по объёму онтологиями (например, для OntoEditFree – до 50 концептов); большинство инструментов хранит свои онтологии в текстовых файлах, что ограничивает скорость доступа к онтологиям; задекларированные функциональные возможности для общедоступных инструментов зачастую так и остаются нереализованными; недостаток информации для пользователей в инструкциях. Рассмотрим более подробно некоторые инструментальные программные системы, предназначенные для построения онтологий и их использования для решения задач. Универсальные и специализированные оболочки программных систем являются средством, упрощающим процесс создания интеллектуальной системы [Артемьева, 2008]. Универсальные оболочки основаны на использовании некоторого универсального языка представления знаний. В специализированных оболочках при представлении знаний используется специфичная для предметной области схема, определяемая онтологией той области, для которой создается оболочка, что позволяет создавать базу знаний эксперту предметной области без участия посредника, которым является инженер знаний. В сложно-структурированных предметных областях, связанных с наукой, могут изменяться не только знания, но и онтологии, и, как следствие, множество классов решаемых задач. Описание особенностей специализированных оболочек интеллектуальных систем для сложно-структурированных предметных областей приведено на основе статьи «Интеллектуальная система, основанная на многоуровневой онтологии химии» [Артемьева, 2008]. Специализированная оболочка интеллектуальной системы для сложно-структурированных предметных областей Информационными компонентами специализированной оболочки для сложно-структурированной ПрО являются многоуровневая модульная онтология и модульная база знаний. Создание и редактирование информационных компонент осуществляется многоуровневым редактором онтологий и редактором знаний, разработка которых основывается на онтологии уровня n. Редакторы многоуровневых онтологий и знаний должны позволять создание и редактирование модульных онтологий и знаний, а также обеспечивать возможность повторного использования модулей International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 339 при создании онтологий и знаний новых разделов и подразделов области, причем процесс создания и редактирования модуля онтологии уровня i-1 должен управляться онтологией уровня i, а процесс создания и редактирования модуля знаний – онтологией уровня 2. Редактор онтологии должен обеспечивать возможность выбора того из существующих модулей онтологии уровня i, который управляет процессом редактирования создаваемого модуля. Аналогично при редактировании модуля знаний должна обеспечиваться возможность выбора «управляющего» модуля онтологии уровня 2. Редакторы онтологии и знаний должны обеспечивать возможность задания структурированной и неструктурированной части онтологии, а также структурированной и неструктурированной части знаний, т. е. программным компонентом этих редакторов должен быть специализированный редактор утверждений, позволяющий вводить онтологические соглашения и законы предметной области. Редактор знаний должен обеспечивать возможность ввода/вывода значений нестандартных величин при редактировании знаний. Для значений нестандартных величин в предметной области может существовать способ их графического представления. Например, для химии [Артемьева, 2008] графически может быть задана краткая структурная формула или структурная формула химического соединения. Поэтому редактор знаний должен обеспечивать возможность использования принятого в предметной области графического способа представления значений нестандартных величин при создании и редактировании знаний. Величина, которой принадлежит значение некоторого свойства, задается онтологией уровня 2. Поэтому редактор знаний должен обеспечивать автоматический выбор (управляемый онтологией уровня 2) средств для графического представления значений нестандартных величин при редактировании знаний. Редактор онтологии интерпретирует онтологию уровня i при создании модуля онтологии уровня i-1. Редактор знаний интерпретирует онтологию уровня 2 при создании модуля знаний. Одна и та же онтология может интерпретироваться разными способами в разных редакторах знаний. Редакторы знаний могут отличаться не только способом интерпретации знаний, но и интерфейсом. Очевидно, что более удобный интерфейс и более понятный эксперту способ интерпретации можно обеспечить для редактора, предназначенного для интерпретации одной онтологии, а не класса онтологий. Поэтому специализированная оболочка должна позволять использование редакторов, поддерживающих разные способы интерпретации модуля онтологии уровня 2 и предоставлять возможность эксперту выбора требуемого ему редактора знаний. Значения нестандартных величин используются не только при редактировании знаний, но также при вводе исходных данных задач. Графический способ задания исходных данных задач более удобен для специалиста предметной области, поскольку в этом случае отсутствует необходимость громоздкого вербального описания этих данных. Графическое представление результатов решения является более наглядным способом представления. Поэтому оболочка должна обеспечивать возможность ввода/вывода значений нестандартных величин при задании исходных данных задач, а также позволять использование 340 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 принятого в предметной области графического способа представления значений нестандартных величин при вводе исходных данных задач и выводе результатов их решения. Как уже отмечалось, величина, которой принадлежит значение некоторого свойства, задается онтологией уровня 2. Оболочка должна обеспечивать автоматический выбор (управляемый онтологией) средств для графического представления значений нестандартных величин при задании исходных данных задач. Каждый раздел сложно-структурированной ПрО характеризуется своим множеством классов прикладных задач, причем разные множества могут содержать как общие классы задач, так и специфичные для раздела. Решатель задач может быть предназначен для решения классов задач одного раздела (в этом случае он использует онтологию и знания этого раздела), либо разных разделов (в этом случае он может использовать разные онтологии и знания). В первом случае используемая решателем онтология определяется классом задач. Во втором случае требуется дополнительное указание, какие онтология и знания должны использоваться в процессе решения. Специализированная оболочка интеллектуальных систем для сложно-структурированной предметной области должна обеспечивать возможность решения задач разных классов, причем пользователь должен иметь возможность указания модуля онтологии и модуля знаний, которые надо использовать при решении задач. Таким образом, специализированная оболочка должна содержать расширяемые библиотеки систем для решения задач разных классов, системы автоматического построения методов решения задач по их спецификации (рис. 1). Рис. 1. Системы для решения задач и средства их разработки International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 341 Метод решения задач может быть представлен либо в виде алгоритма, либо в виде множества правил системы продукций. В первом случае для создания решателя задач используется процессор алгоритмического языка, во втором случае – процессор языка, основанного на правилах, который является одним из программных компонент специализированной оболочки. Специализированная система обработки текстовых документов «ЛоТА» Специализированная система обработки текстовых документов «ЛоТА» [Невзорова, 2001] является системой класса Text Mining. Система предназначена для анализа специализированных текстов «Логика работы», описывающих логику работы сложной технической системы в различных режимах функционирования. Основной задачей анализа является извлечение из данных текстов информационной модели алгоритмов, решающих определенную задачу в определенной проблемной ситуации, и контроль структурной и информационной целостности выделенной схемы алгоритмов. Информационная модель алгоритма включает: описание входного информационного потока (типы информационных сигналов или семантическое описание информационного потока с указанием источника информации конкретный алгоритм, конкретное измерительное устройство); описание процессов преобразования входных данных в выходные (допустимый способ разрешения проблемы); описание выходного информационного потока (типы информационных сигналов или семантическое описание информационного потока с указанием точки приема информации). Решение основной задачи обеспечивается комплексом технологий обработки текстов, включающих: технологии морфосинтаксического анализа; технологии семантико-синтаксического анализа; технологии взаимодействия с прикладной онтологией. Указанная сумма технологий формируется на основе центрального ядра – прикладной онтологии (в дальнейшем, авиаонтология [Лукашевич, 2004]), обеспечивающей согласованное взаимодействие различных программных модулей. Авиаонтология концептуально описывает предметную область информационного обеспечения различных полетных режимов антропоцентрических систем. Авиаонтология представляет собой сеть понятий предметной области. Авиаонтология относится к классу лингвистических (лексических) онтологий и предназначена для встраивания в различные лингвистические приложения. Программный комплекс состоит из трех взаимодействующих подсистем: подсистемы лингвистического анализа технических текстов «Анализатор», подсистемы ведения онтологии «OntoEditor+» и подсистемы «Интегратор». Взаимодействие подсистем реализовано на базе технологии «клиент-сервер», причем в различных подзадачах подсистемы выступают в различных режимах (режим сервера или режим клиента). Инструментальная система визуального проектирования «OntoEditor+» является специализированной СУБД. Система предназначена для ручного редактирования онтологий, хранящихся в реляционной базе 342 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 данных в формате TPS, а также обслуживания запросов пользователей и внешних программ. Новые возможности системы обеспечиваются функциональным набором «Лингвистический инструментарий», посредством которого реализуется встраивание прикладной онтологии в лингвистические приложения. Наиболее типичными задачами, решаемыми с помощью инструментария системы «OntoEditor+», являются: изучение структурных свойств прикладной онтологии с помощью исследовательского инструментария системы «OntoEditor+»; построение лингвистической оболочки прикладной онтологии; задача покрытия текста онтологическими входами; построение выводов по прикладной онтологии и др. Подсистема «Анализатор» реализует основные этапы лингвистической обработки текста (графематический, морфосинтаксический и частичный синтаксический анализ). Подсистема «Интегратор» исполняет внешний запрос на извлечение знаний из текста. Структура внешнего запроса содержит компоненты информационной модели алгоритма. Внешний запрос интерпретируется при взаимодействии с подсистемой «OntoEditor+» как структура, привязанная к прикладной онтологии. Выделение компонент информационной модели происходит на основе механизмов отождествления элементов дерева сегментов входного текста (взаимодействие с подсистемой «Анализатор») и элементов структуры запроса (взаимодействие с подсистемой «OntoEditor+»). Инструментальная система визуального проектирования онтологий «OntoEditor+» включает: лингвистический инструментарий (задачи корпусного исследования (загрузка корпуса; сегментация на предложения; автоматическое ведение статистики по различным объектам корпуса), построение лингвистической оболочки онтологии, задача покрытия текста онтологическими входами, построение выводов по онтологии, поддержка протоколов информационного обмена системы «OntoEditor+» с внешними программными модулями, в том числе с внешними информационными ресурсами); исследовательский инструментарий. Основные функции подсистемы «Анализатор»: графематический анализ; морфосинтаксический анализ; покрытие текста онтологическими входами (взаимодействие с системой «OntoEditor+»). Основные функции подсистемы «Интегратор»: анализ и исполнение внешнего запроса (информационная модель алгоритма); интерпретация внешнего запроса в терминах прикладной онтологии (взаимодействие с системой «OntoEditor+»); интерпретация внешнего запроса в структурных компонентах дерева сегментов (взаимодействие с системой «Анализатор»); контроль информационной целостности (анализ компонент внешнего запроса). Метод контекстного разрешения омонимии является базовым методом в интегральной технологии разрешения омонимии в системе «ЛоТА». Однако практические задачи системы выявили ряд важных International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 343 аспектов лингвистического анализа, которые стимулировали развитие новых методов разрешения многозначности. Интегральная технология разрешения многозначности, разрабатываемая в системе «ЛоТА», включает следующие методы: метод контекстного разрешения функциональной омонимии; метод разрешения функциональной, грамматической и лексической омонимии на основе индексируемой базы устойчивых коллокаций; метод разрешения функциональной, грамматической и лексической омонимии на основе лингвистической оболочки онтологии. Для эффективного встраивания в лингвистические приложения система «OntoEditor+» поддерживает группу протоколов информационного обмена с внешними программными модулями системы и внешними словарными базами данных, обеспечивая работу в режиме клиент-сервер. Разрешение многозначности (функциональной, морфологической и лексической) во входных текстах происходит на основе механизма распознавания контекстов омонимов, зафиксированных в индексируемой базе контекстов. Разработаны три основных механизма пополнения индексируемой базы контекстов функциональных омонимов: ручной ввод и редактирование данных по типовым контекстам омонимов; импорт типовых контекстов омонимов из текстового файла, подготовленного в специальном формате представления данных; импорт типовых контекстов омонимов, обнаруженных специальными механизмами поиска подсистемы «Анализатор». Данный механизм организован как запрос к подсистеме «Анализатор» с передачей ему от подсистемы «OntoEditor+» текстового корпуса, по которому проводится поиск. В процессе обработки подсистема «Анализатор» передает подсистеме «OntoEditor+» информацию об обнаруженных контекстах омонимов, которая записывается либо в индекс омонимов, либо в автоматическом режиме, либо в режиме диалога с оператором. Отличительной особенностью режима диалога является режим самообучения, который реализуется с использованием механизма журнала событий. В данном журнале в зависимости от его настройки фиксируются те или иные важные события в системе, например, изменение информации в индексе омонимов или операции взаимодействия с подсистемой «Анализатор». В режиме самообучения сохраняется и контролируется последовательность ранее сгенерированных диалогов, что обеспечивает генерацию только уникальных диалогов на разрешение омонимии без повторений. Лингвистический инструментарий подсистемы «OntoEditor+» обеспечивает встраивание онтологии в различные приложения, связанные с обработкой текстов. Лингвистический инструментарий реализует функции загрузки корпуса текстов; автоматическое ведение статистики по различным объектам корпуса; функции предсинтаксической обработки текста (сегментация предложений, распознавание аббревиатур, разрешение омонимии на основе специальных протоколов взаимодействия с внешними словарными ресурсами); построение лингвистической оболочки онтологии; распознавание терминов прикладной 344 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 онтологии во входном тексте (задача покрытия). Сопряжение онтологического и лингвистического (грамматического) ресурсов реализуется через механизмы лингвистической оболочки онтологии. Лингвистическая оболочка онтологии создается с помощью разработанного программного инструментария, посредством которого фиксируется грамматическая информация об онтологических концептах и их текстовых формах. Каждый онтологический вход (как правило, многословный термин) снабжается соответствующей грамматической информацией, при этом для омонима разрешается соответствующая (функциональная, лексическая, морфологическая) омонимия. Грамматическая информация передается в подсистему «OntoEditor+» от подсистемы «Анализатор» на основе специальных протоколов взаимодействия. Разрешение лексической, функциональной и морфологической омонимии выполняется на основе специальных диалогов с экспертом-лингвистом. Отдельные процедуры реализуют проверки словоформ в составе терминологического входа на согласованность их грамматических характеристик, также осуществляется контроль достоверности словарной информации. Контроль достоверности обеспечивает отслеживание изменений, как в составе грамматического словаря, так и в составе онтологии. Учитывая сложность и многоступенчатость вышеперечисленных процедур, в подсистеме «OntoEditor+» разработан мастер построения лингвистической оболочки, который вызывается командой основного меню. Подсистема «Анализатор» обеспечивает реализацию метода разрешения омонимии на основе контекстных правил, т. е. фактически используются лингвистические знания системы. Этот метод является универсальным, не зависит от специфики предметной области и обеспечивает в текущей версии точность распознавания не ниже 95 %. Однако, для данного метода существуют крайне сложные типы функциональной омонимии, например, тип «частица/союз». Разрешение данной омонимии возможно во многих случаях лишь после завершения полного синтаксического анализа. Взаимодействие подсистемы «OntoEditor+» и подсистемы «Анализатор» осуществляется на основе специальных протоколов взаимодействия. При применении интегральной технологии разрешение многозначности происходит в два этапа. На первом этапе подсистема «Анализатор» (клиент) передает запрос на разрешение омонимии входного текста подсистеме «OntoEditor+» (сервер). Подсистема «OntoEditor+» возвращает подсистеме «Анализатор» информацию о разрешенных омонимах на основе своих методов. На втором этапе подсистема "Анализатор" разрешает омонимию оставшихся неразрешенных омонимов на основе метода контекстных правил. Интегральная технология разрешения многозначности эффективно применяется на этапе предсинтаксического анализа в системе «ЛоТА». По существу, интегральная технология представляет собой сочетание инженерного и лингвистического подхода к решению поставленной задачи. В основе проектирования интегральной технологии лежат процессы скоординированного взаимодействия различных языковых уровней, прежде всего онтологического уровня (обеспечивающего системные модели знаний о мире) и различных языковых уровней (морфологического и синтаксического). В системе реализован эффективный механизм взаимодействия различных подсистем, обеспечивающих реализацию различных методов в составе интегральной технологии. При этом, следует признать, что сам процесс International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 345 согласования языковых взаимодействий достаточно сложен и требует определения большого числа дефиниций-правил, описывающих условия обработки концептов онтологии. Интеллектуальная система извлечения данных и их анализа (на основе текстов) ИСИДА-Т Целью ИСИДА-Т [Кормалев, 2006]; [Киселев, 2004], является извлечение значимой информации определенного типа из (больших массивов) текста для дальнейшей аналитической обработки. Результатом работы систем является получение структурированных данных и отношений на них. Основные компоненты ИСИДА-Т: Инфраструктурные службы (конфигурирование, параллельная обработка, взаимодействие модулей); Лингвистический процессор; Модули работы со знаниями ПрО; Интерпретатор правил извлечения информации. Разработанные в рамках проекта ИСИДА-Т технологии, инструменты и продукты позволяют: обнаруживать в электронных документах, извлекать и структурировать информацию о представляющих интерес фактах, событиях, объектах и отношениях; выполнять мониторинг сайтов в сети Интернет на предмет появления там значимой для пользователя информации. Основные рабочие характеристики технологии и продуктов: поддержка русского языка; быстрая настройка на предметную область при помощи эффективных инструментальных средств; высокая точность и полнота анализа за счет использования предметных знаний; наличие встроенных средств визуализации результатов анализа в виде диаграмм и схем; легкая интегрируемость в другие информационные системы на любом уровне (программный или сетевой интерфейс, БД); функционирование под управлением ОС Windows и большинства Linux-систем; близкая к линейной масштабируемость при параллельной архитектуре анализа. Возможность работы на вычислительных машинах кластерного типа. Некоторые области применения технологий семантического анализа и структурирования текстовой информации: информационная поддержка бизнеса (business intelligence) и управление знаниями (knowledge management); маркетинговые исследования; финансовая аналитика; военная и коммерческая разведка и мониторинг; информационная поддержка органов государственной власти (в рамках направления «Электронное правительство»); 346 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 работа библиотек, издательств и СМИ. Рассмотрим общую организацию инфраструктуры системы ИСИДА-Т. Краеугольным камнем системы ИСИДА-Т является точная настройка на предметную область и конкретную задачу извлечения. С одной стороны, это достигается за счет редактирования лингвистических ресурсов, ресурсов знаний, правил извлечения и правил трансформации. С другой стороны, настройка может потребовать включения в процесс обработки дополнительных специализированных методов обработки текста. Кроме того, для каждой задачи необходимо подобрать наиболее подходящие алгоритмические средства анализа из набора имеющихся. Эти аспекты требуют создания такой архитектуры, при которой легко могут добавляться и замещаться алгоритмические компоненты процесса извлечения. Проблема конфигурирования на алгоритмическом уровне потребовала создания модульной архитектуры и декларативного подхода к определению процесса извлечения. Модули получили название обрабатывающих ресурсов в противовес лингвистическим ресурсам и ресурсам знаний. В конфигурации декларируется порядок обработки документа аналитическими модулями, потоки данных между ними, а также параметры их работы. Обрабатывающие ресурсы можно разделить на следующие группы. Ресурсы предобработки. Сюда относятся средства определения кодировки документа, извлечения текста и стилевой разметки из документа, предварительной фильтрации. Ресурсы лингвистического анализа. Осуществляют разбор текста на отдельные слова, морфологический анализ (в том числе специализированные варианты для различных категорий имен собственных), поверхностный синтаксический анализ и определение границ предложений. Ресурсы извлечения. Осуществляют поиск в документе целевой лексики и синтаксических конструкций, а также первичное структурирование информации. Ресурсы унификации знаний и вывода. Осуществляют унификацию и отождествление элементов знаний, вывод производных знаний. Ресурсы подготовки результата. Осуществляют приведение извлеченной информации к определенному формату и передачу за пределы последовательности обработки (в БД, глобальный ресурс знаний, файл, приложение). В системе ИСИДА-Т все модули, в том числе средства общего лингвистического анализа, используют структуру данных – аннотация. Аннотация – объект, который приписывается фрагменту текста (например, слову, словосочетанию, предложению, ссылке на сущность предметной области и т. д.) и описывает свойства этого фрагмента. Аннотации разбиты на конечное множество классов. Каждый класс аннотаций описывает текст в определенном аспекте. Информация о фрагменте представлена значениями именованных атрибутов аннотации. Наборы классов и атрибутов аннотаций намеренно не специфицированы, чтобы можно было использовать произвольный набор обрабатывающих модулей и представлять необходимую лингвистическую и предметную информацию. Обмен данными между модулями тоже идет в терминах аннотаций: новые аннотации могут строиться на основании полученных на предыдущих этапах анализа [Овдей, 2006]. В реализации системы ИСИДА-Т модель аннотаций была International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 347 дополнена некоторыми полезными средствами. В частности, было снято ограничение на атомарность атрибутов и добавлена возможность устанавливать ссылки между аннотациями. Для распознавания текстовых ситуаций используется набор правил, описывающих характерные для конкретной задачи способы выражения ситуации в тексте. Эти правила задают образец для сопоставления и действия, которые должны быть произведены после успешного сопоставления. Ряд современных систем извлечения информации (в том числе, система ИСИДА-Т) берут за основу различные диалекты языка CPSL [Noy, 1999]. Использование этого языка подразумевает разметку текста при помощи аннотаций. Язык правил, используемый в системе ИСИДА-Т, является расширением CPSL. Предлагаемые расширения преследуют две цели: 1) обеспечить возможность описывать более сложные контексты, в которых встречается целевая информация, и 2) снизить объем рутинной работы при создании системы правил за счет более компактного описания контекста [Гаврилова, 2000]. Отличия от других реализаций, например, JAPE [Calvanese, 2007] или диалекта CPSL состоят в следующем. Реализована встроенная поддержка расширенного спектра типов данных, в том числе, ссылок на аннотации и множественных значений. Данные этих типов могут использоваться в качестве значений переменных и значений атрибутов аннотаций. Логика работы интерпретатора правил приведена в максимальное соответствие поведению интерпретатора обычных регулярных выражений. Отличия от современной реализации JAPE и Montreal transducer [Calvanese, 2007] заключаются в поддержке «жадных» и «нежадных» квантификаторов и опережающей проверки. Поддерживаются кванторы существования (по умолчанию) и всеобщности, связывающие элементарные тесты. К кванторам может добавляться отрицание. Существуют языковые средства, позволяющие гибко проверять взаимное расположение аннотаций, рассматриваемых в контексте сопоставления, и прочих аннотаций во входной коллекции. В тестах могут использоваться функции для обращения к ресурсу знаний, например, проверки таксономической принадлежности элементов. Для более сложных запросов к ресурсу знаний используется предметно-ориентированный язык, совпадающий с языком описания левой части правил трансформации. Для передачи информации между элементарными тестами, а также в правую часть правил могут использоваться именованные переменные, значения которых присваиваются явно в ходе сопоставления. Множество значений переменных входит в контекст сопоставления. Инструментальное средство проектирования онтологий Protégé Protégé [Noy, 1999] – локальная, свободно распространяемая Java-программа, разработанная группой медицинской информатики Стэндфордского университета. Программа предназначена для построения 348 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 (создания, редактирования и просмотра) онтологий прикладной области. Её первоначальная цель – помочь разработчикам программного обеспечения в создании и поддержке явных моделей предметной области и включение этих моделей непосредственно в программный код. Protégé включает редактор онтологий, позволяющий проектировать онтологии, разворачивая иерархическую структуру абстрактных или конкретных классов и слотов. Структура онтологии сделана аналогично иерархической структуре каталога. На основе сформированной онтологии, Protégé может генерировать формы получения знаний для введения экземпляров классов и подклассов. Инструмент имеет графический интерфейс, удобный для использования неопытными пользователями, снабжен справками и примерами. Protégé основан на фреймовой модели представления знания OKBC (Open Knowledge Base Connectivity) [Chaudhri, 1998] и снабжен рядом плагинов, что позволяет адаптировать его для редактирования моделей, хранимых в разных форматах (стандартный текстовый, в базе данных JDBC, UML, языков XML, XOL, SHOE, RDF и RDFS, DAML+OIL, OWL). Используемые формализмы и форматы Изначально единственной моделью знаний, поддерживаемой Protégé, была фреймовая модель. Этот формализм сейчас является «родным» для редактора, но не единственным. Protégé имеет открытую, легко расширяемую архитектуру и, помимо фреймов, поддерживает все наиболее распространенные языки представления знаний (SHOE, XOL, DAML+OIL, RDF/RDFS, OWL). Protégé поддерживает модули расширения функциональности (plug-in). Расширять Protégé для использования нового языка проще, чем создавать редактор этого языка «с нуля». Protégé основан на модели представления знаний OKBC (Open Knowledge Base Connectivity). Основными элементами являются классы, экземпляры, слоты (представляющие свойства классов и экземпляров) и фасеты (задающие дополнительную информацию о слотах). Пользовательский интерфейс Пользовательский интерфейс состоит из главного меню и нескольких вкладок для редактирования различных частей базы знаний и ее структуры. Набор и названия вкладок зависят от типа проекта (языка представления) и могут быть настроены вручную. Обычно имеются следующие основные вкладки: Классы, Слоты (или Свойства для OWL), Экземпляры, Метаданные. Инструментальный комплекс автоматизированного построения онтологий ПрО Инструментальный комплекс онтологического назначения (ИКОН) для автоматизированного построения онтологии в произвольной предметной области [Палагин, 2012] является системой, реализующей одно из направлений комплексных технологий Data & Text Mining, а именно – анализ и обработку больших объёмов неструктурированных данных, в частности лингвистических корпусов текстов на украинском и/или русском языке, извлечение из них предметных знаний с последующим их представлением в виде системно-онтологической структуры или онтологии предметной области. Извлечение информации (Information Extraction) [Палагин, 2012] –– это подход, позволяющий сузить круг задач, требующих специфического предметно-ориентированного решения при анализе текста. В рамках International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 349 этого подхода задача обработки текста ограничена распознаванием множества классов ключевых понятий конкретной предметной области и игнорированием всякой другой информации. Несмотря на то, что системы извлечения информации могут строиться для выполнения различных задач, подчас сильно отличающихся друг от друга, существуют компоненты, которые можно выделить практически в каждой системе. В состав почти каждой системы извлечения информации входят четыре основных компонента, а именно: компонент разбиения на лексемы, некоторый тип лексического или морфологического анализа, синтаксический анализ (микро- и макроуровень), модуль извлечения информации и модуль для анализа на уровне конкретной предметной области. В зависимости от требований к конкретному программному продукту в приведённую выше схему добавляют дополнительные модули анализа (специальная обработка составных слов; устранение омонимии; выделение составных типов, которое может также быть реализовано на языке правил извлечения информации; объединение частичных результатов). Разбиение на слова при анализе европейских языков не является проблемой, поскольку слова отделяются друг от друга пробелом (или знаками препинания). Тем не менее, для обработки составных слов, аббревиатур, буквенно-цифровых комплексов и ряда других особых случаев требуются специфические алгоритмы. С границами предложений, как правило, тоже больших проблем не возникает. Однако при анализе таких языков как японский или китайский, определение границ слова на основе орфографии невозможно. По этой причине системы извлечения информации, работающие с такими языками, должны быть дополнены модулем сегментирования текста на слова. В некоторые системы наряду с обычными средствами лексического и морфологического анализа могут быть включены модули для определения и категоризации атрибутов частей речи, смысловых нагрузок слов, имен или других нетривиальных лексических единиц. ИКОН предназначен для реализации множества компонентов единой информационной технологии: поиск в сети Интернет и/или в других электронных коллекциях (ЭлК) текстовых документов (ТД), релевантных заданной ПрО, их индексацию и сохранение в базе данных; автоматическая обработка естественно-языковых текстов; извлечение из множества ТД знаний, релевантных заданной ПрО, их системно-онтологическая структуризация и формально-логическое представление на одном (или нескольких) из общепринятых языков описания онтологий. Кроме того, внутри этой технологии реализуется процедура построения, визуализации и проверки семантических структур синтаксических единиц ТД и понятийных структур заданной ПрО в виде онтографа, названного начальной онтологией ПрО; создание, накопление и использование больших структур онтологических знаний в соответствующих библиотеках; системная интеграция онтологических знаний как одна из основных компонент методологии междисциплинарных научных исследований; другие процедуры, связанные с автоматизацией приобретения знаний из множества естественноязыковых объектов. 350 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 ИКОН состоит из трёх подсистем и представляет собой интеграцию разного рода информационных ресурсов (ИР), программно-аппаратных средств обработки и процедур естественного интеллекта (ЕИ), которые, взаимодействуя между собой, реализуют совокупность алгоритмов автоматизированного, итерационного построения понятийных структур предметных знаний, их накопления и/или системной интеграции. Обобщённая блок-схема ИКОН представлена на рис. 2. Подсистема «Информационный ресурс» включает блоки формирования лингвистического корпуса текстов, баз данных языковых структур и библиотек понятийных структур. Первый компонент представляет собой различные источники текстовой информации, поступающей на обработку в систему. Второй компонент представляет собой различные базы данных обработки языковых структур, часть из которых формируется (наполняется данными) в процессе обработки ТД, а другая часть формируется до процесса построения онтологии ПрО и, по сути, является ЭлК различных словарей. Третий компонент представляет собой совокупность библиотек понятийных структур разного уровня представления (от наборов терминов и понятий до высокоинтегрированной онтологической структуры междисциплинарных знаний) и является результатом реализации некоторого проекта (проектирования онтологии ПрО и/или системной интеграции онтологий). Рис. 2. Обобщённая блок-схема ИКОН Подсистема «Программно-аппаратные средства» включает блоки обработки языковых и понятийных структур и управляющую графическую оболочку, с помощью которой инженер по знаниям осуществляет общее управление процессом использования связанных информационных технологий. Подсистема «Естественный интеллект» осуществляет подготовку и реализацию процедур предварительного этапа проектирования, а на протяжении всего процесса осуществляет контроль и проверку результатов выполнения этапов проектирования, принимает решение о степени их завершённости (и в случае необходимости – повторении некоторых из них). International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 351 ТОДОС – IT-платформа онтологических информационно-аналитических экспертных систем ТОДОС – инновационный комплекс программно-информационных и методических средств управления знаниями с использованием подходов онтологического управления корпоративными информационными ресурсами, где человек рассматривается как источник определения новых знаний для передачи их в форме собственного знания через инструментарий [Стрижак, 2013]. ТОДОС обеспечивает для пользователя единую интегрированную точку доступа – «единое окно» – к информации и приложениям системы для обеспечения интерактивного взаимодействия при решении прикладных задач. Принцип ТОДОС – «Ситуационная осведомленность» за счет предоставления пользователям необходимой информации, касающейся направлений их деятельности и достаточной для принятия эффективного решения: Удобное, интуитивно-понятное, многоаспектное представление аналитической информации; Обеспечение работы с неструктурированной и слабо структурируемой информацией; Работа с информацией и результатами анализа из любой точки сетевого доступа; Удовлетворение поиска и запросов пользователей – извлечение знаний; Обработка и анализ контента, агрегирование и упорядочивание по заданному критерию; Поддержка принятия решений на основе анализа больших объемов информации; От данных - к пространственно-распределённым системам управления (ГИС) - от ГИС - к информации; Обеспечение взаимодействия и обратной связи. Концепция ТОДОС: консолидация и интеграция всей имеющейся корпоративной информации и предоставление ее через систему «единого окна», за счет чего повышается уровень осведомленности всех категорий пользователей в их деятельности; обеспечение «бесшовной» системной интеграции информационных технологий и инноваций с целью создания информационно-аналитических ресурсов для внедрения в бизнес-процессы организации; создание условий «ситуационной осведомленности» для всех заинтересованных категорий пользователей с многоаспектным анализом массивов документов, их анализом, сравнением, рейтингованием с выводом отчетов и результатов анализа; обеспечение онтологического управления информационными массивами, которые объединяются в единое корпоративное информационное пространство – онтолого-управляемую систему корпоративных знаний; поиск в сети Интернет и в файловых электронных коллекциях текстовых документов, релевантных тематике исследований и экспертизы; 352 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 автоматическая обработка естественно-языковых текстов с выделением поверхностных семантических отношений для дальнейшего их анализа; извлечение из множества документов знаний, релевантных выбранной предметной области, их системно-онтологическая структуризация и формально-логическое представление, а также построение, визуализация и верификация семантических структур синтаксических единиц текстовых документов и категориальных знаний заданной предметной области в виде онтологического графа; автоматизированное построение онтологий и тезаурусов предметных областей для организации системы управления знаниями; автоматизированный анализ и создание системы рейтингов объектов исследования и процессов с ними связанных с учетом всего множества факторов, влияющих на соответствующие объекты и процессы; обеспечение многовекторного исследования объектов и процессов с целью выявления параметров влияющих на их состояние, развитие и принятия соответствующего объективного решения. ТОДОС – это: Модуль КОНСПЕКТ – контекстно-семантический анализ естественно-языкового текста и построение таксономии документов; Модуль КОНФОР – классификация и генерация онтологий предметной области; Модуль ЭДИТОР – конструирование трансдисциплинарных онтологий; Модуль АЛЬТЕРНАТИВА – онтология задачи выбора для информационно-аналитической поддержки принятия решений и обеспечения процессов многофакторного анализа и рейтингования; ПОИСКОВАЯ МАШИНА – поиск лексических структур на основе лингвистической обработки большого количества распределенных сетевых текстовых массивов; ЛИНГВИСТИЧЕСКИЙ КОРПУС – электронная библиотека со средствами ассоциативного поиска семантически связанных информационных массивов; Модуль КРИПТО – защита информационных массивов от несанкционированного доступа. Модуль КОНСПЕКТ представляет собой лингвистический процессор [Величко, 2009], который обеспечивает первичное формирование лингвистического корпуса [Широков, 2005] и позволяет решать следующие практические задачи: 1) Выделение однословных и многословных терминов документа. 2) Формирование списка терминов с подсчетом их количества в тексте. 3) Навигация по списку терминов с отбором и отражением контекстов предложений из текста с выделенными терминами. 4) Автоматизированное построение тематического словаря по коллекции документов для использования в локальной полнотекстовой поисковой системе с целью повышения релевантности поиска. International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 5) Конспектирование текста по заданной теме. Конспект 353 это краткое изложение содержания статьи или книги. Система автоматически создает текстуальный конспект, где основные положения произведения, доказательства и выводы передаются словами автора, то есть цитатами. Тема конспекта задается пользователем программы с помощью ключевого слова или словосочетания. Из исходного текста в конспект отбираются предложения, содержащие тему, и автоматически отбираются термины текста, ассоциативно связанные с заданной темой. Пример конспекта, который автоматически построен в среде модуля КОНСПЕКТ, приведен на рис. 3. Рис. 3. Фрагмент среды модуля КОНСПЕКТ Результаты, которые можно получить в ближайшее время при условии доработки разработанной программы: 1) Повышение качества обработки текстов на украинском и русском языках за счет увеличения объема словаря системы; 2) Автоматическое определение тематических направлений документа; 3) Сортировка документов по тематическим направлениям; 4) Построение семантической сети терминов документа; 5) Объединение семантических сетей терминов для нескольких документов; 6) Поиск информации в сети Интернет с помощью поискового модуля системы ТОДОС с дополнительной автоматической семантической фильтрацией результатов поиска. Для дополнительной фильтрации используются алгоритмы формирования семантических категорий заданной тематики, извлеченных из 354 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 текста. Список документов, которые получает пользователь после дополнительной фильтрации, сокращается в несколько раз; 7) Конспектирование текста по заданной теме (для украинского языка). Модуль КОНФОР предназначен для построения семантических связей между объектами предметной области на основе индуцированной обработки отношений между объектами тематических классов ПрО. Для этого тематические классы описываются пользователем в соответствии с нижеприведённой схемой: (имя класса объектов 1),(имя связи), (имя объекта 1),...,(имя объекта n) (имя класса объектов 2),(имя связи), (имя объекта 1),...,(имя объекта j) ....................................................................................................................... (имя класса объектов m),(имя связи), (имя объекта 1),...,(имя объекта k) Согласно схемы заполняется таблица, например MS Excel, ячейки столбца А которой содержат имена материнских вершин графа, ячейки столбца В – имена связей между вершинами, ячейки столбцов от С до Z – имена дочерних вершин. Выходной структурой модуля КОНФОР является онтограф ПрО [Палагин, 2012], [Довгий, 2013], вершины которого носят имена объектов. Модуль ЭДИТОР предназначен для создания, редактирования, просмотра и анализа сетей понятий и формирования закономерностей, представленных в виде набора значений признаков, которыми описываются начальные понятия предметной области. Таким образом, описание предметной области является наглядным и легко интерпретируется пользователем. Выделение закономерностей происходит методом индуктивного формирования понятий на основе пирамидальной сети. Пирамидальной сетью называется ациклический ориентированный граф, вершинами которого выступают термины (понятия) предметной области, а ребрами (дугами) семантические связи между терминами [Гладун, 1994]. Представление информации в виде графа позволяет изучать не только отдельный термин (понятие), но и получать все его семантические связи с другими понятиями, тем самым осмысливая его роль в данной системе знаний или в ходе решения задачи. Однако сетевой граф может выступать не только средством организации знаний. Расширяя традиционные функции, граф можно превратить в среду, в которой обеспечивается активная работа со знаниями, а также оригинальным образом решаются учебные задачи. Концептуальная модель предметной области или онтология состоит из графа (иерархии понятий) предметной области, связей между ними и законов, которые действуют в рамках этой модели. Модуль АЛЬТЕРНАТИВА обеспечивает упорядочивание объектов-концептов онтологии, на основе интегрированной обработки характеризующих их свойств. Для этого используются весовая, бальная и лингвистическая шкалы. Каждая такая шкала определяет значение критериев, характеризующих свойства объектов тематической онтологии ПрО. В общем случае свойства-критерии характеризуются различными International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 355 степенями важности, которые при решении задачи выбора задаются некоторыми действительными числами весовыми коэффициентами. Перед решением задачи для каждого критерия необходимо сформировать его значение для каждой альтернативы [Саати, 1989]. Модули ПОИСКОВАЯ МАШИНА и ЛИНГВИСТИЧЕСКИЙ КОРПУС, обеспечивают маркировку и индексирование семантических единиц, определяющих и описывающих контексты объектов тематических онтологий ПрО. Контексты семантических единиц составляют электронную библиотеку. Модуль КРИПТО обеспечивает защиту информационных ресурсов электронной библиотеки системы. Защита реализуется на основе гомоморфного кодирования. Для создания эффективных методов защиты системы реализуются механизмы инфраструктуры публичных ключей (PKI). Инфраструктура публичных ключей позволяет объединить электронные подписи, публичные и частные ключи и пирамиду виртуальных лиц или организаций, которые могут выполнять действия по управлению тематическими онтологиями и отображающими их документами. На основе анализа сопроводительной документации, справочных материалов, доступных в открытых источниках информации (интернет, научные труды), и, в отдельных случаях, практической работы с программными системами конструирования онтологий (ИКОН, ТОДОС, Protégé), построена сводная таблица, обобщающая сравнительные технические характеристики некоторых специализированных инструментальных средств инженерии онтологий (таблица 1). Заключение В статье представлен обзор специализированных инструментальных средств инженерии онтологий. Как видно из сравнительной таблицы, в которой представлены различные системы конструирования онтологий, стратегическим направлением развития таких систем является интероперабельность. Эффективность использования онтологических описаний в основном зависит от возможностей применения форматов их описаний при решении различных сложных прикладных задач. Наиболее конструктивным методом решения этой проблемы может быть разработка онтологий задач, которые смогут обеспечить семантическую синхронизацию взаимодействий различных по тематикам информационных систем на основе установления отношений между свойствами их концептов. Библиография [Клини, 1957] Клини С. К. Введение в метаматематику [Текст] / С. К. Клини. – М. : Иностранная литература, 1957. – 526 с. [Палагин, 2012] Палагин А. В. Онтологические методы и средства обработки предметных знаний / А. В. Палагин, С. Л. Крывый, Н. Г. Петренко. – [монография] – Луганск : изд-во ВНУ им. В. Даля, 2012. – 323 с. [Гаврилова, 2000] Гаврилова Т. А., Хорошевский В. Ф. Базы знаний интеллектуальных систем / Учебник для вузов. – СПб, Изд-во «Питер», 2000. – 384 с. [Палагин, 2009] Палагин А. В., Петренко Н. Г. Системно-онтологический анализ предметной области // УСиМ. – 2009. – № 4. – С. 3–14. [Овдей, 2006] Овдей О. М. Обзор инструментов инженерии онтологий / О. М. Овдей, Г. Ю. Проскудина. – Российский научный электронный журнал «Электронные библиотеки», 2004. – т. 7. – Вып. 4, ISSN 1562-5419. – Режим 356 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 доступа: http://www.elbib.ru/index.phtml?page= elbib/rus/journal/2004/part4/op. – Дата доступа: 19.10.2006. – Название с экрана. [Noy, 1999] Noy N. SMART: Automated Support for Ontology Merging and Alignment / N. Noy, M. Musen. – Stanford Medical Informatics, Stanford Univ. – 1999. – 24 p. Режим доступа: http://ais-portal.ru/2009/03. – Дата доступа: 17.05.2010. [Calvanese, 2007] Software Tools for Ontology Design and Maintenance / [D. Calvanese, P. Dongilli, G. De Giacomo, A. Kaplunova, D. Lembo, M. Lenzerini, R. Möller, R. Rosati, S. Tessaris, M. Wessel, I. Zorzi] Project Deliverable D21,TONES, 2007. http://www.researchgate.net/publication/240754938_Software_Tools_for_Ontology_Design_and_Maintenance [Артемьева, 2008] Артемьева И. Л., Рештаненко Н. В. Интеллектуальная система, основанная на многоуровневой онтологии химии // Программные продукты и системы. – 2008. – № 1. – С. 84-87. [Филатов, 2007] Филатов В. А. Разработка высокоэффективных средств создания и обработки онтологических баз знаний / Филатов В. А., Щербак С. С., Хайрова А. А. – Системи обробки інформації, випуск 8 (66), 2007. – С. 120– 124. – Режим доступа: www.nbuv.gov.ua/portal/ natural/soi/2007_8/Filatov.pdf. – Дата доступа: 17.11.2010. – Название с экрана. [Невзорова, 2001] Невзорова О. А., Федунов Б. Е. Система анализа технических текстов «ЛоТА»: основные концепции и проектные решения. // Изв. РАН. Теория и системы управления.– 2001. № 3. – С. 138-149. [Лукашевич, 2004] Лукашевич Н.В., Невзорова О. А., АвиаОнтология: анализ современного состояния ресурса // Компьютерная лингвистика и интеллектуальные технологии: труды Международной конференции Диалог’2004. – Москва, Наука, 2004– т.2 - с. 424-430. [Кормалев, 2006] Кормалев Д. А., Куршев Е. П. Развитие языка правил извлечения информации в системе ИСИДА-Т // Труды международной конференции «Программные системы: теория и приложения». — Т. 2. — М. : Физматлит, 2006. — С. 365-377. [Киселев, 2004] Киселев С. Л., Ермаков А. Е., Плешко В. В. Поиск фактов в тексте естественного языка на основе сетевых описаний // Компьютерная лингвистика и интеллектуальные технологии: труды Международной конференции Диалог’2004. – Москва, Наука, 2004. [Chaudhri, 1998] OKBC: A Programmatic Foundation for Knowledge Base Interoperability. V. Chaudhri, A. Farquhar, R. Fikes P. Karp J. Rice // Fifteenth National Conf. on Artificial Intelligence. AAAIPres/The MIT Press, Madison, P.600-607, 1998.http://www.oracle.com/technetwork/java/javase/index.html [Стрижак, 2013] Стрижак О.Є. Засоби онтологічної інтеграції і супроводу розподілених просторових та семантичних інформаційних ресурсів [Текст] / Екологічна безпека та природокористування: 3б. наук, праць / М-во освіти і науки України, Київ. нац. ун-т буд-ва і архіт., НАН України, Ін-т телекомунікацій і гло-бал. інформ. простору; редкол.: О.С. Волошкіна, О.М. Трофимчук (голов. ред.) [та ін.]. - К., 2013. - Вип. 12. – с.166-177] [Величко, 2009] Величко В. Автоматизированное создание тезауруса терминов предметной области для локальных поисковых систем / В. Величко, П. Волошин, С. Свитла // “Knowledge – Dialogue – Solution” International Book Series “INFORMATION SCIENCE & COMPUTING”, Number 15. – FOI ITHEA Sofia, Bulgaria. - 2009. – pp.24-31. [Широков, 2005] Корпусна лінгвістика / В.А. Широков, О.В. Булгаков, Т.О. Грязнухіна та ін.. – К.: Довіра, 2005. – 471 с. [Довгий, 2013] Комп’ютерні онтології та їх використання у навчальному процесі. Теорія і практика. : Монографія / С. О. Довгий, В. Ю. Величко, Л. С. Глоба, О. Є. Стрижак та ін. – К. : Інститут обдарованої дитини, 2013. – 310 с. [Стрижак, 2014] Онтологія задачі вибору та її застосування при аналізі лімнологічних систем [Текст] / [О.Є. Стрижак, В.В. Горборуков, О.В. Франчук, М.А. Попова] // Екологічна безпека та природокористування: 3б. наук, праць / М-во освіти і науки України, Київ. нац. ун-т буд-ва і архіт., НАН України, Ін-т телекомунікацій і гло-бал. інформ. простору; редкол.: О.С. Волошкіна, О.М. Трофимчук (голов. ред.) [та ін.]. - К., 2014. - Вип. 15. – С. – 172-183. [Гладун, 1994] Гладун В.П. Процессы формирования новых знаний [Текст] / В. П. Гладун. – София : СД «Педагог 6», 1994. – 192 с. [Саати, 1989] Саати Т. Принятие решений. Метод анализ иерархий: Пер. с англ. / Т. Саати.-М.: Радио и связь, 1989.316 с. International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 357 358 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 359 360 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 International Journal "Information Models and Analyses" Volume 3, Number 4, 2014 361 Информация об авторах Величко Виталий Юрьевич – к.т.н., старший научный сотрудник, Институт кибернетики им. В. М. Глушкова НАН Украины, Киев-187 ГСП, 03680, просп. акад. Глушкова, 40; e-mail: [email protected] Основные области научных исследований: индуктивный логический вывод, обработка естественно-языковых текстов Малахов Кирилл Сергеевич – младший научный сотрудник, Институт кибернетики им. В. М. Глушкова НАН Украины, Киев-187 ГСП, 03680, просп. акад. Глушкова, 40; email: [email protected] Основные области научных исследований: онтологический инжиниринг Семенков Виталий Васильевич аспирант, Луганський национальний университет имени Тараса Шевченка Основные области научных исследований: онтологический инжиниринг Стрижак Александр Евгеньевич к.т.н., старший научный сотрудник, Институт телекоммуникаций и глобального информационного пространства НАН Украины, Киев-186, 03186, Чоколовский бульвар, 13; e-mail: [email protected] Основные области научных исследований: корпоративные интеллектуальные системы, поддержка принятия решений Integrated Tools for Engineering Ontologies Velychko V.Yu., Malahov K.S., Semenkov V.V., Strizhak A.E. Abstract: The article presents an overview of current specialized ontology engineering tools, as well as texts’ annotation tools based on ontologies. The main functions and features of these tools, their advantages and disadvantages are discussed. A systematic comparative analysis of means for engineering ontologies is presented. ACM Classification Keywords: I.2 ARTIFICIAL INTELLIGENCE - I.2.4 Knowledge Representation Formalisms and Methods, H. Information Systems – H.2 DATABASE MANAGEMENT – H.2.4 Systems
2cs.AI
Anneaux à diviseurs et anneaux de Krull (une approche constructive) T. Coquand, H. Lombardi arXiv:1507.02880v3 [math.AC] 13 Dec 2017 14 décembre 2017 paru dans Communications in Algebra, 44 : 515–567, 2016 Quelques typos dans la bibliographie ont été corrigés par rapport à la version publiée. Par ailleurs on a mieux organisé les démonstrations de 1.19 et 1.20. Keywords : Divisor theory, PvMD, Constructive mathematics, Krull domains MSC 2010 : 13F05, 14C20, 06F15, 03F65 Résumé Nous présentons dans cet article une approche constructive, dans le style de Bishop, de la théorie des diviseurs et des anneaux de Krull. Nous accordons une place centrale aux “anneaux à diviseurs”, appelés PvMD dans la littérature anglaise. Les résultats classiques sont obtenus comme résultats d’algorithmes explicites sans faire appel aux hypothèses de factorisation complète. Abstract We give give an elementary and constructive version of the theory of “Prüfer v-Multiplication Domains” (which we call “anneaux à diviseurs” in the paper) and Krull Domains. The main results of these theories are revisited from a constructive point of view, following the Bishop style, and without assuming properties of complete factorizations. Introduction Nous présentons dans cet article une approche constructive de la théorie des diviseurs. L’excellent livre Divisor Theory [8] traite constructivement la clôture intégrale d’un anneau factoriel dans une extension finie de son corps des fractions. Edwards suppose aussi que l’anneau factoriel possède de bonnes propriétés pour la factorisation des polynômes. Nous traitons ici de manière constructive un cas plus général dans lequel nous n’avons aucune hypothèse de décomposition en facteurs irréductibles. L’exemple le plus important en pratique reste celui des anneaux géométriques 1 intégralement clos. Et dans ce cas la décomposition d’un diviseur en somme d’irréductibles n’est pas assurée constructivement. Nous nous situons dans la suite du livre A Course in Constructive Algebra [18], où est développée une théorie constructive des domaines de Dedekind (chapitre XII) indépendante de la possibilité d’une décomposition des idéaux en produit d’idéaux maximaux. Comme cet article est écrit dans le style des mathématiques constructives à la Bishop, nous donnerons la version constructive précise que nous choisissons pour beaucoup de notions classiques, même très bien connues. 1. Algèbres de présentation finie sur un corps discret 1 2 Anneaux à diviseurs et anneaux de Krull Le (( tour de force )) qui est réalisé par l’adjonction de pgcds idéaux en théorie des nombres peut-il être généralisé de manière significative ? Oui, pour certains anneaux intégralement clos, que nous appelons les anneaux à diviseurs, dénommés (( anneaux pseudo-prüfériens )) dans les exercices de Bourbaki, et (( Prüfer vmultiplication domains )) dans la littérature anglaise. Ils constituent une classe d’anneaux suffisamment large pour lesquels on a une notion raisonnable de diviseurs, mais où l’on ne réclame pas l’existence de diviseurs irréductibles. La théorie correspondante en mathématiques classiques semble due principalement à Lorenzen, Jaffard, Lucius et Aubert ([2, 15, 19, 20, 21]). Un développement moderne récent de cette théorie se trouve dans [14]. Cette théorie généralise la théorie plus classique des anneaux dits de Krull, dans laquelle on réclame une décomposition unique en facteurs premiers pour les diviseurs. Elle a été élaborée notamment par Krull, Arnold (1929), van der Waerden (1929), Prüfer (1932) et Clifford (1938) ([1, 6, 17, 24, 26]). Il semble aussi que l’approche de [4] ait eu une forte influence sur les exposés ultérieurs de la théorie. En pratique les anneaux à diviseurs sont au départ des anneaux à pgcd intègres ou des domaines de Prüfer. Ensuite la classe des anneaux à diviseurs est stable par extensions polynomiales ou entières et intégralement closes, ce qui donne les exemples usuels de la littérature. Voici un bref résumé de l’article. Dans la section 1 nous donnons une version élémentaire et constructive des bases de la théorie des anneaux à diviseurs. Nous donnons des caractérisations simples des anneaux à diviseurs (théorèmes 1.5, 1.28 et 1.29). Nous démontrons qu’un anneau intègre cohérent est à diviseurs si, et seulement si, il est intégralement clos (théorème 1.18). Nous démontrons que les anneaux à diviseurs de dimension de Krull 6 1 sont les domaines de Prüfer de dimension de Krull 6 1 (théorème 1.19). Nous donnons en 1.27 un principe local-global concret pour la divisibilité, les anneaux intégralement clos et les anneaux à diviseurs. Dans la section 2 nous abordons les questions de décomposition des diviseurs. Nous expliquons notamment les groupes réticulés de dimension 1 et leurs propriétés de base. Dans la section 3 nous donnons les propriétés de stabilité essentielles pour les anneaux à diviseurs : localisation, anneaux de polynômes, clôture intégrale dans une extension algébrique du corps de fractions. Dans la section 4 nous donnons un traitement élémentaire et constructif des anneaux de Krull (les anneaux dont les diviseurs forment un groupe réticulé à décomposition bornée). Nous indiquons l’algorithme de décomposition partielle pour les familles finies de diviseurs, nous démontrons un théorème d’approximation simultanée, le théorème (( un et demi )) pour les anneaux de Krull, et le théorème caractérisant les anneaux de Krull qui ne possèdent qu’un nombre fini de diviseurs irréductibles. La question des diviseurs irréductibles est traitée pour l’essentiel dans les énoncés 1.13, 1.14, 1.15 et 1.23, puis précisée en 2.5, 2.11, 3.5, 4.12 et 4.13. Nous terminons cette introduction par quelques explications concernant notre terminologie. Dans la littérature anglaise nos (( anneaux à diviseurs )) sont généralement appelés des (( Prüfer v-multiplication domain )), abrégé en PvMD. Ce n’est vraiment pas très élégant. Ils ont été introduits en 1967 par M. Griffin dans [13] initialement sous le nom de v-multiplication rings. Lucius les appelle des anneaux avec une théorie des pgcds de type fini dans [20]. Dans les exercices de Bourbaki, Algèbre Commutative, Diviseurs, leur nom est anneau pseudo-prüferien. Pour plus de renseignements sur la littérature existante voir [5, 9, 10, 11]. Nous aurions voulu appeler ces anneaux anneaux divisoriels. Mais dans la littérature anglaise on trouve (( divisorial ring )) pour un anneau intègre dont tous les idéaux sont (( divisoriels )) au sens de Bourbaki, c’est-à-dire intersections d’idéaux fractionnaires principaux. Cette T. Coquand, H. Lombardi 3 définition n’est pas pertinente d’un point de vue constructif, car il est impossible de montrer constructivement que l’anneau Z la satisfait 2 . Néanmoins, nous avons considéré que le terme (( anneau divisoriel )), que nous convoitions, était déjà pris, et nous nous sommes rabattus sur le moins élégant (( anneau à diviseurs )). Signalons aussi que nous introduisons la notion purement multiplicative de liste divisoriellement inversible page 4 dans la section 1. La notion associée d’idéal divisoriellement inversible dans un anneau intègre coı̈ncide avec celle d’idéal t-inversible, définie dans la littérature sur les PvMD. Nous pensons cependant que la terminologie divisoriellement inversible est plus parlante. Enfin nous définissons page 18 l’anneau de Nagata divisoriel Bdiv (X) d’un anneau commutatif arbitraire B. Dans le cas d’un anneau intègre, il est appelé dans la littérature l’anneau de Nagata pour la star opération v, et il est noté Na(B, v)(X). 1 Anneaux à diviseurs Dans tout l’article, A est un anneau intègre, de corps de fractions K, et l’on note A∗ = Reg A (le monoı̈de des éléments réguliers) et A× le groupe des unités. Nous définissons un anneau intègre comme un anneau qui satisfait l’axiome (( tout élément est nul ou régulier )). Nous n’excluons donc pas a priori le cas de l’anneau trivial. Dans ce cas A∗ = A et l’anneau total des fractions K est également trivial. Pour qualifier un élément de A∗ , nous parlerons donc plutôt d’élément régulier que d’élément non nul. Notez que l’anneau K vérifie l’axiome (( tout élément est nul ou inversible )), que A soit trivial ou non. Dans la suite, nous parlerons de A∗/A× comme du monoı̈de de divisibilité de A, et de K /A× comme du groupe de divisibilité de A. Le premier est vu avec sa structure ordonnée de monoı̈de positif 3 et le second, isomorphe au symétrisé du premier, est vu comme un groupe ordonné (ses éléments > 0 sont les classes des éléments de A∗ ). Nous désignons par GrA (a1 , . . . , an ) la profondeur de a = ha1 , . . . , an i, (abréviation pour la profondeur du A-module A relativement à l’idéal a). Pour cet article nous suffira de rappeler les définitions suivantes : une liste (a) = (a1 , . . . , an ) est dite de profondeur > 1 si les égalités a1 x = . . . = an x = 0 impliquent x = 0. La liste (a) est dite de profondeur > 2 si en outre, toute liste (x1 , . . . , xn ) proportionnelle (i.e. ai xj = aj xi pour tous i, j) est multiple de (a) (i.e. il existe x tel que xj = xaj pour tout j). Ces propriétés sont attachées à l’idéal a : on peut changer de système générateur pour l’idéal. Rappelons aussi les résultats classiques suivants (nous les utilisons pour k = 1 ou 2) : si Gr(a) > k et Gr(b) > k alors Gr(ab) > k ; si Gr(a) > k et a ⊆ b alors Gr(b) > k ; si m Gr(a1 , . . . , an ) > k alors pour tout m, Gr(am 1 , . . . , an ) > k. ∗ Pgcd fort, ppcm et profondeur > 2 On sait que dans un anneau intègre, deux éléments qui admettent un pgcd n’admettent pas nécessairement un ppcm, bien que la réciproque soit valable. Voici des précisions sur ce sujet. Proposition et définition 1.1 (Pgcd fort, ppcm et profondeur > 2) Soient A un anneau intègre, et a1 , . . ., an , b, g ∈ A∗ . 2. Une mésaventure analogue arrive avec la définition usuelle de la noethérianité : tout idéal est de type fini. 3. On définit un monoı̈de positif comme un monoı̈de commutatif simplifiable (M, +, 0) pour lequel est satisfaite l’implication x + y = 0 =⇒ x = y = 0. Le monoı̈de M peut alors être vu comme la partie positive d’un groupe ordonné G (en tant que groupe, G est le symétrisé de M .) 4 Anneaux à diviseurs et anneaux de Krull 1. On dit que la famille (ai ) admet l’élément g comme pgcd fort si sont satisfaites les conditions équivalentes suivantes. (a) L’élément g vu dans K∗/A× est le pgcd (la borne inférieure) de la liste (a1 , . . . , an ). (b) Pour tout x ∈ A∗ l’élément xg est un pgcd dans A de (xa1 , . . . , xan ). ∗ (c) Étant donné un multiple commun Tn a ades ai dans A , l’élément a/g est un ppcm a des a/ai (autrement dit g A = i=1 ai A) (d) (Formulation avec des idéaux fractionnaires Tn dans K) L’élément 1/g est un ppcm des 1/ai dans K, autrement dit g1 A = i=1 a1i A. 2. Si g est le pgcd fort de (a1 , . . . , an ), c’est aussi le pgcd fort de n’importe quel autre système générateur de l’idéal a = ha1 , . . . , an i. On dira donc que g est le pgcd fort de l’idéal de type fini a. 3. Si g est le pgcd fort de (a1 , . . . , an ), bg est le pgcd fort de (ba1 , . . . , ban ). 4. On a Gr(a1 , . . . , an ) > 2 si, et seulement si, 1 est pgcd fort de (a1 , . . . , an ). Démonstration. La démonstration est laissée au lecteur. Naturellement, un pgcd fort est un pgcd. 2 Remarque. Soit A un anneau intègre de corps de fractions K. Pour deux sous-A-modules non nuls a et b ⊆ K, on note (a : b)K = { x ∈ K | xb ⊆ a } . Dans la terminologie des staropérations, on note a−1 = (A : a)K . Alors a 7→ (a−1 )−1 est une star-opération, généralement appelée v-opération, et av = (a−1 )−1 est l’intersection des idéaux fractionnaires principaux (non nuls) qui contiennent a. Avec ces notations, les propriétés équivalentes du point 1 ci-dessus sont aussi équivalentes −1 −1 −1 à ha1 , . . . , an i = g1 ou à ha1 , . . . , an i = hgi. Lorsque l’anneau est cohérent et a, b −1 −1 de type fini comme A-modules, (a : b)K et (a ) sont de type fini. Idéaux divisoriellement inversibles Définition 1.2 Une liste (a) = (a1 , . . . , an ) dans A∗ est dite divisoriellement inversible si l’on a une liste (b) = (b1 , . . . , bm ) dans A∗ telle que la famille (ai bj )i∈J1..nK,j∈J1..mK admet un pgcd fort g dans A∗ . Les deux listes (a) et (b) sont dites inverses divisorielles l’une de l’autre. Exemples. 1) Dans un anneau à pgcd, les pgcds sont forts et toute famille finie admet la liste (1) comme inverse divisorielle. 2) Si ha1 , . . . , an i hb1 , . . . , bm i = hgi avec g ∈ A∗ , la liste (a) admet la liste (b) comme inverse divisorielle et g est le pgcd fort des ai bj . En notant a = hai et b = hbi, cette propriété des listes (a) et (b) ne dépend que de l’idéal ab. Et donc la propriété pour la liste (a) d’être divisoriellement inversible ne dépend que de l’idéal de type fini a = hai. Ceci introduit une nouvelle définition. Définition 1.3 Soit A un anneau intègre. — Un idéal de type fini a de A est dit divisoriellement inversible s’il existe un idéal de type fini b tel que ab admette un pgcd fort. On dit aussi que l’idéal de type fini a et l’idéal de type fini b sont inverses divisoriels l’un de l’autre. — L’anneau A est appelé un anneau à diviseurs si tout idéal de type fini non nul est divisoriellement inversible. T. Coquand, H. Lombardi 5 Notez que l’inverse divisoriel d’un idéal de type fini, s’il existe, n’est en aucun cas unique. Il s’agit un peu du même flottement que lorsque l’on parle de l’inverse d’un idéal de type fini dans un anneau de Prüfer. Mais ici, ce sera encore plus flottant, car deux inverses divisoriels d’un même idéal de type fini sont rarement isomorphes comme A-modules. Par exemple dans un anneau à diviseurs si Gr(c) > 2 et si ab admet un pgcd fort g, alors a(bc) admet le même pgcd fort. Mais si A n’est pas un anneau de Prüfer, en général, b et bc ne sont pas des A-modules isomorphes. Remarque. La notion de liste divisoriellement inversible est une notion purement multiplicative qui peut être définie pour un anneau commutatif arbitraire en utilisant la caractérisation dans le point 4. de la proposition 1.1. La notion associée d’idéal divisoriellement inversible dans un anneau intègre coı̈ncide avec celle d’idéal t-inversible, définie dans la littérature sur les PvMD. Nous pensons cependant que la terminologie divisoriellement inversible est plus parlante. Lemme 1.4 Soit (a1 , . . . , an ) une liste divisoriellement inversible dans A∗ et x régulier dans l’idéal ha1 , . . . , an i. 1. On peut trouver une liste (c1 , . . . , cq ) = (c) tel que x soit le pgcd fort des ai ck . 2. Si l’anneau A est cohérent, on peut prendre pour (c1 , . . . , cq ) un système générateur de l’idéal transporteur (hxi : a)A . Démonstration. 1. Considérons une liste (b1 , . . . , bm ) pour laquelle les ai bj admettent un pgcd fort g. Dans K∗/A× , g est le pgcd de la famille (ai bj )i,j , donc x = xg g est le pgcd de xai bj  a b la famille . Comme les ig j sont dans A et x est combinaison linéaire des ai , on g i,j a xbj g ∈ A et on peut prendre pour (c) la liste des xbj g . 2. Lorsque A est cohérent, le transporteur c0 = (hxi : a)A est un idéal de type fini qui contient xb l’idéal c = g j , j ∈ J1..mK construit au point 1. On doit vérifier que ac0 admet aussi x pour pgcd fort. Et puisque ac ⊆ ac0 il suffit que x divise tous les générateurs de ac0 , ce qui est clair. 2 Un projet pour le groupe des diviseurs d’un anneau intègre Comme nous l’avons déjà souligné, du point de vue algorithmique la factorisation totale n’est pas une propriété (( facile )), et nous sommes surtout intéressés par le fait d’avoir un bon groupe réticulé construit de manière raisonnable à partir du monoı̈de positif A∗/A× (ou du groupe ordonné K∗/A× ). Une manière d’expliquer ce que l’on veut réaliser est de décrire formellement les propriétés du groupe des diviseurs de A, que nous noterons Div A, et de l’application divA de A∗ dans (Div A)+ , qui à tout élément de A∗ associe le diviseur principal (positif ou nul) qu’il définit. Nous utilisons une notation additive pour le groupe Div A. Nous nous inspirons ici de la présentation de la théorie des diviseurs donnée dans le livre [4] consacré à la théorie des nombres. Mais comme le suggère [2, Aubert], nous ne mentionnerons ici que la structure multiplicative de A∗ : l’addition dans A ne doit pas intervenir ici ! Voir cependant la proposition 1.8. Projet divisoriel 1. Les propriétés requises pour divA : A∗ → (Div A)+ sont les suivantes. D1 Div A est un groupe réticulé et divA un morphisme de monoı̈des : divA (1) = 0, divA (ab) = divA (a) + divA (b). D2 Pour tous a, b ∈ A∗ , divA (a) 6 divA (b) ⇐⇒ a | b. 6 Anneaux à diviseurs et anneaux de Krull D3 Tout élément de (Div A)+ est la borne inférieure dans Div A d’une famille finie d’éléments de divA (A∗ ). On peut écrire ce projet sous la forme équivalente suivante, en demandant de traiter tous les diviseurs principaux, y compris ceux qui proviennent de K∗ . Projet divisoriel 2. Les propriétés requises pour divA : K∗ → Div A sont les suivantes. D01 Div A est un groupe réticulé et divA passe au quotient K∗/A× en donnant un morphisme de groupes ordonnés. ∀x, y ∈ K∗ : divA (xy) = divA (x) + divA (y), divA (1) = 0, ∀a ∈ A∗ : divA (a) > 0. D02 Pour tout x ∈ K∗ , divA (x) > 0 ⇐⇒ x ∈ A. D03 Tout élément de Div A est la borne inférieure dans Div A d’une famille finie d’éléments de divA (K∗ ). Dans la suite nous utiliserons parfois (( div )) au lieu de (( divA )) lorsque le contexte sera clair. Remarque. La condition D3 implique la propriété qu’un élément de (Div A)+ est égal à la borne inférieure dans Div A de tous les éléments de div(A∗ ) qui le majorent. Nous utiliserons souvent cette propriété par la suite. Mais naturellement la condition D3 est a priori plus forte. Dans [4] c’est une propriété encore plus faible qui est énoncée : deux éléments de (Div A)+ qui ont les mêmes majorants dans div(A∗ ) sont égaux. Par contre ces auteurs introduisent deux conditions supplémentaires. D’une part ils demandent que divA (a + b) > divA (a) ∧ divA (b) (propriété non multiplicative). D’autre part ils demandent à Div A d’être un groupe réticulé à décomposition complète. Convention. Il peut être pratique de rajouter 4 un élément +∞ à Div A en posant div(0) = +∞, +∞ > δ et δ + ∞ = ∞ + δ = +∞ pour tout δ ∈ Div A ∪ {+∞} . Alors les propriétés décrites dans le Projet divisoriel restent valables en acceptant 0 là où on le refusait. Cette convention présente deux intérêts. Premièrement, (Div A)+ ∪ {+∞} est un treillis distributif 5 . Deuxièmement, cela permet de traiter de manière plus uniforme les espaces spectraux implicitement présents dans la théorie. Le théorème de base Théorème et définition 1.5 (Anneaux à diviseurs) Pour que le projet divisoriel puisse être réalisé pour l’anneau A il faut et suffit que A soit un anneau à diviseurs (toute famille finie non vide de A∗ est divisoriellement inversible). Dans ce cas le couple (divA , Div A) est unique à isomorphisme unique près. — On dit alors que A est un anneau à diviseurs avec divA : K∗ → Div A pour théorie des diviseurs. — On note alors divA (a1 , . . . , an ) pour divA (a1 ) ∧ · · · ∧ divA (an ). — Un élément α ∈ Div A est appelé un diviseur principal s’il est de la forme div(x) pour un x ∈ K∗ . 4. Lorsque A 6= 0 les conditions requises sont satisfaites avec +∞ > Div A. Par contre si A = 0, on ne rajoute rien du tout, car div(0) = div(1). 5. Lorsque A 6= 0, il manque juste l’élément maximum dans (Div A)+ pour en faire un treillis distributif. T. Coquand, H. Lombardi 7 Démonstration. Nous laissons à la lectrice le soin de vérifier que les deux projets divisoriels sont équivalents. Supposons le projet divisoriel réalisé et montrons que toute liste (a1 , . . . , an ) dans A∗ est divisoriellement inversible. On note divA (a1 , . . . , an ) pour divA (a1 ) ∧ · · · ∧ divA (an ). On a nécessairement par distributivité  divA (a1 , . . . , an ) + divA (c1 , . . . , cq ) = divA (ai cj )i∈J1..nK,j∈J1..qK . et trivialement divA (a1 , . . . , an ) ∧ divA (c1 , . . . , cq ) = divA (a1 , . . . , an , c1 , . . . , cq ). On a divA (a1 ) > divA (a1 , . . . , an ) de sorte que l’on peut écrire (en vertu de D3 ) divA (a1 ) − divA (a1 , . . . , an ) = divA (c1 , . . . , cq ) pour une famille finie (c1 , . . . , cq ) = (c) dans A∗ . L’égalité  divA (a1 ) = divA (a) + divA (c) = divA (ai cj )i∈J1..nK,j∈J1..qK  nous dit que divA (a1 ) est la borne inférieure de la famille divA (ai cj ) i,j dans Div A. Et vu D02 , cela implique que a1 est la borne inférieure de la famille (ai cj )i,j dans K∗/A× . Ce qui signifie que a1 est pgcd fort des ai cj dans A∗ . Ainsi la condition que toute famille finie soit divisoriellement inversible est bien satisfaite. Voyons maintenant la question de l’unicité. Les éléments de Div A s’écrivent tous nécessairement sous forme divA (a) − divA (b) pour deux listes finies (a) = (a1 , . . . , an ) et (b) = (b1 , . . . , bm ) dans A∗ . On peut même demander que divA (a, b) = 0, autrement dit que 1 soit pgcd fort des ai et bj dans A∗ . Pour que l’unicité de la solution du projet divisoriel soit acquise, il suffit de voir qu’on n’a pas le choix pour décider une égalité divA (a) − divA (b) = divA (c) − divA (d) pour des listes finies (a), (b), (c), (d) de A∗ . Cela revient à divA (a) + divA (d) = divA (b) + divA (c). De manière plus générale on donne une propriété caractéristique pour une égalité divA (a1 , . . . , an ) = divA (b1 , . . . , bm ). Ici, on peut avancer l’un des deux arguments suivants, au choix. Premier argument. Si (c1 , . . . , cq ) est une famille inverse divisorielle de (a1 , . . . , an ) avec g pgcd fort des (ai cj ), l’égalité divA (a) = divA (b) équivaut au fait que g est pgcd fort des (bk cj ). Deuxième argument. On donne une propriété caractéristique pour une inégalité divA (a) 6 divA (b). C’est la propriété suivante. — Dans K∗ , b est multiple de tous les diviseurs communs à (a1 , . . . , an ). (∗) En effet, puisqu’on doit avoir divA (1/x) = − divA (x) en raison de D01 , la condition D03 est équivalente à sa formulation duale : tout élément de Div A est la borne supérieure dans Div A d’une famille finie d’éléments de divA (K∗ ), et a fortiori il est la borne supérieure de l’ensemble des divA (x) qu’il majore. En particulier divA (b) > α = divA (a) ⇐⇒ divA (b) majore Mα = { divA (x) | x ∈ K∗ , divA (x) 6 α } . Et Mα est égal à { divA (x) | x ∈ K∗ , &i x | ai }. Et vu D2 , divA (b) > α signifie exactement que dans K∗ , b est multiple des diviseurs communs à la liste (a). Supposons maintenant la condition d’existence des inverses divisoriels satisfaite et montrons que l’on peut construire Div A et divA conformément au projet divisoriel. Pour cela on munit l’ensemble Lst(A)∗ (ensemble des listes finies non vides d’éléments de A∗ ) de la relation de préordre 4 directement inspirée de la condition (∗) précédente : (a1 , . . . , an ) 4 (b1 , . . . , bm ) def ⇐⇒ chaque bj est multiple des diviseurs communs à (a). 8 Anneaux à diviseurs et anneaux de Krull On définit (Div A)+ comme l’ensemble ordonné correspondant (où α = β ⇔ α 4 β et β 4 α). On vérifie alors que l’on peut définir une addition sur (Div A)+ en posant def (a) + (b) = (ai bj )i,j . En d’autres termes cette loi a priori mal définie (( passe au quotient )). On vérifie ensuite que l’on obtient par symétrisation un groupe réticulé Div A convenable. Les détails sont laissés au lecteur. 2 Le résultat dans le lemme qui suit est donné page 388 dans [27, Zafrullah, 2006] : il faut lire (( PvMD )) au lieu de (( anneau à diviseurs )) et (( t-inversible )) au lieu de (( divisoriellement inversible )). Lemme 1.6 Un anneau intègre dans lequel tout idéal fidèle à deux générateurs est divisoriellement inversible est un anneau à diviseurs. Démonstration. On utilise l’astuce de Dedekind. Pour 3 idéaux arbitraires a, b, c dans un anneau on a toujours l’égalité (a + b)(b + c)(c + a) = (a + b + c)(ab + bc + ac). En outre un produit d’idéaux divisoriellement inversibles est divisoriellement inversible. Donc si a + b, b + c et a + c sont divisoriellement inversibles, il en va de même pour a + b + c. Cela permet de passer des idéaux à deux générateur aux idéaux à trois générateurs, puis de proche en proche à un nombre quelconque de générateurs. 2 Exemples. On a deux exemples fondamentaux, à partir desquels seront construits la plupart des autres exemples intéresssants en pratique. 1) Un anneau intègre à pgcd A est à diviseurs et l’on a (Div A, +, 0, 6) ' (K∗ /A× , · , 1, | ). En outre un inverse divisoriel de n’importe quel idéal de type fini est h1i. Un anneau à diviseurs dont tous les diviseurs sont principaux est un anneau à pgcd. 2) Un domaine de Prüfer est un anneau à diviseurs et l’on a (Div A, +, 0, 6, ∧) ' (Gfr(A), · , h1i , ⊇, +). (rappelons que Gfr(B) désigne en général le groupe des idéaux fractionnaires inversibles de B : pour un domaine de Prüfer ce sont tous les idéaux fractionnaires de type fini fidèles). En outre un idéal de type fini fidèle 6 admet un inverse (au sens des idéaux inversibles) qui est aussi un inverse divisoriel. 3) On donne souvent comme premier √ exemple d’un anneau de Prüfer qui n’est pas un anneau de Bezout l’anneau Z[α] où α = −5 dans lequel on a 2 × 3 = (1 + α)(1 − α) avec les 4 éléments irréductibles. Le mystère de la décomposition unique en facteurs premiers est alors éclairci par les décompositions en produits d’idéaux premiers données par les égalités h2i = h2, 1 + αi 2 , h3i = h3, 1 + αi h3, 1 − αi , h1 + αi = h2, 1 + αi h3, 1 + αi et h1 − αi = h2, 1 + αi h3, 1 − αi . avec les trois idéaux h2, 1 + αi, h3, 1 + αi, h3, 1 − αi irréductibles distincts. Voici un exemple du même style avec un anneau à diviseurs qui n’est ni un anneau à pgcd ni un domaine de Prüfer. On considère un corps discret k et l’on définit A = k[A, B, C, D]/hAD − BCi = k[a, b, c, d]. Il s’agit d’un anneau intègre dans lequel a, b, c, d sont des éléments irréductibles. En effet l’anneau quotient A reste gradué et a, b, c, d sont de degré 1. La suite (a, d) est régulière et 6. Si A est un anneau intègre non trivial, un idéal de type fini est fidèle si, et seulement si, il est non nul. T. Coquand, H. Lombardi 9 les localisés en a et d sont des anneaux à pgcd. Par exemple A[ a1 ] ' k[A, B, C, 1/A]. Donc A est un anneau à diviseurs (principe local-global 1.27). En outre divA (a, d) = 0 car l’égalité a lieu dans les deux localisés (principe local-global 1.27). On vérifie que hb, ai hb, di = hbi ha, b, c, di, donc divA (b, a) + divA (b, d) = divA (b) car div(a, b, c, d) = 0. Donc l’égalité ad = bc sans décomposition unique apparente en facteurs premiers s’explique par les décompositions en sommes de diviseurs deux à deux orthogonaux dans Div A données par les égalités divA (a) = divA (a, b) + divA (a, c) , divA (d) = divA (d, b) + divA (d, c) , divA (b) = divA (a, b) + divA (d, b) et divA (c) = divA (a, c) + divA (d, c). Notons qu’il est un peu plus délicat de certifier que les quatre diviseurs divA (a, b), divA (a, c), divA (d, b) et divA (d, c) sont irréductibles. Voir à ce sujet la poursuite de cet exemple pages 11 et 13. Enfin l’élément a est irréductible mais il n’est pas premier car A/hai ' k[B, C, D]/hBCi. Donc A n’est pas un anneau à pgcd 7 . Et l’anneau A n’est pas non plus un domaine de Prüfer car l’égalité divA (a, d) = 0 impliquerait ha, di = h1i, ce qui n’est pas le cas 8 . Proposition 1.7 Lorsque A est un anneau à diviseurs avec divA : K∗ → Div A comme théorie des diviseurs, on a les propriétés suivantes. 1. Pour b, a1 , . . ., an dans A∗ , (a) divA (b) 6 divA (a1 , . . . , an ) si, et seulement si, b divise les ai dans A∗ , (b) divA (b) > divA (a1 , . . . , an ) si, et seulement si, b est multiple de tous les diviseurs communs à (a1 , . . . , an ) dans K∗ , (c) divA (b) = divA (a1 , . . . , an ) si, et seulement si, b est pgcd fort de (a1 , . . . , an ). 2. Soit α un élément arbitraire de Div A. (a) α est la borne inférieure d’une famille finie de diviseurs principaux (en conséquence il est la borne inférieure des diviseurs principaux qu’il minore). (b) α est la borne supérieure d’une famille finie de diviseurs principaux (en conséquence il est la borne supérieure des diviseurs principaux qu’il majore). (c) On peut écrire α sous la forme divA (a) − divA (b) pour deux listes finies (a) et (b) dans A∗ avec divA (a, b) = 0 (autrement dit 1 est pgcd fort des ai et bj dans A∗ ). 3. On considère deux listes (x) = (x1 , . . . , xn ) et (y) = (y1 , . . . , ym ) dans K∗ V V (a) On a l’égalité i divA (xi ) = j divA (yj ) si, et seulement si, (x) et (y) ont les mêmes diviseurs communs dans K∗ . W W (b) On a l’égalité i divA (xi ) = j divA (yj ) si, et seulement si, (x) et (y) ont les mêmes multiples communs dans K∗ . Démonstration. Tout ceci résulte des considérations développées dans la démonstration du théorème 1.5. 2 On a alors comme corollaire une propriété faisant intervenir (enfin) la structure additive de l’anneau. 7. Autre argument : le couple (a, b) a pour pgcd 1, mais ce n’est pas un pgcd fort car ad est multiple de a et b sans être multiple de ab (sinon d serait multiple de b). 8. Un argument plus savant : A étant noethérien cohérent, il serait de dimension 6 1 (théorème XII-7.8 dans [18]), or il contient la suite régulière (a, d, b + c). 10 Anneaux à diviseurs et anneaux de Krull Proposition et définition 1.8 On suppose que A est un anneau à diviseurs. 1. Pour tous a, b ∈ A∗ on a divA (a) ∧ divA (b) 6 divA (a + b). 2. Pour a1 , . . ., an ∈ A et a ∈ ha1 , . . . , an i, on a divA (a1 ) ∧ . . . ∧ divA (an ) 6 divA (a). V En notant a = ha1 , . . . , an i on voit que le diviseur α = i divA (ai ) ne dépend que de a. On note donc α = divA (a) = divA (a1 , . . . , an ). On dit que α est le diviseur de l’idéal de type fini a. 3. Pour deux idéaux de type fini a et b de A on a alors b ⊇ a ⇒ divA (b) 6 divA (a) et divA (ab) = divA (a) + divA (b). Démonstration. 1. En effet les diviseurs communs à (a, b) dans K∗/A× sont les mêmes que les diviseurs communs à (a, b, a + b). Vu la proposition 1.7 on a donc div(a) ∧ div(b) = div(a) ∧ div(b) ∧ div(a + b). 2. Même chose. 2 3. Par distributivité dans le groupe réticulé Div A. On peut généraliser la proposition 1.8 aux idéaux fractionnaires de type fini de A. On a alors les implications suivantes (x ∈ K, x, y idéaux fractionnaires de type fini ⊆ K) : x ∈ x =⇒ divA (x) 6 divA (x), x⊇y =⇒ divA (x) 6 divA (y). Notez que pour x = hx1 , . . . , xn i l’inégalité divA (x) 6 divA (x) signifie que divA (x1 , . . . , xn ) = divA (x1 , . . . , xn , x) i.e. divA (x) = divA (x + hxi). Cela signifie aussi que tout y ∈ K qui divise les xi divise x( 9 ). Exprimer un diviseur comme borne supérieure de diviseurs principaux Proposition et notation 1.9 Soit A un anneau à diviseurs. 1. Un diviseur > 0 s’écrit α = div(a) pour un idéal de type fini a. Pour exprimer α comme borne supérieure de diviseurs principaux on considère un inverse divisoriel b = hb1 , . . . , bm i de l’idéal a. On a donc α + β = div(g) (β = div(b)) pour un g ∈ A∗ . D’où finalement Wm Wm α = j=1 div( bgj ) = j=1 div(aj ) pour des aj ∈ K∗ . 2. De la même manière, un élément arbitraire de Div A peut s’écrire sous forme α−div(b) pour un α ∈ (Div A)+ et un b ∈ A∗ . Il s’écrit donc explicitement comme une borne supérieure finie de diviseurs principaux. Wm 3. Si α ∈ Div A s’écrit j=1 div(aj ), on a pour x ∈ K : T divA (x) > α ⇐⇒ x ∈ i ai A. On note IdvA (α) ou Idv(α) cet idéal fractionnaire T Idv(α) = { x ∈ K | divA (x) > α } = i ai A. Pq Enfin pour un idéal fractionnaire c =  i=1 ci A, on note de manière abrégée Idv(c) ou Idv(c1 , . . . , cq ) au lieu de Idv div(c) . 9. Pour x et les xi dans A c’est une condition du type (( pgcd fort )) : pour tout z ∈ A et c ∈ A∗ , si z divise les cxi , alors z divise cx. T. Coquand, H. Lombardi 11 4. Pour α et γ ∈ Div A on a α 6 γ si, et seulement si, Idv(α) ⊇ Idv(γ) dans K. En particulier α = γ si, et seulement si, Idv(α) = Idv(γ). T 5. Dans le cas de figure du point 1., on a Idv(α) = A ∩ j bgj A = (g : b)A . T Pm 6. Si Idv(α) = i ai A = h=1 ch A, alors α = divA (c1 , . . . , cm ). Ainsi lorsque A est cohérent, l’idéal fractionnaire Idv(α) est de type fini pour tout diviseur α. Démonstration. 1 et 2. Clair. 3. De manière générale un diviseur est borne inférieure des diviseurs principaux qui le majorent. Or dire que divA (x) majore les divA (aj ), autrement dit qu’il majore leur borne T supérieure α, c’est dire que x ∈ i ai A. 4 et 5. Clair d’après 3. 6. Posons γ = divA (c1 , . . . , cm ). Un diviseur principal divA (x) majore α si, et seulement si, T x ∈ i ai A. Ainsi γ > α, et par ailleurs tout diviseur principal qui majore α majore γ. Donc γ = α car ils sont majorés par les mêmes diviseurs principaux. 2 Exemple. Avec l’exemple 3) page 8, puisque divA (a, b) + divA (a, c) = divA (a), le point 5 cidessus nous donne l’égalité IdvA (a, b) = (a : c)A . Un calcul montre alors que (a : c)A = ha, bi. Et par suite ha, bi = IdvA (a, b). En général pour un idéal fractionnaire c = hc1 , . . . , cq i on peut avoir une inclusion stricte c ( Idv(c) (c’est le cas si c ( Icl(c)). Lorsque l’anneau est cohérent, les intersections finies d’idéaux fractionnaires principaux sont des idéaux fractionnaires de type fini qui ont donc un statut particulier. Remarques. 1) Pour un idéal fractionnaire non nul de type fini a de l’anneau à diviseurs A on a Idv(a) = (a−1 )−1 , qui est l’intersection des idéaux fractionnaires principaux contenant a. 2) Tout diviseur étant borne supérieure d’une famille finie de diviseurs principaux, on pourrait choisir de représenter les diviseurs par les intersections finies d’idéaux fractionnaires principaux comme (( forme canonique )). L’avantage est alors que α = β si, et seulement si, Idv(α) = Idv(β). Notons que cependant dans l’exemple précédent : divA (a, b) est > 0 mais il ne peut s’écrire comme borne supérieure d’éléments divA (xi ) pour des xi ∈ A car tout diviseur commun de a et b dans A est une unité. La proposition 1.9 justifie la définition suivante, et donne le corollaire qui la suit. Définition et notation 1.10 Soit A un anneau et K = Frac A son anneau total de fractions. — On appelle idéal divisoriel fini de A une intersection finie d’idéaux fractionnaires principaux fidèles dans K (i.e., de la forme xA pour un x ∈ K∗ ). Si A est un anneau à diviseurs, un idéal divisoriel fini est n’importe quel idéal fractionnaire de la forme Idv(α) pour un α ∈ Div A. — On note Idif(A) l’ensemble des idéaux divisoriels finis de A. — Pour un idéal fractionnaire a qui n’est pas supposé de type fini, on définit Idv(a) comme l’intersection des idéaux fractionnaires principaux fidèles qui contiennent a. En outre, dans le cas d’un anneau à diviseurs, on écrit div(a) = α si Idv(a) = Idv(α). Ceci revient à dire que a ⊆ Idv(α) et que α = div(b) pour un idéal fractionnaire de type fini b ⊆ Idv(a). NB. Un idéal divisoriel fini n’est pas nécessairement un idéal fractionnaire de type fini, mais c’est le cas lorsque A est cohérent. Par ailleurs, div(a) = 0 signifie que a contient une suite de profondeur > 2. 12 Anneaux à diviseurs et anneaux de Krull Corollaire 1.11 Pour un anneau à diviseurs, les applications T W Idif(A) −→ Div A , i xi A 7−→ i divA (xi ) et Div A −→ Idif(A) , α 7−→ Idv(α) sont des bijections réciproques bien définies. Quand le groupe des diviseurs est-il discret ? Un groupe réticulé G est dit discret si la relation d’ordre α 6 β est décidable 10 . Pour cela il faut et suffit que l’égalité γ = 0 pour un γ ∈ G+ soit décidable, car α 6 β ⇐⇒ α−(α∧β) = 0. Pour le groupe réticulé Div A, cela veut dire que l’on sait tester si une liste finie (a1 , . . . , an ) dans A∗ admet 1 comme pgcd fort. En fait savoir tester si divA (x) 6 divA (y) pour x et y ∈ K∗ revient à savoir tester la divisibilité dans A∗ , et cela va suffire. En effet, pour un anneau à diviseurs A, on Wn peut tester ( ( α 6 β ? ) ) pour α et β dans Div A comme suit. On écrit α = div A (xi ) i=1 Vm et β = j=1 divA (yj ) pour des xi et yj ∈ K∗ . On doit donc tester divA (xi ) 6 divA (yj ) pour chaque couple (i, j). D’où le résultat. Lemme 1.12 Pour un anneau à diviseurs A les propriétés suivantes sont équivalentes. 1. Le groupe Div A est discret. 2. La divisibilité dans A∗ est décidable (autrement dit A est une partie détachable de K). On dit aussi dans ce cas que A est un anneau à divisibilité explicite. C’est le cas lorsque A est fortement discret. Diviseurs irréductibles Rappelons qu’un élément π > 0 d’un groupe réticulé G est dit irréductible si toute égalité π = η + ζ dans G+ implique η = 0 ou ζ = 0. Par ailleurs le (( lemme de Gauss )) dit que (ξ ⊥ η et ξ 6 η + ζ) =⇒ ξ 6 ζ. On en déduit le (( lemme d’Euclide )), qui pour un élément irréductible π et deux éléments η et ζ ∈ G+ , donne, si G est discret, l’implication, π 6 η + ζ =⇒ π 6 η ou π 6 ζ En langage de divisibilité on dirait (( tout élément irréductible est premier )). Comme dans [ACMC], nous appelons (( idéal premier )) tout idéal qui donne par passage au quotient un anneau sans diviseur de zéro, c’est-à-dire vérifiant xy = 0 ⇒ (x = 0 ou y = 0). En particulier l’idéal h1i est premier. On obtient pour les diviseurs irréductibles les deux théorèmes importants suivants. Théorème 1.13 Dans un anneau à diviseurs à divisibilité explicite, un diviseur α > 0 est irréductible si, et seulement si, Idv(α) est un idéal premier. On obtient donc une bijection entre les ensembles suivants. — Les diviseurs irréductibles. — Les idéaux divisoriels finis premiers 6= h1i. 10. En mathématiques constructives, la notion de construction (et donc celle de décidabilité) est une notion primitive qui n’est pas susceptible d’une définition en termes de machines de Turing. Voir [7]. T. Coquand, H. Lombardi 13 Démonstration. Supposons α irréductible et montrons que Idv(α) est un idéal premier. Si xy ∈ Idv(α), on a div(x) + div(y) > α, donc div(x) > α ou div(y) > α (car α est (( premier ))), c’est-à-dire x ∈ Idv(α) ou y ∈ Idv(α). Supposons Idv(α) premier et α 6 β + γ avec β = div(b1 , . . . , bn ) > 0 et γ = div(c1 , . . . , cq ) > 0. On montre que α 6 β ou α 6 γ. Ainsi, puisque α > 0, il est (( premier )) et a fortiori irréductible. Commme chaque bi cj est dans Idv(α) (car div(bi cj ) > α), on obtient bi ∈ Idv(α) ou cj ∈ Idv(α). Or par distributivité du (( ou )) sur le (( et )) dans le calcul des propositions, on a, en notant Pi pour (( bi ∈ Idv(α) )) et Qj pour (( cj ∈ Idv(α) )) (&i Pi ) ou (&j Qj ) = &i,j (Pi ou Qj ).  Et si par exemple &i bi ∈ Idv(α) , cela donne α 6 β. 2 Exemples. 1) Soit A un anneau de valuation intègre à divisibilité explicite. C’est un domaine de Bezout pour lequel le groupe Div A est totalement ordonné discret et il y a au plus un diviseur irréductible π, qui s’écrit π = div(p) avec Rad(A) = hpi = Idv(π). Ainsi on a un diviseur irréductible si, et seulement si, Rad(A) est un idéal principal. S’il y a d’autres idéaux premiers non nuls, c’est-à-dire si le rang du groupe Div A est > 1, ils ne sont pas de la forme Idv(α). Donc ce ne sont pas des idéaux principaux et ils ne sont pas de type fini. 2) Soit A un anneau à pgcd. Les diviseurs irréductibles correspondent aux éléments irréductibles de l’anneau (à association près), ou encore aux idéaux premiers principaux non nuls. Si A est factoriel et si x ∈ p premier (6= h0i , h1i), un des éléments irréductibles qui divisent x, disons p, doit être dans p. Donc si p 6= hpi, il y a au moins deux éléments irréductibles (non associés) dans p, ce qui fait une suite de profondeur 2, et div(p) = 0. Théorème 1.14 Dans un anneau à diviseurs à divisibilité explicite non trivial, si p est un idéal premier de type fini non nul avec π = div(p) > 0, alors p = Idv(p) et π est un diviseur irréductible. Démonstration. D’après le théorème 1.13, il suffit de montrer que p = Idv(π), l’inclusion p ⊆ Idv(π) étant triviale. Soit a = 6 0 un élément de p. D’après le lemme 1.4, il existe deux listes (b) = (b1 , . . . , bm ) et (c) = (c1 , . . . , cq ) dans A∗ , la deuxième de profondeur > 2, telles que p hb1 , . . . , bm i = hai hc1 , . . . , cq i (∗) Comme π > 0 = div(c1 , . . . , cq ) il y a un cj tel que div(cj ) 6> π, et a fortiori cj ∈ / p. Soit x ∈ Idv(p) = (hai : hbi) (point 5 de la proposition 1.9). On a x hbi ⊆ hai, avec (∗) cela donne ap ⊇ x p hbi = xa hci, donc p ⊇ x hci. Enfin, comme xcj ∈ p et cj ∈ / p, on obtient x ∈ p. Ce qu’il fallait démontrer. 2 Exemple. Dans l’exemple 3) page 8, les diviseurs div(a, b), div(a, c), div(d, b) et div(d, c) sont irréductibles car les idéaux ha, bi, ha, ci, hd, bi et hd, ci sont premiers. Comme div(a, b) + div(a, c) = div(a) > 0, on a par raison de symétrie div(a, b) > 0 et div(a, c) > 0. On peut appliquer le théorème 1.14. On obtient en outre sans calcul l’égalité Idv(a, b) = ha, bi et les trois autres égalités analogues. Corollaire 1.15 Dans un anneau à diviseurs cohérent à divisibilité explicite non trivial, on a les propriétés équivalentes suivantes pour un idéal q 6= h0i arbitraire. — L’idéal q est premier, de type fini, et div(q) > 0. — L’idéal q est premier, de type fini et div(q) est irréductible. — L’idéal q est un idéal divisoriel fini premier 6= h1i. 14 Anneaux à diviseurs et anneaux de Krull — Il existe un diviseur irréductible π tel que q = Idv(π). Et dans un tel cas q est détachable. En d’autres termes, on obtient une bijection entre les ensembles suivants : — les diviseurs irréductibles, — les idéaux divisoriels finis premiers 6= h1i, et une égalité entre les ensembles suivants : — les idéaux divisoriels finis premiers 6= h1i, — les idéaux de type fini premiers q 6= h0i tels que div(q) > 0. — les idéaux de type fini premiers q 6= h0i , h1i tels que q = Idv(q). Propriétés de clôture intégrale On note IclA (a) la clôture intégrale de a dans A. Quand le contexte est clair, on utilise Icl(a). Théorème 1.16 Soit A un anneau à diviseurs et a un idéal de type fini. 1. Pour tout x entier sur a, on a divA (x) > divA (a). En conséquence, — divA (a) ne dépend que de Icl(a), — une inclusion b ⊆ Icl(a) implique divA (b) > divA (a), — on a Icl(a) ⊆ Idv(a) et l’idéal IdvA (a) est intégralement clos. 2. En particulier A est intégralement clos. Démonstration. 1. On note ξ = divA (x) et α = divA (a). La relation de dépendance intégrale s’écrit xn = u1 xn−1 + · · · + un−1 x + un avec uk ∈ ak . On a des inégalités divA (uk ) > kα et donc   Vn Vn nξ > k=1 (n − k)ξ + div(uk ) > k=1 (n − k)ξ + kα , et l’on conclut que ξ > α par [18, fait XI-2.12, point 13.] 2. En effet, un anneau intègre est intégralement clos si, et seulement si, ses idéaux principaux sont intégralement clos. 2 Exemple. Dans un anneau à pgcd intègre, l’idéal Idv(a) est l’idéal principal engendré par le pgcd des générateurs de a. Par exemple sur l’anneau A = k[x, y] (k un corps discret), on a   IdvA x4 , y 3 = h1i et IclA x4 , y 3 = x4 , y 3 , x2 y 2 , x3 y .   Donc x4 , y 3 ( IclA x4 , y 3 ( IdvA x4 , y 3 . Remarque. La démonstration du théorème précédent n’a pas utilisé toute la force d’un anneau à diviseurs. Il suffisait d’avoir un groupe réticulé G et une application div : A∗ /A× → G qui satisfait les points D1 et D2 du projet divisoriel ainsi que le point 1 de la proposition 1.8. C’est-à-dire : divA est un morphisme de groupes ordonnés qui réfléchit les inégalités et qui satisfait l’inégalité divA (a) ∧ divA (b) 6 divA (a + b). Corollaire 1.17 Soit A un anneau à diviseurs. Pour p, q ∈ A[X] on a    div c(pq) = div c(p) + div c(q) . Démonstration. Cela résulte  de div(ab) = div(a) + div(b), du théorème de Kronecker (c’està-dire c(p)c(q) ⊆ Icl c(pq) , et du théorème 1.16. 2 T. Coquand, H. Lombardi 15 Un autre corollaire est l’équivalence donnée ci-après pour les anneaux cohérents. Notons que ce théorème est une version constructive non noethérienne du théorème bien connu des mathématiques classiques qui affirme qu’un anneau noethérien intégralement clos est un anneau de Krull (voir [22, théorème 12.4]). Théorème 1.18 Pour un anneau A cohérent intègre, les propriétés suivantes sont équivalentes. 1. L’anneau A est intégralement clos. 2. L’anneau A est à diviseurs. 3. Pour toute famille finie (a1 , . . . , an ) dans A∗ , si hb1 , . . . , bm i = ha1 i : ha1 , . . . , an i la famille des ai bj admet a1 comme pgcd fort.  A , Démonstration. On sait déjà que 2 ⇒ 1, et que lorsque A est cohérent, 2 ⇔ 3 (lemme 1.4). Il reste à montrer 1 ⇒ 3. On pose a = ha1 , . . . , an i, b = hb1 , . . . , bm i. On veut montrer que les ai bj admettent a1 comme pgcd fort. Pour un y ∈ A∗ on montre que ya1 est un pgcd des yai bj . Il est clair que ya1 divise tous les yai bj . Soit un x ∈ A∗ qui divise tous les yai bj , on doit montrer que la fraction t = a1 y/x est dans A. On considère tj = tbj = (ya1 bj )/x, qui est dans A, et on montre que tj ∈ b. On a tj ai = a1 (yai bj )/x ∈ ha1 i pour chaque i, donc tj ∈ (ha1 i : a)A = b. Ainsi l’élément t de K vérifie tb ⊆ b. Comme b contient a1 ∈ A∗ , c’est un A-module fidèle. En outre il est de type fini, et puisque A est intégralement clos, on obtient t ∈ A. 2 NB : il existe des anneaux factoriels (cas particuliers d’anneaux de Krull) non cohérents (exemple 5.2 dans [12, Glaz], voir page 36). Exemple important. Tout anneau intègre cohérent régulier est à diviseurs car il est intégralement clos. Remarque. On a déjà noté que pour un anneau à diviseurs et un idéal fractionnaire de type fini a, on a Idv(a) = (a−1 )−1 . Donc pour un anneau cohérent intégralement clos, un idéal de type fini a et a ∈ a on peut calculer un système générateur fini de Idv(a) par la formule Idv(a) = (hai : (hai : a)A )A . Terminologie. Dans la littérature classique, pour un anneau noethérien intégralement clos A, le groupe Div A est souvent appelé le groupe des diviseurs de Weil, et l’on appelle diviseur effectif un élément de (Div A)+ , et diviseur positif un diviseur effectif non nul. La signification du mot effectif étant différente en mathématiques constructives, nous utiliserons la terminologie suivante : diviseur positif ou nul (au lieu de diviseur effectif) et diviseur strictement positif (au lieu de diviseur positif). Anneaux à diviseurs de dimension 6 1 Un anneau intègre zéro-dimensionnel est un corps discret. Ceci règle la question des anneaux à diviseurs de dimension 6 0. Dans ce paragraphe, nous voyons que la question de la dimension 6 1 admet une réponse surprenante par sa simplicité. Comme corollaire du théorème 1.18, puisqu’un domaine de Prüfer de dimension de Krull 6 1 est la même chose qu’un anneau intègre cohérent intégralement clos de dimension de Krull 6 1 ([18, théorème XII-6.2]) on obtient l’équivalence suivante : un anneau intègre de dimension de Krull 6 1 est un anneau de Prüfer si, et seulement si, c’est un anneau à diviseurs cohérent. 16 Anneaux à diviseurs et anneaux de Krull Mais en fait on a mieux, car on peut supprimer la cohérence dans cette équivalence. On obtient alors une version constructive non noethérienne du théorème des mathématiques classiques qui affirme qu’un anneau de Krull de dimension 1 est un domaine de Dedekind ([22, théorème 12.5]). Théorème 1.19 Pour un anneau intègre les propriétés suivantes sont équivalentes. 1. A est un anneau de Prüfer de dimension de Krull 6 1. 2. A est un anneau à diviseurs de dimension de Krull 6 1. Démonstration. Il faut prouver 2 ⇒ 1. On suppose que A est un anneau à diviseurs et on doit montrer qu’un idéal a de type fini fidèle est inversible. On a un idéal de type fini b tel que ab admet un pgcd fort g ∈ A∗ , donc par le lemme 1.20, ab = hgi et a est bien un idéal inversible. 2 Lemme 1.20 Dans un anneau intègre A de dimension de Krull 6 1, si g est un pgcd fort de (a1 , . . . , an ), alors ha1 , . . . , an i = hgi. Démonstration. On suppose sans perte de généralité les ai ∈ A∗ . Puisque g est un pgcd fort des ai , 1 est un pgcd fort des bi = agi et il suffit de montrer que hb1 , . . . , bn i = h1i. Pour cela, on reprend mutatis mutandis la démonstration du théorème XI-3.12 dans [18] qui affirme qu’un anneau intègre à pgcd de dimension 6 1 est un anneau de Bezout. i Dans l’anneau zéro-dimensionnel A/hb1 i, chaque bi satisfait bm = ei pour un idempotent ei . i Si e est l’idempotent pgcd des ei modulo b1 , on a dans A l’égalité hb1 i = hb1 , ei hb1 , 1 − ei, donc mn 2 l’idéal hb1 , ei est localement principal. Et hb1 , ei = hb1 , bm 2 , . . . , bn i. Comme hb1 , . . . , bn i est m2 mn de profondeur > 2, il en va de même pour hb1 , b2 , . . . , bn i. Ainsi hb1 , ei est localement principal et de profondeur > 2. On en déduit qu’il est égal à h1i car un idéal principal de mn 2 profondeur > 2 est égal à h1i. On conclut avec hb1 , . . . , bn i ⊇ hb1 , bm 2 2 , . . . , bn i = h1i. Anneaux de valuation discrète On rappelle qu’un anneau de valuation discrète est par définition un anneau intègre V donné avec un élément p ∈ / V× , et dans lequel tout élément de V∗ s’écrit pn u pour un n ∈ N × et un u ∈ V . On dit alors que p est une uniformisante de V. On peut voir V comme un anneau principal à factorisation totale avec p pour seul irréductible (modulo l’association). Lemme 1.21 (Anneaux de valuation discrète, 1) Soit A un anneau intègre. Les propriétés suivantes sont équivalentes. 1. A est un anneau de valuation discrète. 2. A est un anneau à diviseurs et Div A ' (Z, >). 3. A est un anneau à diviseurs local de dimension 6 1, Div A est discret et contient un élément irréductible. 4. A est un anneau principal local à factorisation totale et il existe un a ∈ A∗ \ A× . Démonstration. 1 ⇒ 2, 3 et 4. Clair 2 ⇒ 1. Soit π le générateur > 0 de Div A. On a π = div(a) pour une famille finie (a1 , . . . , an ) = (a). Puisque div(ai ) = ni π pour des ni > 0, l’un des ni est égal à 1. Ainsi π = div(p) pour un p ∈ A∗ . Pour tout autre élément a de A∗ on a div(a) = div(pn ) pour un n > 0, donc a et pn sont associés. Ainsi A est un anneau de valuation discrète d’uniformisante p. 3 ⇒ 1. En tant qu’anneau à diviseurs local de dimension 1, A est un anneau de valuation (théorème 1.19). Puisque Div A est discret, A est à divisibilité explicite, et A est réunion T. Coquand, H. Lombardi 17 disjointe explicite de A× = { x | div(x) = 0 } et Rad A = { x | div(x) > 0 }. Si π est un diviseur irréductible, il est élément > 0 minimum dans le groupe totalement ordonné Div A, on l’écrit π = div(p). Donc pour tout a ∈ Rad A, p divise a. En outre la dimension de Krull 6 1 de l’anneau nous donne une égalité pn (1 + px) + ay = 0, donc a divise pn pour un n > 0. Si n est la plus petite valeur possible et az = pn alors z ∈ A× car 0 6 div(z) < div(p). Ainsi A est un anneau de valuation discrète d’uniformisante p. 4 ⇒ 3. En effet A est un anneau de valuation, et Div A est discret parce que A est à factorisation totale. En outre, div(a) > 0, donc il existe un élément irréductible. 2 Remarque. Sous la seule hypothèse que A est un anneau principal local à factorisation bornée avec un a ∈ A∗ \ A× , il n’y a pas d’algorithme général pour produire un élément irréductible dans A. Localisations d’un anneau à diviseurs, 1 Théorème 1.22 Soient A un anneau à diviseurs et S un filtre ne contenant pas 0. L’anneau S −1 A = AS est un anneau à diviseurs etil y a un unique morphisme de groupes réticulés ϕS : Div A → Div AS tel que ϕS divA (a) = divAS (a) pour tout a ∈ A∗ . Ce morphisme est surjectif, donc Div AS ' (Div A)/ Ker ϕS . Démonstration. On note tout d’abord que AS reste un anneau intègre. Ensuite vue la proposition 1.1 (point 1c), le résultat tient à ce qu’un ppcm reste un ppcm après localisation, car les localisations préservent les intersections finies d’idéaux ([18, fait II-6.5]). Ceci implique que les pgcd forts restent des pgcd forts, que les listes divisoriellement inversibles restent divisoriellement inversibles, que l’application ϕS : divA (x1 , . . . , xn ) 7→ divAS (x1 , . . . , xn ) est bien définie, de Div A vers Div AS , et que c’est un morphisme de groupes réticulés. L’unicité est claire. 2 Pour un filtre S d’un anneau A on appelle hauteur de S la dimension de Krull de AS . Un filtre S est dit premier si l’anneau AS est local. Autrement dit si l’implication suivante est satisfaite x + y ∈ S ⇒ x ∈ S ou y ∈ S. Lorsque S est premier, détachable et ne contient pas 0, son complémentaire est un idéal premier détachable p 6= A, et on appelle hauteur de p la hauteur de S. En fait, du point de vue constructif, la phrase bien définie est : (( le filtre S est un filtre de hauteur 6 k )) (le filtre S n’est pas supposé détachable). Enfin un idéal premier détachable 6= A admet pour complémentaire un filtre premier. On obtient ainsi une bijection entre les idéaux premiers détachables 6= A et les filtres premiers détachables 6= A. Le lemme suivant est un complément pour le théorème 1.14. Lemme 1.23 Soit un anneau à diviseurs A et p un idéal de type fini premier détachable de hauteur 1. Alors div(p) est un diviseur irréductible. Démonstration. On doit montrer que div(p) > 0. Si S = A \ p, on sait que AS est un anneau à diviseurs avec un morphisme naturel surjectif de groupes réticulés Div A → Div AS (théorème 1.22), et par hypothèse AS est de dimension de Krull 1. Donc par le théorème 1.19 c’est un anneau de Prüfer. Comme il est localVc’est un anneau de valuation, d’idéal maximal pAS . On a divAS (p) = divAS (a1 , . . . , an ) = i divAS (ai ) pour des ai ∈ A∗ ∩ p. Comme les divAS (ai ) sont deux à deux comparables et tous > 0, on a divAS (p) > 0, ce qui implique divA (p) > 0. 2 18 Anneaux à diviseurs et anneaux de Krull Un anneau à la Kronecker Dans ce paragraphe, les démonstrations sont laissées à la lectrice. Soit B un anneau arbitraire. On rappelle que l’on note cB,X (p) ou c(p) le contenu de p ∈ B[X] = B[X1 , . . . , Xn ], c’est-à-dire l’idéal de B engendré par les coefficients de p. On fixe des indéterminées X et on définit l’ensemble Sdiv (B) = Sdiv = { f ∈ B[X] | Gr(cB (f )) > 2 } . Fait 1.24 L’ensemble Sdiv est un filtre. −1 Définition 1.25 Le sous-anneau Bdiv (X) = Sdiv B[X] de (Frac B)(X) est appelé l’anneau de Nagata divisoriel de B. Remarque. Cette définition est à distinguer de celle des (( Kronecker function rings )) usuels de la littérature anglaise en théorie multiplicative des idéaux (voir à ce sujet le survey [9]). Le filtre Sdiv apparaı̂t dans la littérature usuelle dans le cas d’un anneau intègre B de corps de fractions K, et l’anneau Bdiv (X) est alors appelé anneau de Nagata pour la star opération v définie comme suit : v : a 7→ (a−1 )−1 . Pour un anneau intègre, notre Bdiv (X) est noté Na(B, v) ou Na(B, v)(X) par d’autres auteurs. On vérifie alors les propriétés suivantes. Proposition 1.26 1. Pour a, b ∈ Reg(B), a divise b dans B si, et seulement si, a divise b dans Bdiv (X). 2. Si A est un anneau à diviseurs, alors (a) Adiv (X) est un anneau de Bezout, (b) tout p ∈ A[X] est le pgcd dans Adiv (X) de ses coefficients, (c) pour f , g ∈ A[X], f g ∈ Adiv (X) ⇐⇒ divA (c(g)) 6 divA (c(f )). En particulier on obtient Div A ' Div (Adiv (X)) ' Adiv (X)∗ /Adiv (X)× . Le théorème 1.28 démontre la réciproque suivante : si A est intègre et si Adiv (X) est arithmétique (a fortiori si c’est un anneau de Bezout), alors A est un anneau à diviseurs. Principe local-global et applications Principe local-global concret 1.27 (Principe local-global concret pour la divisibilité, les idéaux divisoriellement inversibles, les anneaux intégralement clos et les anneaux à diviseurs). Soit A un anneau intègre et (s1 , . . . , sn ) une suite de profondeur > 2. On note Ai = A[ s1i ]. 1. Soient a, b, a1 , . . ., ak ∈ A. (a) a divise b dans A si, et seulement si, a divise b dans chaque Ai . (b) a est un pgcd fort de (a1 , . . . , ak ) dans A si, et seulement si, a est un pgcd fort de (a1 , . . . , ak ) dans chaque Ai . (c) L’idéal a = ha1 , . . . , ak i est divisoriellement inversible dans A si, et seulement si, il est divisoriellement inversible dans chaque Ai . 2. L’anneau A est intégralement clos si, et seulement si, chaque anneau Ai est intégralement clos. 3. L’anneau A est à diviseurs si, et seulement si, chaque anneau Ai est à diviseurs. T. Coquand, H. Lombardi 19 Démonstration. 1b (et a fortiori 1a). Pour simplifier on se contente de localiser en trois monoı̈des S, T et U . Soient c, y ∈ A∗ et supposons que c divise les yai dans A. Après localisation on trouve que c divise sya pour un s ∈ S, que c divise tya pour un t ∈ T et que c divise uya pour un u ∈ U . Comme (s, t, u) admet 1 pour pgcd fort dans A, cela implique que c divise ya dans A. 1c. La démonstration est analogue, donnons les détails. On considère un idéal de type fini a = ha1 , . . . , a` i avec a1 ∈ A∗ . On doit trouver un idéal de type fini b tel que ab admette a1 comme pgcd fort (lemme 1.4). Pour simplifier on se contente de localiser en deux monoı̈des S et T . Dans le premier localisé on trouve b1 , . . ., bm tels que les uij = ai bj admettent a1 pour pgcd fort (lemme 1.4). Dans le deuxième localisé on trouve c1 , . . ., cp tels que les vik = ai ck admettent a1 pour pgcd fort. On peut supposer que les bj et ck sont dans A ainsi que les uij /a1 et vik /a1 . On va montrer que la famille finie formée par les uij et vik admet a1 pour pgcd fort dans A. Pour cela on considère c et y ∈ A∗ tels que c divise tous les yuij et yvik . Après localisation on trouve que c divise sya1 pour un s ∈ S et c divise tya1 pour un t ∈ T . Comme s et t admettent 1 pour pgcd fort dans A, cela implique que c divise ya1 dans A. Ainsi l’idéal de type fini b = hb1 , . . . , bm , c1 , . . . , cp i satisfait la condition que ab admet a1 pour pgcd fort. 2 et 3. Résultent des points 1a et 1c. 2 Le corollaire suivant complète la proposition 1.26. Nous retrouvons ici un résultat de [16, Kang, 1989]. Théorème 1.28 (L’anneau de Nagata divisoriel) Un anneau intègre A est un anneau à diviseurs si, et seulement si, son anneau de Nagata divisoriel Adiv (X) est un domaine de Prüfer, ou encore un domaine de Bezout. Démonstration. Nous montrons que si Adiv (X) est un domaine de Prüfer, tout idéal ha, bi est divisoriellement inversible. Dans Adiv (X) on a des éléments u, v, s, t tels que sa = ub, tb = va, et s + t = 1. On peut prendre u, v, s, t ∈ A[X] auquel cas on obtient GrA (c(s + t)) > 2. Les coefficients de s et t engendrent donc un idéal de profondeur > 2 (i.e. GrA (c(s) + c(t)) > 2). Or lorsqu’on inverse un coefficient sk de s l’égalité sa = ub dans A[X] nous donne ha, bi = hbi dans A[1/sk ], et lorsqu’on inverse un coefficient t` de t on obtient ha, bi = hai dans A[1/t` ]. Dans tous les cas l’idéal ha, bi est divisoriellement inversible dans le localisé. On conclut par le point 1c du principe local-global 1.27 que ha, bi est divisoriellement inversible dans A. 2 Un autre corollaire intéressant est le suivant. Théorème 1.29 (Idéaux divisoriellement inversibles comme idéaux de type fini (( localement )) principaux) Dans un anneau intègre un idéal de type fini fidèle est divisoriellement inversible si, et seulement si, il existe une suite (s1 , . . . , sp ) de profondeur > 2 telle qu’après localisation en chaque si , l’idéal devient principal. En conséquence un anneau intègre est un anneau à diviseurs si, et seulement si, tout idéal de type fini devient principal après localisation en les éléments d’une suite de profondeur > 2. Démonstration. La condition est suffisante d’après le point 1c du principe local-global 1.27. La condition est nécessaire. On a un idéal a = ha1 , . . . , an i avec les ai ∈ A∗ . Soit b un idéal de type fini tel que a b = g c, g ∈ A∗ et Gr(c) > 2. Écrivons c = hc1 , . . . , cq i. Fixons un cj et notons Aj = A[1/cj ]. Sur Aj , g c = hgi, donc l’idéal a est localement principal, donc il existe (uj,1 , . . . , uj,n ) comaximaux dans Aj tels que uj,i a ⊆ hai i dans Aj pour chaque i ∈ J1..nK. Cela signifie qu’il existe (vj,1 , . . . , vj,n ) dans A tels que — vj,i a ⊆ hai i dans A pour chaque i ∈ J1..nK, et 20 Anneaux à diviseurs et anneaux de Krull m — l’idéal hvj,1 , . . . , vj,n iA contient une puissance cj j Bilan : d’une part lorsqu’on inverse un vj,i l’idéal devient égal à hai i, et d’autre part l’idéal m engendré par les vj,i contient les cj j , donc il est de profondeur > 2. 2 2 Propriétés de décomposition des groupes réticulés Groupes réticulés quotients Un sous groupe H d’un groupe (abélien) ordonné est dit convexe s’il vérifie la propriété : 0 6 x 6 y et y ∈ H impliquent x ∈ H. Sous cette condition, G/H est muni d’une structure de groupe ordonné quotient, i.e. vérifiant la propriété : (G/H)+ = G+ + H. Certains auteurs disent sous-groupe isolé. Le noyau H de la projection canonique d’un groupe réticulé G sur un groupe réticulé quotient G/H est ce que l’on appelle un sous-groupe solide 11 , c’est-à-dire un sous-groupe vérifiant la propriété : ξ ∈ H et |ζ| 6 |ξ| impliquent ζ ∈ H. Pour γ ∈ G on note C(γ) le sous-groupe solide engendré par γ, qui est l’ensemble des ξ tels que |ξ| soit majoré par un élément n |γ| (n ∈ N). On a donc C(γ) = C(|γ|). Pour γ et η ∈ G+ on a C(γ) ∩ C(η) = C(γ ∧ η), et C(γ) ⊥ C(η) si, et seulement si, γ ⊥ η. Enfin C(γ + η) = C(γ ∨ η) est le plus petit sous-groupe solide contenant C(γ) et C(η). Nous définissons maintenant l’analogue des morphismes de localisation en un monoı̈de (définis dans la catégorie des anneaux commutatifs en [18, XV-4.5]) dans la catégorie des groupes réticulés. Définition 2.1 (Morphismes de passage au quotient pour les groupes réticulés) Soit G un groupe réticulé et H un sous-groupe solide de G. Un morphisme Π : G → G0 est appelé un morphisme de passage au quotient par H s’il est surjectif et si Ker Π = H. Un morphisme de passage au quotient pour un H donné est (( unique à isomorphisme unique près )) : il y a un unique homomorphisme G0 → G/H qui fait commuter le diagramme convenable, et c’est un isomorphisme. Notez que comme Π(z + ) = Π(z)+ pour tout z, on a Π(G)+ = Π(G+ ). Un principe de recouvrements par quotients Rappelons le principe constructif suivant énoncé en [18, XI-2.10]. Principe de recouvrement par quotients pour les groupes réticulés. Pour démontrer une égalité α = β dans un groupe réticulé, on peut toujours supposer que les éléments (en nombre fini) qui se présentent dans un calcul pour une démonstration de l’égalité sont comparables, si l’on en a besoin pour faire la démonstration. Ce principe s’applique aussi bien pour des inégalités que pour des égalités puisque α 6 β équivaut à α ∧ β = α. Ce principe peut être considéré comme la version constructive du théorème de mathématiques classiques qui dit qu’un groupe réticulé est toujours représentable comme sous-groupe réticulé d’un produit de groupes totalement ordonnés. 11. On peut consulter [3]. Le théorème 2.2.1 donne les propriétés équivalentes suivantes pour un sous-groupe : (a) H est solide, (b) H est un sous-groupe réticulé convexe, (c) H est convexe et ξ ∈ H ⇒ ξ + ∈ H, (d) H est convexe et filtrant. T. Coquand, H. Lombardi 21 Groupes réticulés de dimension 1 Pour des sous-groupes réticulés H, K, L d’un groupe réticulé G, la notation K = H  L signifie que H ⊥ L et K = H ⊕ L. Autrement dit, lorsque le produit cartésien H × L est muni de la structure produit catégorique, l’application H × L → K, (ξ, η) 7→ ξ + η est un isomorphisme de groupes réticulés. En particulier, en notant H ⊥ = { x ∈ G | ∀h ∈ H, x ⊥ h }, on a alors H + H ⊥ = H  H ⊥ . Lemme 2.2 Soient un groupe réticulé G, et α, β ∈ G+ . Les propriétés suivantes sont équivalentes. 1. β ∈ C(α)  C(α)⊥ . 2. ∃n ∈ N, ∃β1 , β2 ∈ G+ , β1 6 nα, β2 ⊥ α et β = β1 + β2 . 3. ∃n ∈ N, β ∧ nα = β ∧ (n + 1)α, i.e. nα > β ∧ (n + 1)α. 4. ∃n ∈ N, ∀m > n, β ∧ mα = β ∧ (m + 1)α. 5. C(β) ⊆ C(α)  C(α)⊥ . Démonstration. 1 ⇔ 2, 4 ⇒ 3, et 5 ⇒ 1. Clair 2 ⇒ 4. Il suffit de le démontrer lorsque β2 > α et lorsque β2 6 α. Si β2 > α alors α = 0, et β ∧ mα = 0 pour tout m. Si β2 6 α alors β2 = 0 donc β = β1 6 nα 6 mα pour m > n, donc β ∧ nα = β ∧ mα. 3 ⇒ 2. On pose β1 = β ∧ nα et β2 = β − β1 . Il suffit de montrer β2 ∧ α = 0 lorsque β > nα et lorsque β 6 nα. Si β 6 nα, alors β1 = β et β2 = 0. Si β > nα, alors β1 = nα, et nα = β ∧ nα = β ∧ (n + 1)α = (β1 + β2 ) ∧ (nα + α) = (nα + β2 ) ∧ (nα + α) = nα + (β2 ∧ α), donc β2 ∧ α = 0. 1 ⇒ 5. La somme directe orthogonale de deux sous-groupes solides est un sous-groupe solide. 2 Définition 2.3 Un groupe réticulé G est dit de dimension 6 1 si pour tout ξ ∈ G+ , on a G = C(ξ)  C(ξ)⊥ . Pour des propriétés équivalentes, voir le lemme 2.2. Lemme 2.4 Soit G un groupe réticulé de dimension 6 1 et ξ ∈ G. Les propriétés suivantes sont équivalentes. 1. G est discret 2. C(ξ) et G/C(ξ) sont discrets. 3. C(ξ) est détachable et discret. 4. C(ξ)⊥ est détachable et discret. Démonstration. 1 ⇔ 2. L’égalité G = C(ξ)  C(ξ)⊥ donne les isomorphismes G/C(ξ) ' C(ξ)⊥ et G ' C(ξ) × G/C(ξ). Et un produit de deux groupes est discret si, et seulement si, chaque facteur est discret. 2 ⇔ 3. G/C(ξ) est discret si, et seulement si, C(ξ) est détachable. 2 ⇔ 4. L’égalité G = C(ξ)  C(ξ)⊥ montre que dans cette affaire C(ξ) et C(ξ)⊥ jouent des rôles symétriques. 2 Lemme 2.5 (Éléments irréductibles dans un groupe réticulé de dimension 6 1) Soit G un groupe réticulé discret de dimension 6 1 et π > 0 dans G. Les propriétés suivantes sont équivalentes. 1. π est un élément irréductible. 22 Anneaux à diviseurs et anneaux de Krull 2. C(π) = Zπ ' (Z, > 0). 3. Tout α ∈ G+ s’écrit de manière unique sous forme nπ + α2 avec n ∈ N et α2 ⊥ π dans G+ . Démonstration. 1 ⇒ 2 et 3 ⇒ 1. Clair. 2 ⇒ 3. Soit α ∈ G+ . On écrit α = α1 + α2 avec 0 6 α1 6 mπ, m ∈ N et α2 ⊥ π dans G+ (point 2 du lemme 2.2). Puisque G est discret on a un n ∈ N tel que nπ 6 α1 < (n + 1)π. Donc π = (α1 − nπ) + ((n + 1)π − α1 ) tous deux > 0 et le deuxième > 0. Ceci implique que le premier est nul. 2 Groupes totalement ordonnés de dimension 1 Un groupe totalement ordonné est un groupe ordonné dans lequel on a x > 0 ou x 6 0 pour tout x. Il est facile de voir que c’est un groupe réticulé. On note (O, >) l’ensemble ordonné des réels pour lesquels on dispose d’un test de comparaison aux rationnels. C’est aussi la réunion disjointe de Q et des irrationnels, définis par leurs fractions continues infinies. L’ensemble O est stable pour les opérations x 7→ (ax + b)/(cx + d), où a, b, c, d sont des entiers avec ad − bc 6= 0. On a aussi une application bien définie (( identité )), de O vers R. Par contre on ne peut pas démontrer constructivement que O soit égal à R, ni que O soit discret, ou stable pour l’addition, ou stable pour la multiplication. Une partie R de O sera appelée un sous-groupe (additif) de O si l’on a une fonction + : O × O → R qui redonne l’addition dans R. Lemme 2.6 (Groupes totalement ordonnés discrets archimédiens) Soit G un groupe réticulé discret non nul. Les propriétés suivantes sont équivalentes. 1. G est totalement ordonné de dimension 1. 2. Pour tous α, β > 0 il existe m ∈ N tel que mα > β. 3. Pour tout α > 0, G = C(α). 4. G est de dimension 1 et pour tout α > 0, G = C(α). 5. G est isomorphe à (R, >) pour un sous-groupe discret de (O, >). 6. Pour tout α > 0 dans G, on a un isomorphisme ϕα : G → Rα tel que ϕα (α) = 1, où (Rα , >) est un sous-groupe discret de (O, >). En outre ϕα et Rα sont déterminés de manière unique. Démonstration. 1 ⇒ 2, 6 ⇒ 5 ⇒ 2, et 2 ⇔ 3 ⇔ 4. Clair 4 ⇒ 1. (l’ordre est total). Pour α et β ∈ G+ il suffit de montrer que α ∧ β = 0 implique α = 0 ou β = 0. On écrit α = α1 + α ∧ β et β = β1 + α ∧ β. On a α1 ⊥ β1 . Donc si α1 > 0, une inégalité β1 6 mα1 implique β1 = 0, donc β 6 α. 1 et 2 ⇒ 6. Calcul classique du développement en fraction continue. 2 Sous-groupes premiers d’un groupe réticulé Définition 2.7 Un sous-groupe solide H d’un groupe réticulé G est dit premier si le quotient G/H est un groupe totalement ordonné. Naturellement G/H est discret si, et seulement si, H est une partie détachable de G. Lemme 2.8 Soit G un groupe réticulé discret de dimension 6 1 et π un élément irréductible. Alors π ⊥ est un sous groupe premier et G/π ⊥ ' C(π) = Zπ. T. Coquand, H. Lombardi 23 Démonstration. D’après la définition 2.3, G/π ⊥ ' C(π) et l’égalité C(π) = Zπ traduit le fait que π est irréductible (lemme 2.5). 2 Remarque. La dimension des groupes réticulés qui intervient dans la définition 2.3 est la dimension de Krull du treillis distributif, noté Zar G, obtenu en quotientant le treillis distributif G+ ∪ {∞} par la relation d’équivalence suivante : ξ ∼ ζ ⇐⇒ ∃n > 0 tel que ξ 6 nζ et ζ 6 nξ. Autrement dit encore Zar G est l’ensemble des sous-groupes C(ξ) (ξ ∈ G+ ), auquel on rajoute un élément +∞, avec sa structure de treillis distributif naturelle. Un groupe réticulé est zéro-dimensionnel si, et seulement si, il est nul. Un groupe totalement ordonné a pour dimension son rang défini de manière (( usuelle )). Les groupes totalement ordonnés Z et Q sont de rang 1, un produit fini catégorique a pour rang le maximum des rangs des facteurs, un produit lexicographique a pour rang la somme des rangs. En mathématiques classiques la dimension d’un groupe réticulé peut être définie comme la longueur maximum d’une chaı̂ne de sous-groupes premiers (ici, comme pour les idéaux premiers d’un anneau commutatif, la chaı̂ne H0 ( H1 ( H2 est dite de longueur 2, mais notez que la chaı̂ne maximale dans Z est 0 ( Z). Pour un anneau de valuation V la dimension de Div V (son rang en tant que groupe totalement ordonné) est égale à la dimension valuative de V, qui est égale à sa dimension de Krull. Ceci s’étend aux domaines de Prüfer mais pas aux anneaux de Krull : un anneau K[X1 , . . . , Xn ] (où K est un corps discret) est un anneau de Krull de dimension de Krull n (égale à sa dimension valuative), alors que son groupe de diviseurs reste de dimension 1. Propriétés de décomposition générales Nous donnons quelques définitions constructives liées aux propriétés de décomposition (voir [18, Chapitre XI]). Définition 2.9 (Quelques propriétés de décomposition dans les groupes réticulés) 1. Une famille (ai )i∈I d’éléments > 0 dans un groupe réticulé admet une décomposition partielle si l’on peut trouver une famille finie P (pj )j∈J d’éléments > 0 deux à deux orthogonaux telle que chaque ai s’écrive j∈J rij pj avec les rij ∈ N. La famille (pj )j∈J est alors appelée une base de décomposition partielle pour la famille (ai )i∈I . 2. Un groupe réticulé est dit à décomposition partielle s’il est discret et si toute famille finie d’éléments > 0 admet une décomposition partielle. 3. Un groupe réticulé est dit à décomposition bornée lorsque pour tout x > 0 il existe un Pn entier n tel que, lorsque x = j=1 xj avec les xj > 0, au moins l’un des xj est nul. 4. Le groupe réticulé à décomposition bornée G est dit absolument borné s’il existe un entier n tel que dans toute famille de n éléments deux à deux orthogonaux dans G+ , il y a un élément nul. 5. Un groupe réticulé est dit à décomposition complète s’il est discret et si tout élément > 0 est une somme d’éléments irréductibles. Un exemple classique de groupe réticulé à décomposition partielle mais pas à décomposition bornée est le groupe des diviseurs de l’anneau de tous les entiers algébriques complexes (qui est un anneau de Bezout de dimension 1). Nous donnons maintenant quelques résultats constructifs de base (voir [18] pour la plupart d’entre eux, notamment pour le point 2, qui est donné par le théorème XI-2.16 de [18]). Proposition 2.10 (Quelques relations liant les propriétés de décomposition dans les groupes réticulés) 24 Anneaux à diviseurs et anneaux de Krull 1. Un groupe réticulé à décomposition complète est à décomposition bornée. 2. Un groupe réticulé discret et à décomposition bornée est à décomposition partielle. 3. Un groupe réticulé à décomposition partielle est de dimension 6 1. 4. Pour un groupe réticulé discret non nul G les propriétés suivantes sont équivalentes. (a) G est à décomposition complète. (b) G est à décomposition bornée et il possède un test d’irréductibilité 12 pour les éléments > 0. (c) G est à décomposition bornée et tout élément > 0 est minoré par un élément irréductible. (d) G est isomorphe comme groupe réticulé à un groupe Z(I) pour un ensemble discret I. On peut prendre pour I l’ensemble des éléments irréductibles de G. Démonstration. Vu les résultats présentés dans [ACMC], seul le point 3 réclame une démonstration. 3. On considère une base de décomposition partielle (π1 , . . . , πk ) pour le couple (ξ, ζ). On P écrit ξ = i∈I ni πi avec des ni > 0. On note J la partie complémentaire de I dans J1..kK, P P P ζ = i mi πi = ζ1 + ζ2 avec ζ1 = i∈I mi πi et ζ2 = i∈J mi πi . On a bien ζ2 ⊥ ξ, et ζ1 6 mξ si m majore les mi /ni pour i ∈ I. 2 Lemme 2.11 Soit G un groupe réticulé à décomposition complète et IG l’ensemble de ses éléments irréductibles. 1. Pour tout sous-groupe solide détachable H de G, on a G = H  H ⊥ . 2. L’application H 7→ IH = IG ∩ H établit une bijection entre l’ensemble des sous-groupes solides détachables de G et l’ensemble des parties détachables de IG . Démonstration. On démontre que si un irréductible π n’est pas dans IH , il est dans H ⊥ . En effet, si α ∈ H + , l’élément α ∧ π, qui est égal à π ou 0, est nécessairement nul. Le reste suit. 2 Remarque. Dans le lemme précédent, l’égalité G = H  H ⊥ ne peut pas être démontrée constructivement si on remplace l’hypothèse (( G à décomposition complète )) par (( G à décomposition bornée )). Ceci crée quelques subtilités algorithmiques que l’on retrouvera par la suite. Lemme 2.12 Soit (αi )i∈I une P famille qui admet une base de décomposition partielle dans un groupe réticulé G : α = πj pour P des πj deux à deux orthogonaux. i j∈J rijW V P Alors i αi = j∈J inf i∈I (rij ) πj et i αi = j∈J supi∈I (rij ) πj . Nous utilisons maintenant le principe [18, XI-2.10] cité page 20 pour obtenir des résultats qui s’avèreront utiles pour le groupe des diviseurs d’un anneau à diviseurs en raison de l’inégalité div(a + b) > div(a) ∧ div(b). Lemme 2.13VSoient α1 , . . ., αn dans un groupe réticulé G. On pose γi = j6=i αj et l’on suppose que γi 6 αi pour tout i ∈ J1..nK.  V V P Alors i∈J1..nK (αi − αk )+ = 0. j∈J1..nK,j6=i |αi − αj | + k∈{i,j} / 12. À la question (( π est-il irréductible ? )), le test doit donner l’une des deux réponses suivantes : — (( oui )), ou — (( non et voici π1 , π2 > 0 tels que π = π1 + π2 )). T. Coquand, H. Lombardi 25 Démonstration. Il suffit de le démontrer lorsque les αi sont totalement ordonnés. Par exemple si αi et αj sont plus petits que tous les autres, les inégalités γi 6 αi et γj 6 αj donnent αj 6 αi et αi 6 αj , donc αj = αi . 2 L’inégalité div(a + b) > div(a) ∧ div(b) peut se lire de manière symétrique en disant que si a1 + a2 + a3 = 0 alors chaque div(ai ) majore la borne inférieure des deux autres. Ceci se généralise par récurrence comme suit. Fait 2.14 Dans un anneau à diviseurs on a l’implication Pn V j=1 aj = 0 ⇒ i,j:j>i div(aj ) − div(ai ) = 0. Démonstration. Pour chaque j, on a −aj ∈ ai | i 6= j , donc div(aj ) > conclut avec le lemme 2.13. Lemme 2.15 Soient un groupe réticuléVG, et β1 , . . ., βp , ξ, ζ dans G+ . V On suppose que j∈J1..pK |ξ − βj | = 0 = j∈J1..pK |ζ − βj |. W 1. On a ξ 6 j∈J1..pK βj . V i6=j div(ai ). On 2 2. On suppose que pour chaque j, k ∈ J1..pK, βj ∈ C(βk )  C(βk )⊥ . Alors, pour γ, δ ∈ {ξ, ζ, β1 , . . . , βp }, on a γ ∈ C(δ)  C(δ)⊥ , i.e. C(γ) ⊆ C(δ)  C(δ)⊥ . Démonstration. Pour le point 1 il faut démontrer une inégalité, et pour le point 2 on veut une égalité γ + mδ = γ + (m + 1)δ. Il suffit donc (principe [18, XI-2.10]) de faire la démonstration lorsque les |ξ − βj | sont totalement ordonnés ainsi que les |ζ − βj |. W Dans ce cas, il y a un indice h pour lequel ξ = βh , et donc ξ 6 j∈J1..pK βj . Ceci donne le point 1. Voyons le point 2. On a aussi un indice ` pour lequel ζ = β` . D’après le point 4 du lemme 2.2 il y a un entier m tel que mβj ∧ βk = (1 + m)βj ∧ βk pour tous les j, k. Ceci reste vrai en remplaçant βj et/ou βk par ξ ou ζ. 2 Propriétés de décomposition pour un groupe réticulé quotient Proposition 2.16 Soit G un groupe réticulé et π : G → G0 un morphisme de passage au quotient par un sous-groupe solide H. 1. Si G est de dimension 6 1, G0 l’est également. 2. Si G est à décomposition bornée, G0 l’est également. 3. Si G est à décomposition partielle et si G0 est discret, G0 est à décomposition partielle. 4. Si G est à décomposition complète et si G0 est discret, G0 est à décomposition complète. 5. Si G est discret à décomposition bornée et si H = α⊥ pour un α > 0, alors G0 est isomorphe à C(α) et absolument borné. Démonstration. 1. On doit montrer que dans le quotient, pour tous x, y on a un entier n tel que y ∧ nx = y ∧ (n + 1)x. Or c’est déjà vrai avant de passer au quotient. Pn 2. On considère un élément x ∈ G+ . On suppose que si x = i=1 xi avec des xi ∈ G+ , alors l’un des xi est nul. Pn + 0 Supposons que l’on ait π(x) = i=1 π(yi ) avec i ), Pndes π(yi ) > 0 dans G . Comme π(y+i ) = π(y − on peut supposer les yi > 0. On a x = u + i=1 yi avec u ∈ H. On écrit u = u − u , on remplace y1 par u+ + yP 1. Pn n On a maintenant x = i=1 yi − u− . On a donc u− 6 i=1 yi et par le théorème de Riesz P n [18, XI-2.11 1 ], on écrit u− = i=1 ui avec 0 6 ui 6 yi . Enfin on remplace chaque yi par 26 Anneaux à diviseurs et anneaux de Krull Pn zi = yi − ui et l’on a x = i=1 zi avec des zi > 0, donc l’un des zi est nul, et pour cet indice i, on a π(yi ) = π(zi ) = 0.  3. On considère une famille finie π(xi ) i∈I on calcule une base de factorisation partielle de la famille (xi )i∈I . On supprime les éléments de cette base qui deviennent nuls dans le quotient. Les éléments restants sont > 0 dans le quotient, et deux à deux orthogonaux. 4. Pour π(x) > 0 dans G0 , on considère une factorisation complète de x dans G. Il suffit de vérifer la propriété suivante : si p est irréductible, alors π(p) est nul ou irréductible. Supposons que π(p) = π(q) + π(r), tous > 0 dans G0 . On peut supposer q = q + et r = r+ . On écrit p + u− = q + r + u+ avec u ∈ H. Le théorème de Riesz [18, XI-2.11 2 ] nous donne des pi et vi > 0 satisfaisant p = p1 + p2 + p3 , u− = v1 + v2 + v3 , p1 + v1 = q, p2 + v2 = r et p3 + v3 = u+ , d’où π(q) = 0 si p1 = 0 et π(r) = 0 si p2 = 0. 5. En effet G est de dimension 6 1 donc G0 ' C(α), qui est absolument borné. 2 Par contre la propriété pour un groupe réticulé d’être discret ne passe pas toujours au quotient. Fort heureusement on a le lemme 2.4. 3 Propriétés de stabilité pour les anneaux à diviseurs Localisations d’un anneau à diviseurs, 2 Théorème 3.1 Soient A un anneau à diviseurs, S un filtre ne contenant pas 0, et HS le sous-groupe solide de Div A engendré par les divA (s) pour s ∈ S. On a les propriétés suivantes. 1. L’anneau S −1 A = AS est un anneau à diviseurs et il y a un  unique morphisme de groupes réticulés ϕS : Div A → Div AS tel que ϕS divA (a) = divAS (a) pour tout a ∈ A∗ . Ce morphisme est surjectif, donc Div AS ' (Div A)/ Ker ϕS . 2. On a HS+ = { α ∈ Div A | ∃s ∈ S, 0 6 α 6 divA (s) }, et les diviseurs principaux dans HS+ sont les éléments de divA (S). 3. Supposons que Div A = HS  H 0 . Alors le morphisme ϕS est un morphisme de passage au quotient par HS : il permet d’identifier Div AS au groupe réticulé quotient (Div A)/HS ' H 0 . Démonstration. 1. C’est le théorème 1.22. 2. En notant H1 = { α ∈ Div A | ∃s ∈ S, 0 6 α 6 divA (s) }, on vérifie facilement que H1 + H1 ⊆ H1 et que H1 − H1 est un sous-groupe solide dont la partie positive est égale à H1 . 3. Il est clair que ϕS est surjectif et que HS ⊆ Ker ϕS . On doit montrer l’inclusion réciproque. Un élément du noyau s’écrit α = divA (a1 , . . . , ak ) pour une suite (a1 , . . . , ak ) de profondeur > 2 dans AS . On peut supposer que les ai sont dans A. Si α = α1 + α2 avec α1 ∈ HS et α2 ∈ H 0 , on a ϕS (α) = ϕS (α2 ). On peut donc supposer α ⊥ HS , c’est-à-dire que la suite (a1 , . . . , ak , s) est de profondeur > 2 dans A pour tout s ∈ S. On est donc ramené à montrer que si (a1 , . . . , ak ) est de profondeur > 2 dans AS et (a1 , . . . , ak , s) est de profondeur > 2 dans A pour tout s ∈ S, alors (a1 , . . . , ak ) est de profondeur > 2 dans A. Soit donc une suite (c1 , . . . , ck ) proportionnelle à (a1 , . . . , ak ). Il existe c ∈ A∗ et s ∈ S tels que sci = cai pour i ∈ J1..kK. Ceci implique que les suites (a1 , . . . , ak , s) et (c1 , . . . , ck , c) sont proportionnelles, donc il existe d ∈ A∗ tel que (c1 , . . . , ck , c) = d(a1 , . . . , ak , s). En particulier (c1 , . . . , ck ) = d(a1 , . . . , ak ), ce qui termine la démonstration. 2 T. Coquand, H. Lombardi 27 Anneaux avec groupe des diviseurs de dimension 1 Lemme 3.2 Soit A un domaine de Bezout avec Div A de dimension 6 1. Pour un a ∈ A∗ les propriétés suivantes sont équivalentes. 1. a ∈ Rad A.  2. Div A = C divA (a) . Démonstration. 1 ⇒ 2. L’anneau est de Bezout donc tous les diviseurs sont principaux. Pour un b ∈ A∗ arbitraire, puisque Div A est de dimension 6 1, par le point 2 du lemme 2.2, on écrit b = b1 b2 avec b1 et b2 ∈ A∗ , b1 | an et divA (a, b2 ) = 0. Puisque l’anneau est de Bezout, 1 ∈ ha, b2 i, et puisque a ∈ Rad A, b2 ∈ A× . Donc divA (b) = divA (b1 ) ∈ C(a). 2 ⇒ 1. Pour tout b ∈ A∗ on a un n ∈ N tel que b | an . Si b = 1 + ax, on a hb, ai = h1i, donc hbi = hb, an i = h1i. 2 Proposition 3.3 Soit A un anneau à diviseurs de dimension de Krull 6 1. Alors Div A est de dimension 6 1. Démonstration. Les anneaux à diviseurs de dimension 6 1 sont des domaines de Prüfer (théorème 1.19). On utilise alors la propriété de factorisation des idéaux de type fini fidèles dans un domaine de Prüfer de dimension 6 1 donnée par [18, théorème XII-7.2]. On pourrait aussi argumenter (( plus directement )) en montrant que la dimension de Krull d’un domaine de Prüfer est égale à la dimension de son groupe des diviseurs. 2 La proposition qui suit est un corollaire du théorème 3.1. Proposition 3.4 Soit A un anneau à diviseurs et S le filtre engendré par un s ∈ A∗ (i.e. l’ensemble des x qui divisent une puissance de s). D’après le théorème 3.1, l’anneau AS est aussi un anneau à diviseurs. 1. Si Div A est discret de dimension 1, il en va de même pour Div AS . 2. Si en outre Div A est à décomposition partielle ou à décomposition bornée ou à décomposition complète, il en va de même pour AS . 3. Si A est noethérien cohérent fortement discret, alors AS est également noethérien cohérent fortement discret. Démonstration. On a HS = C(div(s)) = { ξ ∈ Div A | ∃n ∈ N, |ξ| 6 n div(s) }. 1 et 2. On conclut avec le lemme 2.4 et la proposition 2.16. 3. Résultat classique (cf. [18, principe local-global XII-7.13]). 2 Théorème 3.5 Soient A un anneau à diviseurs avec Div A discret de dimension 1, α un diviseur > 0 et Sα = { x ∈ A∗ | div(x) ⊥ α }. Il est clair que Sα est un filtre détachable, et le théorème 3.1 s’applique. On a les propriétés suivantes. 1. L’anneau Sα−1 A est un anneau à diviseurs avec Div(Sα−1 A) ' C(α). En particulier Sα−1 A est un anneau de valuation discrète si, et seulement si, C(α) est isomorphe à (Z, >). 2. Les propriétés suivantes sont équivalentes. (a) α est un diviseur irréductible. (b) C(α) = Zα. (c) Idv(α) est un idéal premier. (d) Sα est un filtre premier de hauteur 6 1 et A = Sα ∪ Idv(α) (union disjointe de deux parties détachables). 28 Anneaux à diviseurs et anneaux de Krull (e) Sα−1 A est un anneau de valuation discrète et si p/1 est une uniformisante, on a α = divA (p) mod C(α)⊥ . 3. Si en outre l’anneau A est cohérent, les quatre ensembles suivants sont égaux (on rappelle, théorème 1.13, que α 7→ Idv(α) établit une bijection entre les diviseurs irréductibles et les idéaux divisoriels finis premiers 6= h1i). — Les idéaux divisoriels finis premiers 6= h1i. — Les idéaux de type fini premiers q 6= h0i tels que div(q) > 0. — Les idéaux de type fini premiers q 6= h0i , h1i tels que q = Idv(q). — Les idéaux de type fini premiers détachables de hauteur 1. Démonstration. 1. On a Div A = C(α)  C(α)⊥ . On applique donc le point 3 du théorème 3.1. On a (mêmes notations) HSα = C(α)⊥ , donc Div(Sα−1 A) ' C(α). Pour la dernière affirmation on applique le lemme 1.21. 2. Notons d’abord que puisque α > 0, Div A n’est pas nul, et A n’est pas un corps. Par ailleurs les hypothèses impliquent que A est à divisibilité explicite, et que Sα et Idv(α) sont deux parties détachables disjointes de A. 2a ⇔ 2b. D’après le lemme 2.5. 2a ⇔ 2c. D’après le théorème 1.13. 2d ⇒ 2c, et 2e ⇒ 2c. Clair. 2a ⇒ 2d et 2e. D’après le point 1 et puisque C(α) = Zα ' Div(Sα−1 A), l’anneau Sα−1 A est un anneau de valuation discrète, et α vu dans Sα−1 A est égal à div( p1 ) si p engendre le radical. Il reste à voir que le complémentaire de Sα est bien l’idéal Idv(α) (qui est alors premier de hauteur 1 par définition). Tout diviseur ξ > 0 s’écrit nξ α + ρ avec nξ ∈ N et ρ ⊥ α (lemme 2.5). Par définition Idv(α) = { x ∈ A | ξ = divA (x) > α }. Dans la décomposition précédente, cela signifie que nξ > 0, tandis que x ∈ Sα signifie nξ = 0. On a donc bien deux parties complémentaires de A. 3. Les trois premiers ensembles sont égaux d’après le corollaire 1.15. Il reste à montrer que p est un idéal de type fini premier détachable de hauteur 1 si, et seulement si, on a div(p) > 0. L’implication ⇐ est donnée par 2c ⇒ 2d. L’implication ⇒ est donnée par le lemme 1.23. 2 Stabilité pour les anneaux de polynômes Dans ce paragraphe, A est un anneau à diviseurs . Pour p ∈ A[X] = A[X1 , . . . , Xn ], on note c(p) pour cA,X (p). Lemme 3.6 Une fraction p/q dans K(X) (avec p et q ∈ A[X]) est dans A[X] si, et seulement si, p/q ∈ K[X] et div(c(q)) 6 div(c(p)). Autrement dit, pour q divise p  p, q ∈ A[X],  dans A[X] si, et seulement si, q divise p dans K[X] et div c(q) 6 div c(p) . Démonstration. La condition est évidemment nécessaire. Montrons qu’elle est suffisante. Puisque q divise p dans K[X] on écrit qr = ap avec a ∈ A∗ et r ∈ A[X]. On veut montrer que r/a ∈ A[X]. Or div c(r) > div(a), car    div c(q) + div c(r) = div(a) + div c(p) . Et puisque a ∈ A∗ cela signifie que a divise tous les coefficients de r. 2 Le théorème suivant est une version constructive non noethérienne du théorème qui affirme que si A est un anneau de Krull, il en est de même pour A[X] (voir le théorème 3.8 et [22, théorème 12.4]). T. Coquand, H. Lombardi 29 Théorème 3.7 Soit A un anneau à diviseurs de corps de fractions K. L’anneau A[X] est également à diviseurs. En outre on a un isomorphisme naturel de groupes réticulés ∼ Div(A[X]) −→ divA[X] (f ) 7−→ Div(K[X]) × Div A, avec  divK[X] (f ), divA (c(f ) pour (f ∈ A[X]). Démonstration. Le groupe de divisibilité de A[X] est G = K(X)× /A× , celui de K[X] est H = K(X)× /K∗ . Puisque K[X] est un anneau à pgcd, Div(K[X]) est simplement le groupe H, en passant en notation additive. Pour un f ∈ K(X)× nous notons fG sa classe dans G et fH sa classe dans H. Nous notons 4 la relation de divisibilité dans ces groupes. On a un morphisme de groupes ordonnés ϕ : G → G0 = H × Div A donné par   ϕ(fG ) = fH , div c(p) − div c(q) où f = p/q avec p, q ∈ A[X]. D’après le lemme 3.6, ce morphisme est un isomorphisme sur son image, ce qui permet d’identifier G à un sous-groupe ordonné de G0 . On va montrer que ϕ satsifait les requêtes du projet divisoriel 2. Il nous reste à voir que tout élément ∆ = (fH , δ) du groupe réticulé G0 est borne inférieure d’une famille finie dans G. On peut supposer ∆ > 0. Cela signifie que δ > 0 et fH = uH pour un u dans A[X]. Cela donne ∆ = (uH , δ).   Pour b ∈ A∗ , on a div c(bu) = div(b)  + div c(u) . Soient b tel que div(b) > δ−div c(u) et w = bu ∈ A[X], alors ϕ(wG ) = (uH , δ1 ) avec δ1 > δ. L’idéal c(u) de A admet un inverse divisoriel qui peut être écrit sous la forme c(v) pour un v ∈ A[X]. On a donc    div c(uv) = div c(u) + div c(v) = div(a)  pour un a ∈ A∗ (voir le lemme 1.17). En outre δ = div c(r) avec r ∈ A[X]. 0 On pose w0 = uvr/a, on a ϕ(wG ) = (uvr)H , δ , et uH 4 (uvr)H . 0 ) dans G0 . 2 Finalement ∆ = (uH , δ) = ϕ(wG ) ∧ ϕ(wG Un corollaire immédiat est le théorème suivant. Théorème 3.8 Soit A un anneau à diviseurs. Si le groupe réticulé Div A est discret, ou de dimension 1, ou à décomposition partielle, ou a décomposition bornée, il en va de même pour Div(A[X]). Démonstration. Ceci résulte de ce que Div(A[X]) ' Div A × Div(K[X]) (théorème 3.7) et de ce que Div(K[X]) est discret et à décomposition bornée (a fortiori de dimension 1 et à décomposition partielle). 2 Stabilité pour les extensions entières intégralement closes Lemme 3.9 Soit A un anneau intégralement clos de corps de fractions K et L ⊇ K un corps discret. Soit B la clôture intégrale de A dans L. Soient a, a0 , a1 , . . ., an dans A. 1. L’élément a divise a0 dans A si, et seulement si, il divise a0 dans B. 2. L’élément a est un pgcd fort de (a1 , . . . , an ) dans A si, et seulement si, il l’est dans B. Démonstration. 1. Supposons que x = a0 /a ∈ K soit dans B, on doit montrer qu’il est dans A. Cela résulte de ce que tout élément de B est entier sur A : x ∈ K ∩ B est entier sur A donc dans A. 30 Anneaux à diviseurs et anneaux de Krull 2. Vu le point 1, l’affirmation dans B est plus forte que celle dans A. Comme la notion de pgcd fort est stable par multiplication par un élément de A∗ , on peut supposer que a = 1 est pgcd fort des ai dans A et on doit montrer qu’il l’est dans B. Ainsi on doit montrer que si b ∈ B divise ya1 , . . . , yan dans B (y ∈ B), alors l’élément z = y/b de L est dans B. Pour cela il suffit de montrer que z est entier sur A. Par hypothèse zai ∈ B pour chaque i. On dispose de polynômes unitaires gi ∈ A[X] qui annulent les zai , et fournissent autant de i polynômes de K[X] qui annulent z : fi (z) = gi (zai )/am i . On peut calculer dans K[X] le pgcd unitaire f de ces derniers polynômes P f (X) = X m + k<m cm−k X k . Alors pour chaque i, le polynôme am i f (X/ai ) divise gi dans K[X], donc ses coefficients c1 ai , c2 a2i , . . ., cm am sont dans A par le théorème de Kronecker, parce que A est intégralement i clos. Par exemple les c2 a2i sont dans A. Les a2i sont de pgcd fort 1 donc c2 ∈ A. De même chaque ck est dans A. Et l’on a bien z entier sur A. 2 Définition et notation 3.10 Pour toute liste (a1 , . . . , an ) = (a) dans A, on note K(a) (T ) Pn le polynôme j=1 aj T j−1 . On dit que c’est le polynôme de Kronecker associé à la liste ordonnée (a). Si (b) = (b1 , . . . , bm ) est une autre liste on définit (a) ? (b) par l’égalité K(a)?(b) = K(a) K(b) . Si A est un anneau à diviseurs, le corollaire 1.17 implique que  divA (a) + divA (b) = divA (a) ? (b) . Lemme 3.11 Soit A un anneau à diviseurs de corps de fractions K et L ⊇ K un corps discret. Soit B la clôture intégrale de A dans L. Pour toute liste (b) = (b1 , . . . , bn ) dans B∗ il existe une liste (b0 ) = (b01 , . . . , b0m ) telle que la liste (b) ? (b0 ) soit dans A et admette un pgcd fort dans A∗ . Démonstration. On considère l’anneau B1 = A[b1 , . . . , bn ] qui est un A-module de type fini. En fait B1 est un quotient d’un anneau C (non nécessairement Pn intègre) qui est une A-algèbre libre de rang fini 13 . On considère le polynôme B = K(b) = k=1 bk T k−1 vu dans C[T ], puis e ∈ C[T ]. l’élément cotransposé B e et en revenant de C à B1 , cela nous Soit NB = NC[T ]/A[T ] (B) ∈ A[T ]. On a NB = B B, donne un C ∈ B1 [T ] avec BC = NB . Si C = K(c) et NB = K(d) on a (b) ? (c) = (d). La liste (d) de A admet une inverse divisorielle (a1 , . . . , aq ) = (a) dans A. Ainsi (d) ? (a) admet un pgcd fort g dans A∗ . Le point 2 du lemme 3.9 nous dit que (d) ? (a) admet le pgcd fort g dans B. Finalement on obtient que la liste (b) ? (c) ? (a) est dans A[T ] et qu’elle admet g pour pgcd fort (dans A∗ comme dans B∗ ). Ainsi, la liste (b0 ) = (c) ? (a) satisfait les requêtes voulues. 2 Théorème 3.12 Soit A un anneau à diviseurs de corps de fractions K et L ⊇ K un corps discret. Soit B la clôture intégrale de A dans L. 1. L’anneau B est un anneau à diviseurs. 2. On a un unique morphisme de groupes réticulés ϕ : Div A → Div B tel que  ϕ divA (a) = divB (a) pour a ∈ A. Ce morphisme est injectif : cela permet d’identifier Div A à un sous-groupe réticulé de Div B. 3. Soit x ∈ B et f un polynôme unitaire de A[X] (de degré d) qui annule x. Avec ξ = divB (x) et D le ppcm des entiers ∈ J1..dK, on a des éléments γk ∈ Div A ⊆ Div V B dans le sous-groupe engendré par les diviseurs des coefficients de f , tels que k |Dξ − γk | = 0. 13. On peut prendre C = A[X1 , . . . , Xn ]/hh1 (X1 ), . . . , hn (Xn )i où hi ∈ A[Xi ] est unitaire. Notons que le polynôme NB est un polynôme régulier de A[T ] (NB (0) = NC/A (b1 )). T. Coquand, H. Lombardi 31 Démonstration. 1. Toute liste dans B∗ admet une inverse divisorielle d’après le lemme 3.11. V 2. L’unicité si existenceVest claire car l’élément divA (a1 , . . . , an ) = i divA (ai ) de (Div A)+ doit avoir pour image i divB (ai ) = divB (a1 , . . . , an ). Pour l’existence, montrons d’abord que l’on peut définir une application ϕ de (Div A)+ dans (Div B)+ en posant ϕ(δ) = divB (a1 , . . . , an ) si δ = divA (a1 , . . . , an ) pour des ai dans A∗ . Le lemme 3.9 nous dit que δ = 0 implique ϕ(δ) = 0. Supposons que divA (a1 , . . . , an ) = divA (a01 , . . . , a0m ). Il existe donc une liste (x) dans A telle que les familles (ai xj )i,j et (a0i xj )i,j admettent un même pgcd fort g dans A. Le lemme 3.9 nous dit que les familles (ai xj )i,j et (a0i xj )i,j admettent aussi le pgcd fort g dans B, donc divB (a) + divB (x) = divB (g) = divB (a0 ) + divB (x), d’où divB (a) = divB (a0 ). Ceci montre que ϕ est bien définie. Montrons que ϕ est injective. Si divB (a1 , . . . , an ) = divB (a01 , . . . , a0m ), on considère une liste (x) dans A telle que la liste (ai xj )i,j admette un pgcd fort g dans A. C’est aussi un pgcd fort dans B, donc divB (a) + divB (x) = divB (g). Donc divB (a0 ) + divB (x) = divB (g), ce qui signifie que la liste (a0i xj )ij admet le pgcd fort g dans B. Comme c’est une liste dans A, elle admet aussi g comme pgcd fort dans A. Donc divA (a0 ) + divA (x) = divA (g). Et divA (a) = divA (a0 ). L’application ϕ que l’on vient de définir est un morphisme injectif de monoı̈des positifs, de (Div A)+ dans (Div B)+ et s’étend de manière unique en un morphisme de groupes réticulés, de Div A dans Div B (vérification laissée au lecteur). Pd 3. Soit f (X) = j=1 aj X j ∈ A[X] avec ad = 1 et f (x) = 0. On considère les αj = divB (aj xj ) pour les aj ∈ A∗ . Le fait 2.14 nous dit que V j k j>k, aj ,ak ∈A∗ divB (aj x ) − divB (ak x ) = 0. Or divB (aj xj ) − divB (ak ξ k ) = (j − k) divB (x) − divB (ak ) − divB (aj ) V + + et divB (x) > 0. On a donc j>k Dξ − αjk = 0 pour des αjk ∈ (Div A)+ .  2 Théorème 3.13 Soit A un anneau à diviseurs de corps de fractions K et L ⊇ K un corps discret. Soit B la clôture intégrale de A dans L (qui est un anneau à diviseurs d’après le théorème précédent). 1. Si L admet une base discrète sur K et si Div A est discret (i.e. A est à divisibilité explicite), alors Div B est discret. 2. Si Div A est de dimension 6 1, il en va de même pour Div B. Démonstration. 1. On doit tester z ∈ B pour un z ∈ L. Puisque L admet une base discrète sur K, on peut calculer le polynôme minimal f (X) de z sur K. Et par le théorème de Kronecker, z est zéro un polynôme unitaire de A[X] si, et seulement si, son polynôme minimal sur K est dans A[X]. V 2. Le point 3 du théorème 3.12 donne j |Dξ − γj | = 0 pour des γj ∈ (Div A)+ . On a un résultat du même type pour ζ = div(z). On aura donc une double égalité V V + + h Dξ − βh = 0 = h M ζ − βh où les βh ∈ Div A. Par le lemme 2.15 on obtient C(Dξ) ⊆ C(M ζ)  C(M ζ)⊥ . Enfin C(Dξ) = C(ξ) et C(M ζ) = C(ζ). 2 32 Anneaux à diviseurs et anneaux de Krull Autres propriétés de stabilité La proposition suivante est une sorte de réciproque du théorème 3.12 dans un cas particulier. Proposition 3.14 Soit B un anneau à diviseurs, Γ un groupe fini d’automorphismes de B et A = BΓ le sous-anneau des points fixes de Γ. Alors A est un anneau à diviseurs. Démonstration. Tout d’abord, A est intégralement clos parce que B est intégralement clos. Par ailleurs B est entier sur A parce que Γ est fini. Donc B est la clôture intégrale de A dans Frac(B), ce qui nous amène, à la fin de la démonstration, dans la situation du théorème 3.12. On considére une liste finie dans A pour laquelle on cherche une inverse divisorielle. Cette liste donne les coefficients d’un polynôme f ∈ A[X]. Comme la liste admet une inverse divisorielle dans B, il existe g, h ∈ B[X] et d ∈ B∗ tels que f g = d h et GrB (c(h)) > 2. (∗) En transformant (∗) par les σ ∈ Γ et en faisant le produit des égalités obtenues on a une égalité Q f N G = D H avec N = |Γ| , G = σ∈Γ σ(g), etc. On écrit ceci sous la forme f (f N −1 G) = D H où G, H ∈ A[X] et D ∈ A (#) On a GrB (c(H)) > 2 car GrB (c(h)) > 2. On applique alors le point 2 du lemme 3.9 et on obtient GrA (c(H)) > 2. Ainsi (#) fournit un inverse divisoriel de l’idéal c(f ) dans A. 2 Exemple. Soit k un corps discret de caractéristique 6= 2, B = k[X] l’anneau des polynômes en n indéterminées (n > 2) et A le sous-anneau des polynômes pairs. Alors A est un anneau à diviseurs, en tant qu’égal à BΓ , avec Γ = hσi, où σ échange Xi et −Xi pour chaque i. On a par exemple dans A un diviseur irréductible non principal divA (gX1 , gX2 ) pour chaque polynôme irréductible impair g dans B (divB (gX1 , gX2 ) = divB (g)). 4 Anneaux de Krull Définition et premières propriétés Définition 4.1 On appelle anneau de Krull un anneau à diviseurs non trivial dont le groupe des diviseurs est discret et à décomposition bornée. Un corps discret est un anneau de Krull dont le groupe des diviseurs est nul. Ce sont les autres anneaux de Krull qui nous intéressent, ceux pour lesquels existent des diviseurs strictement positifs. Définition 4.2 Un anneau à diviseurs est dit à décomposition complète (resp. à décomposition partielle) si son groupe des diviseurs est à décomposition complète (resp. à décomposition partielle). Exemples. 1) Si k = Z ou un corps discret, k[X1 , . . . , Xn ] est un anneau à pgcd à divisibilité explicite et l’on montre facilement que c’est un anneau de Krull. Il est à décomposition complète lorsque k = Z et pour certains corps discrets, comme Q et ses extensions finies, ou les corps algébriquement clos. T. Coquand, H. Lombardi 33 2) Un anneau de valuation discrète est évidemment un anneau de Krull local de dimension 1. Pour une réciproque voir le lemme 4.5. 3) Les exemples de base d’anneaux de Krull à décomposition complète sont les anneaux factoriels et les domaines de Dedekind, à condition qu’ils soient à factorisation totale. Voir aussi le théorème 4.14. Le fait qui suit rassemble des conséquences de la proposition 2.10 concernant les groupes réticulés lorsqu’on l’applique au groupe des diviseurs. Le point 3 nous donne une version de [8, théorème 1, §1.19], que nous reprenons ici dans un cadre constructif plus général. C’est un outil très utile qui remplace souvent de manière efficace la propriété de décomposition complète. Fait 4.3 1. Un anneau à diviseurs à décomposition complète est un anneau de Krull. 2. En mathématiques classiques, les deux notions sont équivalentes car tout groupe réticulé discret à décomposition bornée est alors à décomposition complète 14 . 3. Un anneau de Krull est à décomposition partielle. 4. Le groupe des diviseurs d’un anneau de Krull A est de dimension 6 1 : pour tout α ∈ Div A on a Div A = C(α)  C(α)⊥ . Le théorème suivant nous donne un exemple paradigmatique d’anneau de Krull. Théorème 4.4 1. Un anneau géométrique intégralement clos est un anneau de Krull. 2. La clôture intégrale d’un anneau géométrique intègre dans son corps de fractions est un anneau de Krull. Démonstration. 1. Cas particulier de 2. 2. Avec un changement de variables on obtient une mise en position de Noether qui fait apparaı̂tre l’anneau géométrique A comme une extension finie d’un anneau de polynômes C = k[X1 , . . . , Xr ]. L’anneau C est un anneau à pgcd à factorisation bornée, donc un anneau de Krull. Si A est intègre, Frac A est une extension finie de k(X1 , . . . , Xr ). On conclut alors par le théorème 4.17. 2 Concernant le cas crucial des anneaux de valuation discrètes, la situation en mathématiques constructives est un peu plus délicate qu’en mathématiques classiques comme l’indique le lemme suivant, qui complète le lemme 1.21. En mathématiques classiques tout anneau de Krull est à décomposition complète et les cinq points sont équivalents. Lemme 4.5 (Anneaux de valuation discrète, 2) Soit A un anneau à diviseurs et un α > 0 dans Div A (par exemple α = div(a) avec a ∈ A∗ \ A× ). Considérons les propriétés suivantes. 1. A est un anneau de valuation discrète. 2. A est un anneau de Krull local de dimension 1. 3. A est un anneau de Krull local et Div A = C(α). 4. A est un anneau principal local à factorisation bornée et Div A = C(α). 5. Div A est discret et | Div A : Zα | 6 k pour un k > 0. 14. On notera que pour ce point la démonstration classique utilise le tiers exclu (pour le test d’irréductibilité d’un diviseur) mais pas l’axiome du choix. 34 Anneaux à diviseurs et anneaux de Krull On a l’implication 1 ⇒ 2, et les équivalences 2 ⇔ 3 ⇔ 4 ⇔ 5. L’implication 2 ⇒ 1 est valable si A est à décomposition complète. Démonstration. Dans chacun des points on a Div A discret, i.e. A à divisibilité explicite. 4 ⇒ 3, 1 ⇒ 5, et 1 ⇒ 2. Clair. 2 ⇒ 3, 4 et 5. En tant qu’anneau à diviseurs local de dimension 1, A est un anneau de valuation (théorème 1.19). Pour un ξ ∈ (Div A)+ arbitraire, on considère une base de décomposition partielle (π1 , . . . , πr ) pour (α, ξ). Les πi sont deux à deux orthogonaux, et dans un anneau de valuation deux diviseurs > 0 sont toujours comparables. Donc un et un seul des πi , par exemple π1 , est > 0. On a donc α = `π1 pour un ` > 1, ξ = mπ1 pour un m > 0, d’où Zπ1 ⊆ Div A ⊆ Qα. Enfin si k majore le nombre d’éléments non nuls dans une écriture de α comme somme d’éléments > 0, on aura nécessairement | Div A : Zα | 6 k 1 Zα. et Div A ⊆ k! 3 ⇒ 2. On note que C(α) est absolument borné. Le point 1 du théorème 4.10 nous dit que A est un anneau principal, donc de dimension 6 1. Il s’agit en fait d’un anneau de valuation et comme ce n’est pas un corps, il est de dimension exactement 1. 1 5 ⇒ 4. De l’inégalité | Div A : Zα | 6 k on déduit que Zα ⊆ Div A ⊆ k! Zα. Donc Div A est à décomposition bornée et absolument borné, donc A est un anneau de Krull principal (théorème 4.10). Il reste à montrer que A est un anneau local. Supposons que x + y est inversible. Les diviseurs div x et div y s’expriment sous forme mπ et nπ pour un π ∈ Div A. Comme 0 = div(x + y) > div(x) ∧ div(y), on a bien div(x) ou div(y) nul. 4 ⇒ 1 (lorsque A est à décomposition complète) : si α est minoré par un diviseur irréductible π, il est clair que Div A = Zπ. 2 Théorème d’approximation simultanée et conséquences Le point 2 du théorème suivant nous donne une version de [8, théorème 2, §1.20] dans un cadre constructif plus général. Théorème 4.6 (Théorème d’approximation simultanée) Soit A un anneau de Krull. 1. Soient (π1 , . . . , π r ) des diviseurs P P > 0 deux à deux orthogonaux et (n1 , . . . , nk ) dans N. Notons π = i πi et α = i ni πi . Il existe a ∈ A∗ tel que divA (a) = α + ρ avec ρ > 0 et ρ ⊥ π (a fortiori ρ ⊥ α). 2. Pour tout α ∈ (Div A)+ et tout γ > α on peut trouver a ∈ A∗ tel que div a = α + ρ avec ρ > 0 et ρ ⊥ γ. Démonstration. 1. On suppose en un premier temps les πj irréductibles. Pour chaque i ∈ J1..kK on va trouver un xi tel que P divA (xi ) = ni αi + βi , βi = j6=i mj πj + ρi avec mj > nj + 1 et ρi ⊥ π (∗)i . Construisons par exemple x1 . Nous considérons γ1 = (n1 −1)π1 +π. C’est un diviseur que l’on écrit divA (c1 , . . . , cm ) pour des ci ∈ A∗ . On considère une base de décomposition partielle pour (π1 , . . . , πr , c1 , . . . , cm ). Comme elle ne raffine aucun des πi , pour l’un des cj , qui est le x1 recherché, la condition (∗)1 est réalisée. P Une fois les xi construits on considère x = i xi . On calcule une base de décomposition partielle pour (x, x1 , . . . , xr ). Comme elle ne raffine pas les πi on peut appliquer le lemme 4.7, Pr et l’on obtient que divA (x) = i=1 ni πi + ρ avec ρ ⊥ π. Voyons le cas général. On reprend le calcul précédent. Si à une étape du calcul un ou plusieurs des πj se décomposent, on remplace (π1 , . . . , πr ) par la liste raffinée et on reprend tous les T. Coquand, H. Lombardi 35 calculs depuis le début. Cet inconvénient ne peut se produire qu’un nombre fini de fois. À la fin le calcul se déroule comme si les πi étaient irréductibles. 2. On considère P une base de décomposition partielle (π1 , . . . , πr ) pour (α, γ). On écrit α = i∈J1..rK ni πi et on applique le point 1. 2 Lemme 4.7 Soit A un anneau à diviseurs avec P Div A discret. On suppose donnés (x1 , . . . , xn ) dans A∗ , avec i xi = 0, et (π1 , . . . , P πr ) une base de décomr position partielle pour (ξ1 , . . . , ξn ) (où ξi = divA (xi )). On écrit ξi = i=j nij πj . Alors pour chaque j ∈ J1..rK, la valeur minimum de nij est atteinte au moins deux fois. P V Démonstration. Puisque i xi = 0 on a pour chaque i ∈ J1..nK ξi > k6=i ξk , ce qui donne V nij > k6=i nkj pour chaque j ∈ J1..rK. En particulier si nij est la plus petite valeur (pour ce j fixé), cet entier doit être égal à l’un des nkj pour k 6= i. 2 On obtient maintenant des corollaires importants du théorème 4.6. Théorème 4.8 (Théorème un et demi pour les anneaux de Krull) Soit A un anneau de Krull et α ∈ (Div A)+ . 1. Pour tout a ∈ A∗ tel que α 6 div(a) il existe b ∈ A∗ tel que α = div(a) ∧ div(b) = div(an ) ∧ div(b) pour tout n ∈ N∗ . 2. Pour tout c ∈ K∗ tel que div(c) 6 α il existe d ∈ K∗ tel que α = div(c) ∨ div(d). Démonstration. 1. On pose γ = div(a). Le théorème 4.6 nous donne un b ∈ A tel que div(b) = α + ρ avec ρ > 0 et ρ ⊥ γ. Par suite, pour n ∈ N∗ div(b) ∧ div(an ) = (α + ρ) ∧ nγ = (α ∨ ρ) ∧ nγ = (α ∧ nγ) ∨ (ρ ∧ nγ) = α ∨ 0 = α. 2. Soit a avec div(a) > α puis β = div(a) − α. On a div(c) 6 α, donc 0 6 β 6 div( ac ) avec ac ∈ A∗ . Le point 1. nous donne un e ∈ A∗ tel que β = div( ac , e), donc  α = div(a) − β = div(a) + div( ac ) ∨ div( 1e ) = div(c) ∨ div( ae ), d’où le résultat avec d = ae . 2 Corollaire 4.9 Soit A un anneau de Krull, et a, b ∈ A∗ . Il existe c et d ∈ A∗ tels que c a = et divA (a, b, c, d) = 0. b d D’où l’on déduit (en choissant de mettre a en valeur) : • ha, bi ha, ci = a ha, b, c, di, • divA (a, b) + divA (a, c) = divA (a), • Idv(a, b) = (a : c)A et Idv(a, c) = (a : b)A . En particulier, pour tout diviseur α > 0, et tout a ∈ A∗ tel que div(a) > α, il existe c ∈ A∗ tel que Idv(α) = (a : c)A . Démonstration. Posons α = divA (a, b) et β = div(a) − α( 15 ). En appliquant le théorème un et demi à β et a, il existe c ∈ A∗ tel que β = div(a, c). Puisque α + β = div(a) on obtient que ha, bi ha, ci admet a pour pgcd fort. En particulier bc est divisible par a, on écrit bc = ad et l’on obtient ha, bi ha, ci = a ha, b, c, di donc div(a, b, c, d) = 0. Le dernier point résulte de ce que div(a, b) = div(a) − div(a, c) = div(1) ∨ div( ac ), donc Idv(a, b) = A ∩ ac A. 2 15. Si A est cohérent on peut prendre β = divA (b) où b = (a : ha, bi) = (a : b) 36 Anneaux à diviseurs et anneaux de Krull Remarque. Si A est un domaine de Prüfer possédant la propriété un et demi (par exemple s’il est de dimension 6 1), on a la même propriété sous une forme plus forte : div(a, b, c, d) = 0 est remplacé par ha, b, c, di = h1i. Le théorème 4.10 est une version constructive du théorème suivant en mathématiques classiques : un anneau de Krull avec seulement un nombre fini de diviseurs irréductibles est un anneau principal (conséquence de [22, théorème 12.2]). Théorème 4.10 Soit A un anneau de Krull. 1. Si Div A est absolument borné, A est un anneau principal. 2. Si Div A est engendré par les diviseurs irréductibles (π1 , . . . , πr ), on obtient en outre — A est un anneau principal à factorisation totale, Qr — si πi = divA (pi ), l’élément q = i=1 pi engendre l’idéal Rad A, — les idéaux maximaux détachables de A sont les hpi i. 3. Pour un a ∈ A∗ les propriétés suivantes sont équivalentes.  (a) Div A = C divA (a) (qui est absolument borné). (b) A est un anneau principal et a ∈ Rad A. Démonstration. 2. Tout d’abord, il est clair que Div A est à décomposition complète. Comme un diviseur orthogonal à tous les πi est nul, P pour tous (n1 , . . . , nr ) dans N, le théorème 4.6 nous donne un a ∈ A∗ tel que divA (a) = i ni πi . Ainsi tout diviseur est principal, autrement dit A est un anneau à pgcd. Montrons maintenant que A est un anneau de Bezout. Pour cela il suffit de montrer que si b et c ont pour pgcd 1, ils sont comaximaux. On écrit P P div(b) = i∈I mi πi , div(c) = i∈J mi πi avec les mi > 0 et I ∩ J = ∅. Q Soit K = J1..rK \ (I ∪ J) et d = k∈K pk . Alors div(b + cd) = 0 par le lemme 4.7 (dans la décomposition des trois éléments div(b), div(cd) et div(b + cd), la valeur minimum 0 doit être atteinte au moins deux fois sur chaque composante πi ). Ainsi b + cd ∈ A× , et hb, ci = 1. Montrons que q ∈ Rad A. I.e., pour x ∈ A∗ , 1 + xq ∈ A× (ou encore divA (1 + xq) = 0). Dans la décomposition des trois éléments divA (1), divA (1 + xq) et divA (xq), la valeur minimum 0 doit être atteinte au moins deux fois sur chaque composante πi (lemme 4.7). Montrons que Rad A ⊆ hqi. Si b ∈ A et si un des pi ne figure pas dans les diviseurs de b, on a hb, pi i = 1 et donc 1 + xb = ypi pour x et y convenables, donc 1 + xb n’est pas inversible. On laisse à la lectrice le soin de montrer que les hpi i sont les idéaux maximaux détachables. 1. Les démonstrations dans le point 2 fonctionnent en remplaçant les πi du point 2 par des bases de décomposition partielle pour les éléments de A qui définissent les diviseurs qui entrent dans la preuve. Les détails sont laissés au lecteur. 3b ⇒ 3a. D’après le lemme 3.2. 3a ⇒ 3b. L’anneau est principal d’après le point 1 Concernant a ∈ Rad A on reprend la preuve du point 2 en s’appuyant sur des bases de décomposition partielle. 2 Remarques. 1) Dans le point 3a on ne peut pas remplacer l’hypothèse par la simple existence d’un élément régulier dans Rad A : il y a des anneaux factoriels locaux de dimension de Krull arbitraire. 2) En mathématiques classiques tout anneau de Krull A avec Div A absolument borné relève du point 2 ci-dessus. D’un point de vue constructif, la situation est plus problématique : il est même impossible d’obtenir qu’un anneau de Krull à décomposition complète avec Div A absolument borné contient un élément a tel que Div A = C(a). Exemple. On donne ici un anneau de Krull non cohérent. C’est aussi un anneau local à pgcd. Il n’est pas cohérent (cela montre aussi qu’il n’est pas noethérien). En mathématiques T. Coquand, H. Lombardi 37 classiques c’est un anneau factoriel en tant qu’anneau de Krull à pgcd. En outre il est de dimension de Krull 6 2. C’est l’exemple 5.2 dans [12, Glaz]. On considère le corps discret F = F2 ((ai )i∈N , (bi )i∈N ), puis l’anneau local B = F[x, y]1+hx,yi . On pose pi = ai x + bi y et l’on définit un automorphisme γ de B par γ(x) = x, γ(y) = y, γ(ai ) = ai + ypi+1 , γ(bi ) = bi + xpi+1 pour tout i. On a γ(pi ) = pi et γ engendre le groupe G = {Id, γ} d’ordre 2. Enfin A est le sous-anneau BG des points fixes de G. Localisations d’un anneau de Krull, diviseurs irréductibles Le théorème suivant est une conséquence immédiate du théorème 3.1 et de la proposition 2.16. On notera que les hypothèses du point 2 sont toujours satisfaites en mathématiques classiques. Théorème 4.11 Soient A un anneau de Krull, S un filtre ne contenant pas 0, et HS le sous-groupe solide de Div A engendré par les divA (s) pour s ∈ S. Alors AS est un anneau à diviseurs, Div AS est à décomposition bornée et de dimension 6 1, et il y a un unique morphisme de groupes réticulés ϕS : Div A → Div AS tel que ϕS divA (a) = divAS (a) pour tout a ∈ A∗ . On a en outre les précisions qui suivent. 1. Si AS est à divisibilité explicite, AS est un anneau de Krull. 2. Si HS est détachable et si Div A = HS  H 0 pour un sous-groupe solide H 0 , AS est un anneau de Krull et le morphisme ϕS est un morphisme de passage au quotient par HS : il permet d’identifier Div AS au groupe réticulé quotient (Div A)/HS ' H 0 . Rappelons que pour un anneau à diviseurs arbitraire, on a une bijection naturelle entre les ensembles suivants (théorème 1.13). — Les diviseurs irréductibles. — Les idéaux divisoriels finis premiers 6= h1i. Les points 2 à 4 du théorème suivant rajoutent quelques précisions pour les anneaux de Krull qui ne sont pas des corps (on suppose d’existence d’un diviseur strictement positif). Théorème 4.12 Soient A un anneau de Krull, α un diviseur > { x ∈ A∗ | div x ⊥ α }. 0 et Sα = 1. L’anneau B = Sα−1 A est un anneau principal avec Div B ' C(α). En particulier on a un élément régulier dans Rad B et une borne a priori sur le nombre d’éléments deux à deux étrangers dans B. 2. Les propriétés suivantes sont équivalentes. (a) α est un diviseur irréductible. (b) C(α) = Zα. (c) Idv(α) est un idéal premier. (d) Sα est un filtre premier de hauteur 6 1 et A = Sα ∪ Idv(α) (union disjointe de deux parties détachables). (e) Sα−1 A est un anneau de valuation discrète et si p/1 est une uniformisante, on a α = divA (p) mod C(α)⊥ . 3. Si A est à décomposition complète, on obtient selon le point 2. des bijections entre les trois ensembles suivants. — Les diviseurs irréductibles. — Les idéaux divisoriels finis premiers 6= h1i. 38 Anneaux à diviseurs et anneaux de Krull — Les filtres premiers détachables de hauteur 1. 4. Si A est cohérent, les quatre ensembles suivants sont égaux. — Les idéaux divisoriels finis premiers 6= h1i. — Les idéaux de type fini premiers q 6= h0i tels que div(q) > 0. — Les idéaux de type fini premiers q 6= h0i , h1i tels que q = Idv(q). — Les idéaux de type fini premiers détachables de hauteur 1. Démonstration. 1. Résulte du point 1 du théorème 3.5 et du théorème 4.10. 2. C’est le point 2 du théorème 3.5. Ici intervient seulement le fait que Div A est discret de dimension 1. 3. Il reste à vérifier qu’un filtre premier S de hauteur 1 est de la forme Sπ pour un diviseur irréductible π. Le localisé AS est par définition un anneau local de dimension 6 1. D’après le point 1 du théorème 3.1, c’est un anneau à diviseurs dont le groupe des diviseurs Div(AS ) est un quotient de Div A. En tant qu’anneau à diviseurs local de dimension 1, AS est un anneau de valuation (théorème 1.19). Soit x ∈ A∗P \S, on a divAS (x) > 0 car x ∈ / A× S . On considère la décomposition de ξ = divA (x) sous forme i ni πi avec les πi irréductibles et les ni ∈ N∗ . Les πi restent deux à deux orthogonaux dans AS , et dans un anneau de valuation deux diviseurs > 0 sont toujours comparables. Donc un et un seul des πi , appelons le π, reste > 0 dans Div(AS ). De la même manière tout diviseur irréductible distinct de π dans Div A s’annule dans Div(AS ). Ceci montre que Div(AS ) ' (Z, >) avec π comme seul diviseur irréductible, correspondant à 1 ∈ Z dans l’isomorphisme. Tous les y ∈ A tels que divA (y) ⊥ π dans A sont dans S car divAS (y) = 0, i.e. ce sont des unités de AS . Ainsi on obtient bien S = Sπ . 4. C’est le point 3 du théorème 3.5. 2 On se propose maintenant d’étudier, autant que faire se peut, (( toutes )) les localisations d’un anneau de Krull à décomposition complète. Le théorème 4.13 généralise pour les anneaux de Krull à décomposition complète des résultats simples dans le cas d’un anneau factoriel. Il résulte essentiellement du théorème 4.11 et du lemme 2.11. En mathématiques classiques il donne une description exhaustive des localisés d’un anneau de Krull. En mathématiques constructives on se limite aux localisations en des filtres détachables particuliers. Ce théorème complète pour les anneaux de Krull le lemme 2.11 qui décrit les sous-groupes détachables d’un groupe réticulé à décomposition complète. Théorème 4.13 Soient A un anneau de Krull à décomposition complète et I l’ensemble de ses diviseurs irréductibles. On reprend les notations du théorème 3.1. 1. Si S est un filtre et si HS est détachable, alors S est détachable, égal à { x ∈ A | ∀π ∈ I, π 6 div(x) ⇒ π ∈ HS } . En outre Div(AS ) ' (Div A)/HS ' HS ⊥ . 2. Si H est un sous-groupe solide détachable de Div A, l’ensemble { x ∈ A | ∀π ∈ I, π 6 div(x) ⇒ π ∈ H } est un filtre détachable S et HS = H. 3. On obtient ainsi des bijections entre les trois ensembles suivants. — Les filtres S de A tels que HS est détachable. — Les sous-groupes solides détachables de Div A. — Les parties détachables de I. On suppose dans la suite que S est un filtre avec HS détachable. T. Coquand, H. Lombardi 39 4. Les propriétés suivantes sont équivalentes. (a) Le filtre S est de hauteur 1. (b) L’anneau AS est un anneau de Dedekind à factorisation totale. Dans ce cas les propriétés suivantes sont équivalentes. (c) Le sous-ensemble I ∩ HS ⊥ de I est fini non vide. (d) Rad(AS ) contient un élément non nul. (e) L’anneau AS est principal et les diviseurs irréductibles de AS forment un ensemble fini non vide. 5. Le filtre S est premier de hauteur 1 si, et seulement si, I ∩ HS ⊥ est un singleton {π}. Dans ce cas l’idéal premier p = A \ S est égal à Idv(π). 6. Si S est premier de hauteur 6= 0, 1, I ∩ HS ⊥ est infini et div(p) = 0. Démonstration. La démonstration est laissée à la lectrice. 2 Remarque. Dans le cadre des anneaux de Krull à décomposition complète, il ne semble pas que l’on puisse démontrer que HS est détachable dès que S est un filtre détachable (contrairement au cas des anneaux factoriels). De même on ne peut pas calculer en général la hauteur d’un filtre S sous la seule hypothèse que HS est détachable. Un anneau est dit pleinement Lasker-Nœther lorsqu’il est noethérien cohérent fortement discret et que tout idéal radical est intersection finie d’idéaux premiers de type fini (voir [23]). Rappelons qu’en mathématiques classiques tout anneau noethérien est pleinement Lasker-Nœther, et donc, d’après le théorème 4.14, tout anneau noethérien intégralement clos est un anneau de Krull à décomposition complète. Théorème 4.14 Un anneau intégralement clos pleinement Lasker-Nœther est un anneau de Krull à décomposition complète. Démonstration. Dans un anneau de Krull A, on a vu que tout élément irréductible de Div A est de la forme divA (p) pour un idéal premier détachable p de hauteur 1. Dans [23], il est montré que pour un anneau pleinement Lasker-Nœther, on peut calculer explicitement les idéaux premiers de hauteur 1 qui contiennent un a ∈ A∗ fixé. Ceci permet ensuite de calculer la décomposition complète du diviseur principal div a en somme de diviseurs irréductibles (en utilisant le fait que Div A est discret). Les détails sont laissés au lecteur. 2 Stabilité pour les extensions polynomiales Théorème 4.15 Soit A un anneau de Krull et K son corps de fractions. 1. A[X] est aussi un anneau de Krull. 2. A[X] est à décomposition complète si, et seulement si, A et K[X] sont à décomposition complète. Démonstration. Ceci résulte de ce que A[X] est un anneau à diviseurs avec Div(A[X]) ' Div A × Div(K[X]) (théorème 3.7). 2 40 Anneaux à diviseurs et anneaux de Krull Stabilité pour les extensions entières intégralement closes Théorème et définition 4.16 (Norme d’un diviseur) Soit A un anneau à diviseurs non trivial de corps de fractions K et L ⊇ K un corps qui admet une base finie comme K-espace vectoriel. Soit B la clôture intégrale de A dans L. L’anneau B est aussi un anneau à diviseurs. On sait construire un homomorphisme de groupes ordonnés N ∗ : Div B → Div A qui satisfait les propriétés suivantes   1. N ∗ divB (b) = divA NL/K (b) pour tout b ∈ B. 2. Pour β ∈ (Div B)+ , on a β = 0 ⇐⇒ NB/A (β) = 0. 3. Pour tout α ∈ Div A, NB/A (α) = [ L : K ] α. On note NB/A cet homomorphisme, on l’appelle le morphisme norme. Démonstration. On rappelle qu’une base de L sur K est aussi une base de L[T ] sur K[T ] ou de L(T ) sur K(T ). Ceci implique que la fonction norme NL/K s’étend de manière naturelle en NL[T ]/K[T ] ou en NL(T )/K(T ) . On continue à la noter NL/K . On pose r = [ L : K ]. Rappelons aussi que dans la situation où K = Frac(A), A intégralement clos, et B clôture intégrale de A dans L, on a NL/K (B) ⊆ A : en fait pour x ∈ B, le polynôme caractéristique de x a tous ses coefficients dans A, et l’élément cotransposé x e (qui vérifie xe x = NL/K (x)) est un élément de B (par exemple en utilisant [18, corollaire III-8.6]). Rappelons enfin que B[T ] est la clôture intégrale de A[T ] dans L(T ). Tout ceci implique que la norme d’un élément g ∈ B[T ] est un élément de A[T ] et que ge ∈ B[T ]. On considère les ensembles Lst(B)∗ et Lst(A) et l’application N : Lst(B)∗ → Lst(A) définie comme suit Pm N (b1 , . . . , bm ) = (a1 , . . . , ap ), où K(b) = bk T k−1 Pk=1 p `−1 et NL/K (K(b) ) = `=1 a` T Enfin on définit ν : Lst(B)∗ → (Div A)+ par ν(b) = divA (N (b)). A priori on a p 6 (m−1)r+1. Notons que pour tout α ∈ Div A, on a ν(α) = r α. Cela résulte de ce que si α = divA (a), r alors NL/K (K(a) ) = K(a) = K(c) , donc divA (c) = r divA (a) par le corollaire 1.17. On démontre alors les points suivants. 1. Les applications N et ν sont bien définies, autrement dit les ai sont dans A et l’un au moins est régulier. En effet K(b) ∈ B[T ] donc NL/K (K(b) ) ∈ A[T ] d’après les remarques préliminaires. Par ailleurs K(b) est régulier, donc la multiplication par K(b) est injective (de L[T ] vers L[T ]), ce qui implique que son déterminant NL/K (K(b) ) est régulier. 2. Si (b) = (bi )i∈J1..nK et (c) = (cj )j∈J1..mK sont dans Lst(B)∗ , on a défini  P (b) ? (c) = i+j=`+1 bi cj `∈J1..m+n−1K On a K(b)?(c) = K(b) K(c) , donc NL/K (K(b)?(c) ) = NL/K (K(b) ) NL/K (K(c) ). Et en utilisant le corollaire 1.17 ceci implique  ν (b) ? (c) = ν(b) + ν(c). 3. Si divB (b) = 0 alors ν(b) = 0 . Soit (b0 ) = (b01 , . . . , b0m ) telle que la liste (a) = (b) ? (b0 ) soit dans A et admette un pgcd fort g dans A∗ (lemme 3.11). Donc (a) = g (a0 ) avec divA (a0 ) = 0. Ceci donne divB (b0 ) = divB (b) + divB (b0 ) = divB (g). Donc g est pgcd fort dans B de la liste (b0 ). En particulier on peut écrire (b0 ) = g (c) avec (b) ? (c) = (a0 ). Ceci implique ν(b) + ν(b0 ) = ν(a0 ) = r divA (a0 ) = 0, donc ν(b) = 0. 4. Si ν(b) = 0 alors divB (b) = 0 . g En effet, considérons la liste (b0 ) ∈ Lst(B)∗ définie par K (b) = K(b0 ) , alors   0 = ν(b) = divA N (b) = divA c(K(b) K(b0 ) )) , T. Coquand, H. Lombardi 41 et comme Div A s’identifie à un sous-groupe réticulé de Div B on obtient   0 = divA c(K(b) K(b0 ) ) = divB c(K(b) K(b0 ) )  = divB (b) ? (b0 ) = divB (b) + divB (b0 ). 5. En conséquence des points précédents l’élément ν(b) ∈ (Div A)+ ne dépend que de divB (b) et l’application correspondante N ∗ : (Div B)+ → (Div A)+ est un morphisme de monoı̈des, qui s’étend de manière unique en un morphisme (en général non injectif) de groupes ordonnés N ∗ : Div B → Div A. Quelques précisions. On démontre d’abord que l’application ν : Lst(B)∗ → (Div A)+ (( passe au quotient )), c’est-à-dire que si divB (b(1) ) = divB (b(2) ), alors ν(b(1) ) = ν(b(2) ). Pour ceci considérons une liste (c) dans B∗ telle que (b(1) ) ? (c) admette un pgcd fort e, autrement dit (b(1) ) ? (c) = e (z) (∗) où la liste (z) admet 1 pour pgcd fort. Cela signifie divB (b(1) ) + divB (c) = divB (e). L’égalité (∗) implique ν(b(1) ) + ν(c) = ν(e) + ν(z), i.e. ν(b(1) ) + ν(c) = ν(e) car divB (z) = 0 implique ν(z) = 0. Comme divB (b(2) ) + divB (c) = divB (e), on on a aussi ν(b(2) ) + ν(c) = ν(e) dans (Div A)+ . D’où ν(b(1) ) = ν(b(2) ). Une fois que l’on sait que N ∗ définit une opération de (Div B)+ vers (Div A)+ , on voit que c’est un morphisme pour l’addition. Comme l’image réciproque de 0 est 0 et puisque (Div B)+ et (Div A)+ sont les parties positives de Div A et Div B, il en résulte que N ∗ s’étend de manière unique en un morphisme de groupes ordonnés. 2 Théorème 4.17 Soit A un anneau de Krull de corps de fractions K et L ⊇ K un corps qui admet une base finie sur K. Soit B la clôture intégrale de A dans L. Alors B est un anneau de Krull. Démonstration. On sait déjà que B est un anneau à diviseurs (théorème 3.12) et que Div B est discret (théorème 3.13). Il reste à montrer que Div B est à décomposition bornée. On considère une décomposition divB (b) = divB (b(1) ) + · · · + divB (b(`) ) dans (Div B)+ . Au moyen du morphisme norme NB/A elle est transformée en une décomposition de NB/A (b) dans (Div A)+ . Puisque Div A est à décomposition bornée, si ` est suffisamment grand, un des termes NB/A (b(i) ) de cette décomposition est nul. Et ceci implique divB (b(i) ) = 0. 2 Remarque. Comme cas particulier, si A est un domaine de Dedekind à factorisation bornée, il en va de même pour B (il n’est donc pas nécessaire de supposer l’extension L/K séparable). Conclusion Nous sommes assez convaincus par l’introduction de l’article [2, Aubert], où l’auteur déplore que seul Jaffard ait compris Lorenzen, alors que Bourbaki, Gilmer et Larsen-McCarthy par exemple se sont enferrés dans les idéaux divisoriels qui manquent absolument de finitude. Ici nous avons enfoncé encore un peu plus le clou, en ne faisant jamais référence à l’(( ensemble )) de tous les idéaux fractionnaires ni à la théorie des ?-opérations sur cet (( ensemble )). Notons que nos anneaux à diviseurs sont exactement les anneaux avec une théorie des pgcds de type fini de [20, Lucius]. Lucius attribue la véritable paternité à Aubert tout en rectifiant une erreur. L’article de Lucius est surout consacré aux anneaux de Krull : en rajoutant une condition de type noethérien, il obtient ce qu’il appelle les anneaux avec une théorie des diviseurs, qui sont les anneaux de Krull. Il attribue à [25, Skula] le fait d’avoir 42 Anneaux à diviseurs et anneaux de Krull élucidé le rapport entre l’approche qu’il propose (que nous avons grosso modo suivie, mais dans un cadre simplifié et constructif) et la présentation du problème dans [4]. Signalons aussi les articles [1, Arnold] et [6, Clifford] dans lesquels une théorie purement multiplicative, à savoir l’étude des (( monoı̈des avec une théorie des diviseurs )) est donnée pour le cas (( Krull )), c’est-à-dire lorsqu’on demande la décomposition unique en facteurs premiers. Plus précisément, pour un monoı̈de (S, ·, 1) (( réduit )) (ce qui veut dire que 1 est le seul élément inversible) et (( régulier )) (ce qui veut dire que tout élément est simplifiable), on examine dans quelles conditions il est contenu dans un monoı̈de Σ jouissant des trois propriétés suivantes : — Σ est isomorphe à un monoı̈de (N(I) , +, 0) (i.e. un monoı̈de réduit régulier avec décomposition unique en facteurs premiers), — pour a, b in S, on a a|b dans S si, et seulement si, a|b dans Σ, — tout élément de Σ est borne inférieure d’une famille finie dans S. Autrement dit, c’est l’approche habituellement attribuée à [4] mais dans un cadre épuré (pas de condition non multiplicative) et plus général (pas d’anneau intègre, seulement un monoı̈de multiplicatif). La thèse de Clifford, reportée dans [6] consiste à généraliser les résultats d’Arnold dans le cadre de monoı̈des plus généraux. Clifford cite [26, van der Waerden] comme ayant découvert de manière indépendante essentiellement les mêmes résultats qu’Arnold, au moins pour le cadre des anneaux noethériens intègres. Quant aux travaux d’Aubert et Lucius, que nous avons repris ici dans un cadre constructif, ils consistent à laisser tomber la condition de décomposition unique en facteurs premiers et à demander seulement que Σ soit partie positive d’un groupe réticulé. Remerciements. Le travail du premier auteur a été financé par le projet ERC (FP7/20072013) / ERC grant agreement nr. 247219. Nous remercions Marco Fontana et Mohammed Zafrullah pour toutes les informations et conseils utiles concernant l’approche des PvMD dans la littérature classique, ainsi que leurs réponses à des questions délicates. Nous remercions aussi tout particulièrement Claude Quitté pour sa collaboration efficace, sans laquelle cet article n’aurait pas vu le jour. Références [1] Arnold I. (1929). Ideale in kommutativen Halbgruppen. Rec. Math. Soc. Moscow 36, 401–407. 2, 42 [2] Aubert K. (1983). Divisors of finite character. Ann. Mat. Pura Appl. 38, 327–360. 2, 5, 41 [3] Bigard A., Keimel K., Wolfenstein S. (1977). Groupes et anneaux réticulés. LNM Vol. 608. Springer-Verlag, Berlin-New York. 20 [4] Borevitch Z. I., Chafarevitch I. R. (1967). Théorie des nombres. Les Grands Classiques Gauthier-Villars. Gauthier-Villars, Paris. 2, 5, 6, 42 [5] Chang G.W. (2008). Prüfer ?-multiplication domains, Nagata rings, and Kronecker function rings. Journal of Algebra 319, 309–319. 2 [6] Clifford A. H. (1938). Arithmetic and ideal theory of commutative semigroups. Annals of Math. 39, 594–610. 2, 42 [7] Coquand T. (2014). Recursive functions and constructive mathematics. Chapitre 6 dans Bourdeau M., Dubucs J. (Eds.), Constructivity and Computability in Historical and Philosophical Perspective. Logic, Epistemology and the Unity of Science Vol. 34. Dordrecht : Springer, Heidelberg, London. 12 [8] Edwards H. M. (1990). Divisor Theory. Birkhäuser Boston, Inc., Boston, MA. 1, 33, 34 T. Coquand, H. Lombardi 43 [9] Fontana M., Loper K. (2006). An historical overview of Kronecker function rings, Nagata rings, and related star and semistar operations. p. 169–187 in Multiplicative Ideal Theory in Commutative Algebra. A tribute to the work of Robert Gilmer, Jim Brewer, Sarah Glaz, William Heinzer, and Bruce Olberding Editors, Springer, New-York. 2, 18 [10] Fontana M., Zafrullah M. (2009). A “v-operation free” approach to Prüfer vmultiplication domains. Int. J. Math. Math. Sci. Article ID 349010, 8 pages. 2 [11] Fontana M., Zafrullah M. (2011). On v-domains : a survey. In Commutative Algebra : Noetherian and non-Noetherian Perspectives (M. Fontana, S. Kabbaj, B. Olberding, and I. Swanson Editors), Springer, New York. 145–179. 2 [12] Glaz S. (2001). Finite conductor rings. Proc. Amer. Math. Soc. 129, 2833–2843. 15, 37 [13] Griffin M. (1967). Some results on v-multiplication rings. Canad. Math. 19, 710-722. 2 [14] Halter-Koch F. (2011). Characterization of Prüfer-like monoids and domains by gcd-theories, Comm. Algebra 39, 486–496. 2 [15] Jaffard P. (1960). Les systèmes d’idéaux. Dunod, Paris. 2 [16] Kang B. G. (1989). Prüfer v-multiplication domains and the ring R[X]Nv . J. Algebra. 123, 151–170. 19 [17] Krull W. (1936). Beiträge zur Arithmetik kommutativer Integritätsbereiche. II. vIdeale und vollständig ganz abgeschlossene Integritätsbereiche. Math. Z. 41, Vol. 6, 665–679. 2 [18] Lombardi H., Quitté C. (2015). Commutative algebra : constructive methods. Finite projective modules. Translated from the French. Springer, Berlin. 1, 9, 14, 15, 16, 17, 20, 23, 24, 25, 26, 27, 40 [19] Lorenzen P. (1939). Abstrakte Begründung der multiplikativen Idealtheorie. Math. Z. 45, no 6, 533–553. 2 [20] Lucius F. (1998). Rings with a theory of greatest common divisors. Manuscripta Math. 95, 117–136. 2, 41 [21] Lucius F. (1998). Kronecker’s Divisor Theory and the Generalization of Notions and Theorems of Classical Algebraic Number Theory to Krull Domains. Mathematica Gottingensis Vol. 13, 17 pages. 2 [22] Matsumura H. (1989). Commutative ring theory. Cambridge studies in advanced mathematics, Vol. 8. Cambridge University Press, Cambridge. 15, 16, 28, 36 [23] Mines R., Richman F., Ruitenburg W. A Course in Constructive Algebra. Universitext. Springer-Verlag, (1988). 39 [24] Prüfer H. (1932). Untersuchungen über Teilbarkeitseigenschaften in Körpern. J. Reine Angew. Math. 168, 1–36. 2 [25] Skula L. (1970). Divisorentheorie einer Halbgruppe. Math. Z. 114, 113–120. 41 [26] van der Waerden B. L. (1929). Zür Produktzerlegung der Ideale in ganz abgeschlossenen Ringe. Math. Annalen 101, 293–308. 2, 42 [27] Zafrullah M. (2006). What w-coprimality can do for you. Dans Multiplicative Ideal Theory in Commutative Algebra : A tribute to the work of Robert Gilmer, Jim Brewer, Sarah Glaz, William Heinzer, and Bruce Olberding Editors, Springer, New-York. 387–404 8 44 Anneaux à diviseurs et anneaux de Krull Table des matières Introduction 1 Anneaux à diviseurs Pgcd fort, ppcm et profondeur > 2 . . . . . . . . Idéaux divisoriellement inversibles . . . . . . . . Projet pour le groupe des diviseurs . . . . . . . . Le théorème de base . . . . . . . . . . . . . . . . Exprimer un diviseur comme borne supérieure de Quand le groupe des diviseurs est-il discret ? . . Diviseurs irréductibles . . . . . . . . . . . . . . . Propriétés de clôture intégrale . . . . . . . . . . . Anneaux à diviseurs de dimension 6 1 . . . . . . Anneaux de valuation discrète . . . . . . . . . . . Localisations d’un anneau à diviseurs, 1 . . . . . Un anneau à la Kronecker . . . . . . . . . . . . . Principe local-global et applications . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . diviseurs principaux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Propriétés de décomposition des groupes réticulés Groupes réticulés quotients . . . . . . . . . . . . . . . . . Un principe de recouvrements par quotients . . . . . . . . Groupes réticulés de dimension 1 . . . . . . . . . . . . . . Groupes totalement ordonnés de dimension 1 . . . . . . . Sous-groupes premiers d’un groupe réticulé . . . . . . . . Propriétés de décomposition générales . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3 4 5 6 10 12 12 14 15 16 17 18 18 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 20 20 21 22 22 23 3 Propriétés de stabilité pour les anneaux à diviseurs Localisations d’un anneau à diviseurs, 2 . . . . . . . . . . . Anneaux avec groupe des diviseurs de dimension 1 . . . . . Stabilité pour les anneaux de polynômes . . . . . . . . . . . Stabilité pour les extensions entières intégralement closes . Autres propriétés de stabilité . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 26 27 28 29 32 4 Anneaux de Krull Définition et premières propriétés . . . . . . . . . . . . . . Théorème d’approximation simultanée . . . . . . . . . . . Localisations d’un anneau de Krull, diviseurs irréductibles Stabilité pour les extensions polynomiales . . . . . . . . . Stabilité pour les extensions entières intégralement closes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 . 32 . 34 . 37 . 39 . 40 . . . . . Conclusion 41 Références 42
0math.AC
Generation, Ranking and Unranking of Ordered Trees with Degree Bounds Mahdi Amani Abbas Nowzari-Dalini Dipartimento di Informatica Università di Pisa, Pisa, Italy. m [email protected] School of Mathematics, Statistics, and Computer Science Colleague of Science, University of Tehran, Tehran, Iran. [email protected] We study the problem of generating, ranking and unranking of unlabeled ordered trees whose nodes have maximum degree of ∆. This class of trees represents a generalization of chemical trees. A chemical tree is an unlabeled tree in which no node has degree greater than 4. By allowing up to ∆ children for each node of chemical tree instead of 4, we will have a generalization of chemical trees. Here, we introduce a new encoding over an alphabet of size 4 for representing unlabeled ordered trees with maximum degree of ∆. We use this encoding for generating these trees in A-order with constant average time and O(n) worst case time. Due to the given encoding, with a precomputation of size and time O(n2 ) (assuming ∆ is constant), both ranking and unranking algorithms are also designed taking O(n) and O(n log n) time complexities. 1 Introduction A labeled tree is a tree in which each node is given a unique label. A rooted tree is a tree in which one of the nodes is distinguished from the others as the root. An ordered tree or plane tree is a rooted tree for which an ordering is specified for the children of each node. Studying combinatorial properties of restricted graphs or graphs with configurations has many applications in various fields such as machine learning and chemoinformatics. Studying combinatorial properties of restricted trees and outerplanar graphs (e.g. ordered trees with bounded degrees) can be used for many purposes including virtual exploration of chemical universe, reconstruction of molecular structures from their signatures, and the inference of structures of chemical compounds [5, 11, 14, 15, 29, 12, 40]. In this paper we study the generation of unlabeled ordered trees whose nodes have maximum degree of ∆ and for the sake of simplicity, we denote it by T ∆ tree, also we use Tn∆ to denote the class of T ∆ trees with n nodes. Chemical trees are the most similar trees to T ∆ trees. Chemical trees are the graph representations of alkanes, or more precisely, the carbon atom skeleton of the molecules of alkanes [8, 9, 13, 14, 20, 12]. The alkane molecular family is partitioned into classes of homologous molecules, that is molecules with the same numbers of carbonium and hydrogen atoms; the nth class of alkane molecular family is characterized by the formula Cn H2n+2 , n = 1, 2, ... [5] with the same numbers of carbonium and hydrogen atoms. They are usually represented by indicating the carbonium atoms and their links, omitting to represent hydrogen atoms [5]; therefore, all the nodes would have the same label; carbon (i.e., the tree is unlabeled), as shown in Figure 1 for n = 3 and n = 4. A chemical tree is defined as a tree in which no node has degree greater than 4 [12, 14, 13, 9, 8, 20], chemical trees are also considered to be unlabeled [13, 9, 8, 20]. Therefore, T ∆ tree can be considered as a generalization of chemical trees to unlabeled ordered trees whose nodes have maximum degree of ∆ instead of 4. Generation, ranking and unranking of trees are very basic problems in computer science and discrete mathematics [39]. In general, for any combinatorial object of size n, we can define a variety of orderings. C.A. Muñoz and J. A. Pérez (Eds.) : Developments in Computational Models EPTCS 204, 2016, pp. 31–45, doi:10.4204/EPTCS.204.4 c M. Amani, A. Nowzari-Dalini This work is licensed under the Creative Commons Attribution License. 32 Generation, Ranking and Unranking of Ordered Trees with Degree Bounds Figure 1: Left: C3 H8 propane, middle and right: C4 H10 butanes. Since we study trees, let’s consider an arbitrary class of trees of size n (n nodes) showed by Tn (e.g. semichemical trees of size n), the elements of this set (Tn ) can be listed based on any defined ordering. Two such orderings for the trees are A-order and B-order, which will be explained in the next section. By having Tn and an ordering (e.g. A-order or B-order), next, rank, and unrank functions are defined as follows. For a given tree T ∈ Tn , the next function gives the successor tree of T with respect to the defined ordering, the ‘position’ of tree T in Tn is called rank, the rank function determines the rank of T ; the inverse operation of ranking is unranking, for a position r, the unrank function gives the tree T corresponding to this position. A generation algorithm, generates all the elements in Tn with respect to the given ordering (starting from the first tree, then repeating the next function until producing the last tree) [39]. In most of the tree generation algorithms, a tree is represented by an integer or an alphabet sequence called codeword, hence all possible sequences of this representation are generated. This operation is called tree encoding. Basically, the uniqueness of the encoding, the length of the encoding, and the capability of constructing the tree from its representation, which is called decoding, are essential considerations in the design of the tree encoding schema [39]. Many papers have been published earlier in the literature for generating different classes of trees. For example we can mention the generation of binary trees in [26, 22, 30, 2, 3, 4, 36], k-ary trees in [27, 10, 31, 19, 37, 18, 17, 1, 35], rooted trees in [7, 32], trees with n nodes and m leaves in [24, 28], neuronal trees in [25], and AVL trees in [21]. On the other hand, many papers have thoroughly investigated basic combinatorial features of chemical trees [12, 14, 13, 9, 8, 20, 33]. More related to our work, in [15] a coding for chemical trees without the generation algorithm, and in [5] the enumeration of chemical trees and in [11, 29] the enumeration of tree-like chemical graphs have been presented. Hendrickson and Parks in [16] investigated the enumeration and the generation of carbon skeletons which can have cycles and are not necessarily trees. The work most related to our paper is an algorithm for the generation of certain classes of trees such as chemical trees in [6] with no ranking or unranking algorithm. In that paper, all chemical trees with n nodes are generated from the complete set of chemical trees with n − 1 nodes, the redundant generations are possible and they needed to minimize the possible redundancy. The problem of enumeration of ordered trees were also studied in [38] and the generation of different ordered trees (with no bounds on the degrees of the nodes) were studied in [39]. In [40], a generation algorithm with constant average delay time but with no ranking or unranking algorithms was given for all unrooted trees of n nodes and a diameter at least d such that the degree of each node with distance k from the center of the tree is bounded by a given function. In [34] all unrooted unlabeled trees have been generated in constant average time with no ranking or unranking algorithms. Nakano and Uno in [23] gave an algorithm to generate all rooted unordered trees with exactly n nodes and diameter d in constant delay time. Up to now, to our knowledge, no efficient generation, ranking or unranking algorithms are known for either ‘chemical trees’ or ‘ordered trees with bounded degrees’. M. Amani, A. Nowzari-Dalini 33 Figure 2: A T ∆ tree with 13 nodes. The remaining of the paper is organized as follows. Section 2 introduces the definitions and notions that are used further. Our new encoding for Tn∆ trees is presented in Section 3. The size of our encoding is n while the alphabet size is always 4. Based on the presented encoding, a new generation algorithm with constant average time and O(n) worst case time is given Section 4. In this algorithm, Tn∆ trees are generated in A-order. Ranking and unranking algorithms are also designed in Section 5 with O(n) and O(n log n) time complexities, respectively. The presented ranking and unranking algorithms need a precomputation of size and time O(n2 ) (assuming ∆ is constant). 2 Definition As mentioned before, the nth class of alkane molecular family is characterized by the formula Cn H2n+2 , n = 1, 2, ... [5] with the same numbers of carbonium and hydrogen atoms. They are usually represented by indicating the carbonium atoms and their links, omitting to represent hydrogen atoms. Therefore, a chemical tree is a tree in which no node has degree greater than 4 [12, 8, 20]. We study the class of ordered trees whose nodes have maximum degree of ∆ and for the sake of simplicity, we denote it by T ∆ . T ∆ can be considered as a generalized version of chemical trees. Formally, a T ∆ tree T is defined as a finite set of nodes such that T has a root r, and if T has more than one node, r is connected to j ≤ ∆ subtrees T1 , T2 , . . . , T j which each one of them is also recursively a T ∆ tree and by Tn∆ we represent the class of T ∆ trees with n nodes. An example of a T ∆ tree is shown in Figure 2. As mentioned earlier, in most of the tree generation algorithms, a tree is represented by an integer or an alphabet sequence called codeword, hence, all possible sequences of this representation are generated. In general, on any class of trees, we can define a variety of ordering for the set of trees. Classical orderings on trees are A-order and B-order which are defined as follows [30, 39]. Definition 1 Let T and T 0 be two trees in T ∆ and k = max{deg(T ), deg(T 0 )}, we say that T is less than T 0 in A-order (T ≺A T 0 ), iff • |T | < |T 0 |, or • |T | = |T 0 | and for some 1 ≤ i ≤ k, T j =A T j0 for all j = 1, 2, . . . , i − 1 and Ti ≺A Ti0 ; where |T | is the number of nodes in the tree T and deg(T ) is the degree of the root of T . Definition 2 Let T and T 0 be two trees in T ∆ and k = max{deg(T ), deg(T 0 )}, we say that T is less than T 0 in B-order (T ≺B T 0 ), iff • deg(T ) < deg(T 0 ), or 34 Generation, Ranking and Unranking of Ordered Trees with Degree Bounds Figure 3: An example of a tree T ∈ Tn∆ (for ∆ ≥ 4). Its codeword is “s`s`rmsr`msmr”. • deg(T ) = deg(T 0 ) and for some 1 ≤ i ≤ k, T j =B T j0 for all j = 1, 2, . . . , i − 1 and Ti ≺B Ti0 . Our generation algorithm, which is given in the Section 4, produces the sequences corresponding to Tn∆ trees in A-order. For a given tree T ∈ Tn∆ , the generation algorithm generates all the successor trees of T in Tn∆ ; the position of tree T in Tn∆ is called rank, the rank function determines the rank of T ; the inverse operation of ranking is unranking. These functions can be also employed in any random generation of Tn∆ trees, for example. 3 The encoding schema The main point in generating trees is to choose a suitable encoding to represent them, and generate their corresponding codewords. Regarding the properties of Tn∆ , we present our new encoding. For any tree T ∈ Tn∆ , the encoding over 4 letters {s, `, m, r} is defined as follows. The root of T is labeled by s, and for any internal node, if it has only one child, that child is labeled by s, otherwise the leftmost child is labeled by `, and the rightmost child is labeled by r, and the children between the leftmost and the rightmost children (if exist) are all labeled by m. Nodes are labeled in the same way for any internal node in each level recursively, and by a pre-order traversal of T , the codeword will be obtained (one can say the labels ` and r operate as left and right parenthesis to define the fingerprint of a subtree in the codewords, and s is used when the left and right bounds are the same). This labeling is illustrated in Figure 3. Using this encoding, the 4-letters alphabet codeword corresponding to the first and last Tn∆ trees in A-order are respectively “s`m∆−2 r`m∆−2 r . . . `m(n mod ∆)−2 r” and “sn ” which are shown in the Figure 4-a and Figure 4-b. Now, we prove the validity of this encoding for Tn∆ trees (one-to-one correspondence). Definition 3 Suppose that {s, `, m, r}∗ is the set of all sequences with alphabet of s, m, `, r and let A be a proper subset of {s, `, m, r}∗ , then we call the set A a CodeSet∆ iff A satisfies the following properties: 1. ε ∈ A (ε is a string of length 0), 2. ∀x ∈ A : sx ∈ A, 3. ∀ x1 , x2 , . . . , xi ∈ A, and 2 ≤ i ≤ ∆: `x1 mx2 mx3 . . . mxi−1 rxi ∈ A. Now we show that a valid codeword is obtained by the concatenation of the character s and each element of CodeSet∆ . Theorem 1 Let A be the “CodeSet∆ ” and δ ∈ A. Let C be a codeword obtained by the concatenation of character s and δ (denoted by sδ ). There is a one-to-one correspondence between C and a T ∆ tree. M. Amani, A. Nowzari-Dalini 35 Figure 4: a) The first Tn∆ tree in A-order. b) The last Tn∆ tree in A-order. Figure 5: T ∆ trees encoded by C = sx and C = s`x1 mx2 . . . mx j−1 rx j . Proof. It can be proved by induction on the length of C. Initially for a codeword of length equal to 1, the proof is trivial. Assume that any codeword obtained in the above manner with length less than n encodes a unique T ∆ tree. For a given codeword with length n, because of that concatenation of s and δ , we have: 1. C = sx, such that x ∈ A, or 2. C = s`x1 mx2 . . . mx j−1 rx j , such that xi ∈ A, ∀1 ≤ i ≤ j ≤ ∆. For the first case by induction hypothesis, x is a valid codeword of a T ∆ tree T ; therefore, sx is another codeword corresponding to another T ∆ tree by adding a new root to the top of T . This tree is unique and shown in Figure 5-a. For the second case, by induction hypothesis and that concatenation of s and δ , each sxi for 1 ≤ i ≤ j is a valid codeword for a T ∆ tree; therefore, with replacement of ‘s with ` in sx1 ’ and ‘s with m in sxi for 2 ≤ i ≤ j − 1’ and finally ‘s with r in sx j ’, we can produce `x1 , mx2 , . . . mx j−1 , rx j codewords. Now they all are subtrees of a T ∆ tree whose codeword is C = s`x1 mx2 . . . mx j−1 rx j (add a new root and connect it to each one of them). This tree is unique and shown in Figure 5-b.  For a Tn∆ tree, this encoding needs only 4 alphabet letters and has length n. This encoding is simple and powerful, so it can be used for many other applications besides the generation algorithm. In the next section, we use it to generate T ∆ trees in A-order. 4 The generation algorithm In this section, we present an algorithm that generates the successor sequence of a given codeword of a Tn∆ tree in A-order. For generating the successor of a given codeword C corresponding to a Tn∆ tree T , 36 Generation, Ranking and Unranking of Ordered Trees with Degree Bounds the codeword C is scanned from right to left. Scanning the codeword C from right to left, corresponds to a reverse pre-order traversal of T . First we describe how this algorithm works directly on T , then we present the pseudocode of the algorithm. For generating the successor of a given Tn∆ tree T we traverse the tree in reverse pre-order as follows. 1. Let v be the last node of T in pre-order traversal. 2. If v doesn’t have any brothers, then • repeat {v = parent of v.} until v has at least one brother or v be the root of tree T . • If v = root, then the tree is the last tree in A-order and there is no successor. 3. If v has at least one brother (obviously it has to be a left brother), delete one node from the subtree of v and insert this node into its left brother’s subtree, then rebuild both subtrees (each one as a first tree with corresponding nodes in A-order). The pseudo code of this algorithm for codewords corresponding to Tn∆ trees is presented in Figure 6. In this algorithm, the codeword is stored in a global array C so it is used both as the input and the output codewords (this will be useful to generate all the codewords in constant average time); therefore, when the algorithms stops, C is updated to the successor codeword. In this algorithm, n shows the size of the codeword (the number of nodes of the tree corresponded to C), ST size is a variable contains the size of the subtree rooted by node corresponded to C[i] and SNum holds the number of consecutive visited s characters. This algorithm also calls two functions updateChildren(i,ChNum) presented in Figure 7, and updateBrothers(i,ChNum) presented in Figure 8. The procedure updateChildren(i,ChNum) regenerates the codeword corresponding to the children of an updated node and the procedure updateBrothers(i,ChNum) regenerates the codeword corresponding to the brothers of a node with regard to the maximum degree ∆ for each node. In these algorithms, C is the global array of characters storing the codeword, i is the position of the current node in the array C. In updateChildren(i,ChNum), ChNum is the number of children of C[i] to regenerate the corresponding codeword and in updateBrothers(i,ChNum), ChNum is the number of its brothers, instead. Each node has at most ∆ children, so NChild is a global array which NChild[i] stores the number of children of the parent of the current node (current node is the node corresponding to C[i]) so it wont exceed ∆, i.e., NChild[i] holds the number of left brothers of the node corresponding to C[i] including itself. Theorem 2 The algorithm Next presented in Figure 6 has a worst case time complexity of O(n) and an average time complexity of O(1). Proof. In the algorithm given in Figure 6, we scan the sequence from right to left (corresponding to the reverse pre-order traversal of the corresponding tree as discussed before). Inside or after every loop of the algorithm, the variable Current (which keeps track of the node we currently process), decreases equivalently to the number of iterations, and it can not be decreased more than n times; therefore, the worst case time complexity of the algorithm is O(n). For computing the average time, it should be noted that during the scanning process, every time we visit the characters s, m or `, the algorithm terminates, so we define Sin,∆ as the number of codewords of Tn∆ trees whose last character s, m or ` has distance i from the end, and Sn,∆ as the total number of Tn∆ trees. Obviously we have: n Sn,∆ = ∑ Sin,∆ . i=1 We define Hn as the average time of generating all codewords of Tn∆ trees, (1) M. Amani, A. Nowzari-Dalini 37 Function AOrder-Next(n : integer); var i,Current, ST size, SNum: integer; f inished, RDeleted: boolean; begin Current := n; ST Size := 0; RDeleted := false; f inished := false; while ( (C[Current] = 0 s0 ) & (Current ≥ 1) ) do ST Size + +; Current − −; if (Current = 0) then return (no successor); while (not f inished) do begin ST Size + +; switch C[Current] of case0 r0 : i := Current − 1; SNum := 0; while (C[i] = 0 s0 ) do SNum := SNum + 1; i − −; if (C[i] = 0 r0 ) then begin updateBrothers ( Current , ST Size); Current := i; ST Size := SNum; end; if ( (C[i] = 0 m0 ) or (C[i] = 0 `0 ) ) then begin if (ST Size = 1) then RDeleted := true; if (ST Size > 1) then begin ST Size − −; updateBrothers(Current + 1, ST Size); Current := i; ST Size := SNum + 1; end; end; case 0 m0 : if (RDeleted = true) then C[Current] := 0 r0 ; updateChildren( Current + 1, ST Size − 1); f inished:= true; case 0 `0 : if (RDeleted = true) then C[Current] := 0 s0 ; updateChildren( Current + 1, ST Size − 1); f inished := true; end; end; Figure 6: Algorithm for generating the successor codeword for Tn∆ trees in A-order. Hn ≤ (k/Sn,∆ ) ∑ni=1 iSin,∆ , ≤ (k/Sn,∆ ) ∑nj=1 ∑ni= j Sin,∆ . Where k is a constant value. On the other hand, consider that for Sn+1,∆ we have two cases, in the first j case, the last character s, m or ` is a leaf and in the second one, it is not. Therefore, Sn+1,∆ is greater than j or equal to just the first case, and in that case by removing the node corresponding to the ‘last character s, m or ` of the codeword’, the remaining tree will have a corresponding codeword belongs to exactly one of Skn,∆ cases, for j ≤ k ≤ n. By substituting k and i we have: Sn+1,∆ ≥ ∑ni= j Sin,∆ . j Therefore, for Hn we have: 38 Generation, Ranking and Unranking of Ordered Trees with Degree Bounds procedure updateChildren( i,ChNum: integer); begin while (ChNum > 0) do begin if ChNum = 1 then begin C[i] := 0 s0 ; NChild[i] := 1; i + +; ChNum − −; end; if ChNum > 1 then begin C[i] := 0 `0 ; NChild[i] := 1; i + +; ChNum − −; while ( (NChild[i] < (∆ − 1)) & (ChNum > 1) ) do begin C[i] := 0 m0 ; NChild[i] := NChild[i − 1] + 1; i + +; ChNum − −; end; C[i] := 0 r0 ; NChild[i] := NChild[i − 1] + 1; i + +; ChNum − −; end end; end; Figure 7: Algorithm for updating the children. Procedure updateBrothers( i,ChNum: integer); begin if ChNum = 1 then begin C[i] := 0 r0 ; NChild[i] := NChild[i − 1]; ChNum − −; end; if ChNum > 1 then begin C[i] := 0 m0 ; ChNum − −; i + +; while ( (NChild[i] < (∆ − 1) ) & (ChNum > 1) ) do begin C[i] := 0 m0 ; NChild[i] := NChild[i − 1] + 1; i + +; ChNum − −; end; C[i] := 0 r0 ; NChild[i] := NChild[i − 1] + 1; i + +; ChNum − −; updateChildren(i,ChNum); end; end; Figure 8: Algorithm for updating the neighbors. Hn ≤ (k/Sn,∆ ) ∑nj=1 Sn+1,∆ , j then by using Equation (1), Hn ≤ kSn+1,∆ /Sn,∆ . Finally from [39] we know that the total number of ordered trees is growing same as Catalan number, while Tn∆ is a subset of ordered trees can not grow faster than that, this guarantees that for large enough values of n, Sn+1,∆ /Sn,∆ = O(1). Therefore, Hn ≤ kO(1) = O(1).  It should be mentioned that this constant average time complexity is without considering the input or the output time. M. Amani, A. Nowzari-Dalini 39 Figure 9: Tn∆ tree whose first subtree has exactly m nodes and its root has maximum degree of d. 5 Ranking and Unranking algorithms By designing a generation algorithm in a specific order, the ranking of algorithm is desired. In this section, ranking and unranking algorithms for these trees in A-order will be given. Ranking and unranking algorithms usually use a precomputed table of the number of a subclass of given trees with some specified properties to achieve efficient time complexities; these precomputations will be done only once and n,∆ stored in a table for further use. Let Sn,∆ be the number of Tn∆ trees, Sm,d be the number of Tn∆ trees whose ∆ first subtree has exactly m nodes and its root has maximum degree of d, and Dn,∆ m,d be the number of Tn trees whose first subtree has at most m nodes and its root has maximum degree of d. Theorem 3 n,∆ m • Dn,∆ m,d = ∑i=1 Si,d , n,∆ • Sn,∆ = ∑n−1 i=1 Si,∆ .  Proof. The proof is trivial. Theorem 4 n,∆ m+1,∆ Sm,d = Sm,1 × n−m−1 ∑ n−m,∆ (Si,d−1 ). i=1 Proof. Let T be a Tn∆ tree whose first subtree has exactly m nodes and its root has maximum degree of d; by the definition and as shown in the Figure 9, the number of the possible cases for the first subtree is m+1,∆ n−m,∆ Sm,1 and the number of cases for the other parts of the tree is ∑n−m−1 (Si,d−1 ) (by removing the first i=1 subtree from T ). Therefore, we have: m+1,∆ n,∆ Sm,d = Sm,1 × n−m−1 ∑ n−m,∆ (Si,d−1 ). i=1  Now, let T be a Tn∆ tree whose subtrees are defined by T1 , T2 , . . . , Tk and for 1 ≤ i ≤ k ≤ ∆ : |Ti | = ni and ∑ki=1 ni = n − 1. One way to compute the rank of tree T is to enumerate the number of trees generated 40 Generation, Ranking and Unranking of Ordered Trees with Degree Bounds before T . Let Rank(T,n) be the rank of T . The number of T ∆ trees whose first subtree is smaller than T1 is equal to: n1 −1 ∑ n,∆ Si,∆ + (Rank(T1 , n1 ) − 1) × i=1 n−n1 n−n ,∆ , ∑ Si,∆−1 1 i=1 and the number of T ∆ trees whose first subtree is equal to T1 but the second subtree is smaller than T2 is equal to: n2 −1 ∑ n−n1 ,∆ Si,∆−1 + (Rank(T2 , n2 ) − 1) × n−n1 −n2 i=1 ∑ n−n1 −n2 ,∆ Si,∆−2 . i=1 Similarly, the number of T ∆ trees whose first ( j − 1) subtrees are equal to T1 , T2 , . . . , T j−1 and the jth subtree is smaller than T j is equal to: n j −1 ∑ j j−1 (n−∑`=1 n` ),∆ Si,∆− j+1 + (Rank(T j , n j ) − 1) × i=1 n−∑`=1 n` ∑ n−∑ j Si,∆− `=1 j n` ,∆ . i=1 Therefore, regarding enumerations explained above, for given tree T ∈ Tn∆ whose subtrees are defined by T1 , T2 , . . . , Tk , we can write: Rank(T, 1) = 1, k n j −1 Rank(T, n) = 1 + ∑ ( ∑ j j−1 (n−∑`=1 n` ),∆ Si,∆− j+1 + (Rank(T j , n j ) − 1) j=1 i=1 n−∑`=1 n` ∑ (n−∑ j Si,∆− j`=1 n` ),∆ ). i=1 n,∆ m Hence, from Theorem 3, by using Dn,∆ m,d = ∑i=1 Si,d , we have: Rank(T, 1) = 1, k (n−∑ j−1 n ),∆ j (n−∑`=1 n` ),∆ ). j (n−∑`=1 n` ),(∆− j) `=1 ` Rank(T, n) = 1 + ∑ (D(n j −1),(∆− j+1) + (Rank(T j , n j ) − 1)D j=1 To achieve the most efficient time for ranking and unranking algorithms, we need to precompute n,∆ Dn,∆ m,d and store it for further use. Assuming ∆ is constant, to store Dm,d values, a 3-dimensional table denoted by D[n, m, d] is enough, this table will have a size of O(n × n × ∆) = O(n2 ) and can be computed using Theorems 3 and 4 with time complexity of O(n × n × ∆) = O(n2 ). To compute the rank of a codeword stored in array C, we also need an auxiliary array N[i] which keeps the number of nodes in the subtree whose root is labeled by C[i] and corresponds to ni in the above formula. This array can be computed by a pre-order traversal or a level first search (DFS) algorithm just once before we call the ranking algorithm. The pseudo code for ranking algorithm is given in Figure 10. In this algorithm, Beg is the variable that shows the positions of the first character in the array C whose rank is being computed (Beg is initially set to 1), and Fin is the variable that returns the position of the last character of C. Now the time complexity of this algorithm is discussed. Obviously computing the array N[i] takes O(n). Hence we discuss the complexity of ranking algorithm which was given in Figure 10. Theorem 5 The ranking algorithm has the time complexity of O(n). M. Amani, A. Nowzari-Dalini 41 Function Rank( Beg : integer; var Fin: integer) ; Var R, Point, PointFin, j, Nodes, n: integer; begin n := N[Beg]; if (n = 1) then begin Fin := Beg; return(1) end; else begin Point := Beg + 1; R := 0; Nodes := 0; j := 1; while ( Nodes < n ) do begin R := R + D[n − Nodes, N[Point] − 1, ∆ − j + 1]+ (Rank(Point, PointFin) − 1)× D[(n − Nodes − N[Point]), (n − Nodes − N[Point]), ∆ − j]; Nodes := Nodes + N[Point]; j:=j+1; Point := PointFin + 1; end; Fin := Point − 1; return( R + 1); end; end Figure 10: Ranking algorithm for Tn∆ trees. Proof. Let T be a Tn∆ tree whose subtrees are defined by T1 , T2 , . . ., Tk and for 1 ≤ i ≤ k ≤ ∆ : |Ti | = ni and ∑ki=1 ni = n − 1, and let T (n) be the time complexity of the ranking algorithm, then we can write: T (n) = T (n1 ) + T (n2 ) + . . . + T (nk ) + αk, where α is a constant and αk is the time complexity of the non-recursive parts of the algorithm. By using a simple induction, we prove that if β is a value greater than α then T (n) ≤ β n. We have T (1) ≤ β . We assume T (m) ≤ β (m − 1) for each m < n; therefore, T (n) ≤ β (n1 − 1) + β (n2 − 1) + . . . + β (nk − 1) + αk, T (n) ≤ β (n1 + . . . + nk − k) + αk, T (n) ≤ β n − β k + αk ≤ β n, So the induction is complete and T (n) ≤ β n = O(n).  If a and b are integer numbers, let (a div b) and (a mod b) denote integer division and remainder of the division of a and b, respectively (a = (a div b) × b + (a mod b)). Before giving the description of the unranking algorithm, we have to define two new operators, namely (a div+ b) and (a mod + b) as follows. • If b | a, then (a div+ b) = (a div b) − 1, and (a mod + b) = b. • If b - a, then (a div+ b) = (a div b), and (a mod + b) = (a mod b). For unranking algorithm, we also need the values of Sn,∆ , these values can be stored in an array of size n, denoted by S[n] (we assume ∆ is constant). The unranking algorithm is the reverse manner of ranking algorithm, this algorithm is given in Figure 11. In this algorithm, the rank R is the main input, Beg is 42 Generation, Ranking and Unranking of Ordered Trees with Degree Bounds Function UnRank ( R, Beg, n: integer; Root: char); var Point, i, t, ChildNum: integer; begin if ( (n = 0) or (R = 0) ) then return(Beg − 1) else begin if (n = 1) then begin C[Beg] := Root; return(Beg); end; else begin C[Beg] := Root; Point := Beg + 1; Root := 0 `0 ; ChildNum := 0; while (n > 0) do begin ChildNum + +; find the smallest i that D[n, i, ∆ −ChildNum + 1] ≥ R; R := R − D[n, i − 1, ∆ −ChildNum + 1]; if (n − i)= 1 then if (ChildNum = 1) then Root := 0 s0 ; else Root := 0 r0 ; t := S[n]; Point := UnRank( (div+ (R,t)) + 1, Point, i, Root ) +1; R := mod + (R,t); n := n − i; Root := 0 m0 ; end; return(Point − 1); end; end; end Figure 11: Unranking algorithm for Tn∆ trees. the variable to show the position of the first character in the global array C and initially is set to 1. The generated codeword will be stored in global array C. The variable n is the number of nodes and Root stores the character corresponding to the node we consider for the unranking procedure. For the next character, we have two possibilities. If the root is r or s, then the next character, if exists, will be ` or s (based on the number of root’s children). If the root is m or `, we have again two possible cases: if all the nodes of the current tree are not produced, then the next character is m, otherwise, the next character will be r. Theorem 6 The time complexity of the unranking algorithm is O(n log n). Proof. Let T be a Tn∆ tree whose subtrees are defined by T1 , T2 , . . ., Tk and for 1 ≤ i ≤ k ≤ ∆ : |Ti | = ni and ∑ki=1 ni = n − 1, and let T (n) be the time complexity of the unranking algorithm. With regards to the unranking algorithm, the time complexity of finding j such that D[n, j, ∆ −ChildNum + 1] ≥ R for each Ti of T is O(log ni ); therefore, T (n) = O(log n1 + log n2 + . . . + log nk ) + T (n1 ) + T (n2 ) + . . . + T (nk ). We want to prove that T (n) = O(n log n). In order to obtain an upper bound for T (n) we do as M. Amani, A. Nowzari-Dalini 43 follows. First we prove this assumption for k = 2 then we generalize it. For k = 2 we have T (n) = O(log(n1 ) + log(n2 )) + T (n1 ) + T (n2 ). Let n1 = x then we can write the above formula as T (n) = T (x) + T (n − x) + O(log(x) + log(n − x)) = T (x) + T (n − x) +C0 log(n). For proving that T (n) = O(n log(n)), we use an induction on n. We assume T (m) ≤ Cm log(m) for all m ≤ n, thus in T (n) we can substitute T (n) ≤ C × x log(x) +C × (n − x) log(n − x) +C0 log(n). Let f (x) = C × x log(x) + C × (n − x) log(n − x), now the maximum value of f (x) with respect to x and by considering n as a constant value can be obtained by evaluating the derivation of f (x) which is f 0 (x) = C × log(x) − C × log(n − x). Thus if f 0 (x) = 0 we get x = (n − 1)/2 and by computing f (1), f (n − 2) and f ((n − 1)/2) we have: f (1) = f (n − 2) = C × (n − 2) log(n − 2), f ((n − 1)/2) = 2C × ((n − 1)/2) × log((n − 1)/2) < C × (n − 2) log(n − 2), so the maximum value of f (x) is equal to C × (n − 2) log(n − 2); therefore, T (n) ≤ C × (n − 2) log(n − 2) +C0 × log(n). It is enough to assume C = C0 , then T (n) ≤ C × (n − 2) log(n) +C × log(n) ≤ C × n log(n). Now, for generalizing the above proof and proving T (n) = O(n log n), we should find the maximum of the function f (n1 , n2 , . . . , nk ) = ∏ki=1 ni . By the Lagrange method we prove that the maximum value of f (n1 , n2 , . . . , nk ) is equal to ( nk )k . Then δδ kf = ( nk )k (ln( nk ) − 1) = 0, and ln( nk ) − 1 = 0, n n k = e ⇒ k = e, n so the maximum value of f (n1 , n2 , . . . , nk ) is equal to e e . We know that: T (n) = O(log n1 + log n2 + . . . + log nk ) + T (n1 ) + T (n2 ) + . . . + T (nk ), T (n) = O(log(∏ki=1 ni ) + ∑ki=1 T (ni ), n T (n) < O(log(n e )) + ∑ki=1 T (ni ), T (n) < O( ne log e) = O(n) + ∑ki=1 T (ni ). Finally, by using induction, we assume that for any m < n we have T (m) < β m log m, therefore: T (n) = O(n) + ∑ki=1 T (ni ), T (n) < O(n) + ∑ki=1 β O(ni log ni ), T (n) < O(n) + β log(∏ki=1 (nni i )), T (n) < O(n) + O(log(nn )), T (n) = O(n log n). Hence, the proof is complete.  6 Conclusion In this paper, we studied the problem of generation, ranking and unranking of ordered trees of size n and maximum degree ∆ which are a generalization of chemical trees; we presented an efficient algorithm for the generation of these trees in A-order with an encoding over 4 letters and size n. Also two efficient ranking and unranking algorithms were designed for this encoding. The generation algorithm has O(n) time complexity in worst case and O(1) in average case. The ranking and unranking algorithms have O(n) and O(n log n) time complexity, respectively. The presented ranking and unranking algorithms use a precomputed table of size O(n2 ) (assuming ∆ is constant). All presented algorithms at this paper are also implemented. For the future works, generating this class of trees in B-order and minimal change ordering, and finding some explicit relations for counting them, are major unresolved problems. 44 Generation, Ranking and Unranking of Ordered Trees with Degree Bounds References [1] A. Ahmadi-Adl, A. Nowzari-Dalini & H. Ahrabian (2011): Ranking and unranking algorithms for loopless generation of t-ary trees. Logic Journal of IGPL 19(1), pp. 33–43, doi:10.1093/jigpal/jzp097. [2] H. Ahrabian & A. Nowzari-Dalini (1998): On the generation of binary trees from (0–1) codes. International journal of computer mathematics 69(3-4), pp. 243–251, doi:10.1080/00207169808804721. [3] H. Ahrabian & A. Nowzari-Dalini (1999): On the generation of binary trees in A-order. International journal of computer mathematics 71(3), pp. 351–357, doi:10.1080/00207169908804813. [4] H. Ahrabian & A. Nowzari-Dalini (2005): Parallel generation of binary trees in A-order. Parallel Computing 31(8), pp. 948–955, doi:10.1016/j.parco.2005.06.002. [5] R. Aringhieri, P. Hansen & F. Malucelli (2003): Chemical trees enumeration algorithms. Quarterly Journal of the Belgian, French and Italian Operations Research Societies 1(1), pp. 67–83, doi:10.1007/s10288-0020008-9. [6] T. S. Balaban, P. A. Filip & O. Ivanciuc (1992): Computer generation of acyclic graphs based on local vertex invariants and topological indices. Derived canonical labelling and coding of trees and alkanes. Journal of Mathematical Chemistry 11(1), pp. 79–105, doi:10.1007/BF01164196. [7] T. Beyer & S. M. Hedetniemi (1980): Constant time generation of rooted trees. SIAM Journal on Computing 9(4), pp. 706–712, doi:10.1137/0209055. [8] G. Caporossi, I. Gutman & P. Hansen (1999): Variable Neighborhood Search for Extremal Graphs: IV: Chemical Trees with Extremal Connectivity Index. Computers & Chemistry 23(5), pp. 469–477, doi:10.1016/S0097-8485(99)00031-5. [9] A. A. Dobrynin & I. Gutman (1999): The Average Wiener Index of Trees and Chemical Trees. Journal of Chemical Information and Computer Sciences 39(4), pp. 679–683, doi:10.1021/ci980158r. [10] M. C. Er (1992): Efficient generation of k-ary trees in natural order. The Computer Journal 35(3), pp. 306–308, doi:10.1093/comjnl/35.3.306. [11] H. Fujiwara, J. Wang, L. Zhao, H. Nagamochi & T. Akutsu (2008): Enumerating Treelike Chemical Graphs with Given Path Frequency. Journal of Chemical Information and Modeling 48(7), pp. 1345–1357, doi:10.1021/ci700385a. [12] I. Gutman (1987): Graphs and graph polynomials of interest in chemistry, pp. 177–187. Springer Berlin Heidelberg, doi:10.1007/3-540-17218-1. [13] I. Gutman, P. Hansen & H. Mélot (2005): Variable Neighborhood Search for Extremal Graphs. 10. Comparison of Irregularity Indices for Chemical Trees. Journal of Chemical Information and Modeling 45(2), pp. 222–230, doi:10.1021/ci0342775. [14] I. Gutman & O. E. Polansky (1986): Mathematical concepts in organic chemistry. Springer Berlin Heidelberg, doi:10.1007/978-3-642-70982-1. [15] P. Hansen, B. Jaumard, C. Lebatteux & M. Zheng (1994): Coding Chemical Trees with the Centered N-tuple Code. Journal of Chemical Information and Computer Sciences 34(4), pp. 782–790, doi:10.1021/ci00020a010. [16] J. B. Hendrickson & C. A. Parks (1991): Generation and enumeration of carbon skeletons. Journal of Chemical Information and Computer Sciences 31(1), pp. 101–107, doi:10.1021/ci00001a018. [17] S. Heubach, N. Y. Li & T. Mansour (2008): Staircase tilings and k-Catalan structures. Discrete Mathematics 308(24), pp. 5954–5964, doi:10.1016/j.disc.2007.11.012. [18] J. F Korsh (2005): Generating t-ary trees in linked representation. The Computer Journal 48(4), pp. 488–497, doi:10.1093/comjnl/bxh110. [19] J. F. Korsh & P. LaFollette (1999): Loopless generation of Gray codes for k-ary trees. Information processing letters 70(1), pp. 7–11, doi:10.1016/S0020-0190(99)00035-6. M. Amani, A. Nowzari-Dalini 45 [20] M. Lepovic & I. Gutman (1998): A collective property of trees and chemical trees. Journal of chemical information and computer sciences 38(5), pp. 823–826, doi:10.1021/ci980004b. [21] L. Li (1986): Ranking and unranking of AVL-trees. SIAM Journal on Computing 15(4), pp. 1025–1035, doi:10.1137/0215073. [22] J. M. Lucas, D. R. Vanbaronaigien & F. Ruskey (1993): On rotations and the generation of binary trees. Journal of Algorithms 15(3), pp. 343–366, doi:10.1006/jagm.1993.1045. [23] S. Nakano & T. Uno (2005): Constant time generation of trees with specified diameter. In: 30th International Workshop on Graph-Theoretic Concepts in Computer Science, Springer, pp. 33–45, doi:10.1007/978-3-54030559-03. [24] J. M. Pallo (1987): Generating trees with n nodes and m leaves. International journal of computer mathematics 21(2), pp. 133–144, doi:10.1080/00207168708803562. [25] J. M. Pallo (1990): A simple algorithm for generating neuronal dendritic trees. Computer methods and programs in biomedicine 33(3), pp. 165–169, doi:10.1016/0169-2607(90)90038-B. [26] J. M. Pallo & R. Racca (1985): A note on generating binary trees in A-order and B-order. International Journal of Computer Mathematics 18(1), pp. 27–39, doi:10.1080/00207168508803477. [27] F. Ruskey (1978): Generating t-ary trees lexicographically. SIAM Journal on Computing 7(4), pp. 424–439, doi:10.1137/0207034. [28] E. Seyedi-Tabari, H. Ahrabian & A. Nowzari-Dalini (2010): A new algorithm for generation of different types of RNA. International Journal of Computer Mathematics 87(6), pp. 1197–1207, doi:10.1080/00207160802140049. [29] M. Shimizu, H. Nagamochi & T. Akutsu (2011): Enumerating tree-like chemical graphs with given upper and lower bounds on path frequencies. BMC Bioinformatics 12(14), pp. 1–9, doi:10.1186/1471-2105-12S14-S3. [30] V. Vajnovszki & J. M. Pallo (1994): Generating binary trees in A-order from codewords defined on a four-letter alphabet. Journal of Information and Optimization Sciences 15(3), pp. 345–357, doi:10.1080/02522667.1994.10699193. [31] V. Vajnovszki & J. M. Pallo (1997): Ranking and unranking k-ary trees with a 4 k-4 letter alphabet. Journal of Information and Optimization Sciences 18(2), pp. 271–279, doi:10.1080/02522667.1997.10699333. [32] H. S. Wilf & N. A. Yoshimura (1989): Ranking rooted trees, and a graceful application. Annals of the New York Academy of Sciences 576(1), pp. 633–640, doi:10.1111/j.1749-6632.1989.tb16444.x. [33] P. Willett, J. M. Barnard & G. M. Downs (1998): Chemical similarity searching. Journal of chemical information and computer sciences 38(6), pp. 983–996, doi:10.1021/ci9800211. [34] R. A. Wright, B. Richmond, A. Odlyzko & B. D. McKay (1986): Constant time generation of free trees. SIAM Journal on Computing 15(2), pp. 540–548, doi:10.1137/0215039. [35] R. Wu, J. Chang & C. Chang (2011): Ranking and unranking of non-regular trees with a prescribed branching sequence. Mathematical and Computer Modelling 53(5), pp. 1331–1335, doi:10.1016/j.mcm.2010.12.019. [36] R. Wu, J. Chang & Y. Wang (2006): A linear time algorithm for binary tree sequences transformation using left-arm and right-arm rotations. Theoretical Computer Science 355(3), pp. 303–314, doi:10.1016/j.tcs.2006.01.022. [37] L. Xiang, K. Ushijima & C. Tang (2001): On generating k-ary trees in computer representation. Information processing letters 77(5), pp. 231–238, doi:10.1016/S0020-0190(00)00155-1. [38] K. Yamanaka, Y. Otachi & S. Nakano (2009): Efficient enumeration of ordered trees with k leaves. In: WALCOM: Algorithms and Computation, Springer, pp. 141–150, doi:10.1016/j.tcs.2011.01.017. [39] S. Zaks (1980): Lexicographic generation of ordered trees. Theoretical Computer Science 10(1), pp. 63–82, doi:10.1016/0304-3975(80)90073-0. [40] B. Zhuang & H. Nagamochi (2010): Constant Time Generation of Trees with Degree Bounds. In: 9th International Symposium on Operations Research and Its Applications, pp. 183–194, doi:10.1.1.385.6436.
8cs.DS
arXiv:1704.07722v1 [q-bio.MN] 25 Apr 2017 A Convex Approach to Steady State Moment Analysis for Stochastic Chemical Reactions Yuta Sakurai and Yutaka Hori∗ Abstract Model-based prediction of stochastic noise in biomolecular reactions often resorts to approximation with unknown precision. As a result, unexpected stochastic fluctuation causes a headache for the designers of biomolecular circuits. This paper proposes a convex optimization approach to quantifying the steady state moments of molecular copy counts with theoretical rigor. We show that the stochastic moments lie in a convex semi-algebraic set specified by linear matrix inequalities. Thus, the upper and the lower bounds of some moments can be computed by a semidefinite program. Using a protein dimerization process as an example, we demonstrate that the proposed method can precisely predict the mean and the variance of the copy number of the monomer protein. 1 Introduction A grand challenge of synthetic biology is to build and control layers of artificial biomolecular reaction networks that enable complex tasks by utilizing naturally existing reaction resources in micro-scale organisms such as E. coli. In control engineering community, many theoretical tools were developed over the last decade to enable model-guided design of biomolecular circuits including a fold-change detector [7], oscillators [4, 8, 9, 16], an event detector [10], and a lightcontrolled feedback circuit for setpoint control [12, 13]. Other successfully implemented examples include logic gates [14], a genetic memory [19], and a communication system between cells [2], to name a few. Given the elementary modules of artificial bimolecular networks, the next step stone is to assemble the circuit parts to build multiple layers of biomolecular networks that can provide practical functions. As is the case with mechanical and electrical engineering, guaranteeing the performance of individual circuit modules at high precision is a key to successfully building large-scale and robust biomolecular circuits. Biosystems engineering, however, has a unique challenge, in contrast with other fields of engineering, that the signal-to-noise ratio is so low that the heterogeneity of circuit states between biological cells is almost impossible to avoid. A major source of the heterogeneity is the stochastic chemical reactions that are caused by the low copy nature of reactive molecules in a small-volume reactor, that is, a biological cell. In other words, the events of molecular collision that fire reactions are more accurately captured by stochastic process rather than continuous and deterministic process governed by ordinary differential equations (ODEs). This situation raises a strong need for the theoretical tools that can rigorously certify the performance of stochastic chemical reactions using statistical norms such as mean and variance of molecular copy numbers. ∗ Y. Sakurai and Y. Hori are with Department of Applied Physics and Physico-Informatics, Keio University, Japan. [email protected], [email protected]. This work was supported in part by JSPS KAKENHI Grant Number JP16H07175 and Keio Gijuku Academic Development Funds. The random fluctuation of the copy number of molecules can be regarded as a Markov process that follows the chemical master equation (CME) [6]. Despite a linear ODE, the CME is often hard to solve analytically because of the infinite dimensionality of the equation. A typical solution to this problem is to use Monte Carlo simulations [5]. This approach, however, requires high computational time. Moreover, a strict error bound is hard to obtain. To resolve these issues, the finite state project [15] provides a systematic way to truncate the equation with an error bound. Although useful for analyzing transient dynamics, the FSP still suffers from high dimensionality if one wants to evaluate the probability distribution near the steady state, which is often the operation point of interest. A more direct approach to evaluating the statistics of biomolecular circuits is to use the moment equation, an infinite dimensional ODE derived from the CME. Recently developed moment closure approaches [18,20] allow for approximately solving the ODE by order reduction technique. The central idea is to approximate the high order moments in the equation using the lower order moments to derive a finite order closed ODE. Using this method, we can efficiently and directly compute the statistics of the molecular copy numbers of biomolecular circuits. Although appealing, this approach requires assuming the underlying probability distribution, which is not apriori in practice. As a result, biocircuit designers have to engineer biomolecular circuits based on approximated statistics with unknown precision. The objective of this paper is to propose a novel algebraic approach to rigorously quantifying the steady state statistics of stochastic biomolecular reactions. Specifically, the main contribution of this paper is the formulation of an optimization problem that calculates the upper and the lower bounds of statistical values of molecular copy numbers in biomolecular circuits. We show that the bounds of the mean and the variance can be obtained by semidefinite programming. In particular, the proposed method allows for rigorous quantification of the statistics for any stochastic chemical reactions modeled by the CME as it does not assume underlying probability distribution unlike the moment closure approach. We illustrate the proposed method by analyzing a stochastic protein dimerization process. The organization of this paper is as follows. In Section II, we introduce the CME and derive the moment equation. Then, the optimization problem for moment computation is formulated in Section III. In section IV, we analyze the mean and the variance of a stochastic dimerization process. Finally, Section V summarizes our findings and concludes this paper. The following notations are used in this paper. N0 := {0, 1, 2, · · · }. N+ := {1, 2, 3, · · · }. R+ := {x ∈ R Q | x ≥ 0}. deg(p(x)) is P the degree of the polynomial p(x). For multivariate polynomials p n n p(x) = j=1 xj j , deg(p(x)) := j=1 pj . 2 2.1 Moment Dynamics of Stochastic Chemical Reactions Model of stochastic chemical reactions We consider a chemical reaction network consisting of n ∈ N+ species of molecules and denote the copy number of each molecular species by x = [x1 , x2 , · · · , xn ]T ∈ Nn0 . There are r types of reactions in the reaction network, and let si = [si1 , si2 , · · · , sin ]T ∈ Zn be the increment of the molecular copy x by the i-th chemical reaction (i = 1, 2, · · · , r). Chemical reactions are caused by collisions of molecules. When the reaction volume is sufficiently large, the copy number of molecules is so large that the collision event occurs almost continuously in time. On the other hand, in small reactor systems such as microbes, the collision events tend to be stochastic as the copy number of molecules is small. This results in the stochastic fluctuation of x. It is known that stochastic chemical reactions can be modeled by a Markov process. More specifically, we define Px (t) as the probability that there are x molecules at time t. The stochastic chemical reactions can be modeled by the following Chemical Master Equation (CME) [6], r dPx (t) X {wi (x − si )Px−si (t) − wi (x)Px (t)} , = dt i=1 (1) where wi (x) is the transition rate associated with the i-th chemical reaction and is defined by wi (x) = lim Px+si(t + ∆t) − Px(t) (i = 1, 2, · · · , r). ∆t ∆t→0 (2) The transition rate wi (x) is characterized by the rate of the reaction i (i = 1, 2, · · · , r) We assume that all of the r reactions are elementary as non-elementary reactions can always be decomposed into elementary reactions. For elementary reactions, the transition rate wi (x) is a polynomial of xi ’s, and we utilize this fact in the following subsection to derive the equations of stochastic moments. As x is the vector of non-negative positive integers Nn0 , the CME (1) is a linear but an infinite dimensional ODE with respect to Px (t). An analytic solution to the CME is, thus, hardly obtained except for some simple examples. In the next subsection, we derive the equations of moment dynamics to directly compute the statistical values without computing the distribution Px (t). 2.2 The dynamics of moments In this section, we derive the model of moment dynamics based on the CME (1). First, we define a stochastic moment by   ∞ X ∞ ∞ Y n n X X Y α α (3) xj j Px (t), ··· xj j  = mα := E  x1 =0x2 =0 j=1 xn =0 j=1 where α := [α1 , α2 , · · · , αn ] ∈ Nn0 . P We refer to the sum of the entries of α as the order of the moment and denote by deg(mα ) := j αj with a little abuse of notation. The stochastic moments carry all the information of the probability distribution, and some of the low order moments are useful to define the design specification of stochastic biomolecular circuits. Figure 1 illustrates an example of the distribution of a molecular copy number x of some biomolecular reaction. In this case, the analytic form of the distribution is not known, and thus it is more appropriatep to specify the design p goal by statistical norms such mean E[x] = m1 and the standard deviation E[(x − E[x])2 ] = m2 − m21 of the distribution using the moments. Q α To derive the dynamics of stochastic moments, we multiply the model (1) by j xj j and calculate the expected value by taking sum over Nn0 to obtain the following differential equation.     n   X Y d α  xj j  Px (t)  dt  x j=1 = n XY x j=1 where we use P x α xj j r X {wi (x−si )Px−si(t)−wi (x)Px (t)} , (4) i=1 to abbreviate the sum over the positive orthant. X x := ∞ X ∞ X x1 =0 x2 =0 ··· ∞ X xn =0 . (5) Figure 1: An example of probability distribution Px (t) and its relationship with stochastic moments As wi (x) is a polynomial of xi (i = 1, 2, · · · , n), we can rewrite the equation (4) as XX X d mα = Aα,β mβ ··· dt β1 β2 (α ∈ Nn0 ), (6) βn where Aα,β are the coefficients of the monomials of the polynomial r X X i=1 {(x1 + si1 )α1 (x2 + si2 )α2 x αn 1 α2 · · · (xn + sin )αn − xα 1 x2 · · · xn } wi (x). (7) Note that the range of the summation in (6) depends on the degree of the polynomial (7). In many cases, the higher order moments are necessary to characterize the low order moments, i.e., there are moments mβ satisfying deg(mβ ) > deg(mα ) in the right-hand side of (6). More specifically, when the reactions are elementary, it is reasonable to assume that the polynomial order of the transition rates wi (x) are at most two since most practical reactions are unimolecular or bimolecular reactions [3]. When deg(wi (x)) = 0 or 1, mβ in the right-hand side of equation (6) satisfies 0 ≤ deg(mβ ) ≤ deg(mα ), (8) implying that the moment equation is closed, i.e, the dynamics of the i-th order moment can be written by the i-th or lower order moments. On the other hand, when one or more wi (x)’s are quadratic, i.e., deg(wi (x)) = 2, 0 ≤ deg(mβ ) ≤ deg(mα ) + 1. (9) Thus, the moment equation (6) becomes an infinite dimensional coupled linear ODE, which is hard to solve analytically. 3 Moment Analysis of Stochastic Chemical Reactions 3.1 Truncation of the moment equation When we design stochastic chemical reactions using a genetic circuit, the specification of the circuit is often given by a set of statistical constraints such as the mean and the variance of the copy numbers of the molecules. In this paper, we consider the following problem. Problem 1. For a given CME (1), find the lower and the upper bounds of the mean and the variance of molecular copy number x at steady state. To solve this problem, let dmα /dt = 0 in the equation (6), and consider the subset of linear equations by limiting the equations up to the µ-th order moments. Specifically, XX X Aα,β mβ (α ∈ Aµ ⊂ Nn0 ) , (10) 0= ··· β1 βn β2 where the set Aµ is defined by Aµ := ( α∈ Nn0 0≤ n X i ) αi ≤ µ . (11) In what follows, we refer to µ as the truncation order. When deg(wi (x)) = 0 or 1, the number of equations is the same as the number of variables (see (8)), and thus we can compute the unique solution (if the equations are not degenerated). In the more general case where the transition rates wi (x) are quadratic, the right-hand side of (10) depends on the higher order moments, i.e., deg(mβ ) = µ + 1, as shown in (9) Consequently, the equations become underdetermined, and we can only conclude that the solution lies on a certain hyperplane unless we consider an infinite number of equations. To further specify the solution space of the moments mβ , we utilize the fact that mβ must be the moments of some (probability) measure defined on the positive orthant. In particular, we use a so-called moment condition to constrain mβ and formulate a semidefinite program solving Problem 1. 3.2 Necessary condition for mβ to be moments Q p Let x be the vector that consists of all of the monomial bases satisfying deg( j xj j ) = p, and (H)p,q be a matrix of the form h i T (H)p,q := E xp (xq ) , (12) p where E[xp (xq )T ] represents the entry-wise expected value of the matrix xp (xq )T . In a similar manner, we define (Hk )p,q by i h T (k = 1, 2, · · · , n). (13) (Hk )p,q := E xk xp (xq ) It should be noted that the entries of the matrices (H)p,q and (Hk )p,q can be written with mβ satisfying ( p+q for (H)p,q deg(mβ ) = . (14) p + q + 1 for (Hk )p,q Using the matrices (H)p,q and (Hk )p,q , we define the following block Hankel matrices H (γ1 ) ({mβ }) (γ ) and Hk 2 ({mβ }) (k = 1, 2, · · · , n).   (H)0,0 (H)0,1 · · · (H)0,γ1  (H)1,0 (H)1,1 · · · (H)1,γ1    (15) H (γ1 )({mβ }) :=  . , .. .. ..   .. . . . (H)γ1 ,0 (H)γ1 ,1 · · · (H)γ1 ,γ1  (Hk )0,0 (Hk )0,1  (Hk )1,0 (Hk )1,1  (γ ) Hk 2 ({mβ }) :=  .. ..  . . (Hk )γ2 ,0 (Hk )γ2 ,1  · · · (Hk )0,γ2 · · · (Hk )1,γ2   , .. ..  . . · · · (Hk )γ2 ,γ2 where γ1 and γ2 are determined as follows.  (µ + 1)/2 (if µ is odd) γ1 = , µ/2 (if µ is even) γ2 =  (µ − 1)/2 (if µ is odd) . µ/2 (if µ is even) (16) (17) (18) (γ ) Using H (γ1 ) ({mβ }) and Hk 2 ({mβ }), the following proposition provides linear matrix inequality (LMI) conditions that the moments of some (probability) measure on Rn+ must satisfy. Proposition 1. [11] Consider a sequence (mβ )β∈Aµ+1 with the set Aµ+1 defined by (11). The sequence (mβ )β∈Aµ+1 constitutes moments of some measure defined on the positive orthant Rn+ := {x ∈ Rn | xk ≥ 0 (k = 1, 2, · · · , n)} only if H (γ1 ) ({mβ })  0, (γ ) Hk 2 ({mβ }) 0 (19) (k = 1, 2, · · · , n). (20) The conditions (19) and (20) are called a moment condition and localized moment conditions, respectively. Combining Proposition 1 with (10), the following theorem specifies semi-algebraic conditions that the moments of the stochastic chemical reactions must satisfy. Theorem 1. Consider the stochastic chemical reaction modeled by the equation (1). Let m∗β denote the steady state moments of the random variable x. For a given truncation order µ, the moments m∗β satisfy the following conditions. 0= XX β1 H (γ1 ) ··· β2 ({m∗β }) (γ ) Hk 2 ({m∗β }) X Aα,β m∗β (α ∈ Aµ ⊂ Nn0 ) , βn  0, 0 (21) (k = 1, 2, · · · , n), where Aα,β are the coefficients of the polynomial (7). Theorem 1 implies that the moments of the stochastic chemical reaction governed by (1) lie in the semi-algebraic set (21). Thus, Problem 1 can be recast as a relaxation problem over the convex semi-algebraic set. In particular, we show, in the following section, that the bounds of the mean and the variance can be computed by semidefinite programming. Remark 1. In the special case of n = 1 random variable, the conditions (19) and (20) with γ1 , γ2 → ∞ become both necessary and sufficient for the sequence (mβ )β∈N0 to be the moments of some measure on R+ [11]. The associated problem is called Stieltjes moment problem named after the renowned mathematician Thomas Stieltjes. Similar conditions are available for the moments of measures defined on various domains such as [0, 1], R and semi-algebraic sets (see [11, 17] for example). 3.3 Semidefinite programming for mean and variance computation Theorem 1 asserts that the lower and the upper bounds of the steady state statistics, say f (mα ), can be calculated by solving the following optimization problems, respectively. min subject to f (mα ) (21), (22) max subject to f (mα ) (21). (23) Note that the constrains are convex. In what follows, we show that the bounds of mean and variance, the two most important statistics of stochastic chemical reactions, can be formulated as semidefinite programs. Mean The objective function f (mα ) is obviously linear, and thus the problem falls into the class of semidefinite programming. For example, if one wants to compute the mean of the copy number of the i-th molecule, the objective function should be (24) f (mα ) = E[xi ] = mei with ei representing the row vector whose i-th entry is 1 and 0 elsewhere. In general, the gap between the upper and the lower bounds decreases monotonically with the increase of the truncation order µ. Thus, there is a tradeoff between computational cost and the conservativeness of the bounds. Upper bound of variance By definition, the variance of the copy number of the i-th molecule is given by   f (mα ) = ei E (x − E[x])(x − E[x])T eT i = m2ei − m2ei . (25) The second term of the objective function f (mα ) = m2ei − m2ei is quadratic, and the optimization problem (23) is seemingly not semidefinite programming. However, using the Schur complement, we can convert the optimization (23) into an equivalent semidefinite programming as follows. Theorem 2. The solution of the optimization problem (23) with the objective function (25) is the same as that of the following optimization problem. max subject to V (21)  m2ei − V mei The proof of this theorem can be found in Appendix A. (26) mei 1   O. 1 = 2 1 3 = = 3 ( − 1) 2 Figure 2: Genetic circuit producing monomer and dimer proteins Lower bound of variance The lower bound of variance can be also computed by semidefinite programming with additional relaxation. Specifically, we first compute the upper bound of the mean value mei , and then substitute the result into m2ei of the equation (25) to obtain a linear objective function. The estimated lower bound of variance monotonically increases with the truncation order µ since the upper bound of the mean value mei monotonically decreases. As the optimization problems shown in this subsection use convex relaxation, there may be the case where the truncation order µ needs to be unrealistically large to reduce the conservativeness of the bounds to a practically useful level. To the authors’ experience, however, one will only need to use µ = 6 to 12-th order moments to obtain a practically useful bounds for small reaction networks with n = 3 to 5 molecules. The general quantitative analysis, however, is still an open question. Remark 2. The moment closure approaches [18, 20] allow for approximating the high order moments, mβ with deg(mβ ) = µ + 1, using the low order moments, mβ with deg(mβ ) ≤ µ, to solve the equation (10). This approach, however, is based on assumptions on the underlying distribution Px (t). Thus, the quantification of the approximation error is not easy. On the other hand, the proposed semidefinite programs are advantageous in that they can compute the upper and the lower bounds of the statistics of stochastic chemical reactions with theoretical rigor without assuming an underlying distribution. 4 Application to a Stochastic Genetic Circuit To illustrate the proposed semidefinite programming approach, we analyze a protein dimerization process, which is one of the simplest examples of stochastic biomolecular reactions. Consider the chemical reactions shown in Fig. 2, where there are three species of molecules, DNA, monomer protein and dimer protein, and r = 3 reactions. In Fig. 2, the protein monomer is first produced from DNA, and then it is either degraded or dimerized. As a result, the copy number of protein monomer reaches a steady state at t → ∞. In what follows, our goal is to analyze the steady state mean and variance of the copy number of the protein monomer. Let the copy number of monomer protein and its α-th order moment be defined by x and ∞ X xα Px (t), mα := E [xα ] = x=0 respectively. It should be noticed that m0 = 1 by definition. Let DT denote the total copy number of DNA molecules and assume that DT is a constant. The reaction rates of monomer production, degradation and dimerization wi (x) (i = 1, 2, 3) are then defined by the polynomials in Table 1. Table 1: Transition rates wi (x) in Fig. 2 Reaction i Transition rate wi (x) 1 k1 DT k2 x 2 3 k3 x(x − 1) Table 2: Parameters of chemical reactions in Fig. 2 Parameter Value Meaning k1 0.7 min−1 Transcription and translation rate k2 ln(2)/20 copy−1·min−1 Protein (monomer) degradation 0.1 copy−1·min−1 Dimerization rate k3 DT 50 copy Total copy of DNA The stoichiometry of the reactions, or the increment of the copy number of monomer protein by each reaction, is given by s1 = 1, s2 = −1, s3 = −2. Suppose the values of the parameters are given by Table 2. First, we derive the moment equation (10) by expanding the polynomial (7). Specifically, let the truncation order be µ = 3. Then, we have     m 0.0 0.0 0.0 0.0 0.0  0   35.0 0.2 −0.2 0.0 0.0  m1    0= (27)  35.0 69.6 0.7 −0.4 0.0  m2  .  m3  35.0 105.8 105.5 1.7 −0.6 m4 It should be noted that the low order moments m1 , m2 and m3 depend on the higher order moment m4 since the transition rate w3 (x) is quadratic in x (see Table 1). The equation (27) implies that the moments of the stochastic reactions are in the nullspace of the matrix. To further constrain the feasibility set, we use the moment condition and the localized moment condition, which are given by     m0 m1 m2 m1 m2  m1 m2 m3   O,  O, (28) m2 m3 m2 m3 m4 respectively. In practice, the truncation order µ needs to be determined so that the gap between the lower and the upper bounds is sufficiently small. This might require computing the optimization problems (22) and (23) multiple times. To analyze the mean copy number of protein monomer, let the objective function be f (mα ) = E[x] = m1 and solve the optimization problems (22) and (23). Figure 3 (A) illustrates the computed lower and the upper bounds of the mean monomer protein copy number for each truncation order µ. The gap between the bounds monotonically decreases with increasing µ, and with µ = 5, we can conclude 13.26 ≤ E[x] ≤ 13.27, which is a sufficient resolution in practice. (29) (A) (B) 30 Variance of protein copy molecule Mean of protein copy molecule 15 10 5 0 Maximum Value Minimum Value 1 3 5 Order 7 9 Maximum Value Minimum Value 25 20 15 10 5 0 1 3 5 7 9 Order Figure 3: Upper and lower bounds of mean copy number and variance. Next, to calculate the upper bound of the variance, let f (mα ) = E[(x − E[x])2 ] = m2 − m21 , and solve the optimization problem (26). The lower bound is also computed using the relaxation described in Section III. The optimization result in Fig. 3 (B) shows that the variance is bounded by 9.94 ≤ E[(x − E[x])2 ] ≤ 9.95. (30) It should be noticed that these results are mathematically strict and thus enable rigorous quantification of biocircuit performance using the statistical norms. Remark 3. We have only shown the example of one variable case for the illustration purpose in this section, but generalization to n random variables is straightforward. However, a critical challenge for the multivariate case, say n ≥ 10, is the reduction of computation time. The computation burden mainly comes from the number of the variables, which is given by µ+n Cµ . To overcome the limitation, it would be worth developing a method to reduce the variables that have little effect on the calculation results since most variables do not appear in the linear constraint as n gets larger. Development of the reduction technique is left for our future work. 5 Conclusion In this paper, we have formulated the optimization problem to compute the bounds of the steady state statistics of stochastic chemical reactions in genetic circuits. First, we have introduced the steady state moment equation, which is a set of underdetermined linear equations. To restrict the solution space of the moment equation, our key idea is to use the LMI conditions, which the moments of some measure must satisfy. Consequently, we have obtained a convex relaxation problem that can be solved by semidefinite programming. A distinctive feature of the proposed approach is that it can provide mathematically rigorous upper and lower bounds of the statistics for any stochastic chemical reactions modeled by the CME. To demonstrate the method, we have analyzed the protein dimerization process and have obtained tight bounds of the mean and the variance. Although we have only considered the steady state moments, we can extend the proposed approach to the analysis of transient moments. The authors are currently working to build a stochastic biocircuit design tool based on the specifications of transient statistics. References [1] S. P. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, 2004. [2] T. Danino, O. Mondragón-Palomino, L. Tsimring, and J. Hasty. A synchronized quorum of genetic clocks. Nature, 463(7279):326–330, 2010. [3] E. T. Denisov, O. M. Sarkisov, and G. I. Likhteshtein. Chemical kinetics: fundamentals and new developments. Elsevier, 2003. [4] M. B. Elowitz and S. Leibler. A synthetic oscillatory network of transcriptional regulators. Nature, 403(6767):335–338, 2000. [5] D. T. Gillespie. A general method for numerically simulating the stochastic time evolution of coupled chemical reactions. Journal of Computational Physics, 22(4):403–434, 1976. [6] D. T. Gillespie. A rigorous derivation of the chemical master equation. Physica A, 188(1– 3):404–425, 1992. [7] S. Guo, Y. Hori, and R. M. Murray. Systematic design and implementation of a novel synthetic fold-change detector biocircuit in vivo. Technical report, California Institute of Technology, 2014. [8] Y. Hori, T.-H. Kim, and S. Hara. Existence criteria of periodic oscillations in cyclic gene regulatory networks. Automatica, 47(5):1203–1209, 2011. [9] Y. Hori, M. Takada, and S. Hara. Biochemical oscillations in delayed negative cyclic feedback: existence and profiles. Automatica, 49(9):2581–2590, 2013. [10] V. Hsiao, Y. Hori, P. W. K. Rothemund, and R. M. Murray. A population-based temporal logic gate for timing and recording chemical events. Molecular Systems Biology, 12(869), 2016. [11] H. J. Landau. Moments in Mathematics. American Mathematical Society, 1987. [12] A. Milias-Argeitis, M. Rullan, S. K. Aoki, P. Buchmann, and M. Khammash. Automated optogenetic feedback control for precise and robust regulation of gene expression and cell growth. Nature Communications, 7(12):1114–1116, 2011. [13] A. Milias-Argeitis, S. Summers, J. Stewart-Ornstein, I. Zuleta, D. Pincus, H. El-Samad, M. Khammash, and J. Lygeros. In silico feedback for in vivo regulation of a gene expression circuit. Nature Biotechnology, 29(12):1114–1116, 2011. [14] T.-S. Moon, C. Lou, A. Tamsir, B. C. Stanton, and C. A. Voigt. Genetic programs constructed from layered logic gates in single cells. Nature, 491(7423):249–253, 2012. [15] B. Munsky and M. Khammash. The finite state projection algorithm for the solution of the chemical master equation. Journal of Chemical Physics, 124(4):044104, 2006. [16] H. Niederholtmeyer, Z. Sun, Y. Hori, E. Yeung, A. Verpoorte, R. M. Murray, and S. J. Maerkl. Rapid cell-free forward engineering of novel genetic ring oscillators. eLife, 4:e09771, 2015. [17] J. A. Shohat and J. D. Tamarkin. The problem of moments. American Mathematical Society, 1943. [18] A. Singh and J. P. Hespanha. Approximate moment dynamics for chemically reacting systems. IEEE Transactions on Automatic Control, 56(2):414–418, 2011. [19] L. Yang, A. A. K. Nielsen, J. Fernandez-Rodriguez, C. J. McClune, M. T. Laub, T. K. Lu, and C. A. Voigt. Permanent genetic memory with > 1 byte capacity. Nature Method, 11(12):1261– 1266, 2014. [20] Y.-B. Zhao, J. Kim, and J. P. Hespanha. Hybrid moment computation algorithm for biochemical reaction networks. In Proceedings of IEEE Conference on Decision and Control, pages 1693–1698, 2010. A Proof of Theorem 2. Proof The optimization problem (23) is equivalent to the following problem. max subject to V f (mα ) ≥ V (21). As the objective function is f (mα ) = m2ei − m2ei , the inequality f (mα ) ≥ V in the constraint can be equivalently written by   m2ei − V mei O (31) 1 mei using Schur compliment [1]. The optimal value of (23) is thus equal to that of (26). 
3cs.SY
arXiv:1709.02748v1 [math.AC] 8 Sep 2017 ON PRESERVATION PROPERTIES AND A SPECIAL ALGEBRAIC CHARACTERIZATION OF SOME STRONGER FORMS OF THE NOETHERIAN CONDITION DANNY ARLEN DE JESÚS GÓMEZ-RAMÍREZ, JUAN D. VÉLEZ, AND EDISSON GALLEGO Abstract. We give an elementary proof prove of the preservation of the Noetherian condition for commutative rings with unity R having at least one finitely generated ideal I such that the quotient ring is again finitely generated, and R is I−adically complete. Moreover, we offer as a direct corollary a new elementary proof of the fact that if a ring is Noetherian then the corresponding ring of formal power series in finitely many variables is Noetherian. In addition, we give a counterexample showing that the ‘completion’ condition cannot be avoided on the former theorem. Lastly, we give an elementary characterization of Noetherian commutative rings that can be decomposed as a finite direct product of fields. Mathematical Subject Classification (2010): 13E05 Keywords: Noetherian condition, direct product of fields Introduction Among the most studied rings in commutative algebra are the Noetherian ones, i.e., commutative rings with unity such that every ideal can be finitely generated. Moreover, one needs to increase a little bit the level of formal sophistication in order to find simple examples of non-Noetherian structures such as the ring of polynomials in countable many variables over a field or the ring of algebraic integers. So, (elementary) results preserving and implying the Noetherian condition after the application of standard algebraic operations (such as completion, quotient, localization, etc.) are quite useful (see [9], [4], [11] and [8]). Similarly, new characterizations of (stronger forms of the) Noetherian condition are oft very valuable for enlightening our understanding of what finite generation in (non-)commutative algebra means (see [14], [13], [2] and [7]). Finally, we will prove in an elementary way two results concerning, on the one hand, the preservation of the Noetherian condition for a commutative ring with unity R having at least one finitely generated ideal I such that the 1 2 DANNY A. J. GÓMEZ-RAMÍREZ, JUAN D. VELEZ, AND EDISSON GALLEGO quotient ring is again finitely generated and R is I−adically complete. In addition, we also offer as a corollary a new elementary proof of the fact that the ring of formal power series in finitely many variables is Noetherian, if its ring of coefficient so is, and we give a counterexample showing that the ‘completion’ condition cannot be avoided. On the other hand, we give a quite simple algebraic characterization of Noetherian commutative rings that can be decomposed as a finite direct product of fields. 1. Preservation Properties of the Noetherian Condition involving a Special Class of Finitely Generated Ideals In this section, by a ring we will mean a commutative ring with identity, not necessarily Noetherian. Let R be a ring, and let I be an ideal of R. We will show that if I is finitely generated and R/I is Noetherian, then the completion of R with respect to the I-adic topology is also Noetherian. In general one cannot expect R to be Noetherian under these hypothesis, as shown in Example 1.3 below. This result can be regarded as a generalization of the following well known corollary to the Cohen Structure Theorems ([3]), ([5, pag. 189,201]): if (R, m) is a quasilocal complete ring (with respect to the m-adical topology) then R is Noetherian if m is finitely generated. The Noetherian property is deduced from the fact that under these hypothesis R is a quotient of a power series ring over a complete discrete valuation ring. We observe that this result can be recovered immediately from Theorem 1.1 as the very special case when I is maximal, since R/I is a field, hence automatically Noetherian. While Cohen Structure Theorems require some machinery, the result below is totally elementary. As a corollary, we deduce a quite elementary new proof of the fact that If A is Noetherian, so it is the power series ring A[[x1 , . . . , xn ]]. Theorem 1.1. Let R be a ring, and let I be a finitely generated ideal of R. Suppose that R is I-adically complete, and that R/I is Noetherian. Then R is also Noetherian. Proof. If R were not Noetherian, a standard argument using Zorn’s Lemma shows that there is a maximal ideal P in R with respect to the property of not being finitely generated, and this ideal is necessarily prime. It is clear that P does not contain I, otherwise, since R/I is Noetherian, any lifting of a set of generator for P/I coupled with generators of I would also generate P. Thus, we may assume that there exist z ∈ I such that z ∈ / P. By the maximality of P , the ideal P + Rz must be finitely generated. Let fi + ri z, i = 1, . . . , n be any set of generators, with fi ∈ P. We claim that {f1 , . . . , fn } is a set of generators for P. Let f be any element (0) of P . Then, since f is a priory in P + Rz there must be elements gi ∈ R ON SPECIAL PROPERTIES INVOLVING THE NOETHERIAN CONDITION 3 such that (1.1) f= n X (0) gi (fi + ri z) = n X (0) gi fi + zf (1) , i=1 i=1 (0) i=1 gi ri . Pn Pn (0) Hence, f − i=1 gi fi = zf (1) is in P. Since we where f (1) = are assuming z ∈ / P, and P is prime we deduce f (1) ∈ P. P (1) The same reasoning applied to f (1) yields f (1) = i = 1n gi fi + zf (2) , (1) for some elements gi ∈ R, and f (2) ∈ P. Replacing f (1) in 1.1 by the right P (1) (0) hand side of this last equation gives f = ni=1 (gi + zgi )fi + z 2 f (2) . Since t z ∈ / P for any t > 0, a straightforward induction shows that f can be written as n X (t) (1) (0) (gi + zgi + · · · + z t gi )fi + z t+1 f (t+1) , (1.2) f= i=1 (t) for certain elements gi ∈ R, and f (t+1) ∈ P. Since R is complete, hi = P∞ t (t) is a well defined element of R. t=0 z gi T∞ We now observe that R must be I-adically separated, i.e., t=0 I t is just b the kernel of the canonical map i : R −→ RI , which should be the zero ideal, because i is an isomorphism, since we are making the Pnassumption that R is I-adically complete. From this, we deduce that f = i=1 hi fi , since f− n X i=1   n ∞ n X X X (j+t+1) (t) (1) (0)  fi  z j gi hi fi = f − (gi +zgi +· · ·+z t gi )fi −z t+1 i=1 i=1  = z t+1 f (t+1) − n X i=1   ∞ X j=0 (j+t+1)  z j gi j=0   fi  , is an element of I t , for all t. In conclusion, any element f ∈ P can be generated by the set {f1 , · · · , fn } ⊆ P . Therefore, P would be finitely generated, which contradicts our former assumption.  Corollary 1.2. If A is Noetherian, so it is A[[x1 , . . . , xn ]]. Proof. Let R = A[[x1 , . . . , xn ]] and I = (x1 , . . . , xn ). A standard argument b ([5, pag. 192]), ([10, pag. 61]) shows that R = B I where B = A[x1 , . . . , xn ]. Since R/IR ≃ A is Noetherian, the previous theorem gives that so it is R.  In general, if R is not complete with respect to the I-adic topology, it is not true that R is Noetherian under the hypothesis of I being finitely generated and R/I being Noetherian, not even in the case where I is maximal, as the following example shows. 4 DANNY A. J. GÓMEZ-RAMÍREZ, JUAN D. VELEZ, AND EDISSON GALLEGO Example 1.3. Let N denote the set of natural numbers, and let U be any non principal ultrafilter in N , that is, a collection of infinite subsets of N , closed under finite intersection, with the property that for any D ⊂ N , either D or its complement belongs to U. Let (R, m) be any discrete valuation ring, and let us denote by Rw a copy of R indexed by the natural w ∈ N. By S we will denote the ultraproduct, S = u limw→∞ Rw . We recall that Q this is defined as the set of equivalent classes in the Cartesian product w∈N Rw , where two sequences (aw ) and (bw ) are regarded as equivalent if the set of indices w where aw = bw is an element of U. This is a ring with the obvious operations, and it is also local with a principal maximal ideal m′ generated by the class of (pw ), where mw = (pw ) is the maximal ideal of Rw (see [12, Ch. 1-2]). If c denotes the class of the sequence of powers (pw )w , then it ′ w is clear that c belongs to the Jacobson radical of S, ∩∞ w=0 (m ) , and it is a nonzero element. Consequently, S cannot be Noetherian, even though its maximal ideal is finitely generated (actually, principal), and S/m′ is a field. 2. A Characterization of a Noetherian Finite Direct Product of Fields In this section we will give an elementary algebraic re-formulation of the fact that a commutative Noetherian ring is the direct product of fields by means of a idempotent-membership condition, namely, the fact that any of its elements belongs lo the ideal generated by its-own square. Theorem 2.1. Let R be a commutative Noetherian ring. Then R is the finite direct product of fields if and only if any element f ∈ R, holds that f ∈ (f 2 ). Proof. If R is a finite product of fields, then clearly the desired condition is satisfied, since any element in R is the direct product of zeros and unities. Conversely, let us assume, by contradiction, that R is a Noetherian ring which is not a finite product of fields. We want to prove that there is an element f ∈ R such that f ∈ / (f 2 ). In fact, we can reduced to the case of SpecR connected, because if SpecR is not connected then, due to the Noetherian hypothesis, we can write SpecR = V (Q1 ) ⊎ · · · ⊎ V (Qs ), where V (Qj ) ∼ = Spec(R/Qj ) are the connectedQcomponents of SpecR. Hence, by the Chinese s Remainder Theorem [1], R ∼ = i=1 R/Qi and by the previous assumption at least one of the R/Qi is not a field. So, it is enough to find an fi ∈ R/Qi such that fi ∈ / (fi2 ) to obtain the desired element f = (0, ..., fi , ..., 0) ∈ R. Now, the connectedness of SpecR it is equivalent to saying that the only idempotents of R are trivial ones, namely, zero and one (see for example [6, Ch. 2]). Lastly, choose f ∈ R neither a unit nor idempotent. Then, f ∈ / (f 2 ). In 2 fact, by contradiction, if f = cf , for some c ∈ R, and so cf (1 − cf ) = 0, which means that cf is idempotent. Hence, cf = 0 or cf = 1. In the first case we have f = (cf )f = 0, and in the second case, f is a unit. Then both cases contradicts our hypothesis on f .  ON SPECIAL PROPERTIES INVOLVING THE NOETHERIAN CONDITION 5 Acknowledgements The authors want to thank the Universidad Nacional of Colombia for its support. In addition, Danny A. J. Gómez-Ramı́rez specially thanks Holger Brenner for all the inspiring discussions during the preparation of this work. D. A. J. Gómez-Ramı́rez was supported by the Vienna Science and Technology Fund (WWTF) as part of the Vienna Research Group 12-004. Finally, he thanks deeply to Rubents Ramı́rez for being nuestro milagro de vida and for all the inspiration, to Veronica Ramirez for her unconditional support and to J. Quintero for (the determination of) being there. References [1] Atiyah, M.F., Macdonald, I.: Introducion to Commutative Algebra. Addison-Wesley, Reading, MA (1969) [2] Bass, H.: Injective dimension in Noetherian rings. Transactions of the American Mathematical Society 102(1), 18–29 (1962) [3] Cohen, I.S.: On the structure and ideal theory of complete local rings. Transactions of the American Mathematical Society 59(1), 54–106 (1946) [4] Eisenbud, D.: Subrings of Artinian and Noetherian rings. Mathematische Annalen 185(3), 247–249 (1970) [5] Eisenbud, D.: Commutative Algebra with a View Toward Algebraic Geometry, vol. 150. GTM, Springer-Verlag (1995) [6] Hartshorne, R.: Algebraic Geometry, vol. 52. GTM, Springer, New York (1977) [7] He, Z.X.: Characterizations of Noetherian and hereditary rings. Proceedings of the American Mathematical Society 93(3), 414–416 (1985) [8] Jategaonkar, A.V.: Localization in Noetherian rings, vol. 98. Cambridge University Press (1986) [9] Kunz, E.: On Noetherian rings of characteristic p. American Journal of Mathematics 98(4), 999–1013 (1976) [10] Matsumura, H.: Commutative Ring Theory. Cambridge University Press, Cambridge (1989) [11] Richman, F.: Constructive aspects of Noetherian rings. Proceedings of the American Mathematical Society 44(2), 436–441 (1974) [12] Schoutens, H.: The Use of Ultraproducts in Commutative Algebra, Lecture Notes in Mathematics, vol. 1999. Springer Science & Business Media (2010) [13] Vamos, P.: The dual of the notion of finitely generated Journal of the London Mathematical Society 1(1), 643–646 (1968) [14] Van Huynh, D.: A characterization of Noetherian rings by cyclic modules. Proceedings of the Edinburgh Mathematical Society 39(2), 253–262 (1996) Vienna University of Technology, Institute of Discrete Mathematics and Geometry, wiedner Hauptstae 8-10, 1040, Vienna, Austria. Universidad Nacional de Colombia, Escuela de Matemáticas, Calle 59A No 63 - 20, Núcleo El Volador, Medellı́n, Colombia. 6 DANNY A. J. GÓMEZ-RAMÍREZ, JUAN D. VELEZ, AND EDISSON GALLEGO University of Antioquia, Calle 67 # 53-108, Medellı́n, Colombia. E-mail address: [email protected] E-mail address: [email protected] E-mail address: [email protected]
0math.AC
arXiv:1509.05537v1 [quant-ph] 18 Sep 2015 The Transfer Function of Generic Linear Quantum Stochastic Systems Has a Pure Cascade Realization∗ Hendra I. Nurdin, Symeon Grivopoulos, and Ian R. Petersen† March 16, 2018 Abstract This paper establishes that generic linear quantum stochastic systems have a pure cascade realization of their transfer function, generalizing an earlier result established only for the special class of completely passive linear quantum stochastic systems. In particular, a cascade realization therefore exists for generic active linear quantum stochastic systems that require an external source of quanta to operate. The results facilitate a simplified realization of generic linear quantum stochastic systems for applications such as coherent feedback control and optical filtering. The key tools that are developed are algorithms for symplectic QR and Schur decompositions. It is shown that generic real square matrices of even dimension can be transformed into a lower 2 × 2 block triangular form by a symplectic similarity transformation. The linear algebraic results herein may be of independent interest for applications beyond the problem of transfer function realization for quantum systems. Numerical examples are included to illustrate the main results. In particular, one example describes an equivalent realization of the transfer function of a nondegenerate parametric amplifier as the cascade interconnection of two degenerate parametric amplifiers with an additional outcoupling mirror. 1 Introduction The class of linear quantum stochastic systems [1, 2, 3, 4] represents multiple distinct open quantum harmonic oscillators that are coupled linearly to one another and also to external Gaussian fields, e.g., coherent laser beams, and whose dynamics can be conveniently and completely summarized in the Heisenberg picture of quantum mechanics in terms of a quartet of matrices A, B, C, D, analogous to those used in modern control theory for linear ∗ This research was supported by the Australian Research Council H. I. Nurdin is with the School of Electrical Engineering and Telecommunications, UNSW Australia, Sydney NSW 2052, Australia. Email: [email protected]. S. Grivopoulos and I. R. Petersen are with the School of Engineering and Information Technology, UNSW Canberra, Canberra BC 2610, Australia. † 1 systems. As such, they can be viewed as a quantum analogue of classical linear stochastic systems and are encountered in practice, for instance, as models for optical parametric amplifiers [5, Chapters 7 and 10]. However, due to the constraints imposed by quantum mechanics, the matrices A, B, C, D in a linear quantum stochastic system cannot be arbitrary, a restriction not encountered in the classical setting. In fact, as derived in [2] for a certain fixed choice of D, it is required that A and B satisfy a certain non-linear equality constraint, and B and C satisfy a linear equality constraint. These constraints on A, B, C, D are referred to as physical realizability constraints [2]. A number of applications of linear quantum stochastic systems have been theoretically proposed or experimentally demonstrated in the literature. In particular, they can serve as coherent feedback controllers [2, 6], i.e., feedback controllers that are themselves quantum systems. In this context, they have been shown to be theoretically effective for cooling of an optomechanical resonator [7], can modify the characteristics of squeezed light produced experimentally by an optical parametric oscillator (OPO) [8], and, in the setting of microwave superconducting circuits, a linear quantum stochastic system in the form of a Josephson parametric amplifier (JPA) operated in the linear regime has been experimentally demonstrated to be able to rapidly reshape the dynamics of a superconducting electromechanical circuit (EMC) [9]. Linear quantum stochastic systems can also be used as optical filters for various input signals, including non-Gaussian input signals like single photon and multi-photon states. As filters they can be used to modify the wavepacket shape of single and multi-photon sources [10, 11]. Also, linear quantum stochastic systems can dissipatively generate Gaussian cluster states [12] as an important component of continuous-variable one way quantum computers [13]. In certain quantum control problems, such as in coherent feedback H ∞ [2] and LQG [6] control problems, the latter being adapted for addressing an optomechanical cooling problem in [7], the important feature of the controller is its transfer function T (s) = C(sI − A)−1 B + D rather than the system matrices (A, B, C, D). Therefore, an important issue in the implementation of coherent feedback controllers is how to realize a controller with a certain transfer function from a bin of basic linear quantum (optical) devices. This is a special case of the problem of network synthesis of linear quantum stochastic systems addressed in [3, 14, 15]. In particular, it was shown in [15], generalizing the results of [16, 17], that the transfer function of all linear quantum stochastic systems which are completely passive can be realized by a cascade of one degree of freedom linear quantum stochastic systems. Completely passive here means that the system can be realized using only passive linear optical devices which do not need an external source of quanta for their operation. The question of whether cascade realizations exist for general linear quantum stochastic systems has remained an open problem. The contribution of this paper is to resolve this question by proving that, generically, linear quantum stochastic systems do possess a pure cascade realization. This is significant from a practical point of view, as it allows for a simpler realization of generic linear quantum stochastic systems. The remainder of the paper is organized as follows. Section 2 introduces the notation and gives an overview of linear quantum stochastic systems and the associated realization 2 theory. Section 3 presents a symplectic QR decomposition algorithm. The results of Section 3 form the basis for a symplectic Schur decomposition algorithm that is presented in Section 4 and used to show that the transfer function of generic linear quantum stochastic systems can be realized by pure cascading. Finally, Section 5 summarizes the contributions of the paper. 2 2.1 Preliminaries Notation √ We will use the following notation: ı = −1, ∗ denotes the adjoint of a linear operator as well as the conjugate of a complex number. If A = [ajk ] then A# = [a∗jk ], and A† = (A# )> , where (·)> denotes matrix transposition. <{A} = (A + A# )/2 and ={A} = 2ı1 (A − A# ). We denote the identity matrix by I whenever its size can be inferred from context and use In to denote an n × n identity matrix. Similarly, 0m×n denotes a m × n matrix with zero entries but drop the subscript when its dimension can be determined from context. We use diag(M1 , M2 , . . . , Mn ) to denote a block diagonal matrix with square matrices M1 , M2 , . . . , Mn on its diagonal, and diagn (M ) denotes a block diagonal matrix with the  0 1 square matrix M appearing on its diagonal blocks n times. Also, we will let J = −1 0 and Jn = In ⊗ J = diagn (J). 2.2 The class of linear quantum stochastic systems Let x = (q1 , p1 , q2 , p2 , . . . , qn , pn )T denote a vector of the canonical position and momentum operators of a many degrees of freedom quantum harmonic oscillator satisfying the canonical commutation relations (CCR) [qi , pj ] = 2ıδij , [qi , qj ] = 0, and [pi , pj ] = 0 for i, j = 1, 2, . . . , n, or, more compactly, xxT − (xxT )T = 2ıJn . A linear quantum stochastic system [2, 6, 3] G is a quantum system defined by three parameters: (i) A quadratic Hamiltonian H = 12 xT Rx with R = RT ∈ R2n×2n , (ii) a coupling operator L = Kx, where K is an m × 2n complex matrix, and (iii) a unitary m × m scattering matrix S. For shorthand, we write G = (S, L, H) or G = (S, Kx, 21 xT Rx). The time evolution x(t) of x in the Heisenberg picture (t ≥ 0) is given by the quantum stochastic differential equation (QSDE) (see [1, 2, 3]):   dA(t) dx(t) = A0 x(t)dt + B0 ; x(0) = x, dA(t)# dY (t) = C0 x(t)dt + D0 dA(t), with A0 = 2Jn (R + ={K † K}), B0 = 2ıJn [ −K † S K T S # ], C0 = K, and D0 = S. Here Y (t) = (Y1 (t), . . . , Ym (t))> is a vector of continuous-mode bosonic output fields that results from the interaction of the quantum harmonic oscillators and the incoming continuousmode bosonic quantum fields in the m-dimensional vector A(t). Note that the dynamics 3 of x(t) is linear, and Y (t) depends linearly on x(s), 0 ≤ s ≤ t. We refer to n as the degrees of freedom of the system or, more simply, the degree of the system. Following [2], it will be convenient to write the dynamics in quadrature form as dx(t) = Ax(t)dt + Bdw(t); x(0) = x. dy(t) = Cx(t)dt + Ddw(t), (1) with w(t) = 2(<{A1 (t)}, ={A1 (t)}, . . . , <{Am (t)}, ={Am (t)})> and y(t) = 2(<{Y1 (t)}, ={Y1 (t)}, . . . , <{Ym (t)}, ={Ym (t)})> . Here, the real matrices A, B, C, D are in one-toone correspondence with A0 , B0 , C0 , D0 . Also, w(t) is taken to be in a vacuum state where it satisfies the Itô relationship dw(t)dw(t)> = (I + ıJm )dt; see [2]. Note that in this form it follows that D is a real unitary symplectic matrix. That is, it is both unitary (i.e., DD> = D> D = I) and symplectic (a real m × m matrix is symplectic if DJm D> = Jm ). However, in the most general case, D can be generalized to a symplectic matrix that represents a quantum network that includes ideal infinite bandwidth squeezing devices acting on the incoming field w(t) before interacting with the system [4, 3]. The matrices A, B, C, D of a linear quantum stochastic system cannot be arbitrary and are not independent of one another. In fact, for the system to be physically realizable [2, 6, 3], meaning it represents a meaningful physical system, they must satisfy the constraints (see [18, 2, 6, 3, 4]) AJn + Jn A> + BJm B > = 0, Jn C > + BJm D> = 0, DJm D> = Jm . (2) (3) (4) Note that, more generally, one can consider linear quantum stocastic systems with less outputs than inputs by ignoring certain output quadrature pairs in y(t) which are not of interest, and a corresponding generalized physical realizability conditions analogous to the above can be derived [18, 19]. However, for the purpose of this paper it is sufficient to consider systems with the same number of inputs and outputs, as systems with less outputs than inputs can then be easily handled [19]. Following [20], we denote a linear quantum stochastic system having an equal number of inputs and outputs, and Hamiltonian H, coupling vector L, and scattering matrix S, simply as G = (S, L, H) or G = (S, Kx, 21 x> Rx). We also recall the series product / for open Markov quantum systems [20] defined by G2 / G1 = (S2 S1 , L2 + S2 L1 , H1 + H2 + ={L†2 S2 L1 }), where Gj = (Sj , Lj , Hj ) for j = 1, 2. Since the series product is associative, Gn / Gn−1 / . . . / G1 is unambiguously defined. The series product corresponds to a cascade connection G2 / G1 where the outputs of G1 are passed as inputs to G2 ; see [20] for details. 2.3 Realization theory Given an n degree of freedom linear quantum stochastic system with system matrices A, B, C, D, how can it be built from a bin of linear quantum components and which components are needed? This is the network synthesis question for linear quantum stochastic 4 systems. It was shown in [3] that any linear quantum stochastic system with n degrees of freedom system G can be decomposed as the cascade of n one degree of freedom system G1 , G2 , . . . , Gn together with some bilinear interaction Hamiltonians between them, as illustrated in Fig. 1. It was then shown how each one degree of freedom system can be realized from a certain bin of linear quantum optical components. G H!(1) !(3) A(t) G!(1) H!(1)!(n) H!(2)!(3) G!(2) H!(1)!(2) G!(3) G!(n) Y(t) H!(3)!(n) H!(2)!(n) G!,1 Figure 1: Cascade realization of Gπ (π is permutation map of {1, 2, . . . , n} to itself), d H with direct interaction Hamiltonians Hπ(j)π(k) between sub-systems Gπ(j) and Gπ(k) for H H A(t) [3]. Illustration is for n > 3. Y!,1(t) j, k = 1, 2, . . . , n, following G G G G !(1)!(m) !(1) !(3) !(1) !(2)!(3) !(2) H!(1)!(2) !(m) !(3) H!(3)!(m) In certain control problems, such as H ∞H and H 2 /LQG coherent feedback control problems, it is the transfer function of the systems that is important rather than the system matrices G = (A, B, C, D) themselves. The transfer function is defined as ΞG (s) = C(sI − A)−1 B + D, and rather than realizing a particular quartet (A, B, C, D) one may consider realizing GT = (T AT −1 , T B, CT −1 , D) for a suitable arbitrary symplectic matrix T , since G and GT have the same transfer function. The transformation T is required to be symplectic to ensure that the new internal degrees of freedom z(t) = T x(t) satisfies the canonical commutation relations. It was shown in [15] that every completely passive linear quantum stochastic system, a system that can be realized using only passive quantum devices, has a pure cascade realization of its transfer function that does require any bilinear interaction Hamiltonians between oscillators in the cascade. In the context of Fig. 1 above, this means that all bilinear interaction Hamiltonians Hπ(i)π(j) can be removed. Purely cascade realizations are simpler to implement and are therefore desirable. However, it is not known whether the transfer function of general linear quantum stochastic systems outside of the completely passive class have such a realization. This is an important open problem that is resolved in this paper. 3 !(2)!(m) A symplectic QR decomposition algorithm The main purpose of this section is to develop a symplectic QR decompositon algorithm and derive a necessary and sufficient condition for real square matrices of even dimension to possess this decomposition. The symplectic QR decomposition will play an important role in proving subsequent results that will be presented in Section 4. We begin by recalling some useful definitions. Let X be an invertible 2n × 2n skew-symmetric matrix and let h◦, X•i = ◦> X• be a skew-symmetric bilinear form on R2n induced by X. A set of linearly independent vectors 5 v1 , v2 , . . . , v2n on R2n is said to be a symplectic basis with respect to h◦, X•i if hvi , Xvj i = −hvj , Xvi i = Xij . The space R2n endowed with h◦, X•i forms a symplectic vector space. Thus, we shall also refer to h◦, X•i as a symplectic form. A matrix T ∈ R2n×2n is said to be sympletic with respect to X if T > XT = X. Therefore, if T is sympletic with respect to X, then T v1 , T v2 , . . . , T v2n is also a symplectic basis for R2n whenever v1 , v2 , . . . , v2n is a symplectic basis. In this paper, we will be interested in R2n as a symplectic vector space with X = Jn . Therefore, unless stated otherwise, it is implicit throughout that the symplectic structure on R2n is with respect to the symplectic form h◦, Jn •i. Note the standard property that if T is a symplectic matrix then so is T > and T −1 , see, e.g., [21]. This property will often be invoked without further comment. We also recall the following definition from [15]. Definition 1 A square matrix F of even dimension is said to be lower 2×2 block triangular if it has a lower block triangular form when partitioned into 2 × 2 blocks:   F11 02×2 02×2 . . . 02×2  F21 F22 02×2 . . . 02×2    F =  .. ..  , .. .. ..  . . . . .  Fn1 Fn2 . . . . . . Fnn where Fjk , j ≤ k, is of dimension 2 × 2. Similarly, a matrix F is said to be upper 2 × 2 block triangular if F > is lower 2 × 2 block triangular. We are now ready to state the main lemma of this section that describes a symplectic QR decomposition algorithm with respect to the symplectic form h◦, Jn •i. The lemma is based on a symplectic Gram-Schmidt procedure that is different from symplectic GramSchmidt procedures to construct a canonical symplectic basis in a symplectic vector space, e.g., [21, Proposition 40] and its proof. It is in the same class of algorithms as, though not identical to, existing symplectic Gram-Schmidt procedures used in numerical analysis with respect to the symplectic form h◦, Kn •i with Kn = J ⊗ In [22]. In fact, our procedure is rather analogous to the Gram-Schmidt procedure in spaces with indefinite inner products as described in, e.g. [23, Section 3.1]. In the lemma, a symplectic basis is constructed sequentially from a given and fixed set of linearly independent initial vectors v1 , v2 , . . . , v2n , which are presented to the procedure sequentially two at a time in that order. As in the Gram-Schmidt procedure in indefinite inner product spaces, since the initial vectors are given, a certain condition is required for the new procedure proposed below to yield a symplectic basis for R2n . Lemma 2 (Symplectic QR decomposition) Let V be a real invertible 2n × 2n matrix with linearly independent columns v1 , v2 , . . ., v2n from left to right. Let Mi =   v2i−1 v2i ∈ R2n×2 for i = 1, 2, . . . , n and M̃1 = M1 , M̃2 = [ M1 M2 ], and M̃i = [ M1 M2 . . . Mi ] for i = 3, . . . , n, and assume that Ni = M̃i> Jn M̃i is full rank for i = 1, 2, . . . , n. Then V has a QR decomposition V = SY for some symplectic matrix S 6 and an upper 2 × 2 block triangular matrix Y . Moreover, S can be constructed recursively by contructing a sequence of real numbers αj , real 2(j − 1) × 2 matrices Ξj , and real invertible 2j × 2j matrices Sj , for j = 2, 3, . . . , n. Define µ1 as the (1,2) element of the p −1 skew-symmetric matrix N1 , α1 = |µ1 | , Ξ1 = I2 , and   1 0 S1 = M1 α1 Ξ1 . 0 sgn(µ1 ) For j = 2, 3, 4, . . . , n, define Sk recursively as     1 0    I2(j−1) αj Ξj 0 sgn(µj )    , Sj = Sj−1 Mj    1 0 0 αj 0 sgn(µj ) (5) p −1 > |µj | and Ξj = Jj−1 Sj−1 Jn Mj , where µj denotes the (1,2) element of with αj = > (Sj−1 Ξj + Mj ) Jn (Sj−1 Ξj + Mj ). Then Sj satisfies Sj> Jn Sj = Jj for j = 1, 2, 3, . . . , n, and S = Sn is symplectic. In particular, the columns of Sk are contained as the first 2k columns of Sk+1 , thus forming a symplectic basis of R2n for k = n. Moreover, defining the invertible matrices     1 0 αΞ 02×2(n−1)  X1 =  1 1 0 sgn(µ1 ) . 02(n−1)×2 I2(n−1) and   I2(j−1)  Xj =   0  0   1 0 αΞj 0  0 sgn(µj )  1 0 αj 0 0 sgn(µj ) 0 I2(n−j)       for j = 2, 3, . . . , n, then V = SY for an invertible upper 2 × 2 block triangular matrix Y = X −1 , where X = X1 X2 · · · Xn−1 Xn . Proof. Since M1> Jn M1 is a real 2×2 skew-symmetric matrix and is full rank by hypothesis, it is of the form   0 µ1 > M1 Jn M1 = , −µ1 0 with µ1 6= 0. It follows immediately from the given construction of S1 in the statement of the theorem that S1> Jn S1 = J1 . Therefore, the columns of S1 are mutually skew-orthogonal. We proceed further by induction. Suppose that the columns of Sj , as constructed according to the theorem, form a partial symplectic basis for 1 < j < n, i.e., Sj> Jn Sj = Jj . Consider now the matrix Zj+1 = Sj Ξj+1 + Mj+1 for some real 2j × 2 matrix Ξj+1 . We will choose Ξj+1 to satisfy Sj> Jn Zj+1 = 0. This yields the equation Sj> Jn Sj Ξj+1 + Sj> Jn Mj+1 = 0. Since Sj> Jn Sj = 7 Jj we can solve for Ξj+1 to obtain Ξj+1 = Jj Sj> Jn Mj+1 . Define the real 2 × 2 skew> symmetric matrix Yj+1 = Zj+1 Jn Zj+1 . We will show that Yj+1 6= 02×2 . We first note that since Nj+1 = [ M1 . . . Mj Mj+1 ]> Jn [ M1 . . . Mj Mj+1 ] is full rank by hypothesis, so is [ Sj Mj+1 ]> Jn [ Sj Mj+1 ]. This is a consequence of the fact that the columns of Sj are, by construction, linearly independent linear combinations of the columns of M1 , M2 , . . . , Mj . Moreover, since   Ij Ξj+1 [ Sj Zj+1 ] = [ Sj Mj+1 ] , 0 I2 while the matrix  Ij Ξj+1 0 I2  is evidently invertible, we conclude that [ Sj Zj+1 ]> Jn [ Sj Zj+1 ] is full rank skew-symmetric. By the given construction of Sj and Ξj+1 , [ Sj Zj+1 ]> Jn [ Sj Zj+1 ] is necessarily of the form   Jj 0 > [ Sj Zj+1 ] Jn [ Sj Zj+1 ] = . 0 Yj+1 From the fact that the left hand side of the identity is full rank, it follows immediately that Yj+1 is full rank 2 × 2 skew-symmetric. Therefore, it is necessarily of the form   0 µj+1 Yj+1 = , −µj+1 0 p −1 with µj+1 6= 0. Define αj+1 = |µj+1 | . Consider now the matrix   1 0 Z̃j+1 = αj+1 Zj+1 . 0 sgn(µj+1 ) Some brief calculations shows that, by construction, the matrix Z̃j+1 satisfies Sj> Jn Z̃j+1 = > 0, and Z̃j+1 Jn Z̃j = J1 . Therefore, we have shown for 1 < j < n that if the hypotheses of the theorem hold and Sj satisfies Sj> Jn Sj = Jj then the matrix Sj+1 given by (5) satisfies > Sj+1 Jn Sj+1 = Jj+1 . In particular, S = Sn is a symplectic matrix. Note that by the above construction each Xi as defined in the lemma is invertible. Direct calculations then show that V X1 = [ S1 V2→n ], V X1 X2 = [ S2 V3→n ], . . ., V X1 X2 · · · Xn = Sn = S, where Vj→n is matrix constructed of columns 2j to 2n of V from left to right. Moreover, clearly X = X1 X2 · · · Xn is upper 2 × 2 block triangular since each of the Xj in the product has this structure, and therefore so is Y = X −1 . Hence, V has the symplectic QR decomposition V = SX −1 = SY . This concludes the proof of the lemma. Let us now look at an example to illustrate Lemma 2. 8 Example 3 Consider the matrix   −15 42 −12 3  33 −22 7 28  . V =  9 26 −43 44  5 26 −45 −37 It can be verified that V > J2 V and the matrix N1 as defined in Lemma 2 are full rank. The symplectic matrix produced by executing the symplectic QR decomposition is then   −0.4862 −1.3612 −0.1418 −1.0405  1.0695 0.7130 0.0975 1.4863   S=  0.2917 −0.8427 −0.7193 0.4113  , 0.1621 −0.8427 −0.7569 −1.1093 while the upper 2 × 2 block triangular matrix Y such that V = SY is   30.8545 0 −0.7130 −28.0024  0 −30.8545 3.2734 −34.7437  ; Y =   0 0 55.6558 0 0 0 0 55.6558 Finally, we give a necessary and sufficient condition for a 2n × 2n matrix V to possess a symplectic QR decomposition. Theorem 4 Let V and Nj be as defined in Lemma 2. Then there exists a symplectic QR decomposition V = SY , with S a symplectic matrix and Y an invertible upper 2 × 2 block triangular matrix, if and only if the matrices N1 , N2 , . . ., Nn are full rank. Proof. The if part is the content of Lemma 2. For the necessity of the full rankness of N1 , N2 , . . ., Nn−1 , first note that V > Jn V = Y > S > Jn SY = Y > Jn Y . Take any k ∈ {1, 2, . . . , n − 1} and partition Y as   Y11,k Y12,k Y = , 0 Y22,k with Y11,k ∈ R2k×2k , Y12,k ∈ R2k×2(n−k) , and Y22,k ∈ R2(n−k)×2(n−k) , where Y11,k and Y22,k are invertible upper 2 × 2 block triangular matrices. Since Nk = [ I2k 0 ]V > Jn V [ I2k 0 ]> , > from the expression for Y above we immediately get that Nk = Y11,k Jk Y11,k , which is > evidently invertible for k = 1, 2, . . . , n − 1, while Nn = Y Jn Y is invertible by hypothesis. We now provide an example of an instance where the condition of Theorem 4 fails and hence V does not have symplectic QR decompositon. 9 Example 5 Consider the matrix  0  0 V =  −1 0 1 0 0 0 0 0 0 −1  0 1  . 0  0 Then V > Jn V is full rank. However, it may be verified that the matrix N1 associated with V is a zero matrix, hence the condition of Theorem 4 is not satisfied and V does not have a symplectic QR decomposition. 4 Pure cascade realization of the transfer function of generic linear quantum stochastic systems In this section we employ the results from the preceding section to obtain sufficient conditions under which a (physically realizable) linear quantum stochastic system has a pure cascade realization. It is shown that this condition will be met by generic (in a sense that will be detailed in this section) linear quantum stochastic systems, thereby extending the results obtained in [15] for the special case of completely passive systems to generic linear quantum stochastic systems (including a large class of active systems). Let us now recall a characterization of linear quantum stochastic systems G that have a pure cascade realization, i.e., G can be written as G = Gn / Gn−1 / · · · / G1 for some distinct one degree of freedom systems G1 , G2 , . . . , Gn . Theorem 6 [15, Theorem 4] Let R = [Rij ]i,j=1,2,...,n with Rij ∈ R2×2 , and K = [ K1 K2 . . . Kn ] with Ki ∈ Cm . A linear quantum stochastic system G = (S, Kx, 21 x> Rx) with n degrees of freedom is realizable by a pure cascade of n one degree of freedom harmonic oscillators (without a direct interaction Hamiltonian) if and only if the A matrix is similar via a symplectic permutation matrix to a lower 2 × 2 block triangular matrix. That is, there exists a symplectic permutation matrix P such that P AP > = Ã, where à is lower 2 × 2 block triangular. Let R̃ = P RP > = [R̃ij ], K̃ = KP > = [ K̃1 K̃2 . . . K̃n ], with R̃ij ∈ R2×2 and K̃j ∈ Cm . If the condition is satisfied then G can be explicitly constructed as the cascade connection Gn / Gn−1 / . . . / G1 with G1 = (S, K̃1 x̃1 , 21 x̃> 1 R̃11 x̃1 ), and Gk = 1 > (I, K̃k x̃k , 2 x̃k R̃kk x̃k ) for k = 2, . . . , n, where x̃ = (qπ(1) , pπ(1) , qπ(2) , pπ(2) , . . . , qπ(n) , pπ(n) )> , and π is a permutation of {1, 2, . . . , n} onto itself such that x̃ = P x. Remark 7 The theorem has been stated as a minor and trivial generalization of [15, Theorem 4]. The original did not include the additional freedom of allowing a symplectic permutation matrix to transform A into lower 2 × 2 block triangular form, corresponding to a mere permutation of pairs of position and momentum operators in x. For instance, if A is in upper 2 × 2 block triangular form it can be trivially transformed into lower 2 × 2 block triangular form by a suitable symplectic permutation matrix, which by [15, Theorem 4] would then be physically realizable by pure cascading. 10 Given an n degree of freedom linear quantum stochastic system G = (A, B, C, D) with transfer function ΞG (s) = C(sI − A)−1 B + D, the problem that will be addressed is how to obtain a cascade of n one degree of freedom linear quantum stochastic systems that has transfer function ΞG (s), if such a cascade exists. Recall that for any symplectic matrix T , the system GT = (T AT −1 , T B, CT −1 , D) is a physically realizable system that has the same transfer function as G. The main strategy is to find a symplectic matrix T such that GT is the cascade realization that is sought. Before stating the main result, let us recall the real Jordan canonical form of a real matrix; see, e.g., [24, Section 3.4]. Let A be a real square matrix then A can always be decomposed as A = V JA V −1 , where JA is a Jordan canonical form for A. Of course, although A is real, its eigenvalues and eigenvectors can be complex, but they always come in complex conjugate pairs. That is, if λ and v are a complex eigenvalue and eigenvector of A then so are λ∗ and v # , respectively. Therefore, in general, V and JA may have complex entries. However, when A is real it is also similar to a real Jordan canonical form. A real Jordan block for a real Jordan canonical corresponding to a real eigenvalue of A is the same as the corresponding block in the Jordan canonical form. However, to a pair of conjugate complex eigenvalues λk = ak + ıbk and λ∗ = ak − ıbk there will associated with them one or more real Jordan blocks of the upper 2 × 2 block triangular form   Ck I2 02×2 02×2 . . . 02×2  02×2 Ck I2 02×2 . . . 02×2    .. ..   . . 02×2  ,  02×2 02×2 Ck   . .. .. ... ...  .. . . I2  02×2 02×2 02×2 02×2 . . . Ck with  Ck = ak b k −bk ak  . With respect to the real Jordan blocks, A can be written as Ṽ J˜A Ṽ −1 , where J˜A is a real Jordan canonical form of A (unique up to permutation of the real Jordan blocks), and Ṽ a real invertible matrix [24, Section 3.4]. We are now ready to state the main results of this section. Lemma 8 (Symplectic Schur decomposition) Let A be a real 2n × 2n matrix. Then A has a symplectic Schur decomposition A = S −1 U S with U lower 2 × 2 block triangular if there exists a real invertible 2n × 2n matrix Ṽ = [ ṽ1 ṽ2 . . . ṽ2n−1 ṽ2n ] such that (i) Ṽ brings A into a real Jordan canonical form J˜A = Ṽ −1 AṼ , with J˜A in the upper 2 × 2 block triangular form J˜A = diag(J˜A,r , J˜A,c ), where J˜A,r contains all Jordan blocks corresponding to the (possibly repeated) real eigenvalues of A (in upper triangular form), and J˜A,c contains all real Jordan blocks corresponding to the complex eigenvalues of A. 11 (ii) The matrices Ñ1 , Ñ2 , . . ., Ñn−1 given by Ñ1 = [ ṽ1 ṽ2 ]> Jn [ ṽ1 ṽ2 ], Ñ2 = [ ṽ1 ṽ2 ṽ3 ṽ4 ]> Jn [ ṽ1 ṽ2 ṽ3 ṽ4 ], .. . Ñn−1 = [ ṽ1 ṽ2 . . . ṽ2n−3 ṽ2n−2 ]> Jn [ ṽ1 ṽ2 . . . ṽ2n−3 ṽ2n−2 ]. are all full rank. If the above conditions hold, let S1 be a 2n × 2n symplectic matrix obtained from Ṽ by applying the symplectic QR decomposition of Lemma 2 so that Ṽ = S1 Y , for an invertible 2n × 2n upper 2 × 2 block triangular matrix Y as given by the lemma, and let P ∈ R2n×2n be a permutation matrix that implements the mapping (q1 , p1 , q2 , p2 , . . . , qn , pn )> 7→ (qn , pn , qn−1 , pn−1 , . . . , q1 , p1 )> . Then A has the symplectic Schur decomposition A = S −1 U S with S = P S1−1 and U lower 2 × 2 block triangular. Remark 9 Notice that since A and J˜A,c have even dimensions, so does J˜A,r . One can always choose a real Jordan canonical form of A to be of the form J˜A = diag(J˜A,r , J˜A,c ), which is upper 2 × 2 block triangular. Proof. Let A = Ṽ J˜A Ṽ −1 , with J˜A and Ṽ as given in the lemma. By conditions (i) and (ii), using Lemma 2 we can construct a symplectic matrix S1 such that Ṽ = S1 Y , with Y real invertible upper 2 × 2 block triangular as given in the lemma. We can thus write A = Ṽ J˜A Ṽ −1 = S1 Y J˜A Y −1 S1−1 . Moreover, since J˜A = diag(J˜A,r , J˜A,c ), Y , and Y −1 are all upper 2 × 2 block triangular, the product Y J˜A Y −1 is also upper 2 × 2 block triangular. Let P ∈ R2n×2n be the permutation matrix defined in the lemma. Notice that, by its definition, the permutation matrix P is symplectic, and that P ZP > is 2 × 2 lower block triangular whenever Z is upper 2 × 2 block triangular. It follows from these observations that P Y J˜A Y −1 P > is lower 2 × 2 block triangular. Therefore, we conclude that SAS −1 with S = P S1−1 is a lower 2 × 2 block triangular matrix, since SAS −1 = P Y J˜A Y −1 P > . Additionally, notice that S is symplectic since S1−1 (the inverse of a symplectic matrix) and P are symplectic.  A direct consequence of Lemma 8 is the existence of the cascade realization of the transfer function of a linear quantum stochastic system when the conditions of the lemma are satisfied. Theorem 10 Let G = (A, B, C, D) be a physically realizable n degree of freedom linear quantum stochastic system. If there exists a matrix Ṽ associated to the 2n × 2n matrix A satisfying the conditions of Lemma 8 then there exists a symplectic matrix S such that the transformed system (SAS −1 , SB, CS −1 , D) is physically realizable with SAS −1 lower 2 × 2 block triangular, i.e., ΞG (s) has a pure cascade realization. 12 Proof. Let S be as in Lemma 8, then A = SAS −1 is lower 2 × 2 block triangular. Therefore, ΞG (s) has a pure cascade realization by Theorem 6.  We emphasize that fulfillment of the full rankness conditions on Ñ1 , Ñ2 , . . ., Ñn−1 depends on the choice of the matrix Ṽ which transforms A into its real Jordan canonical form (which is not unique). For some choices of Ṽ the full rankness conditions may fail to hold and thus a pure cascade realization of the transfer function cannot be obtained. Let us call as admissible all real 2n × 2n matrices A satisfying the conditions of Lemma 8, and refer to those that do not as non-admissible. The following examples illustrate some samples of non-admissible matrices that cannot meet the conditions of Lemma 8. Example 11 Consider the matrix   −1 0 0 −1  0 −1 0 0   A=  −1 0 −1 0  , 0 −1 0 −1 which has the real Jordan decomposition A = Ṽ J˜A Ṽ −1 with (following from Example 5)     0 1 0 0 −1 1 0 0  0 0 0 1   0 −1 1 0   ˜  . Ṽ =   −1 0 0 0  , JA =  0 0 −1 1  0 0 −1 0 0 0 0 −1 It can be easily inspected that for any choice of permutation matrix P such that Ṽ P satisfies the conditions of Theorem 4, one will find that P J˜A P > will not be upper 2 × 2 block triangular. This matrix A is therefore non-admissible. Example 12 Consider the matrix   −2 0 0 0  0 −3 0 4  , A=  0 0 −1 0  0 −4 0 −3 which has the real Jordan decomposition A = Ṽ J˜A Ṽ −1 with    0 1 0 0 −1 0 0 0  0 0 0 1   0 −2 0 0  ˜  Ṽ =   −1 0 0 0  , JA =  0 0 −3 4 0 0 −1 0 0 0 −4 −3   .  As with Example 12 it can be verified that for any choice of permutation matrix P such that Ṽ P satisfies the conditions of Theorem 4, one will find that P J˜A P > will not be upper 2 × 2 block triangular. Thus A is also non-admissible. 13 We observe the following: 1. All diagonalizable matrices in R2n×2n (including all symmetric matrices) with only real eigenvalues are admissible. Example 14 to be given below involves this type of admissible matrix. 2. Non-admissible matrices in R2n×2n include the following cases: (i) The matrix has a real repeated eigenvalue with geometric multiplicity less than its algebraic multiplicity, and there exist two mutually skew-orthogonal real basis vectors v1 and v2 for the invariant subspace of R2n associated with that eigenvalue. For some matrices of this type it is not possible to permute the columns of Ṽ and the corresponding rows and columns of J˜A to transform them into admissible matrices, as illustrated in Example 11. (ii) The matrix has a pair of conjugate complex eigenvalues λ and λ∗ (not necessarily repeated) with a corresponding pair of conjugate eigenvectors or generalized eigenvectors v and v # such that the real vectors v+v # and −ıv+ıv # are mutually skew-orthogonal. Example 12 illustrates an instance of a non-admissible matrix with this property. The non-admissibility of a real 2n × 2n matrix entails rather particular properties that are unlikely to be possessed by typical matrices. This suggests that admissible real 2n × 2n matrices are generic in the set of all real 2n × 2n matrices. Generic is in the sense that the set of admissible matrices contains an open and dense subset of R2n×2n . This is indeed the case and we state it as the following theorem, with the proof being deferred to the appendix. Theorem 13 The set of admissible 2n × 2n matrices is generic in R2n×2n . Thus, generic matrices in R2n×2n have a symplectic Schur decomposition and the transfer function ΞG (s) of a generic physically realizable linear quantum stochastic system G = (A, B, C, D) has a pure cascade realization that can be explicitly determined using Lemma 8 and Theorem 10. We conclude this section by applying the results obtained herein in an example that demonstrates an equivalent realization of the transfer function of a nondegenerate optical parametric amplifier (NOPA) by a cascade of two degenerate parametric amplifiers (DPAs) equipped with an additional transmissive mirror. Example 14 Consider a NOPA with two modes aj = 21 (qj + ıpj ), j = 1, 2, satisfying the canonical commutation relations [aj , a∗k ] = δjk and [aj , ak ] = 0. The operators describing the √ √ γa2 ]> , and S = I2 . We take γ = 7.2 × 107 system is H = ı2 (a∗1 a∗2 − a1 a2 ), L = [ γa1 and  = 0.6γ = 4.32 × 107 , values that can be realized in a tabletop optical experiment, see, e.g., the experimental work [25] based on the proposals in [26, 27]. The A, B, C, D matrices 14 for the NOPA are:   −3.6 0 2.16 0  0 −3.6 0 −2.16  ; A = 107   2.16 0 −3.6 0  0 −2.16 0 −3.6 B = −8.4853 × 103 I4 ; C = 8.4853 × 103 I4 ; D = I4 . We can choose the matrix Ṽ in Theorem 10 to be   0.7071 0 0 0.7071   0 −0.7071 0.7071 0 , Ṽ =   −0.7071 0 0 0.7071  0 0.7071 0.7071 0 corresponding to the (real) Jordan canonical form J˜A = Ṽ −1 AṼ = 107 diag(−5.76, −1.44, −5.76, −1.44). Using Lemma 2, we compute the symplectic matrix S1 and upper matrix Y as  0.7071 0 0 −0.7071  0 0.7071 0.7071 0 S1 =   −0.7071 0 0 −0.7071 0 −0.7071 0.7071 0 Y = diag(1, −1, 1, −1). 2 × 2 block triangular   ;  The required symplectic transformation matrix from Theorem 10 is S = P S1−1 , and a cascade realization of the transfer function of the NOPA is G1 = (A1 , B1 , C1 , D1 ) = (SAS −1 , SB, CS −1 , D) with   −5.76 0 0 0  0 −1.44 0 0  ; A1 = 107   0 0 −5.76 0  0 0 0 −1.44     0 −6 6 0 0 −6 0 −6   6 0 6 0  0 6    ; C1 = 103  6 0 B1 = 103   −6 0 6 0   0 −6 −6 0  ; 6 0 0 −6 0 −6 0 6 D1 = I4 . The cascade realization G1 can be decomposed as the cascade G1 = G12 / G11 , with      3ı −3 q1 3 6 G11 = I2 , 10 , −5.4 × 10 (q1 p1 + p1 q1 ) , 3ı −3 p1 15 and G12      3 3ı q2 6 3 , −5.4 × 10 (q2 p2 + p2 q2 ) . = I2 , 10 −3 −3ı p2 Each of G11 and G12 can be realized as a DPA with two transmissive mirrors rather than one; see [3] for details of the realization of G11 and G12 . Note that the pump amplitude for each NOPA in the cascade realization is 4 × 5.4 × 106 = 2.16 × 107 . Therefore, remarkably, the cascade realization G12 / G12 requires less total pump power to realize than the original NOPA, i.e., 2 × (2.16 × 107 )2 in the cascade compared to (4.32 × 107 )2 in the original, i.e., half the pump power. So, with the cascade realization one obtains a more power efficient realization of the same transfer function which yields the same amount of twomode squeezing in the two output beams. Finally, note that if Ṽ had been chosen differently from the one above, for instance, as   0.7071 0 0.7071 0  0 0.7071 0 −0.7071  , Ṽ =   −0.7071  0 0.7071 0 0 0.7071 0 0.7071 corresponding to J˜A = Ṽ −1 AṼ = 107 diag(−5.76, −5.76, −1.44, −1.44), then it may be readily inspected that the full rankness conditions of Lemma 8 are not satisfied, hence this choice of Ṽ cannot lead to a pure cascade realization of the NOPA. 5 Conclusion In this paper we have generalized the ideas and results in [17, 15], that focus on the special class of completely passive linear quantum stochastic systems, to show that the transfer function of generic linear quantum stochastic systems, which includes a large generic class of active systems, can be realized by pure cascading. The proof is constructive as the cascade realization, when it exists, can be explicitly computed. This is of practical importance as it will allow a simpler realization of a large class of linear quantum stochastic systems as, say, coherent feedback controllers or quantum optical filters. Numerical examples have been provided to illustrate the results of the paper. In one example, it is shown that the transfer function of a nondegenerate optical parametric amplifier has a realization as the cascade of two degenerate optical parametric amplifiers having an additional outcoupling mirror, which operates for only half of the pump power required by the nondegenerate optical parametric amplifier. Acknowledgement. Contributions: HN developed the symplectic QR and Schur decomposition algorithms, associated results and Example 14, SG and IP proved the genericity of admissible matrices in discussion with HN. The authors thank the reviewers and Associate Editor for their constructive and helpful comments on this paper. 16 Proof of Theorem 13 Let M2n (R) denote the set of 2n × 2n real matrices, M̄2n (R) denote the subset of full rank (i.e. invertible) matrices, and M̄2n,s (R) the subset of those matrices in M̄2n (R) that are simple (recall that simple matrices are square matrices with simple eigenvalues, i.e., all eigenvalues are distinct). M̄2n (R) and M̄2n,s (R) are generic (open and dense) in M2n (R), and in fact they are (non-connected) manifolds of dimension 2n × 2n = 4n2 . Similarly, let A2n (R) denote the set of real skew-symmetric 2n×2n matrices, and Ā2n (R) the subset of full rank such matrices. Ā2n (R) is generic (open and dense) in A2n (R), and in fact it is a (nonconnected) manifold of dimension (2n × 2n − 2n)/2 = 2n2 − n. For a matrix X in A2n (R), we define the principal submatrices X (i) as the upper left corner 2i × 2i submatrices of X (i.e., the sub-matrices formed by rows and columns 1 to 2i) from X (1) up to X (n) = X. Let Ã2n (R) be the subset of Ā2n (R) containing matrices X with the property that all X (i) , i = 1, . . . , n − 1, are full rank. Finally, let M̃2n,s (R) denote the subset of matrices in M̄2n,s (R) which are admissible. This means that they have the following properties: (i) there is a real invertible 2n × 2n matrix V that puts them in a real Jordan canonical form JA (A = V JA V −1 ), which is block-diagonal, with the 1 × 1 real blocks before the 2 × 2 complex blocks (recall that A is simple, so it has no real Jordan blocks of dimension higher than two), and (ii) V > Jn V ∈ Ã2n (R). The proof uses arguments inspired by the proof of genericity of simple matrices in the set of all real square matrices of a given dimension, from [28, Section 5.6]. Also, it relies heavily on methods and results from differential topology. A standard reference for these methods and results, along with terminology and notation, is the book [29]. Finally, a crucial argument uses Theorem 5.16 of [30, Chapter II] and its proof. The proof uses Lemma 15 and Proposition 17, and Lemma 16 is needed in the proof of Proposition 17. All these results will be proved later on in this appendix. Lemma 15 Let T ∈ RN ×N be a simple matrix with nonzero eigenvalues. There is a neighborhood of T in RN ×N such that, every matrix in this neighborhood has eigenvectors and eigenspaces (the latter represented by projection operators onto the respective eigenspaces) which are continuous functions of their entries, and moreover, their eigenvalues are of the same type as those of T . Lemma 16 Let F : M̄2n (R) → Ā2n (R) be defined by F (V ) = V > Jn V . Then, F is onto, and a submersion (see [29, Section 1.4] for terminology). Proposition 17 The set V2n of matrices V ∈ M̄2n (R) such that V > Jn V ∈ Ã2n (R), is open and dense. We have to show that M̃2n,s (R) is an open and dense (generic) subset of M2n (R). First, we show that M̃2n,s (R) is an open set. Consider a matrix A ∈ M̃2n,s (R) ⊂ M̄2n,s (R), and let A = V JA V −1 . The block-diagonal real Jordan canonical form JA of A, has the 1 × 1 real blocks before the 2 × 2 complex blocks, and no real Jordan blocks of dimension higher than two. Also, V ∈ V2n . Applying Lemma 15 to A, we conclude that there is a 17 neighborhood N 0 (A) such that for every à ∈ N 0 (A), à = Ṽ Jà Ṽ −1 , with Ṽ close to V , and Jà close to JA , and with the same block structure. Let E = Ṽ − V . Then, Ṽ > Jn Ṽ = (V + (i) E)> Jn (V +E) = V > Jn V +E > Jn V +V > Jn E +E > Jn E. Hence, det Ṽ > Jn Ṽ = P (i) (E), a multivariate polynomial of degree 4i in the entries Ejk of E = Ṽ − V , whose constant term (i) (i) is det V > Jn V . However, for matrices V ∈ V2n , det V > Jn V 6= 0, i = 1, . . . , n − 1. (i) > By continuity, there exists ε0 > 0, such that det Ṽ Jn Ṽ 6= 0, for any E ∈ M2n (R) with maxjk |Ejk | < ε0 . By shrinking the neighborhood of A if necessary, we can satisfy maxjk |Ṽjk − Vjk | < ε0 , and hence Ṽ ∈ V2n and à ∈ M̃2n (R). This proves that M̃2n,s (R) is an open subset of M̄2n,s (R). To prove that M̃2n,s (R) is a dense subset of M2n (R), we must prove that every A ∈ M2n (R) has a à ∈ M̃2n,s (R) arbitrarily close to it. Since M̄2n,s (R) is a dense subset of M2n (R), there exists a Ā ∈ M̄2n,s (R) arbitrarily close to A. Let Ā = V̄ JĀ V̄ −1 . Then, JĀ is a block-diagonal real Jordan canonical form with no Jordan blocks of dimension higher than two, and can be structured so that it has the 1×1 real blocks before the 2×2 complex blocks. Also, V̄ ∈ M̄2n (R). If V̄ is not in V2n , we know from Proposition 17 that we can find a Ṽ arbitrarily close to V̄ that is in V2n . Then, à = Ṽ JĀ Ṽ −1 ∈ M̃2n,s (R), and is arbitrarily close to A. Hence, M̃2n,s (R) is a dense subset of M̄2n,s (R), and the theorem is proven.  Proof of Lemma 15: Theorem 5.16 of [30, Chapter II] states that, for a simple matrix in CN ×N , there is a neighborhood of matrices in CN ×N that contains it, such that the eigenvalues of every matrix in this neighborhood are holomorphic functions of the matrix entries. Furthermore, in the proof of this theorem, it is shown that the eigenspaces of matrices in this neighborhood are also holomorphic functions of their entries. Specializing these results to real matrices, we have that for a simple matrix in RN ×N , there is a neighborhood of matrices in RN ×N that contains it, such that the eigenvalues and eigenspaces (with eigenspaces being represented by projection operators onto the respective eigenspaces) of every matrix in this neighborhood are analytic functions of its entries. Let T ∈ RN ×N be a simple matrix with nonzero eigenvalues, and T = U JU −1 a decomposition of it in a Jordan form (J is diagonal with distinct entries). Let also T̃ ∈ RN ×N be a matrix in the neighborhood N (T ) of T with the aforementioned properties. Taking the entries of T̃ arbitrarily close to those of T , the eigenspaces of the two matrices can be made arbitrarily close, as well. Hence, we may change the chosen eigenvectors of T (columns of U ) to form eigenvectors of T̃ in a continuous way. Then, we may write T̃ = Ũ J˜Ũ −1 , where Ũ is arbitrarily close to U . Similarly, the diagonal matrix J˜ of eigenvalues of T̃ will be arbitrarily close to J. Due to the property of real matrices to have complex eigenvalues in conjugate pairs, and the fact that that T has no zero eigenvalues, there is a neighborhood N 0 (T ) ⊆ N (T ) such that every T̃ ∈ N 0 (T ) has eigenvalues not only close, but of the same type as T . The reason is that, for a pair of complex conjugate eigenvalues to be created (destroyed), two distinct real nonzero eigenvalues must coalesce to a double eigenvalue (be produced by the separation of two equal real eigenvalues). This, however, can be prevented by shrinking the neighborhood of T as much as necessary.  18 Proof of Lemma 16: First, we show that F is properly defined. Obviously, F (V ) is antisymmetric. For a V ∈ M̄2n (R), det V 6= 0, so det F (V ) = (det V )2 det Jn = (det V )2 6= 0, and hence F (V ) ∈ Ā2n (R). Next, we show that F is onto. Let X ∈ Ā2n (R). From [24, Subsection 2.5.14], we know that there exists a 2n × 2n orthogonal matrix Q, and a 2n × 2n block-diagonal matrix Λ of the form     0 λ1 0 λn Λ = diag ,..., , −λ1 0 −λn 0 with λi ≥ 0, i = 1, . . . , n, such that X = Q> ΛQ. Furthermore, the eigenvalues of X are ±ıλ1 , . . ., ±ıλn ,√and √ hence λi √ > 0, √ for a full rank X. It is easy to see that Λ = D> Jn D, with D = diag( λ1 , λ1 , . . . , λn , λn ). Then, X = V > Jn V , for V = DQ, and V is full rank because Q and D are. Hence, F is onto. Continuity and differentiability follow from the fact that the entries of F (V ) are second order multivariate polynomials in the entries of V . Finally, we show that F is a submersion, i.e. that its derivative DFV : TV M̄2n (R) → TF (V ) Ā2n (R) is a surjective linear map from the tangent space TV M̄2n (R) of M̄2n (R) at V , to the tangent space TF (V ) Ā2n (R) of Ā2n (R) at F (V ), see [29, Chapter 1] for terminology and notation. Starting from F (V ) = V > Jn V and “taking differentials” of both sides, we have that dF = (dV )> Jn V + V > Jn dV . Hence, for a tangent vector v ∈ TV M̄2n (R) (infinitesimal variation dV at V ), we have DFV (v) = v > Jn V + V > Jn v. The tangent space of M̄2n (R) at any point V is isomorphic to M2n (R), and the tangent space of Ā2n (R) at any point X is isomorphic to A2n (R). Hence, v ∈ M2n (R), and DFV (v) ∈ A2n (R). Let w be a tangent vector in TF (V ) Ā2n (R). To show that DFV : TV M̄2n (R) → TF (V ) Ā2n (R) is surjective, we must show that for any such w, there exists at least one v ∈ TV M̄2n (R), such that DFV (v) = w. This is equivalent to the equation v > Jn V + V > Jn v = w having a solution v ∈ M2n (R) given any w ∈ A2n (R). Let v = Jn (V > )−1 v̄ in that equation (recall that for any V ∈ M̄2n (R), V is invertible). Then, it reduces to −v̄ + v̄ > = w, where the antisymmetry of Jn , and the identity J2n = −I2n were used. The general solution of this equation is v̄ = u− 21 w, where u is any 2n×2n symmetric matrix. It is to be expected that the solution for v (equivalently for v̄) is not unique, since TV M̄2n (R) is a higher dimensional space from TF (V) Ā2n (R). As a matter of fact, the general solution for v, v = Jn (V > )−1 v̄ = Jn (V > )−1 u− 21 w is parameterized by a 2n×2n symmetric matrix u. The set of such matrices is a linear space of dimension 12 2n(2n+1) = 2n2 +n, and its dimension is exactly the difference of dimensions of TV M̄2n (R) (4n2 ) and TF (V ) Ā2n (R) (2n2 − n). Hence, we proved that DFV is surjective for every V ∈ M̄2n (R), i.e. F is a (local) submersion.  Proof of Proposition 17: First, we show that the set of V ∈ M̄2n (R) such that F (V ) = V > Jn V ∈ Ã2n (R), is open in M̄2n (R). Consider such a V . Then, det F (V )(i) 6= 0, i = 1, . . . , n. Let E ∈ M2n (R), and consider det F (V + E)(i) . Since F (V + E) = (V +E)> Jn (V +E) = V > Jn V +E > Jn V +V > Jn E+E > Jn E, we can see that det F (V +E)(i) = P (i) (E), a multivariate polynomial of degree 4i in the entries Ejk of E, whose constant term is det F (V )(i) . By continuity, there exists ε0 > 0, such that det F (V + E)(i) 6= 0, for any E ∈ M2n (R) with |Ejk | < ε0 , j, k = 1, 2, . . . , 2n. This proves that, the set of V ∈ M̄2n (R) such that F (V ) = V > Jn V ∈ Ã2n (R), is open in M̄2n (R). 19 Now we shall prove that it is dense as well. It suffices to show that, for V ∈ M̄2n (R) such  that F (V ) = V > Jn V ∈ Ā2n (R)\Ã2n (R) , there exists a Ṽ ∈ M̄2n (R) arbitrarily close to  V such that F (Ṽ ) = Ṽ > Jn Ṽ ∈ Ã2n (R). Since X = F (V ) = V > Jn V ∈ Ā2n (R)\Ã2n (R) , there exists at least one 1 ≤ r ≤ n − 1, such that det X (r) = det F (V )(r) = 0. Since X (r) is a 2r × 2r real skew-symmetric matrix, there exists an 2r × 2r orthogonal matrix Q such that X (r) = Q> SQ, with     0 ν1 0 νr S = diag ,..., , −ν1 0 −νr 0 and νi ≥ 0, i = 1, . . . , r. Then, det X (r) = (det Q)2 det S = (ν1 . . . νr )2 . Since det X (r) = 0, this implies that at least one of the ν’s must be equal to zero. Without loss of generality, we may assume that the first q are equal to zero, 1 ≤ q ≤ r. Let S̃ be given by the expression above, where the zero ν’s have been replaced by nonzero ε1 , . . . , εq :       0 ε1 0 εq 0 νq+1 S̃ = diag ,..., , , −ε1 0 −εq 0 −νq+1 0   0 νr . ..., −νr 0 Let also,  S W −W > U   = Q 0 0 I2(n−r)   X Q> 0 0 I2(n−r)  , and  X̃ = Q> 0 0 I2(n−r)  S̃ W > −W U  Q 0 0 I2(n−r)  . It is obvious that X̃ can be arbitrarily close to X, for small enough ε1 , . . . , εq , and that det X̃ (r) = det S̃ = (ε1 . . . εq νq+1 . . . νr )2 6= 0. We can also see that det X̃ (i) = P̃ (i) (ε1 , . . . , εq ), for i = 1, . . . , n, where P̃ (i) (ε1 , . . . , εq ) is a multivariate polynomial of degree at most 2i in the variables ε1 , . . . , εq , with constant term equal to det X (i) . Hence, for small enough ε1 , . . . , εq , all the determinants det X (i) 6= 0 remain so for X̃. So, by slightly changing X to X̃, we increased the number of principal submatrices X̃ (i) of full rank by (at least) one, compared with those of X. If, for some principal submatrices of X̃ (i) (such that det X (i) = 0), we still have det X̃ (i) = 0, we may apply the same procedure sequentially, and end up with a matrix X̃ ∈ Ã2n (R) arbitrarily close to X. From Proposition 16, F is globally onto. This guarantees that there exists Ṽ ∈ M̄2n (R) such that Ṽ > Jn Ṽ = F (Ṽ ) = X̃. Moreover, F is a submersion at V . The Local Submersion Theorem [29, Section 1.4], guarantees that a neighborhood of X = F (V ) (in which we may assume that X̃ belongs to, because we may construct X̃ to be arbitrarily close to to X) is the image under F of a neighborhood of V . Then, there exists Ṽ ∈ M̄2n (R) in said neighborhood of V , such that Ṽ > Jn Ṽ = F (Ṽ ) = X̃ ∈ Ã2n (R). Hence, the set of V ∈ M̄2n (R) such that F (V ) = V > Jn V ∈ Ã2n (R), is also dense in M̄2n (R), and the proposition is proven.  20 References [1] V. P. Belavkin, S. C. Edwards, Quantum filtering and optimal control, in: V. P. Belavkin, M. Guta (Eds.), Quantum Stochastics and Information: Statistics, Filtering and Control (University of Nottingham, UK, 15 - 22 July 2006), World Scientific, Singapore, 2008, pp. 143–205. [2] M. R. James, H. I. Nurdin, I. R. Petersen, H ∞ control of linear quantum stochastic systems, IEEE Trans. Automat. Contr. 53 (8) (2008) 1787–1803. [3] H. I. Nurdin, M. R. James, A. C. Doherty, Network synthesis of linear dynamical quantum stochastic systems, SIAM J. Control Optim. 48 (4) (2009) 2686–2718. [4] J. E. Gough, M. R. James, H. I. Nurdin, Squeezing components in linear quantum feedback networks, Phys. Rev. A 81 (2010) 023804–1– 023804–15. [5] C. W. Gardiner, P. Zoller, Quantum Noise: A Handbook of Markovian and NonMarkovian Quantum Stochastic Methods with Applications to Quantum Optics, 3rd Edition, Springer-Verlag, Berlin and New York, 2004. [6] H. I. Nurdin, M. R. James, I. R. Petersen, Coherent quantum LQG control, Automatica 45 (2009) 1837–1846. [7] R. Hamerly, H. Mabuchi, Advantages of coherent feedback for cooling quantum oscillators, Phys. Rev. Lett. 109 (2012) 173602–1–173602–5. [8] O. Crisafulli, N. Tezak, D. B. S. Soh, M. A. Armen, H. Mabuchi, Squeezed light in an optical parametric amplifier oscillator network with coherent feedback quantum control, Opt. Express 21 (2013) 18371–18386. [9] J. Kerckhoff, R. W. Andrews, H. S. Ku, W. F. Kindel, K. Cicak, R. W. Simmonds, K. W. Lehnert, Tunable coupling to a mechanical oscillator circuit using a coherent feedback network, Phys. Rev. X 3 (2) (2013) 021013–1–021013–13. [10] G. Zhang, M. R. James, On the response of quantum linear systems to single photon input fields, IEEE Trans. Automat. Control 58 (5) (2013) 1221–1235. [11] G. Zhang, Analysis of quantum linear systems’ response to multi-photon states, Automatica 50 (2) (2014) 442–451. [12] K. Koga, N. Yamamoto, Dissipation-induced pure Gaussian state, Phys. Rev. A 85 (2012) 022103–1–022103–8. [13] N. C. Menicucci, P. van Loock, M. Gu, C. Weedbrook, T. C. Ralph, M. A. Nielsen, Universal quantum computation with continuous-variable cluster states, Phys. Rev. Lett. 97 (2006) 110501–1–110501–4. 21 [14] H. I. Nurdin, Synthesis of linear quantum stochastic systems via quantum feedback networks, IEEE Trans. Automat. Contr. 55 (4) (2010) 1008–1013, extended preprint version available at http://arxiv.org/abs/0905.0802. [15] H. I. Nurdin, On synthesis of linear quantum stochastic systems by pure cascading, IEEE Trans. Automat. Contr. 55 (10) (2010) 2439–2444. [16] I. R. Petersen, Cascade cavity realization for a class of complex transfer functions arising in coherent quantum feedback control, in: Proceedings of the 2009 European Control Conference (Budapest, Hungary, 23-26 August 2009), 2009. [17] I. R. Petersen, Low frequency approximation for a class of linear quantum systems using cascade cavity realization, Systems Control Lett. 6 (1) (2012) 173–179. [18] S. Wang, H. I. Nurdin, G. Zhang, M. R. James, Synthesis and structure of mixed quantum-classical linear systems, in: Proceedings of the 51st IEEE Conference on Decision and Control (Maui, Hawaii, Dec. 10-13, 2012), 2012, pp. 1093–1098. [19] H. I. Nurdin, Structures and transformations for model reduction of linear quantum stochastic systems, IEEE Trans. Automat. Control 59 (9) (2014) 2413–2425. [20] J. Gough, M. James, The series product and its application to quantum feedforward and feedback networks, IEEE Trans. Automatic Control 54 (11) (2009) 2530–2544. [21] M. A. de Gosson, Symplectic Methods in Harmonic Analysis and in Mathematical Physics, Springer, 2011. [22] A. Salam, On theoretical and numerical aspects of symplectic Gram-Schmidt-like algorithms, Numer. Algorithms 39 (2005) 437–462. [23] I. Gohberg, P. Lancaster, L. Rodman, Matrices and Indefinite Scalar Products, Vol. 8 of Operator Theory, Birkhäuser, 1983. [24] R. A. Horn, C. R. Johnson, Matrix Analysis, Cambridge University Press, 1985. [25] S. Iida, M. Yukawa, H. Yonezawa, N. Yamamoto, A. Furusawa, Experimental demonstration of coherent feedback control on optical field squeezing, IEEE Trans. Automat. Contr. 57 (8) (2012) 2045–2050. [26] M. Yanagisawa, H. Kimura, Transfer function approach to quantum control-part II: Control concepts and applications, IEEE Trans. Automatic Control (48) (2003) 2121– 2132. [27] J. Gough, S. Wildfeuer, Enhancement of field squeezing using coherent feedback, Phys. Rev. A 80 (4) (2009) 042107. [28] M. Hirsch, S. Smale, R. Devaney, Differential Equations, Dynamical Systems, and an Introduction to Chaos, 2nd Edition, Elsevier, 2004. 22 [29] V. Guillemin, A. Pollack, Differential Topology, Prentice-Hall, 1974. [30] T. Kato, Pertubation Theory for Linear Operators, Springer-Verlag, 1995. 23
3cs.SY
NUMERICAL SEMIGROUPS PROBLEM LIST arXiv:1304.6552v1 [math.AC] 24 Apr 2013 M. DELGADO, P. A. GARCÍA-SÁNCHEZ, AND J. C. ROSALES 1. Notable elements and first problems linear combination, with nonnegative integer coefficients, of a fixed set of integers with greatest A numerical semigroup is a subset of N (here common divisor equal to 1. He also raised the N denotes the set of nonnegative integers) that is question of determining how many positive inteclosed under addition, contains the zero element, gers do not admit such a representation. With and its complement in N is finite. our terminology, the first problem is equivalent If A is a nonempty subset of N, we denote by to that of finding a formula in terms of the genhAi the submonoid of N generated by A, that is, erators of a numerical semigroup S of the greatest integer not belonging to S (recall that its hAi = {λ1 a1 +· · ·+λn an | n ∈ N, λi ∈ N, ai ∈ A}. complement in N is finite). This number is thus It is well known (see for instance [41, 45]) that known in the literature as the Frobenius numhAi is a numerical semigroup if and only if ber of S, and we will denote it by F(S). The elements of H(S) = N \ S are called gaps of gcd(A) = 1. If S is a numerical semigroup and S = hAi for S. Therefore the second problem consists in some A ⊆ S, then we say that A is a system of determining the cardinality of H(S), sometimes generators of S, or that A generates S. More- known as genus of S ([25]) or degree of singularover, A is a minimal system of generators of S if ity of S ([3]). In [60] Sylvester solves the just quoted probno proper subset of A generates S. In [45] it is shown that every numerical semigroup admits a lems of Frobenius for embedding dimension unique minimal system of generators, and it has two. For semigroups with embedding dimension greater than or equal to three these problems refinitely many elements. Let S be a numerical semigroup and let {n1 < main open. The current state of the problem is n2 < · · · < ne } be its minimal system of gen- quite well collected in [30]. erators. The integers n1 and e are known as Let S be a numerical semigroup. Following the multiplicity and embedding dimension of S, the terminology introduced in [39] an integer x and we will refer to them by using m(S) and is said to be a pseudo-Frobenius number of S e(S), respectively. This notation might seem if x 6∈ S and x + S \ {0} ⊆ S. We will deamazing, but it is not so if one takes into ac- note by PF(S) the set of pseudo-Frobenius numcount that there exists a large list of manuscripts bers of S. The cardinality of PF(S) is called devoted to the study of analytically irreducible the type of S (see [3]) and we will denote it by one-dimensional local domains via their value t(S). It is proved in [18] that if e(S) = 2, then semigroups, which are numerical semigroups. t(S) = 1, and if e(S) = 3, then t(S) ∈ {1, 2}. The invariants we just introduced, together with It is also shown that if e(S) ≥ 4, then t(S) can others that will show up later in this work, have be arbitrarily large, t(S) ≤ m(S) − 1 and that an interpretation in that context, and this is why (t(S)+1)g(S) ≤ t(s)(F(S)+1). This is the startthey have been named in this way. Along this ing point of a new line of research that consists line, [3] is a good reference for the translation for in trying to determine the type of a numerical the terminology used in the Theory of Numerical semigroup, once other invariants like multiplicity, embedding dimension, genus or Frobenius Semigroups and Algebraic Geometry. Frobenius (1849-1917) during his lectures pro- number are fixed. posed the problem of giving a formula for the Wilf in [66] conjectures that if S is a numerical greatest integer that is not representable as a semigroup, then e(S)g(S) ≤ (e(S) − 1)(F(S) + 1 2 1). Some families of numerical semigroups for which it is known that the conjecture is true are collected in [16]. Other such families can be seen in [23, 59]. The general case remains open. Bras-Amorós computes in [5] the number of numerical semigroups with genus g ∈ {0, . . . , 50}, and conjectures that the growth is similar to that of Fibonacci’s sequence. However it has not been proved yet that there are more semigroups of genus g than of genus g + 1. Several attempts already appear in the literature. Kaplan [23] uses an approach that involves counting the semigroups by genus and multiplicity. He poses many related conjectures which could be taken literally and be posed here as problems. We suggest them to the reader. A different approach, dealing with the asymptoptical behavior of the sequence of the number of numerical semigroups by genus, has been followed by Zhao [69]. Some progress has been achieved by Zhai [68], but many questions remain open. 2. Proportionally modular semigroups Following the terminology introduced in [52], a proportionally modular Diophantine inequality is an expression of the form ax mod b ≤ cx, with a, b and c positive integers. The integers a, b and c are called the factor, the modulus and the proportion of the inequality, respectively. The set S(a, b, c) of solutions of the above inequality is a numerical semigroup. We say that a numerical semigroup is proportionally modular if it is the set of solutions of some proportionally modular Diophantine inequality. Given a nonempty subset A of Q+ 0 , we denote by hAi the submonoid of (Q+ , 0 +) generated by A, whose definition is the same of that used in the previous section. Clearly, S(A) = hAi ∩ N is a submonoid of N. It is proved in [52] that if a, b and c are positive  with  b integers b c < a < b, then S(a, b, c) = S a , a−c . Since S(a, b, c) = N when a ≥ c, and the inequality ax mod b ≤ cx has the same integer solutions as (a mod b)x mod b ≤ cx, the condition c < a < b is not restrictive. As a consequence of the results proved in [52], we have that a numerical semigroup S is proportionally modular if and only if there exist two positive rational numbers α < β such that S = S([α, β]). This is also equivalent to the existence of an interval I, with nonempty interior, of the form S = S(I) (see [55]). By using the notation introduced in [54], a sequence of fractions ab11 < ab22 < · · · < abpp is said to be a Bézout sequence if a1 , . . . , ap , b1 , . . . , bp are positive integers and ai+1 bi − ai bi+1 = 1 for all i ∈ {1, . . . , p−1}. The importance of the Bézout sequences in the study of proportionally modular semigroups highlights in the following result proved in [54]. If ab11 < ab22 < · · · < abpp is a Bézout i h sequence, then S ab11 , abpp = ha1 , . . . , ap i. A Bézout sequence ab11 < ab22 < · · · < abpp is proper if ai+h bi − ai bi+h ≥ 2 for all h ≥ 2 with i, i + h ∈ {1, . . . , p}. Clearly, every Bézout sequence can be reduced (by removing some terms) to a proper Bézout sequence with the same ends as the original one. It is showed in [9], that if ab11 < ab22 are two reduced fractions, then there exists an unique proper Bézout sequence with ends ab11 and ab22 . Furthermore, in this work a procedure for obtaining this sequence is given. It is proved in [54] that if ab11 < ab22 < · · · < abpp is a proper Bézout sequence, then there exists h ∈ {1, . . . , p} such that a1 ≥ · · · ≥ ah ≤ · · · ≤ ap (the sequence a1 , . . . , ap is convex). The following characterization is also proved there: a numerical semigroup is proportionally modular if and only if there exists a convex ordering if its minimal generators n1 , . . . , ne such that gcd{ni , ni+1 } = 1 for all i ∈ {1, . . . , e − 1} and nj−1 + nj+1 ≡ 0 (mod nj ) for all j ∈ {2, . . . , e − 1}. A modular Diophantine inequality is a proportionally modular Diophantine inequality with proportion equal to one. A numerical semigroup is said to be modular if it is the set of solutions of some modular Diophantine inequality. Clearly, every modular numerical semigroup is proportionally modular, and this inclusion is strict as it is proved in [52]. A formula for g(S(a, b, 1)) in function of a and b is given in [53]. The problems of finding formulas for F(S(a, b, 1)), m(S(a, b, 1)), t(S(a, b, 1)) and e(S(a, b, 1)) remain open. It is not known if the mentioned conjecture of Wilf is true for modular semigroups neither. 3 A semigroup of the form {0, m, →} is said to be ordinary. A numerical semigroup S is an open modular numerical semigroup if it  is orb b dinary or of it is the form S = S a , a−1 for some integers 2 ≤ a < b. Therefore these semigroups are proportionally modular. Moreover, it is proved in [55] that every proportionally modular numerical semigroup can be expressed as a finite intersection of open modular numeri b cal semigroups. The formulas F S ab , a−1   b and g S ab , a−1 are also obtained in the just quoted work. However the rest of the problems previously suggested for modular numerical semigroups remain still open. As we mentioned above, a characterization for proportionally modular numerical semigroups in terms of its systems of minimal generators is given in [54]. The question of giving formulas for the Frobenius number, genus and type of a proportionally modular numerical semigroup in terms of its system of minimal generators remains unsolved too. Following the terminology in [57], a contracted modular Diophantine inequality is an expression of the form ax mod b ≤ x − c, where a, b and c are nonnegative integers and b 6= 0. Let us denote by T(a, b, c) the set of integer solutions of the last inequality. Then T(a, b, c) ∪ {0} is a numerical semigroup. An algorithm that allows us to determine whether a semigroup is the set of solutions of a contracted modular Diophantine equation is given in [57]. A formula for the genus of T(a, b, c) ∪ {0} is also given there. A contracted proportionally modular Diophantine inequality is an expression of the form ax mod b ≤ cx − d, with a, b, c and d nonnegative integers and b 6= 0 6= c. If we denote by P(a, b, c, d) the set of solutions of such an inequality, then P(a, b, c, d) ∪ {0} is a numerical semigroup. It is not yet known an algorithm to determine whether a semigroup is of this form. The Stern-Brocot tree gives a recursive method for constructing all the reduced fractions x , with x and y positive integers (see [20]). For y constructing this tree we start with the expressions 10 and 01 . In each step of the process we insert between each two consecutive expressions ′ ′ m and m its median m+m . We obtain in this n n′ n+n′ way the sequences 0 1 < 1 3 < 0 1 < 1 1 < 1 0 1 1 0 1 < 1 2 < < 2 1 < 1 0 1 2 < 2 3 < 11 < ... 3 2 < 2 1 < 3 1 1 0 < The Stern-Brocot tree can now be obtained by connecting each median with the fractions used for computing it and being in the previous level but not in the levels above it. 1 3 1 4 ✡✡ ✇ ✇✇ ✇✇ ✹✹ 2 5 1 2 ❦❦❦❦ ❦❦❦ ❦ ❦ ❦ ❦ ●● ●● ● 2 3 3 5 ✡✡ 1 1 ❙❙❙ ❙❙❙❙ ❙❙❙❙ 3 2 ✹✹ 3 4 4 3 ✡✡ ✇ ✇✇ ✇✇ ✹✹ 2 1 5 3 ●● ●● ● 5 2 ✡✡ 3 1 ✹✹ 4 1 m n is the comIt is proved in [9] that if mon predecessor of two fractions ab < dc in the Stern-Brocot tree, then m is the multiplicity of   S ab , dc . It could be nice to obtain other constants of the semigroup by looking at this tree. 3. The quotient of a numerical semigroup by a positive integer Let S be a numerical semigroup and p be a positive integer. Let us denote by S = {x ∈ N | px ∈ S}. p Clearly, Sp is a numerical semigroup, and we will call it the quotient of S by p. According to this notation, we will call S2 one half of S and that S4 is a quarter of S. These two cases will have an special importance in this section. It is proved in [56] that a numerical semigroup is proportionally modular if and only if it is the quotient of an embedding dimension two numerical semigroup by a positive integer. This result is improved in [32] by proving that a numerical semigroup is proportionally modular if and only if it is of the form ha,a+1i with a and d posd itive integers. We still do not for      haveformulas   ha,a+1i ha,a+1i ha,a+1i ha,a+1i F , g , m , t d d d  d  ha,a+1i . and e d 4 The next step in this line of research would be studying those numerical semigroups that are the quotient of a numerical semigroup with embedding dimension three by a positive integer. Unfortunately we do not have a procedure that allows us to distinguish such a semigroup from the rest. Moreover, we still do not know of any example of semigroups that are not of this form. A numerical semigroup S is symmetric if x ∈ Z \ S implies F(S) − x ∈ S. These semigroups have been widely studied. Their main motivation comes from a work by Kunz ([26]) from which it can be deduced that a numerical semigroup is symmetric if and only if its associated numerical semigroup ring is Gorenstein. Symmetric numerical semigroups always have odd Frobenius number, thus for numerical semigroups with even Frobenius number, the equivalent notion to symmetric semigroups is that of pseudo-symmetric numerical semigroups. We say that S is a pseudo-symmetric numerical semigroup if it has even Frobenius number and for all x ∈ Z \ S, we have either F(S) − x ∈ S or . The concept of irreducible semigroup, x = F(S) 2 introduced in [40], collects these two families of semigroups. A numerical semigroup is irreducible if it cannot be expressed as the intersection of two semigroups that contain it properly. It can be proved that a semigroup is irreducible if and only if it is either symmetric (with odd Frobenius number) or pseudo-symmetric (with even Frobenius number). Intuition (and the tables of the number of numerical semigroups with a given genus or Frobenius number we have) tells us that the percentage of irreducible numerical semigroups is quite small. It is proved in [44] that every numerical semigroup is one half of an infinite number of symmetric numerical semigroups. The apparent parallelism between symmetric and pseudosymmetric numerical semigroups fails as we can see in [37], where it is proved that a numerical semigroup is irreducible if and only it is one half of a pseudo-symmetric numerical semigroup. As a consequence we have that every numerical semigroup is a quarter of infinitely many pseudosymmetric numerical semigroups. In [61], it is also shown that for every positive integer d and every numerical semigroup S, there exist infinitely many symmetric numerical semigroups T such that S = T /d, and if d ≥ 3, then there exist infinitely many pseudo-symmetric numerical semigroups T with S = T /d. From the definition, we deduce that a numerical semigroup S is symmetric if and only if . Therefore these numerical semig(S) = F(S)+1 2 groups verify Wilf’s conjecture previously mentioned. We raise the following question. If a numerical semigroup verifies Wilf’s conjecture, then does so its half? It can easily be seen that every numerical semigroup can be expressed as a finite intersection of irreducible numerical semigroups. A procedure for obtaining such a decomposition is given in [50]. Furthermore it is also explained how to obtain a decomposition with the least possible number of irreducibles. We still do not know how many numerical semigroups appear in these minimal decompositions, moreover, we wonder if there exists a positive integer N such that every numerical semigroup can be expressed as an intersection of at most N irreducible numerical semigroups. In [62] Toms introduces a class of numerical semigroups that are the positive cones of the K0 groups of certain C ∗ -algebras. Given a numerical semigroup we say, inspired in this work, that it admits a Toms decomposition if and only if there exist positive integers q1 , . . . , qn , m1 , . . . , mn and L such that gcd{qi , mi } = gcd{L, mi } = gcd{L, Tnqi } = 1 for all i ∈ 1 {1, . . . , n} and S = L i=1 hqi , mi i. T T ii As L1 ni=1 hqi , mi i = ni=1 hqi ,m , we have that L if a numerical semigroup admits a Toms decomposition, then S is a finite intersection of proportionally modular numerical semigroups. It is proved in [46] that the reciprocal is also true. Therefore, a numerical semigroup admits a Toms decomposition if and only if it is an intersection of finitely many proportionally modular numerical semigroups. These kind of semigroups are studied in [14], where an algorithm for distinguishing whether a numerical semigroup is an intersection of finitely many proportionally modular numerical semigroups is given. Furthermore, 5 in the affirmative case it gives us a minimal decomposition, and in the negative case it gives us the least numerical semigroup which is intersection of proportionally modular semigroups and contains the original numerical semigroup (its proportionally modular closure). It is conjectured in [57] that every contracted modular numerical semigroup admits a Toms decomposition. Note that the numerical semigroups that admit a Toms decomposition are those that are the set of solutions of a system of proportionally modular Diophantine inequalities. It is proved in [32] that two systems of inequalities are always equivalent to another system with all the inequalities having the same modulus, which moreover can be chosen to be prime. Now we raise the following question: is every system of proportionally modular Diophantine inequalities equivalent to a system with all proportions being equal to one?, or equivalently, if a numerical semigroup admits a Tom decomposition, can it be expressed as an intersection of modular numerical semigroups? Following the terminology introduced in [51], a gap x in a numerical semigroup S is said to be fundamental if {2x, 3x} ⊂ S (and therefore kx ∈ S for every integer with k ≥ 2). Let us denote by FG(S) the set of all fundamental gaps of S. If X ⊆ Z, then D(X) will denote the union of all positive divisors of the elements of X. It can easily be shown that S = N \ D(FG(S)). Therefore, a way to represent a semigroup is by giving its fundamental gaps. This representation is specially useful when studying the quotient of a semigroup   h S by a positive integer d, since S FG d = d | h ∈ FG(S), h ≡ 0 (mod d) . The cardinality of the set of fundamental gaps of a semigroup is an invariant of the semigroup. We can therefore open a new line of research by studying numerical semigroups attending to their number of fundamental gaps. It would be also interesting to find simple sufficient conditions that allow us to decide when a subset X of N is the set of fundamental gaps of some numerical semigroup. Let S be a numerical semigroup. In [33] the set T of all numerical semigroups such that S = T2 is studied, the semigroup of the “doubles” of S. In the just quoted work we raise the question of finding a formula that depends on S and allows us to compute the minimum of the Frobenius numbers of the doubles of S. Following this line we can ask ourselves about the set of all “triples” (or multiples in general) of a numerical semigroup. Finally, it would be interesting to characterize the families of numerical semigroups verifying that any of its elements can be realized as a quotient of some element of the family by a fixed positive integer. 4. Frobenius Varieties A directed graph G is a pair (V, E), where V is a nonempty set whose elements are called vertices, and E is a subset of {(u, v) ∈ V × V | u 6= v}. The elements of E are called edges of the graph. A path connecting two vertices x and y of G is a sequence of distinct edges of the form (v0 , v1 ), (v1 , v2 ), . . . , (vn−1, vn ) with v0 = x and vn = y. A graph G is a tree if there exists a vertex r (called the root of G) such that for any other vertex x of G, there exists an unique path connecting x and r. If (x, y) is an edge of the tree, then x is a son of y. A vertex of a tree is a leaf if it has no sons. Let S be the set of all numerical semigroups. We define the graph associated to S, G(S), to be the graph whose vertices are all the elements of S and (T, S) ∈ S × S is an edge if S = T ∪ {F(T )}. In [45], it is proved that G(S) is a tree with root N, and that the sons of S ∈ S are the subsets S \ {x1 }, . . . , S \ {xr }, where x1 , . . . , xr are the minimal generators of S greater than F(S). Therefore S is a leaf of G(S) if it has no minimal generators greater than F(S). These results allow us to construct recursively the set of numerical semigroups starting with N. 6 N = h1i h2, 3i ♣♣♣ ♣♣♣ h2, 5i h3, 4, 5i qqq qqq h4, 5, 6i ◆◆◆ ◆◆◆ h3, 5, 7i ▲▲▲ ▲▲ h3, 4i h2, 7i The level of a vertex in a directed graph is the length of the path connecting this vertex with the root. Note that in G(S) the level of a vertex coincides with its genus as numerical semigroup. Therefore, the Bras-Amorós’ conjecture quoted in the end of the first section can be reformulated by saying that in G(S) there are more vertices in the (n + 1)th level than in the nth one. A Frobenius variety is a nonempty family V of numerical semigroups such that 1) if S, T ∈ V, then S ∩ T ∈ V, 2) if S ∈ V, S 6= N, then S ∪ {F(S)} ∈ V. The concept of Frobenius variety was introduced in [38] with the aim of generalizing most of the results in [6, 14, 48, 49]. In particular, the semigroups that belong to a Frobenius variety can be arranged as a directed tree with similar properties to those of G(S). Clearly, S is a Frobenius variety. If A ⊆ N, then {S ∈ S | A ⊆ S} is also a Frobenius variety. In particular, O(S), the set of all numerical semigroups that contain S, is a Frobenius variety. We next give some interesting examples of Frobenius varieties. Inspired by [1], Lipman introduces and motivates in [27] the study of Arf rings. The characterization of them via their numerical semigroup of values, brings us to the following concept: a numerical semigroups S is said to be Arf if for every x, y, z ∈ S, with x, y ≥ z we have x + y − z ∈ S. It is proved in [48] that the set of Arf numerical semigroups is a Frobenius variety. Saturated rings were introduced independently in three distinct ways by Zariski ([67]), Pham-Teissier ([29]) and Campillo ([10]), although the definitions given in these works are equivalent on algebraically closed fields of characteristic zero. Like in the case of numerical semigroups with the Arf property, saturated numerical semigroups appear when characterizing these rings in terms of their numerical semigroups of values. A numerical semigroup S is saturated if for every s, s1 , . . . , sr ∈ S with si ≤ s for all i ∈ {1, . . . , r} and z1 , . . . , zr ∈ Z being integers such that z1 s1 + · · · + zr sr ≥ 0, then we have s + z1 s1 + · · · + zr sr ∈ S. It is proved in [49] that the set of saturated numerical semigroups is a Frobenius variety. The class of Arf and Saturated numerical semigroups is also closed under quotients by positive integers as shown in [17], though the larger class of maximal embedding dimension numerical semigroups is not (if S is a numerical semigroup, then e(S) ≤ m(S); a numerical semigroup is said to be a maximal embedding dimension semigroup, or to have maximal embedding dimension, if e(S) = m(S)). What is the Frobenius variety generated by maximal embedding dimension numerical semigroups? As a consequence of [14] and [46], it can be deduced that the set of numerical semigroups that admit a Toms decomposition is a Frobenius variety. Every semigroup with embedding dimension two admits a Toms decomposition. Is the variety of numerical semigroups admitting a Toms decomposition the least Frobenius variety containing all semigroups with embedding dimension two? The idea of pattern of a numerical semigroup was introduced in [6] with the aim of trying to generalize the concept of Arf numerical semigroup. A pattern P of length n is a linear homogeneous polynomial with non-zero integer coefficients in x1 , . . . , xn (for n = 0 the only pattern is p = 0). We will say that numerical semigroup S admits a pattern a1 x1 + . . . + an xn if for every sequence s1 ≥ s2 ≥ · · · ≥ sn of elements in S, we have a1 s1 + · · · + an sn ∈ S. We denote by SP the set of all numerical semigroups that admit a pattern P . Then the set of numerical semigroups with the Arf property is Sx1 +x2 −x3 . It is proved in [6] that for every pattern P of a special type (strongly admissible), SP is a Frobenius variety. What varieties arise in this way? It would be interesting to give a weaker definition 7 of pattern such that every variety becomes the variety associated to a pattern. The intersection of Frobenius varieties is again a Frobenius variety. This fact allows us to construct new Frobenius varieties from known Frobenius varieties and moreover, it allows us to talk of the Frobenius variety generated by a family X of numerical semigroups. This variety will be denoted by F (X), and it is defined to be the intersection of all Frobenius varieties containing X. If X is finite, then F (X) is finite and it is shown in [38] how to compute all the elements of F (X). Let V be a Frobenius variety. A submonoid M of N is a V-monoid if it can be expressed as an intersection of elements of V. It is clear that the intersection of V-monoids is again a Vmonoid. Thus given A ⊆ N we can define the V-monoid generated by A as the intersection of all V-monoids containing A. We will denote by V(A) this V-monoid and we will say that A is a V-system of generators of it. If there is no proper subset of A being a V-system of generators V(A), then A is a minimal V-system of generators of V(A). It is proved in [38] that every V-monoid admits an unique minimal V-system of generators, and that moreover this system is finite. We define the directed graph G(V) in the same way we defined G(S), that is, as the graph whose vertices are the elements of V, and (T, S) ∈ V × V is an edge of the above graph if S = T ∪ {F(T )}. This graph is a tree with root N ([38]). Moreover, the sons of a semigroup S in V are S \ {x1 }, . . . , S \ {xr }, where x1 , . . . , xr are the minimal V-generators of S greater than F(S). This fact allows us to find all the elements of the variety V from N. The following figure represents part of the tree associated to the variety of numerical semigroups with the Arf property. N = V(1), F = −1 V(2, 3), F=1 V(3, 4), F=2 V(4, 5), F=3 ③③ ③③ ①① ①①① ✈✈✈ ✈✈✈ V(2, 5), F=3 ❍❍❍ ❍❍❍ ❋❋ ❋❋ V(5, 6), F=4 ❋❋❋ ❋❋ V(4, 6, 7), F=5 V(3, 5), F=4 V(2, 7), F=5 V(3, 7), F=5 V(2, 9), F=7 The following figure represents part of the tree corresponding to saturated numerical semigroups. V(1), F = −1 V(2, 3), F=1 V(3, 4), F=2 V(4, 5), F=3 V(5, 6), F=4 ① ① V(2, 5), F=3 ❋ ❋ V(4, 6, 7), F=5 V(3, 5), F=4 V(2, 7), F=5 V(3, 7), F=5 V(2, 9), F=7 As a generalization of Bras-Amorós’ conjecture, we can raise the following question. If V is a Frobenius variety, does there exist on G(V) more vertices in the (n + 1)th level than in the nth one? The answer to this question is no, as it is proved in [38, Example 26]. However, the same question in the case of V being infinite remains open. Another interesting question would be characterizing those Frobenius varieties that verify the Bras-Amorós’ conjecture. If V is a Frobenius variety and S ∈ V, then it is known that S admits an unique minimal Vsystem of generators, and moreover it is finite. The cardinality of the set above is an invariant of S that will be called the embedding V-dimension of S, and it will be denoted by eV (S). As a generalization of Wilf’s conjecture, we would like to characterize those Frobenius varieties V such that for every S ∈ V, then eV (S)g(S) ≤ (eV (S)− 1)(F(S) + 1). 8 Clearly, the Frobenius variety generated by irreducible numerical semigroups is S, the set of all numerical semigroups. What is the Frobenius variety generated only by the symmetric ones? and by the pseudo-symmetric ones? 5. Presentations of a numerical semigroup Let (S, +) be a commutative monoid. A congruence σ over S is an equivalence relation that is compatible with addition, that is, if aσb with a, b ∈ S, then (a+c)σ(b+c) for all c ∈ S. The set S/σ endowed with the operation [a]+[b] = [a+b] is a monoid. We will call it the quotient monoid of S by σ. If S is generated by {s1 , . . . , sn }, then the map ϕ : Nn → S, (a1 , . . . , an ) 7→ a1 s1 + · · ·+ an sn is a monoid epimorphism. Therefore S is isomorphic to Nn / ∼S , where ∼S is the kernel congruence of ϕ, that is, a ∼S b if ϕ(a) = ϕ(b). The intersection of congruences over a monoid S is again a congruence over S. This fact allows us, given σ ⊆ S × S, to define the concept of congruence generated by σ as the intersection of all congruences over S containing σ, and it will be denoted by hσi. Rédei proves in [31] that every congruence over Nn is finitely generated, that is, there exists a subset of Nn × Nn with finitely many elements generating it. As a consequence we have that giving a finitely generated monoid is, up to isomorphism, equivalent to giving a finite subset of Nn × Nn . If S is a numerical semigroup with minimal generators system {n1 , . . . , ne }, then there exists a finite subset σ of Ne × Ne such that S is isomorphic to Ne /hσi. We say that σ is a presentation of S. If moreover σ has the least possible cardinality, then σ is a minimal presentation of S. A (non directed) graph G is a pair (V, E), where V is a nonempty set of elements called vertices, and E is a subset of {{u, v} | u, v ∈ V, u 6= v}. The non ordered pair {u, v} will be denoted by uv, and if it belongs to E, then we say that it is an edge of G. A sequence of the form v0 v1 , v1 v2 , . . . , vm−1 vm is a path of length m connecting the vertices v0 and vm . A graph is connected if any two distinct vertices are connected by a path. A graph G′ = (V ′ , E ′ ) is said to be a subgraph of G if V ′ ⊆ V and E ′ ⊆ E. A connected component of G is a maximal connected subgraph of G. It is well known (see for instance [28]) that a connected graph with n vertices has at least n−1 edges. A (finite) tree with n vertices is a connected graph with n − 1 edges. Let us remind now the method described in [35] for computing the minimal presentation of a numerical semigroup. Let S be a numerical semigroup with minimal system of generators {n1 , . . . , ne }. For each n ∈ S, let us define Gn = (Vn , En ), where Vn = {ni | n − ni ∈ S} and En = {ni nj | n − (ni + nj ) ∈ S, i 6= j}. If Gn is connected, we take σn = ∅. If Gn is not connected and V1 , . . . , Vr are the sets of vertices corresponding to the connected components in Gn , then we define σn = {(α1 , α2 ), (α1 , α3 ), . . . , (α1 , αr )}, where αi ∈ ϕ−1 (n) and its j-th component is zero whenever nj 6∈ Vi . It is proved in [35] S that σ = n∈S σn is a minimal presentation for S. Let us notice that the set Betti(S) = {n ∈ S | Gn is not connected} is finite, and that its cardinality is an invariant of S. A line of research could be the study of Betti(S), and its relation with other invariants of S mentioned above. In [19] affine semigroups (and thus numerical semigroups) with a single Betti element are studied. What are those numerical semigroups having two or three Betti elements? It is also shown in [35] how all the minimal presentations of a semigroup are. In particular, we can determine whether a numerical semigroup admits a unique minimal presentation. Motivated by the idea of generic ideal, we may ask what are the numerical semigroups which admit a unique minimal presentation, and characterize them in terms of their minimal generators. If S is a numerical semigroup, then the cardinality of a minimal presentation of S is greater than or equal to e(S) − 1. Those semigroups that attain this bound are said to be complete intersections. This kind of semigroup has been well studied, and Delorme gives in [15] a good 9 characterization of them. Every numerical semigroup with embedding dimension two is a complete intersection, and every complete intersection is symmetric (see [21]). We raise the following questions. What semigroups can be expressed as the quotient of a complete intersection by a positive integer? What is the least Frobenius variety containing all the complete intersection numerical semigroups? Let S1 and S2 be two numerical semigroups minimally generated by {n1 , . . . , nr } and {nr+1 , . . . , ne }, respectively. Let λ ∈ S1 \ {n1 , . . . , nr } and µ ∈ S2 \ {nr+1 , . . . , ne }, such that gcd{λ, µ} = 1. We then say that S = hµn1 , . . . , µnr , λnr+1 , . . . , λne i is a gluing to S1 and S2 . It is proved in [45] how given minimal presentations of S1 and S2 , one easily gets a minimal presentation of S. The characterization given by Delorme in [15], with this notation, can be reformulated in the following way: a numerical semigroup is a complete intersection if and only if is a gluing to two numerical semigroups that are a complete intersection. A consequence of this result is that the set of semigroups that are a complete intersection is the least family of numerical semigroups containing N being closed under gluing. It is well known that the family of numerical symmetric semigroups is also closed under gluing ([45]). It would be interesting to study other families closed under gluing. Which is the least family containing those semigroups with maximal embedding dimension and closed under gluing? Bresinsky gives in [7] a family of numerical semigroups with embedding dimension four and with cardinality of its minimal presentations arbitrarily large. This fact proves that the cardinality of a minimal presentation of a numerical semigroup cannot be upper bounded just in function of its embedding dimension. Bresinski also proves in [8] that the cardinality for a minimal presentation of a symmetric numerical semigroup with embedding dimension four can only be three or five. It is conjectured in [36] that if S is a numerical semigroup with e(S) ≥ 3, then the cardinality of a minimal presentation for S − 1. Barucci is less than or equal to e(S)(e(S)−1) 2 [2] proves with the semigroup h19, 23, 29, 31, 37i that the conjecture above is not true. However, the problem of determining if the cardinality of a minimal presentation of a symmetric numerical semigroup can be bounded in function of the embedding dimension remains open. Let σ be a finite subset of Nn × Nn . By using the results in [41, 45] it is possible to deterNn is isomorphic mine algorithmically whether hσi to a numerical semigroup. However we miss in the literature families of subsets σ of Nn so that we can assert, without using algorithms, that Nn /hσi is isomorphic to a numerical semigroup. More specifically, we suggest the following problem: given σ = {((c1 , 0, . . . , 0), (0, a11 , . . . , a1n )), . . . , ((0, . . . , cn ), (an1 , . . . , ann−1 , 0))}, which conditions the integers ci and ajk have to verify so that Nn /hσi is isomorphic to a numerical semigroup? Herzog proved in [21] that embedding dimension three numerical semigroups always have a minimal presentation of this form. Neat numerical semigroups introduced by Komeda in [24] are also of this form. 6. Numerical semigroups with embedding dimension three Herzog proves in [21] that a numerical semigroup with embedding dimension three is symmetric if and only if it is a complete intersection. This fact allows us to characterize symmetric numerical semigroups with embedding dimension three in the following way (see [45]). A numerical semigroup S with e(S) = 3 is symmetric if and only if S = ham1 , am2 , bm1 + cm2 i, with a, b, c, m1 and m2 nonnegative integers, such that m1 , m2 , a and b + c are greater than or equal to two and gcd{m1 , m2 } = gcd{a, bm1 + cm2 } = 1. Moreover, as it is proved in [45], F(ham1 , am2 , bm1 + cm2 i) = a(m1 m2 − m1 − m2 ) + (a − 1)(bm1 + cm2 ). We also have a formula for the genus, since S is symmetric, g(S) = F(S)+1 . Finally, we also know the type, 2 since it is proved in [18] that a numerical semigroup is symmetric if and only if its type is equal to one. 10 We study in [43] the set of pseudo-symmetric numerical semigroups with embedding dimension three. In particular, we give the following characterization. A numerical semigroup S with e(S) = 3 is pseudosymmetric if and only if for some ordering of its minimal generators, by taking ∆ = pP ( nni )2 − 4(n1 n2 + n1 n3 + n2 n3 − n1 n2 n3o ), 2 +n3 +∆ n1 +n2 −n3 +∆ −n1 +n2 +n3 +∆ then n1 −n2n ⊂ , , 2n2 2n3 1 N. Moreover, in this case, F(hn1 , n2 , n3 i) = ∆ − (n1 + n2 + n3 ). We also know the genus and the type, since if S is a pseudo-symmetric numerical semigroups, then g(S) = F(S)+2 and 2 by [18], t(S) = 2. Bresinsky ([7]) and Komeda ([24]) fully characterize those symmetric and pseudo-symmetric numerical semigroups, respectively, with embedding dimension four. They show that their minimal presentations always have cardinality five. Curtis proves in [13] the impossibility of giving an algebraic formula for the Frobenius number of a numerical semigroup in terms of its minimal generators on embedding dimension three. We raise the following question. Given a polynomial f (x1 , x2 , x3 , x4 ) ∈ Q[x1 , x2 , x3 , x4 ], study the family of numerical semigroups S such that if S is minimally generated by n1 < n2 < n3 , and F is the Frobenius number of S, then f (n1 , n2 , n3 , F ) = 0. Our aim now is studying the set of numerical semigroups with embedding dimension three in general. By [18], we know that these semigroups have type one or two, and by using [22, 34] if we are concerned with the Frobenius number and the genus, we can focus ourselves in those numerical semigroups whose minimal generators are pairwise relatively prime. The following result appears in [42]. Let n1 , n2 and n3 three pairwise relatively prime positive integers. Then the system of equations n1 = r12 r13 + r12 r23 + r13 r32 , n2 = r13 r21 + r21 r23 + r23 r31 , n3 = r12 r31 + r21 r32 + r31 r32 . has a (unique) positive integer solution if and only if {n1 , n2 , n3 } generates minimality hn1 , n2 , n3 i. In [42] the authors give formulas for the pseudo-Frobenius number and the genus of hn1 , n2 , n3 i from the solutions of the above system. Thus it seems natural to ask, given positive integers rij , with i, j ∈ {1, 2, 3}, when r12 r13 + r12 r23 + r13 r32 , r13 r21 + r21 r23 + r23 r31 and r12 r31 + r21 r32 + r31 r32 are pairwise relatively prime? Let S be a numerical semigroup minimally generated by three positive integers n1 , n2 and n3 being pairwise relatively prime. For each i ∈ {1, 2, 3}, let ci = min{x ∈ N \ {0} | xni ∈ h{n1 , n2 , n3 } \ {ni }i}. In [42] formulas for F(S) and g(S) from ni and ci (i ∈ {1, 2, 3}) are given. Therefore, if we had a formula for computing c3 from n1 and n2 , we would have solved the problems raised by Frobenius for embedding dimension three. Note that c3 is nothing but the multiplicity of the proportionally modular semigroup hn1 ,n2 i . It is proved in [58] that if u is a posin3 tive integer such that un2 ≡ 1 (mod n1 ), then hn1 ,n2 i = {x ∈ Z | un2 n3 x mod n1 n2 ≤ n3 x}. n3 We suggest in this line the problem of finding a formula that allows us to give the multiplicity of S(un2 n3 , n1 n2 , n3 ) from n1 , n2 and n3 . Fermat’s Last Theorem asserts that for any integer n ≥ 3, the Diophantine equation xn + y n = z n does not admit an integer solution such that xyz 6= 0. As it is well known, this theorem was proved by Wiles, with the help of Taylor, in 1995 ([64, 65]) after 300 years of fruitless attempts. Let us observe that for n ≥ 3, the Diophantine equation xn + y n = z n has no solution verifying zyz 6= 0 with some of the factors equal to 1. Therefore in order to solve this equation it can be supposed that x, y and z are integers greater than or equal to two, and pairwise relatively prime. It is proved in [63], that Fermat’s Last Theorem is equivalent to the following statement: if a, b and c are integers greater than or equal to two, pairwise relatively prime, and n is an integer greater than or equal to three, then the proportionally modular nun n merical semigroup ha c,b i is not minimally generated by {an , cn−1 , bn }. It would be interesting to prove this fact without using Fermat’s last Theorem. 11 7. Non-unique factorization invariants The invariant ω(S, s) is the least positive integer such that whenever s divides s1 + · · · + sk for some s1 , . . . , sk ∈ S, then s divides si1 + · · · + siω(S,s) for some {i1 , . . . , iω(S,s) } ⊆ {1, . . . , k}. The ω-primality of S is defined as ω(S) = max{ω(S, n1 ), . . . , ω(S, ne )}. In [4] it is highlighted that numerical semigroups fulfilling ω(S) 6= t(S) are rare. A characterization for numerical semigroups fulfilling this condition should be welcomed. Another problem proposed by A. Geroldinger is to determine when can we find a numerical semigroup and an element in it with a given set of lengths. Let S be a numerical semigroup minimally generated by {n1 < · · · < ne }. Then we already know that S is isomorphic to Ne / ∼S , where ∼S is the kernel congruence of the epimorphism ϕ : Ne → S, (a1 , . . . , ae ) 7→ a1 n1 + . . . + ae ne . For s ∈ S, the elements in Z(s) = ϕ−1 (s) are known as factorizations of s. Given (x1 , . . . , xe ) ∈ Z(s), its length is |x| = x1 + · · · + xe . The set of lengths of s is L(s) = {|x| | x ∈ Z(s)}. If L(s) = {l1 < l2 < · · · < lt }, then the set of differences of lengths of factorizations of s is ∆(s)S = {l2 − l1 , . . . , lt − lt−1 }. Moreover ∆(S) = s∈S ∆(s). These sets are known to be eventually periodic ([12]). References L(s) The elasticity of s ∈ S is ρ(s) = max , and min L(s) [1] C. Arf, Une interprétation algébrique de la suite ρ(S) = sups∈S (ρ(s)), which turns out to be a des ordres de multiplicité d’une branche algébrique, maximum ([47]). For numerical semigroups it is Proc. London Math. Soc., 20 (1949), 256-287. well known that ρ(S) = nn1e . [2] V. Barucci, Numerical semigroup algebras, in Multiplicative ideal theory in commutative algebra, 39– For x = (x1 , . . . , xe ), y = (y1 , . . . , ye ) ∈ Ne , 53, Springer, New York, 2006. the greatest common divisor of x and y is [3] V. Barucci, D. E. Dobbs, M. Fontana, Maximality gcd(x, y) = (min(x1 , y1 ), . . . , min(xe , ye )). The Properties in Numerical Semigroups and Applicadistance between x and y is d(x, y) = max{|x − tions to One-Dimensional Analytically Irreducible gcd(x, y)|, |y − gcd(x, y)|}. Local Domains, Memoirs of the Amer. Math. Soc. 598 (1997). An N-chain (with N a positive integer) joining two factorizations x and y of s ∈ S is a sequence [4] V. Blanco, P. A. Garcı́a-Sánchez, A. Geroldinger, Semigroup-theoretical characterizations of arithz1 , . . . , zt of factorizations of s such that z1 = metical invariants with applications to numerical x, zt = y and d(zi , zi+1 ) ≤ N. The catenary monoids and Krull monoids, Illinois J. Math, to apdegree of s, c(s), is the least N such that for pear. every two factorizations x and y of s, there is an [5] M. Bras-Amorós, Fibonacci-like behavior of the number of numerical semigroups of a given genus, N-chain joining them. The catenary degree of Semigroup Forum, 76 (2008), 379–384. S is c(S) = sups∈S {c(s)}. This supremum is a [6] M. Bras-Amorós, P. A. Garcı́a-Sánchez, Patterns on maximum and actually c(S) = maxs∈Betti(S) c(s) numerical semigroups, Linar Alg. Appl. 414 (2006), ([11]). It was asked by F. Halter-Koch whether 652-669. this invariant is periodic, that is, if there exists [7] H. Bresinsky, On prime ideals with generic zeo xi = n ∈ S such that for s “big enough”, c(s + n) = tni , Proc. Amer. Math. Soc. 47 (1975), 329-332. [8] H. Bresinsky, Symmetric semigroups of integers genc(s). erated by four elements, Manuscripta Math. 17 The tame degree of s ∈ S, t(s), is the min(1975), 205-219. imum N such that for any i ∈ {1, . . . , e} with [9] M. Bullejos, J. C. Rosales, Proportionally modular s − ni ∈ S and any x ∈ Z(s), there exists y = diophantine inequalities and the Stern-Brocot tree, (y1 , . . . , ye ), such that yi 6= 0 and d(x, y) ≤ N. Mathematics of Computation 78 (2009), 1211-1226 The tame degree of S is t(S) = sups∈S (t(S)). [10] A. Campillo, On saturation of curve singularities (any characteristic), Proc. of Symp. in Pure Math. This supremum is again a maximum and it is 40 (1983), 211-220. reached in the (finite) set of elements of the form [11] S. T. Chapman, P. A. Garcı́a-Sánchez, D. Llena, V. ni + w with w ∈ S such that w −nj 6∈ S for some Ponomarenko, and J. C. Rosales, The catenary and j 6= i. F. Halter-Koch also proposed the problem tame degree in finitely generated commutative canof studying the eventual periodicity of S. cellative monoids, Manuscripta Math. 120 (2006), 253-264. 12 [12] S. T. Chapman, R. Hoyer and N. Kaplan, Delta Sets of Numerical Monoids are Eventually Periodic, Aequationes Math. 77(2009), 273–279. [13] F. Curtis, On formulas for the Frobenius number of a numerical semigroup. Math. Scand. 67 (1990), no. 2, 190-192. [14] M. Delgado, P. A. Garcı́a-Sánchez, J. C. Rosales, J. M. Urbano-Blanco, Systems of proportionally modular Diophantine inequalities, Semigroup Forum, 76 (2008), 469-488. [15] C. Delorme, Sous-monoı̈des d’intersection complète de N, Ann. Scient. École Norm. Sup. (4), 9 (1976), 145-154. [16] D. E. Dobbs, G. L. Matthews, On a question of Wilf concerning numerical semigroups, en Focus on Commutative Rings Research, 193-202, Nova Sci. Publ., New York, 2006. [17] D. E. Dobbs, H. J. Smith, Numerical semigroups whose fractions are of maximal embedding dimension, Semigroup Forum 82 (2011), no. 3, 412-422 [18] R. Fröberg, C. Gottlieb, R. Häggkvist, On numerical semigroups, Semigroup Forum, 35 (1987), 63-83. [19] P. A. Garcı́a-Sánchez, I. Ojeda, J. C. Rosales, Affine semigroups having a unique Betti element, to appear in Journal of Algebra and its Applications. [20] R. L. Graham, D. E. Knuth, O. Patashnik, Concrete mathematics. A foundation for computer science. Addison-Wesley Publishing Company, Advanced Book Program, Reading, MA, 1989. [21] J. Herzog, Generators and relations of abelian semigroups and semigroup rings, Manuscripta Math. 3 (1970), 175-193. [22] S. M. Johnson, A linear Diophantine problem, Can. J. Math., 12 (1960), 390-398. [23] N. Kaplan, Counting numerical semigroups by genus and some cases of a question of Wilf, Journal of Pure and Applied Algebra, 216 (2012) 1016-1032. [24] J. Komeda, On the existence of Weierstrass points with a certain semigroup generated by 4 elements, Tsukuba J. Math, 6 (1982)m 237-270. [25] J. Komeda, Non-weierstras numerical semigroups, Semigroup Forum 57(1998), 157-185. [26] E. Kunz, The value-semigroup of a one-dimensional Gorenstein ring, Proc. Amer. Math. Soc., 25 (1973), 748-751. [27] J. Lipman, Stable ideals and Arf rings, Amer. J. Math., 93 (1971), 649-685. [28] D. Narsingh, Graph Theory with Applications to Engineering and Computer Science, Prentice Hall Series in Automatic Computation, 1974. [29] F. Pham, B. Teissier, Fractions lipschitziennes et saturations de Zariski des algébres analytiques complexes, Centre Math. École Polytech., Paris, 1969. Actes du Congrès International des Mathématiciens (Nice, 1970), Tome 2, pp. 649–654. Gauthier-Villars, Paris, 1971. [30] J. L. Ramı́rez Alfonsı́n, The Diophantine Forbenius Problem, Oxford University Press, 2005. [31] L. Rédei, The theory of finitely generated commutative semigroups, Pergamon, Oxford-Edinburgh-New York, 1965. [32] A. M. Robles-Pérez, J. C. Rosales, Equivalent proportionally modular Diophantine inequalities, Archiv der Mathematik 90 (2008), 24-30. [33] A. M. Robles-Pérez, J. C. Rosales y P. Vasco, The doubles of a numerical semigroup, J. Pure Appl. Algebra (aceptado para publicación). [34] Ö. J. Rödseth, On a linear Diophantine problem of Frobenius, J. Reine Angew. Math. 301 (1979), 431440. [35] J. C. Rosales, An algorithmic method to compute a minimal relation for any numerical semigroup, Internat. J. Algebra Comput. 6 (1996), no. 4, 441-455. [36] J. C. Rosales, Symmetric numerical semigroups with arbitrary multiplicity and embedding dimension, Proc. Amer. Math. Soc. 129 (8) (2001), 2197-2203. [37] J. C. Rosales, One half of a pseudo-symmetric numerical semigroup, Bull. London Math. Soc. 40 (2008), 347-352. [38] J. C. Rosales, Families of numerical semigroups closed under finite intersections and for the Frobenius number, Houston J. Math. 34 (2008), 339-348. [39] J. C. Rosales, M. B. Branco, Numerical semigroups that can be expressed as an intersection of symmetric numerical semigroups, J. Pure Appl. Algebra 171 (2-3) (2002), 303–314. [40] J. C. Rosales, M. B. Branco, Irreducible numerical semigroups, Pacific J. Math. 209 (2003), 131-143. [41] J. C. Rosales, P. A. Garcı́a-Sánchez, Finitely generated commutative monoids, Nova Science Publishers, New York, 1999. [42] J. C. Rosales, P. A. Garcı́a-Sánchez, Numerical semigroups with embedding dimension three, Archiv der Mathematik 83 (2004), 488-496. [43] J. C. Rosales, P. A. Garcı́a-Sánchez, Pseudosymmetric numerical semigroups with three generators, J. Algebra 291 (2005), 46-54. [44] J. C. Rosales, P. A. Garcı́a-Sánchez, Every numerical semigroup is one half of infinitely many symmetric numerical semigroups, Comm. Algebra 36 (2008), 2910-2916. [45] J. C. Rosales, P. A. Garcı́a-Sánchez, Numerical semigroups, Springer, 2009. [46] J. C. Rosales, P. A. Garcı́a-Sánchez, Numerical semigroups having a Toms decompositoin, Canadian Math. Bull. 51 (2008), 134-139. [47] J. C. Rosales, P. A. Garcı́a-Sánchez, J. I. Garcı́aGarcı́a, Atomic commutative monoids and their elasticity, Semigroup Forum 68 (2004), 64-86. [48] J. C. Rosales, P. A. Garcı́a-Sánchez, J. I. Garcı́aGarcı́a, M. B. Branco, Arf numerical semigroups, J. Algebra 276 (2004), 3-12. 13 [49] J. C. Rosales, P. A. Garcı́a-Sánchez, J. I. Garcı́aGarcı́a, M. B. Branco, Saturated numerical semigroups, Houston J. Math. 30 (2004), 321-330. [50] J. C. Rosales, P. A. Garcı́a-Sánchez, J. I. Garcı́aGarcı́a, J. A. Jimenez-Madrid, The oversemigroups of a numerical semigroup, Semigroup Forum 67 (2003), 145-158. [51] J.C. Rosales, P. A. Garcı́a-Sánchez, J.I. Garcı́aGarcı́a, J.A. Jiménez-Madrid, Fundamental gaps in numerical semigroups, J. Pure Appl. Alg. 189 (2004), 301-313. [52] J. C. Rosales, P. A. Garcı́a-Sánchez, J. I. Garcı́aGarcı́a, J. M. Urbano-Blanco, Proportionally modular Diophantine inequalities, J. Number Theory 103 (2003), 281-294. [53] J. C. Rosales, P. A. Garcı́a-Sánchez, J. M. UrbanoBlanco, Modular Diophantine inequalities and numerical semigroup, Pacific J. Math. 218 (2) (2005), 379-398. [54] J. C. Rosales, P. A. Garcı́a-Sánchez, J. M. UrbanoBlanco, The set of solutions of a proportionally modular Diophantine inequality, J. Number Theory. 128 (2008), 453-467. [55] J. C. Rosales, J. M. Urbano-Blanco, Opened modular numerical semigroups, J. Algebra 306 (2006), 368-377. [56] J. C. Rosales, J. M. Urbano-Blanco, Proportionally modular Diophantine inequalities and full semigroups, Semigroup Forum 72 (2006), 362-374. [57] J. C. Rosales y J. M. Urbano-Blanco, Contracted modular Diophantine inequalities and numerical semigroups, Math.Inqual. Appl. 10 (2007), 491-498. [58] J. C. Rosales, P. Vasco, The smallest positive integer that is solution of a proportionally modular Diophantine inequality, Math. Inequal. Appl. 11 (2008), 203- 212. [59] A. Sammartano, Numerical semigroups with large embedding dimension satisfy Wilf’s conjecture, Semigroup Forum. To appear. [60] J. J. Sylvester, Mathematical questions with their solutions, Educational Times 41 (1884), 21. [61] I. Swanson, Every numerical semigroup is one over d of infinitely many symmetric numerical semigroups, in Commutative algebra and its applications, Walter de Gruyter, Berlin, 2009, 383–386. [62] A. Toms, Strongly perforated K0 -groups of simple C ∗ -algebras, Canad. Math. Bull. 46 (2003), 457-472. [63] J. M. Urbano-Blanco, Semigrupos numéricos proporcionalmente modulares, Tesis Doctoral, Universidad de Granada, Spain, March 2005. [64] A. Wiles, Modular elliptic curves and Fermat’s last theorem, Ann. Math. 141 (1995), 443-551. [65] A. Wiles y R. Taylos, Ring-Theoretic properties of certain Hecke algebras, Ann. Math. 141 (1005), 553572. [66] H. S. Wilf, Circle-of-lights algorithm for money changing problem, Am. Math. Mo. 85 (1978), 562565. [67] O. Zariski, General theory of saturation and saturated local rings I, II, III, Amer. J. Math. 93 (1971), 573-684, 872-964, 97 (1975), 415-502. [68] A. Zhai, Fibonacci-like growth of numerical semigroups with a given genus. arXiv:1111.3142v1. [69] Y. Zhao, Constructing numerical semigroups of a given genus Semigroup Forum, 80 (2010) 242-254 E-mail address: [email protected] CMUP and DM-FCUP, Porto, Portugal Universidade do E-mail address: [email protected] E-mail address: [email protected] Departamento de Álgebra, Universidad de Granada, España
0math.AC
Heavy hitters via cluster-preserving clustering Kasper Green Larsen∗ Jelani Nelson† Huy L. Nguy˜ên‡ Mikkel Thorup§. arXiv:1604.01357v1 [cs.DS] 5 Apr 2016 April 6, 2016 Abstract In the turnstile `p heavy hitters problem with parameter ε, one must maintain a highdimensional vector x ∈ Rn subject to updates of the form update(i, ∆) causing the change xi ← xi + ∆, where i ∈ [n], ∆ ∈ R. Upon receiving a query, the goal is to report every “heavy hitter” i ∈ [n] with |xi | ≥ εkxkp as part of a list L ⊆ [n] of size O(1/εp ), i.e. proportional to the maximum possible number of heavy hitters. In fact we solve the stronger tail version, in which L should include every i such that |xi | ≥ εkx[1/εp ] kp , where x[k] denotes the vector obtained by zeroing out the largest k entries of x in magnitude. For any p ∈ (0, 2] the CountSketch of [CCFC04] solves `p heavy hitters using O(ε−p lg n) words of space with O(lg n) update time, O(n lg n) query time to output L, and whose output after any query is correct with high probability (whp) 1 − 1/ poly(n) [JST11, Section 4.4]. This space bound is optimal even in the strict turnstile model [JST11] in which it is promised that xi ≥ 0 for all i ∈ [n] at all points in the stream, but unfortunately the query time is very slow. To remedy this, the work [CM05] proposed the “dyadic trick” for the CountMin sketch for p = 1 in the strict turnstile model, which to maintain whp correctness achieves suboptimal space O(ε−1 lg2 n), worse update time O(lg2 n), but much better query time O(ε−1 poly(lg n)). An extension to all p ∈ (0, 2] appears in [KNPW11, Theorem 1], and can be obtained from [Pag13]. We show that this tradeoff between space and update time versus query time is unnecessary. We provide a new algorithm, ExpanderSketch, which in the most general turnstile model achieves optimal O(ε−p lg n) space, O(lg n) update time, and fast O(ε−p poly(lg n)) query time, providing correctness whp. In fact, a simpler version of our algorithm for p = 1 in the strict turnstile model answers queries even faster than the “dyadic trick” by roughly a lg n factor, dominating it in all regards. Our main innovation is an efficient reduction from the heavy hitters to a clustering problem in which each heavy hitter is encoded as some form of noisy spectral cluster in a much bigger graph, and the goal is to identify every cluster. Since every heavy hitter must be found, correctness requires that every cluster be found. We thus need a “cluster-preserving clustering” algorithm, that partitions the graph into clusters with the promise of not destroying any original cluster. To do this we first apply standard spectral graph partitioning, and then we use some novel combinatorial techniques to modify the cuts obtained so as to make sure that the original clusters are sufficiently preserved. Our cluster-preserving clustering may be of broader interest much beyond heavy hitters. ∗ Aarhus University. [email protected]. Supported by Center for Massive Data Algorithmics, a Center of the Danish National Research Foundation, grant DNRF84, a Villum Young Investigator Grant and an AUFF Starting Grant. † Harvard University. [email protected]. Supported by NSF grant IIS-1447471 and CAREER award CCF-1350670, ONR Young Investigator award N00014-15-1-2388, and a Google Faculty Research Award. ‡ Toyota Technological Institute at Chicago. [email protected]. § University of Copenhagen. [email protected]. Supported in part by Advanced Grant DFF-0602-02499B from the Danish Council for Independent Research under the Sapere Aude research career programme. 1 Introduction Finding heavy hitters in a data stream, also known as elephants or frequent items, is one of the most practically important and core problems in the study of streaming algorithms. The most basic form of the problem is simple: given a long stream of elements coming from some large universe, the goal is to report all frequent items in the stream using an algorithm with very low memory consumption, much smaller than both the stream length and universe size. In practice, heavy hitters algorithms have been used to find popular destination addresses and heavy bandwidth users by AT&T [CJK+ 04], to find popular search query terms at Google [PDGQ05], and to answer so-called “iceberg queries” in databases [FSG+ 98] (to name a few of many applications). A related problem is finding superspreaders [LCG13], the “heavy hitters” in terms of number of distinct connections, not total bandwidth. In the theoretical study of streaming algorithms, finding heavy hitters has played a key role as a subroutine in solving many other problems. For example, the first algorithm providing nearoptimal space complexity for estimating `p norms in a stream for p > 2 needed to find heavy hitters as a subroutine [IW05], as did several follow-up works on the same problem [GB09, AKO11, BO13, BKSV14, Gan15]. Heavy hitters algorithms are also used as a subroutine in streaming entropy estimation [CCM10, HNO08], `p -sampling [MW10], cascaded norm estimation and finding block heavy hitters [JW09], finding duplicates [GR09, JST11], fast `p estimation for 0 < p < 2 [NW10, KNPW11], and for estimating more general classes of functions of vectors updated in a data stream [BO10, BC15]. In this work we develop a new heavy hitters algorithm, ExpanderSketch, which reduces the heavy hitters problem to a new problem we define concerning graph clustering, which is an area of interest in its own right. Our special goal is to identify all clusters of a particular type, even if they are much smaller than the graph we are asked to find them in. While our algorithm as presented is rather theoretical with large constants, the ideas in it are simple with potential practical impact. The particular formulation we focus on is finding clusters with low external conductance in the graph, and with good connectivity properties internally (a precise definition of these clusters, which we call -spectral clusters, will be given soon). Similar models have been used for finding a community within a large network, and algorithms for identifying them have applications in community detection and network analysis. In computer vision, many segmentation algorithms such as [SM00, AMFM11] model images as graphs and use graph partitioning to segment the images. In theory, there has been extensive study on the problem with many approximation algorithms [LR88, ARV09]. Our focus in this work is on theoretical results, with constants that may be unacceptable in practice. 2 Previous work In this work we consider the `p heavy hitters problem for 0 < p ≤ 2. A vector x ∈ Rn is maintained, initialized to the all zero vector. A parameter ε ∈ (0, 1/2) is also given. This is a data structural problem with updates and one allowed query that are defined as follows. • update(i, ∆): Updatexi ← xi + ∆, where i ∈ [n] and ∆ ∈ R has finite precision. • query(): Return a set L ⊆ [n] of size |L| = O(ε−p ) containing all ε-heavy hitters i ∈ [n] under `p . Here we say i is an ε-heavy hitter under `p if |xi | ≥ εkx[1/εp ] kp , where x[k] denotes 1 the vector x with the largest k entries (in absolute value) set to zero. Note the number of heavy hitters never exceeds 2/εp . Unless stated otherwise we consider randomized data structures in which any individual query has some failure probability δ. Note our definition of ε-heavy hitters includes all coordinates satisfying the usual definition requiring |xi | ≥ εkxkp , and potentially more. One can thus recover all the usual heavy hitters from our result by, in post-processing, filtering L to only contain indices that are deemed large by a separate CountSketch run in parallel. A nice feature of the more stringent version we solve is that, by a reduction in [JST11, Section 4.4], solving the `2 version of the problem with error ε0 = εp/2 implies a solution for the `p ε-heavy hitters for any p ∈ (0, 2]. Hence for the remainder of the assume we discuss p = 2 unless stated otherwise. We also note that any solution to `p heavy hitters for p > 2, even for constant ε, δ, must use polynomial space Ω(n1−2/p ) bits [BYJKS04]. Before describing previous work, we first describe, in the terminology of [Mut05], three different streaming models that are frequently considered. • Cash-register: This model is also known as the insertion-only model, and it is characterized by the fact that all updates update(i, ∆) have ∆ = 1. • Strict turnstile: Each update ∆ may be an arbitrary positive or negative number, but we are promised that xi ≥ 0 for all i ∈ [n] at all points in the stream. • General turnstile: Each update ∆ may be an arbitrary positive or negative number, and there is no promise that xi ≥ 0 always. Entries in x may be negative. It should be clear from the definitions that algorithms that work correctly in the general turnstile model are the most general, followed by strict turnstile, then followed by the cash-register model. Similarly, lower bounds proven in the cash-register model are the strongest, and those proven in the general turnstile model are the weakest. The strict turnstile model makes sense in situations when deletions are allowed, but items are never deleted more than they are inserted. The general turnstile model is useful when computing distances or similarity measures between two vectors z, z 0 , e.g. treating updates (i, ∆) to z as +∆ and to z 0 as −∆, so that x represents z − z 0 . For the heavy hitters problem, the first algorithm with provable guarantees was a deterministic algorithm for finding `1 heavy hitters in the cash-register model [MG82], for solving the non-tail version of the problem in which heavy hitters satisfy |xi | ≥ εkxk1 . The space complexity and query time of this algorithm are both O(1/ε), and the algorithm can be implemented so that the update time is that of insertion into a dynamic dictionary on O(1/ε) items [DLM02] (and thus expected O(1) time if one allows randomness, via hashing). We measure running time in the word RAM model and space in machine words, where a single word is assumed large enough to hold the maximum kxk∞ over all time as well as any lg n bit integer. The bounds achieved by [MG82] are all optimal, and hence `1 heavy hitters in the cash-register model is completely resolved. An improved analysis of [BICS10] shows that this algorithm also solves the tail version of heavy hitters. In another version of the problem in which one simultaneously wants the list L of ε heavy hitters together with additive ε0 kxk1 estimates for every i ∈ L, [BDW16] gives space upper and lower bounds which are simultaneously optimal in terms of ε, ε0 , n, and the stream length. For `2 heavy hitters in the cash-register model, the CountSketch achieves O(ε−2 lg n) space. Recent works gave new algorithms using space O(ε−2 lg(1/ε) lg lg n) [BCIW16] and O(ε−2 lg(1/ε)) 2 reference [CM05]∗ [CM05]∗ [NNW14] [CCFC04] [KNPW11, Pag13]∗ [CH08] This work space ε−1 lg n ε−1 lg2 n ε−2 lg n ε−p lg n ε−p lg2 n ε−p lg n ε−p lg n update time lg n lg2 n −1 ε lg n lg n lg2 n lg n lg n query time n lg n −1 ε lg2 n n lg n n lg n ε−p lg2 n ε−p · nγ −p ε poly(lg n) randomized? Y Y N Y Y Y Y `p , `p , `p , `p , norm `1 `1 `1 p ∈ (0, 2] p ∈ (0, 2] p ∈ (0, 2] p ∈ (0, 2] Figure 1: Comparison of turnstile results from previous work and this work for `p heavy hitters when desired failure probability is 1/poly(n). Space is measured in machine words. For [CH08], γ > 0 can be an arbitrarily small constant. If a larger failure probability δ  1/ poly(n) is tolerable, one lg n factor in space, update time, and query time in each row with an asterisk can be replaced with lg((lg n)/(εδ)). For [Pag13], one lg n in each of those bounds can be replaced with lg(1/(εδ)). For [CH08], the query time can be made (ε−p lg n)((lg n)/(εδ))γ . [BCI+ 16]. A folklore lower bound in the cash-register model is Ω(1/ε2 ) machine words, which n follows since simply encoding the names of the up to 1/ε2 heavy hitters requires Ω(lg( 1/ε 2 )) bits. Despite the `1 and `2 heavy hitters algorithms above in the cash-register model requiring o(ε−p lg n) machine words, it is known finding ε-heavy hitters under `p for any 0 < p ≤ 2 in the strict turnstile model requires Ω(ε−p lg n) words of memory, even for constant probability of success [JST11]. This optimal space complexity is achieved even in the more general turnstile model by the CountSketch of [CCFC04] for all p ∈ (0, 2] (the original work [CCFC04] only analyzed the CountSketch for p = 2, but a a very short argument of [JST11, Section 4.4] shows that finding `p heavy hitters for p ∈ (0, 2) reduces to finding `2 heavy hitters by appropriately altering ε). For any p ∈ (0, 2], the CountSketch achieves optimal O(ε−p lg n) space, the update time is O(lg n), the success probability of any query is with high probability (whp) 1 − 1/ poly(n), but the query time is a very slow Θ(n lg n). In [CM05], for p = 1 in the strict turnstile model the authors described a modification of the CountMin sketch they dubbed the “dyadic trick” which maintains whp correctness for queries and significantly improves the query time to O(ε−1 lg2 n), but at the cost of worsening the update time to O(lg2 n) and space to a suboptimal O(ε−1 lg2 n). An easy modification of the dyadic trick extends the same bounds to the general turnstile model and also to ε-heavy hitters under `p for any 0 < p ≤ 2 with the same bounds [KNPW11, Theorem 1] (but with ε−1 replaced by ε−p ). A different scheme using error-correcting codes in [Pag13, Theorem 4.1] achieves the same exact bounds for `p heavy hitters when whp success is desired. This tradeoff in sacrificing space and update time for better query time has been the best known for over a decade for any 0 < p ≤ 2. From the perspective of time lower bounds, [LNN15] showed that any “non-adaptive” turnstile p algorithm for constant ε and using poly(lg n) space must have update time Ω( lg n/ lg lg n). A non-adaptive algorithm is one in which, once the randomness used by the algorithm is fixed (e.g. to specify hash functions), the cells of memory probed when processing update(i, ∆) depend only on i and not on the history of the algorithm. Note every known turnstile algorithm for a non-promise problem is non-adaptive. 3 In summary, there are several axes on which to measure the quality of a heavy hitters algorithm: space, update time, query time, and failure probability. The ideal algorithm should achieve optimal space, fast update time (O(lg n) is the best we know), nearly linear query time e.g. O(ε−p poly(lg n)), and 1/ poly(n) failure probability. Various previous works were able to achieve various subsets of at most three out of four of these desiderata, but none could achieve all four simultaneously. Our contribution I: We show the tradeoffs between space, update time, query time, and failure probability in previous works are unnecessary (see Figure 1). Specifically, in the most general turnstile model we provide a new streaming algorithm, ExpanderSketch, which for any 0 < p ≤ 2 provides whp correctness for queries with O(lg n) update time, O(ε−p poly(lg n)) query time, and optimal O(ε−p lg n) space. In fact in the strict turnstile model and for p = 1, we are able to provide a simpler variant of our algorithm with query time O(ε−1 lg1+γ n) for any constant γ > 0, answering queries even faster than the fastest previous known algorithms achieving suboptimal update time and space, by nearly a lg n factor, thus maintaining whp correctness while dominating it in all of the three axes: space, update time, and query time (see Section D). 2.1 Cluster-preserving clustering Our algorithm ExpanderSketch operates by reducing the heavy hitters problem to a new clustering problem we formulate of finding clusters in a graph, and we then devise a new algorithm CutGrabClose which solves that problem. Specifically, the ExpanderSketch first outputs a graph in which each heavy hitter is encoded by a well-connected cluster (which may be much smaller than the size of the total graph), then CutGrabClose recovers the clusters, i.e. the heavy hitters, from the graph. There have been many works on finding clusters S in a graph such that the conductance of the cut (S, S̄) is small. We will only mention some of them with features similar to our setting. Roughly speaking, our goal is to find all clusters that are low conductance sets in the graph, and furthermore induce subgraphs that satisfy something weaker than having good spectral expansion. It is necessary for us to (1) be able to identify all clusters in the graph; and (2) have a quality guarantee that does not degrade with the number of clusters nor the relative size of the clusters compared with the size of the whole graph. As a bonus, our algorithm is also (3) able to work without knowing the number of clusters. In the context of heavy hitters, requirement (1) arises since all heavy hitters need to be returned. The number of heavy hitters is not known and can be large, as is the ratio between the size of the graph and the size of a cluster (both can be roughly the square root of the size of our graph), leading to the requirement (2) above. One line of previous works [ST04, AP09, GT12] gives excellent algorithms for finding small clusters in a much larger graph with runtime proportional to the size of the clusters, but their approximation guarantees depend on the size of the whole graph, violating our requirement (2). In fact, requirement (2) is related to finding non-expanding small sets in a graph, an issue at the forefront of hardness of approximation [RS10]. As resolving this issue in general is beyond current techniques, many other works including ours attempt to solve the problem in structured special cases. There are many other excellent works for graph clustering, but whose performance guarantees deterioriate as k increases, also violating (2). The work [GT14] shows results in the same spirit as ours: if there are k clusters and a multiplicative poly(k) gap between the kth and (k +1)st smallest eigenvalues of the Laplacian of a graph, then it is possible to partition the graph into at most k high conductance induced subgraphs. Unfortunately, such a guarantee is unacceptable for our application due to more stringent requirements on the clusters being required 4 as k increases, i.e. the poly(k) gap in eigenvalues — our application provides no such promise. Another work with a goal similar in spirit to ours is [PSZ15], which given the conductances in our graphs deriving from heavy hitters would promise to find k clusters W up to error poly(k) · |W | symmetric difference each. Unfortunately such a result is also not applicable to our problem, since in our application we could have k  |W | so that the guarantee becomes meaningless. A different line of works [MMV12, MMV14] give algorithms with constant approximation guarantees but without being able to identify the planted clusters, which is not possible in their models in general. In their setting, edges inside each cluster are adversarially chosen but there is randomness in the edges between clusters. Our setting is the opposite: the edges inside each cluster have nice structure while the edges between clusters are adversarial as long as there are few of them. From the practical point of view, a drawback with several previous approaches is the required knowledge of the number of clusters. While perhaps not the most pressing issue in theory, it is known to cause problems in practice. For instance, in computer vision, if the number of clusters is not chosen correctly, algorithms like k-means tend to break up uniform regions in image segmentation [AMFM11]. Instead, a preferred approach is hierarchical clustering [AMFM11], which is in the same spirit as our solution. Definition 1. An -spectral cluster is a vertex set W ⊆ V of any size satisfying the following two conditions: First, only an -fraction of the edges incident to W leave W , that is, |∂(W )| ≤  vol(W ), where vol(W ) is the sum of edge degrees of vertices inside W . Second, given any subset A of W , let r = vol(A)/ vol(W ) and B = W \ A. Then |E(A, B)| ≥ (r(1 − r) − ) vol(W ). Note r(1 − r) vol(W ) is the number of edges one would expect to see between A and B had W been a random graph with a prescribed degree distribution. Our contribution II: We give a hierarchical graph partitioning algorithm combining traditional spectral methods and novel local search moves that can identify all -spectral clusters in a potentially much larger graph for  below some universal constant, independent of the number of clusters or the ratio between the graph size and cluster sizes. More precisely, consider a graph G = (V, E). In polynomial time, our algorithm can partition the vertices in a graph G = (V, E) into subsets V1 , . . . V` so that every -spectral cluster W matches some subset Vi up to an O( vol(W )) symmetric difference. The algorithm is described in Section 6, with guarantee given by Theorem 1 below. Theorem 1. For any given  ≤ 1/2000000 and graph G = (V, E), in polynomial time and linear space, we can find a family of disjoint vertex sets U1 , . . . U` so that every -spectral cluster W of G matches some set Ui in the sense that • vol(W \ Ui ) ≤ 3  vol(W ). • vol(Ui \ W ) ≤ 2250000  vol(W ) Moreover, if v ∈ Ui , then > 4/9 of its neighbors are in Ui . An interesting feature of our solution is that in optimization in practice, it is usually expected to perform local search to finish off any optimization algorithm but it is rarely the case that one can prove the benefit of the local search step. In contrast, for our algorithm, it is exactly our local search moves which guarantee that every cluster is found. 5 3 Preliminaries The letter C denotes a positive constant that may change from line to line, and [n] = {1, . . . , n}. We use “with high probability” (whp) to denote probability 1 − 1/ poly(n). All graphs G = (V, E) discussed are simple and undirected. We say that a graph is a λ-spectral expander if the second largest eigenvalue, in magnitude, of its unnormalized adjacency matrix is at most λ. Given two P vertex sets S, T ⊆ V , we define E(S, T ) = E ∩ (S × T ). For S, we define the volume vol(S) = v∈S deg(v), and boundary ∂S = E(S, S) where S = V \ S. We specify volG and ∂G when the graph may not be clear from context. We define the conductance of the cut (S, S) as φ(G, S) = |∂S| . min{vol(S), vol(S)} If S or S is empty, the conductance is ∞. We define the conductance of the entire graph G by φ(G) = min φ(G, S). ∅(S(V 4 Overview of approach We now provide an overview of our algorithm, ExpanderSketch. In Section A we show turnstile heavy hitters with arbitrary ε reduces to several heavy hitters problems for which ε is “large”. Specifically, after the reduction whp we are guaranteed each of the ε-heavy hitters √ i in the original stream now appears in some substream updating a vector x0 ∈ Rn , and |x0i | ≥ (1/ C lg n)kx0[C lg n] k2 . √ √ That is, i is an Ω(1/ lg n)-heavy hitter in x0 . One then finds all the Ω(1/ lg n) heavy hitters in each substream then outputs their union as the final query overview √ result. For the remainder of this 2 we thus focus on solving ε-heavy hitters for ε > 1/ C lg n, so there are at most 2/ε = O(lg n) heavy hitters. Our goal is to achieve failure probability 1/ poly(n) with space O(ε−2 lg n), update time O(lg n), and query time ε−2 poly(lg n) = poly(lg n). There is a solution, which we call the “b-tree” (based on [CH08]), which is almost ideal (see Section B.2 and Corollary 1). It achieves O(ε−2 lg n) space and O(lg n) update time, but query time inverse polynomial in the failure probability δ, which for us is δ = 1/ poly(n). Our main idea is to reduce to the case of much larger failure probability (specifically 1/ poly(lg n)) so that using the b-tree then becomes viable for fast query. We accomplish this reduction while maintaining O(lg n) update time and optimal space by reducing our heavy hitter problem into m = Θ(lg n/ lg lg n) separate partition heavy hitters problems, which we now describe. In the partition ε-heavy hitters problem, there is some parameter ε ∈ (0, 1/2). There is also some partition P = {S1 , . . . , SN } of [n], and it is presented in the form of an oracle O : [n] → [N ] such that for any i ∈ [n], O(i) gives the j ∈ [N ] such that i ∈ Sj . In what follows the partitions will be random, with Oj depending on some random hash functions (in the case of adapting the b-tree to partition heavy hitters the Oj are deterministic; see Section B.2). Define a vector y ∈ RN such that for each j ∈ [N ], yj = kxSj k2 , where xS is the projection of x onto a subset S of coordinates. The goal then is to solve the ε-heavy hitters problem on y subject to streaming updates to x: we should output a list L ⊂ [N ], |L| = O(1/ε2 ), containing all the ε-heavy hitters of y. See Section B for more details. 6 update(29, ∆) m = 3 chunks enc(i) = 0 1 1 update(1, v) 1 update(3, v) P1 P2 t 0 1 update(1, v) P3 Figure 2: Simplified version of final data structure. The update is x29 ← x29 + ∆ with m = 3, t = 2 in this example. Each Pj is a b-tree operating on a partition of size 2t . Now we explain how we make use of partition heavy hitters. For each index i ∈ [n] we can view i as a length lg n bitstring. Let enc(i) be an encoding of i into T = O(lg n) bits by an errorcorrecting code with constant rate that can correct an Ω(1)-fraction of errors. Such codes exist with linear time encoding and decoding [Spi96]. We partition enc(i) into m contiguous bitstrings each of length t = T /m = Θ(lg lg n). We let enc(i)j for j ∈ [m] denote the jth bitstring of length t when partitioning enc(i) in this way. For our data structure, we instantiate m separate partition heavy hitter data structures from Section B.2 (a partition heavy hitter variant of the b-tree), P1 , . . . , Pm , each with failure probability 1/ poly(lg n). What remains is to describe the m partitions Pj . We now describe these partitions, where each will have N = 2O(t) = poly(lg n) sets. Now, how we would like to define the partition is as follows, which unfortunately does not quite work. For each j ∈ [m], we let the jth partition Pj have oracle Oj (i) = enc(i)j . That is, we partition the universe according to the jth chunks of their codewords. See Figure 2 for an illustration, where upon an update (i, ∆) we write for each Pj the name of the partition that is being updated. The key insight is that, by definition of the partition heavy hitters problem, any partition containing a heavy hitter i ∈ [n] is itself a heavy partition in Pj . Then, during a query, we would query each Pj separately to obtain lists Lj ⊆ [2t ]. Thus the Pj which succeed produce Lj that contain the jth chunks of encodings of heavy hitters (plus potentially other t-bit chunks). Now, let us perform some wishful thinking: suppose there was only one heavy hitter i∗ , and furthermore each Lj contained exactly enc(i∗ )j and nothing else. Then we could obtain i∗ simply by concatenating the elements of each Lj then decoding. In fact one can show that whp no more than an arbitrarily small fraction (say 1%) of the Pj fail, implying we would still be able to obtain 99% of the chunks of enc(i∗ ), which is sufficient to decode. The main complication is that, in general, there may be more than one heavy hitter (there may be up to Θ(lg n) of them). Thus, even if we performed wishful thinking and pretended that every Pj succeeded, and furthermore that every Lj contained exactly the jth chunks of the encodings of heavy hitters and nothing else, it is not clear how to perform the concatenation. For example, if there are two heavy hitters with encoded indices 1100 and 0110 with m = t = 2, suppose the Pj return L1 = {11, 01} and L2 = {00, 10} (i.e. the first and second chunks of the encodings of the heavy hitters). How would we then know which chunks matched with which for concatenation? That is, are the heavy hitter encodings 1100, 0110, or are they 1110, 0100? Brute force trying all possibilities is too slow, since m = Θ(lg n/ lg lg n) and each |Lj | could be as big as Θ(lg n), yielding (C lg n)m = poly(n) possibilities. In fact this question is quite related to the problem of list-recoverable codes (see Section C), but since no explicit codes are 7 Layer #: Layer #: Layer #: Layer #: 1 2 3 .. .. .. .. .. .. .. .. .. .. .. .. m (a) (b) (c) (d) Figure 3: Each vertex in row j corresponds to an element of Lj , i.e. the heavy hitter chunks output by Pj . When indices in Pj are partitioned by hj (i) ◦ enc(i)j ◦ hj+1 (i), we connect chunks along paths. Case (a) is the ideal case, when all j are good. In (b) P2 failed, producing a wrong output that triggered incorrect edge insertions. In (c) both P2 and P3 failed, triggering an incorrect edge and a missing vertex, respectively. In (d) two heavy hitters collided under h3 , causing their vertices to have the same name thereby giving the appearance of a merged vertex. Alternatively, light items masking as a heavy hitter might have appeared in L3 with the same h3 evaluation as a heavy hitter but different h4 evaluation, causing the red vertex to have two outgoing edges to level 4. known to exist with the efficiency guarantees we desire, we proceed in a different direction. To aid us in knowing which chunks to concatenate with which across the Lj , a first attempt (which also does not quite work) is as follows. Define m pairwise independent hash functions h1 , . . . , hm : [n] → [poly(lg n)]. Since there are O(lg n) heavy hitters, any given hj perfectly hashes them with decent probability. Now rather than partitioning according to Oj (i) = enc(i)j , we imagine setting Oj (i) = hj (i) ◦ enc(i)j ◦ hj+1 (i) where ◦ denotes concatenation of bitstrings. Define an index j ∈ [m] to be good if (a) Pj succeeds, (b) hj perfectly hashes all heavy hitters i ∈ [n], and (c) √ for each heavy hitter i, the total `2 weight from non-heavy hitters hashing to hj (i) is o((1/ lg n)kx[1/ε2 ] k2 . A simple argument shows that whp a 1 −  fraction of the j ∈ [m] are good, where  can be made an arbitrarily small positive constant. Now let us perform some wishful thinking: if all j ∈ [m] are good, and furthermore no non-heavy elements appear in Lj with the same hj but different hj+1 evaluation as an actual heavy hitter, then the indices in Lj tell us which chunks to concatenate within Lj+1 , so we can concatenate, decode, then be done. Unfortunately a small constant fraction of the j ∈ [m] are not good, which prevents this scheme from working (see Figure 3). Indeed, in order to succeed in a query, for each heavy hitter we must correctly identify a large connected component of the vertices corresponding to that heavy hitter’s path — that would correspond to containing a large fraction of the chunks, which would allow for decoding. Unfortunately, paths are not robust in having large connected component subgraphs remaining even for O(1) bad levels. The above consideration motivates our final scheme, which uses an expander-based idea first proposed in [GLPS14] in the context of “for all” `1 /`1 sparse recovery, a problem in compressed sensing. Although our precise motivation for the next step is slightly different than in [GLPS14], and our query algorithm and our definition of “robustness” for a graph will be completely different, the idea of connecting chunks using expander graphs is very similar to an ingredient in that work. 8 The idea is to replace the path in the last paragraph by a graph which is robust to a small fraction of edge insertions and deletions, still allowing the identification of a large connected component in such scenarios. Expander graphs will allow us to accomplish this. For us, “robust” will mean that over the randomness in our algorithm, whp each corrupted expander is still a spectral cluster as defined in Section 6. For [GLPS14], robustness meant that each corrupted expander still contains an induced small-diameter subgraph (in fact an expander) on a small but constant fraction of the vertices, which allowed them a recovery procedure based on a shallow breadth-first search. They then feed the output of this breadth-first search into a recovery algorithm for an existing listrecoverable code (namely Parvaresh-Vardy codes). Due to suboptimality of known list-recoverable codes, such an approach would not allow us to obtain our optimal results. An expander-based approach: Let F be an arbitrary d-regular connected graph on the vertex set [m] for some d = O(1). For j ∈ [m], let Γ(j) ⊂ [m] be the set of neighbors of vertex j. We partition [n] according to Oj (i) = z(i)j = hj (i) ◦ enc(i)j ◦ hΓ(j)1 ◦ · · · ◦ hΓ(j)d where Γ(j)k is the kth neighbor of j in F . Given some such z, we say its name is the first s = O(lg lg n) bits comprising the hj portion of the concatenation. Now, we can imagine a graph G on the layered vertex set V = [m] × [2s ] with m layers. If Lj is the output of a heavy hitter query on Pj , we can view each element z of Lj as suggesting d edges to add to G, where each such z connects d vertices in various layers of V to the vertex in layer j corresponding to the name of z. The way we actually insert the edges is as follows. First, for each j ∈ [m] we instantiate a partition point query structure Qj as per Lemma 14 with partition Pj , failure probability 1/ poly(lg n), and error parameter cε for a small constant c. We modify the definition of a level j ∈ [m] being “good” earlier to say that Qj must also succeed on queries to every z ∈ Lj . We point query every partition z ∈ Lj to obtain an estimate ỹz approximating yz (for the exact form of approximation, see Eq. (4) from Lemma 14). We then group all z ∈ Lj by name, and within each group we remove all z from Lj except for the one with the largest ỹz , breaking ties arbitrarily. This filtering step guarantees that the vertices in layer j have unique names, and furthermore, when j is good all vertices corresponding to heavy hitters appear in Lj and none of them arePthrown out by this filtering. We then let G be the graph created by including the at most (d/2) · j |Lj | edges suggested by the z’s across all Lj (we only include an edge if both endpoints suggest it). Note G will have many isolated vertices since only m · maxj |Lj | = O(lg2 n/ lg lg n) edges are added, but the number of vertices in each layer is 2s , which may be a large power of lg n. We let G be its restriction to the union of non-isolated vertices and vertices whose names match the hash value of a heavy hitter at the m different levels. This ensures G has O(lg2 n/ lg lg n) vertices and edges. We call this G the chunk graph. Now, the intuitive picture is that G should be the vertex-disjoint union of several copies of the expander F , one for each heavy hitter, plus other junk edges and vertices coming from other non-heavy hitters in the Lj . Due to certain bad levels j however, some expanders might be missing a small constant -fraction of their edges, and also the m bad levels may cause spurious edges to connect these expanders to the rest of the graph. The key insight is as follows. Let W be the vertices of G corresponding to some particular heavy hitter, so that in the ideal case W would be a single connected component whose induced graph is F . What one can say, even with m bad levels, is that every heavy hitter’s such vertices W forms an O()-spectral cluster as per Definition 1. Roughly this means that (a) the cut separating W from the rest of G has O() conductance (i.e. it is a very sparse cut), and (b) for any cut (A, W \A) within W , the number of edges crossing the cut is what is guaranteed from a spectral expander, minus O() · vol(W ). Our task then reduces to 9 move right to the hi there move right ... to the hi there ... (a) (b) again again Figure 4: Each small oval is a spectral cluster. They are well-connected internally, with sparse cuts to the outside. The large oval is the rest of the graph, which can look like anything. Cut (a) represents a good low-conductance cut, which makes much progress (cutting the graph in roughly half) while not losing any mass from any cluster. Cut (b) is also a low-conductance cut as long as the number of small ovals is large, since then cutting one cluster in half has negligible effect on the cut’s conductance. However, (b) is problematic since recursing on both sides loses half of one cluster forever. finding all -spectral clusters in a given graph. We show in Section 6 that for each such cluster W , we are able to find a (1 − O())-fraction of its volume with at most O() · vol(W ) erroneous volume from outside W . This suffices for decoding for  a sufficiently small constant, since this means we find most vertices, i.e. chunks of the encoding, of the heavy hitter. For the special case of `1 heavy hitters in the strict turnstile model, we are able to devise a much simpler query algorithm that works; see Section D for details. For this special case we also give in Section E a space-optimal algorithm with O(lg n) update time, whp success, and expected query time O(ε−1 lg n) (though unfortunately the variance of the query time may be quite high). 4.1 Cluster-preserving clustering An -spectral cluster is a subset W of the vertices in a graph G = (V, E) such that (1) |∂W | ≤  vol(W ), and (2) for any A ( W with vol(A)/ vol(W ) = r, |E(A, W \A)| ≥ (r(1 − r) − ) vol(W ). Item (2) means the number of edges crossing a cut within W is what you would expect from a random graph, up to  vol(W ). Our goal is to, given G, find a partition of V such that every -spectral cluster W in G matches some partition up to  vol(W ) symmetric difference. Our algorithm CutGrabClose is somewhat similar to the spectral clustering algorithm of [KVV04, Section 4], but with local search. That algorithm is quite simple: find a low-conductance cut (e.g. a Fiedler cut) to split G into two pieces, then recurse on both pieces. Details aside, Fiedler √ cuts are guaranteed by Cheeger’s inequality to find a cut of conductance O( γ) as long as a cut of conductance at most γ exists in the graph. The problem with this basic recursive approach is shown in Figure 4 (in particular cut (b)). Note that a cluster can be completely segmented after a few levels of recursion, so that a large portion of the cluster is never found. Our approach is as follows. Like the above, we find a low-conductance cut then recurse on both sides. However, before recursing on both sides we make certain “improvements” to the cut. We 10 say A ⊂ V is closed in G if there is no vertex v ∈ G\A with at least 5/9ths of its neighbors in A. Our algorithm maintains that all recursive subcalls are to closed subsets in G as follows. Suppose we are calling CutGrabClose on some set A. We first try to find a low-conductance cut within A. If we do not find one, we terminate and let A be one of the sets in the partition. Otherwise, if we cut A into (S, S̄), then we close both S, S̄ by finding vertices violating closure and simply moving them. It can be shown that if the (S, S̄) cut had sufficiently low conductance, then these local moves can only improve conductance further. Now both S and S̄ are closed in A (which by a transitivity lemma we show, implies they are closed in G as well). We then show that if (1) some set S is closed, and (2) S has much more than half the volume of some spectral cluster W (e.g. a 2/3rds fraction), then in fact S contains a (1 − O())-fraction of W . Thus after closing both S, S̄, we have that S either: (a) has almost none of W , (b) has almost all of W , or (c) has roughly half of W (between 1/3 and 2/3, say). To fix the latter case, we then “grab” all vertices in S̄ with some Ω(1)-fraction, e.g. 1/6th, of their neighbors in S and simply move them all to S. Doing this some constant number of times implies S has much more than 2/3rds of W (and if S was in case (a), then we show it still has almost none of W ). Then by doing another round of closure moves, one can ensure that both S, S̄ are closed, and each of them has either an O()-fraction of W or a (1 − O())-fraction. The details are in Section 6. It is worth noting that our algorithm can make use of any spectral cutting algorithm as a black box and not just Fiedler cuts, followed by our grab and closure steps. For example, algorithms from [OV11, OSV12] run in nearly linear time and either (1) report that no γ-conductance cut exists (in which case we could terminate), (2) find √ a balanced cut of conductance O( γ) (where both sides have nearly equal volume), or (3) find an √ O( γ)-conductance cut in which every W ⊂ G with vol(W ) ≤ (1/2) vol(G) and φ(W ) ≤ O(γ) has more than half its volume on the smaller side of the cut. Item (2), if it always occurred, would give a divide-and-conquer recurrence to yield nearly linear time for finding all clusters. It turns out item (3) though is even better! If the small side of the cut has half of every cluster W , then by grabs and closure moves we could ensure it is still small and has almost all of W , so we could recurse just on the smaller side. It appears an O(|E| lg |V |)-space implementation of such a cutting algorithm achieving this guarantee would lead to O(ε−2 lg2+o(1) n) query time for whp heavy hitters (with O(ε−2 lg1+o(1) n) expected query time), but in this version of our work we simply focus on achieving O(ε−2 poly(lg n)). 5 General turnstile updates In this section we analyze our algorithm ExpanderSketch described in Section 4. Recall that our final algorithm, including the reduction in Section A, is as follows. First we pick a hash function h : [n] → [q] from a Θ(lg n)-wise independent hash family for q = d1/(ε2 lg n)e. Then we initialize q data structures D1 , . . . , Dq , where each Dk is an ε0 -heavy hitters data structure as described √ in Section 4, for ε0 = max{ε, 1/ C lg n}. We also during intialization construct a d-regular λ0 spectral expander F on m = Θ(lg n/ lg lg n) vertices for some d = O(1), where λ0 = d for some (small) constant  > 0 to be specified later. Such an F can be constructed in time poly(lg n) with d = poly(1/) deterministically [RVW02], then stored in adjacency list representation consuming O(lg n/ lg lg n) words of memory. The Dk are independent, and for each Dk we pick hash functions hk1 , . . . , hkm : [n] → [poly(lg n)] independently from a pairwise independent family and instantiate partition ε0 -heavy hitter data k (as b-trees; see Section B.2) with O k : [n] → [2O(t) ] for j ∈ [m] defined by structures P1k , . . . , Pm j 11 Ojk (i) = hkj (i) ◦ enc(i)j ◦ hkΓ(j)1 ◦ · · · ◦ hkΓ(j)d . Each Pjk has failure probability 1/ poly(lg n). We also instantiate partition cε-point query data structures Qk1 , . . . , Qkm with small constant c and failure probability 1/ poly(lg n) as per Lemma 14, with the same Ojk . Here enc is an encoding as in Section 4 mapping into T = O(lg n) bits, and t = T /m = Θ(lg lg n). Γ(j)k is the kth neighbor of j in F . To answer a query to our overall data structure, we query each Dk separately then output the union of their results. To answer a query to Dk , we form a chunk graph Gk from the outputs of the Pjk as in Section 4. We then find all 0 -spectral clusters using Theorem 1 for a sufficiently small constant 0 , throw away all clusters of size less than m/2, then from each remaining cluster W 0 we: (1) remove all vertices of degree ≤ d/2, (2) remove v ∈ W 0 coming from the same layer j ∈ [m] as some other v 0 ∈ W 0 , then (3) form a (partially corrupted) codeword using the bits associated with vertices left in W 0 . We then decode to obtain a set B k containing all heavy hitter indices i ∈ h−1 (k) with high probability. We then output L = ∪qk=1 B k as our final result. Henceforth we condition on the event E that every heavy hitter i ∈ [n] is ε0 -heavy in Dh(i) , which happens whp by Theorem 5. Our final analysis makes use of the following. Lemma 1. Suppose E occurs. Focus on a particular k ∈ [q]. Let x0 = xh−1 (k) be the projection of x onto vertices hashing to k. As in Section 4, we say an index j ∈ [m] is good if (a) Pjk succeeded, (b) hkj perfectly hashes all ε0 -heavy hitters in x0 , (c) for each ε0 -heavy hitter i, the total `2 weight √ from non-heavy hitters in h−1 (k) hashing to hj (i) is under hj is o((1/ lg n))kx[1/ε02 ] k2 , and (d) Qkj succeeded on every z ∈ Lkj . Call j bad otherwise. Then if the failure probability of each Pjk , Qkj is 1/ lgC+1 n, the range of each hkj is [lgC+3 n], and m = C lg n/ lg lg n for some constant C > 0, then with probability 1 − 1/nc the number of bad levels is at most βm, where c can be made an arbitrarily large constant and β an arbitrarily small constant by increasing C. Proof. The probability of (b), that hkj perfectly hashes all O(lg n) ε0 -heavy hitters, is 1 − O(1/ lgC+1 n). For (c), focus on a particular heavy hitter i. The expected squared `2 mass from non-ε0 heavy hitters colliding i under hj is (1/ lgC+3 n)kx[1/ε02 ] k22 by pairwise independence of hj . Thus by Markov, the probability that more than (1/ lg2 n)kx[1/ε02 ] k22 squared `2 mass collided with i from light items is at most 1/ lgC+1 n. Since there are only O(lg n) ε0 -heavy hitters, by a union bound we have √ that (c) holds, i.e. that no heavy hitter collides with more than (1/ lg n)kx[1/ε02 ] k2 = o(1/ lg n)kx[1/ε02 ] k2 `2 mass from light items under `j , with probability 1 − O(1/ lgC n). For (d), we perform O(1/ε02 ) = O(lg n) point queries on Qkj , and each point query has failure probability 1/ lgC+1 n, so the probability that any of the point query fails is at most 1/ lgC n. Thus j is bad with probability O(1/ lgC n). Now also choose m = C lg n/ lg lg n. Then the probability that there are more than βm bad levels is at most, for some constant C 0 independent of C,    0 βm  βC lg n/ lg lg n  0 βC lg n/ lg lg n m C C 0e Ce 1 1 ≤ = · βC 2 = βC 2 −o (1) , C C n βm β n n lg n β lg n  using ab ≤ (ea/b)b . Thus the lemma holds for β = 1/C, and c = C/2 for sufficiently large n.  Our correctness analysis also makes use of the following lemma [AC88, Lemma 2.3] to show that, with high probability, each heavy hitter is represented by an 0 -spectral cluster. The lemma states that for spectral expanders, sets expand with small sets S satisfying even better expansion properties. Some version of this lemma is known in the literature as the expander mixing lemma. 12 Lemma 2. [AC88] Let A be the adjacency matrix of a d-regular graph with vertex set V . Suppose the second largest eigenvalue of A in magnitude is λ > 0. Then for any S ⊆ V , writing |S| = r|V |, |∂S| ≥ (d − λ)(1 − r)|S|. Theorem 2. Assume n is larger than some constant. Let A be the algorithm from Theorem 1 which finds all 0 -spectral clusters in a graph on O(ε0−2 lg n/ lg lg n) vertices and edges whp in time T and space S. For any 0 < ε < 1/2, there is an algorithm solving the ε-heavy hitters problem in general turnstile streams on vectors of length n whp with space and update time O(ε−2 lg n) and O(lg n), respectively. Answering a query uses an additional O(S) = o(ε−2 lg n) space and runs in time O(ε−2 lg1+γ n + qT ) = O(ε−2 poly(lg n)), by q successive calls to A. Here γ > 0 can be chosen as an arbitrarily small constant. Proof. We first analyze space and running times. We store F , taking O(lg n/ lg lg n) space, which can be ignored as it is dominated by other parts of the algorithm. Storing h requires O(lg n) words of memory. Let us now focus on a specific Dk . It stores m hash functions drawn independently from a pairwise family mapping [n] to [poly(lg n)], consuming O(m) = O(lg n/ lg lg n) space. The m b-trees combined Pjk consume space m · O(ε0−2 t) = O(ε0−2 lg n), and the same for the Qkj . Thus the total space per Dk is O(ε0−2 lg n), and thus the total space across the entire algorithm is O(qε0−2 lg n) = O(ε−2 lg n). We also need an additional O(S) space to run A repeatedly during a query. For the update time, we first hash using h, taking O(lg n) time. Then within a Dk we perform m hash evaluations hkj , taking total time O(m). We then compute the encoding enc(i) of i, taking O(lg n) time, then perform m b-tree updates taking total time m · O(t) = O(lg n). Thus the total update time is O(lg n). For the query time, for a given Dk we have to query m b-trees, taking time m · O(ε0−2 t lgγ n) = O(ε0−2 lg1+γ n). We also run A on Gk , taking time T . Thus the total query time is O(q(ε0−2 lg1+γ n + T )) = O(ε−2 lg1+γ n + qT ). Now it only remains to argue correctness. Each Lk has size O(1/ε02 ) with probability 1, which is a guarantee of the b-tree. Then when we form the chunk graph Gk , it has O(ε0−2 lg n/ lg lg n) vertices. We only insert a decoded spectral cluster into L if its size is at least m/2, so there can be at most O(1/ε02 ) such clusters found. Thus |L| ≤ O(q/ε02 ) = O(1/ε2 ) with probability 1. It now only remains to show that each heavy hitter i ∈ [n] is represented by some spectral cluster of size at least m/2 in Gh(i) . We assume event E, which happens whp. Now let us focus on a particular Gk . Define x0 = xh−1 (k) . We will show that each ε0 -heavy hitter in x0 is represented by such a cluster in Gk . Focus on a particular ε0 -heavy hitter i. Let W be the set of m vertices {(j, hkj (i))}m j=1 . Suppose that all levels j ∈ [m] were good. We claim that in this case, W would be an isolated connected component in Gk , and furthermore the induced graph on W would be F . To see this, observe that before filtering by Qkj , z k (i)j appears in Lkj (see Section 4 for the definitions of Lj and z(i)j ; Lkj , z k (i)j are then the natural modifications corresponding to k ∈ [q]). Once we group the z ∈ Lkj by name and filter according to Qkj , let z 6= z k (i)j be such that its name also equals hkj (i). Since level j is good, none of the mass of z is from a heavy hitter. Thus by condition √ (c) in the definition of goodness, the `2 weight yz of partition z is at most o(1/ lg n)kx[1/ε02 ] k2 . Thus by the condition of Eq. (4), since Qkj succeeds we will will have ỹz k (i)j > ỹz and not remove z k (i)j from Lkj . Thus z k (i)j remains in Lkj even after filtering. Since this is true across all j ∈ [m], we will add all edges of F to W . Furthermore no vertices outside W will connect to W , since edge insertion requires mutual suggestion of the edge by both endpoints. Thus, in the case of all good 13 levels, by Lemma 2 for any subset A of W with |A| = r|W | = rm, |E(A, W \A)| ≥ (d − λ0 )r(1 − r)|W | = (r(1 − r) − r(1 − r) λ0 λ0 )d|W | ≥ (r(1 − r) − )dm. d 4d By Lemma 1, the number of bad levels is at most βm with high probability, for β an arbitrarily small constant. Let us now understand the possible effects of a bad level on W . Suppose j is bad. Then the Lkj obtained after filtering by Qkj may not include z k (i)j . Thus W may lose at most d edges from F (those corresponding to edges incident upon vertex j in F ). Second, Lkj after filtering may instead contain some z whose name is hkj (i), but whose edge suggestions differ from z k (i)j , possibly causing edges to be inserted within W which do not agree with F , or even inserting edges that cross the cut (W, G\W ). At most d such edges are inserted in this way. Thus, across all bad levels, the total number of F -edges deleted within W is at most βdm, and the total number of edges crossing the cut (W, G\W ) is also at most βdm. Also, the volume vol(W ) is always at most dm and at least (1 − β)dm. Thus after considering bad levels, for any subset A of W as above, |E(A, W \A)| ≥ (r(1 − r) − λ0 − β)dm ≥ (r(1 − r) − 0 ) vol(W ). 4d for 0 ≥ β + λ0 /(4d). Furthermore, the number of edges leaving W to G\W is |∂(W )| ≤ βdm ≤ β vol(W ) ≤ 0 vol(W ) 1−β for 0 ≥ β/(1 − β). Thus W is an 0 -spectral cluster in Gk representing i for 0 = max{β + λ0 /(4d), β/(1 − β)} = max{β + /4, β/(1 − β)}. Thus by Theorem 1, A recovers a W 0 missing at most 30 vol(W ) volume from W , and containing at most 22500000 volume from G\W . Note we remove any vertex from W 0 of degree ≤ d/2, so W 0 contains at most 55000000 m vertices from outside W . Furthermore, since there are at most βdm edges lost from W due to bad levels, at most 2βm vertices in W had their degrees reduced to ≤ d/2, and thus removing low-degree vertices removed at most 2βm additional vertices from W . Also, since the max degree in Gk is d and at most a 2β fraction of vertices in W have ≤ d/2 degree, since W 0 is missing at most 30 vol(W ) vertices from W , this corresponds to at most 2βm + 60 m vertices missing from W . We then form a (corrupted) codeword C 0 ∈ {0, 1}mt by concatenating encoding chunks specified by the vertices in W 0 . Since then at most a (55000060 + 2β)-fraction of entries in enc(i) and C 0 differ, for , β sufficiently small constants we successfully decode and obtain the binary encoding of i, which is included in L.  Remark 1. It is possible to slightly modify our algorithm so that the ε−2 lg1+γ n summand in the query time becomes ε−2 lg1+o(1) n. We state the modification here without providing the full details. Specifically, rather than implement the Pjk as b-trees, one could instead implement them as recursive versions of the ExpanderSketch on a smaller universe. Then, after a single level of recursion down, one switches back to using b-trees. Then the b-trees at the second level of recursion have query time which includes an arbitrarily small power of lg lg n, which is lgo(1) n. One may be tempted to avoid b-trees altogether and simply continue the recursion to the leaves, but due to the blowup in bitlength of the partition sizes stemming from concatenating hj values, it seems such an ∗ approach would result in the space complexity being multiplied by an additional 2O(lg n) factor. 14 6 Cluster-preserving clustering In this section we present our cluster-preserving clustering, partitioning the graph into clusters with the promise to preserve and identify all -spectral clusters as per Definition 1. The main goal of this section is to prove Theorem 1. To prove Theorem 1, we shall use cuts based on Cheeger’s inequality. Given an undirected graph G = (V, E), let its Laplacian matrix be LG (normalized so that (LG )i,i = 1 for all i). It is known that that LG is positive semidefinite with eigenvalues 0 = λ1 ≤ λ2 ≤ . . . ≤ λ|V | with λk = 0 iff G has at least k connected components. A fundamental result in spectral graph theory is the following, which is a robust form of this fact when k = 2. Theorem 3 (Cheeger’s inequality for graphs [AM85, Alo86, SJ89]). For G = (V, E) an undirected graph, let λ2 be the second smallest eigenvalue of LG . Then a cut (S, S) satisfying p p λ2 ≤ φ(G) ≤ φ(G, S) ≤ 2λ2 ≤ 2 φ(G) 2 (1) can be found in time poly(|V |) and space O(|V | + |E|). Algorithm 1 Top level of cluster preserving clustering of G0 as stated in Theorem 1. 1: function Main(G0 ) 2: {U1 . . . , U` } ← CutGrabClose(G0 ) 3: For each Ui , recursively remove v ∈ Ui with ≥ 5/9ths neigbors outside Ui . . Cleaning 4: return {U1 . . . , U` } 5: end function Algorithm 2 Cluster preserving clustering of G = G0 |V , approximately isolating clusters W of G0 . 1: function CutGrabClose(G = G0 |V ) 2: Use Theorem 3 to find a cut (S, S) satisfying Eq. (1); say |S| ≤ |S|. 3: if φ(G, S) ≥ 1/500 then return {V } . We’ve identified a potential cluster. 4: else 5: LocalImprovements(G, S, V ) . Local improvements of both S, S. 6: Grab(G, S) 7: LocalImprovements(G, S, S) . Local improvements of S. 8: Grab(G, S) 9: LocalImprovements(G, S, S) . Local improvements of S. 10: LocalImprovements(G, S, S) . Local improvements of S. 11: C ←CutGrabClose(G|S) ∪ CutGrabClose(G|S) 12: return C 13: end if 14: end function We are now ready to describe our algorithm, presented in pseudo-code in Algorithms 2–4. At the top level, from Main, the function CutGrabClose is fed as input the graph G = (V, E) from Theorem 1. We denote this top level graph G0 = (V0 , E0 ). CutGrabClose is a recursive 15 Algorithm 3 Local improvements across cut (S, S) only moving vertices from T . function LocalImprovements(G, S, T ) . (S, S) is a cut in G = (V, E) while ∃v ∈ T with at least 5/9ths of its edges crossing the cut do . Local improvement. 3: Move v to the other side of the cut. 4: end while 5: end function 1: 2: Algorithm 4 Expanding S by grabbing all vertices with 1/6th neighbors in S. 1: function Grab(G, S) 2: Let T be set of vertices from G \ V with at least 1/6th of its neighbors in S. 3: S ← S ∪ T. 4: end function algorithm, working on induced subgraphs G = G0 |V of G0 , producing a family of disjoint subsets of the vertices. Suppose G0 has an -spectral cluster W . Our goal is to show that one set in the final partition produced by CutGrabClose matches W in a slightly weaker sense than Theorem 1 (namely volUi (Ui \ W ) = O( vol(W )) instead of the second matching condition). At the end of the section, we describe how the last cleaning step in Main removes extraneous mass from candidate clusters and achieves the stronger conditions in Theorem 1. On input G = (V, E), CutGrabClose works as follows: if there is no low-conductance cut, it returns just the single-element partition {V }. Otherwise, it finds a low-conductance cut (S, S). It then performs a sequence of recursive local improvements and two grabs to maintain certain invariants in our analysis. Namely, we want to maintain the invariant that throughout all levels of recursion, most of W stays in the same recursive branch. Here, by most of W , we mean relative to the volume of W in the original G0 . This will ensure that the final output C of the topmost level of recursion contains a single set S matching W . We now proceed with a formal description. Since we will be talking both about the original graph G0 and the recursive induced subgraphs G = G0 |V , we will sometimes use a subscript to indicate which graph we are working in, e.g., if A ⊆ V , then volG (A) and volG0 (A) are the volumes of A in G and G0 respectively. Since the subgraphs are all induced, the edge sets are always determined from the vertices included. Closure We say set A of vertices from G is closed in G if there is no vertex v ∈ G\A with at least 5/9 of its neighbors in A. The closure property is transitive, which is very useful for our recursion: Lemma 3. If A ⊆ V ⊆ V (G0 ), A is closed in G0 |V , and V is closed in G0 , then A is closed in G0 . Proof. Suppose for a contradiction that we have a vertex v ∈ G0 \A with at least 5/9ths of its neighbors in A. Then v also has 5/9ths of its neighbors in V , but V is closed in G0 , so v should be in V . However, in G0 |V , the vertex v can only have lost neighbors from outside A, so in G0 |V , v also has at least 5/9ths of its neighbors in A. This contradicts that A is closed in G0 |V .  We say that a vertex set A ⊆ V0 dominates the -spectral cluster W if volG0 (W ∩ V ) > (1 − 3 ) volG0 (W ). We will show that if A is closed and has more than 2/3 of the volume of W , then it dominates W : 16 Lemma 4. If A is closed in G0 and volG0 (W ∩ A) ≥ 2 3 volG0 (W ), then A dominates W . Proof. By assumption r = volG0 (W \ A)/ volG0 (W ) ≤ 1/3. By the spectral expansion of W , we have E(W \ A, W ∩ A) ≥ (r(1 − r) − ) vol(W ) ≥ (1 − r − /r) vol(W \ A). G0 G0 The average degree from W \ A to A is thus at least (1 − r − /r), which is bigger than 5/9 if 3 ≤ r ≤ 1/3 and  ≤ 1/27 (we have  < 1/2000000). This would contradict that A is closed, so we  conclude that r < 3, and hence that volG0 (W ∩ A)/ volG0 (W ) = 1 − r > 1 − 3. We shall frequently use the fact that if V dominates W , then within V ∩ W , there is not much difference between volume in G and G0 . More precisely, Lemma 5. Consider an arbitrary set S ⊂ V . If V dominates W then volG0 (W ∩ V ) ≤ volG (W ∩ S) + 4  volG0 (W ). Proof. The edges from W ∩ S in G0 that are not in G, are either edges leaving W , of which, by isolation of W , there are at most  volG0 (W ), or edges to W \ V , of which there at at most volG0 (W \ V ) = volG0 (W ) − volG0 (V ∩ W ) ≤ 3 volG0 (W ).  We now continue describing our algorithm to isolate W (plus any other -spectral cluster). As our invariant, we are given some induced subgraph G = (V, E) of G0 such that (1) V is closed in G0 . (2) V dominates W . To maintain this invariant, we want to show that CutGrabClose finds a cut (S, S) where both sides are closed and one side dominates W . We also want to make sure that both sides are nonempty. By definition, this follows if the conductance is below 1, and we will, in fact, always keep the conductance below 1/9. The first step of CutGrabClose is to use Theorem 3 to find a cut (S, S) of G satisfying Eq. (1); say |S| ≤ |S| (line 2 of Algorithm 2). If φ(G, S) ≥ 1/500, we will just return {V }. The following lemma states that V does not have too much volume in G outside W . Lemma 6. If φ(G, S) ≥ 1/500, then volG (V \ W ) ≤ 1000000  volG0 (W ). Proof. By isolation of the -cluster W in G0 , we have |∂G0 (W )| ≤  volG0 (W ). However, ∂G (V \ W ) = ∂G (V ∩ W ) ⊆ ∂G0 (W ), so |∂G (V \ W )| ≤  volG0 (W ). Suppose volG (V \ W ) > 1000000  volG0 (W ). We want to conclude that φ(G, V \ W ) < 1/1000000. To do that, we also need to argue that volG (V ∩ W ) > 1000000  volG0 (W ). Since V dominates W , we have volG0 (V ∩ W ) > (1 − 3 ) volG0 (W ) and by Lemma 5, we have vol(V ∩ W ) ≥ vol(V ∩ W ) − 4  vol(W ) ≤ (1 − 7 ) vol(W ) > 1000000  vol(W ). G G0 G0 G0 G0 The last equality follows because  ≤ 1/2000000. We have now proved that volG (V \ W ) > 1000000  volG0 (W ) implies that φ(G) ≤ φ(G, p V \ W ) < 1/1000000. By Eq. (1) this contradicts that we did not find a cut of size less than 2 φ(G) < 1/500.  The last cleaning in Main will reduce the volume of V \ W in G0 as required for Theorem 1. We shall return to that later. Below we assume that we found a low conductance cut (S, S) of G with φ(G, S) ≤ 1/500. We are going to move vertices between S and S, and will always maintain a conductance below 1/9. 17 Local improvements towards closure We are now going to move vertices between S and S to make sure that W is mostly contained in one side. As a first step, we will make sure that both sides are closed (line 5 of Algorithm 2). This is done iteratively. If one vertex has at least 5/9ths fraction of its neighbors on the other side of the cut, we move it to the other side, calling it a local improvement (c.f. Algorithm 3). When no more local improvements are possible, both sides S and S must be closed in G. We call these moves improving because they always improve both cut size and conductance, as described more formally below. Lemma 7. Consider a local improvement moving a vertex v. It reduces the cut size by at least dG (v)/9. It also improves the conductance if it was below 1/9 before the move. Proof. When we move v, we replace at least 95 dG (v) cut edges by at most 49 dG (v) cut edges, reducing the cut size by at least dG (v)/9. The volume moved is dG (v), so if φ(G, S) < 1/9 and the 0 new cut is (S 0 , S ), we get φ(G, S 0 ) = |∂G (S 0 )| min{volG (S 0 ), vol G (S 0 )} ≤ |∂G (S)| − dG (v)/9 < φ(G, S). min{volG (S), volG (S)} − dG (v)  When both sides are closed under local improvements, we have a situation where either W is almost completely dominated by one side, or it roughly balanced between the two sides. More precisely, Lemma 8. When both S and S are closed in G (and hence in G0 ), then either volG0 (S ∩ W ) < 3  volG0 (W ), or (1/3 − 3 ) volG0 (W ) < volG0 (S ∩ W ) < (2/3) volG0 (W ), or volG0 (S ∩ W ) > (1 − 3 ) volG0 (W ). Proof. This follows almost directly from Lemma 4. We just note that since volG0 (S ∩ W ) + volG0 (S ∩ W ) = volG0 (V ∩ W ) ≥ (1 − 3 ) volG0 (W ), if volG0 (S) ≤ (1/3 − 3 ) volG0 (W ), then volG0 (S ∩ W ) ≥ 2/3 volG0 (W ), and then, by Lemma 4, we have volG0 (S ∩ W ) > (1 − 3 ) volG0 (W ), and hence volG0 (S ∩ W ) < 3  volG0 (W ).  Grabbing for dominance Having made sure that both sides are closed, as described in Lemma 8, we now have W either almost completely dominated by one side, or roughly balanced between both sides. We will now introduce a grab operation (c.f. Algorithm 4) that in the balanced case will help S get dominance. The grab operation itself is simple. In one round, it moves every vertex to S that before the grab has more than 1/6th of its neighbors in S. An important point here is that contrary to the local improvements, the grabbing is not recursive. We are actually going to do this grabbing twice, interspersed with local improvements (c.f., Algorithm 2): First we grab from S, then we do local improvements of S, only moving vertices to S, thus only closing S. We do this grabbing followed by local improvements from S twice, calling it the big expansion of S (Algorithm 2 lines 6–9). Finally we do local improvements of S. We will prove that when all this is completed, then one of the two sides dominate W , but first we have to argue that the conductance stays low. Lemma 9. With the above grabs and local improvements, the conductance always stays below 1/9. Proof. Our starting point is a Cheeger cut (S, S) with conductance φ(G, S) ≤ 1/500. From Lemma 7 will never increase the conductance if it is below 1/9. Thus, it is only the grabs that can 18 increase the conductance. Let S 0 be the result of the grab from S. We know that all the vertices grabbed from S have at least 1/6th of their neighbors in S. This means that |∂G (S 0 )| ≤ 5|∂G (S)| and volG (S 0 ) ≤ volG (S) + 6∂G (S). It follows that φ(G, S 0 ) ≤ 5|∂G (S)| |∂G (S 0 )| ≤ 0 0 min{volG (S), volG (S)} − 6|∂G (S)| min{volG (S ), volG (S )} 5 5|∂G (S)| = ≤ φ(G, S). (1 − 6φ(G, S)) (1 − 6φ(G, S)) min{volG (S), volG (S)} Before the first grab, we have conductance below 1/500, which the grab now increases to at most 6/((1 − 6/500)500) < 1/80. The second grab can then increase the conductance to at most 6/((1 − 6/80)80) < 1/12, so, in fact, the conductance will always stay below 1/12.  Below we first argue that if we started with balance, then after the big expansion of S, we have volG0 (S ∩ W ) ≥ (1 − 3 ) volG0 (W ). Lemma 10. If S is closed and volG0 (W \ S) ≤ (2/3) volG0 (W ), then S dominates W after the big expansion from S. Proof. Let r = volG0 (W \ S)/ volG0 (W ) ≤ 2/3. If we can show that the big expansion of S brings r ≤ 1/3 − 3 , then we are done by Lemma 4 since S is closed and volG0 (S ∩ W ) ≥ (1 − r − 3 ) volG0 (W \ S). We study the effect of a single grab from a closed set S. By spectral expansion, we have |E(W \ S, S ∩ W )| ≥ (r(1 − r) − ) volG0 (W ). Let T be the set of vertices from W moved by the grab, that is, T is the set of vertices from W \ S with at least 1/6th of their neigbors in S. Also, let B be the set of vertices from W \ S that are not moved, that is, B = W \ (S ∪ T ). Then |E(S ∩ W, B)| ≤ |E(S, B)| < vol(B)/6 ≤ vol(W \ S)/6 = r vol(W )/6. G G0 G0 The number of edges from S ∩ W to vertices from W \ S that will be grabbed is therefore at least |E(S∩W, T )| = |E(S∩W, W \S)|−E(S∩W, B) ≥ (r(1−r)− −r/6) vol(W ) = (5r/6−r2 − ) vol(W ). G0 G0 The function f (r) = 5r/6 − r2 is convex, having its minimum over any interval in its end points. We are only concerned with r ∈ [(1/3 − 3 ), 2/3], where the smallest value is f (2/3) = 1/9. The number of edges to grabbed vertices is thus |E(S ∩ W, T )| ≥ (1/9 − ) volG0 (W ). We also know that before a grab, the set S is closed. Therefore, every vertex v outside S has less than 59 dG (v) edges going to S, and no more going to S ∩ W . We conclude that 9 9 vol(T ) ≥ vol(T ) ≥ |E(S ∩ W, T )| ≥ (1/9 − ) vol(W ) ≥ (1/5 − 2 ) vol(W ). G0 G G0 G0 5 5 Each grab thus decreases r = volG0 (W \S)/ volG0 (W ) by (1/5−2 ). Starting from r ≤ 2/3, with two grabs followed by local improvements of S, we thus end up with r ≤ 2/3 − 2(1/5 − 2 ) ≤ 4/15 + 4 . This is less than the desired 1/3 − 3  if  < 1/105, which is indeed the case.  Next, we will show that S dominated W before the big expansion of S, then S will also dominate W at the end. 19 Lemma 11. Suppose that S and S are closed and that S dominate W . Then S will also dominate W after a big expansion from S followed by local improvements of S. Proof. We want to show that after the big expansion of S, we still have volG0 (W ∩S) ≥ 23 volG0 (W ). This can only increase when we subsequently do local improvements of S, closing S, and then the result follows from Lemma 4. Stepping back to S before the big expansion, we are trying to bound how much volume from volG (W \ S) that can be moved to S. Both for local improvements and for grabbing, the chance of moving v to S increases the more neighbors v has in S. Thus, we maximize the potential of moving vertices from W to S if we assume that we start with all of V \ W in S. The only cut edges are now those between S and W \ S. When a local improvement moves a vertex v to S, we replace at least 95 dG (v) cut edges with at most 49 dG (v) cut edges while increasing volG (W ∩ S) by dG (v). It follows that if local improvements increase volG (S) by x, then they decrease |∂G (S)| by at least x/9. When we grab a set T of vertices to S, we know that each vertex v ∈ T had at least 16 dG (v) of its edges to S. When the grab is done, setting S 0 = S ∪ T , we have at most 56 dG (v) edges from v to W \ S 0 . We conclude that |∂G (S 0 )| ≤ 5|∂G (S)| and that volG (S 0 ) ≤ volG (S) + 6|∂G (S)|. Subsequent local improvements can further increase the volume by at most 9|∂G (S 0 )| ≤ 45|∂G (S)|. Thus, when we from S do one grab followed by local improvements, we increase the volume volG (S) by at most 51|∂G (S)|. We now note that if we did local improvements of S before the grab, then we would only get a smaller bound. More precisely, if the the local improvements moved volume x to volG (S), then |∂G (S)| would be reduced by x/9 before the grab, and then the total volume increase would be at most x + 51(|∂G (S)| − x/9) ≤ 51|∂G (S)|. We now study the big expansion from S, starting with a grab followed by any number of local improvements followed by another grab followed any number of local improvements. From the above analysis, it follows that the total increase in volG (S) is at most 6|∂G (S)|+51·5|∂G (S)| ≤ 261|∂G (S)|. This bounds the total volume moved from volG (W \ S) to volG (S). We started with volG (W ∩ S) ≤ 3  volG0 (W ). Also, originally, before the big expansion, the set S was closed, so vertices from S had less than a fraction 5/9 of their neighbors in S. This fraction could only be reduced when we artificially added all of V \W to S. After this artificial change, which only improved movement of vertices from W \ S to S, we had |∂S| ≤ 59 volG (W ∩ S) + |∂G (W )| ≤ (5/3 + 1) volG0 (W ). Thus, after the big expansion, we end up with vol(W ∩ S) ≤ (3 + 261(5/3 + 1) vol(W ) < 699  vol(W ). G G0 G0 Finally, by Lemma 5, we have volG0 (W ∩ S) ≤ volG (W ∩ S) + 4  volG0 (W ) ≤ 703  volG0 (W ), which with  ≤ 1/1000000, is much less than the required (1/3 − 3 ) volG0 (W ).  Finally we need Lemma 12. Suppose that S is closed and dominates W . Then both of these properties are preserved if we do local improvements of S. Proof. It sufficies to consider a local improvement moving a single vertex v to S. First we show that S being closed is preserved when we do a local improvement from S moving a vertex v to S. Suppose for contradiction that we afterwards had some vertex u ∈ S with 5/9ths 20 of its neighbors in S. Then we cannot have u = v; for we moved v because it had 5/9ths of its neighbors in S. However, any other u 6= v can only have fewer neighbors in S after the move. Since S starts dominating, we start with volG0 (W \ S) ≤ 3  volG0 (W ). The dominance can only be affected if v ∈ W , and we only move v to S because it has at least 5/9ths of its neighbors in S. Trivially v can have at most volG0 (W ∩ S) + |∂G0 (W )| ≤ 4  volG0 (W ) neighbors in S, so we conclude that dG (v) ≤ 95 · 4  volG0 (W ) < 8  volG0 (W ), and by Lemma 5, we have dG0 (v) ≤ dG (v) + 4  volG0 (W ) < 12  volG0 (W ). Thus we end up with volG0 (W \ S) < 15  volG0 (W ). This is much less that (1/3 − 3 ) volG0 (W ). Since S remains closed, we conclude from Lemma 4 that S  still dominates W , hence that volG0 (W \ S) ≤ 3  volG0 (W ). Let us now sum up what we have proved. Suppose we found an initial cut (S, S) of conductance below 1/500. This is when we start modifying the cut, and we need to show that our invariants are preserved for the recursive calls. By Lemma 12, the local improvements of S followed by the final local improvements of S imply that both sets end up closed, so invariant (1) is satisfied. The hard part was ensure that one side dominates W . We had Lemma 9 showing that we keep the conductance below 1/9. First we did local improvements of both sides. By Lemma 8, we end up either with one side dominating W , or with W roughly balanced between the sides. If W is balanced or dominated by S, then after by big expansion from S, by Lemma 10, S dominates W . By Lemma 12, this dominance is preserved when we do the final local improvements of S. If instead S dominated W , then, by Lemma 11 this is dominance is preserved. Thus we always end up with one side dominating W , so invariant (2) is satisfied. We conclude that W is always dominated by one branch of the recursion. The recursion finishes when no small cut is found. We have V dominating S, and by Lemma 6, we have volG (V \ W ) ≤ 1000000  volG0 (W ). Thus we have proved Theorem 4. For any given  ≤ 1/2000000 and graph G0 , in polynomial time, CutGrabClose (Algorithm 2) finds a partitioning {U1 , . . . U` } of the vertex set so that every -spectral cluster W of G0 matches some set Ui in the sense that • vol(W \ Ui ) ≤ 3  vol(W ). • volG0 |Ui (Ui \ W ) ≤ 1000000  vol(W ) The only detail missing in proving Theorem 1 is that we want a bound on volG0 (Ui \ W ) rather than volG0 |Ui (Ui \ W ). This is where the last cleaning of Main (Algorithm 1) comes in. It removes all vertices from Ui with more than 5/9ths of their neighbors outside Ui , so now, for all v ∈ Ui , we have dG0 (v) ≤ 94 dG0 |Ui (v). Lemma 13. The cleaning of Ui preserves that Ui dominates W , and now volG0 (Ui \ W ) ≤ 9 4 volG0 |Ui (Ui \ W ) ≤ 225000000  vol(W ). Proof. Recall that Ui before the cleaning is closed and dominates W . The cleaning has exactly the same effect as if we did local improvements of V (G0 ) \ Ui , so by Lemma 12, we preserve both that Ui is closed, and that it dominates W .  Theorem 4 and Lemma 13 immediately imply the statement of Theorem 1. Acknowledgments We thank Noga Alon for pointing us to [AC88, Lemma 2.3], Jonathan Kelner for the reference [OSV12], Lorenzo Orecchia and Sushant Sachdeva for answering several questions about [OV11, 21 OSV12], Piotr Indyk for the reference [GLPS14], Graham Cormode for the reference [Pag13], Yi Li for answering several questions about [GLPS14], Mary Wootters for making us aware of the formulation of the list-recovery problem in coding theory and its appearance in prior work in compressed sensing and group testing, Atri Rudra for useful discussions on list-recovery algorithms for Parvaresh-Vardy and Folded Reed-Solomon codes, and Fan Chung Graham and Olivia Simpson for useful conversations about graph partitioning algorithms. References [AC88] Noga Alon and Fan R. K. Chung. Explicit construction of linear sized tolerant networks. Discrete Mathematics, 72:15–19, 1988. [AKO11] Alexandr Andoni, Robert Krauthgamer, and Krzysztof Onak. Streaming algorithms via precision sampling. In 52nd Annual Symposium on Foundations of Computer Science (FOCS), pages 363–372, 2011. [Alo86] Noga Alon. Eigenvalues and expanders. Combinatorica, 6:83–96, 1986. [AM85] Noga Alon and Vitali Milman. Isoperimetric inequalities for graphs, and superconcentrators. Journal of Combinatorial Theory, Series B, 38(1):73–88, 1985. [AMFM11] Pablo Arbelaez, Michael Maire, Charless Fowlkes, and Jitendra Malik. Contour detection and hierarchical image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(5):898–916, 2011. [AP09] Reid Andersen and Yuval Peres. Finding sparse cuts locally using evolving sets. In Proceedings of the 41st annual ACM Symposium on Theory of Computing (STOC), pages 235–244, 2009. [ARV09] Sanjeev Arora, Satish Rao, and Umesh Vazirani. Expander flows, geometric embeddings and graph partitioning. Journal of the ACM (JACM), 56(2):5, 2009. [ASS08] Noga Alon, Oded Schwartz, and Asaf Shapira. An elementary construction of constantdegree expanders. Combinatorics, Probability and Computing, 17(3):319–327, May 2008. [BC15] Vladimir Braverman and Stephen R. Chestnut. Universal sketches for the frequency negative moments and other decreasing streaming sums. In RANDOM, pages 591–605, 2015. [BCI+ 16] Vladimir Braverman, Stephen R Chestnut, Nikita Ivkin, Jelani Nelson, David P Woodruff, and Zhengyu Wang. BPTree: an `2 heavy hitters algorithm using constant memory. abs/1603.00759, 2016. [BCIW16] Vladimir Braverman, Stephen R. Chestnut, Nikita Ivkin, and David P. Woodruff. Beating CountSketch for heavy hitters in insertion streams. In Proceedings of the 48th Annual ACM Symposium on Theory of Computing (STOC), to appear, 2016. 22 [BDW16] Arnab Bhattacharyya, Palash Dey, and David P. Woodruff. An optimal algorithm for `1 -heavy hitters in insertion streams and related problems. In Proceedings of the 35th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), 2016. [BICS10] Radu Berinde, Piotr Indyk, Graham Cormode, and Martin J. Strauss. Space-optimal heavy hitters with strong error bounds. ACM Trans. Database Syst., 35(4):26, 2010. [BKSV14] Vladimir Braverman, Jonathan Katzman, Charles Seidell, and Gregory Vorsanger. An optimal algorithm for large frequency moments using O(n1−2/k ) bits. In RANDOM, pages 531–544, 2014. [BO10] Vladimir Braverman and Rafail Ostrovsky. Zero-one frequency laws. In Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC), pages 281–290, 2010. [BO13] Vladimir Braverman and Rafail Ostrovsky. Approximating large frequency moments with pick-and-drop sampling. In APPROX, pages 42–57, 2013. [BYJKS04] Ziv Bar-Yossef, T. S. Jayram, Ravi Kumar, and D. Sivakumar. An information statistics approach to data stream and communication complexity. J. Comput. Syst. Sci., 68(4):702–732, 2004. [CCFC04] Moses Charikar, Kevin Chen, and Martin Farach-Colton. Finding frequent items in data streams. Theor. Comput. Sci., 312(1):3–15, 2004. [CCM10] Amit Chakrabarti, Graham Cormode, and Andrew McGregor. A near-optimal algorithm for estimating the entropy of a stream. ACM Transactions on Algorithms, 6(3), 2010. [CH08] Graham Cormode and Marios Hadjieleftheriou. Finding frequent items in data streams. PVLDB, 1(2):1530–1541, 2008. [Che09] Mahdi Cheraghchi. Noise-resilient group testing: Limitations and constructions. In 17th International Symposium on Fundamentals of Computation Theory (FCT), pages 62–73, 2009. [CJK+ 04] Graham Cormode, Theodore Johnson, Flip Korn, S. Muthukrishnan, Oliver Spatscheck, and Divesh Srivastava. Holistic UDAFs at streaming speeds. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 35–46, 2004. [CM05] Graham Cormode and S. Muthukrishnan. An improved data stream summary: the count-min sketch and its applications. J. Algorithms, 55(1):58–75, 2005. [CW79] Larry Carter and Mark N. Wegman. Universal classes of hash functions. J. Comput. Syst. Sci., 18(2):143–154, 1979. [DKN10] Ilias Diakonikolas, Daniel M. Kane, and Jelani Nelson. Bounded independence fools degree-2 threshold functions. In Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 11–20, 2010. 23 [DLM02] Erik D. Demaine, Alejandro López-Ortiz, and J. Ian Munro. Frequency estimation of internet packet streams with limited space. In Proceedings of the 10th Annual European Symposium on Algorithms (ESA), pages 348–360, 2002. [FSG+ 98] Min Fang, Narayanan Shivakumar, Hector Garcia-Molina, Rajeev Motwani, and Jeffrey D. Ullman. Computing iceberg queries efficiently. In Proceedings of 24rd International Conference on Very Large Data Bases (VLDB), pages 299–310, 1998. [Gan15] Sumit Ganguly. Taylor polynomial estimator for estimating frequency moments. In 42nd International Colloquium on Automata, Languages, and Programming (ICALP), pages 542–553, 2015. [GB09] Sumit Ganguly and Lakshminath Bhuvanagiri. Hierarchical sampling from sketches: Estimating functions over data streams. Algorithmica, 53(4):549–582, 2009. [GLPS14] Anna C. Gilbert, Yi Li, Ely Porat, and Martin J. Strauss. For-all sparse recovery in near-optimal time. In 41st International Colloquium on Automata, Languages, and Programming (ICALP), pages 538–550, 2014. [GNP+ 13] Anna C. Gilbert, Hung Q. Ngo, Ely Porat, Atri Rudra, and Martin J. Strauss. `2 /`2 foreach sparse recovery with low risk. In Proceedings of the 40th International Colloquium on Automata, Languages, and Programming (ICALP), pages 461–472, 2013. [GR09] Parikshit Gopalan and Jaikumar Radhakrishnan. Finding duplicates in a data stream. In Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 402–411, 2009. [GT12] Shayan Oveis Gharan and Luca Trevisan. Approximating the expansion profile and almost optimal local graph clustering. In Foundations of Computer Science (FOCS), 2012 IEEE 53rd Annual Symposium on, pages 187–196. IEEE, 2012. [GT14] Shayan Oveis Gharan and Luca Trevisan. Partitioning into expanders. In Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1256–1266, 2014. [HNO08] Nicholas J. A. Harvey, Jelani Nelson, and Krzysztof Onak. Sketching and streaming entropy via approximation theory. In 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 489–498, 2008. [HW15] Brett Hemenway and Mary Wootters. Linear-time list recovery of high-rate expander codes. In 42nd International Colloquium on Automata, Languages, and Programming (ICALP), pages 701–712, 2015. [INR10] Piotr Indyk, Hung Q. Ngo, and Atri Rudra. Efficiently decodable non-adaptive group testing. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1126–1142, 2010. [IW05] Piotr Indyk and David P. Woodruff. Optimal approximations of the frequency moments of data streams. In Proceedings of the 37th Annual ACM Symposium on Theory of Computing (STOC), pages 202–208, 2005. 24 [JST11] Hossein Jowhari, Mert Saglam, and Gábor Tardos. Tight bounds for Lp samplers, finding duplicates in streams, and related problems. In Proceedings of the 30th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), pages 49–58, 2011. [JW09] T. S. Jayram and David P. Woodruff. The data stream space complexity of cascaded norms. In 50th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 765–774, 2009. [KNPW11] Daniel M. Kane, Jelani Nelson, Ely Porat, and David P. Woodruff. Fast moment estimation in data streams in optimal space. In Proceedings of the 43rd ACM Symposium on Theory of Computing (STOC), pages 745–754, 2011. [KNW10] Daniel M. Kane, Jelani Nelson, and David P. Woodruff. On the exact space complexity of sketching and streaming small norms. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1161–1178, 2010. [KVV04] Ravi Kannan, Santosh Vempala, and Adrian Vetta. On clusterings: Good, bad and spectral. J. ACM, 51(3):497–515, 2004. [LCG13] Yang Liu, Wenji Chen, and Yong Guan. Identifying high-cardinality hosts from network-wide traffic measurements. In IEEE Conference on Communications and Network Security, (CNS), pages 287–295, 2013. [LNN15] Kasper Green Larsen, Jelani Nelson, and Huy L. Nguy˜ên. Time lower bounds for nonadaptive turnstile streaming algorithms. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing (STOC), pages 803–812, 2015. [LR88] Tom Leighton and Satish Rao. An approximate max-flow min-cut theorem for uniform multicommodity flow problems with applications to approximation algorithms. In Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 422–431, 1988. [MG82] Jayadev Misra and David Gries. Finding repeated elements. Sci. Comput. Program., 2(2):143–152, 1982. [MMV12] Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. Approximation algorithms for semi-random partitioning problems. In Proceedings of the 44th Annual ACM Symposium on Theory of Computing Conference (STOC), pages 367–384, 2012. [MMV14] Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. Constant factor approximation for balanced cut in the PIE model. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing (STOC), pages 41–49, 2014. [Mut05] S. Muthukrishnan. Data streams: Algorithms and applications. Foundations and Trends in Theoretical Computer Science, 1(2), 2005. [MW10] Morteza Monemizadeh and David P. Woodruff. 1-pass relative-error Lp -sampling with applications. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1143–1160, 2010. 25 [NNW14] Jelani Nelson, Huy L. Nguy˜ên, and David P. Woodruff. On deterministic sketching and streaming for sparse recovery and norm estimation. Lin. Alg. Appl., 441:152–167, January 2014. Preliminary version in RANDOM 2012. [NPR12] Hung Q. Ngo, Ely Porat, and Atri Rudra. Efficiently decodable compressed sensing by list-recoverable codes and recursion. In 29th International Symposium on Theoretical Aspects of Computer Science (STACS), pages 230–241, 2012. [NW10] Jelani Nelson and David P. Woodruff. Fast manhattan sketches in data streams. In Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), pages 99–110, 2010. [OSV12] Lorenzo Orecchia, Sushant Sachdeva, and Nisheeth K. Vishnoi. Approximating the exponential, the lanczos method and an Õ(m)-time spectral algorithm for balanced separator. In Proceedings of the 44th Symposium on Theory of Computing Conference, (STOC), pages 1141–1160, 2012. [OV11] Lorenzo Orecchia and Nisheeth K. Vishnoi. Towards an SDP-based approach to spectral methods: A nearly-linear-time algorithm for graph partitioning and decomposition. In Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 532–545, 2011. [Pag13] Rasmus Pagh. Compressed matrix multiplication. TOCT, 5(3):9, 2013. [PDGQ05] Rob Pike, Sean Dorward, Robert Griesemer, and Sean Quinlan. Interpreting the data: Parallel analysis with Sawzall. Scientific Programming, 13(4):277–298, 2005. [PSZ15] Richard Peng, He Sun, and Luca Zanetti. Partitioning well-clustered graphs: Spectral clustering works! In Proceedings of The 28th Conference on Learning Theory (COLT), pages 1423–1455, 2015. [RS10] Prasad Raghavendra and David Steurer. Graph expansion and the unique games conjecture. In Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC), pages 755–764, 2010. [RVW02] Omer Reingold, Salil Vadhan, and Avi Wigderson. Entropy waves, the zig-zag graph product, and new constant-degree expanders. Annals of Mathematics, 155(1):157–187, 2002. [SJ89] Alistair J. Sinclair and Mark R. Jerrum. Approximative counting, uniform generation and rapidly mixing Markov chains. Information and Computation, 82(1):93–133, 1989. [SM00] Jianbo Shi and Jitendra Malik. Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(8):888–905, 2000. [Spi96] Daniel A. Spielman. Linear-time encodable and decodable error-correcting codes. IEEE Trans. Information Theory, 42(6):1723–1731, 1996. [ST04] Daniel A Spielman and Shang-Hua Teng. Nearly-linear time algorithms for graph partitioning, graph sparsification, and solving linear systems. In Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC), pages 81–90, 2004. 26 Appendix A Heavy hitters reduction from small to large  The main theorem of this section is the following. Theorem 5. Let 0 < , δ < 1/2 be such that 1/2 > lg(1/δ). Then there is a reduction from turnstile `2 heavy hitters with parameter  and failure probability δ to z = d1/(2 lg(1/δ))e separate √ (1/ t)-heavy hitters problems for t = C lg(1/δ) for some constant C > 0, and where each such 0 problem must √ be solved with failure probability at most δ = δ/(3z). Specifically, given an algorithm for the (1/ t)-heavy hitters problem with these parameters using space S, update time tu and query time tq , the resulting algorithm for -heavy hitters from this reduction uses space O(z · S + lg(1/δ)), and has update time tu + O(lg(1/δ)) and query time O(z · tq ). Proof. We pick a hash function h : [n] → [z] at random from a Θ(lg(1/δ))-wise independent family as in [CW79]. Such h requires O(lg(1/δ)) √ space to store and can be evaluated in O(lg(1/δ)) time. We also instantiate z independent (1/ t)-heavy hitter data structures P1 , . . . , Pz each with failure probability δ 0 . Upon receiving an update (i, v) in the stream, we feed the update (i, v) to Ph(i) . To answer a query, we first query each Pj to obtain a list Lj , then we output L = ∪zj=1 Lj . This concludes the description of the data structures stored, and the implementations of update and query. The space bound and running times thus follow. We now argue correctness. Let H be the set of -heavy hitters of x, so that |H| ≤ 2/2 . It follows by the Chernoff bound and union bound over all j ∈ [z] that, for some constant C > 0, P(∃j ∈ [z], |H ∩ h−1 (j)| > C lg(1/δ)) < δ/3. h (2) We next invoke Bernstein’s inequality, which says there exists constant c > 0 such that for indeP pendent X1 , . . . , Xr each bounded by K in magnitude with σ 2 = i E(Xi − E Xi )2 , X X 2 2 ∀λ > 0, P(| Xi − E Xi | > λ) . e−cλ /σ + e−cλ/K . i i We will consider the collection of random variables Xi indexed by i ∈ [n]\H defined as follows (so r = n − |H|). Fix j ∈ [z]. Define Xi = 1h(i)=j · x2i . It then follows that K < 2 · kx[1/2 ] k22 and σ2 = X x4i (1/z − 1/z 2 ) ≤ i∈H / X 2 2 · kx[1/2 ] k22 · x2i = · kx[1/2 ] k42 z z i∈H / It then follows by Bernstein’s inequality and a union bound over all j ∈ [z] that X x2i > C2 lg(1/δ)kx[1/2 ] k22 ) < δ/3. P(∃j ∈ [z], h (3) i∈H / h(i)=j Now, the hash function h divides the input stream into z separate substreams, with x(j) denoting the vector updated by the substream containing i with h(i) = j (i.e. (x(j))i = 1h(i)=j · xi ). Conditioned on the events of (2), (3) occurring, we have that any i ∈ H satisfies x2i ≥ 2 kx[1/2 ] k22 ≥ 1/(C lg(1/δ)) · kx(h(i))[C lg(1/δ)] k22 . Thus if we also condition on every Pj succeeding, which happens with probability at least 1 − zδ 0 = 1 − δ/3 by a union bound, then our output L is correct. Thus our overall failure probability is at most δ.  27 B Partition heavy hitters and the b-tree We first define a generalization of the heavy hitters problem that we call partition heavy hitters. The standard heavy hitters problem is simply the special case when P = {{1}, . . . , {n}}, and the oracle O is the identity map. Definition 2. In the `2 partition heavy hitters problem there is some error parameter  ∈ (0, 1/2). There is also some partition P = {S1 , . . . , SN } of [n], and it is presented in the form of an oracle O : [n] → [N ] such that for any i ∈ [n], O(i) gives the index j ∈ [N ] such that i ∈ Sj . Define a vector y ∈ RN such that for each j ∈ [N ], sX yj = x2i . i∈Sj The goal then is to solve the `2 -heavy hitters problem on y subject to streaming updates to x. That is, x is being updated in a stream, and we should at the end output a list L ⊂ [N ], |L| = O(1/2 ), such that L contains all the -heavy hitters of y. A related problem is the `2 partition point query problem, in which queries takes as input some j ∈ [N ] and must output a value ỹj such that α1 yj − ky[1/2 ] k2 ≤ ỹj ≤ α2 yj + ky[1/2 ] k2 for some approximation parameters α1 , α2 , . We call such a solution an (α1 , α2 , )-partition point query algorithm. We now describe the b-tree, introduced in [CH08] (and also called the Hierarchical CountSketch there and in other parts of the literature) and analyze its performance for solving the partition heavy hitters problem. The b-tree was only suggested in [CH08] for the strict turnstile model, and a detailed analysis was not given. Here we give a fully detailed analysis showing that, in fact, that structure gives good guarantees even in the general turnstile model, and even for the partition heavy hitters problem. Before delving into the b-tree, we will analyze the performance of the PartitionCountSketch, a very slight modification of the CountSketch, for the partition point query problem. B.1 PartitionCountSketch In the idealized PartitionCountSketch one chooses independent hash functions h1 , . . . , hL : [N ] → [k] and σ1 , . . . , σL : [N ] → {−1, 1} from pairwise independent families, and β1 , . . . , βL : [n] → R independently from a Cα -wise independent family for some small constant α > 0. The marginal distribution of βt (i) for P any i ∈ [n] and t ∈ [L] is the standard gaussian N (0, 1), and Cα n is chosen so that for any z ∈ R , i zi βt (i) has Kolmogorov distance at most α from N (0, 1) (see Theorem 6). One also initializes counters Ca,b to 0 for all (a, b) ∈ [L] × [k], each consuming one machine word. The space is then clearly O(kL) machine words. The update algorithm for xi ← xi +∆ performs the change Ct,ht (O(i)) ← Ct,ht (O(i)) +∆·σt (O(i))· βt (i) for each t ∈ [L]. To answer an `2 point query to index i ∈ [N ], one outputs ỹi being the median value of |Ct,ht (i) | across t. In the actual, non-idealized version of PartitionCountSketch, the marginal distribution of each βt (i) is a discretized gaussian with precision fitting in a single machine word; see [KNW10, Section A.6] for details. We henceforth just discuss the idealized version. In fact, for the types of instances of partition heavy hitters that our heavy hitters algorithm needs to solve, the βt can be replaced with pairwise independent hash functions mapping to {−1, 1} (see 28 Remark 2), which would make an implementation less complicated. We instead have chosen to analyze the version with gaussians since doing so then does not require us to limit the types of partition heavy hitter instances we can handle, thus providing a more general guarantee that may prove useful as a subroutine in future works. Before analyzing PartitionCountSketch, we state a useful theorem from [KNW10]. Theorem 6. [KNW10] Let z ∈ Rn and 0 < α < 1 be arbitrary. There exists a constant Cα depending on α such that if β1 , . . . , βn are Cα -wise independent standard gaussians and g is standard gaussian, then X ∀A < B ∈ R, | P( βi zi ∈ [A, B]) − P(g ∈ [A, B])| < α. i In fact Cα can be taken as some value in O(1/α2 ) by combining the FT-mollification construction in [DKN10] with Lemma 2.2 and the argument in the proof of Theorem 2.1 in [KNW10]. Using the FT-mollification construction in [KNW10] would imply the weaker statement that Cα = Ω(lg6 (1/α)/α2 ) suffices. In our current setting either is acceptable since α is some fixed constant. The following lemma shows the correctness of PartitionCountSketch, following an argument similar to that of [CCFC04, Lemma 3]. Lemma 14. For L & lg(1/δ) and k & 1/2 , ∀j ∈ [N ], P(ỹj ∈ / [(1/20)yj − ky[1/2 ] k2 , 3yj + ky[1/2 ] k2 ]) < δ. (4) That is, the PartitionCountSketch with these parameters is an (α1 , α2 , )-partition point query structure with failure probability δ, for α1 = 1/20, α2 = 3. P Proof. For t ∈ [L], define wt ∈ RN with (wt )j = i∈Sj βt (i)xi . Then by Theorem 6, P((wt )j ∈ p [−α1 , α2 ]) ≤ P(yj g ∈ [−α1 , α1 ]) + α1 for g a standard gaussian. Since P(|g| ≤ ) ≤  2/π for any  > 0, p P(|(wt )j | > α1 yj ) ≥ 1 − α1 (1 + 2/π) > 8/9. (5) Also by pairwise independence of βt , E(wt )2j = yj2 , so P(|(wt )j | > α2 yj ) < 1/α22 = 1/9. (6) Next, let H ⊂ [N ] be the set of indices of top 1/(42 ) entries of y in magnitude. Note E | ht ,βt X 1 βt (i)xi | ≤ √ · ky[1/2 ] k2 k (j) ht (O(i))=ht O(i)∈H∪{j} / by pairwise independence of βt , ht . Thus X P (| ht ,βt βt (i)xi | > ky[1/2 ] k2 ) < 1/9 (7) ht (O(i))=ht (j) O(i)∈H∪{j} / by Markov’s inequality. Also Eht |h−1 t (ht (j)) ∩ (H\{j})| ≤ |H|/k < 1/9, so P(∃j 0 ∈ (H\{j}) : ht (j 0 ) = ht (j)) < 1/9 29 (8) by Markov’s inequality. Thus by a union bound, the conditions of (5), (6), (7), and (8) all happen simultaneously with probability at least 5/9. Now note when all these events occur, |Ct,ht (j) | ∈ [α1 yj − ky[1/2 ] k2 , α2 yj + ky[1/2 ] k2 ] (9) Thus by a chernoff bound, the probability that the median over t ∈ [L] of |Ct,ht (j) | does not satisfy (9) is exp(−Ω(l)) < δ.  Remark 2. It is possible to obtain the main result of this paper, i.e. our bounds for (non-partition) heavy hitters, without ever making use of Theorem 6. This might be useful for pedagogical reasons, since the proof of Theorem 6 is somewhat complicated. We sketch how to do so here. We chose to present the approach above since it divides our final algorithm into a more abstracted set of subproblems, which we felt made it easier to describe. Furthermore, the “partition heavy hitters” problem as formulated above seems quite clean and may find uses as a subroutine elsewhere. The main idea to avoid Theorem 6 is as follows. First, in our application of partition heavy hitters to solve the vanilla heavy hitters problem (see the proof of Theorem 2), we are only interested in the case where each partition Sj in P contains at most one -heavy hitter i ∈ [n] with respect to x. Furthermore, the other items in the same partition will, with good probability over the choice of the hash function hj used in the ExpanderSketch, have much smaller total `2 mass than |xi |. These observations can be used to show that, for applying partition heavy hitters to heavy hitters as in Theorem 2, the βt above can be replaced with pairwise independent hash functions mapping to {−1, 1}. This ensures that the “noise”, i.e. the non-heavy indices in the same partition as i, with say 8/9 probability do not subtract much away from |xi | so that |(wt )j | will be Ω(|xi |). Note that in the general partition heavy hitters problem the range of the βt cannot just be {−1, 1}. The reason is that we want (5), (6), (7), and (8) to hold simultaneously with some probability strictly larger than 1/2, to allow invoking Chernoff. However, (5) alone can fail with probability at least 1/2 even when using fully independent βt : [n] → {−1, 1}. For example, consider when a partition j ∈ [N ] contains exactly two elements with equal weight. Then with probability 1/2 their signs are opposite, in which case (wt )j equals zero. Note this is not an issue when Sj contains a single heavy hitter that is much heavier than the total `2 mass in the rest of the partition. The second issue is that PartitionCountSketch is again used in the b-tree (see Section B.2 below), which we use in our final heavy hitters algorithm. Unfortunately there, we do not have the guarantee that each partition contains one item much heavier than the combined mass of the rest. One way around this is to simply not use the b-tree at all, but to just use the PartitionCountSketch itself. Doing so, though, would make our final query time blow up to O(−2 lgC n) for a large constant C. This can be fixed, and one can achieve our same current query time, by instead implementing the data structures Pj in Section 5 as themselves recursive instantiations of the ExpanderSketch data structure! Then after a constant number of levels of recursion (even one level down), one then implements the Pj using the PartitionCountSketch (see Remark 1). All in all, [KNW10] is thus avoided. We do not delve further into the details since the bounds do not improve, and we feel that a fully detailed exposition is not worth the effort. We also record a lemma here which will be useful later. Lemma 15. Consider an instance of partition heavy hitters with partition P = {S1 , . . . , SN } and oracle O. Suppose A ⊂ [N ], and D is an (α1 , α2 , 0 )-partition point query structure for some 0 < α1 ≤ 1 ≤ α2 which succeeds on point querying every j ∈ A, where 0 = (α1 /3). Then if L ⊆ A 30 is defined to be the 2/002 indices of A with the largest point query results from D for 00 = 0 /α2 , then L contains all partition -heavy hitters contained in A. Proof. Let ỹj be the result of a point query of j ∈ A using D. If j ∈ A is a partition -heavy hitter then ỹj ≥ α1 ky[1/2 ] k2 − (α1 /3)ky[1/02 ] k2 ≥ (2/3)α1 ky[1/2 ] k2 . by Eq. (4). Meanwhile, if some j 0 is not even an 00 -partition heavy hitter, then ỹj 0 < α2 00 ky[1/02 ] k2 + 0 ky[1/02 ] k2 ≤ (2/3)α1 ky[1/02 ] k2 . Thus every set which is not even a partition 00 -heavy hitter has a point query value strictly less than every partition -heavy hitter in A. Since there are at most 2/002 sets which are partition 00 -heavy hitters, correctness follows, since L by definition contains the 2/002 sets with largest point query values.  B.2 b-tree Here we describe the b-tree for partition heavy hitters, which is a slight modification of the Hierarchical CountSketch from [CH08] for non-partition strict turnstile heavy hitters. We assume 2 ≤ b ≤ N is an integer power of 2. For what follows, we assume vector entries in both x ∈ Rn and y ∈ RN are 0-based indexed, e.g. x = (x0 , . . . , xn−1 )T and y = (y0 , . . . , yN −1 )T . Conceptually we create virtual streams J0 , . . . , Jlgb N . For the stream Jr we solve an instance of partition point query with br sets in the partition defined as follows. At the level r = lgb N , the partition is Plgb N = P = {S0 , . . . , SN −1 }, with oracle Olgb N = O. For 0 ≤ r < lgb N , the partitions are defined inductively: we imagine a complete b-ary tree on {0, . . . , N − 1} where the jth leaf node denotes Sj , and for r < lgb N each internal node represents a set equal to the union of the sets at its children. Said succinctly, for r < lgb N , the oracle evaluation Or (i) equals O(i)/blgb N −r . Note that since b = 2` is a power of 2, Or can be implemented in constant time by bitshifting right `(lgb N − r) positions (lgb N is a fixed value that can be computed once and stored during initialization). When an update (i, v) is seen in the actual stream, it is fed into a PartitionCountSketch Pr at level r for each 0 ≤ r ≤ lgb N , with partition Pr and oracle Or . Each Pr is chosen to be a (1/20, 3, /60)-partition point query structure, i.e. the error parameter is 0 = /60. Set Q = 2b(lgb N )/002 , which is an upper bound on the total number of point queries we make to all Pr combined. We set the failure probability for each Pr to be η = δ/Q = Θ(2 δ/(b lgb N )). To answer a heavy hitters query, we walk down the tree as follows (our goal is to have, at all times 0 ≤ r ≤ lgb N , a list Lr of size O(1/2 ) which contains all the -heavy hitter partitions at level r). First we set L0 = {0}. Then for r = 1 to lgb N , we point query every child of an element of Lr−1 . We then set Lr to be the nodes at level r whose point query result were amongst the 2/002 highest for 00 = 0 /3 = /180. We finally return L = Llgb N as our set of partition heavy hitters. Theorem 7. Suppose 1/N c ≤  < 1/2 and δ ∈ (0, 1/2). Then the b-tree as described above produces a correct output L for partition -heavy hitters with probability at least 1 − δ for any 2 ≤ b ≤ N . Furthermore, for any constant c0 ≥ 1 and any constant 0 < γ < γ0 where γ0 depends on c, c0 , 0 for any failure probability 1/N c ≤ δ < 1/2, there is a choice of b so that the b-tree uses space O(−2 lg N ), has update time O(lg N ), and query time O((−2 lg N )((lg N )/(δ))γ ). The constants in the big-Oh depend on 1/γ. 31 Proof. We have |L| ≤ 2/002 = O(1/2 ) by definition of the algorithm. Note that we make at most Q point queries since each Lr has size at most 2/002 , and each element of Lr has at most b children. Also, there are lgb N values of r for which we query children (since the leaves have no children). Thus the total number of queries is at most 2b(lgb N )/002 = Q. Now we show that, conditioned on the event that all Q point queries succeed, correctness holds by induction on r. This would complete the correctness analysis, since the probability that any point query fails at all is at most Qη = δ, by a union bound. For the induction, our inductive hypothesis is that Lr contains every -partition heavy hitter at level r. This is true for r = 0 since L0 = {0}, and the root of the tree contains only a single partition. Now, assume Lr−1 satisfies the inductive hypothesis. Since any ancestor of a partition -heavy hitter is itself an -partition heavy hitter, it follows that every partition heavy hitter at level r is the child of some set in Lr−1 . Thus if we let A be the collection of children of sets in Lr−1 , Lemma 15 implies that Lr also contains all the partition -heavy hitters As for space and time bounds, we choose b to be ((lg N )/(δ))γ , rounded up to the nearest integer power of 2. This is at most N for γ sufficiently small since , δ > 1/ poly(N ), and at least 2 for N larger than some constant depending on γ (which we can assume without loss of generality, by padding the partition with empty sets). By Lemma 14 and choice of b, the space is asymptotically 1 lg N 1 lg N · lg(1/η) ' 2 · · (lg(1/δ) + lg b + lg lg N + lg(1/)) ' −2 lg N. 2 lg b  lg b The update time is asymptotically lg N lg N lg(1/η) ' · (lg(1/δ) + lg b + lg lg N + lg(1/)) ' lg N. lg b lg b The query time is asymptotically b lg N lg N γ b lg N · lg(1/η) ' 2 · · (lg(1/δ) + lg b + lg lg N + lg(1/)) ' −2 lg N · ( ) . 2  lg b  lg b δ  Corollary 1. For any constant 0 < γ < 1/2, (non-partition) heavy hitters with error parameter  ∈ (0, 1/2) and failure probability 1/ poly(n) < δ < 1/2 can be solved with space O(−2 lg n), update time O(lg n), query time O(−2 lg n((lg n)/(δ))γ ), and failure probability δ. √ Proof. We can assume  > 1/ n without loss of generality, since otherwise the trivial solution of keeping x in memory explicitly suffices. Otherwise, the claim follows from Theorem 7 by considering the partition P = {{1}, . . . , {n}} with N = n and O(i) = i.  C Connection between heavy hitters and list-recoverable codes Our approach is somewhat related to list-recoverable codes, which were first used in group testing in [Che09, INR10] and in compressed sensing in [NPR12] (and also in subsequent compressing works, e.g. [GNP+ 13, GLPS14]). We say a code C ⊂ [q]m is (, `, L)-list recoverable if for any sequence of lists L1 , . . . , Lm ⊂ [q] with |Lj | ≤ ` for all j ∈ [m], there are at most L codewords in C whose jth symbol appears in at least a (1 − )-fraction of the lists Lj . A decoding algorithm is then given these m lists and must find these at most L codewords. To see the connection to our 32 current heavy hitters problem, it is known (via the probabilistic method) that such codes exist with |C| ≥ n, q = poly(lg n), m = O(lg n/ lg lg n), and `, L = O(lg n), where  can be made an arbitrarily small constant (see for example the first row of [HW15, Figure 1]). Suppose we had such a code C with encoding function enc : [n] → C. Then our heavy hitters algorithm could follow the scheme of Figure 2. That is, we would instantiate m b-trees P1 , . . . , Pm for partition heavy hitters with Oj (i) = enc(i)j . By picking constants appropriately in the parameter settings, one can ensure that whp at most an -fraction of the Pj fail. Thus, whp every heavy hitter appears in a (1 − )-fraction of the lists Lj , and we would then perform list-recovery decoding to find all the heavy hitters. The trouble with this approach is that there currently are no explicit codes achieving these parameter settings, let alone with linear time encoding and fast decoding. Indeed, this is the source of slight suboptimality in the `1 /`1 “for all” compressed sensing scheme of [GLPS14]. The key to our progress is to sidestep the lack of explicit optimal list-recoverable codes with linear-time encoding and fast decoding by realizing that list-recoverability is stronger than what we actually need. First of all, list-recovery says that for all choices of lists L1 , . . . , Lm , some condition holds. In our case the lists are random (symbols in it contain concatenations with random hash evaluations hj ), since our heavy hitters algorithm is allowed to be a randomized algorithm. Secondly, our decoding algorithm does not need to handle arbitrary lists, but rather lists in which each symbol has a distinct name (recall from Section 4 that the “name” of z(i)j is hj (i)). This is because, in our problem, with good probability any list Lj has the property that for each heavy hitter i with z(i)j ∈ Lj , z(i)j will be reported by a partition point query data structure to have much heavier weight than any other z ∈ Lj with the same name. Thus our post-processing step using Qj allows us to only have to perform decoding from lists with a certain structure which does not exist in the general list-recovery problem, namely that no two symbols in Lj agree on the first few (namely O(lg lg n)) bits. D A simpler query algorithm for strict turnstile `1 heavy hitters In this section, we describe our simpler algorithm for strict turnstile `1 heavy hitters. The high-level idea is the following: Recall the general turnstile algorithm from Section 5. There we end up having to find -spectral clusters. This subproblem arose because several data structures Pjk may err and thereby insert spurious edges into the graph G. Now in the strict turnstile case, we can roughly ensure that we can recognize when a Pjk errs. By simply deleting all edges returned by such a Pjk , the remaining graph G has each heavy hitter corresponding to a number of connected components that are completely disjoint from the subgraphs corresponding to other heavy hitters and noise from light elements. Furthermore, for each heavy hitter, one of these connected components has at least 90% of the corresponding codeword enc(i). We can thus replace the cluster finding algorithm by a simple connected components algorithm and thereby obtain a much simpler algorithm. This section gives all the details of the above. Our solution needs the more standard definition of heavy hitters: On a query, we must return a set L containing all indices i where xi ≥ kxk1 and no indices j such that xj < (/2)kxk1 . The first thing our solution in the strict turnstile case needs, is the fact that one can maintain kxk1 exactly in O(1) space and with O(1) update time. This follows trivially by maintaining a counter C that is initialized as 0, and upon every update (i, ∆), we update C ← C + ∆. Since we are in the strict turnstile model, we will always have C = kxk1 . The second thing is a variant of partition point queries that have been adapted to the `1 strict 33 turnstile case. Definition 3. In the `1 strict turnstile partition point query problem there is some error parameter  ∈ (0, 1/2). There is also some partition P = {S1 , . . . , SN } of [n], and it is presented in the form of an oracle O : [n] → [N ] such that for any i ∈ [n], O(i) gives the index j ∈ [N ] such that i ∈ Sj . Define a vector y ∈ RN such that for each j ∈ [N ], X yj = xi . i∈Sj On a query for index j ∈ [N ], we must output a value ỹj such that yj ≤ ỹj ≤ yj + ky[1/] k1 . Lemma 16. For any failure probability 1/ poly(n) < δ < 1/2, there is a solution to the strict turnstile partition point query problem with space O(−1 lg(1/δ)) words, update time O(lg(1/δ)) and query time O(lg(1/δ)). Furthermore, the solution guarantees that even when it errs, the returned estimate ỹj is at least yj . Proof. Simply implement the CountMin sketch of [CM05] on the vector y. Thus on an update (i, ∆), feed the update (O(i), ∆) to the CountMin sketch and on a query for yj , return the estimate for j in the CountMin sketch.  Using Lemma 16, we can also modify the b-tree from Section B.2 to obtain a no false negatives guarantee. More specifically, define a new version of heavy hitters called threshold heavy hitters with no false negatives. We say that an algorithm solves threshold `1 heavy hitters with no false negatives and failure probability δ, if it supports taking a query value φ > 0. If the query value φ is less than kx[1/] k1 , then the algorithm may return an arbitrary answer. If φ ≥ kx[1/] k1 , then with probability at least 1 − δ, it must return a set L that has size O(φ−1 kxk1 ) and contains all indices i with xi ≥ φ and no indices j with xj ≤ φ − (/2)kx[1/] k1 . With the remaining probability at most δ, it returns the empty set. Such algorithms can thus recognize when they err (indicated by an empty return set) on queries for sufficiently large φ. The following lemma essentially follows from the b-tree solution in Theorem 7 combined with Lemma 16: Lemma 17. Suppose 1/nc ≤ δ < 1/2 where c > 0. Let γ be any constant satisfying 0 < γ < γ0 for some fixed constant γ0 . Then there is a modification of the b-tree described in Section B.2 and a choice of b, which in the strict turnstile `1 setting solves threshold heavy hitters with no false negatives and failure probability at most δ. Furthermore, the b-tree uses space O(−1 lg n), has update time O(lg n), and query time O((−1 lg n)((lg n)/(δ))γ ). The constants in the big-Oh depend on 1/γ. Proof. Take the b-tree solution as described in Section B.2. Replace each PartitionCountSketch for Pr with the algorithm from Lemma 16 with approximation factor 0 = /2. This means that at each level of the b-tree, we can do a point query for the total mass of a subtree. By Lemma 16 these estimates are never underestimates, even when the algorithm errs. And when the algorithm does not err, the returned estimate is at most 0 ky[1/] k1 ≤ 0 kx[1/] k1 = (/2)kx[1/] k1 too high. We set the failure probability for each data structure from Lemma 16 to O(δ/(b lgb n)). On a query for all indices i with xi ≥ φ, we traverse the tree roughly as described in Section B.2. The main difference is that when choosing the set Lr after having point queried every child of nodes 34 in Lr−1 , we choose Lr to be all nodes where the point query returned an estimate of at least φ. In case |Lr | > 3−1 at any level, we abort and return L = ∅. Now observe that if no query to the children of nodes in Lr−1 err, then for φ ≥ kx[1/] k1 , there can be no more than 3−1 nodes for which the estimate is at least φ. This follows since if the point queries did not err, then the true mass of those subtrees must be at least φ − (/2)kx[1/] k1 ≥ (/2)kx[1/] k1 . There can be at most 3−1 such subtrees. Thus conditioned on not making an error in any point query on the first r − 1 levels of the b-tree, we will visit at most 3−1 nodes on level r. It follows that we only abort and return an empty list in case some query errs. And if no query errs, we will ask only O(−1 b lgb n) queries. Since we set the failure probability in each algorithm from Lemma 16 to O(δ/(b lgb n)), the lemma follows.  We only need one more ingredient in our solution, namely a property of edge-expander graphs. We have not been able to find a reference for this result, but suspect it is known. Lemma 18. If G = (V, E) is a d-regular δ-edge-expander, then for any constant 0 < µ < 1, if we remove any set of at most (δµ/2)|V | vertices in G and their incident edges, then there remains a connected component of size at least (1 − µ)|V |. Proof. Let S ⊆ V be any set of at most (δµ/2)|V | vertices in G. The number of edges with an endpoint in S is at most d|S| since G is d-regular. Let C1 , . . . , Cm ⊆ V be the connected components in GV \S , where GV \S is the graph obtained from G by removing the vertices S and all edges incident to S. Assume for contradiction that |Ci | < (1 − µ)|V | for all Ci . For each Ci , let Ci∗ denote the smaller of Ci and V \ Ci . It follows from |Ci | being less than (1 − µ)|V | that   µ |V | ∗ · |Ci | < |Ci | ≤ min , |Ci | . 1−µ 2 Since G is a δ-edge-expander and |Ci∗ | ≤ |V |/2, there are at least   µ ∗ δd|Ci | ≥ δ min 1, · d|Ci | ≥ δ min{1, µ}d|Ci | = δµd|Ci | 1−µ edges across the cut (Ci∗ , V \Ci∗ ) in G. This cut is just (Ci , V \Ci ). But Ci is a connected component in GV \S and thus all edges leaving P Ci in G must go to a node in S. Therefore, the number of edges incident to a node in S is at least i δµd|Ci | = δµd(|V | − |S|). But |S| ≤ (δµ/2)|V | and hence |V | − |S| ≥ (1 − δµ/2)|V | ≥ 1 − δµ/2 · |S|. δµ/2 We thus have at least 1 − δµ/2 · d|S| = 2(1 − δµ/2)d|S| > d|S| δµ/2 edges incident to S. But this contradicts that there are only d|S| edges incident to S. δµ  The following result due to Alon et al. [ASS08] shows that there exists efficient explicit edgeexpanders: Theorem 8 (Alon et al. [ASS08]). There exists a constant δ > 0, such that for any positive integer n, there exists a 12-regular δ-edge-expander G = (V, E) with n/2 ≤ |V | ≤ n. Furthermore, G is constructable in time O(poly(n)). We have set the stage for the description of our simpler `1 strict turnstile solution. Our new algorithm is described in the following: 35 Strict Turnstile Algorithm. If  = o(1/ lg n), we re-execute the reduction in Section A, modified to the `1 setting. More specifically, we hash to z = Θ(1/( lg(1/n))) subproblems. Each subproblem is solved with a threshold heavy hitters structure with  = O(1/ lg n) and failure probability 1/ poly(n). Thus on a query to report all heavy hitters, we use the fact that we know kxk1 exactly in order to query each threshold heavy hitters structure with φ = kxk1 . By an analysis similar to Section A, with probability at least 1 − 1/ poly(n), this will ensure φ ≥ ky[1/] k1 where y denotes the vector corresponding to any of these subproblem. If  is Ω(1/ lg n), we can also reduce to threshold heavy hitters with the same  and failure probability 1/ poly(n) simply by maintaining one structure and querying it with φ = kxk1 . Thus we have now reduced the problem to solving threshold heavy hitters with  = Ω(1/ lg n) in the `1 strict turnstile case, where we are guaranteed that the query value φ is at least kx[1/] k1 . We now focus on solving threshold heavy hitters with  = Ω(1/ lg n) and failure probability 1/ poly(n) for a query value φ ≥ kx[1/] k1 . Following Section 5, we construct the 12-regular δedge-expander from Theorem 8 with m = Θ(lg n/ lg lg n) vertices. Call it F . This takes poly lg n time. We store it in adjacency list representation, consuming O(lg n/ lg lg n) words of memory. We then pick hash functions h1 , . . . , hm : [n] → [poly(lg n)] independently from a pairwise independent family and instantiate data structures D1 , . . . , Dm . Each Di is the threshold heavy hitters with no false negatives from Lemma 17. The failure probability of each structure is 1/ poly(lg n) and the approximation factor is . On an update (i, ∆), we compute in O(lg n) time an encoding enc(i) of i into a string of length T = O(lg n) bits by an error-correcting code with constant rate that can correct an Ω(1)-fraction of errors (as in Section 5). We again partition enc(i) into m contiguous bitstrings each of length t = T /m = Θ(lg lg n). We let enc(i)j denote the jth bitstring. For each j = 1, . . . , m, we feed the update (hj (i) ◦ enc(i)j ◦ hΓ(j)1 ◦ · · · ◦ hΓ(j)12 , ∆) to Dj (similarly to Section 5). On a query with threshold φ > 0, we query each Dj with φ. Let Lj be the output of Dj . If Lj is non-empty, we go through all returned values and check if there are two with the same name (same hj (i)). If so, we overwrite Lj ← ∅ and say that Dj failed. Now in all remaining Lj , all names are unique. From these lists, we construct the same layered graph G as described in Section 4. Recall that we only add edges if both endpoints suggest it. Now the crucial observation which makes the `1 strict turnstile easier to solve, is that the Dj ’s guarantee no false negatives. Thus if some Dj did not err and did not fail, then no node in G corresponding to a name hj (i) returned by Dj , can be connected by an edge to a node hj 0 (i0 ) returned by a Dj 0 for any i0 6= i. To see this, notice that the actual index hj 0 (i) ◦ enc(i)j 0 ◦ hΓ(j 0 )1 ◦ · · · ◦ hΓ(j 0 )12 corresponding to hj 0 (i) must not be in Lj 0 for this to happen. But we are guaranteed no false negatives, so if Dj 0 returns anything, it must have hj 0 (i) ◦ enc(i)j 0 ◦ hΓ(j 0 )1 ◦ · · · ◦ hΓ(j 0 )12 in its output. To summarize, for every index i with xi > φ, all Dj that did not err and did not fail produce nodes corresponding to names hj (i), and these nodes are not connected to nodes of name hj 0 (i0 ) for an i0 6= i. Furthermore, for two Dj and Dj 0 that both did not err and fail, the edges between the returned nodes are in the graph G. But the hash function hj have collisions with probability 1/ poly(lg n) and the data structures Dj have failure probability 1/ poly(lg n). Thus with probability 1 − 1/ poly(n), there are at most a γ-fraction of the Dj that either fail or err. Here we can choose γ as an arbitrarily small constant by increasing the polylogs in 1/ poly(lg n) failure probability. By Lemma 18, we get that with probability 1 − 1/ poly(n), each index i with xi ≥ φ has a connected component in G of size at least 0.9m. We now finish off by computing all connected components in G. For each component of size at least 0.9m, we stitch together the pieces enc(i)j to obtain 90% of the codeword enc(i). We decode i in linear time in 36 its bit length, which is O(lg n) time. Finally, we verify all these returned indices by doing a point query against a separate CountMin structure with failure probability 1/ poly(n) and the same . This also costs O(lg n) time per index. Since we are guaranteed that each returned list Lj has size at most φ−1 kxk1 , the query time is O(φ−1 kxk1 lg n) for decoding codewords and for verifying the recovered indices (the norm of the vector represented by each Dj is precisely the same as the norm of x). Now φ is kxk1 , so the time spent is O(−1 lg n). For querying the structures Dj , Lemma 17 gives us a query time of O((−1 lg lg n)((lg lg n poly(lg n))/))γ ) per Dj . Since  = Ω(1/ lg n), we can choose γ sufficiently 0 small to obtain a query time of −1 lgγ n for any constant γ 0 > 0. Since we have m = O(lg n/ lg lg n), the total time for querying all Dj is O(−1 lg1+γ n) for any constant γ > 0. For the update time, observe that each Dj has update time O(lg lg n) and there are O(lg n/ lg lg n) such structures to be updated, for a total of O(lg n) time. Computing enc(i) also takes O(lg n) time. The space is optimal O(−1 lg n) words. Theorem 9. For any constant 0 < γ < 1/2, heavy hitters with error parameter  ∈ (0, 1/2) and failure probability 1/ poly(n) < δ < 1/2 can be solved in the strict `1 turnstile setting with optimal O(−1 lg n) space, update time O(lg n), query time O(−1 lg1+γ n), and failure probability δ. E Expected Time for Strict Turnstile `1 If we are satisfied with expected query time, then there is an even simpler and very practical algorithm for the strict turnstile `1 case. The algorithm is based on the b-tree, but with b = 2, i.e. a binary tree. As in Section D, we solve the more standard variant of heavy hitters in which we must return a set L containing all indices i where xi ≥ kxk1 and no indices j such that xj < (/2)kxk1 . For what follows, we assume vector entries in x ∈ Rn are 0-based indexed, e.g. x = (x0 , . . . , xn−1 )T . Conceptually we create virtual streams J0 , . . . , Jlg2 n . For the stream Jr we solve an instance of partition point query with 2r sets in the partition defined as follows. At the level r = lg2 n, the partition is Plg2 n = P = {S0 , . . . , Sn−1 }, with oracle Olg2 n = O. For 0 ≤ r < lg2 n, the partitions are defined inductively: we imagine a complete binary tree on {0, . . . , n − 1} where the jth leaf node denotes Sj , and for r < lg2 n each internal node represents a set equal to the union of the sets at its children. Said succinctly, for r < lg2 n, the oracle evaluation Or (i) equals O(i)/2lg2 n−r . Note that Or can be implemented in constant time by bitshifting right `(lg2 n − r) positions (lg2 n is a fixed value that can be computed once and stored during initialization). When an update (i, v) is seen in the actual stream, it is fed into a PartitionCountSketch Pr at level r for each 0 ≤ r ≤ lg2 n, with partition Pr and oracle Or . Each Pr is chosen to be the partition point query structure from Lemma 16 with error parameter 0 = /2 and failure probability δ = 1/4. This has each Pr using O(−1 ) words of space, supporting updates and queries in O(1) time. We also maintain one CountMin sketch on x with error parameter 0 = /2 and failure probability 1/ poly(n). The space is O(−1 lg n) and the update time is O(lg n). To answer a heavy hitters query, we walk down the tree as follows (our goal is to have, at all times 0 ≤ r ≤ lg2 n, a list Lr of size O(1/−1 ) which contains all the -heavy hitter partitions at level r). First we set L0 = {0}. Then for r = 1 to lg2 n, we point query every child of an element of Lr−1 . We then set Lr to be the nodes at level r whose point query result was at least kxk1 . Recall from Section D that in the strict turnstile `1 setting, we can maintain kxk1 exactly. Once 37 we have computed Llg2 n , we point query each element in the list against the CountMin sketch and filter out those indices where the returned value is less than kxk1 . The key insight is that the data structure from Lemma 16 never returns an underestimate. Thus the list Llg2 n will always contain all indices i with xi ≥ kxk1 . The only issue is that we may consider more candidate heavy hitters than really exist, which might increase the query time tq . We show that in fact tq remains small in expectation. Let the 2n − 1 nodes in the conceptual binary tree be called u1 , . . . , u2n−1 . During query, we traverse this tree starting at the root. While visiting a node u at level r, we query it in Pr and only recurse to its children if the subtree corresponding to u is declared to have mass at least kxk1 at level r. For j ∈ [2n − 1] let Yj be an indicator randomPvariable for whether Pr declares uj as having mass at least kxk1 . Note the runtime of a query is j Yj . Thus the expected runtime satisfies tq = E 2n−1 X Yj = j=1 X E Yj . j Now, what is E Yj ? Call a node uj which actually corresponds to a subtree of mass at least (/2)kxk1 heavy. Then for heavy uj , we use the simple upper bound E[Yj ] ≤ 1; there are at most 2−1 lg n such heavy j summed over the entire tree. Otherwise, if d is the distance to the lowest ancestor v of uj which is heavy, then for Yj to be 1, it must be that every point query to an ancestor of uj below v must fail. This happens with probability 1/4d−1 since the data structures are independent across the levels of the tree. However, if we fix d and ask how many nodes in the entire tree have shortest distance to a heavy ancestor equal to d, then that is at most (2−1 lg n) · 2d−1 . Therefore the expected query time tq for traversing the tree is: X j −1 E Yj ≤ ( lg n) · ∞  r X 2 r=0 4 = O(−1 lg n). Finally, we also have |Llg2 n | queries to a CountMin sketch with failure probability 1/ poly(n). These queries cost O(lg n) time each. Thus we need to bound O(lg n) · E |Llg2 n |. By an argument similar to the above, consider a leaf uj corresponding to an index j with xj ≤ (/2)kxk1 . Let d denote the distance from uj to its nearest heavy ancestor. For uj to be in Llg2 n , every point query on this path must fail. This happens with probability 1/4d−1 . Now how many leaves can have shortest distance to a heavy ancestor equal to d? Since we are only considering leaves, ancestors of distance d are at the exact same level for all leaves. But a level has at most 2−1 heavy nodes, and thus there are at most (2−1 ) · 2d−1 leaves with distance exactly d to their nearest heavy ancestor. By an argument similar to the above, we get that E |Llg2 n | = O(−1 ). We conclude: Theorem 10. For any constant 0 < γ < 1/2, heavy hitters with error parameter  ∈ (0, 1/2) and failure probability 1/ poly(n) < δ < 1/2 can be solved in the strict `1 turnstile setting with optimal O(−1 lg n) space, update time O(lg n), expected query time O(−1 lg n), and failure probability 1/ poly(n). 38
8cs.DS
Comparison-Based Choices arXiv:1705.05735v1 [cs.DS] 16 May 2017 Jon Kleinberg ∗ Sendhil Mullainathan † Johan Ugander ‡ Abstract A broad range of on-line behaviors are mediated by interfaces in which people make choices among sets of options. A rich and growing line of work in the behavioral sciences indicate that human choices follow not only from the utility of alternatives, but also from the choice set in which alternatives are presented. In this work we study comparison-based choice functions, a simple but surprisingly rich class of functions capable of exhibiting so-called choice-set effects. Motivated by the challenge of predicting complex choices, we study the query complexity of these functions in a variety of settings. We consider settings that allow for active queries or passive observation of a stream of queries, and give analyses both at the granularity of individuals or populations that might exhibit heterogeneous choice behavior. Our main result is that any comparison-based choice function in one dimension can be inferred as efficiently as a basic maximum or minimum choice function across many query contexts, suggesting that choice-set effects need not entail any fundamental algorithmic barriers to inference. We also introduce a class of choice functions we call distance-comparison-based functions, and briefly discuss the analysis of such functions. The framework we outline provides intriguing connections between human choice behavior and a range of questions in the theory of sorting. 1 Introduction Modern information systems across a broad range of domains wrestle with increasingly expansive and heterogeneous corpora of data describing human decisions — from online marketplaces such as Amazon and AirBnB recording diverse purchasing behavior to search engines and recommendation systems that process continuous clickstreams, where clicks reflect choices. Many of the decisions made in these on-line environments have a consistent structure: users are presented with a set of options — a list of recommended books, search results, flight options, or users to follow — and they select one or more items from the set. The ubiquity of this framework has led to an active line of research on the problem of learning ranking functions [1]. There are many formulations in the literature, but the essential core is to assume that a user has a ranking over alternatives that is hidden from us, and by observing their choices we would like to infer this ranking. This question can be asked at the level of individuals or at the level of populations containing heterogeneous but related rankings. Choice-set effects. A central assumption in the work on rankings is that individuals start from an underlying total order on the possible alternatives. Roughly speaking, consider an inventory Z = {z1 , z2 , . . . , zn } of possible choices, globally ordered so that a particular user prefers zi to zj for i < j. When the user is ∗ Department of Computer Science, Cornell University. Email: [email protected] Department of Economics, Harvard University. Email: [email protected] ‡ Department of Management Science & Engineering, Stanford University. Email: [email protected]. This work is supported in part by a Simons Investigator Award, an ARO MURI grant, a Google Research Grant, Facebook Faculty Research Grants, and a David Morgenthaler II Faculty Fellowship. † 1 presented with a set of choices S ⊆ Z, they select the item in S that is ranked first according to this global order. There are many variations on this basic pattern — there may be noise in the selection, or options may be unobserved — but the total ordering is a crucial part of the structure. A long line of work in behavioral science [25, 22, 15, 9, 28], however, indicates that people’s empirical choices tend to deviate in significant ways from this picture. A person’s choice will in fact typically depend not just on the total ordering on the full set of alternatives Z, which is often enormous and implicit, but also on the choice set S they are shown as part of the specific decision at hand. Notable examples of such choice-set effects include the compromise effect, similarity aversion, and the decoy effect (also known as asymmetric dominance), and have been observed in diverse contexts both offline and online; recent work in machine learning has highlighted the prevalence of choice-set effects [23, 4, 33, 19] and non-transitive comparisons [7, 8], particularly in online search, online ads, and online games. A canonical example of a choice-set effect is the so-called compromise effect [24]: faced with the choice between a mediocre option for $10, a good option for $15, and an excellent option for $20, people will tend to choose the good option for $15; but faced instead with a choice between the same good option for $15, the excellent option for $20, and an outstanding option for $25, people will be more likely to choose the excellent option for $20. In other words, there is a tendency to favor the option that compromises between the two extremes in the set that is presented. More generally, suppose that a set of products exhibit a trade-off between two factors — for example, price vs. quality, power vs. reliability, or aesthetics vs. fuel efficiency. There is a naturally defined onedimensional set of products that are on the Pareto frontier: they are the options for which no other product is more desirable in both factors. Consider four products A, B, C, and D that are arranged in this order along the one-dimensional frontier (A is the least powerful but most reliable, and D as the most powerful but least reliable). In a wide variety of settings, B will be empirically chosen more often when it is presented as one of the three choices S = {A, B, C} than when it is one of the three choices S 0 = {B, C, D} — in other words, when it is the compromise option rather than an extreme option. By the same reasoning, C will be chosen more often when it is presented as part of S 0 than as part of S. One can ask whether this is simply a representational issue, but in fact it is much deeper. The point is that in any model based on a total ordering on the alternatives Z, a user would prefer either B or C, and this would hold in any choice set S that contains both of them. But B and C are options in both the sets S = {A, B, C} and S 0 = {B, C, D}, and the aggregate distribution of choices in favor of B versus C changes across these two sets. This suggests that the relative ordering of B and C in fact is not well-defined in isolation, but must be evaluated in the context of the choice set (S or S 0 ). It matters what else is on offer. Comparison-based choice functions. In this paper, we consider a set of basic algorithmic questions that arise when we seek to infer models of user choice in the presence of comparison-based choice-set effects. We focus on a basic formulation in which these effects arise, and show how our framework makes it possible to derive asymptotic bounds on query complexity and sample complexity in performing these types of inference. We set up the problem as follows. (1) Embedding of alternatives. The full collection of alternatives is a set U = {u1 , . . . , un }, and there is an embedding of U into a space of attributes X via a function h : U → X. For most of our discussion we will take X to be the real line R1 , so that h(ui ) is a real number; thus most of the time we can think of the embedded points {h(u1 ), . . . , h(un )} as representing a one-dimensional trade-off continuum as in the discussion above. We will assume that the embedding h is not known to us. Indeed, while we sometimes might know the crucial one-dimensional attribute of an item, such as a price, the important attributes in many settings will not be explicitly presented to us: a user might have a mental ordering of clothing styles on a spectrum from “too dull” to “too ostentatious,” or restaurants on a spectrum from “too bland” to “too 2 exotic,” or book or movie recommendations on a spectrum from “too much what I’m already reading” to “too far from my interests.” (2) Choice functions. We focus on an individual who is presented with a subset S ⊆ U of a fixed size k and chooses one element from S. Throughout this discussion we will refer to subsets of U of size k as k-sets of U . We study k-sets, rather than subsets of arbitrary/varying size, both for conceptual clarity and also with the motivation that many of our motivating applications — online recommendations and search results — often present choices between a fixed number of options. An individual’s selections are represented using a choice function f : for each k-set S ⊆ U , we define f (S) ∈ S as the individual’s selection when presented with S. We say that f exhibits choice-set effects if the identity of the set S affects the relative choice between two elements: specifically, f exhibits choice-set effects if there exist k-sets S and T , and elements ui and uj , such that ui , uj ∈ S ∩ T , and f (S) = ui while f (T ) = uj . If such choices can occur then a choice between ui and uj depends on whether they are presented in the context of S or T ; one can view such a contextual effect as a violation of the independence of irrelevant alternatives (“IIA”) [21]. We define choice functions here as deterministic for a given individual. Later in this work we study populations composed of a mixture of different choice functions, and our results there can be interpreted equivalently as applying to the choices of an individual making probabilistic decisions corresponding to a randomization over different choice functions. We can contrast such probabilistic choices (those expressible as mixtures), with random utility models (RUMs) [3, 17]: they lack some of the flexibility of RUMs; but discrete choice models such as RUMs on the other hand typically entail other restrictions, including assuming the independence of irrelevant alternatives. Identifying the expressive limits of random mixtures of choice functions for modeling probabilistic choice is an intriguing open challenge. (3) Comparison-based functions. We focus here on comparison-based choice functions, which incorporate the ordinal structure inherent in preference learning, but which are still rich enough to exhibit choice-set effects. A choice function f on k-sets is comparison-based if the value f (S) can be computed purely using comparisons on the ordering of the numbers {h(ui ) : ui ∈ S}. It is not hard to see that for any comparisonbased choice function f on k-sets, there is a number ` between 1 and k so that for all k-sets S, the value f (S) is equal to the `th ranked element in S according to the embedding h(·). We can therefore characterize any comparison-based choice functions in one dimension as a position-selecting choice function for some position ` of k. Thus, comparison-based choice functions represent different versions of the compromise effects discussed earlier: faced with a set S of k options ranked along a one-dimensional spectrum, an individual would choose the `th ranked option. For example, when k = 3 and ` = 2, the individual always chooses the middle of three options, much like the sample instance with choices A, B, C, D discussed earlier. It is not hard to verify, using examples such as this one, that a comparison-based choice function exhibits choice-set effects if and only if 2 ≤ ` ≤ k − 1. Choice functions over k-sets as we define them here are very general mathematical functions, capable of encoding an arbitrary choice for every k-set. Comparison-based functions in one dimension, however, are a structured subset of choice functions that provide a useful abstraction of many decision contexts. We are not aware of any prior inference work on general comparison-based functions, which is surprising given the central role of binary comparison in the fundamental problem of sorting. We focus on comparisons in one dimension. Comparison functions in higher dimensions can have a significantly more complex structure; extending our results to higher dimensions is beyond the scope of the present work. A short-coming of comparison-based functions is that they lack the ability to grasp “similarity,” an impor3 tant aspect of choice-set effects such as similarity aversion and the decoy effect, and one that requires a notion of distance beyond ordinal comparison. As a step towards extending our framework to model such effects, we also study distance-comparison-based choice functions that model choices according to distance comparisons, possibly in high-dimensional latent spaces. The present work: Asymptotic complexity of inference. There are many questions that one can consider for models of comparison-based choice functions; here we study a basic family of problems that are inherent in any inference procedure, and which form an interesting connection to fundamental questions in sorting. The basic problem we study has the following structure: we observe a sequence of choices of the form (S, f (S)), and at the end of this sequence we must correctly report the value of f (S) for all (or almost all) k-sets S. The question is how few observations (S, f (S)) we need in order to achieve various measures of success. We ask this question for different models of how the observations are generated. We first consider active queries, in which we can choose S and receive the value of f (S); we investigate the potential for efficient inference both when a single individual is making choices with a fixed function f , and for population mixtures of different choice functions. As a second model we consider passive queries, a model whereby a stream of pairs (S, f (S)) is generated uniformly at random over possible k-sets S, without the control over S offered by the active query model. For active queries, a natural baseline for understanding the problem formulation is the problem of sorting, which precisely consists of the case k = 2 and ` = 1. A comparison-based sorting algorithm asks about a sequence of pairs S = {ui , uj }, and for each such pair it is told the identity of the preferred element. An efficient sorting algorithm given O(n log n) such queries can learn the sorted order of the elements, and thus can answer queries of the form f (S) for arbitrary pairs after learning the sorted order. We show that all comparison-based choice functions in one dimension exhibit the same O(n log n) active query complexity: for every ` and k, there is an algorithm that can ask about a sequence of O(n log n) k-sets S as queries, and from the values of f (S) it is then prepared to correctly report f (S) for all k-sets S. Roughly speaking, the algorithm works by first identifying a small set of elements that cannot be the answer to any query, and then it uses these elements as “anchors” on which to build sets that can simulate comparisons of pairs. Note that as the set size k grows, the O(n log n) queries form a smaller and smaller fraction of the set of all nk possible k-sets. We then consider active queries for population mixtures, in which different people use different comparisonbased choice functions on k-sets, and when we pose a query S, we get back the answer f (S) for an individual selected uniformly at random from the population. We show that for a fixed but unknown vector of probabilities for each choice function under some natural non-degeneracy conditions we can determine f (S) for each segment of the population after O(n log n) active queries. The algorithm here uses random sampling ideas combined with techniques for sorting using noisy comparators [10]. For passive queries, where an algorithm is presented with a stream of values (f (S), S) for randomly selected sets S, the question is how long we need to observe values from the stream before being able to compute f (S) for all (or almost all) k-sets S. We show that for comparison-based choice functions f that exhibit choice-set effects (with ` between 2 and k − 1), we can do this after observing o(nk ) values from the stream with high probability; for an arbitrary ε > 0 and δ > 0, we can, with probability at least 1 − δ, determine f (S) for at least a 1 − ε fraction of all k-sets S. Our analysis here builds on a sequence of combinatorial results on sorting in one round, culminating in an asymptotically tight analysis of that problem by Alon and Azar [5, 2]. Finally, we consider how our results for comparison-based functions apply to distance-comparison-based choice functions in which the geometry of the alternatives’ embedding plays a consequential role. A range 4 of earlier work have made use of the ambient space in different ways, including methods such as conjoint analysis [3, 12]. Here, we consider the effect of performing comparisons among the pairwise distances between alternatives. This consideration enables us to reason about elements that are either central or outliers in a comparison-based fashion, providing a plausible model for the choice-set effect commonly known as similarity aversion. This line of inquiry into metric embeddings also connects our results with recent research in the learning and crowdsourcing literature on learning stochastic triplet embeddings [30] and inferences using the crowd median algorithm [13]. 2 Active query complexity We will first focus on active query algorithms that may choose queries sequentially based on the results of previous queries, and our goal here is to develop algorithms that after performing a small number of queries can take an arbitrary k-set S ⊆ U from a universe of n alternatives and correctly output f (S). We have previously noted that every comparison-based choice function over a one-dimensional ordering takes the form of a position-selecting choice function choosing the `th alternative of k for some ordering; we will denote this function by qk,` . Our results in this section show that for any fixed k ≥ 2 and any fixed but unknown ` ∈ {1, ..., k}, we can in fact learn the output for any input using an efficient twophase algorithm that performs only O(n log n) queries. This algorithm determines ` (up to a reflection we discuss below) by the time it terminates, but we also give a simple algorithm that recovers ` (up to the same reflection) more directly in just O(1) queries (without learning the output for all inputs). Thus, we establish that learning the position ` of a comparison-based choice function does not require running a comprehensive recovery algorithm. For recovering the choice function, we note that the orientation of the embedding is inconsequential. This symmetry is clear when considering the simplest example of k = 2, where f is either a max selector q2,1 or a min selector q2,2 . In order to deduce f (S) for every S we needn’t know whether f is choosing the max or min, as we will simply learn an embedding aligned with our selector. More generally, we have no way or need to distinguish between qk,` over a given embedding and qk,k−`+1 over the same embedding reversed, as they result in the exact same choices. Recovering choice functions. The algorithm we propose consists of two phases. In the first phase, we use O(n) queries to identify a set of “ineligible” alternatives. In the second phase, we use those ineligible alternatives to “anchor” the choice set down to a binary comparison between two eligible alternatives, allowing us to determine the ordering of the eligible alternatives in O(n log n) queries using comparison-based sorting. Theorem 2.1. Given a choice function f over k-sets S in a universe of n alternatives, there is an algorithm that recovers f after O(n log n) queries, meaning that after this set of queries it can output f (S) for any S. We prove this theorem by describing the algorithm together with its analysis, divided into its two phases of operation. For the first phase, we identify the ineligible elements. In the second phase, we simulate pairwise comparisons. Proof. We begin the first phase by observing that for a position selector qk,` making comparison-based choices over k-sets S ⊆ U with |U | = n, there are k − 1 alternatives that will never be chosen. For maxselectors qk,k these are the k − 1 minimal alternatives, for min-selectors qk,1 these are the k − 1 maximal alternatives, and for general qk,` these are the ` − 1 maximal and k − ` minimal alternatives from the embedded order. 5 a c b f (S) = b d = ineligible alternatives S⇤ = { S 2= { k ` item(s) } ` a c b } 1 item(s) d Figure 1: For a given comparison-based choice function f over an unknown embedding, there are ineligible alternatives that will never be chosen, illustrated here for k = 4 and ` = 3. The elements are embedded in a 1-dimensional space, where the ` − 1 maximal and k − ` minimal elements can never be chosen. To find these elements, we run a simple discard algorithm. Commencing with k arbitrary initial alternatives in a choice set S1 , we query the choice function f and learn the choice f (S1 ). We then construct our next choice set by discarding the previous choice and selecting a new arbitrary alternative u ∈ U \ S1 to form S2 = (S1 \ f (S1 )) ∪ u. We query for f (S2 ), and repeat this discard procedure for n − k + 1 queries. After the last query we will have exhausted U and learned that S ∗ = Sn−k+1 \ f (Sn−k+1 ) are precisely the k − 1 alternatives in U that can never be selected by f . Having found the k − 1 ineligible alternatives S ∗ , we arbitrarily select k − 2 alternatives from S ∗ to form a set S −2 . See Figure 1 for an illustration of this procedure. In the second phase of the algorithm we use the set S −2 constructed above as padding for a choice set construction with two open positions: notice that for any two alternatives ui and uj , a query for f ({ui , uj }∪ S −2 ) will amount to binary comparison between ui and uj . If ` = 1 or ` = k, we know that this will be a max or a min selection, respectively. However, for intermediate values of ` we do not yet know whether such binary comparisons will be a max or a min selection, as it depends on what k − 2 elements from S ∗ were chosen to construct S −2 . There exists no basis for choosing S −2 from S ∗ in a non-arbitrary way, as we have no way of ever choosing any of the alternatives in S −2 . However, as noted earlier in the case of recovering choice functions for k = 2, we can simply assume that the comparator we have constructed is selecting the max of ui and uj , and then learn the order of the eligible alternatives from binary comparisons as oriented by that comparator. After O(n log n) padded comparison queries, we obtain a sorted order of the eligible alternatives. To conclude this second phase, we perform a single additional query to determine `, the position being selected, which is as yet unknown and unused. By querying for what we’ve come to suppose are the first k eligible elements, the chosen alternative will identify the `th position in the recovered embedding of the eligible alternatives. We again emphasize that we have no way of distinguishing between qk,` over a given embedding and qk,k−`+1 over the same embedding reversed, but the direction of the ordering is nonessential, as the choices are identical for all choice sets. Having learned the embedded order of the eligible alternatives in U as well as the position ` being selected, we can now discern the choice f (S) for any k-set S ⊆ U . As a further point, it is notable that no part of this algorithm depends on `, as it is only learned at the end of the final query, meaning that the entire algorithm is in fact indifferent to whether an individual is selecting minima, maxima, or intermediate positions. Lastly, we observe that the classic lower bound on sorting applies as a lower bound here as well, for fixed ` and k: there are (n − k + 1)!/2 possible permutations of how the eligible alternatives can be embedded (ignoring the k − 1 ineligible alternatives). Each query cements at most k − 1 relative orderings, at most 6 reducing the number of feasible orderings by a factor of k − 1. We thus require at least logk ((n − k)!/2) queries to learn a choice function, yielding a lower bound of Ω(n log n), as for sorting. Type classification. It can be valuable to learn how a choice function makes comparisons without necessarily learning the ordering implicated in the comparisons. Here we establish that we can learn `, up to the noted reflection equivalence, using O(k) queries without learning the order of the alternatives. Proposition 2.2. By querying for all k-set subsets of an arbitrary (k + 1)-set, we can determine `, up to reflection. Proof. The algorithm performs k + 1 queries for all the subsets of size k, where each of these subsets can be defined by what element is excluded. The k + 1 alternatives have an unknown internal ordering, and we let ui denote the ith alternative in order. From these queries, there can be only two possible elements selected as the output across the k different subsets: either the chosen alternative in the (` + 1)th ordered position (when the excluded element is one of u1 , . . . , u` ) or the chosen alternative in the `th ordered (when the excluded element is one of u`+1 , . . . , uk+1 ). Of these k + 1 k-sets, the (` + 1)th element will be chosen ` times, and the `th element will be chosen k − ` + 1 times. Thus, for any k, in order to determine the position ` of a position-selecting choice function, one can simply take an arbitrary set of k+1 elements and query for all subsets of k. Then ` (up to reflection) is the frequency of the less frequent of the two response elements. 3 Population mixtures The results in the previous section assumed that all queries were evaluated by the same deterministic choice function f , where f (S) was consistently selecting the `th ordered alternative from within each k-set S. In this section, we show that we can recover choice functions in a more general setting, where the position ` chosen by f is drawn from a distribution over possible positions. This setting covers two generalizations of our active query results. First, it describes situations where a single individual is being repeatedly queried, and may exhibit compromise effects for some queries, independently at random. Second, it describes situations where the queries are handled by a population of individuals that all base their choices on the same ordered embedding, but differ in what position within an ordering that their choice functions select for. We show that we can still recover choice functions in this setting using O(n log n) queries, almost surely. Recalling one of our motivating examples from the introduction, this is a plausible reality: faced with a choice of restaurants ranging from “too bland” to “too exotic,” some individuals will compromise, while some will optimize for one of the extremes. In online settings the choices being made often come from heterogeneous populations, and we wish to develop an algorithm that can still recover choices in these settings. We define a mixed choice function as a comparison-based choice function on k-sets S ⊂ U where the `th ordered element in S is selected independently at random with probability π` . A mixed choice function is then completely defined by an P ordering of U and a probability distribution (π1 , ..., πk ) over positionselecting choice functions with ki=1 πi = 1. To avoid degeneracies, we require that π` > 0, ∀`, and also require constant separation between the probabilities, |π` − π`0 | > γ, ∀`, `0 with ` 6= `0 , for some constant γ > 0. 7 In its most basic instance, a mixed choice function over 2-sets is simply a noisy binary comparator over an ordering, with (π1 , π2 ) = (p, 1 − p) for some probability p. In this case, results from the sorting literature contribute that as long as p is bounded away from 1/2, the order can be recovered in O(n log n) queries almost surely [10]. Our contribution in this section is to generalize this result to arbitrary mixtures of comparison-based choice functions. We begin by showing that for any  > 0, we can recover the mixture probabilities (π1 , ..., πk ) of a mixed choice function with probability at least 1− in a number of queries that is O(1) in n, the size of U . We then show that we can indeed recover any mixed choice function f using O(n log n) queries with probability at least 1 − . Recovering mixture probabilities. We begin by showing that we can recover the mixture probabilities using a modified version of the algorithm we presented for recovering ` in an active query framework. Theorem 3.1. Let f be a mixed comparison-based choice function over k-sets in a universe of n alternatives. Let π = (π1 , ..., πk ) be the mixture distribution of f , and let π` > 0, ∀`, and |π` − π`0 | > γ, ∀`, `0 with `0 6= `, for some constant γ > 0. For any  > 0 and δ ∈ (0, γ/2) there exists a constant C > 0 such that an algorithm using C queries can recover π, meaning that it outputs a probability vector p for which P r(max` |π̂` − π` | ≤ δ) ≥ 1 −  holds for either π̂ = (p1 , ..., pk ) or π̂ = (pk , ..., p1 ). Proof. Our strategy is to study a single (k + 1)-set S + closely, and by querying each k-set within S + sufficiently many times we can recover the mixture distribution with the required precision. We index the k + 1 k-sets within S + as S1 , ..., Sk+1 . We define the random variables u Xi,j ( 1 if query i of subset Sj returns u ∈ Sj = 0 otherwise, (1) u ] = π j for a vector of probabilities π j = (π j , ..., π j ) that is an unknown permutation of where E[Xi,j u 1 k (π1 , ..., πk ). We first show that for each subset we can recover the complete set of probabilities with the specified precision and correctly ordered by their relative frequency. In a second stage we will then align the permuted π j vectors and thereby recover π itself (or π’s reflection). P u For each Sj , we consider the estimates π̂uj = C1 C i=1 Xi,j , and we show that this is correct to within the requested error tolerance if we choose C large enough. Recalling that δ < γ/2, a two-sided Chernoff bound tells us that: ! ! C j 2 1 X u (δ ) u Xi,j − πuj ≥ δuj πuj ≤ 2 exp − Pr Cπuj , C 2 + δuj i=1 for which we can set δuj = δ/πuj and use πuj ≤ 1, ∀j, u to obtain    δ2 j j Pr |π̂u − πu | ≥ δ ≤ 2 exp − C . 2+δ 8 a b c d ⇡1 ⇡2 ⇡3 S1 S2 a b c a b d S3 a c d S4 b c d Figure 2: A graphical sketch of the population alignment algorithm in Theorem 2, shown for k = 3. Left: a 4-set contains four 3-sets, S1 , S2 , S3 , S4 . Right: by querying for each 3-set sufficiently often, we can identify the frequencies π1 , π2 , π3 with which each element occurs and then identify π1 and π3 by the fact that their frequencies corresponds to the same element in all but one of the 3-sets. Let us define the bad events Ej,u = {|π̂uj − πuj | ≥ δ}, when we failed to recover πuj (the probability of selecting u from subset Sj ) within the specified precision. By taking the Union Bound across the sets Sj  and their alternatives u, we can set C > 2+δ ) to obtain log( 2k(k+1) δ2   k+1 X k X  j j Pr π̂uj − πuj ≥ δ > 1 − . Pr max π̂u − πu ≤ δ ≥ 1 − u,j j=1 u=1 The remaining challenge is to determine what probability corresponds to what choice position, and we will show that recovering this correspondence is guaranteed if the bad events did not occur. We recover the correspondence using an alignment procedure: since δ < γ/2, inside each Sj we can order the elements from most frequently selected to least frequently selected. In this order the ith most frequent choice inside each vector π̂ j will correspond to the same underlying position selection for each Sj . The most frequently selected element from each Sj will have been selected by the `-selector with the largest π` in π, and so on, for each selection frequency. To discern what frequency corresponds to what `, we look across the subsets S1 , . . . , Sk+1 and identify the two probabilities π1 and πk by the fact that they will be the only two frequencies that have selected some element u only once at that frequency, and another element v the remaining k times at that frequency. In other words, the alternatives selected at those frequencies will have the structure {u, v, ...., v} for some u and v, and these must be the frequencies π1 and πk . See Figure S1 for an illustration in the case of k = 3. We arbitrarily assign the more frequent of these two frequencies to be π1 , recalling that we’re only looking to recover π up to reflection. The other frequency is assigned to be πk . Lastly, for each of these two end frequencies π1 and πk we take the “other” element v (that made up k − 1 of the k choices at that frequency), and find what frequency corresponds to when each v was selected exactly twice, identifying the probabilities π2 and πk−1 . Since π` > 0 for all `, we can continue this overlap procedure for all the frequencies, allowing us to identify the probability π` corresponding to each position `. This alignment procedure fails only if one of the earlier bad events failed, and so we can return any one of the π̂ j , which all had the necessary precision, and reorder it by our alignment procedure to produce our output p. A recovery algorithm for mixtures. We now show that in this setting where queries are handled by a mixed choice function—either representing a random individual or a random mixture of individuals—we can recover the choice function in O(n log n) queries with high probability, matching the asymptotic query complexity of the non-population case for any fixed error probability. We run our recovery algorithm against the mixture population, but for the purposes of recovering f (S) for every S we assume that ` is then known. 9 Theorem 3.2. Let f be a mixed comparison-based choice function over k-sets in a universe of n alternatives. Let π = (π1 , ..., πk ) be the unknown mixture distribution of f , and let π` > 0, ∀`, and |π` − π`0 | > γ, ∀`, `0 with ` 6= `0 , for some constant γ > 0. Let f1 , ..., fk be pure versions of f , where π` = 1 for f` , over the same ordered embedding. For any  > 0 there exists an algorithm using O(n log n) queries to f that with probability at least 1 −  can recover f` (S) for all `, all S. Our proof is constructive. The strategy for this algorithm is to first run our procedure from Theorem 2 for recovering π using a constant number of queries. We then focus on max-selectors, and run a modified discard algorithm (from Theorem 1) to identify the alternatives that are ineligible to the subpopulation of max-selectors. We use these ineligible alternatives for the max-selectors to create an anchored k-set that can furnish a noisy binary comparator. By employing results for sorting under noisy comparisons [10], we obtain the order over the alternatives that are eligible to a max-selector. If we only needed to recover fk (S) for every S, where fk is the max-selector, we would be done. In order to also learn the order of the maxineligible alternatives, we run a second sort using a query anchored with min-ineligible alternatives, thereby also recovering the order of the max-ineligible alternatives. Proof. We begin by running the algorithm from Theorem 2 with a sufficiently large number of queries C1 to obtain an estimate π̂ of π, such that Pr(max` |π̂` − π` | ≤ γ/2) > 1 − /5 where C1 is a constant in n for every  and γ. The usual caveats for reflection of the mixture vector apply, and we learn π for one of the orientations, arbitrarily chosen. We focus on our estimate of πk , the probability that a query is answered by a max-selector. We now initiate our standard discard algorithm, which we will use to find max-ineligible alternatives, starting with an arbitrary k-set S ⊂ U . In each discard step, we plan to identify the max element by posing enough queries to the population that the frequency with which we observe the maximum element is close enough to πk . Let Ei be the bad event that discard round i incorrectly identified the max element in the set (πk was not recovered with sufficient precision), and let D be the success event whereby no bad events occur and the discard algorithm terminates with the alternatives that are ineligible for the max-selectors. Using C2 queries in each round i of the discard algorithm we can bound Pr[Ei ] using two-sided Chernoff bounds, followed by the Union Bound across the n − 2 rounds of our discard algorithm to obtain: Pr[D] ≥ 1 − n−2 X i=1  Pr[Ei ] ≥ 1 − 2(n − 2) exp −  γ2 C2 . 8 + 2γ 0 0 Selecting C2 > 8+2γ log( 10  ) log(n) = C2 log(n), we obtain that Pr[D] > 1 − /5 with C2 n log n queries γ2 0 across all the rounds of this discard algorithm, where C2 is constant in n. Conditional on succeeding thus far, we can now create a padded k-set from the max-ineligible alternatives ∗ Smax that were never selected during our discard algorithm, forming a binary comparator for any u and v −2 for any (k − 2)-set S −2 ⊂ S ∗ . The max alternative will be selected from a k-set of the form {u, v} ∪ Smax max max with probability πk , and the second most maximal alternative will be selected with probability πk−1 . Our goal is to hand this comparator off to the Feige et al. comparison-based query algorithm [10], but we note that the Feige et al. algorithm requires a binary comparator that returns each element with probabilities {p, 1−p} for some p > 1/2. Our comparator, meanwhile, will “fail” with constant probability ∆ = 1 − πk − πk−1 , −2 will be selected that is not one of the elements u or v being in the sense that some alternative u∗ ∈ Smax subjected to the noisy binary comparison. If one of πk or πk−1 exceed 1/2 then we can apply the Feige et −2 as a choice of the less frequent of the two al. procedure as-is, as we can simply bundle any choice u∗ ∈ Smax 10 positions, producing the necessary binary comparator. If the selection probabilities πk and πk−1 are both less than 1/2, we can modify our comparator as follows. For each step s that the Feige et al. algorithm performs a query, we repeat the query until we first see one of k or k − 1. This means that the outcome space is not {k, k − 1, fail}, but just {k, k − 1}, one of which will have a fixed probability p > 1/2. Let Cs be a random variable that takes a value equal to the number of queries needed before first seeing k or k − 1. Seeing as Cs is geometrically distributed, we have E[Cs ] = 1/∆, the inverse of the failure probability. But now the total number of queries being run P log n throughout the Feige et al. algorithm is Dn Cs , for a constant D large enough to control the Feige s=1 P log n et al. error to at most /5, and so in expectation it takes E[ Dn Cs ] = (1/∆)Dn log n queries. By s=1 Markov’s inequality the probability that the number of queries exceeds its expectation by a multiplicative P log n 5D factor of 5/ is Pr( Dn C ≥ n log n) ≤ /5. s s=1 ∆ This modification of Feige et al. will then still only take C3 n log n queries, for C3 = 5D/(∆), to succeed in sorting the max-eligible alternatives, with two possible bad events: the failure of the Feige et al. algorithm, with probability at most /5, and the number of queries exceeding the query budget, with probability at most /5. This latter event is only a concern when both πk and πk−1 are less than 1/2. If we only needed to recover the choices of a max-selector, we would be done. In order to recover all queries for any positions `, however, we also need to know the order of the max-ineligible alternatives. To recover such choices, we switch our focus from the max-selector subpopulation to the min-selector subpopulation. ∗ that contains the k − 2 maximum As a final step we repeat the above procedure using an anchoring set Smin alternatives of the ordering we just recovered. We then run the Feige et al. procedure to order the alternatives ∗ . Here u in Uscrap = un−k−2 ∪ Smax n−k−2 is the last element of the order recovered above, included to orient ∗ was the set of max-ineligible alternatives the sort order with regard to the overall sorted order, and Smax that we are trying to order. Since |Uscrap | = k − 1, we can drive this error probability below 1 − /5 with a large constant C4 that does not depend on n, thereby also recovering the order over the max-ineligible alternatives. We have outlined five separate bad events that would make the algorithm fail. By taking the Union Bound over the five bad event probabilities, each controlled to have an error ≤ /5, the overall algorithm performs four sets of queries (where there are two bad events associated with the third set of queries) and succeeds with probability at least 1 −  after C1 + C20 n log n + C3 n log n + C4 queries, asymptotically O(n log n) as specified. 4 Passive query complexity We now shift our attention to passive query algorithms, algorithms that pose all their queries at once without the sequential benefit of previous responses. This framework is motivated by a common scenario in the study of large datasets of recorded choices from online marketplaces, ranking algorithms, and recommendation systems. These systems are teeming with choices being made over sets of alternatives, but often one cannot adaptively guide the queries towards our goal of recovering choice functions. What if we simply had a large corpus of choices by an individual over random subsets? Could we still recover the choice function? If so, how few queries would we need? In this section we analyze a model for this process, in which we are not able to select queries but instead have to watch them passively. We focus on the output of a single f ; handling population mixtures in a passive query model is an interesting open question. 11 Model of passive choice streams. We analyze the following process for generating and analyzing a stream of random queries that arrive over time. For each possible k-set S, we define a Poisson process of rate α: we draw a length of time t from an exponentially distributed random variable of rate α (with density αe−αx ), and after this time t elapses, we put the set S into the stream. We iterate this, repeatedly drawing a random length of time t and putting S into the stream when t is reached. We run the process for each k-set S simultaneously, creating a merged stream of k-sets as they are selected and put into the stream. Now, suppose we observe the merged stream over the interval [0, T ]. For any fixed k-set S, the probability that it appears in the interval is 1 − e−αT , a quantity that we’ll refer to as pT . An algorithm is provided with the value f (S) for each k-set that appears in the stream during [0, T ]. After seeing these values it must correctly report the value of f (S) for almost every k-set. We want an algorithm that can achieve this goal while keeping T as small as possible. Our streaming model is arguably the simplest plausible model for generating collections of (choice set, choice) decisions that are independently drawn with replacement. Other seemingly simple models that query for a random set of k-sets without replacement exhibit an implausible slight dependence between decisions in the decision collection. A recovery algorithm for passive streams. Our main result for this streaming model of passive queries is that for 2 ≤ ` ≤ k − 1 there is an algorithm able to provide the desired performance guarantee for a choice of T with pT → 0, which is to say that the probability of seeing any fixed k-set S even once goes to zero. Equivalently, this result implies that we can recover f (S) for almost every k-set after only seeing a tiny fraction of all possible k-sets. Theorem 4.1. Let f be a choice function over k-sets in a universe of n alternatives that selects the `th ordered position, with k ≥ 3 and 2 ≤ ` ≤ k − 1 known. For every ε > 0 and δ > 0, there is a constant ξ > 0 and an algorithm that takes the stream over the interval [0, T ] with pT = ξ log n log log n/n and with probability at least 1 − δ will recover the correct value of f (S) for at least a 1 − ε fraction of all k-sets. Proof. The algorithm operates in two phases similarly to the algorithm for active queries, in that it first identifies the set S ∗ of k − 1 ineligible alternatives that cannot be selected in any query. Then it selects k − 2 of these arbitrarily to form a set S −2 and analyzes sets of the form {ui , uj } ∪ S −2 to decide the relative ordering of pairs (ui , uj ). The key difference from the case of active queries is that the algorithm needs to operate using only the k-sets that were handed to it initially at random, so it can’t steer the queries to seek out the set S ∗ , or run an adaptive sorting algorithm on arbitrary pairs (ui , uj ). Because the algorithm has two phases, we split the time interval [0, T ] into two intervals [0, T1 ] and (T1 , T1 + T2 ]. Note that for a given k-set S, the Union Bound implies that pT1 + pT2 is an upper bound on the probability seeing S during [0, T ], and hence pT1 + pT2 ≥ pT . Given a time interval [0, T ] for generating the stream, for a sufficiently large constant b to be specified below, we choose T so that pT ≥ b log n/n + b log n log log n/n. We split [0, T ] into [0, T1 ] and (T1 , T1 + T2 ] so that pT1 ≥ b log n/n and pT2 ≥ b log n log log n/n. Let D[a, b] denote the k-sets observed in the stream during the interval [a, b]. We will use D1 = D[0, T1 ] for the first phase, and D2 = D(T1 , T1 + T2 ] for the second phase. Note that the contents of D1 and D2 are independent of each other, an important facet of the streaming model. Phase 1: Finding ineligible elements. In the first phase, the algorithm will look at D1 and identify the set S ∗∗ of elements v ∈ U for which v is not the output f (S) for any S ∈ D1 . Clearly S ∗ ⊆ S ∗∗ , since no element of S ∗ can be the answer to any f (S). Now fix v 6∈ S ∗ ; what is the probability that it belongs to S ∗∗ ? 12 Every eligible alternative v will be the output f (S) for some S ∈ D1 as long as there’s a k-set in D1 containing exactly ` − 1 elements above v and exactly k − ` element below v. Note that since 2 ≤ ` ≤ k − 1, this means that there are a non-zero number  of elements above and below v in this case. Let’s call such a query a “revealing query” for v. Out of nk possible queries there are at least n−2 such revealing queries for v, since in the worst case there’s only one way to choose k − 2 alternatives above and n − 2 ways to choose one alternatives below, or vice versa. Each revealing query for v is chosen with probability p ≥ b log n/n. The probability that none of these n − 2 revealing queries is chosen is then (1 − p)n−2 ≤ (1 − b(log n)/n)n−2 ≤ (1 − b(log n)/n)n/2 ≤ e−(b/2) log n = n−b/2 . Now taking the Union Bound over all n−k eligible alternatives v says that the probability there exists a v for which no revealing query is chosen is bounded by n · n−b/2 ≤ n−(b/2)+1 . Let E1 denote the “bad event” that S ∗ 6= S ∗∗ , and let δ0 ≤ δ/4 be a constant. By choosing b large enough, we have Pr [E1 ] ≤ n−(b/2)+1 ≤ δ0 . Phase 2: Simulating pairwise comparisons. In phase 2 we now use k − 2 of the ineligible elements as anchors for performing pairwise comparisons. Recall that because we have split the stream over two disjoint time intervals, the algorithm’s behavior now is independent of its success or failure at finding S ∗ in phase 1, so in our analysis we’ll assume it has succeeded in finding S ∗ . For this phase, we use p to denote pT2 , where T2 was chosen such that p ≥ b log n log log n/n. To begin, we fix an arbitrary set S −2 of k − 2 elements from S ∗ , and let U 0 = U \ S −2 . Let G be the undirected graph on U 0 in which (ui , uj ) is an edge if and only if {ui , uj } ∪ S −2 is a k-set in D1 . Note that G is a uniform sample from the distribution Gn−k+2,p , the Erdős-Rényi random graph distribution. By a theorem of Alon and Azar [2], it follows that if we compare the pairs of elements (ui , uj ) defined by the edges of G, then with probability at least 1 − δ1 we will be able to infer the relative order of at least a 1 − γ fraction of pairs of elements of U 0 , where γ and δ1 depend on b. The remaining γ fraction of pairs are simply left with their choice uninferred. Let E2 denote the “bad event” that the Alon-Azar algorithm does not succeed, with Pr [E2 ] ≤ δ1 . We choose b large enough that γ ≤ ε/2k 2 and δ1 ≤ δ/4. Let H be a directed acyclic graph on U 0 in which ui points to uj if the Alon-Azar procedure has inferred that ui is ranked ahead of uj , and there is no edge between ui and uj otherwise. Now we use the following procedure to answer queries of the form f (S). If S 6⊆ U 0 then S contains an ineligible element and we answer arbitrarily. Otherwise, if S ⊆ U 0 , we look at all the pairwise comparisons of elements in S according to H. If these pairwise comparisons form a complete acyclic digraph then we choose the `th element in order; otherwise we answer arbitrarily. For how many k-sets do we get the correct answer? Let P denote the set of node pairs in U 0 × U 0 for which there is no edge in H. If E2 does not happen, then |P | ≤ γ n−k+2 . The number of k-sets that involve a pair 2 from P is thus at most X (ui ,uj )∈P        n−k n−k+2 n−k n ≤γ ≤ γk 2 . k−2 2 k−2 k Meanwhile, the number of k-sets that involve an element outside U 0 is at most  (k − 2)       n−1 k n n ≤ (k − 2) ≤γ , k−1 n k k provided that n is large enough relative to k that k(k − 2)/n ≤ γ. But if a k-set S satisfies S ⊆ U 0 , and S × S contains no pair of P , then all pairwise comparisons inside S have been determined and thus we can report the correct value   of f (S). Hence if E2 does not occur, we report the correct value on all but at most n n 2 γ(1 + k ) k ≤ ε k k-sets, as desired. 13 The full algorithm and its analysis. Now let’s consider the full algorithm. It starts by identifying a set S ∗∗ of ineligible elements in phase 1. If S ∗∗ does not have k − 1 elements, it terminates with no answer. Otherwise, it runs the second phase on the assumption that S ∗ = S ∗∗ . If the event E1 ∪ E2 does not occur, then S ∗ = S ∗∗ and the output of phase 2 satisfies the performance guarantee of Theorem 4.1. With probability at least 1 − (δ1 + δ2 ) ≥ 1 − δ/2, this union E1 ∪ E2 does not occur, in which case the full algorithm satisfies the performance guarantee. The above proof holds for all values of ` except for the two extremes of ` = 1 and ` = k, as stated. This distinction is intriguing since the two extreme values are the ones that don’t exhibit choice-set effects: the individual making decisions is then selecting elements according to a fixed total ordering of U . The challenge with ` = 1 and ` = k is actually that the notion of “ineligible” elements becomes more subtle: there are elements whose relative position in the embedding can be resolved, but only with a very large number of passive queries. Finding the right performance guarantee for this case is an interesting open question. 5 Distance comparison All of our results thus far focus on recovering choice functions that are comparison-based functions over ordered alternatives. As noted in the introduction, this class of functions is surprisingly rich, with the ability to capture compromise effects in choices along any one-dimensional frontier, a choice-set effect that cannot be exhibited by functions that merely maximize over an ordering. The preceding sections develop a theory of inference for such comparison-based functions. In this section we shift our focus to recovering choice functions defined by a different structural relationship, namely distance comparisons in a metric embedding. A choice function f on k-sets is distance-comparisonbased if the value f (S) can be computed purely using comparisons on the pairwise distances in a embedding h with metric d(·, ·), i.e. based on comparisons on the set of pairwise distances {d(h(ui ), h(uj )) : ui , uj ∈ S}. Distance comparisons form the basis of an additional important family of choice scenarios, namely choice queries answered with the “most medial” or the “most distinctive” alternative in a set, and in particular they model an important choice-set effect called similarity aversion [28]: given a choice between two dissimilar alternatives A and B and one of two alternatives A0 and B 0 that are similar to A and B respectively, similarity aversion arises when f ({A, B, B 0 }) = A but f ({A, B, A0 }) = B. Essentially: given two similar alternatives and one dissimilar alternative, the dissimilar option is chosen. It is important to note that similarity aversion cannot be modeled by a choice function that is strictly comparison-based: such a function can only evaluate ordinal comparisons, and when considering two elements A and B embedded in one dimension, a comparison-based function cannot resolve whether a third element A0 positioned between A and B is closer to A or closer to B. The remainder of the section has the following format. First we show how similarity aversion can be modeled using distance-comparison-based choice functions. Next, we present two observations that suggest some of the difficulties that must be overcome to learn such functions, a seemingly more difficult inference context than comparison-based functions. We then connect our observations to a broader literature on learning metric embeddings, albeit without resolving our inference questions. 14 b a c Figure 3: A k-set S = {a, b, c} of k = 3 alternatives embedded in 2 dimensions. In this setting we can think of distance comparison as a comparison-based choice between three pairwise distances {d(a, b), d(b, c), d(a, c)}. When a distance-comparison-based choice function f selects the outlier a, this choice is effectively a comparison-based choice of the shortest distance, d(b, c). When f selects the median element b, this choice is effectively a comparison-based choice of the longest distance, d(a, c). Similarity aversion from distance comparisons. We now describe two choice functions of principle importance, and their capacity for being formulated as distance-comparison-based functions: the median choice function and the outlier choice function. We restrict our definitions to choices over k-sets where k is odd. The outlier choice function for triplets (k = 3) will serve as our model of similarity aversion. The median choice function selects the element of a k-set S in Rm with metric d(·, ·) that minimizes the sum of distances to all other elements. In m = 1 dimension this choice is the traditional median element, and it can be selected according to the following distance-comparison procedure: repeatedly find the pair of alternatives x, y ∈ S that are furthest apart and remove them from S. Since k is odd, after (k − 1)/2 rounds there will be a single remaining element; return that element as the choice. Thus we see that the median choice function can be formulated as both a comparison-based function—in the earlier sections, q(k−1)/2,k —or as a distance-comparison-based function. For m > 1 dimensions and sets of size k = 3 it is easy to verify that the above distance-comparison procedure will still return the element that minimizes the sum of distances. For m > 1 and k > 3, however, it is an open question whether a distance-comparison-based function can return the element that minimizes the sum of distances. Observe that this question amounts to solving a version of the Fermat-Weber problem [32] with a very restricted functional toolkit, and may be quite difficult. We are not aware of any prior work on the capabilities of distance-comparison-based functions. Here we are principally interested in the special case of k = 3, allowing us to skirt this difficulty. Building on the median choice function, the outlier choice function selects the element of a k-set S that is farthest (in Rm using d(·, ·)) from the median element (the median element being the element that minimizes the sum of distances to all elements). The outlier choice function can clearly be written as a distancecomparison-based function whenever the median choice function can. For k = 3 elements it is precisely a model of similarity aversion on triplets. As a general comment on the capabilities of distance-comparison-based functions, it is clear that they can make choices that ordinary comparison-based functions cannot, but it is important to highlight that the reverse is also true: the median choice function is the only position-selection function (in one dimension) that can be formulated as a distance-comparison-based function. A distance-comparison-based function cannot select a maximal or minimal element (or any off-center position), since it has no way of orienting a choice with regard to the direction of “more” (in any dimension). The sets of comparison-based functions and distance-comparison-based functions are therefore not neatly nested. Distance comparison for triplets. In the particular case of k = 3, where choices are made over triplets S = {u, v, w}, we can think of a choice for an alternative u ∈ S implicitly as a choice for the distance 15 d(v, w) between the two remaining alternatives in S. For a triplet {u, v, w}, the effective comparison-based query is over the set of distances {d(u, v), d(u, w), d(v, w)}, where a choice of a pairwise distance  maps to a choice of the complementary alternative. See Figure 3 for an illustration. There are N = n2 distances, and so it may seem as though it would be possible to learn the ordering in O(N log N ) queries in the active query framework, with similar results carried over for other query frameworks. Reality is more complicated. We now give two observations on the difficulties of carrying over comparison-based results to distance comparisons. The first observation asks: when are there enough queries to learn the relative ordering of all the distances? The second observation pertains to the restricted nature of the distance triplets that can be queried.  n First, notice that each query for a 3-set furnishes 2 inequalities between distances. There are 3 triplet  queries for n elements, which means that querying for every possible 3-set would produce 2 n3 inequalities.   Meanwhile there are n2 pairwise distances, meaning that there are n2 ! possible permutations of the distances, only one of which is the sorted order. A sufficient condition for inferring all choices is to know the sorted order of all the distances. Focusing on the outlier choice function (selecting the minimum distance that effectively returns the outlier element) in onedoes not need to know the relative order of the two largest distances. This tells us that it would take log2 ( n2 !) − 1 bisections of the set of permutations to identify the sorted order of all but the two largest distances.   We observe that 2 n3 < log2 ( n2 !) − 1 for n ≤ 5, which tells us that for n ≤ 5 elements we will learn the choice for every query before we can possibly know the sorted order of the relevant pairwise distances. This tells us that a generic procedure that seeks to learn all the pairwise distances will not always succeed. While our earlier query complexity results focus on asymptotic complexity, the correctness of these algorithms holds for all n. The limiting observation presented here is specific to distance comparisons  and does n not apply to ordinary comparisons: in that context there are only n! permutations rather than 2 !. Second, observe that we cannot query for general triplets of distances {d(u, v), d(w, x), d(y, z)}, but are in fact restricted to queries in the special case of w = u, y = x, and z = v. It is unclear for what n it is possible to learn the relative ordering of all the distances from such restricted distance comparisons. While both of these initial observations are discouraging, an efficient inference algorithm for distance-comparisonbased functions would contribute a useful tool for learning in the presence of similarity aversion and other choice-set effects, and we deem it important to present distance-comparison-based functions as significant objects of study. As an additional open direction for future work, we briefly mention the choice-set effect known as the decoy effect (or asymmetric dominance). The decoy effect describes when the presence of a similar but inferior alternative increases the desirability of an option. The difference between similarity aversion and the decoy effect is that the former hinges on similarity while the latter incorporates both similarity and inferiority. As such, modeling the decoy effect requires a composition of both comparison and distance-comparison. We leave the study of this alluring general class of choice functions, which contains comparison-based and distance-comparison-based choice functions as special cases, as future work. Relationship to metric embeddings. Beyond providing a model for similarity avoidance in the behavioral sciences, the ability to recover distance-comparison-based choice functions also speaks to a broad literature on learning metric embeddings of data from distance-comparison-based queries [20]. In that literature, the stochastic triplet embedding technique [30] has recently been introduced as a way to embed a generic dataset of elements through answers to choices of the form “Is A more similar to B or to C?”. This question is effectively a comparison-based query requesting a choice from the set {d(A, B), d(A, C)}. As an extension of that work, the crowd median algorithm [13] tries to learn embeddings from triplet queries with the request 16 “Out of three shown items pick one that appears to be different from the two others.” The crowd median algorithm is employing precisely the outlier choice function for k = 3 described in this section. Known work on the crowd median algorithm, however, leaves open the question of what embeddings it can learn. We observe that outside the behavioral modeling that drove our work, a slight modification of the crowd median algorithm to align with our results gives a method that can in fact learn embeddings efficiently. We define the generalized crowd median algorithm, which instead asks questions of the form “of these k pairs, which pair is least similar?”. Under this more flexible query framework, the ordering on the distance could then be inferred by the algorithms developed in this work: for n elements, it would then be possible in an active query framework to learn the ordering of the N = n2 distances in O(N log N ) queries, for large n. Our treatment of distance-comparison-based queries also speaks to a broad line or research in psychology on pair selection queries used to infer cognitive embeddings [26, 14, 27]. In these settings, sets of k elements (where k is often large) are presented to subjects with the question “which two elements are most similar?”. Such queries generalize the crowd-median algorithm. Lastly, very recent work has developed learning results for binary clustering (a simple form of embedding) using so-called triangle queries of the form “which of these birds belong to the same species?” [31], with possible relevance to learning from distancecomparison-based choices. 6 Discussion The prevalence of choice-set effects in human decision-making highlights a need for a principled inference model that can support learning such effects. In this work we’ve proposed a framework aimed at helping with such an integration, focussing on comparison-based choices. A natural line of inquiry extending from choice-set effects quickly leads to rich issues related to the theory of sorting, including passive sorting (“sorting in one round”) and sorting with noisy information. There are clearly many directions for further work. We begin by mentioning a very concrete problem: while we studied passive queries and population mixtures, we did not attempt to combine these two aspects to infer a mixed collection of choice functions from a stream of passively observed queries. A challenge in trying to achieve such a combination can be seen in the technical ingredients that would need to be brought together; the mechanics of the Feige et al. procedure [10] and Alon-Azar procedure [2] are not obviously compatible. Even the basic question of binary sorting with passive queries in the presence of noisy information appears to be fairly open. Many questions remain regarding how to capture relevant population-level heterogeneities in large-scale choice corpora. Our framework for comparisons generally assumed a universally agreed upon ordered embedding, and it is very reasonable to suggest generalizations to a dispersed distribution over possible embeddings. A long line of work has brought distributions over rankings into the literature on learning preferences [18, 11, 6], including through comparisons [16], and it would be natural to explore analogous distributional modeling for the embedding that underlies comparison-based choice functions. Analyzing mixtures of comparison-based choice functions as a model of probabilistic discrete choice [3] is another closely related open research direction. One can also consider generalizing the embedding that defines the structure of the alternatives and the choice sets. For example, we could think about the alternatives as being embedded not just in one dimension (or a one-dimensional Pareto frontier) but in multiple dimensions, and an individual could execute a sequence of comparison-based rules to select an item from a choice set. Such a generalization could provide a way to 17 incorporate a number of other well-documented choice-set effects [28], and could form intriguing potential connections to the elimination by aspects [29] model of discrete choice. We find it encouraging that in the face of choice behavior much more complex than ordered preferences, we are able to fully match most of the known query complexity results from the theory of sorting from binary comparisons. Continued work to develop a more complete theory of inference for other increasingly rich classes of choice functions has the potential to lay a foundation for a much needed unified theory for learning choice-set effects. References [1] Shivani Agarwal, Corinna Cortes, and Ralf Herbrich. Learning to Rank (NIPS workshop). MIT Press, 2005. [2] Noga Alon and Yossi Azar. Sorting, approximate sorting, and searching in rounds. SIAM J Discrete Math, 1(3):269–280, 1988. [3] George Baltas and Peter Doyle. Random utility models in marketing research: a survey. J Bus Res, 51(2):115–125, 2001. [4] Austin Benson, Ravi Kumar, and Andrew Tomkins. On the relevance of irrelevant alternatives. In WWW, pages 963–973, 2016. [5] Béla Bollobás and Moshe Rosenfeld. Sorting in one round. Israel Journal of Mathematics, 38(12):154–160, 1981. [6] Mark Braverman and Elchanan Mossel. arXiv:0910.1191, 2009. Sorting from noisy information. arXiv preprint [7] Shuo Chen and Thorsten Joachims. Modeling intransitivity in matchup and comparison data. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, pages 227– 236. ACM, 2016. [8] Shuo Chen and Thorsten Joachims. Predicting matchups and preferences in context. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 775–784. ACM, 2016. [9] Federico Echenique, Sangmok Lee, and Matthew Shum. The money pump as a measure of revealed preference violations. Journal of Political Economy, 119(6):1201–1223, 2011. [10] Uriel Feige, Prabhakar Raghavan, David Peleg, and Eli Upfal. Computing with noisy information. SIAM J. Computing, 23(5):1001–1018, 1994. [11] Michael A Fligner and Joseph S Verducci. Distance based ranking models. J Roy Statist Soc Ser B, pages 359–369, 1986. [12] Paul E. Green, Abba M. Krieger, and Yoram Wind. Thirty years of conjoint analysis: Reflections and prospects. Interface, 31, 2001. [13] Hannes Heikinheimo and Antti Ukkonen. The crowd-median algorithm. In HCOMP, 2013. 18 [14] Li-Jun Ji, Zhiyong Zhang, and Richard E Nisbett. Is it culture or is it language? examination of language effects in cross-cultural research on categorization. Journal of personality and social psychology, 87(1):57, 2004. [15] Emir Kamenica. Contextual inference in markets: On the informational content of product lines. American Economic Review, 98(5):2127–2149, 2008. [16] Tyler Lu and Craig Boutilier. Learning mallows models with pairwise preferences. In ICML, pages 145–152, 2011. [17] R Duncan Luce. The choice axiom after twenty years. 15(3):215–233, 1977. Journal of Mathematical Psychology, [18] Colin L Mallows. Non-null ranking models. i. Biometrika, pages 114–130, 1957. [19] Stephen Ragain and Johan Ugander. Pairwise choice markov chains. In NIPS, pages 3198–3206, 2016. [20] Matthew Schultz and Thorsten Joachims. Learning a distance metric from relative comparisons. NIPS, page 41, 2004. [21] Amartya Sen and Prasanta K Pattanaik. Necessary and sufficient conditions for rational choice under majority decision. Journal of Economic Theory, 1(2):178–202, 1969. [22] Eldar Shafir, Itamar Simonson, and Amos Tversky. Reason-based choice. Cognition, 49:11–36, 1993. [23] Or Sheffet, Nina Mishra, and Samuel Ieong. Predicting consumer behavior in commerce search. In ICML, 2012. [24] Itamar Simonson. Choice based on reasons: The case of attraction and compromise effects. Journal of Consumer Research, 16:158–174, 1989. [25] Itamar Simonson and Amos Tversky. Choice in context: Tradeoff contrast and extremeness aversion. Journal of Marketing Research, 29(3):281–295, 1992. [26] Sandra S Smiley and Ann L Brown. Conceptual preference for thematic or taxonomic relations: A nonmonotonic age trend from preschool to old age. Journal of Experimental Child Psychology, 28(2):249–257, 1979. [27] Thomas Talhelm, Jonathan Haidt, Shigehiro Oishi, Xuemin Zhang, Felicity F Miao, and Shimin Chen. Liberals think more analytically (more “weird”) than conservatives. Pers Soc Psychol Bull, 41(2):250– 267, 2015. [28] Jennifer S Trueblood, Scott D Brown, Andrew Heathcote, and Jerome R Busemeyer. Not just for consumers context effects are fundamental to decision making. Psychological science, 24(6):901– 908, 2013. [29] Amos Tversky. Elimination by aspects: A theory of choice. Psychological Review, 79(4):281–299, 1972. [30] Laurens Van Der Maaten and Kilian Weinberger. Stochastic triplet embedding. In MLSP, pages 1–6, 2012. [31] Ramya Korlakai Vinayak and Babak Hassibi. Crowdsourced clustering: Querying edges vs triangles. In NIPS, pages 1316–1324, 2016. [32] George O Wesolowsky. The Weber problem: History and perspectives. Computers & Operations Research, 1993. 19 [33] Dawei Yin, Bin Cao, Jian-Tao Sun, and Brian D. Davison. Estimating ad group performance in sponsored search. In WSDM, pages 143–152, 2014. 20
2cs.AI
Go game formal revealing by Ising model Matías Alvaradoa , Arturo Yeeb, and Carlos Villarreal c a Center of Research and Advanced Studies – IPN, Department of Computer Science, Av. Instituto Politécnico Nacional 2508, San Pedro Zacatenco, 07360, Ciudad de México. b Universidad Autónoma de Sinaloa, Facultad de Informática Culiacán, Sinaloa, México. c National Autonomous University of Mexico (UNAM), Institute of Physics, Circuito de la Investigación Científica, Ciudad Universitaria, 04510, Ciudad de México. Abstract Go gaming is a struggle for territory control between rival, black and white, stones on a board. We model the Go dynamics in a game by means of the Ising model whose interaction coefficients reflect essential rules and tactics employed in Go to build long-term strategies. At any step of the game, the energy functional of the model provides the control degree (strength) of a player over the board. A close fit between predictions of the model with actual games is obtained. Keywords: Ising model; Dichotomy Variables Phenomenon; Computer Go; Go game phenomenology. 1. Introduction Mathematical modeling and algorithmic setting of Go game is a meaningful problem in the state of the art of sciences. The complex interaction among elementary black and white stones over a squared board in Go gaming, looks-like similar to the modeling of complex interaction from simple elements in major nature [24, 25] and social phenomena [26, 30]. Formal analysis of Go game is core in advances in computer science likewise the analysis of Chess was during the 20th century [1]. We use the Ising model [24] classical tool for modeling dynamic changes in complex interaction to fundament the algorithm to quantify the cooperation strength among allied stones or tension against the adversary stones struggling in a Go game beat. At some moments during a Go match, a phase-transition-like process corresponds to strong preeminence of blacks over white or conversely. The ever intricate Go interaction and the measure of each gamer’ strength at any game step, as the major challenge for Go automation, it is fine model with the Ising Hamiltonian. 10/19/2017 2:14 PM 1.1 Go game Go is a 2 players, zero-sum and complete information game, black versus white stones that official goban board is a 19 x 19 grid [2]. By turn, each player places one black/white stone on an empty board cross-point position; black plays first then white and so on. White receives a compensation komi by playing the second turn [3]. Goal of a GO successful game is to get the most of the board territory by means of GO tactics of invasion, reduction, nets, ladders and connections. One stone’s liberty is a contiguous empty board cross-point in the vertical or horizontal direction. Stone allocation in an empty board neighborhood is an invasion, and if adversarial places one stone close to invasion it does a reduction. Same color stones do a net over adversarial stones by surrounding them, and do a ladder by surrounding and leaving a sole liberty, Atari, to adversarial stones. Connection of ally stones is by placing one same color stone between them. Same color stones joined in horizontal or vertical line form up one indivisible compound stone, hence single or compound stones are struggling for achieving territory control. A stone placed on board is captured by adversary reducing their liberties to zero then removed. Principal concepts for GO are being alive or dead. A stone is alive if cannot be captured and is dead if cannot avoid be captured. Placement of stone being directly captured is suicide that is not allowed. Go strategies follow sequences of tactics aimed for the most board area control. The game ends when both players pass turn. The score is computed based on both board territory occupied and the number of adversarial single stones captured. The winner has the largest territorial control and the largest number of captures, as the most usual criteria. The hardest task for Go gaming is to evaluate the control board area and the dominion status of a player at a given stage of the game, for humans or computer players. Fig. 1 shows the flow diagram for computer Go gaming, which disarming simplicity not avoids a complex combinatorial process to attain efficient strategies [11, 12]. 10/19/2017 2:14 PM Fig. 1 Go gaming flow diagram 1.2 Computer Go To overcome the above mentioned Go gaming complexity was a major challenge for human Go players, as well as by last two decades for computer Go scientists and developers [2], [13]. Categorical computer AlphaGo's triumph of 4/5 over Lee Sedol, one of the best world Go player, was a meaningful triumph of computational intelligence by 2016 [42]. Top preeminence of AlphaGo is the 60 - 0 simultaneous triumphs over the best human Go players by February 2017 [14], [15, 16]. A Go gaming state or Go state is a board configuration given by the combination of black-whiteempty board Go gaming positions. The Go state space cardinality is 319x19 ~ 10172. The game tree records the different game decisions the players can try during a game from the start to the end, so records the different paths between the got states. One path from start to end state registers the sequence of moves in a match. Go game tree cardinality is by 10a, a = 10172. As a result, the automation of successful Go tactics and strategies, translated in efficient paths to win a match, is hugely complex. In average, the branching factor for Go ranges 200 - 300 possible moves at each player’s turn, while 35 - 40 moves for Chess, which state space and game tree cardinality is 1050 and by 10123 [11]; respectively 1018 and 1054 for Checkers. Hard task in Go automation as for human Goers as well, is to estimate the potential to strength territory dominance for a given try, that implies classify the best sequence of states pick from the enormous number of Go states to decide next advantageous Go move [3, 17, 18]. Computer Go [10] uses heuristic-search [15, 16], machine learning [17] and pattern recognition techniques to identify eyes, ladders and nets [18], [19], [9]. Monte Carlo Tree Search (MCTS) was extensively used for simulation-based search algorithms [15, 20, 21] through the record of moves of previous games, and given a Go state, from thousands or millions simulations the best average is applied to ponder the next movement [15, 20], that is highly time consuming. The no apply of a-prioriknowledge to identify tactics or strategies is the major drawback of MCTS usage in computer Go [22, 23] [23]. In computer (cost) complexity to solve a problem [39], time refers to the number of execution steps an algorithm used to, and space refers to the memory amount used to. Go gaming complexity is EXPTIME-complete [40], and more precisely PSPACE-complete [41]. 10/19/2017 2:14 PM 1.3 Recognition challenge The recognition and discrimination of meaningful perceptual stimuli presupposes the active formation of stable perceptual elements to be recognized and discriminated. First, consider the spontaneous grouping of stones of the same color which occurs during visualization of a GO board. The stones are organized into distinct groups, clusters, or armies even though they may be sparsely scattered about or somewhat intermingled. Grouping is usually the result of proximity of stones of the same color or the predominance of stones of one color in an area, but can be affected by other characteristics of the total board situation. Closely related in grouping is segmentation, which is also discussed in Kohler. The area subtended by the board is divided into black and white territories, each of which maintains its own integrity in the visual field. These segments are a measure of the territory which is controlled by either side, hence are an important factor in the assessment of a GO board. Another example is the formation of "spheres of influence" about a stone or group of stones. Influence is not an inherent property of stones, but appears to be induced in them by our process of perception. Yet they are a crude measure of the potential of a stone or army of stones for controlling territory on the board. The spontaneous image formed by the visualization of a GO board appears to be a complicated assemblage of perceptual units and subunits. For example, the stones themselves have their own perceptual identity while at the same time they are parts of chains or groups of stones. This report will describe a simulation model for visual organization. It will use transformations which create information corresponding to the perceptual features discussed above, storing them in a computer internal representation. Our point is the use of the Ising model and Hamiltonian to precise characterize the intense interaction in Go gaming, as for interaction in electromagnetism and thermodynamic is made. In Section 2 the CFG (Common Fate Graph), the Ising model and the energy function to estimate the synergy strength of each set of ally stones in a Go state are introduced. In Section 3 experiments and the analytical comparison of results follow; Section 4 is for Discussion and Section 5 for Conclusions. Table 1. 2. Go gaming synergy In our proposal a Go state is represented by a CFG [6], being essential to stand back efficient automation. CFG represents a Go state by means of principal and secondary nodes, see Fig 2: each Go stone in the state is a CFG principal node labeled with the number of single stones that 10/19/2017 2:14 PM compose it, and each stone’s liberty is a CFG secondary node. Go state representation by CFG it neatly comprises the each stone’ size, the linked relationship with allies, with adversaries, and with liberties around each of the stones. Using CFG, Go sequence of moves, so the deployment of tactics and strategies during a Go game is easy logged, thus follow up the evolution of game interaction –depicted in a lattice graph–, formalized by the Ising energy function and the algorithms do quantify the force of atoms or molecules of black and white stones regarding to the relative position among allies and adversaries on board. Fig. 2 White stone in the left superior corner is 11 single stones, 6 liberties, 1 shared with the below white 5 single stones, and one black liberty shared with at right black 18 single stones. 2.1 Ising model and Hamiltonian Ising model describes magnetic properties of materials from the interactions of constituent atomic spins, as elementary magnetic moments which possess a dichotomy behavior that point randomly in the up or down directions; variables 𝑥𝑖 represent the ith-spin state and may acquire dichotomy value 1 or -1. Each spin interacts with neighboring spins or with external fields that tend to align them in the applied direction, and depending on the strength of interactions, whole system get phase transitions among emergent spin clusters domains, percolate through the whole system, or fill out complete regions of the material. The spins are arranged in a n-dimensional lattice, which energy interaction is described, restricted to n=2, by the Hamiltonian Eq. (1): 10/19/2017 2:14 PM 𝐻 = − ∑ 𝑤𝑖𝑗 𝑥𝑖 𝑥𝑗 − 𝜇 ∑ ℎ𝑖 𝑥𝑖 𝑖𝑗 (1) 𝑖 wij sets for interaction between spin 𝑖 and 𝑗, 𝜇 the magnitude of an external magnetic field, and ℎ𝑖 the magnetic field contribution at site 𝑖; for a homogeneous external field, ℎ𝑖 = 1. Phase transition by heat transfer it transforms a thermodynamic system from one state of matter to another, usually between solid, liquid and gaseous states of matter [24]: a liquid that become gas upon heating to the boiling point results in an abrupt change in volume. Hence, properties of the matter suddenly change as a result of the change of condition on temperature, pressure or others. Phase transitions are common in nature phenomena [25, 32, 36] in Biology, Physics or Chemistry, and is applied in cutting edge top technologies [31, 33, 38]. 2.2 The Go game energy function Our definition of energy function stands back algorithms to compute the power of stone patterns in a Go state, this way account board dominance. We use specific 2 dimensional Ising model for displaying phase transition in Go board. The energy function uses CFG representation of Go states to captures the interaction among allied stone, versus adversaries, as well as with respect to liberties involved in. Associated to Ising Hamiltonian in Eq. (1), the Go energy function should embrace parameters to deal with:  The numbers of atomic (single) stones in a molecular (compound) stone.  The number of eyes a stone is involving.  The tactic pattern the stone is making.  What’s the strength of ally stones that do synergy among it.  What’s the strength of adversary stones that adversarial fight. To get this goal, we propose the quantitative description of stone 𝑖 by means of the elements involved in Eq. (2): 𝑘 𝑖 𝑥𝑖 = 𝑐𝑖 (𝑛𝑖 + 𝑟𝑒𝑦𝑒 ). (2) 𝑛𝑖 sets the number of single stones, 𝑟𝑒𝑦𝑒 is the constant to represent the occurrence of an eye, 𝑟𝑒𝑦𝑒 > 1, or 𝑟𝑒𝑦𝑒 = 0 if no eye; 𝑘𝑖 sets the number of eyes in stone 𝑖, and 𝑐𝑖 is the stone color, 1 10/19/2017 2:14 PM 𝑘 𝑖 for white, and -1 for black. Hence, 𝑟𝑒𝑦𝑒 quantifies the impact of the number of eyes in 𝑖, and 𝑘𝑖 = 2 says that could never be captured. If no eye 𝑥𝑖 just indicates the 𝑖 size and color. In Hamiltonian of Ising model for Go parameter, 𝑤𝑖𝑗 sets the ratio of union or repulsion between each pair 𝑖, 𝑗 of single or compound stones, so 𝑤𝑖𝑗 encompasses tensions alongside paths joining stone 𝑖 to 𝑗, being affected by the presence and strength of adversary stones that may impede the 𝑖 − 𝑗 connection; or, as well as, by the presence of allied stones that result in mutual strengthen. Up to rules and tactics in Go gaming the feature interaction among stones is assessed by means of next Eq. (3): (𝑖𝑗) 𝑤𝑖𝑗 = ∑𝑠 𝑟𝑡 𝑥𝑠 (𝑖𝑗) 𝑥𝑠 (3) describes each stone s lying between 𝑖 and 𝑗, that makes a tactic pattern; 𝑟𝑡 sets a quantify of a-priori known power of the pattern 𝑡: eye (𝑟𝑒𝑦𝑒 ), net (𝑟𝑛𝑒𝑡 ), ladder (𝑟𝑙𝑎𝑑 ), invasion (𝑟𝑖𝑛𝑣 ), reduction (𝑟𝑟𝑒𝑑 ). Pattern parameters fit a total order > induced by a-priori knowledge of Go tactics power, by an averaging procedure from real matches between top level players –estimation open to analysis and precisions: we say that an eye tactic has top power, followed by a net, a ladder, an invasion and a reduction. Thus, 𝑟𝑒𝑦𝑒 > 𝑟𝑛𝑒𝑡 > 𝑟𝑙𝑎𝑑 > 𝑟𝑖𝑛𝑣 > 𝑟𝑟𝑒𝑑 > 𝑟𝑠𝑙 . Single liberty parameter value is 𝑟𝑠𝑙 = 1. In the Go game perspective, the first term of Hamiltonian in Eq. (1) accounts the interaction of collaboration among patterns of same color stones, or the fight against adversaries; for second term, the particular external field ℎ𝑖 adds the number of liberties the stone 𝑖 has. Henceforth, given any Go state, by definitions in equation (2) and (3) used in equation (1) we quantify the every stone’s power and, on the base of each of them, the interaction strength among ally and/or adversarial stones: what’s the contribution of each eye, ladder or net pattern; or by invasion, reduction or connection tactics. 2.3 Phase Transition On the other hand, the evolution leading to territory control as a result of phase-transition-like process, like parallel version of changes of matter by heat transmission in nature phenomena, is follow up. The heated stones sequentially placed as a Go move it eventually change the state board abruptly, similar to matter changes. This sequence of moves (states) yields to a Go phasetransition process that it brings sudden board area dominance. In Fig 3 the sequential placement of red-black-flag stones makes the override over white in this board area, alike sequential local phase transition. 10/19/2017 2:14 PM Fig. 3 Go phase-transition by placement of black stones. 3. Experiments We use Go games’ information in http://www.go4go.net/ to evaluate this proposal. Results of experiments show the worth using Ising Hamiltonian to compute the synergy strength of Go state patterns during games. Actually, close similar results to the ones in top official tournaments [5], including the AlphaGo games against human Go players, are obtained. The standard format of smart game files (SGF) containing the decision game trees of games [4] is CFG translated to quantify any Go state by the energy function. 3.1 Human Go games In experiments the energy function is applied to quantify the patterns’ strength in every Go state during a match. The strength of black and white stones patterns is valued to pinpoint what is better placed on board at each state in the sequence. After each move comparison between black versus white patterns’ strength by energy functions follows. In next figures blue line is for blacks and red line is for whites. 10/19/2017 2:14 PM Classical Go games in Fig 4 and Fig 5, well known games are the input to simulator. In 1961-0913,14, both 9p, Sugiuchi Masao, play black stones versus Fujisawa Hosai, the winner that plays white stones. In Fig 5, the game in 2003-04-23 , between Yi Se Tol played black stones and beat to white stones player Hong Chang Sik. 10/19/2017 2:14 PM In Fig 6 we illustrate the dynamic of the match played by Murakawa with black stones versus Cho Chikun with whites in the 39th Japanese Kisei. Since the start and during one hundred movements, according to the valuation of the energy function, almost equal strength of black and white stones happened. Fig. 6 During moves 100 – 170 the stones patterns’ strength values are separated, black strength favored, the separation becomes bigger during moves 171 – 230 and white strength favored. At the end, the strength of black stones is 667 and is 481 for white, as our energy function estimates. This match score reported from human organization is similar win for black as well. In Fig 7 graph shows the comparison of strength of Go patterns in match Lee Changho with black stones versus Ryu Suhang 3p with whites, in Korean League 2014. According to energy function calculus the strength of black stones is 424 and for the white player is -51, likewise result reported. The black-whites balanced dominance breaks by the placement of a single stone that leads to capture a lot of adversarial stones and mostly control the formerly shared area. 10/19/2017 2:14 PM In described experiments the final score using energy function is according to the report from each tournament’s organizers of top qualified Go players. We made dozens of similar experiments using the Ising model energy function to evaluate the interaction and stones patterns strength, from initial to final states in Go matches that is reported in http://www.go4go.net/. In 19 off 30 matches we got correct result, 8 off 30 we got minor error than 5%, and we got a bit noncorrect result error, in a range of 6% - 10%, close to the correct match score. Please, see related material in http://delta.cs.cinvestav.mx/~matias/Teoria_Juegos/Go/EnergyFunction. Fig. 7 A close fight happens in around 70 off 100 movements, so each stones pattern strength were similar there. At move-state 73 a phase transition occurs and strength for blacks becomes each late state greater than the strength for whites, until the game end. 10/19/2017 2:14 PM 3.2 AlphaGo versus humans players (a) Gu Li vs. AlphaGo 2017 (b) AlphaGo vs. Zhou Ruiyang 2017 (c) Chang Hao vs. AlphaGo 2017 (d) AlphaGo vs. Shin Jinseo 2017 (e) AlphaGo vs. Cho Hanseung 2017 Fig. 6 Top tournament of AlphaGo please see the official results at https://deepmind.com/research/alphago/match-archive/master/. Notorious feature of AlphaGo gaming is its ability to keep a kind of equilibrium during any game, that avoids the temptation to try an always increasing control of board. For AlphaGo is quite enough to keep the current advantage, so easily give up to certain board area influence being aware of its strength over the whole board and game. This feature, to some extent, it 10/19/2017 2:14 PM contrasts to the human Go players’ behavior trying to get the absolute prevail over adversary. Human Goers may usually play to get this absolute, and by this mind lost details of weak positions, that eventually lead for loosing points even the whole game. Obsession for ever increasing board control is not a weakness of AlphaGo as a remarkable quality. This mentioned AlphaGo feature requires a well-known knowledge of the game board configuration at any play done. 3.3 AlphaGo vs. Lee Sedol games Lee Sedol is one top Go player who won 18 Go world titles since he was 12 years. AlphaGo – Lee Sedol was a five-game match gamed by March 2016 in Seoul, Korea. Lee Sedol played blacks the odd games and whites the pair games. There, AlphaGo won the first, second, third and fifth game and Lee Sedol the fourth, so 4/5 games won AlphaGo, being the first time a computer defeat a top master so categorical. Figures 7 shows the graphs of each of the five games: G1, G2, G4 and G5, each score similar to the official result. In G3 there is a small difference between the official result and the obtained from simulation. (a) Lee Sedol vs. AlphaGo (G1) (b) AlphaGo vs. Lee Sedol (G2) (c) Lee Sedol vs. AlphaGo (G3) (d) Lee Sedol vs. AlphaGo (G4) 10/19/2017 2:14 PM (e) Lee Sedol vs. AlphaGo (G5) Fig. 7 Lee Sedol vs AlphaGo https://deepmind.com/research/alphago/match-archive/alphagogames-english/. 4. Discussion Analysis of Go gaming shows the relevance of tactical moves causally connected [35]. Go gaming records on long-term influence moves [15], so the right playing the early moves has strong effects to the late moves outcome options. Historically, Go matches in ancient cultures spend months and most of this time during the first 10 – 15 moves a game in average. Current competition long hours, but most of this time is spent in the first dozen of moves as well. Go gaming interaction processes among single black and white stones, simple elements –likewise occurring in nature and social major phenomenon– that evolves to complex stones shapes struggling to control most of Go board area. Ising model captures crucial features of interaction phenomena, and we show that quite models the evolution of a Go game as the stochastic process between dichotomy variables, spin black or white assigned to atomic and molecule Go stones; eventually Go gaming interaction displays a phase-transition-like process, when circumstance of balanced black-white dominance abruptly changes, and black stones strength dominance over a given board area overriding white, or conversely. 4.1 Phenomenology of Go game The closeness between our algorithmic simulation results and data from matches in top Go tournaments make relevant our claim: phenomenology of Go gaming is well comprehended by applying Ising model to analyze the evolution of complex patterns interaction during a game, particularly the phase transitions process occurring there. The alive and dead stones dynamic is a 10/19/2017 2:14 PM The major advance in Go automation it backs in a bio-inspired method trying to emulate the visual cortex of felines and eagles, characterized by an acute vision system. It results in the artificial deep neural network (DNN) [42] that embraces dozens of layers each with long number of neurons; the intense correlation and composition, like in the mentioned animals’ visual cortex process, makes DNN a skillfully tool for recognition in complex scenarios. AlphaGo DNN uses convolution integral functions for neurons activation [42]. Even the powerful computer AlphaGo empowerment, the phenomenology of Go gaming is not revealing yet. We claim that phenomenology of Go gaming is superior comprehended modeling Go interaction by means of Ising model. The likely stochastic process of pattern on Go board, constructed by Go tactics during a beat is precisely modeled by Ising Hamiltonian. Some of the interaction dynamic in Go gaming converges to phase transitions, likewise interaction phenomena in physics, chemistry and biology, all they being modeled by Ising model. The stronger interaction among same color stones the weaker interaction among adversarial ones. The energy function modeling each of these processes embraces the atomic or molecular stones each other influencing through time passing and temperature changes. Go gaming temperature corresponds to the player’s talent displayed during the game. We observe that the end behave of Ising Hamiltonian for Go not fits the usual thermodynamics behave. At the end of any game there is ever one winner, so, the global systems is out of the thermodynamics equilibrium. 4.2 Ising model in nature and social sciences Classical Ising model deal with interaction and transitions properties occurring in statistical physics [31], chemistry phenomena [24], and population biology [25]; recently, Ising model apply is clever in nuclear medicine imaging [31], neural networks [32] and kinetics of protein aggregation studies [34], and in complex pattern recognition on biological processes to classify molecular or tissues patterns, by managing huge databases in Bioinformatics [36-38]. In economy Ising model is applied to analyze non-equilibrium phase transitions [26] or macroeconomic modeling, where emergence of patterns resulting from the collective interaction of a multitude of elementary components or agents is observed [33]. In decision making approach a phase transition threshold, with spontaneous symmetry-breaking of prices, leads to spontaneous valuation in absence of earnings [26], similar to emergence of spontaneous magnetization in absence of a magnetic field. In game theory, the interaction of the spin-player and the state-action in the Ising model energy function is for payoff then apply the Nash equilibrium [27]; as well to 10/19/2017 2:14 PM analyze repeated games [28], or to modeling systems on next nearest neighbor interaction with phase transitions [29]. In Evolutionary Dynamics of cooperation in the Prisoner’s Dilemma game, results on a dipole-model-like, interpreting the start of a lattice of cooperation as a thermo dynamical phase transition [30]. 5. Conclusions Phenomenology of Go gaming as dichotomy variables interaction process is clarified by Ising model. Experimental computer simulations allow conclusions that black – white stones’ interaction during Go gaming is traced by means of the proposed Ising model energy function. Strength of any Go stones pattern is precisely calculated as a result of the relative positions among ally stones as well as with respect to adversaries that dynamically change during the match evolving. Evolution in Go gaming patterns eventually yields to phase-transition-like phenomena occurring when one stone placement strength territory control at some board area that overrides adversaries. During a Go match any stone at board is affected from the global board state, which effect may be seen as the external field in the Ising model. Acknowledgment: A. Yee special thanks to PROFAPI Programa de Fomento y Apoyo a Proyectos de Investigación, with number PROFAPI2015/ 304. All the authors thank to Dr. Ricardo Quintero Zazueta, the top senior Mexican Go player and researcher of the Education Mathematics Department in CINVESTAV. He suggested the two classical Go games we simulate and makes suggestions to subtle points in the paper. References [1] J. McCarthy, AI as sport, Science, 276 (1997) 1518-1519. [2] K. Chen, Z. Chen, Static analysis of life and death in the game of Go, Inf. Sci. Inf. Comput. Sci., 121 (1999) 113-134. [3] D.B. Benson, Life in the game of Go, Information Sciences, 10 (1976) 17-29. [4] Smart Game Format, in http://senseis.xmp.net/?SmartGameFormat. [5] Go4go, in http://www.go4go.net/go/. [6] T. Graepel, M. Goutrié, M. Krüger, R. Herbrich, Learning on Graphs in the Game of Go, in: G. Dorffner, H. Bischof, K. Hornik (Eds.) Artificial Neural Networks — ICANN 2001, Springer Berlin Heidelberg, 2001, pp. 347-352. [7] N. Yoshiaki, Strategic Concepts of Go, Ishi Press, Japan, 1972. [8] J. Kim, Learn to Play Go, Good Move Press, New York, 1994. 10/19/2017 2:14 PM [9] A. Yee, M. Alvarado, Well-Time pattern recognition in Go gaming automation, in: Mathematical Methods and Computational Techniques in Science and Engineering (MMCTSE), 2014, pp. 174-181. [10] B. Bouzy, T. Cazenave, Computer Go: an AI Oriented Survey, Artificial Intelligence, 132 (2001) 39-103. [11] L.V. Allis, Searching for Solutions in Games and Artificial Intelligence, in, University of Limburg, The Netherlands, 1994. [12] Elwyn R. Berlekamp, D. Wolfe, Mathematical Go: Chilling Gets the Last Point, A K Peters Ltd Massachusetts, 1997. [13] P. Drake, Y.-P. Chen, Coevolving partial strategies for the game of go, in: the International Conference on Genetic and Evolutionary Methods 2008, pp. 312-318. [14] M. Müller, Computer Go, Artificial Intelligence, 134 (2002) 145-179. [15] S. Gelly, L. Kocsis, M. Schoenauer, M. Sebag, D. Silver, C. Szepesvari, O. Teytaud, The Grand Challenge of Computer Go: Monte Carlo Tree Search and Extensions, Communication of the ACM 55, 3 (2012) 106-113. [16] D. Silver, R.S. Sutton, M. Müller, Temporal-difference search in computer Go, Mach. Learn., 87 (2012) 183-219. [17] N. Richards, D.E. Moriarty, R. Miikkulainen, Evolving Neural Networks to Play Go, Applied Intelligence, 8 (1998) 85-96. [18] E.D. Werf, H.J. Herik, J.H.M. Uiterwijk, Learning to Estimate Potential Territory in the Game of Go, in: H.J. Herik, Y. Björnsson, N. Netanyahu (Eds.) Computers and Games, Springer Berlin Heidelberg, Ramat-Gan, Israel, 2006, pp. 81-96. [19] E.H.J. Nijhuis, Learning Patterns in the Game of Go, in: Artificial Intelligence, Universiteit van Amsterdam, Amsterdam, 2006. [20] S. Gelly, D. Silver, Monte-Carlo tree search and rapid action value estimation in computer Go, Artificial Intelligence, 175 (2011) 1856-1875. [21] C.B. Browne, E. Powley, D. Whitehouse, S.M. Lucas, P.I. Cowling, P. Rohlfshagen, S. Tavener, D. Perez, S. Samothrakis, S. Colton, A Survey of Monte Carlo Tree Search Methods, Computational Intelligence and AI in Games, IEEE Transactions on 4(2012) 1-43. [22] G. Chaslot, S. Bakkes, I. Szita, P. Spronck, Monte-Carlo Tree Search: A New Framework for Game AI, in: Proc. Artif. Intell. Interact. Digital Entert. Conf, 2008, pp. 216-217. [23] J.B. Hoock, L. Chang-Shing, A. Rimmel, F. Teytaud, W. Mei-Hui, O. Teytaud, Intelligent Agents for the Game of Go, Computational Intelligence Magazine, IEEE, 5 (2010) 28-42. 10/19/2017 2:14 PM [24] E. Bonaccorsi, S. Merlino, M. Pasero, G. Macedonio, Microsommite: crystal chemistry, phase transitions, Ising model and Monte Carlo simulations, Phys. Chem. Miner., 28 (2001) 509522. [25] H. Matsuda, The Ising Model for Population Biology, Prog. Theor. Phys., 66 (1981) 10781080. [26] D. Sornette, Stock market speculation: Spontaneous symmetry breaking of economic valuation, Physica A: Statistical Mechanics and its Applications, 284 (2000) 355-375. [27] S. Galam, B. Walliser, Ising model versus normal form game, Physica A: Statistical Mechanics and its Applications, 389 (2010) 481-489. [28] Z. Hongzhi, Y. Zhongxing, Ising-type suppergames on planar lattices, in: Advanced Computational Intelligence (ICACI), 2013 Sixth International Conference on, 2013, pp. 233-237. [29] R. Jack, K.Y.M. Wong, Next nearest neighbour Ising models on random graphs, Journal of Statistical Mechanics: Theory and Experiment, 2012 (2012) P09007. [30] L.M. Floría, C. Gracia-Lázaro, J. Gómez-Gardeñes, Y. Moreno, Social network reciprocity as a phase transition in evolutionary cooperation, Physical Review E, 79 (2009) 026106. [31] J. Peter, R. Freyer, M.F. Smith, C. Scarfone, R.E. Coleman, R.J. Jaszczak, Nuclear medicine image segmentation using a connective network, in: Nuclear Science Symposium, Conference Record., IEEE, 1996, pp. 1782 -1786. [32] G. Tkacik, E. Schneidman, M.J.I. Berry, W. Bialek, Ising models for networks of real neurons, (2006). [33] M. Aoki, New Approaches to Macroeconomic Modeling: Evolutionary Stochastic Dynamics, Multiple Equilibria, and Externalities as Field Effects, Cambridge University Press 1998. [34] M.-Y. Tsai, J.-M. Yuan, S.-H. Lin, Thermodynamic Insight into Protein Aggregation Using a Kinetic Ising Model, J. Chin. Chem. Soc., 62 (2015) 21-25. [35] B. Georgeot, O. Giraud, The game of go as a complex network, Europhysics Letters, 97 (2012). [36] M. Hue, M. Riffle, J.-P. Vert, W. Noble, Large-scale prediction of protein-protein interactions from structures, BMC Bioinformatics, 11 (2010) 1-9. [37] M.D. Ritchie, A.A. Motsinger, W.S. Bush, C.S. Coffey, J.H. Moore, Genetic programming neural networks: A powerful bioinformatics tool for human genetics, Appl. Soft Comput., 7 (2007) 471-479. 10/19/2017 2:14 PM [38] O. Wolkenhauer, D. Fell, P. De Meyts, N. Bluthgen, H. Herzel, N. Le Novere, T. Hofer, K. Schurrle, I. van Leeuwen, SysBioMed report: Advancing systems biology for medical applications, Systems Biology, IET, 3 (2009) 131-136. [39] Sanjeev Arora, B. Barak, Computational Complexity: A Modern Approach, Cambridge University Press, Cambridge, 2009. [40] R.A. Hearn, Games, Puzzles, and Computation, in: Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, 2006. [41] C.H. Papadimitriou, Computational Complexity, Addison Wesley, Reading, Massachusetts 1993. [42] D. Silver, A. Guang, A. Guez, L. Sifre1, G. van den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, S. Dieleman, D. Grewe, J. Nham, N. Kalchbrenner, I. Sutskever, T. Lillicrap, M. Leach, K. Kavukcuoglu, T. Graepel & D. Hassabis, Mastering the game of Go with deep neural networks and tree search, Nature, 529, 42016. 10/19/2017 2:14 PM
2cs.AI
Dyson’s spike for random Schroedinger operators and Novikov-Shubin invariants of groups arXiv:1602.06626v1 [math.PR] 22 Feb 2016 Marcin Kotowski Bálint Virág February 23, 2016 Abstract We study Schroedinger operators with random edge weights and their expected spectral measures µH near zero. We prove that the measure exhibits a spike of the form µH (−ε, ε) ∼ |logCε|2 (first observed by Dyson), without assuming independence or any regularity of edge weights. We also identify the limiting local eigenvalue distribution, which is different from Poisson and the usual random matrix statistics. We then use the result to compute Novikov-Shubin invariants for various groups, including lamplighter groups and lattices in the Lie group Sol. Contents 1 Introduction 2 The 2.1 2.2 2.3 2.4 2.5 2 eigenvalue process and its limit The expected spectral measure of H . . . . . . . Transfer matrices . . . . . . . . . . . . . . . . . . Crossings and the rotation process . . . . . . . . . Upper and lower bounds on the number of jumps Convergence to the scaling limit . . . . . . . . . . . . . . . 5 5 6 9 11 14 3 Local statistics and the expected spectral measure at zero 3.1 Local eigenvalue statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 The expected spectral measure at zero . . . . . . . . . . . . . . . . . . . . . 17 17 19 4 Spectral measures for groups 4.1 Random Schroedinger operators from group ring elements . . . . . . . . . . 4.2 Semidirect products by hyperbolic matrices . . . . . . . . . . . . . . . . . . . 4.3 Lamplighter groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 24 25 29 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Introduction In this paper, we study a class of Schroedinger operators with random edge weights given by: (Hf )(i) = ai−1 f (i − 1) + ai f (i + 1) where ai form a stationary process. One can think of such an operator as a perturbation of the standard adjacency operator on Z (with all ai = 1) by random noise. It is well known that the presence of even small amount of noise can dramatically influence the spectral properties of H. While the spectral measure of the standard adjacency operator is absolutely continuous, the noisy variant typically has a fully discrete spectrum with exponentially localized eigenfunctions. This phenomenon is known as Anderson localization and is well studied in mathematical physics. A natural object of study is the expected spectral measure, denoted µH , which is the spectral measure of H averaged over all random instances. Here, another phenomenon occurs, related to the behavior of µH at zero. The standard adjacency operator on Z has spectral measure µ with bounded density near zero, so in particular µ(−ε, ε) ∼ πε . In contrast, µH can exhibit behavior of the form: µH (−ε, ε) ∼ C , |log ε|2 which goes to 0 as ε → 0 slower than any power of ε. If µH happens to have a density, this means it must have a sharp spike near 0 of the form 1ε · |logCε|3 . This phenomenon was first observed in the famous paper by Dyson [Dys53], who proved µH (−ε, ε) ∼ |logCε|2 for a specific choice of edge weight distribution. One could expect that such behavior should be typical, independent of any particular properties of the distribution, and indeed, heuristic and numerical arguments supporting this claim have been given in the physics literature [ER78]. However, despite over 60 years from Dyson’s original paper, the only rigorous general result in this direction was [CP89], where authors prove a lower bound µH (−ε, ε) ≥ |logCε|3 for independent weights with bounded continuous density supported away from zero. In this paper, we settle the question, proving: Theorem 1.1. Let ai be i.i.d. random variables such that σ 2 = Var log |ai | < ∞. Then for the random Schroedinger operator H defined by: (Hf )(i) = ai−1 f (i − 1) + ai f (i + 1) we have µH (−ε, ε) = σ2 (1 + oε (1)) log2 ε (1) Notably, we do not assume any regularity of the distribution: it can even take finitely many values. A version of this theorem holds also for edge weights which are not independent, as long as they satisfy suitable correlation decay (see Theorem 3.10 for precise statement). 2 Our theorem easily reproduces Dyson’s result from [Dys53], see the discussion after Theorem 3.10. The crucial ingredient in the proof is truncating the operator H to a finite interval and finding a discrete process that counts its eigenvalues. We then proceed to identify a scaling limit of this process, which involves the Brownian Motion arising as the limit of the discrete |. random walk with steps log | a2i−1 a2i In the course of proving the theorem, we also establish eigenvalue bounds for finite Schroedinger operators. These are expressed in terms of up- and down-crossings, see Sections 2.3 and 2.4 for details and precise definitions: Proposition 1.2. Let Hn be a Schroedinger operator of size n, with n odd, with edge weights ai . Let Mnλ denote the number of eigenvalues of Hn inside the interval (0, λ). Let Dn1±δ denote P the number of (1 ± δ) |log λ|-downcrossings made by the process ki=1 log a2i−1 . Let Bnδ be a2i  2δ δ denote the number of k for which |log |ak || > 8δ |log λ|. Then for any δ ∈ (0, 1) and λ < 16n we have: Dn1+δ − 2Bnδ ≤ Mnλ ≤ Dn1−δ + 2Bnδ Under the same assumptions, the analysis also yields an explicit limit of the local eigenvalue statistics around 0. The limiting distribution has a simple description in terms of upand down-crossings, or wells, made by the underlying Brownian Motion. Figure 1 shows an example of wells made by a Brownian Motion. We highlight that the limiting distribution is different from Poisson or the usual random matrix statistics. Figure 1: A random walk path with two wells of depth 4 Theorem 1.3. Let ai be i.i.d. random variables such that σ 2 = Var log |ai | < ∞. Let H be the random Schroedinger operator defined by: (Hf )(i) = ai−1 f (i − 1) + ai f (i + 1) 3 and let Hn the restricton of H to an interval of length n + 1. Let {Λn (t, η), t, η √> 0} be the process equal to the number of eigenvalues of Hbtnc inside the interval (0, e−η n ). Let {Λ(t, η), t, η > 0} be the process equal to the total number of disjoint η-wells that a Brownian Motion with variance σ 2 makes inside the interval [0, t] (see Definition 2.16). Consider a subsequence of n such that btnc is odd. Then the process Λn (t, η) converges to the process Λ(t, η), i.e. all finite dimensional distributions of Λn converge weakly to finite dimensional distributions of Λ(t, η). (n) As a corrollary, for the smallest positive eigenvalue λ0 of Hn , we have: (n) − log λ0 √ n =⇒ σ · sup |B(t)| t∈[0,1] in distribution, where B(t) is a Brownian Motion of variance 1 (see Remark 3.4). We then proceed to apply our result to computation of topological invariants of groups called the Novikov-Shubin invariants. Let G be a finitely generated group and H ∈ C[G] a group ring element that determines a self-adjoint operator H : `2 (G) → `2 (G) with spectral measure µH . The Novikov-Shubin invariant of H, denoted α(H), is determined by the behavior of µH at zero: α(H) := lim inf ε→0 log(µH (−ε, ε) − µH ({0})) log ε Informally, if α(H) = α and α > 0, this means that µH (−ε, ε) behaves like ∼ εα . In general, Novikov-Shubin invariants are rather difficult to compute, but carry interesting topological information about manifolds with fundamental group G – see [Eck00], [Lüc02] for further background on α(H). Of particular interest is the question of positivity of α(H). Note, for example, that behavior of the form µH ∼ |logCε|2 implies α(H) = 0. It was conjectured by Lott and Lück [LL95] that α(H) > 0 for any group G and any H ∈ C[G]. This has been recently disproved in [GV]. Our paper provides a new counterexample: Theorem 1.4. There exists a group G = Z2 oA Z, with A a hyperbolic matrix, and H ∈ C[G] corresponding to a random walk on G such that α(H) = 0. In comparison to previous work, this gives a simple counterexample which is not only finitely presented, but also a lattice in a Lie group (Sol), see Section 4.2 for a more precise statement. In conjunction with [GV], our technique can be also used to prove α(H) = 0 for lamplighter groups Γ o Z with Γ arbitrary, see Section 4.3. The connection between group theory and random Schroedinger operators comes in the form of a construction due to [Gra14] that allows one, for certain semidirect products G, to build, given H ∈ C[G], a random Schroedinger operator whose expected spectral measure is equal to µH (see Section 4.2 for details). To compute this measure, one needs the full power of our main theorem. For lamplighters, one obtains i.i.d. edge weights, but the underlying 4 distribution can be discrete (e.g. for Z2 o Z), so it is important that we have (1) without any smoothness assumption about the edge weights. In the case G = Z2 oA Z, the resulting operator has dependent edge weights, which we can handle thanks to the hyperbolic nature of the underlying map. The paper is organized as follows. In Section 2, we restrict H to a finite interval and derive a process that counts the eigenvalues of this restriction. This part is completely deterministic. In Section 3, we use that process to prove the main theorem which establishes equation (1) under suitable assumptions. Then, in Section 4, we describe the connection to group theory and proceed to apply the main theorem to computations for the groups mentioned above. 2 2.1 The eigenvalue process and its limit The expected spectral measure of H Let Ω be a probability space and let (. . . , a−1 , a0 , a1 , . . . ) : Ω → RZ be a bi-infinite sequence of real numbers drawn from some joint shift-invariant probability distribution. We will always assume that almost surely, none of ai are equal to 0. The distribution defines a random Schroedinger operator H given by: (Hf )(i) = ai−1 f (i − 1) + ai f (i + 1) In this section, we define what is meant by the expected spectral measure of H. There are standard definitions of this object, but we want to avoid technicalities coming from (i) the fact that the moments of the ai may not exist; and (ii) having to find the domain of H on which it is self-adjoint. Let µ, ν be probability measures. The Kolmogorov distance dK (µ, ν) is defined as dK (µ, ν) = supx |µ(−∞, x] − ν(−∞, x]|. Note that if a sequence of measures µn forms a Cauchy sequence with respect to dK , it converges weakly to some measure µ. Let Hn denote the finite dimensional operator equal to the restriction of H to the set {1, . . . , n + 1} by setting ai = 0 for i ∈ / {1, . . . , n}. In this way, we obtain a random finite dimensional operator Hn whose (random) spectral measure µHn is defined as its empirical eigenvalue distribution. Let µn denote the expected spectral measure of Hn , i.e. the average of µHn take over the randomness of edge weights. Proposition 2.1. The sequence of measures {µ2k −1 }∞ k=1 converges weakly to some limit 1 measure µ that satisfies dK (µ, µ2k −1 ) ≤ 2k . e 2k+1 −1 denote the operator Proof. For k ≥ 1, consider the operators H2k −1 and H2k+1 −1 . Let H e 2k+1 −1 has a possibly obtained from H2k+1 −1 by setting a2k = 0. Since the matrix H2k+1 −1 − H e 2k+1 −1 ) ≤ 1. By a standard matrix nonzero entry only at a2k , we have rank(H2k+1 −1 − H inequality [BS10, Theorem A.43]: dK (µH2k+1 −1 , µHe 2k+1 −1 )≤ 1 2k+1 e 2k+1 −1 ) ≤ · rank(H2k+1 −1 − H 5 1 2k+1 (2) e 2k+1 −1 consists of two disjoint blocks corresponding to vertices Note that the matrix H k k {1, . . . , 2 } and {2 + 1, . . . , 2k+1 }. This and the shift-invariance of the distribution of e 2k+1 −1 is the same as the (. . . , a−1 , a0 , a1 , . . . ) implies that the expected spectral measure of H expected spectral measure of H2k −1 . Thus, inequality (2) holds after taking expectations: dK (µ2k , µ2k+1 ) ≤ 1 2k+1 (3) Altogether, (3) implies that the sequence of measures µ2k is a Cauchy sequence, so it converges weakly to a measure µ. The bounds used above easily imply that d(µ, µ2k ) ≤ P∞ 1 i+1 = 21k as claimed. i=k 2 Definition 2.2. The expected spectral measure µT of the random Schroedinger operator H is defined as the limit measure µ constructed in Proposition 2.1. Note that in the case where all ai are bounded, H is a bounded operator on `2 (Z). One can then define the spectral measure of an instance Hω as follows. Let δ0 (0) = 1, δ0 (i) = 0 for i 6= 0. The spectral measure µHω is defined via specifying its moments: Z k mk = δ0 , (Hω ) δ0 = xk dµHω (4) R Since the operator Hω is bounded, the moment sequence mk specifies the measure uniquely. One then defines the expected spectral measure µH simply as the expectation of the measures µHω . The approximation by finite operators claimed in Proposition 2.1 is then obtained by a bounded operator analogue [BSV13, Lemma 6.1] of inequality (2). 2.2 Transfer matrices Throughout the following sections, we are concerned with a single instance Hω , which we will call H from now on. Therefore, H is a fixed, deterministic operator – we introduce the probabilistic part of the analysis in Section 3. To control the spectral measure of H, we will approximate H by operators Hn supported on finite intervals. In Section 2.2, we use the standard transfer matrix approach to derive a process that counts the eigenvalues of Hn . After the setup contained in Section 2.3, we analyze the process in Section 2.4 and find its limiting behavior in Section 2.5. Let Hn be the restriction of H to the set {1, . . . , n + 1}, i.e. the operator obtained from H by putting all weights outside the interval [1, n + 1] equal to 0. For any given λ ∈ R, we are interested in computing the number of eigenvalues of Hn inside the interval [0, λ]. We shall perform this computation using the transfer matrix approach. We start with the eigenvalue equation. For the first and last equation we set a0 = an+1 = 1, φ0 = φn+2 = 0. The eigenvalue equation can be then written as: Hn φ = λφ ak−1 φk−1 − λφk + ak φk+1 = 0, k = 1, 2, . . . , n + 1 6 Letting: λ Tk−1 λ = ak 1 − ak−1 ak 0  , k = 1, 2, . . . , n + 1 we can write the recursion as:     φk+1 φk λ = Tk−1 φk φk−1 In particular, λ is an eigenvalue if and only if for some c we have:     0 λ 1 λ = Tn · · · · · T0 0 c (5) We will be interested in the evolution of (Tk0 · · · · · T00 )−1 · Tkλ · · · · · T0λ as k changes from 0 to n. Let:   λ   ak  − ak+1 1 0 0 1 λ 0 −1 λ ak+1 Rk := (Tk ) Tk = = − ak+1 0 − aλk 1 1 0 ak Now we rewrite: 0 0 0 0 λ (Tk0 · · · · · T00 )−1 · Tkλ · · · · · T0λ = (Rkλ )Tk−1 ·····T0 · (Rk−1 )Tk−2 ·····T0 · · · · · R0λ (6) where RkA = A−1 Rk A. It is desirable to express (6) in a more tractable way. Define: Sk = k X 2 log i=1 a2i−1 a2i We first compute products of odd and even numbers of Tk0 . We have: !  ak+1 ak+1   ak  0 − 0 − 0 − ak+2 0 ak+2 ak+1 Tk+1 Tk0 = = ak 0 − ak+1 1 0 1 0 (7) so: − 1 Sk 0 0 T2k · T2k−1 · · · · · T10 · T00 = (−1)k 2 0 − εka·e2k+1 1 0 εk · e 2 S k 1 0 0 0 T2k+1 T2k · T2k−1 · · · · · T10 · T00 = (−1)k+1 where we have written Qk i=1 a2i−1 a2i 1 (8) ! εk+1 · e 2 Sk+1 0 0 εk ·e− 2 Sk a2k+1 as εk · e 2 Sk with εk = ±1. 7 ! 1 (9) We now have: 0 0 0 0 λ T2k−1 ·····T0 λ )T2k ·····T0 (R2k ) = Qλk := (R2k+1 1− λ2 a22k+1 Sk −λe −Sk λ ae2 2k+1 1 ! (10) We will now prove a lemma that justifies the usefulness of the representation (6). Let H = {z ∈ C : =z ≥ 0} ∪ {∞} be the upper half plane. We can identify a vector ( ab ) with a point z ∈ H by letting z = ab . In this identification, the vector ( 10 ) is mapped to ∞. We can translate the action of matrices on vectors into action on H. Recall that matrices A ∈ SL(2, R) act by isometries of the hyperbolic plane H in the upper half plane model. A matrix:   a b A= c d . To simplify notation, we will corresponds to the map TA : H → H such that TA (z) = az+b cz+d write A instead of TA . From now on we assume that n is odd. This implies that (Tn0 · · · · · T00 )−1 (0) = 0 (11) Lemma 2.3. Let Mnλ denote the number of eigenvalues of Hn inside the interval [0, λ] and 0 0 let Jnλ denote the number of times the process (Rkλ )Tk−1 ·····T0 · · · · · R0λ (∞) passes 0 or ∞ as k ranges from 0 to n. Then Mnλ = d 21 Jnλ e. Proof. Let A = [0, λ] × [0, n]. We define f : [0, λ] × {0, . . . , n} → ∂H by: ∗ 0 ∗ 0 f (λ∗ , k) = (Rkλ )Tk−1 ·····T0 · · · · · R0λ (∞) and interpolate f linearly to obtain a continuous map f : A → S 1 . Note that by (5) and (11), λ∗ is an eigenvalue whenever: ∗ 0 ∗ 0 (Rkλ )Tk−1 ·····T0 · · · · · R0λ (∞) = 0 Figure 2: The loop from Lemma 2.3 Let S1 , S2 , S3 , S4 be the sides of the rectangle A (see Figure 2). Since A is contractible and f is continuous, the loop f : S1 ∪ S2 ∪ S3 ∪ S4 → ∂H has winding number zero. Since f (S1 ) = f (S4 ) = {∞}, the same is true for the loop f : S2 ∪ S3 → ∂H. Since f is monotone on both of these intervals, with opposite direction, the number of times it passes 0 on them is the same, which easily finishes the proof. 8 2.3 Crossings and the rotation process In Section 2.2 we have shown that in order to study the number of eigenvalues of Hn , we have to study the time evolution of a process given by composing rotations (see equation 10 and remark thereafter). In the following sections, we study this process in detail and derive its continuous-time scaling limit. We consider a fixed, deterministic operator Hn on the interval of size n, given by edge weights {ak }nk=1 . The process constructed in the previous section can be described informally as follows. Starting from the initial point v0 ∈ R, each point vk will be moved by a rotation −S Rk to a new point vk+1 . The center of each rotation, equal to i |ae2k+1k | , is obtained as a product of ai and λ represents the speed of rotation. Formally, we study the process defined by: ! e−Sk λ2 λ 1 − 2 2 a2k+1 a2k+1 , Qλk = Sk −λe 1 λ vkλ = Qλk−1 (vk−1 ) v0λ = ∞ The process described in (10) is exactly of this form. Let H = {z ∈ C : Imz ≥ 0} ∪ {∞} and ∂H = R ∪ {∞}. Since we would like to study the points log vk for vk ∈ ∂H, it is natural to introduce the following setup. For k ∈ Z, let F∞ Ak = {R + k · iπ} ∪ {−∞, +∞}. Let A = k=1 Ak be the union of lines plus points ±∞, connected in such a way that A2k ∩ A2k+1 = {+∞}, A2k−1 ∩ A2k = {−∞}. Considering exp : A → ∂H, we can treat its inverse as a (multi-valued) map log : ∂H → A, where A2k ⊆ log({z ≥ 0}) and A2k+1 ⊆ log({z ≤ 0}). Remark 2.4. Note that A has a natural ordering inherited from the real line, which we will denote by ≥A . If x ∈ Aj and y ∈ Ai for j > i, then x ≥A y. If x, y are in the same component, x ≥A y means x ≥ y if x, y ∈ A2i or x ≤ y if x, y ∈ A2i+1 . The time evolution governed by Qk is monotone with respect to this ordering, i.e. if y ≥A y 0 , then Qk (y) ≥A Qk (y 0 ). The processes studied below will consist of points starting at +∞ ∈ A1 and decreasing monotoneously until they jump past −∞ to A2 , whereupon they increase until they jump to A3 , and so on. We introduce the scaled version of the processes, defined as follows: 1 Sk |log λ| 1 Yk = log vkλ |log λ| Xk = Xk is supposed to represent the rescaled motion of the rotation center, while Yk is the rescaled trajectory of vk . With this setup, Yk takes values in A, either in A2i if vkλ ≥ 0 or A2i+1 if vkλ ≤ 0. It jumps from Ai to Ai+1 whenever vkλ changes sign. 9 λ Note that for vk−1 > 0, so that Yk−1 ∈ A2i for some i, we can write: (1 − 1 Yk = log |log λ| λ2 )λ−Yk−1 a22k−1 + 1 λ1+Xk−1 a22k−1 1 − λ1−Yk−1 −Xk−1 where Yk ∈ A2i if the expression under the absolute value is nonnegative and Yk ∈ A2i+1 otherwise. 2 Remark 2.5. Assume that vk−1 > 0 and 1 − a2λ > 0. Then vk makes a jump, i.e. vk ≤ 0, 2k−1 if and only if 1 − Xk−1 − Yk−1 ≤ 0. We now introduce the concept of crossings, which relate to the number of jumps made by the process. Let X(t) be a real valued function from R or Z. Define M (t1 , t2 ) = max X(t) t∈[t1 ,t2 ] m(t1 , t2 ) = min X(t) t∈[t1 ,t2 ] Definition 2.6. Let τ0 = 0 and define for i ≥ 1: τ2i−1 = inf{s ≥ τ2i−2 | M (τ2i−2 , s) − X(s) ≥ α} τ2i = inf{s ≥ τ2i−1 | m(τ2i−1 , s) − X(s) ≤ −α} We will say that X has made a α-downcrossing at time τ2i−1 and a α-upcrossing at time τ2i , for i ≥ 1. Both down- and upcrossings will be called crossings. Definition 2.7. Given a function X(t) and α > 0, the α-crossing process associated to X is defined as: ( −M (τ2i , t) + α2 ∈ A2i+1 , for t ∈ [τ2i , τ2i+1 ) Z α (t) = −m(τ2i−1 , t) − α2 ∈ A2i , for t ∈ [τ2i−1 , τ2i ) where τk are times of subsequent crossings as in Definition 2.6. Informally, the proces Z α (t) evolves as follows. It is started in A1 at α2 and decreases monotoneously as it is ”pushed” by −M (τ0 , t) + α2 . The moment M (τ0 , t) − X(t) ≥ α, Z α (t) jumps to A2 and everything starts afresh, only with −M (τ0 , t)+ α2 replaced with −m(τ1 , t)− α2 and moving in the opposite direction. The process jumps to A3 when X(t) − m(τ1 , t) ≥ α and so on. Definition 2.8. We say that a process Y has made a jump at time k if Yk ∈ Aj and Yk−1 ∈ Aj−1 . With these definitions, the first crossing is always a downcrossing. Note that the times of successive jumps of the α-crossing process Z α (t) are exactly the times of α-crossings of the underlying function X. 10 2.4 Upper and lower bounds on the number of jumps In this Section, we prove upper and lower bounds on the number of jumps of Y in terms of √ − n but are stated and crossings made by X. The Propositions below will be used for λ = e proved in generality, with λ arbitrary. Proposition 1.2 follows by recalling that by Lemma 2.3, the number of eigenvalues is d 12 Jn e and that is simply the number of downcrossings. In both Propositions below, we consider the processes Y and Z α , the α-crossing process associated to X for appropriate value of α. We will only consider the case when Y, Z ∈ A2i , as the case of the odd numbered component is handled in a similar way. We can write the one step recursion for Z as Zk+1 = z 0 (Xk+1 , Zk ), where z 0 is given by: ( if z ≥ −x + α2 −x + α2 ∈ A2i+1 , z 0 (x, z) = max{z, −x − α2 } ∈ A2i , otherwise Likewise, we can write the one step recursion for Y as Yk+1 = y 0 (Xk , Yk , a2k+1 ), where y 0 is given by: 2 (1 − λa2 )λ−y + a12 λ1+x 1 0 log y (x, y, a) = |log λ| 1 − λ1−y−x In both proofs, we will repeatedly use the following estimates, which hold if |log |ak || ≤ δ |log λ|, δ < 2 and λ < 1: 16 δ λ8 < 1− δ 1 < λ− 8 2 ak δ λ2 > 1 − λ2− 8 > 0 2 ak (12) (13) Proposition 2.9. Pick δ ∈ (0, 2). Let Jn be equal to the number of jumps made by {Yk }nk=1 . Let Cn be equal to the number of (2 − δ) |log λ|-up- or down-crossings made by Sk and let  4δ δ δ Bn be the number of k such that |log |ak || > 16 |log λ|. Then for all λ < 32n we have Jn ≤ 2Bn + Cn . Proof. First, we replace Y by a process defined as follows. Suppose that Yk ∈ Ai . Whenever δ |log |ak || > 16 |log λ|, instead of following its usual evolution, the modified process jumps to Yk ∈ Ai+2 , i.e. the same point, but two components ahead. Since Y can make at most one jump in one step, the modified process is always ahead of Y , in particular, it makes at least as many jumps. Thus, it suffices to bound the number of jumps of Y by Cn , under the δ assumption that |log |ak || ≤ 16 |log λ|, since the remaining jumps are taken care of by the term 2Bn . Let Z be the (2 − δ)-crossing process associated to X (Definition 2.7). Recall that Cn , the number of (2 − δ)-crossings made by X, is equal to the number of jumps made by Z. Thus we need to prove that Z makes at least as many jumps as Y . Recall the one step recursion for Y and Z. Suppose that Zk ∈ Ai and let Wk = Zk + δ · k. The evolution of Wk is governed by the recursion: (−1)i 4n   δ 0 0 i δ w (x, w, k) = z x, w − (−1) · k + (−1)i · (k + 1) 4n 4n 11 Note that w0 makes jumps at the same time as z 0 . We claim that in order to prove that Z makes at least as many jumps as Y , it suffices to prove that for any values of x, w, a, k such that k ≤ n and a satisfies (12), (13) we have: w0 (x, w, k) ≥A y 0 (x, w, a) (14) We prove inductively that Wk ≥A Yk+1 , from which the claim about the number of jumps follows as Wk makes a jump if and only if Zk makes a jump. For the base case k = 0, we have: 2 1 − λa2 δ 1 δ 1 0 log >1+ log(1 − λ2− 8 ) > 1 − (15) y (∞) = |log λ| λ |log λ| 8  4δ δ δ where the last estimate follows from λ 8 < 12 , easily implied by λ < 32n . Thus, Y1 > 1− 8δ > 1− 2δ = Z0 . The map y 0 is monotone, meaning that y1 ≤A y2 implies y 0 (x, y1 , a) ≤A y 0 (x, y2 , a). The inductive step then follows by applying (14) and then monotonicity:: Wk+1 = w0 (Xk+1 , Wk , k) ≥A y 0 (Xk+1 , Wk , a2k+3 ) ≥A y 0 (Xk+1 , Yk+1 , a2k+3 ) = Yk+2 Note that the increments of w0 and y 0 are translation invariant, so without loss of generality we can put x = 0. The results hold for all values of ak satisfying the assumptions, so we suppress the variable a and write y(w) for y(0, w, a). We only consider the case when y, z ∈ A2i as the case of the odd numbered component δ . is handled in a similar way. We first claim that if 1 − 4δ ≥ u ≥ −1 + 2δ , then y 0 (u) − u < 4n We have: 2 (1 − λa2 )λ−u + 1 y (u) − u = log |log λ| 1 − λ1−u 0 1 λ a2 3 δ 1 1 + λ1+u− 8 −u ≤ log ≤ |log λ| 1 − λ1−u (12) 3 δ δ 1 1 1 1 + λ8δ λ4 + λ8δ 2 · λ4 ≤ log · · δ ≤ δ |log λ| |log λ| 1 − λ 4 |log λ| 1 − λ 4δ 1 − λ4 The assumptions λ < δ 32n  4δ and δ < 2 easily imply δ 1 |log λ| y 0 (u) − u < 8 · λ 4 < < 2 and 1 δ < 2, so we get: 1−λ 4 δ 4n  4δ δ again by λ < 32n . We now prove (14). The first case to consider is when y 0 does not jump, which by Remark 2.5 and (13) implies w < 1. Then, either w0 jumps and the claim is trivial, or it does not. δ δ In that case, we have w < 1 − 2δ + 4n · k < 1 − 4δ and z 0 = max{w − 4n · k, −1 + 2δ }. If δ δ δ δ δ w ≥ −1 + 2 + 4n · k, then z 0 = w − 4n · k, so w0 = w + 4n . Also 1 − 4 ≥ w ≥ −1 + 2δ , so δ δ y 0 (w) − w < 4n = w0 − w as desired. If w < −1 + 2δ + 4n · k, then:   δ δ δ δ δ δ 0 0 y (w) < y −1 + + · k < −1 + + ·k+ = z0 + · (k + 1) = w0 2 4n 2 4n 4n 4n 12 The other remaining case is when y 0 makes a jump, so w ≥ 1. This means that z ≥ δ · k > 1 − 4δ > 1 − 2δ , so z 0 makes a jump as well. Also, z 0 = 1 − 2δ ∈ A2i+1 and w0 > z 0 . 1 − 4n It thus suffices to prove that y 0 ≤A 1 − 2δ in A2i+1 , which translates to y 0 ≥ 1 − 2δ since we are in an odd numbered component. We have y 0 (w) > y 0 (∞) and y 0 (∞) > 1 − 2δ by (15). Proposition 2.10. Pick δ ∈ (0, 2). Let Jn be equal to the number of jumps made by {Yk }nk=1 . Let Cn be equal to the number of (2 + δ) |log λ|-up- or down-crossings made by Sk and let Bn δ be the number of k such that |log |ak || > 16 |log λ|. Then for all λ < 1 we have Cn −2Bn ≤ Jn . Proof. As in Proposition 2.9, we replace Y by a process which makes two jumps whenever δ |log |ak || > 16 |log λ|. Now it suffices to bound the number of jumps of Y from below by Cn , δ |log λ|, since the remaining jumps are taken care of under the assumption that |log |ak || ≤ 16 by the term 2Bn . Let Z be the (2 + δ)-crossing process associated to X (Definition 2.7). We only consider the case when Yk , Zk ∈ A2i as the other one is handled in a similar way. Recall that Cn , the number of (2 + δ)-crossings made by X, is equal to the number of jumps made by Z. Thus we need to prove that Y makes at least as many jumps as Z. Recall the one step recursion for Y and Z. We claim that in order to prove that Y makes at least as many jumps as Z, it suffices to prove that for any values of x, z, a such that a satisfies (12), (13) we have: z 0 (x, z) ≤A y 0 (x, z, a) (16) We prove inductively that Zk ≤A Yk+1 for all k ≥ 0. The base case is clear since Z0 = 1+ 2δ and Y1 < 1. The map y 0 is monotone, meaning that y1 ≤A y2 implies y 0 (x, y1 , a) ≤A y 0 (x, y2 , a). The inductive step then follows by applying (16) and then monotonicity:: Zk+1 = z 0 (Xk+1 , Zk ) ≤A y 0 (Xk+1 , Zk , a2k+3 ) ≤A y 0 (Xk+1 , Yk+1 , a2k+3 ) = Yk+2 Note that the increments of z 0 and y 0 are translation invariant, so without loss of generality we can put x = 0. The results hold for all values of ak satisfying the assumptions, so we suppress the variable a and write y(w) for y(0, w, a). To prove (16), consider first the case when y 0 (z) does not make a jump, which by Remark 2.5 and (13) means z < 1. This in particular means that z 0 does not make a jump, so z 0 = max{z, −1 − 2δ }. Since y 0 is increasing, we have y 0 (z) > z. On the other hand, since z ≥A −∞, we have: y 0 (z) ≥ y 0 (−∞) = 1 1 δ log 2 λ ≥ −1 − |log λ| a 8 Thus, y 0 ≥ max{z, −1 − 8δ } ≥ z 0 , finishing the claim. The other case is when y 0 makes a jump from A2i to A2i+1 , so that z ≥ 1. Then either z < 1 + 2δ , so z 0 remains in A2i and the claim is trivial, or z ≥ 1 + 2δ ∈ A2i . In that case z 0 = 1 + 2δ ∈ A2i+1 and we need to prove y 0 ≥A 1 + 2δ ∈ A2i+1 , that is, y 0 ≤ 1 + 2δ since we are 13 in the odd numbered component. Since z ≥A 1 + 2δ ∈ A2i , by monotonicity of y 0 we have:   δ 2 (1 − λa2 )λ−1− 2 + a12 λ 1 δ 0 0 = log ≤ y (z) ≤ y 1 + δ 2 |log λ| λ− 2 − 1 δ 3 1 + a12 λ2+ 2 δ 1 δ 1 1 + λ2+ 8 δ 1+ + log < 1 + + log δ δ 2 |log λ| 2 |log λ| λ− 2 − 1 λ− 2 − 1 It suffices to make the expression under the logarithm smaller than 1. This is easily implied 2 δ by λ < 1 and λ− 2 > 3, which follows from the assumption that λ < 31 δ . We note that for even values of n, we obtain similar statements, but with roles of downand upcrossings reversed. In particular, we obtain an analogue of Proposition 1.2 for even n, which is identical but bounds the number of jumps in terms of upcrossings, rather than downcrossings of Sk . 2.5 Convergence to the scaling limit We now study the continuous-time scaling limit of the processes Y . To this end, we put √ λ = e− n and consider a sequence of processes Y (n) such that the underlying functions X (n) converge to some function X. The reason for this particular scaling is related to Brownian scaling which we shall use in Section 3 when introducing the probabilistic part of the analysis. In the formula below the reader should recognize the same scaling as in the Central Limit Theorem. √ We introduce the continuous time version of the discrete process X with scaling λ = e− n . For any η, we can write: 1 (n) (n) Sη2 nt Xηn (t) := p 2 η n (n) We introduce the superscript n to emphasize that for different values of n, the sums Sk (n) depend on different sets of edge weights {ak }nk=1 for each n. While it may seem natural to consider sequences obtained from a single infinite operator H restricted to finite intervals, we will need the main theorem of this section stated in generality. We will establish the main theorem of this section under the following assumptions. (n) Condition 2.11. Xn (t) converge uniformly on some interval [0, T ] to a function X(t) such that X(0) = 0. Condition 2.12. Fix some ν > 0. Whenever M (t) − X(t) = 2ν (resp. m(t) − X(t) = −2ν), for any ε > 0 there exists t0 < t+ε such that M (t0 )−X(t0 ) > 2ν (resp. m(t0 )−X(t0 ) < −2ν). Condition 2.13. We have: (n) lim max n→∞ k=1,...,n log |ak | √ =0 n 14 (17) Note that Condition 2.13 is not implied by Condition 2.11 since Condition 2.11 only (n) implies that log a2k−1 (n) a2k (n) are small in the limit and implies nothing about log |ak | . (n) Theorem 2.14. Let Xn (t) be a sequence of piecewise linear functions that converge uniformly on some interval [0, T ] to a function X(t) such that X(0) = 0 (Condition 2.11). Suppose that X(t) satisfies Condition 2.12 with ν = 1 and Condition 2.13 is satisfied. Let Jn (n) denote the number of jumps made by {Yk }nk=1 and let J denote the number of 2-crossings made by X. Then Jn converges to J as n → ∞. Proof. Let Cnα denote the number of α-crossings made by Xn , let C α denote the number of (n) δ √ n. α-crossings made by X and let Bnδ denote the number of k such that log ak > 16 Pick δ > 0. By applying Propositions 2.9 and 2.10 with λ = e− obtain: Cn2+δ − 2Bnδ ≤ Jn ≤ Cn2−δ + 2Bnδ √ n , for large enough n we (18) Since Xn converge to X uniformly, it is easy to see that for large enough n we have Cn2+δ ≥ C 2+2δ and Cn2−δ ≤ C 2−2δ . Moreover, Condition 2.12 implies that C 2−2δ and C 2+2δ converge to C 2 = J as δ → 0. Also, by Condition 2.13 we have that Bnδ converges to 0 as n → ∞. Thus, we can make the upper and lower bound in (18) arbitrarily close to J by first picking small enough δ and then large enough n, depending on δ, which finishes the proof. Remark 2.15. always bounded τi . This can be process Z 2 . We jumps. The proofs of Proposition 2.9 and 2.10 imply that the discrete process Y is from both sides by (2 ± δ)-crossing processes Z 2±δ , outside of jump times actually used to prove the convergence of the processes Y to the 2-crossing do not spell out the details as we only need the convegence of the number of We are now ready to prove the Lemma which summarizes the connection between the asymptotic number of eigenvalues of Schroedinger operators described in Section 2.2 and the processes introduced above. Definition 2.16. We say that an interval [a, b] ⊆ [0, T ] is an s-well of X for some s > 0 if: 1. b = T or X(a) = X(b); 2. X(a) > X(x) for all x ∈ (a, b) and X(a) − X(x) ≥ s for some x ∈ (a, b). Remark 2.17. Note that the maximal number of disjoint s-wells made by X inside [0, T ] is equal to the number of s-downcrossings. Lemma 2.18. Let {H (n) }∞ n=1 be a family of Schroedinger operators, each given by edge (n) n (n) weights {ai }i=1 . Let Hm denote the operator H (n) restricted to the interval [1, m + 1]. For √ (n) t, η > 0, let Λn (t, η) denote the number of eigenvalues of Hbtnc inside the interval [0, e−η n ]. Consider a subsequence of n such that btnc is odd. Suppose that Conditions 2.11. 2.12 and (n) 2.13 are satisfied, including Condition 2.12 with ν = η. In particular, Xn converge to some function X. Let Λ(t, η) denote the number of 2η-downcrossings of X inside the interval [0, 12 t]. Then Λn (t, η) converges to Λ(t, η) as n → ∞. 15 Figure 3: X(t) makes a 4-downcrossing at t1 and t3 and 4-upcrossing at t2 and t4 . The resulting 4-wells are shown in grey. Proof. Recall that: (n) Sk = k X (n) Ui = k X (n) 2 log (n) a2i i=1 i=1 a2i−1 1 (n) Xn(n) (t) = √ Snt n where the superscript n emphasizes that, for different n, the sums S (n) depend on a different (n) set of edge weights ai . (n) Put T = η12 t. By letting n0 = η 2 n, Λn (t, η) is equal to the number of eigenvalues of HbT n0 c inside the interval [0, e− √ n0 ]. By Lemma 2.3, this is equal to d 12 Jn e, where Jn is the number of 1 T n0 √ 0 2 jumps made up to time 12 T n0 by the process {Y (n),λ }k=1 , with λ = e− n and the underlying (n) random walk being Xn0 . Note that the scaling factor n0 is now different than the sample number n. The factor of 21 appears since each step of the discrete process used in Section 2.3 actually corresponds to two steps of the eigenvalue counting process from Section 2.2(see equation (10)). We have: 1 (n) 1 1 (n) (n) Xn0 (t) = √ Sn0 t = · √ Sη2 nt η n n0 (n) (n) Since by assumption Xn (t) → X(t), we have Xn0 (t) → Xη (t) := η1 · X(η 2 t). Since X satisfies Condition 2.12 with ν = η, it follows that Xη satisfies the same condition with ν = 1. Since the assumptions of Theorem 2.14 are satisfied for Xη , the number of jumps 1 T n0 2 made by {Y (n),λ }k=1 converges to the number of 2-down- or upcrossings that Xη makes inside 16 the interval [0, 21 T ]. This is the same as the number of 2η-crossings made by X inside [0, 21 t]. This finishes the proof by noting that if C is the number of 2-down- or upcrossings, then d 12 Ce is the number of 2-downcrossings since the first crossing is always a downcrossing. 3 Local statistics and the expected spectral measure at zero In this section, we use the limiting process from the previous section to derive the limit of local eigenvalue statistics of Hn and compute µH , the expected spectral measure of the random Schroedinger operator H, near zero. The main focus of this section are Theorem 3.3, Lemma 3.9 and Theorem 3.10. We shall use the notation from Section 2. Whenever we speak of convergence in distribution of processes, we shall mean weak convergence of measures on C([0, T ]). 3.1 Local eigenvalue statistics In this Section, we consider a random Schroedinger operator with edge weights given by a sequence of random variables {ai }∞ i=1 . We define: n X 1 a2i−1 , Sn = Ui , Xn (t) = √ Sbntc Ui = 2 log a2i n i=1 2 Definition 3.1. Suppose that {Ui }∞ i=1 satisfy EUi = 0 and EUi < ∞. We say that Ui satisfy the functional Central Limit Theorem if Xn converge in distribution on some interval [0, T ] to a Brownian motion X with mean zero. 2 Proposition 3.2. Suppose that {ai }∞ i=0 are identically distributed and E(log |ai |) < ∞. Then for any ε > 0 we have:   |log |ak || √ P max >ε →0 k=1,...,n n i.e. the sequence of variables {maxk=1,...,n log |ak | ∞ √ }n=1 n converges to 0 in probability. Proof. Let Xk = log2 |ai |, so that EXk < ∞. A simple exercise in probability (see e.g. [Bil95], Problem 21.3) shows that when variables Xk are identically distributed with EX1 < ∞, we have E maxk=1,...,n Xk = o(n). This together with Markov’s inequality proves the desired claim. If the functional Central Limit Theorem is satisfied, we can use Lemma 2.18 and Skorokhod almost sure representation to obtain convergence in distribution of the local eigenvalue statistics. This describes the limiting local eigenvalue distribution around 0 in terms of crossings made by a Brownian motion, recall Definition 2.6. We note that the limiting distribution is not Poisson, as Proposition 3.5 shows that it exhibits a Gaussian tail. 17 Theorem 3.3. Suppose that Ui satisfy the functional Central Limit Theorem and let Var log |ai | = σ 2 < ∞. Let Hm be the operator H restricted to the interval [1, m + 1]. For t, η > 0, let {Λn (t, η), t, η > 0} denote√ the random process equal to the number of eigenvalues of Hbtnc inside the interval [0, e−η n ] and let {Λ(t, η), t, η > 0} denote the random process equal to the maximal number of disjoint η-wells made by a Brownian motion with variance σ 2 inside the interval [0, t]. Consider a subsequence of n such that btnc is odd. Then the process Λn (t, η) converges to the process Λ(t, η), i.e. all finite dimensional distributions of Λn converge weakly to finite dimensional distributions of Λ. Proof. By assumption, Xn converge weakly to X, which is a Brownian Motion with variance 8σ 2 . By Skorokhod representation theorem ([Kal02], Theorem 4.30), we can find a common probability space such that Xn → X uniformly almost surely. The maximum process M − X is equal in distribution to a reflected Brownian motion and it is standard ([MP10]) that almost surely the Brownian motion has no isolated zeros. These two facts easily imply that X almost surely satisfies Condition 2.12 for any value of ν. Moreover, by Proposition 3.2 and almost sure representation of variables converging in probability, we obtain that Condition 2.13 is satisfied almost surely. Thus, almost surely the conditions of Theorem 2.14 are satisfied. By Lemma 2.18, for any t, η it holds that Λn (t, η) converges to the number of 2η-wells that X makes inside the interval [0, 21 t]. By Brownian scaling this has the same distribution as the number of η-wells that a Brownian motion with variance σ 2 makes inside the interval [0, t], which is exactly Λ(t, η). The same statement holds for Λn treated as a process - for any finite number of {(t1 , η1 ), . . . , (tk , ηk )} convergence holds simultaneously almost surely for all ti , ηi , which implies weak convergence of all finite dimensional distributions. Note that the limiting 2-crossing process Z 2 is discontinuous, but is right continuous with left limits. Then Remark 2.15 also implies that the processes Y (n) converge weakly to Z 2 . We do not describe this in detail as below we only need the weak convergence of the number of eigenvalues and not of the processes Y (n) themselves. Remark 3.4. Various questions about the eigenvalues of Hn can be phrased in terms of (n) crossings made by the limiting Brownian Motion X. For example, let λ0 be the smallest − log λ (n) positive eigenvalue of Hn . It follows from the preceding Theorem that √n 0 converges in distribution to the maximal size of a downcrossing made by X inside the interval [0, 1], that is, the maximal η such that M (t) − X(t) = η for some t ∈ [0, 1]. Since M (t) − X(t) is equal in distribution to a reflected Brownian motion |X(t)|, we obtain that: (n) − log λ0 √ n =⇒ σ · sup |B(t)| t∈[0,1] in distribution, where B(t) is the standard Brownian Motion of variance 1. Proposition 3.5. With Λ(t, η) defined as in Theorem 3.3, for some constants a, b > 0 depending on t, η, σ we have 2 P(Λ(t, η) > m) ≤ ae−bm 18 Proof. Suppose that Λ(t, η) > m, so X(t) has made more than 2m η-up- or down-crossings √ η t inside the interval [0, t]. By Brownian scaling, we can put η 0 = σ and instead consider η 0 crossings of a standard Brownian motion inside the interval [0, 1] Let T1 , . . . , T2m be the times between subsequent η-up- or down-crossings. The times Ti are independent and identically distributed. Moreover, note that R(t) = M (t) − X(t) has the distribution of a reflected Brownian motion, so by the reflection principle we have: η 02 P(Ti ≤ x) = P(max R(t) ≥ η 0 ) ≤ 2 · P(max B(t) ≥ η 0 ) = 4 · P(B(x) ≥ η 0 ) ≤ 4e− 2x [0,x] [0,x] Since there are more than 2m crossings P2m inside [0, 1], this means that T1 + . . . T2m < 1. 2m Let ∆2m = {(x1 , . . . , x2m ) ∈ [0, 1] | i=1 xi ≤ 1}. We have: Z P(T1 + . . . T2m < 1) ≤ 2m Y Z P(Ti ∈ dxi ) ≤ 4 ∆2m i=1 Z 1 −2m2 η 02 P2m 4 e x i=1 i ≤ 4 · vol(∆2m ) · e−2η 02 ·m2 02 η − 2x e ∆2m i=1 −2η 02 ·m2 =4· ∆2m 3.2 2m Y i Z =4 02 − η2 e P2m 1 i=1 xi ≤ ∆2m e (2m)! The expected spectral measure at zero Having established weak convergence of the local eigenvalue statistics, we now set the background to compute the expected spectral measure of H. We shall consider sequences of Ui satisfying the following technical condition: Condition 3.6. At least one of the following holds: 1. for some γ > 2 we have E |log |ai ||γ < ∞ and for some constant C and any n ≥ 1: γ E |U1 + · · · + Un |γ ≤ Cn 2 , (19) 2. The ai are i.i.d. and E |log |ai ||2 < ∞. Note that in the i.i.d. case a standard computation verifies the inequality (19) with γ = 2. However, we will later work in the setting when Ui are dependent, but exhibit a suitable correlation decay (see Section 4.2). Having established weak convergence of the number of jumps, we would like to establish that the convergence also holds in expectation. This will be implied by the upcoming Lemma 3.8. An important element in the proof is the maximal inequality of [Mó76], whose special case says the following: P Proposition 3.7. Let S(i, j) = jk=i Uk , M (i, j) = maxi≤k≤j S(i, k). If for some γ > 2 and A > 0 we have: γ E |S(i, j)|γ ≤ A(j − i + 1) 2 19 for all j > i ≥ 1, then: γ E |M (i, j)|γ ≤ cγ · A(j − i + 1) 2 for all j > i ≥ 1, with the constant cγ depending only on γ. Lemma 3.8. Suppose that Ui satisfy Condition 3.6. Let Jn be the random variable equal to the number of jumps made by Y (n) in the interval [1, n]. Then the family of variables {Jn }n≥1 is uniformly integrable. Proof. By Proposition 2.9 with δ = 1 and λ = e− greater than some global constant n0 , where: Bn = n X √ n , we obtain Jn ≤ 2Bn + Cn for all n 1{|log|ai ||> 161 √n} i=1 1 √ is the number of times i such that |log |ai || > 16 n and Cn is the number of 1-crossings made by Xn . Thus, it suffices to show that Bn and Cn are uniformly integrable. We will first prove the general case. Then we give a different argument for the i.i.d. case under weaker moment assumptions. To prove that Bn is uniformly integrable, it suffices to show that EBn → 0. By Condition 3.6 we can estimate:   1√ E |log |ai ||γ . EBn = n · P |log |ai || > n ≤n· γ 1 γ 16 ) n 2 ( 16 Since γ > 2, this converges to 0 as n → ∞. For a crossing [s, t], its length is t − s. To show that Cn are uniformly integrable, it suffices to show that the expected number of 1-crossings [s, t] of length at most n · 2−`0 is at most ε(`0 ) for all n, where ε(`0 ) → 0 as `0 → ∞. Indeed, for given `0 the number of 1-crossings that are longer is bounded independently of n. We first bound the expected number e(n, `) of 1-crossings that are of length at least n · 2−` and at most 2n · 2−` . To each such crossing [s, t] we associate the first time of the form k · b2−` nc contained in [s, t] for some integer k. Each such time is contained in at most one such crossing, so the number of such crossings is bounded above by the sum of the indicators over such times that a crossing contains that time. As a consequence, e(n, `) is bounded by the number of such times, which is 2` , times the maximal probability that a crossing contains a given time. If this happens, then the range (i.e. the maximum minus the minimum)√of the process Sk over the interval [i, √j] of −` size 4n · 2 centered at that time is at least n. In particular, either M (i, j) ≥ n/2, or the same holds for the absolute minimum. By Markov’s inequality, Proposition 3.7 and Condition 3.6 we get P(M (i, j) ≥ √ n/2) ≤ 2γ/2 E|M (i, j)|γ c · E|S(i, j)|γ c0 · (4n · 2−` )γ/2 ≤ ≤ nγ/2 nγ/2 nγ/2 20 giving e(n, `) ≤ 4γ/2 c0 · 2` 2−`γ/2 . As a result, the expected number of 1-crossings of length at most n · 2−`0 is at most dlog2 ne c X 2`(1−γ/2) < `=`0 c · 2`0 (1−γ/2) =: ε(`0 ) → 0 1 − 2(1−γ/2) as long as γ > 2. Proof of the i.i.d. case. We now prove the i.i.d. case assuming only E |log |ai ||2 < ∞. It suffices to show that the variance of Bn is uniformly bounded in n. The Bn are Bernoulli random variables, so their variance is bounded by their mean. We have   E |log |ai ||2 1√ n ≤n· E(Bn ) = n · P |log |a1 || > , 1 2 16 n( 16 ) which is bounded. To show that Cn is uniformly integrable, it suffices to show exponential tails uniform in n, namely a bound of the form P(Cn ≥ k) < ck for some c < 1. Let a be a large constant to be chosen later. We divide the interval [1, n] into a intervals I1 , . . . , Ia of size na . Let Nn,j denote the number of crossings with starting points in Ij . It suffices to show that each Nn,j has exponential tails uniform in n. If the walk makes at least 2 crossings inside Ij √ = [s, t], then the maximal absolute increment between times √ s, t in this interval is at least n. With the notation of Proposition 3.7 either M (s, t) ≥ n/2 or the same holds for the absolute minimum. By the classical Kolmogorov maximal inequality for i.i.d variables P(M (s, t) > λ) ≤ (s − t) · Var Ui , λ2 which gives P (Ni,j ≥ 2) ≤ 2 · n/a · Var Ui . n/4 (20) By choosing a large enough, we can make the right hand side smaller than some global constant b < 1, which we fix from now on. We can write for any i: P(Nn,j ≥ 2i) = i Y P(Nn,j ≥ 2k | Nn,j ≥ 2k − 2) k=1 If we stop the random walk in the time interval Ij after the 2k − 2nd crossing (when it exists), the conditional law of the remaining stretch is another independent random walk in a smaller interval. The conditional probability of the remaining walk making a double crossing is at most b again. This shows that all terms in the above product are bounded above by b, so Nn,j has exponential tails uniform in n, as required. 21 The crucial step in computing the spectral measure of H is approximation by an operator Hn on a finite interval. The spectral measure of Hn is computed in the following lemma. Lemma 3.9. Fix K > 0 and let n = bK 2 |log ε|2 c be odd (in particular, n → ∞ as ε → 0). Let Hn be equal to the operator H restricted to the interval {1, . . . , n + 1} and let µn be its expected spectral measure. Assume that for all i Var log |ai | = σ 2 < ∞. Suppose that: 1. Ui satisfy the functional Central Limit Theorem (Definition 3.1) 2. Ui satisfy Condition 3.6 Then there exists cK such that limK→∞ cK = 0 and for sufficiently small ε: µn (−ε, ε) − σ2 log2 ε ≤ cK log2 ε Proof. Let MK,n denote the number of eigenvalues of Hn inside the interval [−ε, ε] and let + MK,n denote the number of eigenvalues inside the interval [0, ε]. We start by ruling out zero eigenvalue of Hn . The equation for eigenvectors (see Section 2.2) with λ = 0 can be solved recursively and for odd n the only solution is identically zero. Since we assumed n is odd, all the eigenvalues of Hn are thus nonzero. Since the underlying graph is bipartite, every eigenvalue λ+ ∈ (0, ε] has a corresponding eigenvalue λ− = −λ+ ∈ [−ε, 0), so: + MK,n = 2MK,n Let JK denote the number of K1 -crossings that a Brownian motion with variance σ 2 makes inside the interval [0, 1]. By Brownian scaling this is the same as the number of 1-crossings that a Brownian motion with variance σ 2 makes inside the interval [0, K 2 ]. By assumption, 1 √ satisfy the functional Central Limit Theorem. Since ε = e− K n , by putting Ui = 2 log a2i−1 a2i   + t = 1, s = K1 in Theorem 3.3 we obtain that MK,n converges weakly to 12 JK . Thus we obtain:   1 + MK,n = 2MK,n ⇒ 2 JK = JK + 1{JK =2k+1} 2 By Lemma 3.8 the family {MK,n }n≥1 is uniformly integrable since MK,n differs from the number of jumps by at most one. Weak convergence thus implies convergence in expectation, so by letting: aK,n = EMK,n − EJK − E1{JK =2k+1} (21) for each fixed K we have limn→∞ aK,n = 0. We shall now compute EJK . We shall use standard properties of Brownian motion, which can be found e.g. in [MP10]. We first compute τ , the expected time to make an up or down crossing. Let X be a Brownian motion with variance σ 2 . Consider τ1 = inf{t ≥ 0 : M (0, t)−X(t) = 1}. Since M (0, t)−X(t) has the distribution of a reflected Brownian motion, τ1 has the same distribution as τ2 = inf{t ≥ 0 : X(t) = 1 ∨ X(t) = −1}. It is standard that 22 Eτ2 < ∞. If X(t) is stopped at time τ2 , by Wald identity we obtain EX(τ2 )2 = σ 2 · Eτ2 , which gives Eτ2 = σ12 . Clearly we can treat the event {m(0, t) − X(t) = −1} in the same way, so we have: 1 τ = Eτ2 = 2 (22) σ Now, let Ti be i.i.d. random variables equal to the times between successive up or down crossings made by X(t). Note that ETi = τ and we can write JK as: JK = sup{n : n X Ti ≤ K 2 } i=1 In other words, JK is equal to the number of jumps up to time K 2 , made by a renewal process with expected renewal time τ . By the law of large numbers for renewal processes K = τ1 . Let: [Dur10], it follows that limK→∞ EJ K2 bK = 1 EJK − 2 K τ (23) so that limK→∞ bK = 0. In this way we obtain: EMK,n (21) EJK + E1{JK =2k+1} + aK,n = = n n EJK E1{JK =2k+1} + aK,n (23) τ1 + bK E1{JK =2k+1} + aK,n (22) K2 + + = = 2 2 n n log ε log ε 1 1 σ2 + (bK + 2 (E1JK =2k+1 + aK,n )) 2 2 K log ε log ε µn (−ε, ε) = Recall that limn→∞ aK,n = 0, and n = K 2 |log ε|2 , so for fixed K for sufficiently small ε aK,n < 1. Also, E1{JK =2k+1} ≤ 1. Thus, we can let cK = bK + K32 and the lemma is proved. We are now ready to prove our main theorem. Theorem 3.10. Let µH be the expected spectral measure of H as defined by Definition 2.2. With notation and assumptions of Lemma 3.9 the following holds: µH (−ε, ε) = σ2 (1 + oε (1)) log2 ε Proof. Let n = K 2 |log ε|2 be equal to n = 2k for some k, with K > 0 to be chosen later. By Proposition 2.1 and choice of n = 2k , we have dK (µH , µn ) ≤ n1 . By the definition of the Kolmogorov distance, this implies: |µn (−ε, ε) − µH (−ε, ε)| ≤ 23 2 2 = 2 n K log2 ε By Lemma 3.9, there exists some ε(K) such that for all ε < ε(K) we have: µn (−ε, ε) − σ2 cK 2 ≤ log2 ε |log ε| Using the triangle inequality and multiplying by | log ε|2 /σ 2 we get   2 |log ε|2 1 µH (−ε, ε) · −1 ≤ 2 + cK . σ2 σ K2 Since limK→∞ cK = 0, for every δ > 0 we can find K(δ) such that the right hand side is smaller than δ for all ε < ε(K(δ)), which proves the claim. We now discuss how the above result relates to Dyson’s results from [Dys53]. Dyson 1 considers random variables λj and the matrix Λ defined by Λj+1,j = −Λj,j+1 = iλj2 and zero otherwise. He then proceeds to compute the function M (z), defined as the fraction of 1 √ √ eigenvalues of Λ inside the interval (− z, z). To translate to our setting, we put ai = λi2 in the definition of the operator Hn and note that Λ is conjugate√to Hn by a diagonal matrix A with Ak,k = (−i)k−1 . We then get M (z) = µH (−ε, ε) for ε = z. In Section VI, Dyson computes the asymptotics of M (z) explicitly for λj drawn from the nn λn−1 e−nλ , where n ≥ 1 is an integer parameter. These probability distribution Gn (λ) = (n−1)! asymptotics can be easily √ recovered from Theorem 3.10 by simply computing the variance Var log |ai | with ai = λi . For example, for n = 1 λj are exponential random variables and 2 by computing the variance of their logarithm we obtain µ(−ε, ε) ∼ |logCε|2 for C = 14 · π6 , which is in agreement √ with Dyson’s explicit computation (formula (72) in [Dys53]; the factor 1 comes from ε = z in the formula for M (z)). 4 4 4.1 Spectral measures for groups Random Schroedinger operators from group ring elements In this section, we use random Schroedinger operators to study spectral measures of group ring elements. The construction and exposition below is based on [Gra14]. We assume familiarity with Pontryagin duality for Abelian groups. Let Γ be a discrete group, M a discrete Abelian group and ρ : Γ y M an action of Γ c denote the Pontryagin dual of M . Each m ∈ M determines a function on M . Let X = M m b : X → C, given by m(x) = x(m), and by linearity we can extend this to C[M ], i.e. to any f ∈ C[M ] we associate fb : X → C, which we shall call the Fourier transform of f . Given ρ, we also have a dual action ρb : Γ y X, given by (b ρ(γ)(x))(m) = x(ρ(γ −1 ) · m). If we choose a generating set S for Γ, we can consider the Schreier graph Schr(Γ, X, S) associated to the dual action ρb. We consider the semidirect product corresponding to the action ρ, i.e. the group G = M o Γ. Let H ∈ C[G] be a self-adjoint group ring element, which we identify with the 24 corresponding self-adjoint operator H : `2 (G) → `2 (G). Every such element can be written as: X H= γ · fγ γ where fγ ∈ C[M ]. Let fbγ : X → C denote the dual of fγ . For x ∈ X, let Schr(x) denote the connected component of the Schreier graph Schr(Γ, X, S) containing x. We define Hx : `2 (Schr(x)) → `2 (Schr(x)) as the convolution operator on Schr(x) with the following edge labels. The label of edge from y to ρb(γ) · y is given by fbγ (y). Note that since X is equipped with the Haar measure ν, we can treat Hx as a random operator, where x is chosen randomly according to ν. For a self-adjoint H : `2 (G) → `2 (G), µH will denote its spectral measure, i.e. the unique measure such that for any k ≥ 0, we have: Z k δe , H δe = xk dµH (x) R where δe ∈ `2 (G) equals 1 at e (the identity element) and zero otherwise. In order to compute µH , we invoke the following theorem [Gra14], which gives the correspondence between the spectral measure of H and the expected spectral measure of Hx . Theorem 4.1. The spectral measure µH is equal to the expected spectral measure of the family Hx , i.e. for any Borel subset A: Z µH (A) = µHx (A)dν(x) X In the examples we study, we shall take Γ = Z and fγ 6= 0 only for γ = a, a−1 , where a = 1 is the standard generator of Z. In that case, the corresponding operator Hx can be easily described. If x ∈ X is chosen from the Haar measure ν on X, for almost every x Schr(x) will be isomorphic to Z, with the edge weight from n to n + 1 given by fbγ (b ρ(an )(x)). Therefore Hx is a random Schroedinger operator on Z, where the randomness in edge weights fbγ (b ρ(an )(x)) comes from the random choice of x. The above correspondence shows that in order to compute µH , it suffices to analyze the expected spectral measure of the random Schroedinger operator Hx . We shall now perform this computation for specific examples, using results derived in previous sections. 4.2 Semidirect products by hyperbolic matrices In this section we consider groups G of the following form.  Let  Z act on Z×Z by a hyperbolic 2 1 matrix A ∈ SL(2, Z). For concreteness we take A = . 1 1 Let G = Z × Z oA Z be the corresponding semidirect product. Let s, t be the standard generators of Z × Z and let a denote the generator of Z. Note that groups of this type correspond precisely to lattices in the Sol group [MS12]. 25 We consider the switch-walk operator H ∈ C[G] shifted by 5e: H = a · (s + t + s−1 + t−1 + 5e) + (s + t + s−1 + t−1 + 5e) · a−1 We shall prove the following theorem: Theorem 4.2. The spectral measure of H ∈ C[G] satisfies: µH (−ε, ε) = C (1 + oε (1)) log2 ε for some constant C > 0. In particular, the Novikov-Shubin invariant of H is equal to 0. We start with a technical lemma needed to ensure that assumptions of the main theorem are satisfied. Lemma 4.3. Let {Ui }∞ i=1 be a stationary sequence of random variables such that EUi = 0, 4 EUi < ∞. Let Ui1 ,...,ik = Ui1 · · · · · Uik . Assume that Ui1 ,...,ik satisfy uniformly exponential correlation decay, i.e. there exist c > 0 and λ < 1 such that for any l ≥ 2 and any i1 ≤ · · · ≤ ik ≤ ik+1 ≤ · · · ≤ il we have: EUi1 ,...,ik ,ik+1 ,...,il − EUi1 ,...,ik · EUik+1 ,...,il ≤ cλik+1 −ik Then Ui satisfy Condition 3.6 with γ = 4, i.e. for some constant C > 0: E(U1 + · · · + Un )4 ≤ Cn2 Proof. Let us expand: E(U1 + · · · + Un )4 = X EUi1 ,...,i4 1≤i1 ,...,i4 ≤n Let us order the indices so that i1 ≤ · · · ≤ i4 . We define a block of size l to be a maximal set of indices I = {ik , ik+1 , . . . , ik+l−1 } such that |ik+j − ik+j−1 | ≤ b log n for j = 1, . . . , l − 1, with b chosen so that cλb log n = n−2 . Consider a term in which there is a block containing only a single index ik . The number of such terms is at most n4 . By correlation decay, for each such term we can write: EUi1 ,...,ik−1 ,ik ,...,i4 ≤ EUi1 ,...,ik−1 · EUik ,...,i4 + n−2 ≤ EUi1 ,...,ik−1 · (EUik · EUik+1 ,...,i4 + n−2 ) + n−2 Since EUi = 0, the contribution from a single such term is O(n−2 ), so the total contribution from such terms is O(n2 ). If there is no block with only a single index, then there is either one block {i1 , i2 , i3 , i4 } or two blocks {i1 , i2 }, {i3 , i4 }. The number of one block terms is at most n · (b log n)3 = O(n2 ), so we only need to bound the contribution from the two block terms. Note that for any k: EUik ik+1 ≤ cλik+1 −ik 26 Since i3 − i2 > b log n, we have: EUi1 ,i2 ,i3 ,i4 ≤ EUi1 ,i2 · EUi3 ,i4 + n−2 ≤ c2 · λi2 −i1 · λi4 −i3 + n−2 The second term is again bounded by the number of possible terms n4 times n−2 , which gives O(n2 ). For the first term on the right hand side, there are n choices for i1 and i3 , and once these are chosen, summation over possible values of i2 and i4 gives a geometric series 1 , so we obtain that the total contribution is also O(n2 ). bounded by 1−λ Proof of Theorem 4.2. We apply the construction from Section 4.1. The Pontriagin dual of Z × Z is equal to T = S 1 × S 1 , with the dual action ρb given by ρb(a)(x) = AT x. To simplify expressions we define B = AT . Let f = s + t + s−1 + t−1 + 5e. The dual fb : T → C is given by: fb(z1 , z2 ) = 2Rez1 + 2Rez2 + 5 By construction from Section 4.1, the random Schroedinger operator corresponding to H is given as follows. The random edge weight from n to n + 1 is given by an = fb(B n x), where x ∈ T chosen uniformly from the Haar measure. It suffices to check that the random Schroedinger operator defined as above satisfies the explicitly, we obtain: assumptions of Theorem 3.10. Writing Ui = log a2i−1 a2i fb(B 2i−1 x) Ui = log fb(B 2i x) Letting φ : T → R be equal to: φ(y) = log 2Re(B −1 y1 ) + 2Re(B −1 y2 ) + 5 2Re(y1 ) + 2Re(y2 ) + 5 (24) and S = B 2 we can write Ui = φ(S i x). Note that, thanks to the shift by 5e, φ is a well defined C ∞ -function on T. We first check that Ui satisfy the functional Central Limit Theorem. We say that φ : T → R is a coboundary if there exists a measurable h such that φ = h − h ◦ S. We can invoke the functional Central Limit Theorem proved for actions of toral automorphisms in [LB99], which can be stated as follows: Proposition 4.4. Let S : T → T be a toral map generated by a hyperbolic matrix. Let φ ∈ L2 (T) with Fourier series: X φ(·) = ck · e2iπhk,·i k∈Z2 R such that c0 = T φ = 0. If φ is not a coboundary and the Fourier coefficients ck satisfy for some A > 0 and θ > 2: c(k1 ,k2 ) ≤ A 2 Y i=1 1 1 2 (1 + |ki |) logθ (2 + |ki |) then the functional Central Limit Theorem holds for the sequence {S i φ}∞ i=0 . 27 (25) This statement is implied by the main theorem of [LB99] via Remark 1 therein. Since φ as defined is (24) is a smooth function, its Fourier coefficients ck decay faster than any polynomial |k|−α , so in particular condition (25) is satisfied. It remains to check that φ is not a coboundary. To this end, it suffices to exhibit a Pk−1 k−1 i periodic orbit {x, Sx, . . . , S x} such that i=0 φ(S x) 6= 0. Recalling that S = B 2 and φ(y) = g(B −1 y) − g(y) for g(y) = log |2Rey1 + 2Rey2 + 5|, this is equivalent to: g(x) + g(B 2 x) + · · · + g(B 2k x) 6= g(Bx) + g(B 3 x) + · · · + g(B 2k+1 x) (26)   2 1 Recall that B = AT = . It is readily checked that the set {( 13 , 0), ( 32 , 13 ), ( 23 , 0), ( 13 , 23 )} 1 1 4 4 3 4 2 2 is periodic and corresponds to the set of points {(e 3 iπ , 1), (e 3 iπ , e 3 iπ ), (e 3 iπ , 1), (e 3 iπ , e 3 iπ )} ⊆ T. After computing both sides of (26) we conclude that they are not equal, which proves that φ is not a coboundary. Note that this is the only step of the proof where we use the specific form of the matrix A and the same proof will hold for different choices of A, provided one can prove that φ is not a coboundary (e.g. by exhibiting a suitable periodic orbit). The second step is to verify that Ui satisfy Condition 3.6. This is taken care of by Lemma 4.3, provided we can establish uniform exponential correlation decay. Actions of hyperbolic matrices are well known to satisfy such exponential decay of correlations for smooth observables. We use the main theorem from [Rue76], which implies the following as a special case: Proposition 4.5. Let S : T → T be a toral map generated by a hyperbolic matrix. Then there exist C, k > 0 such that if φ0 , φ00 : T → R are C 1 functions, we have: 0 00 0 µ((φ0 ◦ S −m ) · (φ00 ◦ S −m )) − µ(φ0 ) · µ(φ00 ) ≤ Ckφ0 kC 1 · kφ00 kC 1 · e−k|m −m R where µ(f ) = T f dµ and µ is the Lebesgue measure. 00 | We use the notation of Lemma 4.3. Let l ≥ 2 and let i1 ≤ · · · ≤ ik ≤ ik+1 ≤ · · · ≤ il be such that |ik+1 − ik | ≥ n. Define: 0 φ (x) = Ui1 +n,...,ik +n = k Y Uij +n = j=1 00 φ (x) = Uik+1 ,...,il = l Y j=k+1 Uij = k Y φ(S ij +n x) j=1 l Y φ(S ij x) j=k+1 so that EUi1 ,...,ik = µ(φ0 ◦ S −n ) = µ(φ0 ) and EUik+1 ,...,il = µ(φ00 ). With this notation, we have: Ui1 ,...,il = l Y Uij = (φ0 ◦ S −n ) · φ00 j=1 0 −n 00 and EUi1 ,...,il = µ((φ ◦ S ) · φ ). Note that kφ0 kC 1 , kφ00 kC 1 are bounded by a global constant that depends only on l and kφkC 1 . Applying Proposition 4.5 for m0 = 0, m00 = n proves that the assumptions of Lemma 4.3 are satisfied, so Ui satisfy Condition 3.6. 28 4.3 Lamplighter groups We shall now describe how a similar approach can be used for computing spectral measures of lamplighter groups. We start with the standard lamplighter group Z2 o Z = ⊕Z Z2 o Z. Let Z2 = {e, t}. Let e0 denote the element of ⊕Z Z2 that has e at every position and let ti denote the element of ⊕Z Z2 that has t at position zero and e elsewhere. Consider the switch-walk operator H ∈ C[Z2 o Z] given by: H = a · (p · e0 + (1 − p) · t0 ) + (p · e0 + (1 − p) · t0 ) · a−1 so letting fa = p · e0 + (1 − p) · t0 we have: H = a · fa + fa · a−1 This operator corresponds to the random walk on G where at each step we move either left or right and then either leave the current lamp intact with probability p or change it with probability 1 − p. Q The Pontriagin dual of M = ⊕Z Z2 is equal to X = Z Z2 , with the Haar measure on X being the usual product measure. Since ρ : Z y M is action by translations, the dual action ρb : Z y X is given by (b ρ(a)(y))j = yj−1 , i.e. the Bernoulli shift. Therefore, the edge weights in the corresponding random Schroedinger operator will be Q Q i.i.d. with distribution y0 b b determined by fa : Z Z2 → C. Since eb0 = 1, t0 = (−1) , for y ∈ Z Z2 we have: fba (y) = p + (1 − p)(−1)y0 so the edge weight is equal to 1 or 2p − 1 with probability We consider p 6= 1 , 2 1 2 each. as otherwise the relevant random variables log a2i−1 a2i are infinite with positive probability (note that p = 21 gives edge weights 0 or 1, i.e. the edge percolation on Z). For such an operator we can apply Theorem 3.10 and obtain the spectral measure at zero to be µH (−ε, ε) ≈ |logCε|2 , with C = 14 (log |2p − 1|)2 . A similar approach can be used for general lamplighter groups of the form G = Λ o Z, where the lamp group Λ is not necessarily Abelian or finite. Let Λ be generated by a set S P 1 s closed under inverses and let λ = |S| s∈S 0 . Consider the switch-walk operator H ∈ C[G] given by: H = a · λ + λ · a−1 Such an operator corresponds to the random walk on G where at each step we move either left or right and then change the lamp by performing a step of a simple random walk in Λ. In this setting, it is known (Grabowski and Virág, unpublished) that the random Schroedinger operator corresponding to H is obtained by putting i.i.d. weights on the edges, each drawn from the distribution given by µλ , the spectral measure of the simple random walk on Λ. As before, we are in position to use Theorem 3.10 and get µH (−ε, ε) ≈ |logCε|2 . NoteP that this method can be extended to H of more general form, where instead of 1 λ = |S| s∈S s0 we consider general elements f ∈ C[⊕Z Λ], in particular, involving si for 29 i 6= 0. In that case, the edge weights in the corresponding random Schroedinger operator will not be independent anymore. However, what remains true is the edge weights are obtained by a factor of i.i.d. process. More precisely, if f contains only si for |i| ≤ k, the edge weights in the operator will be obtained as follows - we put i.i.d. labels on the edges and then each edge is assigned a weight that depends only on the labels in a neighborhood of that edge of size k. Thus, the obtained weights are weakly dependent and the same technique as in Section 4.2 can be used to obtain the theorem in this case. Acknowledgements The work was supported by the Canada Research Chair program, the Marie Curie grant SPECTRA, the OTKA grant K109684, and the NSERC Discovery Accelerator Program. References [Bil95] Patrick Billingsley, Probability and Measure, 3 ed., Wiley-Interscience, April 1995. [BS10] Zhidong Bai and Jack W. Silverstein, Spectral analysis of large dimensional random matrices, second ed., Springer Series in Statistics, Springer, New York, 2010. [BSV13] Charles Bordenave, Arnab Sen, and Balint Virag, Mean quantum percolation, http: //arxiv.org/abs/1308.3755, 2013. [CP89] Massimo Campanino and J. Fernando Perez, Singularity of the density of states for one-dimensional chains with random couplings, Communications in Mathematical Physics 124 (1989), no. 4, 543–552. [Dur10] R. Durrett, Probability: Theory and examples, Cambridge Series in Statistical and Probabilistic Mathematics, Cambridge University Press, 2010. [Dys53] Freeman J. Dyson, The dynamics of a disordered linear chain, Phys. Rev. 92 (1953), 1331–1338. [Eck00] Beno Eckmann, Introduction to l2-methods in topology: Reduced l2-homology, harmonic chains, l2-betti numbers, Israel Journal of Mathematics 117 (2000), no. 1, 183–219 (English). [ER78] T. P. Eggarter and R. Riedinger, Singular behavior of tight-binding chains with off-diagonal disorder, Phys. Rev. B 18 (1978), 569–575. [Gra14] Lukasz Grabowski, On turing dynamical systems and the atiyah problem, Inventiones mathematicae 198 (2014), no. 1, 27–69 (English). [GV] Lukasz Grabowski and Balint Virag, Spectra of lamplighter graphs via random schrodinger operators, http://people.maths.ox.ac.uk/grabowski/ lamplighters_via_schroedinger.pdf. 30 [Kal02] O. Kallenberg, Foundations of modern probability, Probability and Its Applications, Springer New York, 2002. [LB99] Stéphane Le Borgne, Limit theorems for non-hyperbolic automorphisms of the torus, Israel Journal of Mathematics 109 (1999), no. 1, 61–73 (English). [LL95] John Lott and Wolfgang Lück, L 2-topological invariants of 3-manifolds, Inventiones mathematicae 120 (1995), no. 1, 15–60 (English). [Lüc02] W. Lück, L2-invariants: Theory and applications to geometry and k-theory, A Series of Modern Surveys in Mathematics Series, Springer, 2002. [Mó76] F. Móricz, Moment inequalities and the strong laws of large numbers, Zeitschrift für Wahrscheinlichkeitstheorie und Verwandte Gebiete 35 (1976), no. 4, 299–314 (English). [MP10] P. Mörters and Y. Peres, Brownian motion, Cambridge Series in Statistical and Probabilistic Mathematics, Cambridge University Press, 2010. [MS12] Emil Molnár and Jenő Szirmai, Classification of sol lattices, Geometriae Dedicata 161 (2012), no. 1, 251–275 (English). [Rue76] David Ruelle, A measure associated with axiom-a attractors, Am. J. Math. 98 (1976), 619–654 (English). 31
4math.GR
IEEE COMMUNICATIONS LETTERS 1 Joint Fractional Time Allocation and Beamforming for Downlink Multiuser MISO Systems arXiv:1706.01771v2 [cs.IT] 28 Aug 2017 Van-Dinh Nguyen, Hoang Duong Tuan, Trung Q. Duong, Oh-Soon Shin, and H. Vincent Poor Abstract—It is well-known that the traditional transmit beamforming at a base station (BS) to manage interference in serving multiple users is effective only when the number of users is less than the number of transmit antennas at the BS. Non-orthogonal multiple access (NOMA) can improve the throughput of users with poorer channel conditions by compromising their own privacy because other users with better channel conditions can decode the information of users in poorer channel state. NOMA still prefers that the number of users is less than the number of antennas at the BS transmitter. This paper resolves such issues by allocating separate fractional time slots for serving the users with similar channel conditions. This enables the BS to serve more users within the time unit while the privacy of each user is preserved. The fractional times and beamforming vectors are jointly optimized to maximize the system’s throughput. An efficient path-following algorithm, which invokes a simple convex quadratic program at each iteration, is proposed for the solution of this challenging optimization problem. Numerical results confirm its versatility. Index Terms—Beamforming, fractional time allocation, nonconvex optimization, path-following method. I. I NTRODUCTION In multi-user communication, the signal received by any user (UE) is a superposition of the desired information and the information intended for other UEs. Transmit beamforming at a base station (BS) plays a pivotal role in focusing the energy of the desired signal and suppressing the multi-user interference to achieve better throughput at UEs [1], [2]. For effective beamforming, the number of UEs usually does not exceed the number of transmit antennas. Using more transmit antennas and thus increasing the dimensionality of beamforming vectors can improve the UEs’ throughput with reduced transmit power. However, allocating more transmit power under fixed number of transmit antennas still does not necessarily improve the UEs’ throughput. This work was supported in part by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. NRF2017R1A5A1015596), in part by Basic Science Research Program through the NRF funded by the Ministry of Education (No. 2017R1D1A1B03030436), in part by the U.K. Royal Academy of Engineering Research Fellowship under Grant RF1415/14/22 and by the U.K. Engineering and Physical Sciences Research Council (EPSRC) under Grant EP/P019374/1, and in part by the KAUST Grant No. OSR-2016-CRG5-2958-0 and U.S. National Science Foundation Grant ECCS-1647198. (Corresponding author: Oh-Soon Shin.) V.-D. Nguyen and O.-S. Shin are with the School of Electronic Engineering and the Department of ICMC Convergence Technology, Soongsil University, Seoul 06978, Korea (e-mail: {nguyenvandinh, osshin}@ssu.ac.kr). H. D. Tuan is with the Faculty of Engineering and Information Technology, University of Technology Sydney, Broadway, NSW 2007, Australia (email: [email protected]). T. Q. Duong is with the School of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast, Belfast BT7 1NN, United Kingdom (e-mail: [email protected]). H. V. Poor is with the Department of Electrical Engineering, Princeton University, Princeton, NJ 08544 USA (e-mail: [email protected]). Non-orthogonal multiple access (NOMA) [3], [4] has been introduced to improve the UEs’ throughput by allowing UEs with better channel conditions to access and decode the signals, which are intended for the UEs with poorer channel conditions. In other words, the UEs with poorer channel conditions can achieve higher throughput by compromising their information privacy in NOMA [5]. This privacy compromise for the UEs with poor channel conditions is unavoidable in NOMA. Moreover, by restricting all beamforming vectors in the same space, beamforming in NOMA still needs that the dimension of this space, which is equal to the number of transmit antennas, should not be less than the number of UEs to allow the suppression of multiuser interference [6]. It is noteworthy that the UEs with good channel conditions may need only a fraction of the time unit to achieve their needed throughput. Therefore, by serving them only per fractional time, the BS still has the remaining time room to serve the UEs with poor channel conditions. In this way, the information privacy for each UE is preserved because all UEs are allowed to decode their own information only. More importantly, the number of UEs supported at the same fractional time is effectively reduced. Thus, the BS will not need more transmit antennas to suppress the multi-user interference. In this letter, the fractional time allocation to UEs with similar channel conditions and beamforming are enhanced for improving the system’s throughput and meeting the UEs’ quality-of-service (QoS) in terms of the throughput requirement. This problem is mathematically modelled by a highly nonconvex optimization problem, for which a path-following computational procedure of low complexity is then developed for its computation. Finally, the numerical examples are provided to demonstrate the advantage of the proposed optimization scheme. Notation. We use bold upper-case letters for matrices, bold lower-case letters for column vectors, lower-case letters for scalars. ℜ{x} denotes the real part of a complex number x. The notation (·)H stands for the Hermitian transpose. x ∼ CN (η, Z) means that x is a random vector following a complex circular Gaussian distribution with mean η and covariance matrix Z. II. S YSTEM M ODEL AND P ROBLEM F ORMULATION Consider a multiuser downlink system over a given frequency band with a BS equipped with Nt > 1 antennas in serving 2K single-antenna UEs as illustrated by Fig. 1. There are K UEs (1, k), k = 1, . . . K, which are located in a zone nearer to the BS, called by zone-1, and K UEs (2, k), k = 1, . . . , K, which are located in a zone farer from the BS, called by zone-2. Denote by K , {1, 2, . . . , K} and M = {1, 2}×K. Within one time unit, BS uses the fraction time (FT) τ1 := τ (0 < τ < 1) 2 IEEE COMMUNICATIONS LETTERS 500 to serve UEs (1, k) and uses the remaining FT τ2 := (1 − τ ) to serve UEs (2, k). The BS deploys a transmit beamformer wi,k ∈ CNt ×1 to deliver the information signal xi,k with E{|xi,k |2 } = 1 to UE (i, k). Let hi,k ∈ CNt ×1 be the channel vector from the BS to UE (i, k), which is assumed to follow frequency flat fading with the effects of both large-scale pathloss and small-scale fading counted. The complex baseband signal received by UE (i, k) can be expressed as X yi,k = hH i,k wi,k xi,k + Ri,k wi , τi 2 |hH i,k wi,k | 2 2 |hH i,k wi,j | + σi,k j∈K\{k} 2 2 |hH i,k wi,j | + σi,k  (1) under the additional condition ℜ{hH i,k wi,k } ≥ 0, (i, k) ∈ M. 2 (ℜ{hH i,k wi,k }) (i,j)∈M\{(i,k)} 2 2 |hH i,k wi,j | + σi,k w,τ X (i,k)∈M y-coordinate (m) (2,4) Ri,k (wi , τi ) s.t. (2),  Ri,k wi , τi ≥ R̄i,k , ∀(i, k) ∈ M, max τ1 kw1 k2 + τ2 kw2 k2 ≤ Pbs , τ1 ≥ 0, τ2 ≥ 0, τ1 + τ2 ≤ 1. 100 300 500 Scenario with K = 4. III. C ONVEX Q UADRATIC - BASED PATH - FOLLOWING METHOD 1/α1 + 1/α2 ≤ 1, α1 > 0, α2 > 0. (i,k)∈M Ri,k (wi , 1/αi ) ≥ R̄i,k , ∀(i, k) ∈ M, 2  (3) (4a) (4b) (4c) (4d) Here R̄i,k sets a minimum throughput requirement for UE (i, k) max and Pbs is a given power budget. Since Ri,k (wi , τi ) is a nonconcave function, the optimization problem (4) is regarded as a highly nonconvex optimization problem, for which finding a feasible point is already computationally difficult. The next section is devoted to a computational path-following procedure for its solution. (5) The problem (4) can be equivalently expressed as X Ri,k (wi , 1/αi ) s.t. (2), (5), (6a) max Φ(w, α ) , (2) with the full inter-zone interference. Here and in the sequence w , (w1 , w2 ) and τ , (τ1 , τ2 ). We are interested in the following problem of jointly designing FT (τ1 , τ2 ) and the beamformers (w1 , w2 ) to maximize the system sum throughput (ST): max (2,1) (1,3) −500 −500 −300 −100 α w,α The main advantage of this FT-based beamforming scheme is that there is no inter-zone interference in (1) that is in contrast with the conventional scheme to concurrently serve all UEs, under which the throughput at UE (i, k) is  ′ Ri,k (w) = ln 1 + P (2,2) The most important step is to provide an effective lower bounding approximation for the function Ri,k (wi , τi ) defined by (1) to facilitate a path-following computational procedure of the problem (4). We use the variable changes α , (α1 , α2 ) = (1/τ1 , 1/τ2 ), which satisfy the following convex constraint:  which by [7] can be equivalently reformulated by 2 (ℜ{hH i,k wi,k }) (1,4) (1,1) −300 Fig. 1. j∈K\{k}   Ri,k wi , τi = τi ln 1 + P −100 (1,2) x-coordinate (m) where the first term is the desired signal, the second term is the 2 multi-user interference, and the third term ni,k ∼ CN (0, σi,k ) is additive noise. For wi , (wi,k )k∈K , the throughput at UE (i, k) is  = τi ln 1 + P (2,3) 100 hH i,k wi,j xi,j + ni,k j∈K\{k}  300 BS UEs in zone-1 UEs in zone-2 2 (1 − 1/α2 )kw1 k + kw2 k /α2 ≤ (6b) max Pbs . (κ) (6c) (κ) At a feasible point (w(κ) , α (κ) ), define xi,k , ℜ{hH i,k wi,k } > P (κ) (κ) (κ) 2 (κ) (κ) 2 H 2 0, yi,k , j∈K\{k} |hi,k wi,j | + σi,k , di,k , (xi,k ) /yi,k > (κ) (κ) (κ) (κ) (κ) (κ) 0, ai,k , 2Ri,k (wi , 1/αi ) + di,k /αi (di,k + 1) > (κ) (κ) (κ) (κ) (κ) 0, bi,k , (di,k )2 /αi (di,k + 1) > 0, and ci,k , (κ) (κ) Ri,k (wi , 1/(αi )2 ) > 0. It follows from the inequality (13) in the appendix that (κ) Ri,k (wi , 1/αi ) ≥ Ri,k (wi , αi ) over the trust region (κ) H 2ℜ{hH i,k wi,k } − ℜ{hi,k wi,k } > 0, ∀(i, k) ∈ M, (7) for the concave function (κ) Ri,k (wi , αi ) , (κ) (κ) ai,k −bi,k 2 2 H j∈K\{k} |hi,k wi,j | + σi,k (κ) −ci,k αi . (κ) (κ) H xi,k (2ℜ{hi,k wi,k } − xi,k ) P Next, due to the convexity of function kw1 k2 /α2 , it is true that (κ) (κ) (κ) (κ) kw1 k2 /α2 ≥ 2ℜ{(w1 )H w1 }/α2 − (kw1 k2 /(α2 )2 )α2 . An inner convex approximation of nonconvex constraint (6c) is then given by (κ) (κ) kw1 k2 + kw2 k2 /α2 − 2ℜ{(w1 )H w1 }/α2 (κ) (κ) +(kw1 k2 /(α2 )2 )α2 max ≤ Pbs . (8) Initialized by a feasible point (w(0) , α (0) ) for (6), the following convex quadratic program (QP) is solved at the κ-th iteration NGUYEN et al.: JOINT FRACTIONAL TIME ALLOCATION AND BEAMFORMING FOR DOWNLINK MULTIUSER MISO SYSTEMS (κ+1) TABLE I S IMULATION PARAMETERS Parameters Noise power density Path loss from the BS to UE (i, k), σPL Radius of cell Coverage of zone-1 UEs Distance between the BS and nearest user α(κ+1) to generate the next feasible point (w ,α ): X (κ) Ri,k (wi , αi ) s.t. max Φ(κ) (w, α ) , α w,α (i,k)∈M ≥ R̄i,k , ∀(i, k) ∈ M, (2), (5), (7), (8). (9) As problem (9) involves m = 2(3K + 1) quadratic and linear constraints, and n = 2(KNt + 1) real decision variables, its computational complexity is O(n2 m2.5 + m3.5 ). Note that Φ(w, α ) ≥ Φ(κ) (w, α ) ∀(w, α ), (κ) (κ) (κ) and Φ(w , α ) = Φ (w(κ) , α (κ) ). Moreover, (κ) (κ+1) (κ+1) Φ (w ,α ) > Φ(κ) (w(κ) , α (κ) ) whenever (κ+1) (κ+1) (κ) (w ,α ) 6= (w , α (κ) ) because the former and the latter, respectively, are the optimal solution and feasible point for (9). Therefore, Φ(w(κ+1) , α (κ+1) ) ≥ Φ(κ) (w(κ+1) , α (κ+1) ) > Φ(κ) (w(κ) , α (κ) ) = Φ(w(κ) , α (κ) ), showing that (w(κ+1) , α (κ+1) ) is a better feasible point than (w(κ) , α (κ) ) for (6). The sequence {(w(κ) , α (κ) )} of improved feasible points for (6) thus converges at least to a locally optimal solution satisfying the Karush-Kuh-Tucker conditions [8]. We summarize the proposed QP-based path-following procedure in Algorithm 1. Generation of an initial point.: Initialized from a feasible point (w(0) , α (0) ) for constraints (5) and (8), we iterate the convex program (κ) max min Ri,k (wi , αi )/R̄i,k α (i,k)∈M w,α (κ) s.t. (2), (5), (7), (8) (10) (κ+1) (κ+1) )/R̄i,k ≥ 1 to , αi till reaching min(i,k)∈M Ri,k (wi make (w(κ+1) , α (κ+1) ) feasible for (6) and thus usable as an initial feasible point for implementing Algorithm 1. IV. N UMERICAL R ESULTS Monte Carlo simulations have been implemented to evaluate the performance of the proposed algorithm for K = 4 (8 UEs) and Nt = 5 per the scenario in Fig. 1. The channel vector hi,k between the BS and UE√(i, k) at a distance di,k (in kilometres) is generated as hi,k = 10−σPL /10 h̃i,k , where σPL is the path loss (PL) in dB and h̃i,k ∼ CN (0, INt ) represents small-scale effects. The other parameters are given by Table I. Without loss of generality, R̄i,k ≡ R̄ is set. The numerical results are obtained using the parser YALMIP [9]. We compare the performance of the proposed FTbased beamforming scheme with five other beamforming schemes: (i) “Conventional DL,” under which the problem is formulated similarly as: P of ST maximization ′ ′ maxw (i,k)∈M Ri,k (w) s.t. Ri,k (w) ≥ R̄i,k , (i, k) ∈ 50 Proposed FT NOMA FT + NOMA in both zones FT + NOMA in zone-1 FT + NOMA in zone-2 Conventional DL 40 30 20 20 25 30 35 max Transmit power at the BS, Pbs [dBm] 40 (a) R̄ = 0 bps/Hz. 60 Average sum throughput (bps/Hz) (κ) Ri,k (wi , αi ) Value -174 [dBm/Hz] 128.1 + 37.6log10 (di,k ) [dB] 500 [m] 200 [m] > 10 [m] 60 Average sum throughput (bps/Hz) Algorithm 1 QP-based path-following algorithm for ST maximization problem (4) Initialization: Iterate (10) for an initial feasible point (w(0) , α (0) ). Set κ := 0 1: repeat 2: Solve convex quadratic program (9) to obtain the optimal solution: (w(κ+1) , α (κ+1) ). 3: Set κ := κ + 1. 4: until Convergence 3 50 40 Proposed FT NOMA FT + NOMA in both zones FT + NOMA in zone-1 FT + NOMA in zone-2 Conventional DL 30 20 10 20 25 30 35 max Transmit power at the BS, Pbs [dBm] 40 (b) R̄ = 1 bps/Hz. Fig. 2. max . Average sum throughput versus Pbs max M, kw1 k2 + kw2 k2 ≤ Pbs under the definition (3); (ii) “NOMA”: each UE in zone-1 is paired with an UE in zone2 according to the clustering algorithm in [10] to create a virtual cluster. In each cluster, both UEs decode the signal intended for the UE in zone-2 and then the UE in zone-1 processes successive interference cancellation (SIC) to cancel the interference of the UE in zone-2 in decoding its own signal; (iii) “FT + NOMA in both zones”: under FT, NOMA is zonewide adopted; (iv) “FT + NOMA in zone-1”: under FT, NOMA is adopted only in zone-1; and (v) “FT + NOMA in zone-2”: under FT, NOMA is adopted only in zone-2. The reader is referred to [6, Sec. V] for beamforming under NOMA, which is used in these five schemes. The computational complexity of each iteration in NOMA is similar to that of (9). Note that the performance of NOMA-based beamforming can be improved by involving more UEs in virtual clusters [6, Sec VI] but the UEs’ privacy is more compromised. On average, Algorithm 1 requires about 10 iterations for convergence. Fig. 2 plots the average achievable ST versus the transmit max power Pbs for Nt = 5. For R̄ = 0 bps/Hz shown in Fig. 2(a), one can see that the ST of the proposed FT-based beamforming is higher than that achieved by the other schemes in the high transmit power region. On the other hand, the conventional DL outperforms NOMA and FT+NOMA schemes for high transmit 4 IEEE COMMUNICATIONS LETTERS Average sum throughput (bps/Hz) 60 40 20 0.4 0.6 0.8 1 Throughput threshold, R̄ [bps/Hz] 1.2 max = 30 dBm. Average sum throughput versus R̄ for Pbs Average max-min throughput (bps/Hz) Fig. 4. V. C ONCLUSIONS The paper has proposed a fractional time-based beamforming scheme at a base station to serve two groups of users, which is able to improve the network throughput while preserving the information privacy for the users. Accordingly, a pathfollowing computational procedure for the joint design of fractional times and beamforming vectors to maximize the network throughput has been developed. Extensive simulations have been provided to demonstrate the superior performance of the proposed scheme over the exiting schemes. 30 10 0.2 Fig. 3. others schemes. Proposed FT NOMA FT + NOMA in both zones FT + NOMA in zone-1 FT + NOMA in zone-2 Conventional DL 50 5 4 3 Proposed FT NOMA FT + NOMA in both zones FT + NOMA in zone-1 FT + NOMA in zone-2 Conventional DL A PPENDIX For all x > 0, x̄ > 0, y > 0, ȳ > 0, t > 0, and t̄ > 0, it is true that ln(1 + x2 /y) y (12) ≥ a − b 2 − ct t x y − ct (13) ≥ a−b x̄(2x − x̄) 2 1 0 20 25 30 35 max Transmit power at the BS, Pbs [dBm] over the trust region 40 2x − x̄ > 0, max . Average max-min throughput versus Pbs power by making the ST concentrated at those UEs with good channel conditions. Apparently, NOMA does not look efficient when there is no UEs’ QoS requirement. In Fig. 2(b) with R̄ = 1 bps/Hz, the conventional DL performs worse than NOMA max at high Pbs . The low STs of FT+NOMA-based schemes are probably attributed to the fact that NOMA is more efficient by max exploiting their channel differentiation. Increasing Pbs leads to a remarkable gain in ST by the proposed FT compared with the other schemes. In addition, the proposed FT is feasible in max all range of Pbs while the other schemes cannot offer such max high QoS to UEs at low Pbs . The plot of the ST versus QoS requirement threshold R̄ ∈ [0.2, 1.2] bps/Hz is illustrated in Fig. 3. We can observe that the proposed FT-based beamforming performs quite well and only slightly degrades when R̄ increases. The performance gap between the proposed FT-based beamforming and other schemes substantially increases by increasing R̄. It is expected because the proposed FT-based beamforming can tune the power allocation in meeting zone-2 UEs’ QoS requirements without causing interference to the zone-1’s UEs. Next, we look for the max-min UE throughput optimization problem max min Ri,k (wi , τi ) w,τ (i,k)∈M s.t. (4c), (4d) (11) which can be addressed similarly by solving the convex program (10) (with R̄i,k ≡ 1) at each iteration. Fig. 4 plots the average UEs’ worst throughput as a function max of Pbs . It shows that the worst throughput achieved by the conventional DL and FT + NOMA-based schemes is saturated max once Pbs is beyond a threshold. It also reveals that the proposed FT-based beamforming and FT + NOMA in zone1 achieve worst throughput that is higher than that achieved by (14) 2 where a = 2[ln(1+d)]/t̄+d/t̄(d+1) > 0, b = d /t̄(d+1) > 0, c = [ln(1 + d)]/t̄2 > 0, d = x̄2 /ȳ. Inequality (12) follows from [11] while inequality (13) is obtained by using x2 ≥ x̄(2x − x̄) > 0 over the trust region (14). R EFERENCES [1] X. Shang, B. Chen, and H. V. Poor, “Multiuser MISO interference channels with single-user detection: Optimality of beamforming and the achievable rate region,” IEEE Trans. Inf. Theory, vol. 57, no. 7, pp. 4255– 4273, July 2011. [2] G. Caire and S. Shamai, “On the achievable throughput of a multiantenna Gaussian broadcast channel,” IEEE Trans. Inf. Theory., vol. 49, no. 7, pp. 1691 – 1706, July 2003. [3] Z. Ding, R. Schober, and H. V. Poor, “A general MIMO framework for NOMA downlink and uplink transmission based on signal alignment,” IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 4483–4454, June 2016. [4] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C. L. I, and H. V. Poor, “Application of non-orthogonal multiple access in LTE and 5G networks,” IEEE Commun. Mag., vol. 55, no. 2, pp. 185–191, Feb. 2017. [5] Z. Ding, F. Adachi, and H. V. Poor, “The application of MIMO to nonorthogonal multiple access,” IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 537–552, Jan. 2016. [6] V.-D. Nguyen, H. D. Tuan, T. Q. Duong, H. V. Poor, and O.-S. Shin, “Precoder design for signal superposition in MIMO-NOMA multicell networks,” IEEE J. Select. Areas Commun., 2017, to appear, available at http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7974739. [7] A. Wiesel, Y. Eldar, and S. Shamai, “Linear precoding via conic optimization for fixed MIMO receivers,” IEEE Trans. Signal Process., vol. 54, no. 1, pp. 161 – 176, Jan. 2006. [8] B. R. Marks and G. P. Wright, “A general inner approximation algorithm for nonconvex mathematical programms,” Operations Research, vol. 26, no. 4, pp. 681–683, July 1978. [9] J. Löfberg, “YALMIP: A toolbox for modeling and optimization in MATLAB,” in Proc. 2004 IEEE Inter. Symposium on Computer Aided Control Systems Design, Sept. 2004, pp. 284–289. [10] B. Kimy, S. Lim, H. Kim, S. Suh, J. Kwun, S. Choi, C. Lee, S. Lee, and D. Hong, “Non-orthogonal multiple access in a downlink multiuser beamforming system,” in Proc. IEEE Military Commun. Conf. (MILCOM), Nov. 2013, pp. 1278–1283. [11] V.-D. Nguyen, T. Q. Duong, H. D. Tuan, O.-S. Shin, and H. V. Poor, “Spectral and energy efficiencies in full-duplex wireless information and power transfer,” IEEE Trans. Commun., vol. 65, no. 5, pp. 2220–2233, May 2017.
7cs.IT
arXiv:1712.08418v2 [math.GR] 8 Jan 2018 ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Abstract. There are several natural families of groups acting on rooted trees for which every member is known to be amenable. It is, however, unclear what the elementary amenable members of these families look like. Towards clarifying this situation, we here study elementary amenable bounded automata groups. We are able to isolate the elementary amenable bounded automata groups in three natural subclasses of bounded automata groups. In particular, we show that iterated monodromy groups of post-critically finite polynomials are either virtually abelian or not elementary amenable. Contents 1. Introduction 2. Preliminaries 3. Reduced form 4. Technical results 5. Groups containing odometers 6. Kneading automata groups 7. Generalized basilica groups 8. Groups of abelian wreath type 9. Examples References 1 5 8 11 15 21 28 35 41 45 1. Introduction A group G is amenable if there exists a finitely additive translation invariant probability measure on all subsets of G. This definition was given by J. von Neumann, [23], in response to the Banach-Tarski and Hausdorff paradoxes. He singled out the property of a group which forbids paradoxical actions. The class of elementary amenable groups, denoted by EG, was introduced by M. Day in [6] and is defined to be the smallest class of groups that contains the finite groups and the abelian groups and is closed under taking Date: January 9, 2018. The second author was supported by NSA MSP #H98230-16-1-0047. 1 2 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK subgroups, quotients, extensions, and directed unions. The fact that the class of amenable groups is closed under these operations was already known to von Neumann, [23], who noted at that at that time there was no known amenable group which did not belong to EG. No substantial progress in understanding the class of elementary amenable groups was made until the 80s. C. Chou, [5], showed that all elementary amenable groups have either polynomial or exponential growth. Shortly thereafter, R. Grigorchuk, [9], gave an example of a group with intermediate growth, and such groups are necessarily amenable but by Chou’s work are not elementary amenable. Grigorchuk’s group served as a starting point in developing the theory of groups with intermediate growth. In the same paper, Chou showed that every infinite finitely generated simple group is not elementary amenable. In [14], it was shown that the topological full group of a Cantor minimal system is amenable, and by the results of H. Matui, [16], this group has a simple and finitely generated commutator subgroup, in particular, it is not elementary amenable. This was the first example of an infinite finitely generated simple amenable group. The strategy of Matui has been extended in [4] and [17] to minimal actions of Zd and groupoids, respectively. This has produced more examples of finitely generated simple amenable groups in combination with results of [13], where it is demonstrated that there are minimal actions of Z2 on the Cantor set with amenable topological full groups. Groups of automorphisms of rooted trees were the only source of groups of intermediate growth until a recent result of V. Nekrashevych, [20], who found finitely generated, torsion subgroups of the topological full group of intermediate growth. These groups cannot act on rooted tree, since they are simple. Summarizing the above, the currently known sources of non-elementary amenable groups are groups acting on rooted trees and topological full groups of Cantor minimal systems. There has been considerable progress in establishing amenability of groups acting on rooted trees. L. Bartholdi, V. Kaimanovich, and Nekrashevych in [2] proved that groups acting on rooted trees with bounded activity are amenable; these are the so-called bounded automata groups. This was extended to groups of linear activity by G. Amir, O. Angel, and B. Virág in [1], and in [15], Nekrashevych, M. de la Salle, and the first named author extended this result further to groups of quadratic activity. These results produce large families of amenable groups, but they do not identify the non-elementary amenable members of the families. The first named author established what seems to be the first results studying the elementary amenable groups that act on rooted trees in [12]. The present article picks up this thread of research again. We here consider the elementary amenable bounded automata groups. ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 3 Question 1.1. What do elementary amenable bounded automata groups look like? How close are they to abelian? Question 1.1 in full generality seems out of reach at the moment. We answer here the question for three large classes of bounded automata groups, which contain many of the hitherto studied examples. Two of these classes are new, and they appear to be interesting in their own right. We additionally present several examples which place restrictions on how one might specify “close to abelian.” 1.1. Iterated monodromy groups. The iterated monodromy groups of post-critically finite polynomials, see [18, Chapter 5], form a compelling and natural class of bounded automata groups. The study of these groups has generated a significant body of research in both dynamics and group theory. See, for example, [8, 19]. For this class of groups, we answer the motivating question completely. Theorem 1.2 (See Corollary 6.11). Every iterated monodromy group of a post-critically finite polynomial is either virtually abelian or not elementary amenable. 1.2. Generalized basilica groups. For a finite set X, let X ∗ be the free monoid on X. By identification with its Cayley graph, X ∗ is naturally a rooted tree. For g ∈ Aut(X ∗ ) and v ∈ X ∗ , the section of g at v is denoted by gv ; see Section 2 for the relevant definitions. Definition 1.3. We say that G ≤ Aut(X ∗ ) is a generalized basilica group if G admits a finite generating set Y such that for every g ∈ Y either gx = 1 for all x ∈ X or gx ∈ {1, g} for all x ∈ X with exactly one x such that gx = g. Remark 1.4. The classical basilica group can be represented as a generalized basilica group. The representation is given by considering the natural action of the basilica group on [4]∗ , the 4-regular rooted tree, by restricting the action on the binary tree to even levels; see Example 3.11. A key feature of generalized basilica groups is a reduction theorem, Theorem 7.7, which reduces the analysis to self-replicating groups. Using this reduction, we answer the motivating question for a class of generalized basilica groups for which we have some control over the “cycle structure” of the generators. Definition 1.5. Let G = hY i ≤ Aut(X ∗ ) be a generalized basilica group. We say that G is balanced if for each g ∈ Y such that there is x ∈ X for which gx = g, the least n ≥ 1 for which g n fixes x is also such that gn fixes X. Note that the basilica group acting on [4]∗ is balanced. Theorem 1.6 (See Corollary 7.18). Every balanced generalized basilica group is either (locally finite)-by-(virtually abelian) or not elementary amenable. 4 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Examples 9.1 show our theorem for balanced groups cannot be sharpened. While a proof eludes us, we expect the following conjecture to hold. Conjecture 1.7. Every generalized basilica group is either (locally finite)by-(virtually abelian) or not elementary amenable The class of generalized basilica groups encompasses the torsion-free bounded automata groups, suggesting it is a natural class. Proposition 1.8 (See Corollary 3.9). If G ≤ Aut(X ∗ ) is a torsion-free bounded automata group, then there is a torsion-free generalized basilica group H and k ≥ 1 such that H is isomorphic to a subgroup of G and k G ֒→ Sym(X k ) ⋉ H X . Proposition 1.9 (See Corollary 3.10). Every torsion-free self-replicating bounded automata group admits a faithful representation as a generalized basilica group. We also exhibit countably many non-isomorphic balanced generalized basilica groups; see Examples 9.1. The class of balanced generalized basilica groups, and hence the class of generalized basilica groups, is thus as large as it can be, since there are only countably many bounded automata groups. 1.3. Groups of abelian wreath type. Let π1 : Aut(X ∗ ) → Sym(X) be the homomorphism induced by the action of Aut(X ∗ ) on X. Under the natural identification with finitary elements, we regard Sym(X) ≤ Aut(X ∗ ), when convenient. Definition 1.10. We say that G ≤ Aut(X ∗ ) is of abelian wreath type if π1 (G) ≤ Sym(X) is abelian and G admits a finite self-similar generating set Y such that for every g ∈ Y either gx = 1 for all x ∈ X or gx ∈ {g} ∪ π1 (G) for all x ∈ X with exactly one x such that gx = g. Remark 1.11. The Gupta-Sidki groups and the more general GGS groups are of abelian wreath type. A group G ≤ Aut(X ∗ ) of abelian wreath type embeds into the inverse limit (· · ·≀X A≀X A) where A is the abelian group π1 (G). This class of bounded automata groups seems to be among the simplest such groups, because the structure of these groups is minimally complicated by permutation-grouptheoretic phenomena. We answer the motivating question completely for self-replicating groups of abelian wreath type. Theorem 1.12 (See Theorem 8.13). Every self-replicating group of abelian wreath type is either virtually abelian or not elementary amenable. The infinite dihedral group shows that Theorem 8.13 is sharp; see Example 9.2. The GSS groups are self-replicating as soon as they are infinite, so Theorem 1.12 applies to these groups. Additionally, as there are countably many self-replicating GGS groups, there are countably many isomorphism types of self-replicating groups of abelian wreath type. ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 5 1.4. Groups containing odometers. An element d ∈ Aut(X ∗ ) is said to be an odometer if hdi acts transitively on X and dx ∈ {1, d} for all x ∈ X with exactly one x ∈ X such that dx = d. Odometers arise somewhat naturally in bounded automata groups. For instance some iterated monodromy groups will contain these; see Example 5.9. On the other hand, our theorem for groups with odometers plays an important technical role in other arguments, so one is welcome to regard this theorem as a useful technical tool. Theorem 1.13 (See Theorem 5.14). Every bounded automata group that contains an odometer is either virtually abelian or not elementary amenable. Let G be a bounded automata group containing a level transitive element d. The element d is well-known to be conjugate in the full automorphism group of the rooted tree to an odometer, but the conjugator need not preserve the property of G being a bounded automata group. In Theorem 1.13, we need the element to be an odometer in the bounded representation of G. 2. Preliminaries For a group G acting on a set X and Y ⊆ X, we write G(Y ) for the pointwise stabilizer of Y in G. For g, h ∈ G, the commutator [g, h] is ghg −1 h−1 . 2.1. Bounded automata groups. For a finite set X of size at least 2, let X ∗ be the free monoid on X; the identity is the empty word. By identification with its Cayley graph, X ∗ is naturally a rooted tree, but in practice and in the work at hand, it is often more useful to think of X ∗ as words. We write X k to denote the words of length k. An automorphism g of X ∗ is a bijection such preserves the prefix relation. That is, a is a prefix of b if and only if g(a) is a prefix of g(b). Automorphisms of X ∗ act on X ∗ from the left, and we denote the group of automorphisms by Aut(X ∗ ). For each k ≥ 1, the group Aut(X ∗ ) acts on the set of words of length k. We let πk : Aut(X ∗ ) → Sym(X k ) denote the induced homomorphism. It is sometimes convenient to see πk (Aut(X ∗ )) ≤ Aut(X ∗ ), and this is achieved as follows: Say σ ∈ πk (Aut(X ∗ )) and v ∈ X l with l ≥ k. Writing v = xw with x ∈ X k and w ∈ X ∗ , we define σ(v) := σ(x)w. One verifies that this identification gives that πk (Aut(X ∗ )) ≤ Aut(X ∗ ). For a word w ∈ X ∗ , the words with prefix w, wX ∗ , are isomorphic to X ∗ by the map ψw : X ∗ → wX ∗ defined by ψw : x 7→ wx. For g ∈ Aut(X ∗ ) and w ∈ X ∗ , the element g induces an automorphism gw ∈ Aut(X ∗ ) defined by −1 ◦ g ◦ ψw . gw := ψg(w) The automorphism gw is called the section of g at w. A straightforward computation shows the operation of taking sections enjoys two fundamental properties. Lemma 2.1. Let X be a non-empty finite set, g, h, and k be elements of Aut(X ∗ ), and v1 and v2 be elements of X ∗ . Then, 6 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK (a) gv1 v2 = (gv1 )v2 (b) (hk)v = hk(v) kv Remark 2.2. The previous lemma ensures that map Aut(X ∗ ) × X ∗ → Aut(X ∗ ) by (g, v) 7→ gv is a cocycle. An automorphism g ∈ Aut(X ∗ ) is called finitary if there is some k ≥ 1 such that gv = 1 for all v ∈ X k . The least k such that gv = 1 for all v ∈ X k is called the depth of the finitary element g. An automorphism g ∈ Aut(X ∗ ) is called directed if there is some k ≥ 1 and w ∈ X k such that gw = g and gv is finitary for all v ∈ X k \ {w}. The least such k is called the period of g, and the vertex w ∈ X k is called the active vertex of g on X k and is denoted by v g . We say that g is strongly active if g(v g ) 6= v g . We say g is strongly directed if there exists k ≥ 1 and w ∈ X k such that gw = g and gu = 1 for all u ∈ X k \ {w}. An element d ∈ Aut(X ∗ ) is said to be an odometer if hdi acts transitively on X and dx ∈ {1, d} for all x ∈ X with exactly one x ∈ X such that dx = d. For the work at hand, the following features of automorphisms of rooted trees play an integral role. Definition 2.3. An automorphism g ∈ Aut(X ∗ ) is finite state if S(g) := {gv | v ∈ X ∗ } is finite. The element g is bounded if there is N ≥ 0 such that for all n ≥ 1, |{v ∈ X v | gv 6= 1}| ≤ N. Finitary automorphisms and directed automorphisms are clearly bounded and finite state. A partial converse also holds. Proposition 2.4 ([2, Proposition 2.7]). An automorphism g ∈ Aut(X ∗ ) is bounded and finite state if and only if there exists m ≥ 1 such that each section gv for v ∈ X m is either finitary or directed. We are now prepared to define the bounded automata groups. Definition 2.5. A (set) group G ≤ Aut(X ∗ ) is self-similar if gw ∈ G for all w ∈ X ∗ and g ∈ G. Definition 2.6. A group G ≤ Aut(X ∗ ) is said to be a bounded automata group if G is finitely generated and self-similar and every element g ∈ G is bounded and finite state. Remark 2.7. Bounded automata groups are named as such, because they are exactly the groups such that the generators are given by a bounded automaton; see [18, Chapter 1.5]. 2.2. Self-replicating groups. Letting Aut(X ∗ )(w) be the stabilizer of w in Aut(X ∗ ), the map φw : Aut(X ∗ )(w) → Aut(X ∗ ) by g 7→ gw is a homomorphism. We call φw the section homomorphism at w. For a group G ≤ Aut(X ∗ ), we denote the image φw (G(w) ) by secG (w), and secG (w) is called the group of sections of G at w. ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 7 Definition 2.8. A group G ≤ Aut(X ∗ ) is called self-replicating if G is self-similar, acts transitively on X and secG (x) = G for all x ∈ X. Remark 2.9. The terms “fractal” and “recurrent” have previously appeared in the literature in place of “self-replicating.” We understand that “self-replicating” is the currently accepted term. For a self-replicating group G ≤ Aut(X ∗ ), it follows by induction on the length of v ∈ X ∗ that secG (v) = G for all v ∈ X ∗ . Self-replicating groups additionally act transitively on X k for every k, not just on X. Groups that act transitively on X k for all k ≥ 1 are called level transitive. For g ∈ Aut(X ∗ ) an odometer, hgi is level transitive. In the present work, weak forms of self-similarity and self-replication arise frequently. Definition 2.10. We say G ≤ Aut(X ∗ ) is weakly self-similar if secG (v) ≤ G for every v ∈ X ∗ . We say that G weakly self-replicating if secG (v) = G for every v ∈ X ∗ . A weakly self-similar (weakly self-replicating) group need not be selfsimilar (self-replicating). This holds even in the case that G acts transitively on X. See Example 9.4 Remark 2.11. In the work at hand, we will need to analyze subgroups of a bounded automata group which are weakly self-similar, but not self-similar. The expert will note that one can conjugate a weakly self-similar group to obtain a self-similar group. However, if one conjugates the supergroup to make the subgroup in question self-similar, the conjugate often fails to be a bounded automata group. 2.3. Elementary amenable groups. Definition 2.12. The class of elementary amenable groups, denoted by EG, is the smallest class of groups such that the following hold. (1) EG contains all abelian groups and finite groups. (2) EG is closed under taking subgroups, group extensions, quotients, and direct limits. By work of D. Osin, [21], the class EG admits a simpler description. Let us define recursively classes EGα for α an ordinal as follows. • EG0 is the class of abelian groups and finite groups. • Given EGα , let EGeα be the class of EGα -by-EG0 groups and let EGlα be the groups given by a direct limit of groups in EGα . We define EGα+1 := EGeα ∪ EGlα . S • For λ a limit ordinal, we define EGλ := β<λ EGβ . S Theorem 2.13 (Osin, [21, Theorem 2.1]). EG = α∈ORD EGα . In view of Osin’s theorem, the class of elementary amenable groups admits a well-behaved ordinal-valued rank. 8 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Definition 2.14. For G ∈ EG, we define rk(G) := min{α | G ∈ EGα } and call rk(G) the construction rank of G. Corollary 2.15. If G ∈ EG is finitely generated and neither finite nor abelian, then there is L E G such that G/L is finite or abelian and rk(G) = rk(L) + 1. Proposition 2.16. Let G ∈ EG. (1) If H ≤ G, then rk(H) ≤ rk(G). ([21, Lemma 3.1]) (2) If L E G, then rk(G/L) ≤ rk(G). ([21, Lemma 3.1]) (3) If {1} → K → G → Q → {1} is a short exact sequence, then rk(G) ≤ rk(K) + rk(Q).([21, cf. Lemma 3.2]) (4) rk(G × G) = rk(G). (folklore) 3. Reduced form A given representation of a bounded automata group may not always be optimal. The reduction developed herein produces a canonical representation of a bounded automata group which often makes arguments simpler. This technique appears to be folklore. Given a tree X ∗ and k ≥ 1, the group Aut(X ∗ ) acts faithfully on (X k )∗ , giving an embedding rk : Aut(X ∗ ) ֒→ Aut((X k )∗ ). The map rk is just the restriction of the action of Aut(X ∗ ) to (X k )∗ ⊂ X ∗ (which is a free monoid on X k and hence an |X|k -regular tree). Lemma 3.1. Suppose that g ∈ Aut(X ∗ ) and k ≥ 1. (1) For any w ∈ (X k )∗ and g ∈ G, rk (gw ) = (rk (g))w . (2) If g is finitary, then rk (g) is finitary. (3) If g is directed, then rk (g) is directed. (4) If g is strongly directed, then rk (g) is strongly directed. Proof. Set O := X k and take w ∈ O ∗ . By definition, the section of g at w −1 ◦ g ◦ ψw where ψv : X ∗ → vX ∗ by x 7→ vx. The map rk in X ∗ is gw = ψg(w) is restriction to O ∗ , so we see that −1 ↾O∗ ◦g ↾O∗ ◦ψw ↾O∗ = (rk (g))w . rk (gw ) = (gw ) ↾O∗ = ψg(w) Hence, (1) holds. If g is finitary, then we can find some n ≥ 1 such that gw = 1 for all w ∈ O n . Claim (1) shows that (rk (g))w = 1 for all w ∈ On , so rk (g) is finitary, verifying (2). If g is (strongly) directed, we can find some n ≥ 1 such that for all w ∈ On either gw = g or gw is finitary (trivial). If gw is finitary (trivial), then claims (1) and (2) ensure that (rk (g))w is finitary (trivial). If gw = g, then (1) implies that rk (g) = rk (gw ) = (rk (g))w . We conclude that for every w ∈ O n either (rk (g))w = rk (g) or rk (g)w is finitary (trivial). Hence, rk (g) is a (strongly) directed element of Aut(O∗ ), establishing (3) and (4).  ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 9 Corollary 3.2. If G ≤ Aut(X ∗ ) is a bounded automata group and k ≥ 1, then rk (G) ≤ Aut((X k )∗ ) is a bounded automata group. Proof. This is immediate from Proposition 2.4 and Lemma 3.1.  Recall that for each k ≥ 1, there is a homomorphism from Aut(X ∗ ) into Sym(X k ) denoted by πk : Aut(X ∗ ) → Sym(X k ). The functions πk and rk enjoy the following relationship: π1 ◦ rk = πk . Recall also that we may see πk (Aut(X ∗ )) ≤ Aut(X ∗ ) whenever necessary. Definition 3.3. For G ≤ Aut(X ∗ ) a bounded automata group, we say that G is in reduced form if G admits a finite generating Y such that for every g ∈ Y either gx = 1 for all x ∈ X or gx ∈ {g} ∪ π1 (G) for all x ∈ X with exactly one x such that gx = g. We say that Y is a distinguished generating set for G. We write G = hY i ≤ Aut(X ∗ ) to indicate that Y is a distinguished generating set for G. Note that one may always assume that Y is a self-similar set by adding each section from π1 (G) of a directed element of Y to Y . Neither the reduced form nor the distinguished generating set for a given reduced form are unique in general. However, all bounded automata groups can essentially be put in reduced form. Establishing this requires a result from the literature. Theorem 3.4 ([18, Theorem 3.9.12]). For G ≤ Aut(X ∗ ) a bounded automata group, there is a finite self-similar set Z ⊆ G consisting of finitary and directed elements such that for all g ∈ G there is N for which gv ∈ Z for all v ∈ X k and k ≥ N . The directed elements of the set Z in Theorem 3.4 are all strongly directed if and only if in the automaton with state set Z (and the obvious transitions), each non-trivial state belonging to a cycle cannot reach any state off that cycle except for the trivial state. Theorem 3.5. For G ≤ Aut(X ∗ ) a bounded automata group, there are a finite set Z ⊆ G and k ≥ 1 such that the following hold: (1) rk (G) ≤ Aut((X k )∗ ) is a bounded automata group. (2) Setting H := rk (hZi), H ≤ Aut((X k )∗ ) is a bounded automata group in reduced form with distinguished generating set rk (Z). Moreover, if the directed elements of the set from Theorem 3.4 are strongly directed, then H is generalized basilica. k (3) There is an injective homomorphism G → Sym(X k ) ⋉ H X . Proof. Let W be a finite generating set for G and let Z ⊂ G be as given by Theorem 3.4; in particular, Z is closed under taking sections. By taking a common multiple of the periods of directed d ∈ Z, we may find m such that for each directed d ∈ Z and x ∈ X m the section dx is either finitary or equal 10 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK to d. Taking n large enough, we may assume that fx = 1 for all x ∈ X n and finitary f ∈ Z. Let k be a sufficiently large multiple of m so that k ≥ n and gv ∈ Z for all g ∈ W and v ∈ X k . For every directed d ∈ Z and x ∈ X k , either dx is finitary and in πk (G) or dx = d. For every finitary f ∈ Z and x ∈ X k , fx = 1. Set O := X k and let rk : Aut(X ∗ ) → Aut(O∗ ) be the canonical inclusion. Corollary 3.2 ensures that rk (G) is again a bounded automata group, verifying (1). It is easy to verify that hZi ≤ Aut(X ∗ ) is a bounded automata group using that Z is closed under taking section, so H = rk (hZi) is a bounded automata group by a second application of Corollary 3.2. Let us now argue that H ≤ Aut(O∗ ) is in reduced form. Set Y := rk (Z); note that Y is closed under takings sections by Lemma 3.1 as Z is closed under taking sections. Via Lemma 3.1, Y consists of finitary elements and directed elements, since Z consists of such elements. Say that rk (f ) ∈ Y is finitary. Lemma 3.1 ensures that f ∈ Z must also be finitary. For each x ∈ O, fx = 1, so in view of Lemma 3.1, (rk (f ))x = 1 for all x ∈ O. Say that rk (d) ∈ Y is directed. It follows that d ∈ Z must be directed. For x ∈ O such that dx is finitary, we have that dx ∈ Z. Applying again Lemma 3.1, we deduce that (rk (d))x is finitary and an element of π1 (H). For x ∈ O such that dx = d, we likewise deduce that (rk (d))x = rk (d). For all x ∈ O, it is thus the case that (rk (d))x ∈ {rk (d)} ∪ π1 (H). Moreover, if d is strongly directed, then so is rk (d) by Lemma 3.1. We conclude that H is in reduced form and that if each directed element of Z is strongly directed, then H is generalized basilica. Claim (2) thus holds. For claim (3), each g ∈ W is such that gx ∈ Z for any x ∈ X k by choice of k. From Lemma 3.1, we deduce that for each rk (g) ∈ rk (G) and o ∈ O, (rk (g))o ∈ rk (hZi) = H. We define G → Sym(O) ⋉ H O by g 7→ π1 (rk (g))(rk (g)o )o∈O . One easily verifies that this is a well-defined monomorphism.  Using a second fact from the literature, we obtain a useful corollary. Proposition 3.6 ([18, Proposition 2.11.3]). If G is a self-replicating bounded automata group, then Z as in Theorem 3.4 is a generating set for G. Corollary 3.7. If G ≤ Aut(X ∗ ) is a self-replicating bounded automata group, then there is k ≥ 1 such that rk (G) ≤ Aut((X k )∗ ) is a self-replicating bounded automata group in reduced form. In particular, G has a faithful representation as a self-replicating bounded automata group in reduced form. Remark 3.8. Theorem 3.5 motivates the form of our definitions of generalized basilica groups and abelian wreath type groups. Our definitions assume the group is in reduced form to avoid cumbersome reduction steps. We deduce two further corollaries of Theorem 3.5, which elucidate the connection between torsion-free bounded automata groups and generalized basilica groups. In a torsion-free bounded automata group, every finitary ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 11 element is trivial and hence every directed element is strongly directed. Theorem 3.5 thus implies the following consequence. Corollary 3.9. If G ≤ Aut(X ∗ ) is a torsion-free bounded automata group, then there are a torsion-free generalized basilica group H such that H is isomorphic to a subgroup of G and k ≥ 1 such that k G ֒→ Sym(X k ) ⋉ H X . Corollary 3.10. If G ≤ Aut(X ∗ ) is a self-replicating torsion-free bounded automata group, then G admits a faithful representation as a generalized basilica group. Let us conclude this section by working out the reduced form of the classical basilica group. Example 3.11. Let a, b ∈ Aut([2]∗ ) be defined recursively by ( ( iv i=0 1v i=0 a(iv) := and b(iv) := ib(v) i = 1 0a(v) i = 1. The group G := ha, bi ≤ Aut([2]∗ ) is called the basilica group; see [10]. There is a convenient notation for the generators, representing them as elements of Sym([2]) ⋉ G2 , called wreath recursion: the wreath recursion of a is a = (1, b), and that of b is b = (01)(1, a). We see that a1 = b and b1 = a, so G is not in reduced form. Consider r2 (G). Set ã := r2 (a) and b̃ := r2 (b). In view of Lemma 3.1, ã11 = r2 (a11 ) = r2 (a) = ã, and b̃11 = b̃. One further checks that all other sections of ã and b̃ on [2]2 are trivial. In wreath recursion, e a = (23)(1, 1, 1, e a ) and eb = (02)(13)(1, 1, 1, eb). Hence, r2 (G) is in reduced form, and furthermore, the group is a generalized basilica group. In fact, r2 (G) is a balanced generalized basilica group. 4. Technical results This section establishes the key technical result of this work, Lemma 4.2, as well as several general technical observations for later use. 4.1. Elementary amenable self-replicating groups. Let γ(x1 , . . . , xn ) be a word in the free group on n generators. For a group G, the verbal subgroup of G given by γ(x1 , . . . , xn ) is γ(G) := hγ(g1 , . . . , gn ) | gi ∈ Gi. Note that verbal subgroups are always characteristic subgroups of G. A group is called max-n if every increasing chain of normal subgroups eventually stabilizes. We will only require that all finitely generated virtually abelian groups are max-n, but the class of max-n groups is in fact large and complicated. Recall that rk(G) denotes the construction rank of an elementary amenable group G. 12 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Lemma 4.1. Suppose that G ≤ Aut(X ∗ ) is an elementary amenable selfreplicating group. Let γ and β be words such that G/β(γ(G)) is a max-n group. Then there are weakly self-replicating normal subgroups M and N of G with (1) N ≤ M , γ(G) ≤ M , and β(γ(G)) ≤ N ; (2) rk(M ) = rk(γ(G)) and rk(N ) = rk(β(γ(G))); and (3) β(M/N ) = 1. Proof. Fix x ∈ X and let φx : G(x) → G be the section homomorphism at x. Clearly γ(G(x) ) ≤ γ(G)(x) ≤ G(x) , and as φx is onto, we have γ(G) = φx (γ(G(x) )) ≤ φx (γ(G)(x) ) ≤ φx (G(x) ) = G. Similarly, we have β(γ(G)) = φx (β(γ(G(x) ))) ≤ φx (β(γ(G))(x) ) ≤ φx (G(x) ) = G. We now define two sequences of normal subgroups of G: Set K0 := γ(G), H0 := β(γ(G)) and Kn+1 := φx ((Kn )(x) ), Hn+1 := φx ((Hn )(x) ). Trivially, H0 ≤ K0 , so Hn ≤ Kn for all n ≥ 0 by induction. The previous paragraph ensures that K0 ≤ K1 and H0 ≤ H1 , so Kn ≤ Kn+1 , Hn ≤ Hn+1 for all n ≥ 0, again by induction. Normality follows by induction because φx is onto. We claim that β(Kn /Hn ) = 1 for all n ≥ 0. This is trivial for n = 0. Assume that β(Kn /Hn ) = 1. Note that (Kn )(x) ∩ Hn = (Hn )(x) and so β((Kn )(x) /(Hn )(x) ) ≤ β(Kn /Hn ) = 1. As Kn+1 /Hn+1 is a quotient of (Kn )(x) /(Hn )(x) , we deduce that β(Kn+1 /Hn+1 ) = 1. Since G/β(γ(G)) is a max-n group, there is L such that KL = KL+1 and HL = HL+1 . We claim M := KL and N := HL for such an L satisfy the lemma. The previous paragraph ensures that M and N are normal in G. We see that secM (x) = KL+1 = KL = M , and since the section subgroups are conjugate to each other, secM (y) = M for all y ∈ X. The obvious induction argument now gives that secM (v) = M for all v ∈ X ∗ , so M is weakly self-replicating. The same argument shows that N is weakly selfreplicating. Claims (1) and (3) follow from the previous paragraph. In view of Proposition 2.16, induction shows rk(Kj ) = rk(K0 ) = rk(γ(G)) for all j. The group M is thus such that rk(M ) = rk(γ(G)). A similar argument shows rk(N ) = rk(β(γ(G))), completing the proof of (2).  By considering the special case that β is a letter, we obtain the following. Lemma 4.2. Suppose that G ≤ Aut(X ∗ ) is an elementary amenable selfreplicating group. Let γ be a word such that G/γ(G) is a max-n group. Then there is a weakly self-replicating M E G such that γ(G) ≤ M and rk(M ) = rk(γ(G)). There are a couple of important corollaries of Lemma 4.2. We say a word w(x1 , . . . , xn ) is d-locally finite if every d-generated group G such that w(G) = {1} is finite. ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 13 Lemma 4.3 (cf. [7, p. 517]). For every d-generated finite group A, there is a d-locally finite word w such that w(A) = 1. Corollary 4.4. Suppose that G ≤ Aut(X ∗ ) is a finitely generated elementary amenable self-replicating group. If G is non-abelian, then there is a weakly self-replicating M E G such that G/M is either finite or abelian and rk(M ) + 1 = rk(G). Furthermore, if rk(G) is witnessed (in the sense of Corollary 2.15) by a normal subgroup N , then G/M is finite if G/N is finite and G/M is abelian if G/N is abelian. Proof. That G is self-replicating ensures that G is not finite. Since G is non-abelian, Corollary 2.15 supplies N E G such that G/N is either finite or abelian and rk(N ) + 1 = rk(G). If G/N is abelian, Lemma 4.2 applied to the verbal subgroup [G, G] supplies the desired subgroup M . Let us suppose that N is of finite index in G. Say that G is d-generated and let γ be a d-locally finite word such that γ(A) = 1 where A := G/N , whose existence is given by Lemma 4.3. We thus have that γ(G) ≤ N . It is also that case that G/γ(G) is finite, since G/γ(G) is a d-generated group and γ(G/γ(G)) = 1, so rk(γ(G))+1 = rk(G). Applying Lemma 4.2 to γ(G) supplies the desired subgroup M .  In the case of a self-replicating elementary amenable group for which the rank is given by a finite index subgroup, we can say a bit more. Corollary 4.5. Suppose that G ≤ Aut(X ∗ ) is a finitely generated elementary amenable self-replicating group. If G is not virtually abelian and admits M E G with finite index such that rk(M ) + 1 = rk(G), then there are weakly self-replicating subgroups A E G and F E G such that (1) A ≤ F , F/A is abelian, and G/F is finite; and (2) rk(F ) + 1 = rk(A) + 2 = rk(G). Proof. Since M is finitely generated and neither finite nor abelian, as G is not virtually abelian, Corollary 2.15 supplies a normal subgroup N E M such that M/N is either finite or abelian and rk(N ) + 1 = rk(M ). It cannot be the case that M/N is finite, since this contradicts the rank of G, so M/N is abelian. Say that G is d-generated and let γ be a d-locally finite word such that γ(A) = 1 where A := G/M , whose existence is given by Lemma 4.3. It follows that γ(G) ≤ M and G/γ(G) is finite. Since M/N is abelian, it follows that [γ(G), γ(G)] ≤ N . Thus rk(G) ≤ rk(γ(G)) + 1 ≤ rk(M ) + 1 = rk(G), and rk(γ(G)) ≤ rk([γ(G), γ(G)]) + 1 ≤ rk(N ) + 1 = rk(M ) = rk(γ(G)). We conclude that rk(γ(G))+1 = rk(G) and rk([γ(G), γ(G)])+2 = rk(γ(G))+ 1 = rk(G). The group G/[γ(G), γ(G)] is a finitely generated virtually abelian (as G/γ(G) is finite) and hence a max-n group. Applying Lemma 4.1 with 14 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK β = [x, y], we can find weakly self-replicating F and A normal in G such that A ≤ F , F/A is abelian, γ(G) ≤ F (and so G/F is finite), rk(F ) = rk(γ(G)) and rk(A) = rk([γ(G), γ(G)]). This completes the proof.  4.2. Generalities on self-similar groups. The results here are primarily for the reader’s convenience, as these results are easy consequences of the definitions. We will appeal to these results throughout this work and often without explicit reference. The reader already comfortable with groups acting on rooted trees can safely skip this subsection. Lemma 4.6. Suppose that G ≤ Aut(X ∗ ), G acts level transitively on X ∗ , and H E G is weakly self-similar. If H fixes x ∈ X k for some k ≥ 1, then H is trivial. Proof. That H is normal ensures that H fixes X k . That H contains secH (v) for all v ∈ X ∗ implies that H in fact fixes (X k )n for all n ≥ 1. Hence, H acts trivially on X ∗ .  Lemma 4.7. Suppose that G ≤ Aut(X ∗ ) acts transitively on X and suppose that there is a weakly self-similar M E G such that G/M is abelian or M acts transitively on X. If g ∈ G fixes y and x in X and gx = 1, then gy ∈ M . Proof. Take f ∈ G such that f (x) = y. If M acts transitively on X, we take f ∈ M . The commutator [f, g−1 ] is an element of M , and [f, g−1 ]y ∈ M since [f, g−1 ] fixes y and M is weakly self-replicating. Noting that (f −1 )y = (fx )−1 , we see [f, g−1 ]y = (f g−1 f −1 g)y = fx · 1 · (fx )−1 · gy = gy . Hence, gy ∈ M .  Lemma 4.8. Suppose that G ≤ Aut(X ∗ ) acts transitively on X and is weakly self-replicating. If H E G is weakly self-similar and of finite index in G, then H acts transitively on X. Proof. Fix x ∈ X and let φx : G(x) → G be the section homomorphism, which is surjective because G is weakly self-replicating. Since H is weakly self-similar, the surjective homomorphism φ̃x : G(x) H/H → G/H by gH 7→ φx (g)H is well-defined. The group G(x) H/H is thus a subgroup of G/H that surjects onto G/H. As G/H is finite, we deduce that G/H = G(x) H/H. Hence, H acts transitively on X.  4.3. Example: the basilica group. We close our technical discussion by exhibiting how these results are applied to prove the basilica group is nonelementary amenable. The basic strategy applied here is used throughout this work. Let G := he a, ebi ≤ Aut([4]∗ ) be the basilica group in the reduced form as given in Example 3.11. The group G is self-replicating; one can verify this directly or see [10]. The elements e a and eb in wreath recursion are e e a = (23)(1, 1, 1, e a ) and b = (02)(13)(1, 1, 1, e b). ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 15 Let us suppose toward a contradiction that G is elementary amenable. One easily verifies that G is not abelian. Corollary 4.4 thus produces a weakly self-replicating subgroup M E G such that rk(M ) + 1 = rk(G) and G/M is either finite or abelian. We see that e a2 = (1, 1, e a, e a) and eb2 = (1, eb, 1, eb). Lemmas 4.7 and 4.8 imply that e a ∈ M and eb ∈ M , so M = G. This contradicts the rank of G. We conclude that G is not elementary amenable. Remark 4.9. The general strategy to show a given self-replicating bounded automata group is not elementary amenable is to contradict the rank of the group via the weakly self-replicating subgroups provided by either Corollary 4.4 or Corollary 4.5. In the case of the basilica group, the squares e a2 2 and e b act trivially on [4] and have some trivial sections, so we may apply Lemmas 4.7 and 4.8 to deduce that M = G, which contradicts the rank. In general, we must work much harder. 5. Groups containing odometers It is convenient to begin with our theorems on bounded automata groups containing odometers. Definition 5.1. An element d ∈ Aut(X ∗ ) is said to be an odometer if hdi acts transitively on X and dx ∈ {1, d} for all x ∈ X with exactly one x ∈ X such that dx = d. In the course of proving these results, we upgrade Corollary 4.5, and the resulting more powerful statement, Corollary 5.11, will be used frequently in later sections. 5.1. Self-replicating groups. This preliminary section shows that bounded automata groups containing an odometer are close to being self-replicating. We begin by characterizing self-replication for generalized basilica groups. Lemma 5.2. Suppose that h ∈ Aut(X ∗ ) is such that hx ∈ {1, h} for all x ∈ X with at most one x such that hx = h. For any w, v ∈ X and j ∈ Z for which hj (v) = w, there is i such that hi (v) = w and (hi )v = 1 and 0 ≤ |i| < |X|. Proof. If no x ∈ X is such that hx = h, then the lemma is immediate. Suppose there is a unique x ∈ X with hx = h. Choose j with |j| ≥ 0 least such that hj (v) = w. If (hj )v = 1, we are done. Otherwise, it is the case that (hj )v = h±1 , since we chose |j| least. As that cases are similar, let us suppose that (hj )v = h (i.e., j > 0). Let O be the orbit of x under hhi. The word x is the unique element of X for which h has a non-trivial section, so (hk )z = 1 for all z ∈ X \ O and k ∈ Z. We deduce that v ∈ O. Take m ≥ 1 least such that hm fixes x and observe that (hm )y = h for all y ∈ O. The element h−m hj = hj−m is thus such that hj−m (v) = w and (hj−m )v = h−1 h = 1 and |j − m| < |X|.  16 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Lemma 5.3. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica group and let O be an orbit of G on X. For all x ∈ O, it is then the case that secG (x) = hY ′ i where Y ′ is the collection of directed g ∈ Y such that v g ∈ O. Proof. Take d ∈ Y and let W1 , . . . , Wl list the orbits of hdi on O, for some 1 ≤ k ≤ n. For w, v ∈ Wj , there is some power i such that di (v) = w and (di )v = 1 by Lemma 5.2. Plainly, di G(v) d−i = G(w) , and we deduce that secG (w) = (di )v secG (v)((di )v )−1 . Hence, secG (w) = secG (v), since (di )v = 1. We conclude that secG (w) = secG (v) for all w, v ∈ Wj and 1 ≤ j ≤ l. Since G = hY i and acts transitively on O, it follows that secG (v) = secG (w) for all v, w ∈ O. For x ∈ O and h ∈ Y , the section hx is an element of hY ′ i. Inducting on the word length, one sees that gx ∈ hY ′ i for all g ∈ G, so a fortiori secG (x) ≤ hY ′ i. On the other hand, for d ∈ Y ′ , take n ≥ 1 least such that dn fixes v d . The section of dn at v d is d, so d ∈ secG (v d ) = secG (x). We conclude that hY ′ i = secG (x) for all x ∈ O, verifying the lemma.  Proposition 5.4. For G = hY i ≤ Aut(X ∗ ) a generalized basilica group, G is self-replicating if and only if G is generated by the directed elements of Y and G acts transitively on X. Proof. Suppose first that G is self-replicating. By definition, G acts transitively on X. Fix x ∈ X and let Z ⊆ Y be the directed elements. An easy induction argument shows that gx ∈ hZi for all g ∈ G. We deduce that G = secG (x) ≤ hZi ≤ G, and thus, G is generated by Z. For the converse, let Z be the directed elements of Y . Since G acts transitively on X, secG (x) = hZi for all x ∈ X by Lemma 5.3. As hZi = G, we deduce that secG (x) = G.  A version of Proposition 5.4 holds for bounded automata groups with odometers. Proposition 5.5. Suppose that G = hY i ≤ Aut(X ∗ ) is a bounded automata group in reduced form. If G is self-replicating, then G is generated by Z := {dx | d ∈ Y is directed and x ∈ X}. The converse holds if G contains an odometer. Proof. Suppose first that G is self-replicating. Fix x ∈ X. An easy induction argument shows that gx ∈ hZi for all g ∈ G. We deduce that G = secG (x) ≤ hZi ≤ G, and thus, G is generated by Z. For the converse, let h ∈ G be an odometer. Immediately, we see that G acts transitively on X. For each x and y ∈ X distinct, Lemma 5.2 supplies i such that hi (x) = y and (hi )x = 1. Fixing x ∈ X, for any g ∈ G and y ∈ X, there are i and j such that hj ghi fixes x and (hj ahi )x = gy . The image of the section homomorphism secG (x) = φx (G(x) ) therefore contains ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 17 all sections gy for g ∈ G and y ∈ X. In particular, secG (x) contains Z, so secG (x) = G. We conclude that G is self-replicating.  Our final preliminary lemma shows that one can easily reduce to the group generated by the set Z. Lemma 5.6. Suppose that G = hY i ≤ Aut(X ∗ ) is a bounded automata group in reduced form. Letting Z := {dx | d ∈ Y is directed and x ∈ X}, the group hZi is a bounded automata group in reduced form, and G ֒→ Sym(X) ⋉ hZiX . Proof. That hZi is a bounded automata group in reduced form is immediate. For each x ∈ X and h ∈ Y , it follows the section hx is an element of Z. Inducting on the word length, one sees that gx ∈ hZi for all g ∈ G and x ∈ X. The map G → Sym(X) ⋉ hZiX given by g 7→ π1 (g)((gx )x∈X ) is thus well-defined. One verifies that this map is also a monomorphism.  5.2. Generalized basilica groups. Lemma 5.7. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating generalized basilica group that is non-abelian. If H E G is weakly self-replicating and G/H is abelian, then G/H is finite. Proof. In view of Proposition 5.4, we may assume that Y consists of directed elements. Suppose first that k ∈ Y does not act transitively on X and let n ≥ 1 be least such that kn fixes X. There is some x ∈ X such that (kn )x = 1, and there is y ∈ X such that (kn )y = ki for some i ≥ 1. Applying Lemma 4.7, we conclude that (kn )y = ki ∈ H. Hence, k is torsion in G/H. We next consider h ∈ Y that acts transitively on X. Suppose toward a contradiction that hi ∈ / H for all i ≥ 1. Fix k ∈ Y \ {h−1 } and fix y ∈ X such that k(y) 6= y and ky = 1. By Lemma 5.2, there is |X| > |i| ≥ 1 such that hi k(y) = y and (hi )k(y) = 1. The element hi k has non-trivial sections exactly at some x1 , . . . , xl in X where l ∈ {|i|, |i| + 1}, since hi has |i| many non-trivial sections (all equal to h or h−1 ) and k has one non-trivial section. Say that x1 is the element of X at which the section of hi k is of the form ak for a ∈ {1, h±1 }. Suppose there is some xj such that xj and x1 lie in different orbits of the cyclic group hhi ki acting on X. Let m ≥ 1 be least such that (hi k)m fixes xj . The section ((hi k)m )xj is of the form hr for some 1 ≤ |r| ≤ i. The element (hi k)m also fixes y and has a trivial section at y. Applying Lemma 4.7, we deduce that hr ∈ H, which is absurd. It is thus the case that all xj lie in the same orbit of hhi ki acting on X. Take m ≥ 1 least such that (hi k)m fixes x1 and observe that ((hi k)m )x1 = hi k. Applying again Lemma 4.7, we conclude that hi k ∈ H. 18 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK For any other y ′ ∈ X such that k(y ′ ) 6= y ′ and ky′ = 1, the same argument gives |X| > |j| ≥ 1 such that hj k(y ′ ) = y ′ and hj k ∈ H. Thus, hj−i = hj kk−1 h−i ∈ H. In view of our reductio assumption, we conclude that i = j. Therefore, hi k fixes all y ∈ X such that k(y) 6= y and ky = 1. Say that k fixes x and kx = 1. Letting l ≥ 1 be least such that kl fixes v k , Lemma 4.7 implies that k ∈ H. Since hi k is also in H, hi ∈ H, which is absurd. We conclude that k fixes no x such that kx = 1. The element hi k must then fix all y ∈ X \ {v k }, so hi k fixes X. The subgroup H contains all sections of hi k, since it is weakly self-similar, so if i > 1 or i = 1 and vh 6= k(vk ), then h ∈ H, which we assume to be false. The element hk therefore fixes X, and (hk)vk = hk. It follows that hk = 1. This concludes the reductio argument, since k 6= h−1 . We have now established that every element k ∈ Y is such that ki ∈ H for some i, hence G/H is finite.  Theorem 5.8. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica group. If G contains an odometer, then either G is virtually abelian or G is not elementary amenable. Proof. Without loss of generality, we may assume that Y contains π1 (G)∩G. Let K be the subgroup generated by the directed members of Y . The subgroup K equals hZi where Z is as in Lemma 5.6, so in view of Lemma 5.6, K is virtually abelian if and only if G is virtually abelian. By replacing G with K if needed, we assume that each element of Y is directed. Proposition 5.4 now ensures that G is self-replicating. Let us suppose toward a contradiction that G is elementary amenable but not virtually abelian. Applying Corollary 4.4, there is H E G such that H is weakly self-replicating, rk(H) + 1 = rk(G), and G/H is either finite or abelian. In the case that G/H is abelian, Lemma 5.7 ensures that G/H is in fact finite. The group G thus admits a weakly self-replicating H E G such that rk(H) + 1 = rk(G) and G/H is finite. Since H E G is of finite index, Corollary 4.5 supplies a weakly self-replicating A E G such that G/A is virtually abelian and rk(A) + 2 = rk(G). Fix h ∈ G such that h is an odometer and form L := Ahhi. For each x and y ∈ X distinct, Lemma 5.2 supplies i such that hi (x) = y and (hi )x = 1. Fixing x ∈ X, for any a ∈ A and y ∈ X, there are i and j such that hj ahi fixes x and (hj ahi )x = ay . The image of the section homomorphism secL (x) = φx (L(x) ) therefore contains all sections of A. For any k ∈ Y , there is some a ∈ A such that a(k(v k )) 6= k(v k ), by Lemma 4.6. The element k−1 ak is a member of A, and (k−1 ak)vk = ak(vk ) k. The group secL (x) thus contains ak(vk ) k and ak(vk ) . Hence, k ∈ secL (x), and we deduce that secL (x) = G. On the other hand, A(x) E L(x) , and L(x) /A(x) is abelian. Thus, A = secA (x) E secL (x) = G, so G/A is abelian. This implies that rk(G) = rk(A) + 1 which is absurd.  ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 19 Example 5.9. Let G := he a, ebi ≤ Aut([4]∗ ) be the basilica group in the reduced form as given in Example 3.11. The elements e a and eb in wreath recursion have the following form: e a = (23)(1, 1, 1, e a ) and eb = (02)(13)(1, 1, 1, eb). We now see that e aeb−1 = (23)(1, 1, 1, e a )(02)(13)(1, eb−1 , 1, 1) = (0312)(1, e ae b−1 , 1, 1). Hence, e ae b−1 is an odometer, so G contains an odometer. Theorem 5.8 now gives a second proof that G is not elementary amenable. 5.3. Technical results revisited. Lemma 5.10. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating bounded automata group in reduced form. If G is elementary amenable but not virtually abelian, then there is a weakly self-replicating M E G such that G/M is finite and rk(M ) + 1 = rk(G) Proof. In view of Lemma 3.1, if G is in reduced form, then rk (G) ≤ Aut((X k )∗ ) is again in reduced form for any k ≥ 1. By passing to r2 (G), we may thus assume that |X| > 2. By Corollary 4.4, there is a weakly self-replicating N E G such that G/N is either finite or abelian and rk(N ) + 1 = rk(G). Suppose that G/N is abelian. We will argue that G/N is finite. Letting F be the collection of finitary elements of G, we will in fact show that F N is of finite index in G. This suffices to prove the theorem as F is locally finite, and hence G/N will have a locally finite subgroup of finite index, and hence is finite. Fix d ∈ Y directed and suppose first that hdi does not act transitively on X. Let x ∈ X be such that dx = d and y ∈ X be such that y is not in the orbit of x under hdi. Taking m ≥ 1 to be least such that dm fixes X, it follows that (dm )x = (f d)i for some i ≥ 1 and f finitary and (dm )y = r for r some finitary. Since G is self-replicating, there is h ∈ G such that h(y) = x and hy = 1. The commutator [h, d−m ] is an element of N , and [h, d−m ]x = r −1 (f d)i , which is an element of N as N is weakly self-replicating. Since G/N is abelian, it follows that di ∈ F N . Now suppose that d ∈ Y acts transitively on X. In view of Theorem 5.8, there must be a non-trivial finitary element f ∈ Y . We may find a power n := |X| > i ≥ 1 such that di f fixes some x ∈ X. This presents two cases: (di f )x is finitary or (di f )x = rdr ′ for r and r ′ finitary. The cases are similar, so we only consider the latter. Recall that n > 2. If i = n − 1, then d−1 f fixes x, so we replace d with d−1 . We may thus assume that n − 1 > i. Replace di with dj where j := i − n and note that 1 < |j|. The sections of j d f have three possible forms: finitary, rdr ′ d−1 r ′′ with r, r ′ , and r ′′ finitary, or rd−1 r ′ with r and r ′ finitary. The section (dj f )x is of the form rdr ′ d−1 r ′′ , and since i < n − 1, there is some y ∈ X such that (dj f )y = sd−1 s′ with s and s′ finitary elements. 20 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Let k be least such that (dj f )k fixes y. Since G is self-replicating, there is h ∈ G such that h(x) = y and hx = 1. The commutator [(dj f )k , h] is an element of N , and [(dj f )k , h]y = ak . . . a1 ((dj f )x )−k , where each ai has one of aforementioned forms, (dj f )x has the form rdr ′ d−1 r ′′ and a1 = ((dj f )k )y is of the form sd−1 s′ . Since G/N is abelian, the ai of the form rdr ′ d−1 r ′′ are equal to a finitary modulo N . We may thus write [(dj f )k , h]y mod N = b1 . . . bm mod N where each bi is either finitary or of the form sd−1 s′ . Commuting the finitaries to the left modulo N , we see that [(dj f )k , h]y mod N = f ′ d−l mod N for f a finitary and l non-zero. On the other hand, [(dj f )k , h]y ∈ N since N is weakly self-replicating. It now follows that dl ∈ F N . We have now demonstrated that every z ∈ Y admits l such that z l ∈ F N . Hence, F N is of finite index in G as G/N is finitely generated abelian.  In view of Corollary 4.5, Lemma 5.10 yields the following consequence. Corollary 5.11. Suppose that G ≤ Aut(X ∗ ) is a self-replicating bounded automata group. If G is elementary amenable but not virtually abelian, then there are weakly self-replicating subgroups N E G and M E G such that (1) N ≤ M , M/N is abelian, and G/M is finite; and (2) rk(M ) + 1 = rk(N ) + 2 = rk(G). Corollary 5.11 ensures that various examples of elementary amenable groups do not have faithful representations as self-replicating bounded automata groups. Proposition 5.12. Suppose that G is an elementary amenable group that is not virtually abelian. If every finite index subgroup has the same rank as G, then G has no faithful representation as a self-replicating bounded automata group. Proof. Suppose for contradiction G has a faithful representation as a selfreplicating bounded automata group. Appealing to Corollary 3.7, we may assume that G ≤ Aut(X ∗ ) is a representation of G as a bounded automata group in reduced form. Lemma 5.10 now implies that G has a finite index subgroup of lower rank. This contradicts our hypotheses.  Corollary 5.13. The groups A ≀ Z where A is a non-trivial abelian group do not have faithful representations as self-replicating bounded automata groups. Corollary 5.13 is rather interesting because the classical lamplighter group Z/2Z ≀ Z does have representations as a self-replicating group [18, cf. Proposition 1.9.1] (see also [22] where Z/2Z is replaced by an arbitrary finite abelian group), and on the other hand, Example 9.3 below shows it has representations as a bounded automata group. However, one can never find a representation which is simultaneously as a self-replicating group and as a bounded automata group ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 21 5.4. The general case. Theorem 5.14. Suppose that G ≤ Aut(X ∗ ) is a bounded automata group. If G contains an odometer, then either G is virtually abelian or G is not elementary amenable. Proof. Suppose toward a contradiction that G is elementary amenable but not virtually abelian. Via Theorem 3.5, it is enough to consider G = hY i ≤ Aut(X ∗ ) to be in reduced form. Without loss of generality, we may assume that Y contains an odometer h. Setting Z := {dx | d ∈ Y is directed and x ∈ X}, Lemma 5.6 implies that H := hZi is a bounded automata group in reduced form, and G ֒→ Sym(X) ⋉ H X . Moreover, h ∈ Z, so H contains an odometer and is elementary amenable but not virtually abelian. Proposition 5.5 further implies that H is self-replicating. Applying Corollary 5.11, there is a weakly self-replicating M E H such that H/M is virtually abelian and rk(M ) + 2 = rk(H). Using the odometer h ∈ H, set L := M hhi. For each u and w ∈ X 2 distinct, Lemma 5.2 supplies i such that hi (u) = w and (hi )u = 1. Fixing v ∈ X 2 , for any m ∈ M and w ∈ X 2 , there are i and j such that hj mhi fixes v and (hj mhi )v = mw . The image of the section homomorphism secL (v) = φv (L(v) ) therefore contains mw for every m ∈ M and w ∈ X 2 . For any directed k ∈ Y and x ∈ X the active vertex of k, there is some a ∈ M such that ak(x) 6= k(x), by Lemma 4.6. The section (k−1 )ak(x) is finitary of depth one, so (k−1 )ak(x)x′ = ((k−1 )ak(x) )x′ = 1 for any x′ ∈ X. The element k −1 ak is a member of M , and for any y ∈ X, (k−1 ak)xy = (k−1 )ak(x)ak(x) (k(y)) ak(x)k(y) ky = ak(x)k(y) ky The group secL (v) thus contains ak(x)k(y) ky and ak(x)k(y) . Hence, ky ∈ secL (v). We deduce that Z ⊆ secL (v), so secL (v) = H. On the other hand, M(v) E L(v) , and L(v) /M(v) is abelian. Since M = secM (v) E secL (v) = H, we deduce that H/M is abelian. Therefore, rk(H) = rk(M ) + 1 which is absurd.  6. Kneading automata groups 6.1. Preliminaries. For a permutation σ ∈ Sym(X), a complete cycle decomposition of σ is a cycle decomposition including all length one cycles. Definition 6.1. Let X be a finite set and α = (σ1 , . . . , σn ) be a sequence of permutations of X. Say that each σi has complete cycle decomposition ci,1 . . . ci,ki . We define the cycle graph of α, denoted by Γα , as follows: V Γα := X ⊔ {(i, j) | 1 ≤ i ≤ n and 1 ≤ j ≤ ki } and EΓα := {{(i, j), x} | x appears in ci,j } . 22 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK The graph Γ is a bipartite graph with bipartition consisting of X and C := {(i, j) | 1 ≤ i ≤ n and 1 ≤ j ≤ ki }. Some authors define the cycle graph using only non-trivial cycles. We allow trivial cycles to make our discussion more streamlined later. Allowing for trivial cycles only adds leaves to the graph. In particular, these leaves to do affect whether or not the cycle graph is a tree. Definition 6.2. For X a finite set, a finite sequence α of elements of Sym(X) is called tree-like if the cycle graph is a tree. We will find tree-like sequences in the definition of kneading automata groups. Let us note several facts for later use. Lemma 6.3. If (σ1 , . . . , σn ) is a tree-like sequence of permutations of a finite set X, then H := hσ1 , . . . , σn i acts transitively on X. Proof. First note that if x, x′ ∈ X are connected by a path of length 2, then they belong to a cycle of some σi and are hence in the same orbit of H. Since the cycle graph Γ is bipartite, and hence any path between elements of X decomposes as a composition of length two paths of the above sort, H is transitive by the connectivity of Γ.  For a permutation σ ∈ Sym(X), we denote the collection of fixed points in X of σ by fix(σ). Lemma 6.4 ([11, Lemma 6.5]). Let X be a finite set and α = (σ1 , . . . , σn ) be a tree-like sequence of permutations of X. Then (1) For any i 6= j, |fix(σi )| + |fix(σj )| ≥ 2. (2) If |fix(σi )| + |fix(σj )| ≤ 3 for some i 6= j, then σk = 1 for all k ∈ / {i, j}. 6.2. Kneading automata. A set Y ⊆ Aut(X ∗ ) is called self-similar if gx ∈ Y for every x ∈ X and g ∈ Y . Definition 6.5. We say that G ≤ Aut(X ∗ ) is a kneading automata group if G admits a finite self-similar generating set Y such that the following hold: (1) For each non-trivial h ∈ Y , there is a unique g ∈ Y and x ∈ X such that gx = h. (2) For each h ∈ Y and each cycle (x1 . . . xn ) of π1 (h), possibly of length one, there is at most one 1 ≤ i ≤ n such that hxi 6= 1. (3) The sequence (π1 (h))h∈Y \{1} is tree-like. We call Y a distinguished generating set and write G = hY i ≤ Aut(X ∗ ) to indicate that Y is a distinguished generating set for G. A straightforward verification shows that a kneading automata group is a bounded automata group. Furthermore, kneading automata groups naturally arise in the study of iterated monodromy groups. ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 23 Theorem 6.6 (Nekrashevych, [18, Theorem 6.10.8]). Every iterated monodromy group of a post-critically finite polynomial has a faithful representation as a kneading automata group Kneading automata groups enjoy several useful properties. Lemma 6.7. If G = hY i ≤ Aut(X ∗ ) is a kneading automata group, then G ≤ Aut(X ∗ ) is a self-replicating bounded automata group Proof. To see that G is self-replicating, we must verify that G acts transitively on X and the section homomorphisms are onto for every x ∈ X. Since (π1 (y))g∈Y \{1} is tree-like, π1 (G) acts transitively on X, so G acts on X transitively. To see that the section homomorphisms are onto, we first argue that for each v, w ∈ X, there is k ∈ G such that k(v) = w with kv = 1. Fix g ∈ Y and say that {O1 , . . . , On } lists the orbits of hgi on X. Take v, w ∈ Oi and fix |j| ≥ 1 least such that g j (v) = w. If (g j )v = 1, we are done, so let us suppose that (g j )v is non-trivial. By the definition of a kneading automata group, there is a most one z ∈ Oi such that gz is non-trivial. Say that gz = h and let m ≥ 1 be least such that gm fixes z. The element g m fixes Oi and (gm )u = h for every u ∈ Oi . On the other hand, (gj )v = h±1 , since we chose j with |j| least. Either gj−m or gj+m , depending on the sign of (gj )v , then sends v to w with trivial section at v. For an arbitrary v, w ∈ X, there is a word γ = gnin . . . g1i1 with gk 6= gk+1 ∈ Y such that γ(v) = w. We may further assume that Σnj=1 |ij | is least among all such words γ. The image g1i1 (v) lies in the orbit of v under hg1 i. Appealing to the previous paragraph, we may replace g1i1 , if necessary, with g1i1 ±mi for some mi such that that g1i1 ±mi (v) = g1i1 (v) and (g1i1 ±mi )v = 1. Doing this for each gj as necessary, we produce a new word γ ′ such that γ ′ (v) = w and (γ ′ )v = 1. Fix x ∈ X and let g ∈ Y . By the definition of a kneading automata group, there is h ∈ Y and z ∈ X such that hz = g. The previous paragraph supplies γ and δ such that γ(x) = z with γx = 1 and δ(h(z)) = x with δh(z) = 1. The element δhγ fixes x, and (δhγ)x = δh(z) hz γx = hz = g. The image φx (G(x) ) of the section homomorphism at x thus contains Y . We conclude that φx (G(x) ) = G, and G is self-replicating.  In addition to self-replication, kneading automata groups enjoy a robustness property. Specifically, the representation rk (G) is again a kneading automata group, for any k ≥ 1. This was proved in [18, Proposition 6.7.5] using the dual automaton and a topological argument; here we provide a simple counting argument. Lemma 6.8 ([18, Proposition 6.7.5]). If G = hY i ≤ Aut(X ∗ ) is a kneading automata group, then 24 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK (1) for all k ≥ 1, rk (G) = hrk (Y )i ≤ Aut((X k )∗ ) is a kneading automata group; (2) there is k ≥ 1 such that rk (G) = hrk (Y )i ≤ Aut((X k )∗ ) is a kneading automata group in reduced form. In particular, every kneading automata group has a faithful representation as a kneading automata group in reduced form. Proof. For any k, conditions (1) and (2) of the definition of a kneading automata group are easily verified to hold for rk (G). To prove (3), we show that (πk (y))y∈Y \{1} is a tree-like sequence in Sym(X k ) for any k ≥ 1. We use that a finite connected graph is a tree if and only if it has Euler characteristic 1. Set Z := Y \ {1} Let us begin by making several observations. Let Γi be the cycle graph of (πi (y))y∈Z . Define li : Z → N by setting li (g) to be the number of orbits of hgi on X i . For g ∈ Z, let Yg,i := {gx | x ∈ X i } \ {1}. As G is a kneading automata group, it follows that Z = ⊔g∈Z Yg,i . We observe that the functions li+1 are defined in terms of l1 and li . Fix g ∈ Z. The difference li (g) − |Yg,i | is the number of orbits O of hgi on X i such that gx = 1 for every x ∈ O. For each such orbit O and x ∈ X, the set of words Ox is an orbit of hgi on X i+1 . There are thus |X|(li (g) − |Yg,i |) many orbits of hgi on X i+1 of this type. For any other orbit O, let h ∈ Yg,i be the non-trivial section of g for some x ∈ O; the orbit O for a given h is unique. For any W an orbit of hhi acting on X, the argument in the second paragraph of the proof of Lemma 6.7 (which only uses conditions (1) and (2) of a kneading automata group) shows that OW is an orbit of hgi acting on X i+1 . We conclude that X li+1 (g) = |X| (li (g) − |Yg,i |) + l1 (h). h∈Yg,i Note further that Γi is connected for every i, since G acts transitively on X i . Additionally, X li (g) and |EΓi | = |Z||X|i . |V Γi | = |X|i + g∈Z We now argue by strong induction on i ≥ 1 for the claim that (πi (y))y∈Z is a tree-like sequence. The base case holds by definition. Suppose (πi (y))y∈Z is a tree-like sequence for all i ≤ k. To verify the inductive claim, it suffices to show that |V Γk+1 | − |EΓk+1 | = 1. The inductive hypothesis ensures that X li (g) = |Z||X|i − |X|i + 1 g∈Z for any i ≤ k. For k + 1, we have |V Γk+1 | = |X|k+1 + X g∈Z lk+1 (g). ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 25 In view of the relationship between the functions li , we substitute to obtain   P P |V Γk+1 | = |X|k+1 + g∈Z |X| (lk (g) − |Yg,k |) + h∈Yg,k l1 (h) P P = |X|k+1 + |X| g∈Z lk (g) − |X||Z| + g∈Z l1 (g) = |X|k+1 + |X|k+1 |Z| − |X|k+1 + |X| − |X||Z| + |Z||X| − |X| + 1 = |X|k+1 |Z| + 1. Hence, |V Γk+1 | − |EΓk+1 | = 1, as required. Therefore, rk (G) is kneading automata group. Lemma 6.7 ensures that G is a self-replicating bounded automata group, and by Corollary 3.7, there is k such that rk (G) is in reduced form. Hence, rk (G) is a kneading automata group in reduced form.  6.3. Elementary amenable kneading automata groups. We begin by extracting a result from the proof of [11, Theorem 8.2]. For g ∈ Aut(X ∗ ), let fixk (g) be the collection of fixed points of hgi acting on X k . Lemma 6.9. Let G = hY i ≤ Aut(X ∗ ) be a kneading automata group in reduced form with |X| > 3. If there are distinct g and h in Y such that |fix1 (g)| + |fix1 (h)| = 2, then either (1) |fix2 (g ′ )| + |fix2 (h′ )| > 3 for all distinct, non-trivial g′ and h′ in Y , or (2) G is the infinite dihedral group. Proof. Since G is self-replicating, it is infinite. Suppose that (1) fails. Say that g ′ and h′ in Y are such that |fix2 (g′ )| + |fix2 (h′ )| ≤ 3. Lemma 6.8 tells us that r2 (G) is a kneading automata group, so Lemma 6.4 implies that π2 (d) acts trivially on X 2 for all d ∈ Y \ {g′ , h′ }. If h or g is an element of Y \ {g ′ , h′ }, then h or g fixes X, which contradicts that |fix1 (g)| + |fix1 (h)| = 2. We conclude that {g, h} = {g ′ , h′ }. In particular, |fix2 (g)| ≤ 3 and |fix2 (h)| ≤ 3. As G is in reduced form, all finitary elements of Y have depth one, so there are no non-trivial finitary elements in Y \ {g, h}, since all elements of Y \ {g, h} act trivially on X. If d ∈ Y \ {g, h} is directed, then the previous paragraph ensures that it fixes X 2 . Every section dx for x ∈ X \ {v d } is trivial where v d is the active vertex for d on level one, as d fixes X 2 . The element d therefore acts trivially on X ∗ , and d = 1. Hence, Y = {g, h, 1}. Take Γ the cycle graph for (π1 (g), π1 (h)) and set n := |X|. Let Kg and Kh be the number of non-trivial cycles in g and h, respectively, and Fg and Fh be the number of trivial cycles in g and h, respective. Euler’s formula for trees implies that |V Γ| − |EΓ| = 1. In view of the definition of Γ, we see that |V Γ| = n + Kg + Fg + Kh + Fh and |EΓ| = 2n. Therefore, Kg +Kh = n−1. Observe that |fix1 (g)∪fix1 (h)| = 2, as G = hg, hi acts transitively on X and hence g, h do not have a common fixed point. If fix1 (g)∪fix1 (h) = {x, x′ }, then it follows that every element of X \{x, x′ } belongs to both a non-trivial cycle of π1 (g) and a non-trivial cycle 26 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK of π1 (h) and x, x′ each belong to a non-trivial cycle of exactly one of π1 (g) or π1 (h). It follows that 2n − 2 ≥ 2Kg + 2Kh with equality if and only if π1 (g), π1 (h) are both products of disjoint two-cycles in their respective cycle decompositions (omitting trivial cycles). As Kg +Kh = n−1, we deduce that π1 (g) and π1 (h) are products of disjoint two-cycles, so |π1 (g)| = |π1 (h)| = 2. We now have two cases: (a) Y contains a non-trivial finitary element, and (b) Y contains no non-trivial finitary element. For case (a), suppose that g is finitary. The element g therefore has order two, since G is in reduced form. If g fixes a point u ∈ X, then g must fix pointwise uX in X 2 , since gu = 1. This implies that |fix2 (g)| > 3, which is absurd. We conclude that g acts fixed point freely on X, so h fixes two points v1 , v2 of X. If some hvi = 1, then h fixes vi X contradicting that |fix2 (h)| ≤ 3. Since G is a kneading automata group with self-similar generating set Y = {g, h, 1}, we deduce that, up to relabelling, hv1 = h, hv2 = g and all other sections of h are trivial. Since π1 (h) is a product of disjoint two-cycles and g is an involution, it now follows that h2 = 1. Hence, G is an infinite dihedral group. For case (b), both g and h are directed, and as Y is self-similar, neither g nor h has non-trivial finitary sections. Take u ∈ X \ {v g }. If g fixes u, then |fix2 (g)| > 3, since gu = 1; this is absurd. The only possible fixed point of g in X is its active vertex v g . Likewise, the only possible fixed point of h in X is its active vertex v h . Therefore, g fixes v g , and h fixes v h . We conclude that g and h are torsion with |g| = |h| = 2. The group G is thus infinite and generated by two involutions, so G is an infinite dihedral group.  We are now ready to prove the desired theorem. Theorem 6.10. Suppose that G = hY i ≤ Aut(X ∗ ) is a kneading automata group. If G is elementary amenable, then G is virtually abelian. Proof. Suppose toward a contradiction that G is not virtually abelian. We begin with several reductions. In view of Lemma 6.7, G is a self-replicating bounded automata group, and by Lemma 6.8, we may assume that G is in reduced form. By passing to r2 (G), where r2 : Aut(X ∗ ) → Aut((X 2 )∗ ) is the canonical inclusion, we may assume that |X| > 3. If g, h ∈ Y are distinct elements such that |fix1 (g)| + |fix1 (h)| = 2, then Lemma 6.9 ensures that |fix2 (g′ )|+|fix2 (h′ )| > 3 for all distinct, non-trivial g′ and h′ in Y . Passing to r2 (G) a second time, we may additionally assume that |fix1 (g)|+|fix1 (h)| > 3 for all distinct, non-trivial g and h in Y . Applying Corollary 5.11, we obtain weakly self-replicating M E G and F E G such that rk(M ) + 2 = rk(G) = rk(F ) + 1, M ≤ F , F/M is abelian, and G/F is finite. By Lemma 4.8, F also acts transitively on X. We now have two cases (1) every g ∈ Y fixes at least two points on X, and (2) some unique g ∈ Y fixes one or fewer points on X. Let us suppose first that every g ∈ Y has at least two fixed points. Fix h ∈ Y directed. Since h fixes at least two points, we may find x ∈ X such that h fixes x and hx =: σ is finitary. The section σ is again an element of Y , so it fixes some x′ ∈ X, as it also fixes two points. The element h ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 27 therefore fixes xx′ , and hxx′ = σx′ = 1, since G is in reduced form. Let v h be the active vertex of h in X 2 and d ≥ 1 be least such that hd fixes v h . For O the orbit of v h under hhi, that G is a kneading automata group ensures that v h is the only element of O for which h has a non-trivial section. It follows that (hd )vh = h. Since (hd ) also fixes xx′ , Lemma 4.7 implies that h ∈ F. For any non-trivial section hz of h, the definition of the kneading automata ensures that hz is the only non-trivial section of h on the orbit for z under hhi. Taking k ≥ 1 least such that hk fixes z, it follows that (hk )z = hz . Recalling that F is weakly self-similar, we conclude that hz ∈ F . It now follows from Proposition 5.5 (as G is self-replicating) that F = G, which contradicts the rank of G. Suppose next that there is a unique g ∈ Y that has at most one fixed point on X. Fix h ∈ Y \ {g} directed. The element h has at least three fixed points in X, so there is x ∈ X such that h fixes x, hx is finitary, and hx 6= g. The section hx fixes some x′ ∈ X, as it differs from g. Hence, h fixes xx′ , and hxx′ = 1. Just as in the previous case, it now follows that h ∈ F . The quotient F/M is abelian, and F acts on X transitively. As Lemma 4.7 also applies in this setting, we can run the argument again to deduce that h ∈ M , and as in the previous case, hx ∈ M for all x ∈ X. We conclude that hx ∈ M for all x ∈ X and h ∈ Y \ {g}. The subgroup M therefore contains Y \ ({gx | x ∈ X} ∪ {g}). Let us now consider the element g. The quotient G/M cannot be abelian because rk(G) = rk(M ) + 2 and so {gx | x ∈ X} ∪ {g} is not equal to {1, g}. The element g thereby admits non-trivial finitary sections and, in particular, is not, itself, finitary. Fix x ∈ X such that gx is a non-trivial finitary element σ and note that σ ∈ Y \ {g} fixes a point x′ ∈ X. Let d ≥ 1 be least such that gd fixes v := v g and let m ≥ 1 be least such that gm fixes x. Since G is a kneading automaton group, and hence each orbit of g has at most one non-trivial section, (g d )v = g and (gm )x = 2 2 σ. Observe that gd fixes vv, g m fixes xx′ (gm )xx′ = 1 and (gd )vv = g. 2 2 The element g d m thus fixes vv and xx′ . Moreover, (g d m )xx′ = 1 and 2 (gd m )vv = gm . Applying Lemma 4.7, we deduce that gm ∈ F . The element 2 gd m is therefore also in F , and since F/M is abelian, a second application of Lemma 4.7 ensures that gm ∈ M . The element gm fixes x, and (g m )x = σ. Therefore, σ ∈ M , since M is weakly self-similar. We conclude that M contains every finitary section of g and hence Y \ {g}. The quotient G/M is thus abelian, which contradicts the rank of G.  Theorems 6.6 and 6.10 yield an immediate corollary. Corollary 6.11. Every iterated monodromy group of a post-critically finite polynomial is either virtually abelian or not elementary amenable. 28 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK 7. Generalized basilica groups Definition 7.1. We say that G ≤ Aut(X ∗ ) is a generalized basilica group if G admits a finite generating set Y such that for every g ∈ Y either gx = 1 for all x ∈ X or gx ∈ {1, g} for all x ∈ X with exactly one x such that gx = g. We call Y a distinguished generating set and write G = hY i ≤ Aut(X ∗ ) to indicate that Y is a distinguished generating set for G. A straightforward verification shows that a generalized basilica group is a bounded automata group. 7.1. A reduction theorem. The reduction result established herein reduces many questions for generalized basilica groups to the self-replicating case. It follows by induction on the number of directed elements of a distinguished generating set. Our first lemma gives a tool to reduce to groups with possibly fewer number of directed generators, based on the orbits of the group on the first level of the tree. Lemma 7.2. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica group, let O1 , . . . , On list the orbits of G on X, and let Yi ⊆ Y be the collection of g ∈ Y such that v g ∈ Oi . For each i, hYi i ≤ Aut(X ∗ ) is a generalized basilica group generated by directed elements, and G ֒→ n Y Sym(Oi ) ⋉ n Y hYi iOi . i=1 i=1 Aut(X ∗ ) Proof. That each hYi i ≤ is a generalized basilica group generated by directed elements is immediate. For each x ∈ Oi and h ∈ Y , the section hx is an element of hYi i. Inducting on the word length, one sees that gx ∈ hYi i for all g ∈ G and x ∈ Oi . Letting πQ 1 : G → Sym(X) be the induced homomorphism, we see that π1 (G) ≤ n1=1 Sym(Oi ). We may now define G→ n Y i=1 Sym(Oi ) ⋉ n Y hYi iOi . i=1 by g 7→ π1 (g)((gx )x∈Oi )ni=1 . One verifies that this function is a monomorphism.  Our next lemmas address the case in which Lemma 7.2 does not reduce the number of directed elements. Lemma 7.3. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica group. If O ⊆ X is setwise preserved by the action of G on X, then O∗ is setwise preserved by G, and the induced homomorphism φ : G → Aut(O ∗ ) is such that φ(G) is a generalized basilica group with distinguished generating set φ(Y ). ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 29 Proof. That G is self-similar ensures that O ∗ is setwise preserved by G. Take −1 ◦ g ◦ ψw where ψv : X ∗ → vX ∗ g ∈ G and w ∈ O∗ . By definition, gw = ψg(w) by x 7→ vx. The map φ is nothing but restriction to O ∗ , so we see that −1 ↾O∗ ◦g ↾O∗ ◦ψw ↾O∗ = φ(g)w . φ(gw ) = (gw ) ↾O∗ = ψg(w) It now follows that φ(G) ≤ Aut(O∗ ) is a generalized basilica group with generating set φ(Y ).  We call the action of G on O ∗ a sub-basilica action of G induced from X ∗. Lemma 7.4. Let O ⊆ X and let G be the subgroup of Aut(X ∗ ) consisting of those elements that fix O∗ pointwise and have trivial sections outside of ∗ O ∗ . Then G ∼ = Sym(X \ O)O and hence is locally finite. Proof. It is clear that G is a subgroup of Aut(X ∗ ) since if f, g ∈ G and w∈ / O∗ , we have (f g)w = fg(w) gw = 1 as g(w) ∈ / O ∗ . There is a well-known ∗ ∗ set-theoretic bijection of Aut(X ) with Sym(X)X sending an element g to ∗ its ‘portrait’ (π1 (gw ))w∈X ∗ ∈ Sym(X)X . Put Y := X \ O. An element g ∈ Aut(X ∗ ) belongs to G if and only if gw = 1 for w ∈ / O∗ and π1 (gw ) ∈ ∗ Sym(Y ) for w ∈ O (where Sym(Y ) is viewed as a subgroup of Sym(X) ∗ in the usual way). There is thus a bijection π : G → Sym(Y )O given by π(g) = (π1 (gw ))w∈O∗ . The mapping π is a homomorphism because if f, g ∈ G and w ∈ O ∗ , then (f g)w = fg(w) gw = fw gw as g fixes O ∗ pointwise. This proves the first statement. Since the variety of groups generated by any ∗  finite group is locally finite, it follows that Sym(Y )O is locally finite. Lemma 7.5. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica group generated by directed elements. If there is an orbit O ⊆ X of G such that v g ∈ O for all g ∈ Y , then the homomorphism φ : G → Aut(O ∗ ) induced by the action G y O ∗ enjoys the following properties: (1) φ(G) is a self-replicating generalized basilica group with generating set φ(Y ), and (2) ker(φ) is locally finite. Proof. For (1), Lemma 7.3 ensures that φ(G) ≤ Aut(O∗ ) is a generalized basilica group with generating set φ(Y ). Lemma 5.3 implies that secG (v) = G for all v ∈ O, so secφ(G) (v) = φ(G) for all v ∈ O. Since G acts transitively on O, φ(G) is self-replicating. For (2), clearly ker(φ) fixes O∗ pointwise. Since v g ∈ O for all g ∈ Y , it follows that fv = 1 for all v ∈ X \ O and f ∈ G. As G is self-similar, it follows that fw = 1 for all f ∈ G and w ∈ / O∗ . Indeed, we may write ∗ ∗ w = uav with u ∈ O , a ∈ X \ O, and v ∈ X , so fw = ((fu )a )v = 1v = 1. ∗ Thus, ker(φ) is isomorphic to a subgroup of Sym(X \ O)O , and hence is locally finite, by Lemma 7.4.  Bringing together our lemmas produces the desired reduction theorem. To state our main theorem in full generality requires a definition. 30 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Definition 7.6. Suppose that Q is a property of generalized basilica groups. We say that Q is a sub-basilica stable property if for every generalized basilica group G = hY i ≤ Aut(X ∗ ) with property Q, the following holds: For every generalized basilica group of the form hY ′ i ≤ Aut(X ∗ ) with Y ′ ⊂ Y , g′ i induced by a sub-basilica action of hY ′ i any generalized basilica group hY has property Q. In particular, hY ′ i has Q. Observe that any property of groups stable under passing to subgroups and quotients is sub-basilica stable. Theorem 7.7. Let Q be a sub-basilica stable property and suppose that P is a property of groups enjoyed by abelian groups and stable under taking subgroups, finite direct products, and P -by-finite groups. If every self-replicating generalized basilica group with property Q has property P , then every generalized basilica group with property Q is (locally finite)-by-P . Proof. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica group with property Q. We argue by induction on the number of directed elements in Y , denoted by δ(Y ), for the theorem. If δ(Y ) ≤ 1, then G is virtually abelian by Lemma 5.6, and we are done. Suppose the theorem holds up to n and say that δ(Y ) = n + 1. Let O1 , . . . , Ol list the orbits of G on X and let Yi ⊆ Y be the collection of directed d ∈ Y such that v d ∈ Oi . Lemma 7.2 supplies an injection G ֒→ l Y i=1 Sym(Oi ) ⋉ l Y HiOi . i=1 It is enough to show that each Hi is (locally finite)-by-P Each Hi ≤ Aut(X ∗ ) is again a generalized basilica group with property Q, since Q is sub-basilica stable. If no Oi contains v d for every directed d ∈ Y , each Hi is such that δ(Yi ) < n + 1. The inductive hypothesis then ensures that each Hi is (locally finite)-by-P . Suppose some Oi contains v d for every directed d ∈ Y . Without loss of generality, i = 1, so Hj = {1} for j > 1. Clearly each Hj with j > 1 is (locally finite)-by-P . We apply Lemma 7.5 to the group H1 . Letting K := ker(H1 y O1∗ ), Lemma 7.5 ensures that H1 /K ≤ Aut(O1∗ ) is a selfreplicating generalized basilica group, and K is locally finite. Since H1 /K is the group induced by a sub-basilica action, H1 /K has property Q, hence H1 /K has property P . We conclude that H1 is (locally finite)-by-P .  We can do better for torsion-free bounded automata groups. The proof is essentially the same as that of Theorem 7.7, so we leave it to the reader. Theorem 7.8. Suppose that P is a property of groups enjoyed by abelian groups and stable under taking subgroups, finite direct products, and P -byfinite groups. If every self-replicating torsion-free bounded automata group has property P , then every torsion-free bounded automata group has P . ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 31 7.2. Groups with center. A system of imprimitivity for a group action G y X is a G-equivariant equivalence relation on X. That is, x ∼ y if and only if g(x) ∼ g(y). The equivalence classes of a system of imprimitivity are called blocks of imprimitivity. A block B is called trivial if it equals either X or a singleton set. Lemma 7.9. Suppose that h ∈ Aut(X ∗ ) is a directed automorphism such that hx ∈ {1, h} for all x ∈ X. Let B ⊆ X be a non-trivial block of imprimitivity for the action of hhi on X and O be the orbit of v h under the action of hhi on X. If |O ∩ B| ≥ 2, then there is j ∈ Z and w ∈ B such that hj stabilizes B setwise, (hj )w = h±1 , and (h−j )w = 1. Proof. Let i ≥ 0 be least such that hi (v h ) ∈ B. Suppose first that i = 0, so v h ∈ B. Set w := v h . Let j > 0 be least such that hj (w) ∈ B and observe that hj (w) 6= w since |O ∩ B| ≥ 2. The element hj stabilizes B setwise, and it is clear that (hj )w = h. On the other hand, (h−j ) has non-trivial sections at {h(w), . . . , hj (w)}, and this set excludes w. We conclude that (h−j )w = 1, establishing the lemma in this case. Suppose next that i > 0 and set w := hi (v h ). Let j > 0 be least such that hj+i (v h ) ∈ B. The element h−j setwise stabilizes the block B, so h−j (w) = hi−j (v h ) ∈ B. If j ≤ i, then we contradict the choice of i, so j > i. It now follows that (h−j )w = h−1 . On the other hand, hj (w) = hj+i (v h ). As j + i > j, h−j has a trivial section at hj (w). We deduce that (hj )w = 1.  Lemma 7.10. Let G ≤ Aut(X ∗ ) be self-similar, 1 6= d ∈ G be directed such that dx ∈ {1, d} for all x ∈ X, and O be the orbit of v d ∈ X under the action of hdi. Then, O is setwise stabilized by CG (d), and gv ∈ CG (d) for all g ∈ CG (d) and v ∈ O . Proof. Take n ≥ 1 least such that dn fixes O. The element dn is such that ( d if v ∈ O (dn )v = 1 else. For any v ∈ O and z ∈ CG (d), we see that (d−n )z(v) zv d = (d−n zdn )v = zv . The sections of d−n are either d−1 or 1, and the non-trivial sections occur for exactly the v ∈ O. It is therefore the case that z(v) ∈ O and d commutes with zv . The group CG (d) thus setwise stabilizes O, and gv ∈ CG (d) for all g ∈ CG (d) and v ∈ O.  Lemma 7.11. For G ≤ Aut(X ∗ ), if v ∈ X ∗ is such that secG (v) = G, then secZ(G) (v) ≤ Z(G). In particular, if G is weakly self-replicating, then Z(G) is weakly self-similar. Proof. We see that Z(G)(v) ≤ Z(G(v) ) ≤ G(v) . Therefore, secZ(G) (v) = φv (Z(G)(v) ) ≤ φv (Z(G(v) )) ≤ Z(φv (G(v) )) = Z(G). The lemma now follows.  32 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Theorem 7.12. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating generalized basilica group. If Z(G) is non-trivial, then G is abelian. Proof. By Proposition 5.4, we may assume that Y consists of directed elements. Set Z := Z(G) and for O ⊆ X, define SO := {zv | z ∈ Z and v ∈ O} ∪ Z. Fix d ∈ Y and let Od be the orbit of hdi on X such that v d ∈ Od . Lemma 7.10 ensures that CG (d) contains SOd , so d ∈ CG (SOd ). Let W ⊆ X be maximal such that Od ⊆ W and d ∈ CG (SW ). We argue that W = X. Let us first see that W is invariant under the action of Z. Take v ∈ W and z ∈ Z. For g ∈ Z, we see that (gz)v = gz(v) zv . Since d commutes with (gz)v and zv , it follows that d commutes with gz(v) . The element d thus commutes with gz(v) for every g ∈ Z, hence z(v) ∈ W , since W is maximal. We next argue that W is invariant under each c ∈ Y . Fixing c ∈ Y , we have two cases. For the first case, suppose that Oc ∩ W = ∅, where Oc ⊆ X is the orbit of v c under hci. Take g ∈ Z and fix v ∈ W . We see that gv = (c−1 gc)v = (c−1 )gc(v) gc(v) cv = (c−1 )cg(v) gc(v) Since W is invariant under Z, g(v) ∈ W . The element cg(v) is thus not in Oc , so (c−1 )cg(v) = 1. We conclude that gv = gc(v) , hence d commutes with gc(v) . Therefore, c(v) ∈ W by maximality, and W is invariant under the action of c. For the second case, suppose that Oc ∩ W 6= ∅. Applying Lemma 7.10, Oc is Z-invariant. The intersection Oc ∩ W is then also Z-invariant, so |Oc ∩ W | ≥ 2, since Z cannot fix any vertex of X by Lemmas 4.6 and 7.11. The orbits of Z on Oc form a non-trivial system of imprimitivity for hci, so there is a non-trivial block of imprimitivity B ⊆ Oc ∩ W for the action of hci on X. Via Lemma 7.9, we may find w ∈ B and j ∈ Z such that (cj )w = c±1 , (c−j )w = 1, and cj setwise fixes B. Let z ∈ Z be such that z(cj (w)) = w. The element c−j zcj is an element of Z, and w ∈ W . The element d thus commutes with (c−j zcj )w . On the other hand, (c−j zcj )w = (c−j )w zcj (w) (cj )w = zcj (w) c±1 , so d commutes with zcj (w) c±1 . Furthermore, d commutes with zcj (w) since cj (w) ∈ B ⊆ W . We deduce that d commutes with c. For any vertex u ∈ W and g ∈ Z, d commutes with (c−1 gc)u . On the other hand, (c−1 gc)u = (c−1 )g(c(u)) gc(u) cu Since the sections of c are either equal c or trivial, d commutes with cu and (c−1 )g(c(u)) . We conclude that d commutes with gc(u) , so c(u) ∈ W by the choice of W . The set W is thus setwise fixed by every c ∈ Y . Our group G = hY i acts transitively on X, so it is the case that W = X. For any c ∈ Y , there is z ∈ Z such that z(c(v c )) 6= c(v c ) by Lemma 4.6. Taking such a z, c−1 zc ∈ Z, and we have that d commutes with (c−1 zc)vc , ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 33 by our work above. Furthermore, (c−1 zc)vc = zc(vc ) c, and d commutes with zc(vc ) . We infer that d commutes with c. Since d is arbitrary, it now follows that all elements of Y commute, hence G is abelian.  We can now upgrade Theorem 5.8 in the self-replicating case. We note that Theorem 5.8 cannot be upgraded itself since one can always add finitary elements. Corollary 7.13. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating generalized basilica group. If G contains an odometer, then either G is abelian or G is not elementary amenable. Proof. Suppose that G is elementary amenable. By Theorem 5.8, G is virtually abelian. Suppose for contradiction that G is not abelian. Applying Corollary 4.4, there is H E G such that H is weakly self-replicating, rk(H) + 1 = rk(G), and G/H is finite. Observe that H is abelian, since it must be infinite with rank 0. Take h ∈ G an odometer. Since G/H is finite, there is i > 0 such that hi ∈ H. Set m := |X|i. The element hm is in H, and (hm )x = hi for all x ∈ X. Since H is abelian, f −1 hm f = hm for any f ∈ H. For any x ∈ X, it is then the case that (fx )−1 hi fx = hi . We conclude that CG (hi ) contains H along with fx for all f ∈ H and x ∈ X. Take d ∈ Y . In view of Lemma 4.8, there is f ∈ H such that f (d(v d ))) 6= d(v d ). The element d−1 f d is in H, and (d−1 f d)vd = fd(vd ) d. The centralizer CG (hi ) therefore contains fd(vd ) d. Since CG (hi ) also contains fd(vd ) , we infer that d ∈ CG (hi ). The element hi is therefore central in G. The group G thus has non-trivial center. Applying Theorem 7.12, we conclude that G is abelian, which is absurd.  Theorem 7.12 and Theorem 7.7 together imply all nilpotent generalized basilica groups are virtually abelian. Corollary 7.14. Every nilpotent generalized basilica group is virtually abelian. Proof. Nilpotent groups have non-trivial centers. Theorem 7.12 thus implies that every self-replicating nilpotent generalized basilica group is virtually abelian. The property Q of being nilpotent is closed under subgroups and quotients, so a fortiori it is a sub-basilica stable property. The property P of being virtually abelian is enjoyed by abelian groups and stable under taking subgroups, finite direct products, and forming P -by-finite groups. We may thus apply Theorem 7.7 to conclude that every nilpotent generalized basilica group is (locally finite)-by-virtually abelian. Every subgroup of a finitely generated nilpotent group is finitly generated. Hence, every nilpotent generalized basilica group is finite-by-virtually 34 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK abelian. Since generalized basilica groups are residually finite, it follows that every nilpotent generalized basilica group is virtually abelian.  Corollary 7.15. Every torsion-free nilpotent bounded automata group is virtually abelian. 7.3. Balanced groups. Definition 7.16. Let G = hY i ≤ Aut(X ∗ ) be a generalized basilica group. We say that G is balanced if for each directed g ∈ Y , the least n ≥ 1 for which gn fixes v g ∈ X is also such that g n fixes X pointwise. For G = hY i ≤ Aut(X ∗ ) balanced, take g ∈ Y directed and let c1 . . . cn be the cycle deomposition of π1 (g) ∈ Sym(X). That G is balanced ensures that for ci such that v g appears in ci , the order |cj | divides |ci | for all 1 ≤ j ≤ n. This condition gives us control over the generators analogous to how the tree-like condition did for kneading automata groups. Theorem 7.17. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating generalized basilica group. If G is balanced, then either G is abelian or G is not elementary amenable. Proof. By Proposition 5.4, we may assume that Y consists of directed elements. Suppose that G is elementary amenable. If Y contains an element that acts transitively, i.e., an odometer, then Corollary 7.13 implies that G is abelian, and we are done. Let us suppose that each element of Y does not act transitively and suppose toward a contradiction that G is not abelian. Applying Corollary 4.4, there is H E G such that H is weakly self-replicating, rk(H) + 1 = rk(G), and G/H is either finite or abelian. For each d ∈ Y , let n be least such that dn fixes v d . Since G is balanced, n d fixes X, and as hdi does not at transitively on X, there is x ∈ Y such that (dn )x = 1. In view of Lemma 4.7, we deduce that d ∈ H. As d is arbitrary, we conclude that H = G which is absurd since rk(H) < rk(G). The group G is thus abelian.  Corollary 7.18. Every balanced generalized basilica group is either (locally finite)-by-(virtually abelian) or not elementary amenable. Proof. Theorem 7.17 ensures that every self-replicating generalized basilica group that is balanced and elementary amenable is virtually abelian. The property Q of being balanced and elementary amenable is a subbasilica stable property. The property P of being virtually abelian is enjoyed by abelian groups and stable under taking subgroups, finite direct products, and forming P -by-finite groups. We may thus apply Theorem 7.7 to conclude that every balanced and elementary amenable generalized basilica group is (locally finite)-by-virtually abelian.  Remark 7.19. Example 9.1 below shows that Theorem 7.18 is sharp. ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 35 We conclude this section with a sufficient condition to be a balanced generalized basilica group. Proposition 7.20. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica group that acts transitively on X. If π1 (G) ≤ Sym(X) is abelian, then G is balanced. Proof. Let d ∈ Y be directed. The image π1 (hdi) is a normal subgroup of π1 (G), so the orbits of hπ1 (d)i form a system of imprimitivity for the action of π1 (G) on X. Since π1 (G) is transitive, all orbits of hπ1 (d)i have the same size, and it follows that d is balanced.  8. Groups of abelian wreath type Definition 8.1. We say that G ≤ Aut(X ∗ ) is of abelian wreath type if π1 (G) ≤ Sym(X) is abelian and G admits a finite self-similar generating set Y such that for every g ∈ Y either gx = 1 for all x ∈ X or gx ∈ {g}∪π1 (G) for all x ∈ X with exactly one x such that gx = g. We call Y a distinguished generating set and write G = hY i ≤ Aut(X ∗ ) to indicate that Y is a distinguished generating set for G. A straightforward verification shows that a group of abelian wreath type is a bounded automata group. Let us note several immediate consequences of abelian wreath type; the proofs are elementary and so are left to the reader. Observation 8.2. Let G ≤ Aut(X ∗ ) be a self-replicating group of abelian wreath type. (1) For all non-trivial f ∈ Sym(X) ∩ G and v ∈ X, f (v) 6= v. (2) For all v ∈ X, G(v) = G(X) . (3) For all g, h ∈ G, [g, h] ∈ G(X) 8.1. The case of the binary tree. We here consider the bounded automata groups G that have a faithful representation in reduced form on [2]∗ . Any faithful representation G = hY i ≤ Aut([2]∗ ) in reduced form is necessarily of abelian wreath type. Let us first list all possible non-trivial automorphisms of [2]∗ that can appear as the distinguished generators of a bounded automata group G = hY i ≤ Aut([2]∗ ) in reduced form. We give the automorphisms in wreath recursion. Observation 8.3. Letting σ ∈ Sym(2) be the non-trivial element, any nontrivial generator g of a bounded automata group G = hY i ≤ Aut([2]∗ ) in reduced form has one of the following types, up to taking an inverse: (I) g = σ, (II) g = (σ, g) or g = (g, σ), (III) g = σ(1, g), or (IV) g = σ(σ, g). 36 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Lemma 8.4. If G = hY i ≤ Aut([2]∗ ) is a bounded automata group in reduced form and G contains an element of type (IV ), then G is not elementary amenable. Proof. The group G must contain σ, since it is self similar and contains an element of type (IV ). Say that g = σ(σ, g) is an element of type (IV ) in G. It suffices to show H := hσ, gi is not elementary amenable. Let us suppose toward a contradiction that H is elementary amenable. The group H is a self-replicating and clearly non-abelian, so we apply Corollary 4.4 to find a weakly self-replicating M E G such that rk(M )+1 = rk(G). In view of Lemma 4.6, we infer that M acts transitively on [2]. We see that σg = (σ, g), so (σg)2 = (1, g2 ). Taking m ∈ M such that m(0) = 1, we have that [(1, g2 ), m] ∈ M , and as M is weakly self-similar, [(1, g2 ), m]1 = g2 ∈ M . The square g2 equals (gσ, σg), so σg = (σ, g) ∈ M , using again that M is weakly self-similar. A final application of weak selfsimilarity implies that σ and g are elements of M . This is absurd, since M must be a proper subgroup.  Lemma 8.5. If G ≤ Aut([2]∗ ) is a bounded automata group of abelian wreath type and G contains elements of type (II) and (III), then G is not elementary amenable. Proof. The group G must contain σ, since it is self similar and contains an element of type (II). As the proofs are the same, let us assume that G contains g = (σ, g). Let us also assume that the type (III) element is h = σ(1, h). It now suffices to show H := hσ, g, hi is not elementary amenable. Let us suppose toward a contradiction that H is elementary amenable. The group H is a self-replicating and clearly non-abelian, so we apply Corollary 4.4 to find a weakly self-replicating M E G such that rk(M )+1 = rk(G). In view of Lemma 4.6, we infer that M acts transitively on [2]. We see that σh = (1, h). Taking m ∈ M such that m(0) = 1, we have that [(1, h), m] ∈ M , and as M is weakly self-similar, [(1, h), m]1 = h ∈ M . The commutator [g, h] is then also an element of M . Moreover, [g, h] = ghg −1 h−1 = (σ, g)σ(1, h)(σ, g −1 )σ(h−1 , 1) = (σhg −1 h−1 , gσ) we conclude that gσ ∈ M , since M is weakly self-replicating. As h = σ(1, h) ∈ M , it is then the case that gσh = (σ, g)(1, h) = (σ, gh) ∈ M . From a second application of weak self-similarity, it follows that σ, g, and h are elements of M . This is absurd as M is a proper subgroup of H.  Remark 8.6. The groups H arising in the proofs of Lemma 8.4 and 8.5 seem like they may be of independent interest. They appear to be the “smallest” non-elementary amenable bounded automata groups. Theorem 8.7. If G = hY i ≤ Aut([2]∗ ) is a bounded automata group in reduced form, then either G is virtually abelian or G is not elementary amenable. ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 37 Proof. Suppose that G is elementary amenable. In view of Lemma 8.4, Y contains no element of type (IV ). We now have two cases. Suppose first that Y contains one or two elements of type (II). The case of one element is an easy adaptation of the proof for the case of two elements, so we only consider the latter. In view of Lemma 8.5, Y does not contain an element of type (III). It now follows that Y has three non-trivial elements: Y = {σ, (g, σ), (σ, h)}. Seeing as σ(σ, g)σ = (h, σ), the group G is generated by two involutions, σ, (σ, g), so G is either finite or the infinite dihedral group. Suppose next that Y contains an element of type (III). As in the previous case, Y does not contain an element of type (II). The non-trivial elements of Y then consist of either a single type (III) element or a type (III) element and a type (I) element. In the former case, G is abelian, and in the latter case, G is virtually abelian.  8.2. Elementary amenable groups. We are now prepared to prove our main theorem of this section. Lemma 8.8. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating group of abelian wreath type that is elementary amenable. If G is non-abelian, then there is some directed d ∈ Y and x ∈ X such that dx is a non-trivial finitary element. Proof. We prove the contrapositive. If every directed d ∈ Y is such that dx ∈ {1, d} for all x ∈ X, then G is a generalized basilica group, and in view of Proposition 7.20, G is furthermore balanced. Theorem 7.17 thus implies that G is abelian.  Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating group of abelian wreath type with |X| > 2 and suppose that G is elementary amenable but not virtually abelian. Corollary 5.11 supplies a weakly self-replicating M E G such that rk(M ) + 1 = rk(G) and G/M is finite. Recall that M acts transitively on X by Lemma 4.8. Setting F := π1 (G) ∩ G, Lemma 8.12 below claims that G = F M ; by Lemma 8.8, F contains non-trivial elements. To prove this requires three preliminary lemmas, that amount to checking three cases. Fix c ∈ Y some directed element, let v ∈ X be the active vertex of c on X, and say that O ⊆ X is the orbit of v under the action of hci on X. Lemma 8.9. If there is l ∈ F such that lc fixes some x ∈ X, then there is k ∈ F such that kc ∈ M . Proof. Set d := lc. Since G has abelian wreath structure, d fixes X. If dw = 1 for some w ∈ X, then c ∈ M by Lemma 4.7, since dv = c. We thus suppose that dw 6= 1 for all w ∈ X. In view of Lemma 8.8, we may fix a nontrivial f ∈ F , and we may also fix m ∈ M such that m(v) ∈ X \ {v, f (v)}. Such an m exists since |X| > 2 and M is weakly self-replicating and of finite index. Set y := mv . 38 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK The commutator [m−1 , d−1 ] is in M , so [m−1 , d−1 ]v = (m−1 d−1 md)v = y −1 hyc is in M for some h ∈ F . On the other hand, [m−1 , f d−1 f −1 ] is also an element of M , so [m−1 , f d−1 f −1 ]v = y −1 h′ ydf −1 (v) is in M for some h′ ∈ F . The element k := df −1 (v) is also a non-trivial finitary element. We now have that c and a non-trivial finitary element k are elements of y −1 F yM . The quotient y −1 F yM/M is abelian, so [k, c−1 ] ∈ M . As k−1 moves c(v), it follows that [k, c−1 ]v = k′ c for some k′ ∈ F . Thus, k′ c ∈ M , completing the proof.  Lemma 8.10. If some non-trivial element of F setwise stabilizes O, then there is k ∈ F such that kc ∈ M . Proof. Fix a non-trivial f ∈ F such that f stabilizes O. If |O| ≤ 2, then f c fixes pointwise O, and Lemma 8.9 implies that there is k ∈ F such that kc ∈ M . We thus assume that |O| > 2. Let j > 1 be least such that cj fixes O and take i < j least such that f ci fixes O pointwise. If i = j − 1, then f c−1 fixes O pointwise, and there is k ∈ F such that kc−1 ∈ M by Lemma 8.9. In this case, ck−1 ∈ M , so conjugating by k−1 , we see that k−1 c ∈ M . We may thus assume that i < j − 1. If f ci has a trivial section at some z ∈ X, then as in the previous lemma, Lemma 4.7 implies that kc ∈ M for some k ∈ F . We may thus also assume that all sections of f ci at z ∈ X are non-trivial. The element f ci has non-finitary sections at Ω := {v, c−1 (v), . . . , c−i+1 (v)}. Note that |O \ Ω| ≥ 2, since |Ω| = i while |O| = j. We may find m ∈ M such that m(v) ∈ O \ (Ω ∪ c−1 (Ω)), since Ω ∪ c−1 (Ω) is only one element larger than Ω. Set y := mv . The commutator [m−1 , (f ci )−1 ] is in M , so [m−1 , (f ci )−1 ]v = y −1 h1 yh0 c is in M for some h1 , h0 ∈ F . On the other hand, c−1 f ci+1 has non-finitary sections exactly at Ω ∪ c−1 (Ω). In particular, (c−1 f ci+1 )v = c−1 k0 c for some non-trivial k0 ∈ F , since we assume that f ci has no trivial sections. The commutator [m−1 , (c−1 f ci+1 )−1 ] is in M , so [m−1 , (c−1 f ci+1 )−1 ]v = y −1 k1 yc−1 k0 c is in M , for some k1 ∈ F . We now have that h0 c and c−1 k0 c are elements of y −1 F yM , hence h0 c and k0 are elements of y −1 F yM , since F is an abelian group. The quotient y −1 F yM/M is abelian, so [k0 , (h0 c)−1 ] ∈ M . As k0−1 moves c(v), it follows ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 39 that [k0 , (h0 c)−1 ]v = k′ c where k′ ∈ F . Thus, k′ c ∈ M , completing the proof.  Lemma 8.11. If c strongly active and no non-trivial element of F setwise stabilizes O, then there is k ∈ F such that kc ∈ M . Proof. Suppose first that hci has only two orbits O1 = O and O2 on X. The group F therefore has exponent two. Take i > 1 least such that ci fixes O1 . Let m ∈ M be such that m(v) ∈ O2 and set y := mv . We now see that [m−1 , c−i ]v = y −1 h1 yhc is in M , where h1 , h ∈ F . The group M is normal, so hcy −1 h1 y ∈ M . Hence, hcy −1 h1 yy −1 h1 yhc = (hc)2 ∈ M. If h = 1, then considering the section [f, c−2 ]v for f ∈ F non-trivial shows that kc ∈ M for some k ∈ F , since f −1 (O1 ) = O2 and c2 is not trivial. Let us thus suppose that h is non-trivial, so h(O1 ) = O2 . The element (hc)2 has non-finitary sections exactly at v and c−1 h(v). The inverse (hc)−2 therefore has non-finitary sections exactly at c2 (v) and ch(v). We compute: [c−1 , (hc)−2 ]c−1 h(v) = (c−1 )h(v) ((hc)−2 )c2 h(v) cch(v) ((hc)2 )c−1 h(v) . It now follows that [c−1 , (hc)−2 ]c−1 h(v) = l1 cl0 for l1 , l0 ∈ F . Conjugating by l0 , we see that there is k ∈ F such that kc ∈ M . Let us suppose finally that hci has at least three orbits O1 , O2 , and O3 and let i be least such that ci fixes O1 . If ci has a trivial section, then Lemma 4.7 ensures that kc ∈ M for some k ∈ F . We may thus assume that every section of ci is non-trivial. Fix f ∈ F non-trivial, and without loss of generality, f (O1 ) = O2 . Let m ∈ M be such that m(v) ∈ O3 and set y := mv . The commutator [m−1 , c−i ] is in M , so [m−1 , c−i ]v = y −1 h1 yh0 c is in M , where h1 , h0 ∈ F . The commutator [m−1 , f c−i f −1 ] is also in M , so [m−1 , f c−i f −1 ]v = y −1 k1 yk0 is in M where k1 , k0 ∈ F , since f ci f −1 has non-finitary sections only on O2 . Note also that k0 is non-trivial since ci has every section non-trivial. We now have that h0 c and a non-trivial finitary element k0 are elements of y −1 F yM . The quotient y −1 F yM/M is abelian, so [k0 , (h0 c)−1 ] ∈ M . As k0 moves v, it follows that [k0 , (h0 c)−1 ]v = k′ c where k′ ∈ hF i. Thus, k′ c ∈ M .  Bringing together the previous three lemmas, we obtain the desired result. Lemma 8.12. Suppose that G = hY i ≤ Aut(X ∗ ) with |X| > 2 is a selfreplicating group of abelian wreath type. If G is elementary amenable but not virtually abelian, then the weakly self-replicating M E G supplied by Corollary 5.11 is such that (π1 (G) ∩ G)M = G and rk(M ) + 1 = rk(G). In particular, G/M is finite and abelian. 40 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Proof. Let M E G be the finite index subgroup given by Corollary 5.11 and take d ∈ Y directed. If d is not strongly active, then f := 1 ∈ F := π1 (G)∩G is such that f d fixes a vertex in X. Lemma 8.9 thus gives k ∈ F such that kd ∈ M . If d is strongly active, then either there is some non-trivial f ∈ F such that f setwise stabilizes the orbit of v d ∈ X under the action of hdi acting on X or there is not. In the former case, Lemma 8.10 supplies k ∈ F such that kd ∈ M and in the latter, Lemma 8.11 gives k ∈ F such that kd ∈ M . It now follows that F M = G, and the lemma is verified.  The desired theorem is now in hand. Theorem 8.13. If G = hY i ≤ Aut(X ∗ ) is a self-replicating group of abelian wreath type, then either G is virtually abelian, or G is not elementary amenable. Proof. The case that |X| = 2 is settled by Theorem 8.7. We thus assume that |X| > 2. Set F := π1 (G) ∩ G. We suppose toward a contradiction that G is elementary amenable but not virtually abelian. Applying Corollary 5.11, we obtain non-trivial weakly self-replicating L E G and M E G such that L ≤ M , G/M is finite, M/L is abelian, and rk(L) + 2 = rk(M ) + 1 = rk(G). Lemma 8.12 ensures further that F M = G. We now argue that G/L is abelian, which contradicts the rank of G. We have two cases: (1) M ∩ F 6= {1}, and (2) M ∩ F = {1}. For case (1), fix a non-trivial f ∈ F ∩ M . By Lemma 8.12, each d ∈ Y directed admits h ∈ F such that hd ∈ M . Taking hd ∈ M , [f, (hd)−1 ] ∈ L, so [f, (hd)−1 ]vd = kd is an element of L where k ∈ F . We conclude that for each directed d ∈ Y there is h ∈ F such that hd ∈ L. It is thus the case that F L = G, so G/L is abelian, giving the desired contradiction. For case (2), fix d ∈ Y directed and let h ∈ F be such that hd ∈ M . If hd fixes v d , then (hd)vd = d ∈ M . Hence h ∈ F ∩ M = {1}. The element d must be strongly active since else since d 6= 1, it has a finitary section that belongs to M and so M contains a non-trivial element of F . We conclude that d does not fix v d . We may thus assume that hd does not fix v d . Set d˜ := hd and observe that d˜ has exactly one non-finitary section, namely d˜vd = d. ˜ acts intransitively on X, let i be least such that d˜i fixes X. Since If hdi M intersects F trivially, it must be the case that d˜i has trivial sections at ˜ The group M acts transitively on all w outside the orbit of v d under hdi. ′ X, so Lemma 4.7 implies that h d ∈ L for some h′ ∈ F . ˜ acts transitively on X. Fix f ∈ F that is non-trivial; Suppose that hdi ˜ d ), then f acts like such an element exists by Lemma 8.8. If f (v d ) = d(v a |X|-cycle on X, since π1 (G) is abelian. Since |X| > 2, f 2 is non-trivial, ˜ d ). By possibly replacing f with f 2 , we may assume that and f 2 (v d ) 6= d(v d d ˜ f (v ) 6= d(v ). The elements f d˜−1 f −1 and d˜ are in M , so [f d̃−1 f −1 , d˜−1 ] ∈ ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS L. Moreover, [f d˜−1 f −1 , d˜−1 ] vd 41 ˜−1 ˜ ˜ d d = h′ d, = (d˜−1 )f −1 d(v ˜ d ) (d )d˜2 (vd ) df −1 d(v ) where h′ ∈ F . We now conclude that for all d ∈ D, there is h ∈ F such that hd ∈ L. Hence, F L = G, and so G/L is abelian, giving the desired contradiction.  The infinite dihedral group shows that virtually abelian groups indeed arise as self-replicating groups of abelian wreath type; see Example 9.2. 8.3. GGS groups. We pause here to recall the GGS groups and observe that Theorem 8.13 applies to these groups. See [3] for more information on these groups. For p an odd prime, form the p-regular rooted tree [p]∗ . Let a ∈ Aut([p]∗ ) be such that a(iz) = ((i + 1) mod p)z for word iz ∈ [p]∗ , where i ∈ [p]. The automorphism a cyclically permutes the first level of the tree and acts rigidly below the first level. Take a p − 1-tuple α := (e0 , . . . , ep−2 ) where ei ∈ {0, . . . , p − 1} for each 0 ≤ i ≤ p − 2. Using wreath recursion, we define bα ∈ Aut([p]∗ ) by bα := (ae1 , . . . , aep−2 , b). Definition 8.14. For α = (e1 , . . . , ep−1 ) a p − 1-tuple where ei ∈ {0, . . . , p − 1} for each 1 ≤ i ≤ p − 1, the GGS group associated to α is the group Gα := ha, bα i ≤ Aut([p]∗ ). Proposition 8.15. If some coordinate of α is non-zero, then the GGS group Gα is a self-replicating group of abelian wreath type. Proof. We see that π1 (Gα ) = hai = Cp . Thus, Gα is of abelian wreath type. That Gα is self-replicating is also clear, and well-known.  Corollary 8.16. The only elementary amenable GGS groups are the cyclic groups Cp . 9. Examples 9.1. Balanced generalized basilica groups. Define a, b ∈ Aut([5]∗ ) by wreath recursion: a := (01)(34)(1, 1, 1, 1, a) and b := (12)(34)(1, 1, 1, b, 1). The group G := ha, bi ≤ Aut([5]∗ ] is a balanced generalized basilica group. On [5], G has two orbits U := {0, 1, 2} and V := {3, 4}, and v a , v b are elements of V . Setting c := ab, an easy computation shows that c = (012)(1, 1, 1, c, 1). The element c fixes V , and it follows that c ∈ K := ker(G y V ∗ ). In view of Lemma 7.5, K is locally finite, and since G is two generated, it follows that G/K ≃ Z. The group G is thus elementary amenable. Claim. The set {b−n cbn | n ≥ 0} consists of pairwise distinct elements of K. 42 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK Proof. Noting that b2 = (1, 1, 1, b, b), it is immediate that b−2n cb2n = (012)(1, 1, 1, b−n cbn , 1). An easy calculation shows that b−2n−1 cb2n+1 = (021)(1, 1, 1, 1, b−n cbn ). Arguing by induction on i for the claim that {b−n cbn | i ≥ n ≥ 0} consists of pairwise distinct elements proves the claim.  The claim implies the kernel K is infinite. Since all subgroups of a finitely generated virtually abelian group are finitely generated, we deduce that G is not virtually abelian. This example shows that Corollary 7.18 is sharp. We next exhibit a large family of generalized basilica groups. Definition 9.1. For a prime p ≥ 3, let c be the cycle (0 . . . p − 1) and define gp , hp ∈ Aut([p]∗ ) by gp := c(gp , 1, . . . , 1) and hp := c(1, hp , 1, . . . , 1). We define Gp := hgp , hp i. Proposition 9.2. For each prime p ≥ 3, Gp is a self-replicating balanced generalized basilica group, weakly branch, and not elementary amenable. Proof. It is immediate that G := Gp is a balanced generalized basilica group, since g := gp and h := hp act transitively on [p]. The elements g p and hp are such that (gp )x = g and (hp )x = h for all x ∈ X. It follows that Gp is self-replicating. In view of Corollary 7.13, we need only to check that G is not abelian to conclude that G is not elementary amenable. This is immediate by considering sections: (gh)0 = 1 and (hg)0 = hg. It is clear that hg is non-trivial, so g and h do not commmute. Let us finally verify that G is weakly branch. The commutator [g p , h] fixes X and ( [g, h] i = 2 p [g , h]i = 1 else The rigid stabilizer ristG (2) is non-trivial, and it follows that ristG (i) is i non-trivial for all i ∈ X. One verifies that [gp , h] lies in ristG (2i ) and i [gp , h]2i = [g, h], where 2i is the word in [p]∗ consisting of i many 2’s. We infer that all rigid stabilizers are infinite. Since G acts transitively on each level, G is weakly branch.  To distinguish the Gp requires a result from the literature on weakly branch groups. For a tree X ∗ , the boundary of X ∗ , denoted by ∂X ∗ , is the collection of infinite words X ω with the product topology. The group Aut(X ∗ ) has an action on ∂X ∗ by homeomorphisms which is induced from the action Aut(X ∗ ) y X ∗ . The product measure on ∂X ∗ arising from the uniform measure on X is preserved by Aut(X ∗ ). This measure is called the Bernoulli measure. ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 43 Theorem 9.3 (See [18, Theorem 2.10.1]). Suppose that G ≤ Aut(X ∗ ) and H ≤ Aut(Y ∗ ) are weakly branch groups. If φ : G → H is an isomorphism of groups, then there is a measure preserving homeomorphism F : ∂X ∗ → ∂Y ∗ such that φ(g)(F (α)) = F (g(α)) for all α ∈ ∂X ∗ , where ∂X ∗ and ∂Y ∗ are equipped with the respective Bernoulli measures Theorem 9.4. For p 6= q with p, q ≥ 3, Gp and Gq are not isomorphic. Proof. Suppose for contradiction there are p 6= q such that Gp is isomorphic to Gq . Appealing to Theorem 9.3, there is a measure preserving homeomorphism F : ∂[p]∗ → ∂[q]∗ . Fix O ⊆ ∂[p]∗ clopen with measure p1 . The image F (O) is a clopen set in ∂[q]∗ with measure p1 . We may then find disjoint basic clopen sets W1 , . . . , Wn of ∂[q]∗ such that F (O) = ⊔ni=1 Wi . The sets Wi are basic, so for each 1 ≤ i ≤ n there is ki ≥ 1 such that µ(Wi ) = q1ki . We deduce that n 1 X 1 = . p q ki i=1 Letting m := max{ki | 1 ≤ i ≤ n}, we see that n q m X m−ki q , = p i=1 and the right hand side is an integer. This implies that p divides q which is absurd.  9.2. The infinite dihedral group. Example 9.5. Let X := [3] and via wreath recursion, define a, b ∈ Aut(X ∗ ) by a := (01)(1, 1, a) and b := (02)(1, b, 1). The group G := ha, bi is a self-replicating generalized basilica group isomorphic to the infinite dihedral group. In regards to Question 1.1, Example 9.5 shows that virtually abelian is the best one can hope for in the case of self-replicating generalized basilica groups. Example 9.6. Let X := [2] and via wreath recursion, define a, b ∈ Aut(X ∗ ) by a := (01)(1, 1) and b := (a, b). The group G := ha, bi is a self-replicating bounded automata group of abelian wreath type and is isomorphic to the infinite dihedral group. Example 9.6 shows that Theorem 8.13 is sharp. One naturally wonders if the infinite dihedral group is the only possible non-abelian, but virtually abelian example. 44 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK 9.3. The lamplighter group. Let X := [4] and form Aut(X ∗ ). Define elements of Aut(X ∗ ) by a := (02)(13)(1, 1, 1, a) and b := (02)(1, b, 1, 1). One easily verifies that G := ha, bi ≤ Aut(X ∗ ) is a bounded automata group. In fact G is a bounded automata group that is both a generalized basilica group and of abelian wreath type. The element b has order 2, and a simple calculation shows the following: a2n ba−2n = (02)(1, an ba−n , 1, 1) and a2n+1 ba−2n−1 = (02)(1, 1, 1, an ba−n ) for all n ≥ Z. We now argue that C2 ≀Z is isomorphic to G; recall that C2 denotes Z/2Z. This requires two claims. Claim. For any n 6= m in Z, an ba−n and am ba−m commute Proof. It suffices to show that an ba−n and am ba−m commute for all n, m ≥ 0. Set Ωn := {ai ba−i | 0 ≤ i ≤ n}. We argue by induction on n that an+1 ba−n−1 commutes with every g ∈ Ωn . For the base case, n = 0, we see baba−1 = = = = (02)(1, b, 1, 1)(02)(1, 1, 1, b) (1, b, 1, b) (02)(1, 1, 1, b)(02)(1, b, 1, 1) aba−1 b, and thus b and aba−1 commute. Suppose the inductive claim holds for n and take am ba−m ∈ Ωn+1 . The cases that m is odd while n + 1 is even and m is even while n + 1 odd follow as the base case. Let us now suppose that m and n + 1 are both even; the case where they are both odd is similar. We then have that an+2 ba−n−2 = (1, ak ba−k , 1, 1) where k < n + 2 and that am ba−m = (02)(1, al ba−l , 1, 1) where l < n + 2. We see that an+2 ba−n−2 am ba−m = (1, ak ba−k al ba−l , 1, 1) and am ba−m an+2 ba−n−2 = (1, al ba−l ak ba−k , 1, 1). The inductive hypothesis ensures that ak ba−k al ba−l = al ba−l ak ba−k . Therefore, am ba−m and an+2 ba−n−2 commute, completing the induction.  Qn Claim. For any distinct i1 , . . . , in in Z, the product j=1 aij ba−ij is not 1. Proof. Suppose for a contradiction that the claim is false, Q and let n be least such that there are distinct i1 , . . . , in for which g := nj=1 aij ba−ij = 1. By conjugating with an appropriate power of a, we may assume Pn that all ij are positive. We may also take the i1 , . . . , in to be such that j=1 ij is least. Q The section of g at 1 must have the form sj=1 akj ba−kj . Likewise, the Q section of g at 3 must have the form rj=1 alj ba−lj . These two sections must also be trivial, and since n ≥ 2, it cannot be the case that r = 0 = s. We may thus assume without loss of generality that s ≥ 1. Since we choose n to be least, it is indeed the case that s = n. However, lj < ij , so ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS 45 Pn P < nj=1 ij . This contradicts out choice of i1 , . . . , ij . This completes the reductio.  j=1 lj Proposition 9.7. The lamplighter group C2 ≀ Z is isomorphic to G. L L Proof. We have that C2 ≀ Z = Z C2 ⋊ Z. We define Φ : Z C2 ⋊ Z → G by   Y (f, n) 7→  ai ba−i  an i∈Supp(f ) where Supp(f ) := {i ∈ Z | f (i) 6= 0}. Let us verify Φ is a homomorphism: Φ((f, n)(g, m)) = Φ((f Q + n.g, n + m))  = ai ba−i an+m Qi∈Supp(f +n.g) Q  i ba−i i ba−i an+m = a a i∈Supp(n.g) Qi∈Supp(f )  Q i −i i+n ba−i−n an+m = a ba a Qi∈Supp(f )  i∈Supp(g) Q  i −i n i ba−i am = a ba a a i∈Supp(f ) i∈Supp(g) = Φ((f, n))Φ((g, m)). The third equality uses that the conjugates of b by powers of a commute and that b has order two.  Q i ba−i an = a It is clear that Φ is surjective. For injectivity, if i∈Supp(f ) Q 1, then n = 0, and i∈Supp(f ) ai ba−i = 1. The second claim ensures that Q i −i = 1 exactly when the product is trivial. It follows that Φ i∈Supp(f ) a ba is injective.  9.4. Weak self-replication. Let X := [2] and form Aut(X ∗ ). Let σ be the cycle (01) and define a := σ(σ, σa). The group G := hai is isomorphic to Z, so it cannot contain the section σ. On the other hand, one checks that σaσ = a−1 , so a2 = (a, a−1 ). The section homomorphism φx : G(x) → Aut(X ∗ ) thus has image G. The group G is weakly self-replicating but not self-similar, so it is not self-replicating. References 1. G. Amir, O. Angel, and B. Virág, Amenability of linear-activity automaton groups., J. Eur. Math. Soc. (JEMS) 15 (2013), no. 3, 705–730. 2 2. L. Bartholdi, V. Kaimanovich, and V. Nekrashevych, On amenability of automata groups, Duke Math. J. 154 (2010), no. 3, 575–598. MR 2730578 (2011k:20048) 2, 6 3. G. Baumslag, Topics in combinatorial group theory, Lectures in mathematics ETH Zrich, Birkhuser, Basel ; Boston, 1993 (eng). 41 4. M. Chornyi, K. Juschenko, and V. Nekrashevych, On topological full groups of Zd actions, arXiv:1602.04255. 2 5. C. Chou, Elementary amenable groups, Illinois J. Math. 3 (1980), 396–407. 2 6. M. Day, Amenable semigroups, Illinois J. Math. 1 (1957), 509–544. 1 46 KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK 7. M.D. Fried and M. Jarden, Field arithmetic, third ed., Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics], vol. 11, Springer-Verlag, Berlin, 2008, Revised by Jarden. MR 2445111 (2009j:12007) 13 8. S. Godillon, Introduction to iterated monodromy groups, Ann. Fac. Sci. Toulouse Math. (6) 21 (2012), no. 5, 1069–1118. MR 3088267 3 9. R. Grigorchuk, Milnor’s problem on the growth of groups, Sov. Math., Dokl 28 (1983), 23–26. 2 10. R. I. Grigorchuk and A. Żuk, On a torsion-free weakly branch group defined by a three state automaton, Internat. J. Algebra Comput. 12 (2002), no. 1-2, 223–246, International Conference on Geometric and Combinatorial Methods in Group Theory and Semigroup Theory (Lincoln, NE, 2000). MR 1902367 11, 14 11. R. Jones, Fixed-point-free elements of iterated monodromy groups, Trans. Amer. Math. Soc. 367 (2015), no. 3, 2023–2049. MR 3286507 22, 25 12. K. Juschenko, Non-elementary amenable subgroups of automata groups, Journal of Topology and Analysis 10 (2018), no. 01, 35–45. 2 13. K. Juschenko, N. Matte Bon, N. Monod, and M. de la Salle, Extensive amenability and an application to interval exchanges., Ergodic Theory and Dynamical Systems (2016), 1–25. 2 14. K. Juschenko and N. Monod, Cantor systems, piecewise translations and simple amenable groups, Annals of Mathematics 178 (2013), 775 – 787. 2 15. K. Juschenko, V. Nekrashevych, and M. de la Salle, Extensions of amenable groups by recurrent groupoids, Inventiones mathematicae 206.3 (2016), 837–867. 2 16. H. Matui, Some remarks on topological full groups of cantor minimal systems,, Internat. J. Math. 17 (2006), 231–251. 2 17. V. Nekrashevych, Simple groups of dynamical origin, preprint arXiv:1511.08241. 2 18. , Self-similar groups, Mathematical Surveys and Monographs, vol. 117, American Mathematical Society, Providence, RI, 2005. MR 2162164 (2006e:20047) 3, 6, 9, 10, 20, 23, 43 19. , Iterated monodromy groups, Groups St Andrews 2009 in Bath. Volume 1, London Math. Soc. Lecture Note Ser., vol. 387, Cambridge Univ. Press, Cambridge, 2011, pp. 41–93. MR 2858850 3 20. , Palindromic subshifts and simple periodic groups of intermediate growth, preprint arXiv:1601.01033 (2016). 2 21. D. V. Osin, Elementary classes of groups, Mat. Zametki 72 (2002), no. 1, 84–93. MR 1942584 (2003h:20062) 7, 8 22. P. V. Silva and B. Steinberg, On a class of automata groups generalizing lamplighter groups, Internat. J. Algebra Comput. 15 (2005), no. 5-6, 1213–1234. MR MR2197829 20 23. J. von Neumann, Zur allgemeinen theorie des masses, Fund. Math. 13 (1929), 73–116. 1, 2
4math.GR
1 Bounds on Fractional Repetition Codes using Hypergraphs arXiv:1711.07631v1 [cs.IT] 21 Nov 2017 Krishna Gopal Benerjee, and Manish K Gupta, Senior Member, IEEE Abstract—In the Distributed Storage Systems (DSSs), encoded fraction of information is stored in the distributed fashion on different chunk servers. Recently a new paradigm of Fractional Repetition (FR) codes have been introduced, in which, encoded data information is stored on distributed servers, where encoding is done using a Maximum Distance Separable (MDS) code and a repetition code. In this work, we have shown that an FR code is equivalent to a hypergraph. Using the correspondence, the properties and the bounds of a hypergraph are directly mapped to the associated FR code. Some of the bounds are not satisfied by any FR codes in the literature with equality. In general, the necessary and sufficient conditions for the existence of an FR code is obtained by using the correspondence. It is also shown that any FR code associated with a linear hypergraph is universally good. Index Terms—Distributed Storage Systems, Fractional Repetition Code, Coding for Distributed Storage. I. I NTRODUCTION The distributed storage is a well studied area, which deals with storing the data on distributed nodes in such a manner so that it allows data accessibility at anytime and anywhere. Many companies such as Microsoft and Google etc. provide such storage services by using distributed data centers. In the storage systems like Google file system [1], multiple copies of data fragments are stored. Thus, the system becomes reliable and the file can be retrieved from the system. At the same level of redundancy, coding techniques can improve the reliability for the storage system [2]. In [3], Dimakis et al. proposed a coding scheme called regenerating codes which reduces the repair bandwidth, where repair bandwidth is total number of communicated packets to repair a failed node. In the distributed storage system (DSS), encoded data packets are distributed among n nodes such that any data collector can get the complete file by collecting packets from any k (≤ n) nodes. Also, a failed node can be repaired by replacing it with a new node having at-least same amount of the data information. The newcomer node is constructed by downloading packets from any d (≤ n) active nodes in the DSS. The Minimum Bandwidth Regenerating (MBR) codes are optimal with respect to the repair bandwidth but not with respect to the computational complexity. Motivated by this, in [4], Rashmi et al. proposed a simple construction of Minimum Bandwidth Regenerating codes, where a survivor node is only required to read and transfer the exact amount of data to the replacement node Krishna Gopal Benerjee and Manish K Gupta are with Laboratory of Natural Information Processing, Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar, Gujarat, 382007, India, e-mail: (krishna [email protected] and [email protected].). without extra computation. The construction is extended to new storage code called Fractional Repetition (FR) code [5], [6]. A typical FR code is a two layer code with an outer MDS code and an inner repetition code, where a linear [n, k, d] code is called a Maximum Distance Separable (MDS) code if k = n − d + 1. Initially, the FR code is defined on homogeneous DSS (DSS with symmetric parameters). In such systems, each node has same amount of encoded packets and the same number of copies of each packets [5]. In many cases, heterogeneous systems are preferred, in which the node storage capacity and the packet replication factor need not be uniform. In the literature, FR codes are constructed with asymmetric replication factor [7], [8] and asymmetric node storage capacity [9]–[12]. In [13], an FR codes with nonuniform node storage capacity are constructed using uniform hypergraphs. A bound on the maximum file size is calculated for a Locally Repairable Fractional Repetitions (Locally Repairable FR) code in [14], where a Locally Repairable FR code is an FR code in which the repair degree of a node is less than the node storage capacity. In [15], the minimum distance on an FR code is defined as the minimum number of nodes such that if the nodes fail simultaneously then the system can not recover the complete file. FR codes with asymmetric parameters, are also constructed using sequences [16], graphs [17], [18] and combinatorial designs [19], [20]. For the FR code, the asymmetric node storage capacity helps to reduce the total storage cost and the asymmetry on replication factor helps for availability of favorable packets, where favorable packets are the packets which are downloaded with more frequency. The asymmetric repair degree and repair bandwidth help to reduce the repair cost of a node in the FR code. In this work, an FR code with asymmetric parameters (node storage capacity, packet replication factor, repair degree and repair bandwidth) are considered. In general, it is shown that any FR code is equivalent to a hypergraph. The equivalence between a hypergraph and an FR code leads to the several interesting properties of the FR code. In general, we provide the existence condition for FR codes using the correspondence. Bounds on the node storage capacity and the packet replication factor, are obtained for various FR codes which are equivalent to some known classes of hypergraphs. We have obtain a bound on size of a sub-hypergraph of a linear hypergraph. A new bound on the replication factor, the number of nodes and the number of packets are obtained such that all the FR codes satisfying the bound are the universally good. Using the correspondence, we have identified some bounds which are not satisfied by any FR codes with equality in the literature. 2 It is observed that an FR code constructed using a linear hypergraph is universally good code. We have proved that the availability of favorable packets can be increased by permuting packets in FR code with asymmetric parameters, where the availability of all packets in FR code with symmetric parameters are constant. It is also shown that the asymmetric parameters of an FR code helps to reduce the total cost associated with node storage capacity. The paper is organized as follows. In Section II, we collect some preliminaries on FR codes and hypergraphs with their parameters and properties. In Section III, the relation of a hypergraph and an FR code is studied in detail. Using the relation, we obtain various bounds on the parameters of FR codes in Section IV. At the end of the Section, the comparison graph is plotted between the reconstruction degree and file size for the FR codes. Section V concludes the paper with some general remarks. II. P RELIMINARIES In this section, background on FR codes and hypergraphs are given. A. Background on Fractional Repetition Codes Let a file be divided into B distinct information packets, where information packet symbols are associated with a finite field Fq . By using (θ, B) MDS code on the information packets, the B information packets are encoded into θ distinct packets P1 , P2 , . . ., Pθ . Because of the property of MDS code, the complete file information can be extract from any B packets. Each packet Pj (1 ≤ j ≤ θ) is replicated ρj times in the system. All the packets are distributed on n distinct nodes U1 , U2 , . . ., Un such that a node Ui (i = 1, 2, . . . , n) contains αi packets. For the FR code, the maximum node storage capacity and the maximum replication factor are given by α = max{αi : i = 1, 2, . . . , n} and ρ = max{ρj : j = 1, 2, . . . , θ} respectively. The FR code is denoted by C : (n, θ, α, ρ). Example 1. Let a file be splitted into 5 (= B) information packets and encoded into 6 (= θ) distinct packets P1 , P2 , P3 , P4 , P5 and P6 using a (6, 5) MDS code. The 13 replicas of the 6 (= θ) distinct packets are stored in the 5 distinct nodes U1 , U2 , U3 , U4 and U5 such that U1 = {P1 , P2 , P3 , P4 }, U2 = {P1 , P5 , P6 }, U3 = {P2 , P5 }, U4 = {P3 , P6 } and U5 = {P4 , P6 }. The node packet distribution of the FR code C : (n = 5, θ = 6, α = 4, ρ = 3) is illustrated in Table I. Hence, α1 = |U1 | = 4, α2 = |U2 | = 3, αi = |Ui | = 2 (i = 3, 4, 5) and replication vector ρ ~ := (ρ1 ρ2 ρ3 ρ4 ρ5 ρ6 ) = (2 2 2 2 2 3). In the FR code, ρ = max{ρj : j = 1, 2, . . . , 6} = 3 and α = max{αi : i = 1, 2, . . . , 5} = 4. Hence, the FR code is denoted by C : (n = 5, θ = 6, α = 4, ρ = 3). Note that in this example file size B and number of nodes n are same and this is not always true. For an FR code, if a data collector connects any k nodes and downloads B distinct packets then the file can be retrieved by using the MDS property. The parameter k is called the reconstruction degree of the FR code. Note that the reconstruction degree of the FR code C : (5, 6, 4, 3) (Example 1) is k = 3. TABLE I D ISTRIBUTION OF REPLICATED PACKETS ON NODES FOR THE FR CODE C : (5, 6, 4, 3). U1 U2 U3 U4 U5 P1 , P2 , P3 , P4 P1 , P5 , P6 P2 , P5 P3 , P6 P4 , P6 In an FR code, a failed node Ui can be repair by replacing a new node Ui0 , where both the nodes Ui and Ui0 carry the same information. For the new node, the information packets are downloaded from some active nodes called helper nodes. The repair degree of a failed node Ui is the cardinality of the set of the helper nodes. For a node Ui in an FR code C : (n, θ, α, ρ), more then one such helper node sets exist with different repair degree. For the node Ui , the maximum repair degree is di and d = max{di : i = 1, 2, . . . , n}. In the FR code C : (5, 6, 4, 3) (Example 1), if node U2 fails then the new node U20 can be created by downloading packets from nodes of set {U1 , U3 , U4 } or set {U1 , U3 , U5 }. Hence, d2 = 3 and d = max{di : i = 1, 2, 3, 4, 5} = 4. Now, one can define an FR code formally as follows. Definition 2. (Fractional Repetition Code): On a Distributed Storage System with n nodes denoted by Ui (i = 1, 2, . . . , n) and θ packets denoted by Pj (j = 1, 2, . . . , θ), one can define an FR code C (n, θ, α, ρ) as a collection C of n subsets Ui (i = 1, 2, . . . , n) of a set {Pj : j = 1, 2, . . . , θ}, such that an arbitrary packet Pj is distributed on ρj (∈ N) distinct subsets in the collection C , where |Ui | = αi denotes the number of packets stores on the node Ui , ρ = max{ρj : j = 1, 2, . . . , θ} is the maximum replication among all packets and the maximum number of packets on any node is given by α = max{αi : i = 1, 2, . . . , n}. In an FR code C : (n, θ, α, ρ), if DC (k) (called Code Dimension) is the maximum number of distinct packets that guarantee to deliver to any user connected with any k nodes of the FR code then DC (k) := min {|∪i∈I Ui | : |I| = k, I ⊂ {1, 2, . . . , n}}. Note that B ≤ DC (k). For the FR code C : (5, 6, 4, 3) as given in Example 1, one can find that DC (3) = 5. An FR code C (n, θ, α, ρ) with an asymmetric parameter is called universally good if the codeP dimension DC (k) is k guaranteed to be more than or equal to i=1 di − k2 for any k < n, where d1 ≤ d2 ≤ . . . ≤ dn . An FR code C (n, θ, α, ρ) with d1 ≤ d2 ≤ . . . ≤ dn and |Ui ∩ Uj | ≤ 1 (i, j = 1, 2, . . . , n Pk and i 6= n) satisfies the inequality DC (k) ≥ i=1 di − k2 [9]. B. Background on Hypergraphs For a finite set V = {v1 , v2 , . . . , vn }, the pair H = (V ; E) is called a hypergraph with hypervertex set V and hyperedge set E, where E = {E : E ⊆ V } is a family of some subset of V [21], [22]. For a hypergraph H = (V ; E), |E| is called the size of the hyperedge E ∈ E and |E(v)| is the degree of the hypervertex v ∈ V , where E(v) = {E : v ∈ E}. 3 An example of such hypergraph is shown in Figure 1. In this hypergraph H = (V ; E), hypervertices are shown by simply bold dots and the hyperedges are represented by the covered area which contains some hypervertices. In the particular example, there are 7 hypervertices and 4 hyperedges such that E(v1 ) = {E1 }, E(v2 ) = φ, E(v3 ) = {E3 }, E(v4 ) = {E1 , E2 }, E(v5 ) = {E1 , E2 , E3 }, E(v6 ) = {E3 } and E(v7 ) = {E4 }. In a hypergraph H = (V ; E), a hypervertex v ∈ V is called isolated hypervertex if E(v) = φ. A hypergraph HS = (V ; E) does not have any isolated hypervertex if V = E. In a E∈E hypergraph H = (V ; E), a loop is a hyperedge E ∈ E with |E| = 1. If two distinct hyperedges share same hypervertices then those hyperedges are called parallel hyperedges for the hypergraph. Similarly, if two distinct hypervertices are shared by same hyperedges then those hypervertices are called parallel hypervertices. v1 v4 E1 v2 v7 E4 v5 E2 v3 E 3 v6 Fig. 1. A hypergraph H = (V ; E) is shown, where V = {vi : i ∈ [7]} and E = {E1 = {v1 , v4 , v5 }, E2 = {v4 , v5 }, E3 = {v3 , v5 , v6 }, E4 = {v7 }}. For a hypergraph H = (V ; E), a subset of V is called a hypervertex cover if each hyperedge is incident to at least one hypervertex of the subset. For an example, the set {v4 , v6 , v7 } is a hypervertex cover of the hypergraph given in Figure 1. Note that the hypervertex cover of any hypergraph exists but it is not unique for some hypergraph. A hypergraph H 0 = (V 0 ; E 0 ) is called a sub-hypergraph of a hypergraph H = (V ; E) if V 0 ⊆ V and E 0 ⊆ {E 0 6= φ : E 0 ⊆ E ∩ V 0 , E ∈ E}. For an example, a hypergraph H 0 = (V 0 ; E 0 ) with V 0 = {v1 , v3 , v4 , v5 , v6 } and E 0 = {E10 = {v1 , v4 , v5 }, E20 = {v4 }, E30 = {v3 , v5 }}, is a sub-hypergraph of the hypergraph H = (V ; E) (as shown in Figure 1). For a hypergraph H = (V ; E), hypergraph H 0 = (V 0 ; E 0 ) is called sub-hypergraph induced by the set V 0 ⊂ V if E 0 = {E 0 6= φ : E 0 = E ∩ V 0 , E ∈ E}. A hypergraph is called connected hypergraph if there exists a sub-hypergraph with the same hypervertex set such that the sub-hypergraph is isomorphic to a connected graph. The hypergraph H = (V ; E) ( Figure 1) is not a connected hypergraph since there is an isolated hypervertex. Consider a hypergraph H = (V ; E) without isolated hyper∗ }, a hypergraph vertices. For a finite set V ∗ = {v1∗ , v2∗ , . . . , v|E| ∗ ∗ ∗ H = (V ; E ) is called the dual of the hypergraph H = (V ; E) if their exist a bijection g : E → V ∗ such that Ej = {g(Ei ) = vi∗ : vj ∈ Ei }, where j = 1, 2, . . . , |V |. For an example, a hypergraph H ∗ = (V ∗ ; E ∗ ) with V ∗ = {v1∗ , v2∗ , v3∗ , v4∗ } and E ∗ = {E1∗ = {v1∗ }, E2∗ = {v3∗ }, E3∗ = {v1∗ , v2∗ }, E4∗ = {v1∗ , v2∗ , v3∗ }, E5∗ = {v4∗ }}, is the dual of a hypergraph H = (V ; E) with V = {v1 , v2 , v3 , v4 , v5 } and E = {E1 = {v1 , v3 , v4 }, E2 = {v3 , v4 }, E3 = {v2 , v4 }, E4 = {v5 }}, where g(Ej ) = vj∗ and i = 1, 2, . . . , 5. In a hypergraph, if two hyperedges shares one node maximum then the hypergraph is called linear hypergraph. For such hypergraph, one can find bound on the size of the hypergraph as given in the following Lemma. Lemma 3. For a linear hypergraph H = (V ; E),   X |V | |E| ≥ |E(v)| − . 2 (1) v∈V Proof:  |V | In a linear hypergraph H = (V ; E), at most P 2 hyperedges are repeated in the hyperedge count v∈V |E(v)|. So,  of hyperedges of H is bounded by P the total number |V | v∈V |E(v)| − 2 . A sub-hypergraph of a linear hypergraph is also a linear hypergraph. For a positive integer k (not more than the size of the hypergraph), one can find a bound on the size of subhypergraph induced by any k-element subset. Formally, the bound is discussed in the following Lemma with a proof in the Appendix. Lemma 4. For V = {vi : i = 1, 2, . . . , n}, consider a linear hypergraph H = (V ; E) with |E(vi )| ≤ |E(vj )|, for i < j and i, j = 1, 2, . . . , n. For a given positive integer k < n, let H 0 = (V 0 ⊂ V ; E 0 ) be a induced sub-hypergraph of the hypergraph H = (V ; E) with E 0 = {E 0 6= φ : E 0 = E ∩ V 0 , E ∈ E} and |V 0 | = k. Then   k X k 0 0 0 0 0 min{|E | : H = (V ⊂ V ; E ), |V | = k} ≥ |E(vi )|− . 2 i=1 (2) III. H YPERGRAPHS AND F RACTIONAL R EPETITION C ODES In this Section, A bijection (called Hyper-FR mapping) between a hypergraph and an FR code is established. Using the Hyper-FR mapping, the relation between the parameters of FR codes and hypergraphs are studied at the end of the Section. In an FR code, the distribution of nodes and packets are similar to the incidence of hypervertices and hyperedges in a hypergraph. Example 5. As shown in Figure 2, consider a hypergraph H = (V ; E) with V = {vi : i = 1, 2, 3, 4} and E = {Ej : j = 1, 2, 3, 4, 5, 6}, where E1 = {v1 , v2 }, E2 = {v1 , v3 }, E3 = {v1 , v4 }, E4 = {v2 , v3 }, E5 = {v2 , v4 } and E6 = {v3 , v4 }. For the hypergraph, E(v1 ) = {E1 , E2 , E3 }, E(v2 ) = {E1 , E4 , E5 }, E(v3 ) = {E2 , E4 , E6 } and E(v4 ) = {E3 , E5 , E6 }. As given in Figure 2, consider an FR code C : (4, 6, 3, 2) with 4 nodes and 6 such that U1 = {P1 , P2 , P3 }, U2 = {P1 , P4 , P5 }, U3 = {P2 , P4 , P6 } and U4 = {P3 , P5 , P6 }. Note that there exist the bijection ϕ : E → {Pj : j = 1, 2, . . . , 6} such that ϕ(Ej ) = Pj for each j = 1, 2, . . . , |E|. Hence, ϕ(E(vi )) = {Pj = ϕ(Ej ) : Ej ∈ E, vi ∈ Ej }. 4 v1 v2 E1 U1 P1 , P2 , P3 E3 E2 E5 v3 E4 v4 E6 Hypergraph H (V, E) ⇐⇒ U2 P1 , P4 , P5 In this paper, a hypergraph H = (V 6= φ; E) with |E(v)| > 0 ( ∀ v ∈ V ) and |E| > 0 ( ∀ E ∈ E) is called conditional hypergraph H = (V ; E). U3 P2 , P4 , P6 IV. F RACTIONAL R EPETITION C ODES USING H YPERGRAPHS U4 P3 , P5 , P6 FR code C : (n, θ, α, ρ) Fig. 2. Relation between hypergraph H (V, E) and FR code C : (n = 4, θ = 6, α = 3, ρ = 2) is illustrated, where V={v1 , v2 , v3 , v4 } and E = {{v1 , v3 }, {v1 , v4 }, {v2 , v3 }, {v2 , v4 }, {v3 , v4 }}. Formally, the relation between FR code and hypergraph is defined as follows. Definition 6. (Hyper-FR Mapping): For θ ∈ N and |E| = θ, an FR code C : (n, θ, α, ρ) is equivalent to a hypergraph H = (V ; E) if a bijection ϕ : E → {Pj : j = 1, 2, . . . , θ} exists such that ∀ vi ∈ V, E(vi ) = {E : vi ∈ E, E ∈ E} ⇔ Ui = ϕ(E(vi )) = {Pj = ϕ(E) : vi ∈ E, E ∈ E}. The bijection is called Hyper-FR mapping. For θ ∈ N and |E| = θ, let C : (n, θ, α, ρ) be an FR code which is equivalent to a hypergraph H = (V ; E). Hence, a bijection ϕ : E → {Pj : j = 1, 2, . . . , θ} exists such that ∀ vi ∈ V, E(vi ) = {E : vi ∈ E, E ∈ E} ⇔ Ui = ϕ(E(vi )) = {Pj = ϕ(E) : vi ∈ E, E ∈ E}. Because of the bijection, one can immediate see that the number of nodes and the number of hypervertices are same i.e. n = |V |, the number of distinct packets and the number of hyperedges are same i.e θ = |E|, the node storage capacity of a node is the same as the hypervertex degree of the respective hypervertex i.e. αi = |E(vi )| (i = 1, 2, . . . , n) and the replication factor of a packet is equal to the cardinality of the respective hyperedge i.e. ρj = |Ej | (j = 1, 2, . . . , θ). Hence, the maximum node storage capacity α = max{|E(v)| : v ∈ V } and the maximum replication factor ρ = max{|E| : E ∈ E}. A reconstruction set of the equivalent FR code is associated with a hypervertex cover of a sub-hypergraph H 0 = (V 0 , E 0 ) induced by V 0 = ∪E∈E(v) E, and |E 0 | ≥ B. Consider a hypervertex cover V of a subhypergraph H 0 = (V 0 ; E 0 ) of the hypergraph H = (V ; E), where V 0 = ∪E∈E(v) E and E 0 = E(v). In the equivalent FR code C , for a node failure Ui , a surviving set is associated with the set V \{vi }, where i = 1, 2, . . . , |V |. In the FR code, the repair bandwidth for a node is equal to the hypervertex degree of respective hypervertex and tolerance factor is equal to the hypergraph size. For the given positive integer k < n, Let H 0 = (V 0 ; E 0 ) be a sub-hypergraph induced by V 0 ⊂ V . The code dimension DC (k) of the equivalent FR code is DC (k) = min{|E 0 | : V 0 ⊂ V, |V 0 | = k}. The necessary and sufficient condition for a hypergraph to represent an FR code is discussed in the following straightforward Lemma. Lemma 7. For a hypergraph H = (V 6= φ; E), an FR code C : (n, θ, α, ρ) exists if and only if |E(v)| > 0 ( ∀ v ∈ V ) and |E| > 0 ( ∀ E ∈ E). In this Section, bounds on specific hypergraphs are mapped to the equivalent FR code using a Hyper-FR mapping. For an FR code, existence condition is calculated in the Section. A. Bounds on Fractional Repetition Codes using Hypergraphs The necessary and sufficient condition for the existence of an FR code is given in the following Theorem. Theorem 8. (Existence Condition) Consider two vectors (ρ1 ρ2 . . . ρθ ) and (α1 α2 . . . αn ) on integers such that α = α1 ≥ α2 ≥ . . . ≥ αn for j = 1, 2, . . . , θ and i = 1, 2, . . . , n. An FR code C : (n, θ, α, ρ) exists with |Ui | = αi for i = 1, 2, . . . , n and replication factor of packet Pj is ρj for j = 1, 2, . . . , θ if θ n P P 1) ρj = αi and 2) j=1 θ P i=1 min{ρj , m} ≥ j=1 m P αi ( for m < n, m ∈ Z). i=1 Proof: The proof is obvious. Note that if the parameters of an FR code do not satisfy one of the constraint in the Theorem 8 or the Theorem 22, then the FR code does not exist. Lemma 9. For each j = 1, 2, . . . , θ, an FR code C : (n, θ, α, ρ) with ρj = ρ (j = 1, 2, . . . , θ) connected conditional hypergraph, satisfies the following conditions. n P 1) αi is multiple of ρ, 2) i=1 n P αi ≥ i=1 3) α ≤ 1 ρ ρ(n−1) ρ−1 , n P αi . i=1 Proof: The proof follows from [21, Chapter 1, Proposition 2]. For an FR code, let the node set be a disjoint union of two subsets such that any node from one subset does not share packets with any node from another subset. A bound on the FR code is calculated in the following Theorem. Lemma 10. Let C : (n, θ = 2m, α, ρ) be an FR code with message packets P1 , P2 ,. . ., Pm , P10 , P20 ,. . ., Pm such that m P |Fj |+|Fj0 |−1 Fi ∩ Fj0 =φ if and only if i = j. Then ≤ 1, |F | where Fj = {Ui : Pj ∈ Ui } and Fj0 j=1 = {Ui : j Pj0 ∈ Ui }. Proof: The proof follows from the Theorem 6 in [21, Chapter 1]. For V = {vi : i = 1, 2, . . . , n}, consider a hypergraph H = (V ; E) with |E(vi )| ≤ |E(vj )|, for i < j and i, j = 1, 2, . . . , n. For a given positive integer k < n, let H 0 = (V 0 ⊂ V ; E 0 ) be a induced sub-hypergraph of the hypergraph H = (V ; E) 5 with E 0 = {E 0 6= φ : E 0 = E ∩ V 0 , E ∈ E} and |V 0 | = k. For the equivalent FR code, the code dimension DC (k) = min{|E 0 | : H 0 = (V 0 ⊂ V ; E 0 ), |V 0 | = k}. (3) An FR code C (n, θ, α, ρ) is universally good  Pk if the code k dimension DC (k) is more than or equal to i=1 di − 2 for any k < n, where d1 ≤ d2 ≤ . . . ≤ dn . The following Theorem gives the necessary and sufficient condition for a universally good FR code on hypergraph. Remark 15. Note that a sub-hypergraph of a linear hypergraph is again a linear hypergraph and each linear hypergraph satisfies the Lemme 3. Hence, all the FR codes which are equivalent to linear hypergraph satisfy the Theorem 14 for each k ≤ n − 1. So, each FR code which is equivalent to a linear conditional hypergraph is universally good. Remark 16. An FR code illustrated in [23], is equivalent to a linear conditional hypergraph. The bound on code dimension (Theorem 14) is also discussed in [23, Inequality 2]. Theorem 11. For V = {vi : i = 1, 2, . . . , n}, consider a hypergraph H = (V ; E) with |E(vi )| ≤ |E(vj )|, for i < j and C. Fractional Repetition Codes using Simple Hypergraph i, j = 1, 2, . . . , n. For a given positive integer k < n, let H 0 = A hypergraph H = (V ; E) is called a simple hypergraph (V 0 ⊂ V ; E 0 ) be a induced sub-hypergraph of the hypergraph only if Ei ⊆ Ej then i = j, for any Ei , Ej ∈ E. If a simple H = (V ; E) with E 0 = {E 0 6= φ : E 0 = E ∩ V 0 , E ∈ E} hypergraph is a conditional hypergraph then the hypergraph and |V 0 | = k. For each k = 1, 2, . . . n − 1, the FR code is can be called as a conditional simple hypergraph. universally good if and only if If an FR code is equivalent to a conditional simple hypergraph then all the nodes which share a packet will not contain   k X k an another common packet in the FR code. Any FR code |E(vi )|− min{|E 0 | : H 0 = (V 0 ⊂ V ; E 0 ), |V 0 | = k} ≥ . 2 equivalent to a conditional simple hypergraph will satisfy the i=1 (4) following two Lemmas. Proof: The proof follows the Equation 3 and [9, Theorem 4]. Lemma 17. An FR code C : (n, θ, α, ρ) with {U : Pi ∈ U } * {U : Pj ∈ U } for each i 6= j and i, j = 1, 2, . . . , n, satisfies θ   P n −1 n ≤ 1 and θ ≤ bn/2c . ρj j=1 B. Fractional Repetition Codes using Linear Hypergraphs A hypergraph is called linear hypergraph if any two hyperedges share at most one hypervertex. Note that in a hypergraph, any two hyperedges share at most one hypervertex if and only if any two hypervertices are shared by at most one hyperedge. If a linear hypergraph is a conditional hypergraph then the hypergraph is called conditional linear hypergraph. Any two nodes in an FR code equivalent to a conditional linear hypergraph do not share more than one packets. An FR code on conditional linear hypergraph will satisfy the following Lemmas. Lemma 12. An FR code C : (n, θ, α, ρ) with |Ui ∩Uj | ≤ 1 (for θ   P ρj n each i 6= j and i, j = 1, 2, . . . , n), satisfies 2 ≤ 2 . j=1 Proof: The Lemma followers from [21, Chapter 1, Theorem 3]. Lemma 13. An FR code C : (n, θ, α, ρ) with |Ui ∩ Uj | ≤ 1 n   P αi θ (for each i 6= j and i, j = 1, 2, . . . , n), satisfies 2 ≤ 2 . i=1 Proof: The Theorem follows from the duality (with respect to hypergraph) on Lemma 12. The bound on the code dimension of FR code associated with linear hypergraph is discussed in the following Theorems. Theorem 14. An FR code C : (n,  θ, α, ρ) with |Ui ∩ Uj | ≤ 1 Pk k satisfies DC (k) ≥ i=1 αi − 2 , where αi ≤ αj (1 ≤ i < j ≤ n). Proof: The proof follows from the Lemma 3 and Lemma 4. Proof: The Lemma follows from [21, Chapter 1, Theorem 2]. Lemma 18. An FR code C : (n, θ, α, ρ) with Ui * Uj for n  P θ −1 ≤ 1 and each i 6= j and i, j = 1, 2, . . . , n, satisfies αj i=1  θ n ≤ bθ/2c . Proof: The proof follows the duality (with respect to hypergraph) on Lemma 17. Remark 19. In the FR code as considered in [5], [15], [17], [24], [25], if parallel nodes do not exist then the FR code will satisfy the Lemma 17 and Lemma 18. Remark 20. Each FR code studied in the literature is associated with a specific hypergraph. The various FR codes and equivalent hypergraphs are listed in the Table II (see the Appendix). FR code as the Hyper-FR image of the listed hypergraph (Table II), satisfies the constraints given in the definition of an FR code in respective article. In [5], [26], FR codes with symmetric parameters satisfies the bounds in Lemma 12, 13, 17 and 18 with equality. In [7], [9], [23], FR codes with asymmetric parameters satisfies the bounds in Lemma 12 and 13 with equality. It would be an interesting task to find more FR codes with asymmetric parameters which satisfies Lemma 9, 10, 17 and 18 with equality. V. C ONCLUSION In this work, we have sketched the surface of the very interesting topic by establishing a relation between FR code and hypergraph. It is shown that each FR code studied in 6 the literature is associated with some conditional hypergraph, where the minimum rank and the minimum degree of the hypergraph are non-zero positive integer. We have compared our method with other known constructions of FR codes. The properties of the hypergraphs are mapped to FR codes by using Hyper-FR mapping. Some new bounds on FR codes have been derived. It would be an interesting work in the future to find the FR codes which satisfy those bounds with equality. Analysis of FR codes on generalized hypergraph could be an another interesting problem. R EFERENCES [1] S. Ghemawat, H. Gobioff, and S.-T. Leung, “The google file system,” in Proceedings of the nineteenth ACM symposium on Operating systems principles, ser. SOSP ’03. New York, NY, USA: ACM, 2003, pp. 29–43. [Online]. Available: http://doi.acm.org/10.1145/945445.945450 [2] H. Weatherspoon and J. D. Kubiatowicz, “Erasure coding vs. replication: A quantitative comparison,” in Proceedings of the International Workshop on Peer-to-Peer Systems, 2002, pp. 328–337. [3] A. Dimakis, P. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” Information Theory, IEEE Transactions on, vol. 56, no. 9, pp. 4539–4551, Sept 2010. [4] K. Rashmi, N. Shah, P. Kumar, and K. Ramchandran, “Explicit construction of optimal exact regenerating codes for distributed storage,” in Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on, 30 2009-oct. 2 2009, pp. 1243 –1249. [5] S. El Rouayheb and K. Ramchandran, “Fractional repetition codes for repair in distributed storage systems,” in Communication, Control, and Computing (Allerton), 2010 48th Annual Allerton Conference on, Oct. 2010, pp. 1510 –1517. [6] S. Pawar, N. Noorshams, S. El Rouayheb, and K. Ramchandran, “DRESS codes for the storage cloud: Simple randomized constructions,” in Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on, 31 2011-aug. 5 2011, pp. 2338 –2342. [7] B. Zhu, H. Li, K. W. Shum, and S.-Y. R. Li, “HFR code: a flexible replication scheme for cloud storage systems,” IET Communications, October 2015. [Online]. Available: http://digital-library.theiet.org/ content/journals/10.1049/iet-com.2014.1225 [8] B. Zhu, H. Li, H. Hou, and K. W. Shum, “Replication-based distributed storage systems with variable repetition degrees,” in 2014 Twentieth National Conference on Communications (NCC), Feb 2014, pp. 1–5. [9] B. Zhu, K. Shum, H. Li, and H. Hou, “General fractional repetition codes for distributed storage systems,” Communications Letters, IEEE, vol. 18, no. 4, pp. 660–663, April 2014. [10] M. K. Gupta, A. Agrawal, and D. Yadav, “On weak dress codes for cloud storage,” CoRR, vol. abs/1302.3681, 2013. [Online]. Available: http://arxiv.org/abs/1302.3681 [11] H. Park and Y.-S. Kim, “Construction of fractional repetition codes with variable parameters for distributed storage systems,” Entropy, vol. 18, no. 12, 2016. [Online]. Available: http://www.mdpi.com/1099-4300/18/ 12/441 [12] S. A. Prajapati and M. K. Gupta, “On some universally good fractional repetition codes,” CoRR, vol. abs/1609.03106, 2016. [Online]. Available: http://arxiv.org/abs/1609.03106 [13] Q. Yu, C. W. Sung, and T. Chan, “Irregular fractional repetition code optimization for heterogeneous cloud storage,” Selected Areas in Communications, IEEE Journal on, vol. 32, no. 5, pp. 1048–1060, May 2014. [14] M. Y. Nam, J. H. Kim, and H. Y. Song, “Locally repairable fractional repetition codes,” in 2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA), Sept 2015, pp. 128–132. [15] B. Zhu, “Rethinking fractional repetition codes: New construction and code distance,” IEEE Communications Letters, vol. 20, no. 2, pp. 220– 223, Feb 2016. [16] K. G. Benerjee and M. K. Gupta, “On dress codes with flowers,” in 2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA), Sept 2015, pp. 108–112. [17] S. Anil, M. K. Gupta, and T. A. Gulliver, “Enumerating some fractional repetition codes,” CoRR, vol. abs/1303.6801, 2013. [18] J. Koo and J. Gill, “Scalable constructions of fractional repetition codes in distributed storage systems,” in Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on, Sept 2011, pp. 1366–1373. [19] N. Silberstein and T. Etzion, “Optimal fractional repetition codes based on graphs and designs,” Information Theory, IEEE Transactions on, vol. PP, no. 99, pp. 1–1, 2015. [20] B. Zhu and H. Li, “Exploring node repair locality in fractional repetition codes,” IEEE Communications Letters, vol. 20, no. 12, pp. 2350–2353, Dec 2016. [21] C. Berge, Hypergraphs, ser. North-Holland Mathematical Library. North-Holland, 1989, vol. 45, combinatorics of Finite Sets. [22] A. Bretto, Hypergraph Theory. Springer International Publishing, 2013. [23] B. Zhu, K. W. Shum, and H. Li, “Heterogeneity-aware codes with uncoded repair for distributed storage systems,” IEEE Communications Letters, vol. 19, no. 6, pp. 901–904, June 2015. [24] N. Silberstein and T. Etzion, “Optimal fractional repetition codes for distributed storage systems,” in 2014 IEEE 28th Convention of Electrical Electronics Engineers in Israel (IEEEI), Dec 2014, pp. 1–4. [25] B. Zhu and H. Li, “Adaptive fractional repetition codes for dynamic storage systems,” IEEE Communications Letters, vol. 19, no. 12, pp. 2078–2081, Dec 2015. [26] O. Olmez and A. Ramamoorthy, “Fractional repetition codes with flexible repair from combinatorial designs,” IEEE Transactions on Information Theory, vol. 62, no. 4, pp. 1565–1591, April 2016. [27] T. Ernvall, “The existence of fractional repetition codes,” CoRR, vol. abs/1201.3547, 2012. [28] N. Silberstein and T. Etzion, “Optimal fractional repetition codes and fractional repetition batch codes,” in 2015 IEEE International Symposium on Information Theory (ISIT), June 2015, pp. 2046–2050. [29] O. Olmez and A. Ramamoorthy, “Repairable replication-based storage systems using resolvable designs,” in Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on, Oct 2012, pp. 1174–1181. [30] ——, “Constructions of fractional repetition codes from combinatorial designs,” in Signals, Systems and Computers, 2013 Asilomar Conference on, Nov 2013, pp. 647–651. 7 VI. A PPENDIX C. Bounds on Fractional Repetition Codes using Hypergraphs The Appendix includes the bounds on FR codes correspondence to various classes of hypergraphs such as uniform hypergrths, regular hypergraphs and intersecting hypergraphs. The cost comparison analysis is done for various FR codes at the end of the Appendix. The alternate condition for the existence of an FR code is given in the following Theorem. A. Proof of Lemma 4 Proof: For V = {vi : i = 1, 2, . . . , n}, let H = (V ; E) be a linear conditional hypergraph with |E(vi )| ≤ |E(vj )|, for 1 ≤ i < j ≤ n. For a given positive integer k < n, let V 0 be an arbitrary k-element subset of the set V . Consider a hypergraph H 0 = (V 0 ; E 0 ), where E 0 = {E 0 6= φ : E 0 = E ∩ V 0 , E ∈ E}. By definition of degree of a hypervertex, X k X |E(v)| ≥ v∈V 0 ⇒    X k k |V 0 | |E(vi )| − |E(v)| − ≥ 2 2 0 i=1 X v∈V |E(vi )| i=1  A sub-hypergraph of a linear hypergraph is also linear. So, using Lemma 3, one can conclude that    0 X k X k |V | 0 |E(vi )| − . |E | ≥ |E(v)| − ≥ 2 2 0 i=1 v∈V Theorem 22. (Alternate Existence Condition) Consider two vectors (ρ1 ρ2 . . . ρθ ) and (α1 α2 . . . αn ) on integers such that ρ = ρ1 ≥ ρ2 ≥ . . . ≥ ρθ for j = 1, 2, . . . , θ and i = 1, 2, . . . , n. An FR code C : (n, θ, α, ρ) exists such that |Ui | = αi for i = 1, 2, . . . , n and replication factor of packet Pj is ρj for j = 1, 2, . . . , θ if n θ P P 1) αi = ρj and 2) i=1 n P i=1 j=1 min{αi , m} ≥ m P ρj ( for m < θ, m ∈ Z). j=1 Proof: The proof follows from the duality (with respect to hypergraph) on the Theorem 8. Note that if parameters of an FR code do not satisfy one of the constraint in the Theorem 8 or Theorem 22, then the FR code does not exist. In an FR code, two packets with same replication factor are called parallel packets if the two packets are shared by same nodes. In an FR code, two nodes with same node storage capacity are called parallel nodes if the two nodes contain same packets. For an FR code without parallel packets and parallel nodes, the bound on node storage capacity and replication factor are given in the following two Lemmas. The chosen k-element set V 0 is an arbitrary subset of set V , Lemma 23. An FR code C : (n, θ, α, ρ) without parallel packets, satisfies α ≤ 2n−1 . so   k X Proof: The proof follows from the Theorem 4 in [21, k 0 0 0 0 0 |E(vi )|− . Chapter 1]. min{|E | : H = (V ⊂ V ; E ), |V | = k} ≥ 2 i=1 Hence, the lemma is proved. Lemma 24. An FR code C : (n, θ, α, ρ) without parallel nodes, satisfies ρ ≤ 2θ−1 . B. Algebraic Entropy on Fractional Repetition Code Proof: The proof follows from the duality (with respect to the hypergraph) on Lemma 23. An algebraic entropy of a hypergraph is discussed in [22]. Using a Hyper-FR mapping on a hypergraph, one can find the algebraic entropy for an FR code in the following Theorem. Theorem 21. (Algebraic Entropy) Consider an FR code C : (n, θ, α, ρ) with the node adjacency matrix A(C ) = [ai,j ]n×n . The algebraic entropy associated with the FR code C : (n, θ, α, ρ), is given by I(C ) = − n X λi log2 λi , i=1 where λi (for i = 1, 2, . . . , n) is a discrete probability distribution. In particular, λi (i = 1, 2, . . . , n) is the P eigenvalue of n matrix L(C ) = D − A(C ) are real such that i=1 λi = 1 and 0 ≤ λi ≤ 1 (∀i = 1, 2, . . . , n), where   n n n X X X D = diag  a1j , a2j , . . . , anj  . j=1 j=1 j=1 Proof: The proof follows from the algebraic entropy of the hypergraph [22, Capter 1]. Theorem 25. For an FR code C : (n, θ, α, ρ) with |{U : Pm ∈ U } ∩ {U : Pj ∈ U }| ≤ 1, k X   k DC (k) ≥ αi − , 2 i=1 (5) where αi ≤ αj and 1 ≤ m < j ≤ θ. Proof: The proof follows from the Theorem 14 and |Ui ∩ Uj | ≤ 1 ⇔ |{U : Pm ∈ U } ∩ {U : Pl ∈ U }| ≤ 1 for 1 ≤ m < l ≤ θ and 1 ≤ i < j ≤ n. D. Fractional Repetition Codes using the Uniform Hypergraphs For a positive integer r, an r-uniform hypergraph is a hypergraph H = (V ; E) with |E| = r, for each E ∈ E. If a conditional hypergraph is an r-uniform hypergraph then the hypergraph is called an r-uniform conditional hypergraph. An FR code C : (n, θ, α, ρ) associated with an r-uniform conditional hypergraph H = (V ; E) will have the same 8 replication factor for each packet i.e. ρ = ρj for each j = 1, 2, . . . , θ. For a positive integer r, an r-uniform hypergraph H = r (V ; E) is called an r-complete hypergraph denoted by K|V | if E = {E : E ⊆ V, |E| = r}. The following Lemma gives a bound on total number of packets for an FR code. Lemma 26. For an FR code C : (n, θ, α, ρ) with ρ = ρj (j = 1, 2, . . . , θ), the total number of distinct packets is θ ≤ nρ . r Proof: In an r-complete hypergraph K|V parallel | with no  hyperedges and isolated hypervertices, |E| = |Vr | . An runiform hypergraph H = (V ; E) is a sub-hypergraph of the  |V | r r-complete hypergraph K|V . Hence, |E| ≤ . The number | r of distinct edges in FR code C : (n, θ, α, ρ) equivalent to a ρ-uniform hypergraph H = (V ; E), is θ ≤ nρ . Note that the condition given in Lemma 26, is derived in [27] for FR codes with symmetric parameters. If an r-uniform hypergraph is a connected hypergraph then the hypergraph is called a connected r-uniform hypergraph. An FR code equivalent to a uniform hypergraph will satisfy the following bound. Lemma 27. An FR code C : (n, θ, α, ρ) with |Ui ∩Uj | ≤ 1 (for each i, j = 1, 2, . . . , n) and ρm = ρ (for each m = 1, 2, . . . , θ) satisfies θ ≤ n(n−1) ρ(ρ−1) . Proof: The proof follows from [21, Chapter 1, Theorem 3]. Remark 28. The FR code associated with a ρ-uniform linear conditional hypergraph is GFR code [9]. For a ρ-uniform linear conditional hypergraph, the Theorem 14 follows the bound on code dimension for GFR code [9, Theorem 4]. Remark 29. In [13, Fact 1], it is shown that an IFR code is equivalent to a ρ-uniform hypergraph. E. Fractional Repetition Codes using Regular Hypergraphs An s-regular hypergraph is a hypergraph H = (V ; E) such that |E(vi )| = s, for each vi ∈ V . An conditional hypergraph H = (V ; E) is called an s-regular conditional hypergraph if |E(vi )| = s, for each vi ∈ V . An FR code C : (n, θ, α, ρ) associated with an s-regular conditional hypergraph H = (V ; E) will have the same node storage capacity for each node i.e. α = αi for each i = 1, 2, . . . , n. The following three Lemmas give bound on the FR codes. Lemma 30. An FR code C : (n, θ, α, ρ) associated with connected α-regular conditional hypergraph, satisfies the following conditions. θ P 1) ρj is multiple of α, 2) j=1 θ P ρj ≥ j=1 3) ρ ≤ 1 α α(θ−1) α−1 , θ P ρj . j=1 Proof: The proof follows from the duality (with respect to hypergraphs) on Lemma 9. Lemma 31. An FR code C : (n, θ, α, ρ) with |Ui ∩ Uj | ≤ 1 (for each i, j = 1, 2, . . . , n) and αm = α (for each m = θ(θ−1) . 1, 2, . . . , n) satisfies n ≤ α(α−1) A hypervertex of an s-regular hypergraph  H = (V ; E), shares s distinct hyperedges so |V | ≤ |E| s . The following Lemma ensures the existence of an FR code with the same number of nodes and packets and same packet replication factor and node storage capacity. Lemma 32. For a positive integer r, there exists an FR code C : (n, n, r, r) such that 2 ≤ r ≤ n − 1 and αi = ρj = r, for each i = 1, 2, . . . , n. Proof: The proof follows from the fact that there exists an r-uniform r-regular hypergraph with n hypervertices for 2 ≤ r ≤ n − 1. The node packet distribution of the FR code C : (5, 5, r, r) with 5 nodes and αi = ρj = r (for each i = 1, 2, 3, 4, 5) are following. • For r = 2, there exists an FR code C : (5, 5, 2, 2) with U1 = {P1 , P2 }, U2 = {P2 , P3 }, U3 = {P3 , P4 }, U4 = {P4 , P5 } and U5 = {P5 , P1 }. • For r = 3, there exists an FR code C : (5, 5, 3, 3) with U1 = {P1 , P2 , P3 }, U2 = {P2 , P3 , P4 }, U3 = {P3 , P4 , P5 }, U4 = {P4 , P5 , P1 } and U5 = {P5 , P1 , P2 }. • For r = 4, there exists an FR code C : (5, 5, 4, 4) with U1 = {P1 , P2 , P3 , P4 }, U2 = {P2 , P3 , P4 , P5 }, U3 = {P3 , P4 , P5 , P1 }, U4 = {P4 , P5 , P1 , P2 } and U5 = {P5 , P1 , P2 , P3 }. Remark 33. Each FR code C : (n, θ, α, ρ) considered in [5] is associated with a ρ-uniform α-regular hypergraph H = (V ; E). Recall that the storage capacity of nodes in an FR code is related to the replication factor of packets in the dual FR code and vise verse. Following two Lemmas are based on the properties of duality. Lemma 34. If C : (n, θ, α, ρ) is an FR code with αi = α (for each i = 1, 2, . . . , n) then the dual FR code C ∗ : (n∗ , θ∗ , α∗ , ρ∗ ) is an FR code with ρ∗j ∗ = α, for each j ∗ = 1, 2, . . . , θ∗ . Proof: The Lemma follows from the fact that the dual of an r-uniform hypergraph is an r-regular hypergraph. Lemma 35. If C : (n, θ, α, ρ) is an FR code with ρj = ρ (for each j = 1, 2, . . . , θ) then the dual FR code C ∗ : (n∗ , θ∗ , α∗ , ρ∗ ) is an FR code with αi∗∗ = ρ, for each i∗ = 1, 2, . . . , n∗ . Proof: The Lemma follows from the fact that the dual of an s-regular hypergraph is an s-uniform hypergraph. Remark 36. If C : (n, θ, α, ρ) is an FR code with ρj and αi = α (for each j = 1, 2, . . . , θ); i = 1, 2, . . . , n) the dual FR code C ∗ : (n∗ , θ∗ , α∗ , ρ∗ ) is an FR code αi∗∗ = α∗ and ρ∗j ∗ = ρ∗ , for each i∗ = 1, 2, . . . , n∗ j ∗ = 1, 2, . . . , θ∗ . = ρ then with and Remark 37. In [18], the Transpose code of an FR code is 9 Fig. 3. The graph shows the comparative analysis of an FR code with the symmetric parameters and FR codes with the asymmetric parameters. In the graph, the points on the vertical axis represents the maximum file size (code dimension) which is delivered to any data collector. The points on the horizontal axis represent the reconstruction degree (number of nodes connected to any data collector to retrieve the file). the FR code corresponding to dual hypergraph. All the FR codes in [18], are corresponding to a ρ-uniform α-regular hypergraph. So, all the Transpose codes are corresponding to an α-uniform ρ-regular hypergraph. F. Analysis In this subsection, the comparison among FR codes on homogeneous DSSs and heterogeneous DSSs is done by numerical analysis. Consider an FR code with n = 5 and θ = 10. For an FR code C : (n = 5, θ = 10, α, ρ), let a data collector connects k (≤ n = 5) nodes and receives DC (k) (≤ θ = 10) distinct packets. Two plots between the maximum file size (or code dimension) DC (k) and the reconstruction degree k are given in Figure 3. The ∗ are the points, for the FR code Chomo : (n = 5, θ = 10, α = 4, ρ = 2) with symmetric parameters [5]. The + are the points, for the codes Chete : (n = 5, θ = 10, α ≤ 6, ρ ≤ 4), where αi ≤ α ≤ 6 (i = 1, 2, 3, 4, 5) and ρj ≤ ρ ≤ 4 (j = 1, 2, . . . , 10). The + points are obtained for the FR codes Chete equivalent to a random hypergraph with 5 nodes and 10 distinct packets. In the Figure 3, the code dimension of Chomo and Chete are same for k = 0, 4, 5. For k = 1, 2, 3, the code dimension DChete (k) = 1 + DChomo (k). The graph shows that the code dimension of the FR code with symmetric parameters are not more than the code dimension of the FR code with asymmetric parameters. In an FR code, some encoded packets may be favorable for a data collector because of their functionality and characteristics. For example, if symmetric (θ, B) MDS code is used in the FR code then the first B packets will be favourable to any user because those packets needs no computation since they are the exact copy of the information packets. One can increase the availability of those packets in the FR code by increasing the replication factor of only those packets. Note that the replication factor of each packet in an FR code with the symmetric parameters are same, so the availability of every packets in the FR code remains the same. For n nodes and θ packets, consider an FR code Chete with asymmetric parameters. In the FR code Chete , a packet Pj is available in ρj distinct nodes so, the availability fraction of the packet Pj is ρj /n. Choosing higher values of the replication factor ρj , one can increase the availability fraction of the packet Pj in the system. Note that the availability fraction of each packet is fixed with ρ/n for an FR code Chomo : (n, θ, ., ρ) with symmetric parameters. In an FR code, some nodes may be favorable for a data collector because of their popularity or storage cost. For example, a data collector would like to connect to a node which contains more number of favorable packets and having less storage cost. By permuting the packets, one can find an FR code with the same parameters such that the typical node contains more favorable packets. For an FR code with asymmetric parameters, the system allows to store more packets in a node. Hence, one can find an FR code with the low storage cost sum by replacing packets between two nodes, where the storage costs of the two packets are distinct. Now, consider an FR code with n nodes and θ packets. Let the ci ∈ R be the cost to store one packet in the node Ui . For some i, j ∈ {1, 2, . . . , n} and i 6= j, if 2ci ≤ cj then the cost to store two packets in a node Ui is less then or equal to the cost to store one packet in node Uj . Hence, for a given FR code, the following two propositions give the condition of the existence of FR codes with less storage cost sum. Proposition 38. For the given n, θ ∈ N, let Chomo : (n, θ, α, ρ) be an FR code with the symmetric parameters. Let the ci ∈ R (c1 ≤ c2 ≤ . . . ≤ cn ) be the cost to store one packet in the node Ui . For some i, j ∈ N, if 2ci ≤ cj then an FR code Chete : (n, θ, α0 , ρ0 ) with asymmetric parameters exists such that the total cost sum associated with Chete is less then the total cost sum associated to Chomo , where the total sum of node storage capacity of Chomo and Chete are same. Proposition 39. For given n, θ ∈ N, let C : (n, θ, α, ρ) be an FR code with asymmetric parameters. Let the ci ∈ R (c1 ≤ c2 ≤ . . . ≤ cn ) be the cost to store one packet in the node Ui . For some i, j ∈ N, if ci + ci αi ≤ cj αj then an FR code C 0 : (n, θ, α0 , ρ0 ) exists with asymmetric parameters such that the total cost sum associated with C 0 is more then the total cost sum associated to C , where the total sum of node storage capacity of C and C 0 are the same. 10 TABLE II FR CODES AND RESPECTIVE HYPERGRAPHS FR code C : (n, θ, α, ρ) FR code [5], [24] HFR code [7] IFR code [13] VFR code [8] GFR code [9] WFR code [10] FR code [11] Adaptive FR code [25] FFR code [23] FR code [12] FR code [16] FR code [15], [17] FR code [19], [26], [28], [29], [30] Locally repairable FR code [14], [20] Corresponding conditional hypergraph H = (V ; E) ρ-uniform and α-regular hypergraph Linear and α-regular hypergraph ρ-uniform hypergraph α-regular hypergraph with |E| ∈ {ρ1 , ρ2 }, for each E ∈ E ρ-uniform and linear hypergraph ρ-uniform hypergraph ρ-uniform, α-regular and linear hypergraph ρ-uniform α-regular hypergraph s.t. there exist a ρ0 -uniform α0 -regular sub-hypergraph, where ρ0 < ρ and α0 < α, for ρ0 , α0 ∈ N Linear hypergraph ρ-uniform hypergraph Hypergraph ρ-uniform and α-regular hypergraph Intersecting, ρ-uniform and α-regular hypergraph ρ-uniform, α-regular and and non-linear hypergraph
7cs.IT
Clustering via Crowdsourcing arXiv:1604.01839v1 [cs.DS] 7 Apr 2016 Arya Mazumdar∗ Barna Saha† College of Information & Computer Science University of Massachusetts Amherst Amherst, MA, 01002 Abstract In recent years, crowdsourcing, aka human aided computation has emerged as an effective platform for solving problems that are considered complex for machines alone. Using human is time-consuming and costly due to monetary compensations. Therefore, a crowd based algorithm must judiciously use any information computed through an automated process, and ask minimum number of questions to the crowd adaptively. One such problem which has received significant attention is entity resolution. Formally, we are given a graph G = (V, E) with unknown edge set E where G is a union of k (again unknown, but typically large O(nα ), for α > 0) disjoint cliques Gi (Vi , Ei ), i = 1, . . . , k. The goal is to retrieve the sets Vi s by making minimum number of pair-wise queries V ×V → {±1} to an oracle (the crowd). When the answer to each query is correct, e.g. via resampling, then this reduces to finding connected components in a graph. On the other hand, when crowd answers may be incorrect, it corresponds to clustering over minimum number of noisy inputs. Even, with perfect answers, a simple lower and upper bound of Θ(nk) on query complexity can be shown. A major contribution of this paper is to reduce the query complexity to linear or even sublinear in n when mild side information is provided by a machine, and even in presence of crowd errors which are not correctable via resampling. We develop new information theoretic lower bounds on the query complexity of clustering with side information and errors, and our upper bounds closely match with them. Our algorithms are naturally parallelizable, and also give near-optimal bounds on the number of adaptive rounds required to match the query complexity. ∗ University of Massachusetts Amherst, [email protected]. This work is supported in part by an NSF CAREER award CCF 1453121 and NSF award CCF 1526763. † University of Massachusetts Amherst, [email protected] work is partially supported by a NSF CCF 1464310 grant, a Yahoo ACE Award and a Google Faculty Research Award. 0 1 Introduction Consider we have an undirected graph G(V ≡ [n], E), [n] ≡ {1, . . . , n}, such that G is a union of k disjoint cliques Gi (Vi , Ei ), i = 1, . . . , k, but the subsets Vi ⊂ [n], k and E are unknown to us. We want to make minimum number of adaptive pair-wise queries from V × V to an oracle, and recover the clusters. Suppose, in addition, we are also given a noisy weighted similarity matrix W = {wi,j } of G, where wi,j is drawn from a probability distribution f+ if i and j belong to the same cluster, and else from f− . However, the algorithm designer does not know either f+ or f− . How does having this side information affect the number of queries to recover the clusters, which in this scenario are the hidden connected components of G? To add to it, let us also consider the case when some of the answers to the queries are erroneous. We want to recover the clusters with minimum number of noisy inputs possibly with the help of some side information. In the applications that motivate this problem, the oracle is the crowd. In the last few years, crowdsourcing has emerged as an effective solution for large-scale “micro-tasks”. Usually, the micro-tasks that are accomplished using crowdsourcing tend to be those that computers cannot solve very effectively, but are fairly trivial for humans with no specialized training. Consider for example six places, all named after John F. Kennedy 1 : (ra ) John F. Kennedy International Airport, (rb ) JFK Airport, (rc ) Kennedy Airport, NY (rd ) John F. Kennedy Memorial Airport, (re ) Kennedy Memorial Airport, WI, (rf ) John F. Kennedy Memorial Plaza. Humans can determine using domain knowledge that the above six places correspond to three different entities: ra , rb , and rc refer to one entity, rd and re refer to a second entity, and rf refers to a third entity. However, for a computer, it is hard to distinguish them. This problem known as entity resolution is a basic task in classification, data mining and database management [26, 23, 29]. It has many alias in literature, and also known as coreference/identity/name/record resolution, entity disambiguation/linking, duplicate detection, deduplication, record matching etc. There are several books that just focus on this topic [17, 37]. For a comprehensive study and applications, see [29]. Starting with the work of Marcus et al. [43], there has been a flurry of works that have aimed at using human power for entity resolution [31, 51, 22, 52, 27, 50, 21, 30, 39]. Experimental results using crowdsourcing platforms such as Amazon Mechanical Turk have exceeded the machine only performance [51, 52]. In all of these works, some computer generated pair-wise similarity matrix is used to order the questions to crowd. Using human in large scale experiments is costly due to monetary compensation paid to them, in addition to being time consuming. Therefore, naturally these works either implicitly or explicitly aim to minimize the number of queries to crowd. Assuming the crowd returns answers correctly, entity resolution using crowdsourcing corresponds exactly to the task of finding connected components of G with minimum number of adaptive queries to V × V . Typically k is large [51, 52, 27, 50], and we can, not necessarily, take k ≥ nα for some constant α ∈ [0, 1]. It is straightforward to obtain an upper bound of nk on the number of queries: simply ask one question per cluster for each vertex, and is achievable even when k is unknown. Except for this observation [51, 22], no other theoretical guarantees on the query complexity were known so far. Unfortunately, Ω(nk) is also a lower bound [22]. Bounding query complexity of basic problems like selection and sorting have received significant attention in the theoretical computer science community [25, 10, 4, 9]. Finding connected components is the most fundamental graph problem, and given the matching upper and lower bounds, there seems to be a roadblock in improving its query complexity beyond nk. In contrast, the heuristics developed in practice often perform much better, and all of them use some computer generated similarity matrix to guide them in selecting the next question to ask. We call this crowdsourcing using side information. So, we are given a similarity matrix W = {wi,j }i,j∈V ×V , which is a noisy version of the original adjacency matrix of G as discussed 1 http://en.wikipedia.org/wiki/Memorials_to_John_F._Kennedy 1 in the beginning. Many problems such as sorting, selection, rank aggregation etc. have been studied using noisy input where noise is drawn from a distribution [11, 12, 41]. Many probabilistic generative models, such as stochastic block model, are known for clustering [1, 35, 16, 45]. However, all of these works assume the underlying distributions are known and use that information to design algorithms. Moreover, none of them consider query complexity while dealing with noisy input. We show that with side information, even with unknown f+ and f− , a drastic reduction in query complexity is possible. We propose a randomized algorithm that reduces the number 2 of queries from O(nk) to Õ( ∆(fk+ ,f− ) ), where ∆(f+ , f− ) ≡ D(f+ kf− ) + D(f− kf+ ) and D(pkq) is the Kullback-Leibler divergence between the probability distributions p,  and2 q, and  recovers the clusters accurately with high probability. Interestingly, we show Ω ∆(fk+ ,f− ) is also an information-theoretic lower bound, thus matching the query complexity upper bound within a logarithmic factor. This lower bound could be of independent interest, and may lead to other lower bounds in related communication complexity models. To obtain the clusters accurately with probability 1, we propose a Las Vegas algorithm with expected query complexity   k2 Õ n + ∆(f+ ,f− ) which again matches the corresponding lower bound. So far, we have considered the case when crowd answers are accurate. It is possible that crowd answers contain errors, and remain erroneous even after repeating a question multiple times. That is, resampling, repeatedly asking the same question and taking the majority vote, does not help much. Such observation has been reported in [50, 34] where resampling only reduced errors by ∼ 20%. Crowd workers often use the same source (e.g., Google) to answer questions. Therefore, if the source is not authentic, many workers may give the same wrong answer to a single question. Suppose that error probability is p < 12 . Under such crowd error model, our problem becomes that of clustering with noisy input, where this noisy input itself is obtained via adaptively querying the crowd. We give the first information theoretic lower bounds in this model to obtain the maximum likelihood estimator, and again provide nearly matching upper bounds with and without side information. Side information helps us to drastically reduce the query complexity, from k2 nk ) to Õ( D(pk1−p)∆(f ) where D(pk1 − p) = (1 − 2p) log 1−p Õ( D(pk(1−p)) p . An intriguing fact + ,f− ) log n about this algorithm is that it has running time O(k D(pk1−p) ), and assuming the conjectured hardness of finding planted clique from an Erdős-Rényi random graph [36], this running time cannot be improved2 . However, if we are willing to pay a bit more on the query complexity, then the running time can be made into polynomial. This also provides a better bound on an oft-studied clustering problem, correlation clustering over noisy input [44, 8]. While prior works have considered sorting without resampling [12], these are the first results to consider crowd errors for a natural clustering problem. The algorithms proposed in this work are all intuitive, easily implementable, and can be parallelized. They do not assume any knowledge on the value of k, or the underlying distributions f+ and f− . On the otherhand, our information theoretic lower bounds work even with the complete knowledge of k, f+ , f− . While queries to crowd can be made adaptively, it is also important to minimize the number of adaptive rounds required maintaining the query upper bound. Low round complexity helps to obtain results faster. We show that all our algorithms extend nicely to obtain close to optimal round complexity as well. Recently such results have been obtained for sorting (without any side information) [10]. Our work extends nicely to two more fundamental problems: finding connected components, and noisy clustering. 2 Note that a query complexity bound does not necessarily removes the possibility of a super-polynomial running time. 2 1.1 Related Work In a recent work [10], Braverman, Mao and Weinberg studied the round complexity of selection and obtaining the top-k and bottom-k elements when crowd answers are all correct, or are erroneous with probability 12 − λ2 , or erased with probability 1 − λ, for some λ > 0. They do not consider any side information. There is an extensive literature of algorithms in the TCS community where the goal is to do either selection or sorting with O(n) comparisons in the fewest interactive rounds, aka parallel algorithms for sorting [49, 47, 5, 6, 4, 9]. However, those works do not consider any erroneous comparisons, and of course do not incorporate side information. Feige et al., study the depth of noisy decision tree for simple boolean functions, and selection, sorting, ranking etc. [25], but not with any side information. Parallel algorithms for finding connected components and clustering have similarly received a huge deal of attention [28, 33, 18, 46]. Neither those works, nor their modern map-reduce counterparts [40, 24, 32, 2] study query complexity, or noisy input. There is an active body of work dealing with sorting and rank aggregation with noisy input under various models of noise generation [11, 12, 41]. However these works aim to recover the maximum likelihood ordering without any querying. Similarly, clustering algorithms like correlation clustering has been studied under various random and semirandom noise models without any active querying [8, 44, 42]. Stochastic block model is another such noisy model which has recently received a great deal of attention [1, 35, 16, 45], but again prior to this, no work has considered the querying capability when dealing with noisy input. In all these works, the noise model is known to the algorithm designer, since otherwise the problems become NP-Hard [11, 8, 3]. In more applied domains, many frameworks have been developed to leverage humans for performing entity resolution [52, 31]. Wang et al. [52] describe a hybrid human-machine framework CrowdER, that automatically detects pairs or clusters that have a high likelihood of matching based on a similarity function, which are then verified by humans. Use of similarity function is common across all these works to obtain querying strategies [31, 51], but hardly any provide bounds on the query complexity. The only exceptions are [51, 22] where a simple nk bound on the query complexity has been derived when crowd returns correct answers, and no side information is available. This is also a lower bound even for randomized algorithms [22]. Firmani et al. [27] analyzed the algorithms of [52] and [51] under a very stringent noise model. To deal with the possibility that the crowdsourced oracle may give wrong answers, there are simple majority voting mechanisms or more complicated heuristic techniques [50, 21, 30, 39] to handle such errors. No theoretical guarantees exist in any of these works. Davidson et al., consider a variable error model where clustering is based on a numerical value–in that case clusters are intervals with few jumps (errors), and the queries are unary (ask for value) [22]. This error model is not relevant for pair-wise comparison queries. 1.2 Results and Techniques Problem (Crowd-Cluster). Consider an undirected graph G(V ≡ [n], E), such that G is a union of k disjoint cliques (clusters) Gi (Vi , Ei ), i = 1, . . . , k, where k, the subsets Vi ⊆ [n] and E are unknown. There is an oracle O : V × V → {±1}, which takes as input a pair of vertices u, v ∈ V × V , and returns either +1 or −1. Let O(Q), Q ⊆ V × V correspond to oracle answers to all pairwise queries in Q. The queries in Q can be done adaptively. The adjacency matrix of G is a block-diagonal matrix. Let us denote this matrix by A = (ai,j ). Consider W , an n × n matrix, which is the noisy version of the matrix A. Assume that the (u, v)th entry of the matrix W , wu,v , is a nonnegative random variable in [0, 1] drawn from a probability density or mass function f+ for ai,j = 1, and is drawn from a probability density or mass function f− if ai,j = 0. f+ and f− are unknown. • Crowd-Cluster with Perfect Oracle Here O(u, v) = +1 iff u and v belong to the same cluster and O(u, v) = −1 iff u and v belong to different clusters. 3 1. Without Side Information. Given V , find Q ⊆ V × V such that |Q| is minimum, and from O(Q) it is possible to recover Vi , i = 1, 2, ..., k. 2. With Side Information. Given V and W , find Q ⊆ V × V such that |Q| is minimum, and from O(Q) it is possible to recover Vi , i = 1, 2, ..., k. • Crowd-Cluster with Faulty Oracle There is an error parameter p = 21 −λ for some λ > 0. We denote this oracle by Op . Here if u, v belong to the same cluster then Op (u, v) = +1 with probability 1 − p and Op (u, v) = −1 with probability p. On the otherhand, if u, v do not belong to the same cluster then Op (u, v) = −1 with probability 1 − p and Op (u, v) = +1 with probability p (in information theory literature, such oracle is called binary symmetric channel). 1. Without Side Information. Given V , find Q ⊆ V × V such that |Q| is minimum, and from Op (Q) it is possible to recover Vi , i = 1, 2, ..., k with high probability. 2. With Side Information. Given V and W , find Q ⊆ V × V such that |Q| is minimum, and from Op (Q) it is possible to recover Vi , i = 1, 2, ..., k with high probability. • Crowd-Cluster with Round Complexity Consider all the above problems where O (similarly Op ) can answer to n log n queries simultaneously, and the goal is to minimize the number of adaptive rounds of queries required to recover the clusters. 1.2.1 Lower Bounds When no side information is available, it is somewhat straight-forward to have a lower bound on the query complexity if the oracle is perfect. Indeed, in that case the query complexity of Crowd-Cluster is Ω(nk) where n is the total number of elements and k is the number of clusters. To see this, note that, any algorithm can be provided with a clustering designed adversarially in the following way. First, k elements residing in k different clusters are revealed to the algorithm. For a vertex among the remaining n − k vertices, if the algorithm makes any less than k − 2 queries, the adversary still can place the vertex in one of the remaining 2 clusters– resulting in a query complexity of (n − k)(k − 1). This argument can be extended towards randomized algorithms as well, by using Yao’s min-max principal, and has been done in [22]. However [22] left open the case of proving lower bound for randomized algorithms when the clusters are nearly balanced (ratio between the minimum and maximum cluster size is bounded). One of the lower bound results proved in this paper resolves it. Our main technical results for perfect oracle are for Crowd-Cluster with side information. Our lower bound results are information theoretic, and can be summarized in the following theorem. Theorem 1. Any (possibly randomized) algorithm with the knowledge of f+ , f− , and the number  k2 of clusters k, that does not perform at least Ω ∆(f+ ,f− ) queries, ∆(f+ , f− ) > 0, will be unable to return the correct clustering with probability at least 1 10 . (Proof in Sec. 4.1). Corollary 1. Any (possibly randomized but Las Vegas) algorithmwith the knowledge of f+ , f− , k2 queries, and the number of clusters k, that does not perform at least Ω n + min{1,∆(f + ,f− )} ∆(f+ , f− ) > 0, will be unable to return the correct clustering. (Proof in Sec. 4.1). The main high-level technique is the following. Suppose, a vertex is to be assigned to a cluster. We have some side-information and answers to queries involving this vertex at hand. Let these constitute a random variable X that we have observed. Assuming that there are k possible clusters to assign this vertex to, we have a k-hypothesis testing problem. By observing X, we have to decide which of the k different distributions (corresponding to the vertex being 4 in k different clusters) it is coming from. If the distributions are very close (in the sense of total variation distance or divergence), then we are bound to make an error in deciding. We can compare this problem of assigning a vertex to one of the k-clusters to finding a biased coin among k coins. In the later problem, we are asked to find out the minimum number of coin tosses needed for correct identification. This type of idea has previously been applied to design adversarial strategies that lead to lower bounds on average regret for the multi-arm bandit problem (see, [7, 13]). The problem that we have in hand, for lower bound on query-complexity, is substantially different. It becomes a nontrivial task to identify the correct input and design the set-up so that we can handle the problem in the framework of finding a biased coin. The key insight here is that, given a vertex, the combined side-information pertaining to this vertex and a cluster plays the role of tossing a particular coin (multiple times) in the coin-finding problem. However the liberty of an algorithm designer to query freely creates the main challenge. For faulty oracle, note that we are not allowed to ask the same question multiple times to get the correct answer with high probability. This changes the situation quite a bit, though in some sense this is closer to coin-tossing experiment than the previous one as we handle binary random variables here (the answer to the queries). We first note that, for faulty-oracle, even for probabilistic recovery a minimum size bound on cluster size is required. For example, k−2 consider the following two different clusterings. C1 : V = ⊔i=1 Vi ⊔ {v1 , v2 } ⊔ {v3 } and C2 : k−2 V = ⊔i=1 Vi ⊔ {v1 } ⊔ {v2 , v3 }. Now if one of these two clusterings are given two us uniformly at random, no matter how many queries we do, we will fail to recover the correct cluster with probability at least p. Our lower bound result works even when all the clusters are close to their average size (which is nk ), and resolves a question from [22] for p = 0 case. This removes the constraint on the algorithm designer on how many times a cluster can be queried with a vertex and the algorithms can have greater flexibility. While we have to show that enough number of queries must be made with a large number of vertices V ′ ⊂ V , either of the conditions on minimum or maximum sizes of a cluster ensures that V ′ contains enough vertices that do not satisfy this query requirement. Theorem 2. Assume either of the following cases: • the maximum size of a cluster is ≤ 4n k . • the minimum size of a cluster is ≥ n 20k . For a clustering that satisfies either of the above two conditions, any (randomized) algorithm   nk must make Ω D(pk1−p) queries to recover the correct clusters with probability 0.9 when p > 0. For p = 0 any (randomized) algorithm must make Ω(nk) queries to recover the correct clusters with probability 0.9. (Proof in Sec. 6.1.1). We believe that our lower bound techniques are of independent interest, and can spur new lower bounds for communication complexity problems. 1.2.2 Upper Bounds Our upper bound results are inspired by the lower bounds. For Crowd-Cluster with perfect oracle, a straight forward algorithm achieves a nk query complexity. One of our main contributions is a drasticR reduction in query complexity of Crowd-Cluster when side information is provided. R Let µ+ ≡ xf+ (x)dx, µ− ≡ xf− (x)dx. Our first theorem that assumes µ+ > µ− is as follows. Theorem 3 (Perfect Oracle+Side Information). With known µ+ , µ− , there exist a Monte Carlo 2 log n algorithm for Crowd-Cluster with query complexity O( (µk+ −µ 2 ), and a Las Vegas algorithm with −) 2 log n expected query complexity O(n + (µk+ −µ 2 ) even when µ+ , µ− are unknown. (Proof in Sec. 4.2). −) 5 Many natural distributions such as N (µ+ , 1) and N (µ− , 1) have ∆(N (µ+ , 1)kN (µ− , 1)) = (µ+ − µ− )2 . But, it is also natural to have distributions where µ+ = µ− but ∆(f+ , f− ) > 0. As a simple example, consider two discrete distributions with mass 1/4, 1/2, 1/4 and 1/3, 1/3, 1/3 respectively at points 0, 1/2, 1. Their means are the same, but divergence is constant.The following theorem matches the lower bound upto a log n factor with no assumption on µ+ , µ− . Theorem 4 (Perfect Oracle+Side Information). Let f+ and f− be pmfs 3 and mini f+ (i), mini f− (i) ≥ ǫ for a constant ǫ. There exist a Monte Carlo algorithm for Crowd-Cluster with k 2 log n ) with known f+ and f− , and a Las Vegas algorithm with expected query complexity O( ∆(f + ,f− ) 2 k log n ) even when k, f+ and f− are unknown. (Proof in Sec. 4.2). query complexity O(n log n+ ∆(f + ,f− ) To improve from Theorem 3 to Theorem 4, we would need a more precise approach. The minor restriction that we have on f+ and f− , namely, mini f+ (i), mini f− (i) ≥ ǫ allows ∆(f+ , f− ) ≤ 2ǫ . Note that, by our lower bound result, Lemma 1, it is not possible to achieve query complexity below k2 . While our lower bound results assume knowledge of k, f+ and f− , our Las Vegas algorithms do not even need to know them, and none of the algorithms know k. For Theorem 4, indeed, either of mini f− (i) or mini f+ (i) having at least ǫ will serve our purpose. The main idea is as follows. It is much easier to determine whether a vertex belongs to a cluster, if that cluster has enough number of members. On the other hand, if a vertex v has the highest membership in some cluster C with a suitable definition of membership, then v should be queried with C first. For any vertex v and a cluster C, define the empirical “inter” distribution 1 · |{u : wu,v = ai }|. Also compute pv,C in the following way. For, i = 1, . . . , q,: pv,C (i) = |C| 1 the ‘intra’ distribution pC for i = 1, . . . , q, pC (i) = |C|(|C|−1) · |{(u, v) : u 6= v, wu,v = ai }|. Then Membership(v, C) = −kpv,C − pC kT V , where kpv,C − pC kT V denotes the total variation distance between distributions defined in Section 3. If Membership(v, C) is highest for C, then using Sanov’s Theorem (Theorem 9) it is highly likely that v is in C, if |C| is large enough. However we do not know f+ or f− . Therefore, the highest membership could be misleading since we do not know the desired size threshold that C must cross to be reliable. But yet, it is possible to query a few clusters and determine correctly the one which contains v. The main reason behind using total variation distance as opposed to divergence, is that divergance is not a metric, and hence do not satisfy the triangle inequality which becomes crucial in our analysis. This is the precise reason why we need the minimum value to be at least ǫ in Theorem 4. Under these restrictions, a close relationship between divergence and total variation distance can be established using Pinsker’s and Reverse Pinsker’s inequalities (see, Section 3). For faulty oracle, let us first take the case of no side information (later, we can combine it with the previous algorithm to obtain similar results with side information). Suppose all V × V queries have been made. If the maximum likelihood (ML) estimate on G with these n2 query answers is same as the true clustering of G, then Algorithm 2 finds the true clustering with high probability. We sample a small graph G′ from G, by asking all possible queries in G′ , and check for the heaviest weight subgraph (assuming ±1 weight on edges) in G′ . If that subgraph crosses a desired size, it is removed from G′ . If this cluster is detected correctly, then it has enough members; we can ask separate queries to them to determine if a vertex belongs to that cluster. The main effort goes in showing that the computed cluster from G′ is indeed correct, and that G′ has small size. Theorem 5 (Faulty Oracle with No Side Information). There exists an algorithm with query  complexity O( λ12 nk log n) for Crowd-Cluster that returns Ĝ, ML estimate of G with all n2 queries, with high probability when query answers are incorrect with probability p = 12 − λ. Noting that, 4λ2 , this matches the information theoretic lower bound on the query complexity D(pk1− p) ≤ 1/2−λ 3 We can handle probability density functions as well for Theorem 4 and Theorem 6, if the quantization error is small. Our other theorems are valid for f+ and f− being both probability mass functions and density functions. 6 within a log n factor. Moreover, the algorithm returns all the true clusters of G of size at least 36 log n with high probability. (Proof in Sec. 6.1.2). λ2 Theorem 6 (Faulty Oracle with Side Information). Let f+ , f− be pmfs and mini f+ (i), mini f− (i) ≥ ǫ for a constant ǫ. With side information and faulty oracle with error probability 12 − λ, there exist an algorithm for Crowd-Cluster with query complex2 n ity O( λ2 k∆(flog ) when f+ , f− known, and an algorithm with expected query complexity + ,f− ) 2 n ) when f+ , f− unknown, that recover Ĝ, ML estimate of G with all O(n + λ2 k∆(flog + ,f− ) with high probability. (Proof in Sec. 6.1.3). n 2 queries, log n A subtle part of these results is that, the running time is O(k λ2 ), which is optimal assuming the hardness of planted cliques. However, by increasing the query complexity, the running time can be reduced to polynomial. Corollary 2 (Faulty Oracle with/without Side Information). For faulty oracle with error probability 12 − λ, there exists a polynomial time algorithm with query complexity O( λ12 nk2 ) for CrowdCluster that recovers all clusters of size at least O(max { λ12 log n, k}). (Proof in Sec. 6.1.2). As it turns out the ML estimate of G with all n2 queries is equivalent to computing correlation clustering on G [11, 8, 3, 14, 15]. As a side result, we get a new algorithm for correlation √ clustering over noisy input, where any cluster of size min (k, n) will be recovered exactly with √ n log n high probability as long as k = Ω( log λ2 ). When k ∈ [Ω( λ2 ), o( n)], our algorithm strictly improves over [11, 8]. We hope our work will inspire new algorithmic works in the area of crowdsourcing where both query complexity and side information are important.  1.2.3 Round Complexity Finally, we extend all our algorithms to obtain near optimal round complexity. Theorem 7 (Perfect Oracle with Side Information). There exists an algorithm for CrowdCluster with perfect oracle and unknown side information f+ and f− such that it√achieves a √ round complexity within Õ(1) factor of the optimum when k = Ω( n) or k = O( ∆(f+nkf− ) ), and otherwise within Õ( ∆(f+1kf− ) ). (Proof in Sec. 7.1). Theorem 8 (Faulty Oracle with no Side Information). There exists an algorithm for CrowdCluster with faulty oracle with error probability 21 −λ and no side information such that it achieves √ a round complexity within Õ( log n) factor of the optimum that recovers Ĝ, ML estimate of G  with all n2 queries with high probability. (Proof in Sec. 7.2). This also leads to a new parallel algorithm for correlation clustering over noisy input where computation in every round is bounded by n log n. 2 Organization of the remaining paper The rest of the paper is organized as follows. In Section 3, we provide the information theoretic tools (definitions and basic results) necessary for our upper and lower bounds. In Section 4 we provide our main upper bound results for the perfect oracle case when f+ and f− are unknown. In Section 5 we give some more insight into the working of Algorithm 1 and for the case when f+ and f− are known, provide near optimal Monte Carlo/Las Vegas algorithms for Crowd-Cluster with side information and perfect oracle. In Section 6, we consider the case when crowd may return erroneous answers. In this scenario we give tight lower and upper bounds on query complexity in both the cases when we have or lack side information. In Section 7, we show that the algorithms developed for optimizing query complexity naturally extend to the parallel version of minimizing the round complexity. 7 3 Information Theory Toolbox The lower bounds for randomized algorithms presented in this paper are all information theoretic. We also use information theoretic tools of large-deviations in upper bounds. To put these bounds into perspective, we will need definition of many information theoretic quantities and some results. Most of this material can also be found in a standard information theory textbook, such as Cover and Thomas [19]. Definition (Divergence). The Kullback-Leibler divergence, or simply divergence, between two probability measures P and Q on a set X , is defined to be D(P kQ) = Z X dP ln dP . dQ When P and Q are distributions of a continuous random variable, represented by probability R∞ (x) fp (x) ln ffpq (x) densities fp (x) and fq (x) respectively, we have, D(fp kfq ) = −∞ dx. Similarly when P and Q are discrete random variable taking values in the set X , and represented by the probability mass functions p(x) and q(x), where x ∈ X respectively, we have D(p(x)kq(x)) = P p(x) x∈X p(x) ln q(x) . For two Bernoulli distributions with parameters p and q, where 0 ≤ p, q ≤ 1, by abusing the notation the divergence is written as, D(pkq) = p ln 1−p p + (1 − p) ln . q 1−q p 1−p In particular, D(pk1 − p) = p ln 1−p + (1 − p) ln 1−p p = (1 − 2p) ln p . Although D(P kQ) ≥ 0, with equality when P = Q, note that in general D(P kQ) 6= D(QkP ). Define the symmetric divergence between two distribution P and Q as, ∆(P, Q) = D(P kQ) + D(QkP ). The following property of the divergence is going to be useful to us. Consider a set of random variables X1 , . . . , Xm , and consider the two joint distribution of the random variables, P m and Qm . When the random variables are independent, let Pi and Qi be the corresponding marginal distribution of the random variable Xi , i = 1, . . . , m. In other words, we have, Qm Q m P m (x1 , x2 , . . . , xm ) = m i=1 Qi (xi ). Then we must have, i=1 Pi (xi ) and Q (x1 , x2 , . . . , xm ) = m m D(P kQ ) = m X i=1 D(Pi kQi ). (1) A more general version, when the random variables are not independent, is given by the chain-rule, described below for discrete random variables. Lemma 1. Consider a set of discrete random variables X1 , . . . , Xm , and consider the two joint distribution of the random variables, P and Q. The chain-rule for divergence states that, D(P (x1 , . . . , xm )kQ(x1 , . . . , xm )) = m X i=1 D(P (xi | x1 , . . . , xi−1 )kQ(xi | x1 , . . . , xi−1 )), where, D(P (x|y)kQ(x|y)) = X P (Y = y)D(P (x|Y = y)kQ(x|Y = y)). y 8 Definition (Total Variation Distance). For two probability distributions P and Q defined on a sample space X and same sigma-algebra F, the total variation distance between them is defined to be, kP − QkT V = sup{P (A) − Q(A) : A ∈ F}. In words, the distance between two distributions is their largest difference over any measurable set. For finite X total variation distance is half of the ℓ1 distance between pmfs. The total variation distance and the divergence are related by the Pinsker’s inequality. Lemma 2 (Pinsker’s inequality). For any two probability measures P and Q, 1 kP − Qk2T V ≤ D(P kQ). 2 It is easy to see that, there cannot be a universal ‘reverse’ Pinsker’s inequality, i.e., an upper bound on the divergence by the total variation distance (for example, the total variation distance is always less than 1, while the divergence can be infinity). However, under various assumptions, such upper bounds have been proposed [48, 20]. For example we provide one such inequality below. Lemma 3 (Reverse Pinsker’s inequality[48]). For any two probability measures on finite alphabet X , given by probability mass functions p and q, we must have, kp − qk2T V ≥ minx∈X q(x) D(pkq) 2 (2) This inequality can be derived from Eq.(28) of [48]. A particular basic large-deviation inequality that we use for the upper bounds is Sanov’s theorem. Theorem 9 (Sanov’s theorem). Let X1 , . . . , Xn are iid random variables with a finite sample space X and distribution P . Let P n denote their joint distribution. Let E be a set of probability P distributions on X . The empirical distribution P̃n gives probability P̃n (A) = n1 ni=1 1Xi ∈A to any event A. Then, P n ({x1 , . . . , xn } : P̃n ∈ E) ≤ (n + 1)|X | exp(−n min D(P ∗ kP )). ∗ P ∈E A continuous version of Sanov’s theorem is also possible but we omit here for clarity. Hoeffding’s inequality for large deviation of sums of bounded independent random variables is well known [38, Thm. 2]. Lemma 4 (Hoeffding). If X1 , . . . , Xn are independent random variables and ai ≤ Xi ≤ bi for all i ∈ [n]. Then Pr(| n 1X 2n2 t2 ). (Xi − EXi )| ≥ t) ≤ 2 exp(− Pn 2 n i=1 i=1 (bi − ai ) This inequality can be used when the random variables are independently sampled with replacement from a finite sample space. However due to a result in the same paper [38, Thm. 4], this inequality also holds when the random variables are sampled without replacement from a finite population. Lemma 5 (Hoeffding). If X1 , . . . , Xn are random variables sampled without replacement from a finite set X ⊂ R, and a ≤ x ≤ b for all x ∈ X . Then Pr(| n 2nt2 1X (Xi − EXi )| ≥ t) ≤ 2 exp(− ). n i=1 (b − a)2 9 Crowd-Cluster with Perfect Oracle 4 In this section, we consider the clustering problem using crowdsourcing when crowd always returns the correct answers, and there is side information. 4.1 Lower Bound Recall that there are k clusters in the n-vertex graph. That is G(V, E) is such that, V = ⊔ki=1 Vi and E = {(i, j) : i, j ∈ Vℓ for some ℓ}. In other words, G is a union of at most k disjoint cliques. Every entry of the side-information matrix W is generated independently as described in the introduction. We now prove Theorem 1. Proof of Theorem 1. We are going to construct an input that any randomized algorithm will be unable to correctly j identify k with positive probability. 1 Suppose, a = ∆(f+ ,f− ) . Consider the situation when we are already given a complete cluster Vk with n − (k − 1)a elements, remaining (k − 1) clusters each has 1 element, and the rest (a − 1)(k − 1) elements are evenly distributed (but yet to be assigned) to the k − 1 clusters. This means each of the smaller clusters has size a each. Note that, we assumed the knowledge of the number of clusters k. The side information matrix W = (wi,j ) is provided. Each wi,j are independent random variables. Now assume the scenario when we use an algorithm ALG to assigns a vertex to one of the k − 1 clusters, Vu , u = 1, . . . , k − 1. Note that, for any vertex, l, the side informations wi,j where i 6= l and j 6= l, do not help in assigning l to a cluster (since in that case wi,j is independent of l). Therefore, given a vertex l, ALG takes as input the random variables wi,l s where i ∈ ⊔t Vt , and makes some queries involving l and outputs a cluster index, which is an assignment for l. Based on the observations wi,l s, the task of algorithm ALG is thus a multi-hypothesis testing among k − 1 hypotheses. Let Hu , u = 1, . . . k − 1 denote the k − 1 different hypotheses Hu : l ∈ Vu . And let Pu , u = 1, . . . k − 1 denote the joint probability distributions of the random variables wi,j s when l ∈ Vu . In short, for any event A, Pu (A) = Pr(A|Hu ). Going forward, the subscript of probabilities or expectations will denote the appropriate conditional distribution. For this hypothesis testing problem, let E{Number of queries made by ALG} = T. Then, there exist t ∈ {1, . . . , k − 1} such that, Et {Number of queries made by ALG} ≤ T. Note that, k−1 X v=1 Pt { a query made by ALG involving cluster Vv } ≤ Et {Number of queries made by ALG} ≤ T. Consider the set J ′ ≡ {v ∈ {1, . . . , k − 1} : Pt { a query made by ALG involving cluster Vv } < 1 }. 10 1 ≤ T, which implies, |J ′ | ≥ k − 1 − 10T. We must have, (k − 1 − |J ′ |) · 10 Note that, to output a cluster without using the side information, ALG has to either make a query to the actual cluster the element is from, or query at least k − 2 times. In any other case, ALG must use the side information (in addition to using queries) to output a cluster. Let E u denote the event that ALG output cluster Vu by using the side information. Pk−1 10 Let J ′′ ≡ {u ∈ {1, . . . , k − 1} : Pt (E u ) ≤ k−1 }. Since, u=1 Pt (E u ) ≤ 1, we must have, (k − 1 − |J ′′ |) · We have, 9(k − 1) 10 ≤ 1, or |J ′′ | ≥ . k−1 10 |J ′ ∩ J ′′ | ≥ k − 1 − 10T + 9(k − 1) 9(k − 1) − (k − 1) = − 10T. 10 10 10 Now consider two cases. Case 1: T ≥ 9(k−1) 100 . In this case, average number of queries made by ALG to assign one vertex to a cluster is at least 9(k−1) 10 . Since there are (k − 1)(a − 1) vertices that needs to be assigned to clusters, the expected total number of queries performed by ALG is 9(k−1)2 (a−1) . 10 . In this case, J ′ ∩ J ′′ is nonempty. Assume that we need to assign the Case 2: T < 9(k−1) 100 vertex j ∈ Vℓ for some ℓ ∈ J ′ ∩ J ′′ to a cluster (Hℓ is the true hypothesis). We now consider the following two events. E1 = n a query made by ALG involving cluster Vℓ n o o E2 = k − 2 or more queries were made by ALG . Note that, if the algorithm ALG can correctly assign j to a cluster without using the side information then either of E1 or E2 must have to happen. Recall, E ℓ denote the event that ALG S S output cluster Vℓ using the side information. Now consider the event E ≡ E ℓ E1 E2 . The probability of correct assignment is at most Pℓ (E). We have, Pℓ (E) ≤ Pt (E) + |Pℓ (E) − Pt (E)| ≤ Pt (E) + kPℓ − Pt kT V ≤ Pt (E) + r 1 D(Pℓ kPt ), 2 where we first used the definition of the total variation distance and in the last step we have used Pinsker’s inequality (Lemma 2). Now we bound the divergence D(Pℓ kPt ). Recall that Pℓ and Pt are the joint distributions of the independent random variables wi,j , i ∈ ∪u Vu . Now, using lemma 1, and noting that the divergence between identical random variables are 0, we obtain D(Pℓ kP1 ) ≤ aD(f− kf+ ) + aD(f+ kf− ) = a∆ ≤ 1. This is true because the only times when wi,jqdiffers under Pt and under Pℓ is when i ∈ Vt or i ∈ Vℓ . As a result we have, Pℓ (E) ≤ Pt (E) + 12 . Now, using Markov inequality Pt (E2 ) ≤ T k−2 ≤ Pt (E) ≤ Pt (E ℓ ) + Pt (E1 ) + Pt (E2 ) ≤ 9(k−1) 100(k−2) ≤ 9 100 + 9 100(k−2) . Therefore, 10 1 9 9 + + + . k − 1 10 100 100(k − 2) 19 + For large enough k, we overall have Pℓ (E) ≤ 100 1 j to the correct cluster with probability at least 10 . q 1 2 < 9 10 . This means ALG fails to assign Considering the above two cases, we can say that any algorithm either makes on average 1 queries, or makes an error with probability at least 10 . 9(k−1)2 (a−1) 10 Note that, in this proof we have not in particular tried to optimize the constants. Corollary 1 follows by noting that to recover the clusters exactly, the query complexity has to be at least k k (n − k) + 2 . If the number of queries issued is at most (n − k) + 2 − 1, then either there exists a vertex v in a non-singleton cluster which has not been queried to any other member of that same cluster, or there exist two clusters such that no inter-cluster edge across them have been queried. 4.2 Upper Bound We do not know k, f+ , f− , µ+ , or µ− , and our goal, in this section, is to design an algorithm with optimum query complexity for exact reconstruction of the clusters with probability 1. We are provided with the side information matrix W = (wi,j ) as an input. Let θgap = µ+ − µ− . 11 The algorithm uses a subroutine called Membership that takes as input a vertex v and a subset of vertices C ⊆ V. PAt this point, let the membership of a vertex v in cluster C is defined wv,u as follows: avg(v, C) = u∈C , and we use Membership(v, C) = avg(v, C). |C| The pseudocode of the algorithm is given in Algorithm 1. The algorithm works as follows. Let C1 , C2 , ..., Cl be the current clusters in nonincreasing order of size. We find the minimum index j ∈ [1, l] such that there exists a vertex v not yet clustered, with the highest average membership to Cj , that is Membership(v, Cj )≥Membership(v, Cj ′ ), ∀j ′ 6= j, and j is the smallest index for which such a v exists. We first check if v ∈ Cj by querying v with any current member of Cj . If not, then we group the clusters C1 , C2 , .., Cj−1 in at most ⌈log n⌉ groups such that 1 | |C1 | , 2i ). For each group, we pick the cluster which clusters in group i has size in the range [ 2|Ci−1 has the highest average membership with respect to v, and check by querying whether v belongs to that cluster. Even after this, if the membership of v is not resolved, then we query v with one member of each of the clusters that we have not checked with previously. If v is still not clustered, then we create a new singleton cluster with v as its sole member. We now give a proof of the Las Vegas part of Theorem 3 here using Algorithm 1, and defer the more formal discussions on the Monte Carlo part to the next section. Proof of Theorem 3, Las Vegas Algorithm. First, The algorithm never includes a vertex in a cluster without querying it with at least one member of that cluster. Therefore, the clusters constructed by our algorithm are always proper subsets of the original clusters. Moreover, the algorithm never creates a new cluster with a vertex v before first querying it with all the existing clusters. Hence, it is not possible that two clusters produced by our algorithm can be merged. Let C1 , C2 , ..., Cl be the current non-empty clusters that are formed by Algorithm 1, for some l ≤ k. Note that Algorithm 1 does not know k. Let without loss of generality |C1 | ≥ |C2 | ≥ ... ≥ n . |Cl |. Let there exists an index i ≤ l such that |C1 | ≥ |C2 | ≥ · · · ≥ |Ci | ≥ M , where M = 6θlog 2 gap Of course, the algorithm does not know either i or M . If even |C1 | < M , then i = 0. Suppose j ′ is the minimum index such that there exists a vertex v with highest average membership in Cj ′ . There are few cases to consider based on j ′ ≤ i, or j ′ > i and the cluster that truly contains v. Case 1. v truly belongs to Cj ′ . In that case, we just make one query between v and an existing member of Cj ′ and the first query is successful. Case 2. j ′ ≤ i and v belongs to Cj , j 6= j ′ for some j ∈ {1, . . . , i}. Let avg(v, Cj ) and avg(v, Cj ′ ) be the average membership of v to Cj , and Cj ′ respectively. Then we have avg(v, Cj ′ ) ≥ avg(v, Cj ), that is Membership(v, Cj′ )≥Membership(v, Cj ). This is only possible if θ θ gap ′ either avg(v, Cj ′ ) ≥ µr + gap 2 or avg(v, Cj ) ≤ µg − 2 . Since both Cj and Cj have at least M current members, then using the Chernoff-Hoeffding’s bound (Lemma 4) followed by union bound this happens with probability at most n23 . Therefore, the expected number of queries involving v before its membership gets determined is ≤ 1 + n23 k < 2. Case 4. v belongs to Cj , j 6= j ′ for some j > i. In this case the algorithm may make k queries involving v before its membership gets determined. Case 5. j ′ > i, and v belongs to Cj for some j ≤ i. In this case, there exists no v with its highest membership in C1 , C2 , ..., Ci . Suppose C1 , C2 , ..., Cj′ are contained in groups H1 , H2 , ..., Hs where s ≤ ⌈log n⌉. Let Cj ∈ 1| Ht , t ∈ [1, s]. Therefore, |Cj | ∈ [ 2|Ct−1 , |C21t | ]. If |Cj | ≥ 2M , then all the clusters in group Ht have size at least M . Now with probability at least 1 − n22 , avg(v, Cj ) ≥ avg(v, Cj ′′ ), that is Membership(v, Cj )≥Membership(v, Cj ′′ ) for every cluster Cj ′′ ∈ Ht . In that case, the membership of v is determined within at most ⌈log n⌉ queries. Otherwise, with probability at most n22 , there may be k queries to determine the membership of v. Therefore, once a cluster has grown to size 2M , the number of queries to resolve the membership of any vertex in those clusters is at most ⌈log n⌉ with probability at least 1− n2 . Hence, for at most 2kM elements, the number of queries made to resolve their membership can be k. Thus the 12 2 log n expected number of queries made by Algorithm 1 is O(n log n + M k2 ) = O(n log n + (µk+ −µ 2 ). −) Moreover, if we knew µ+ and µ− , we can calculate M , and thus whenever a clusters grows to size M , remaining of its members can be included in that cluster without making any error with high probability. This leads to Theorem 3. We can strengthen this algorithm by changing the subroutine Membership in the following way. Assume that f+ , f− are discrete distributions over q points a1 , a2 , . . . , aq ; that is wi,j takes value in the set {a1 , a2 , . . . , aq } ⊂ [0, 1]. The subroutine Membership takes v ∈ V and C ⊆ V \ {v} as inputs. Compute the ‘inter’ 1 · |{u : wu,v = ai }|. distribution pv,C for i = 1, . . . , q, pv,C (i) = |C| 1 Also compute the ‘intra’ distribution pC for i = 1, . . . , q, pC (i) = |C|(|C|−1) · |{(u, v) : u 6= v, wu,v = ai }|. Then define Membership(v, C) = −kpv,C −pC kT V . Note that, since the membership is always negative, a higher membership implies that the ‘inter’ and ‘intra’ distributions are closer in terms of total variation distance. With this modification in the subroutine we can prove what is claimed in Theorem 4. The analysis for this case proceeds exactly as above. However, to compare memberships we use Lemma 6 below. Indeed, Lemma 6 can be used in the cases 2 and 5 in lieu of ChernoffHoeffding bounds to obtain the exact same result. Lemma 6. Suppose, C, C ′ ⊆ V , C ∩ C ′ = ∅ and |C| ≥ M, |C ′ | ≥ M = mini f+ (i), mini f− (i) ≥ ǫ for a constant ǫ. Then,   Pr Membership(v, C ′ ) ≥ Membership(v, C) | v ∈ C ≤ 16 log n ǫ∆(f+ ,f− ) , with where 4 . n3 Proof. Let β = kf+ −f2− kT V . If Membership(v, C ′ ) ≥ Membership(v, C) then we must have, kpv,C ′ − pC ′ kT V ≤ kpv,C − pC kT V . This means, either kpv,C ′ − pC ′ kT V ≤ β2 or kpv,C − pC kT V ≥ β2 . Now, using triangle inequality,  Pr kpv,C ′ − pC ′ kT V ≤  ≤ Pr kpv,C ′ − f+ kT V  β β ≤ Pr kpv,C ′ − f+ kT V − kpC ′ − f+ kT V ≤ 2 2    β β ≤ β or kpC ′ − f+ kT V ≥ ≤ Pr kpv,C ′ − f+ kT V ≤ β + Pr kpC ′ − f+ kT V ≥ . 2 2 Similarly,  Pr kpv,C − pC kT V ≥  ≤ Pr kpv,C − f+ kT V  β β ≤ Pr kpv,C − f+ kT V + kpC − f+ kT V ≥ 2 2   β β β β ≥ or kpC − f+ kT V ≥ ≤ Pr kpv,C − f+ kT V ≥ + Pr kpC − f+ kT V ≥ . 4 4 4 4 Now, using Sanov’s theorem (Theorem 9), we have,   Pr kpv,C ′ − f+ kT V ≤ β ≤ (M + 1)q exp(−M min p:kp−f+ kT V ≤β D(pkf− )). At the optimizing p of the exponent, D(pkf− ) ≥ 2kp − f− k2T V from Pinsker’s Inequality (Lemma 2) 2 ≥ 2(kf+ − f− kT V − kp − f+ kT V ) from using triangle inequality 2 ≥ 2(2β − β) kf+ − f− k2T V 2 ǫ ≥ max{D(f+ kf− ), D(f− kf+ )} 2 from noting the value of β = from reverse Pinsker’s inequality (Lemma 3) 13 ǫ∆(f+ , f− ) 4 Again, using Sanov’s theorem (Theorem 9), we have, ≥  Pr kpC ′ − f+ kT V ≥ β ≤ (M + 1)q exp(−M min D(pkf+ )). 2 p:kp−f+ kT V ≥ β2 At the optimizing p of the exponent, D(pkf+ ) ≥ 2kp − f+ k2T V ≥ from Pinsker’s Inequality (Lemma 2) β2 from noting the value of β 2 kf+ − f− k2T V = 8 ǫ ≥ max{D(f+ kf− ), D(f− kf+ )} from reverse Pinsker’s inequality (Lemma 3) 8 ǫ∆(f+ , f− ) ≥ 16 Now substituting this in the exponent, using the value of M and doing the same exercise for the other two probabilities we get the claim of the lemma. 5 Crowd-Cluster with Perfect Oracle: Known f+, f− In this section, we take a closer look at the results presented in Section 4. Recall that, we have an undirected graph G(V ≡ [n], E), such that G is a union of k disjoint cliques Gi (Vi , Ei ), i = 1, . . . , k, but the subsets Vi ∈ [n] and E are unknown to us. The goal is to determine these clusters accurately (with probability 1) by making minimum number of pair-wise queries. As a side information, we are given W which represents the similarity values that are computed by some automated algorithm, and therefore reflects only a noisy version of the true similarities ({0, 1}). Based on the sophistication of the automated algorithm, and the amount of information available to it, the densities f+ and f− will vary. We have provided a lower bound for this in Section 4. In Algorithm 1, we do not know k, f+ , f− , µ+ , or µ− , and our goal was to achieve optimum query complexity for exact reconstruction of the clusters with probability 1. In this section we are going to provide a simpler algorithm that has the knowledge of µ+ , µ− or even f+ , f− , and show that we can achieve optimal query complexity. Let µ+ − µ− ≥ θgap , and we select a parameter M satisfying M= 6 log n . 2 θgap The simpler algorithm, referred to as Algorithm (1-a), contains two phases, that are repeated as long as there are vertices that have not yet been clustered. Querying Phase. The algorithm maintains a list of active clusters which contain at least one vertex but whose current size is strictly less than M . For every v which has not yet been assigned to any cluster, the algorithm checks by querying to the oracle whether v belongs to any of the cluster in the list. If not, it opens a new cluster with v as its sole member, and add that cluster to the list. Estimation Phase. If the size of any cluster, say C in the list becomes M , then the cluster is removed from the list, and the algorithm enters an estimation phase with C. For every vertex v which has not yet been clustered, it computes the average membership score of v in C as θgap 1 P avg(v, C) = |C| u wu,v . If avg(v, C) ≥ µ+ − 2 , then include v in C. After this phase, mark C as final and inactive. 14 Algorithm 1 Crowd-Cluster with Side Information. Input: {V, W } (Note: O is the perfect oracle. ⊲ Initialization. 1: Pick an arbitrary vertex v and create a new cluster {v}. Set V = V \ v 2: while V 6= ∅ do ⊲ Let the number of current clusters be l ≥ 1 3: Order the existing clusters in nonincreasing size. ⊲ Let |C1 | ≥ |C2 | ≥ . . . ≥ |Cl | be the ordering (w.l.o.g). 4: for j = 1 to l do 5: If ∃v ∈ V such that j = maxi∈[1,l] Membership(v, Ci ), then select v and Break; 6: end for 7: O(v, u) where u ∈ Cj 8: if O(v, u) == “ + 1” then 9: Include v in Cj . V = V \ v 10: else ⊲ logarithmic search for membership in the large groups. Note s ≤ ⌈log n⌉ 11: Group C1 , C2 , ..., Cj−1 into s consecutive classes H1 , H2 , ..., Hs such that the clusters 1 | |C1 | , 2i ) in group Hi have their current sizes in the range [ 2|Ci−1 12: for i = 1 to s do 13: j = maxa:Ca ∈Hi Membership(v, Ca ) 14: O(v, u) where u ∈ Cj . 15: if O(v, u) == “ + 1” then 16: Include v in Cj . V = V \ v. Break. 17: end if 18: end for ⊲ exhaustive search for membership in the remaining groups 19: if v ∈ V then 20: for i = 1 to l + 1 do 21: if i = l + 1 then ⊲ v does not belong to any of the existing clusters 22: Create a new cluster {v}. Set V = V \ v 23: else 24: if ∄u ∈ Ci such that (u, v) has already been queried then 25: O(v, u) 26: if O(v, u) == “ + 1” then 27: Include v in Cj . V = V \ v. Break. 28: end if 29: end if 30: end if 31: end for 32: end if 33: end if 34: end while 15 Lemma 7. The total number of queries made by Algorithm (1-a) is at most k2 M . Proof. Suppose, there are k′ clusters of size at least M . The number of queries made in the querying phase to populate these clusters is at most M k′ · k. For the remaining (k − k′ ) clusters, their size is at most (M − 1), and again the number of queries made to populate them is at most (M − 1)(k − k′ ) · k. Hence, the total number of queries made during the querying phases is k2 M . Furthermore, no queries are made during the estimation phases, and we get the desired bound. Lemma 8. Algorithm (1-a) retrieves the original clusters with probability at least 1 − n2 . Proof. Any vertex that is included to an active cluster, must have got a positive answer from a query during the querying phase. Now consider the estimation phase. If u, v ∈ V belong to the same cluster C, then wu,v ∼ f+ , else wu,v ∼ f− . Therefore, E[wu,v | u, v ∈ C] = µ+ and E[wu,v | u ∈ C, v ∈ / C] = µ− . Then, by the Chernoff-Hoeffding bound (Lemma 4),  Pr avg(v, C) < µ+ − And similarly, 2  M θgap 1 θgap |v ∈ C ≤ e− 2 ≤ 3 . 2 n  M θ2 1 θgap − 2gap | v 6∈ C ≤ e ≤ 3. Pr avg(v, C) > µ− + 2 n Therefore by union bound, for every vertex that is included in C during the estimation phase truly belongs to it, and any vertex that is not included in C truly does not belong to it with probability ≥ 1− n22 . Or, the probability that the cluster C is not correctly constructed is at most 2 n2 . Since, there could be at most n clusters, the probability that there exists one incorrectly constructed cluster is at most n2 . Note that, any cluster that never enters the estimation phase is always constructed correctly, and any cluster that enters the estimation phase is fully constructed before moving to a new unclustered vertex. Therefore, if a new cluster is formed in the querying phase with v, then v cannot be included to any existing clusters assuming the clusters grown in the estimation phases are correct. Hence, Algorithm (1-a) correctly retrieves the clusters with probability at least 1 − n2 .  So far, Algorithm (1-a) has been a Monte Carlo algorithm. In order to turn it into a Las Vegas algorithm, we make the following modifications. θ • In the estimation phase with cluster C, if avg (v, C) ≥ µ+ − gap 2 , then we query v with some member of C. If that returns +1 (i.e., the edge is present), then we include v, else, we query v with one member of every remaining clusters (active and inactive). If none of these queries returns +1, then a singleton cluster with v is created, and included in the active list. We then proceed to the next vertex in the estimation phase. Clearly, this modified Algorithm (1-a) retrieves all clusters correctly and it is a Las Vegas algorithm. We now analyze the expected number of queries made by the algorithm in the estimation phase. Lemma 9. The modified Las Vegas Algorithm (1-a) makes at most n + 2 queries on expectation during the estimation phase. Proof. In the estimation phase, only 1 query is made with v while determining its membership if indeed v belongs to cluster C when avg (v, C) ≥ µ+ − θgap 2 . Now this happens with probability at least 1 − n22 . With the remaining probability, at most (k − 1) ≤ n extra queries may be made with v. At the end of this, either v is included in a cluster, or a new singleton cluster is formed with v. Therefore, the expected number of queries made with v, at the end of which the membership of v is determined is at most 1 + 2(k−1) n2 . Hence the expected number of total queries made by Algorithm (1-a) in the estimation phase is at most n + 2. 16 Theorem 10. With known µ+ and µ− , there exist a Monte Carlo algorithm for Crowd2 log n Cluster with query complexity O( (µk+ −µ 2 ) and a Las Vegas algorithm with expected query com−) plexity O(n + k 2 log n (µ+ −µ− )2 ). Comparing with the Lower Bound. Example 1. The KL-divergence between two univariate normal distributions with means µ1 and µ2 , and standard deviations σ1 and σ2 respectively can be calculated as  σ12 +(µ1 −µ2 )2 σ1 D(N (µ1 , σ1 )kN (µ2 , σ2 )) = log σ2 + − 12 . Therefore ∆(f+ , f− ) = (µ+ − µ− )2 . 2σ2 2 Algorithm (1-a) is optimal under these natural distributions within a log n factor. Example 2. f− (x) = ( (1 + ǫ) (1 − ǫ) if 0 ≤ x < 12 if 1 ≥ x ≥ 12 ; f+ (x) = ( (1 − ǫ) (1 + ǫ) if 0 ≤ x < 12 if 1 ≥ x ≥ 12 . That is, they are derived by perturbing the uniform distribution slightly so that f+ puts slightly higher mass when x ≥ 12 , and f− puts slightly higher mass when x < 21 . R 1/2 1 (1 − ǫ) dx = 1. Similarly, 01 f+ (x) dx = 1, that Note that 01 f− (x) dx = 0 (1 + ǫ) dx + 1/2 is they represent valid probability density functions. We have Z 1 2−ǫ 1 ǫ (1 + ǫ) 3(1 − ǫ) + = = − xf− (x) dx = µ− = 8 8 4 2 4 0 and Z 1 2+ǫ 1 ǫ (1 − ǫ) 3(1 + ǫ) + = = + . µ+ = xf+ (x) dx = 8 8 4 2 4 0 R R R Thereby, µ+ − µ− = 2ǫ . Moreover D(f+ kf− ) = Z 0 1/2 (1 − ǫ) log 1−ǫ dx + 1+ǫ Z 1 (1 + ǫ) log 1/2 1+ǫ 1+ǫ dx = ǫ log = O(ǫ2 ) 1−ǫ 1−ǫ Therefore, again Algorithm (1-a) is optimal under these distributions within a log n factor. Improving Algorithm (1-a) to match the lower bound. We will now show a way to achieve the lower bound in the Crowd-Cluster up to a logarithmic term (while matching the denominator) by modifying Algorithm (1-a). We first do this by assuming f+ , f− to be discrete distributions over q points a1 , a2 , . . . , aq . So, wi,j takes value in the set {a1 , a2 , . . . , aq }. Theorem 11. With known f+ and f− such that mini f+ (i), mini f− (i) ≥ ǫ for a constant ǫ, k 2 log n ) and a there exist a Monte Carlo algorithm for Crowd-Cluster with query complexity O( ∆(f + ,f− ) Las Vegas algorithm with expected query complexity O(n + k 2 log n ∆(f+ ,f− ) ). Indeed, either of mini f− (i) or mini f+ (i) strictly greater than 0 will serve our purpose. We have argued before that it is not so restrictive condition. Proof of Theorem 11. For any vertex v and a cluster C, define the empirical distribution pv,C in the following way. For, i = 1, . . . , q, pv,C (i) = 1 · |{u : wu,v = ai }|. |C| 17 Now modify Algorithm (1-a) as follows. The querying phase of the algorithm remains exactly same. In the estimation phase for a cluster C and an unassigned vertex v, include v in C if D(pv,C kf+ ) < D(pv,C kf− ). Everything else remains same. Now, a vertex v ∈ C will be erroneously not assigned to it with probability     Pr D(pv,C kf+ ) ≥ D(pv,C kf− ) | v ∈ C = f+ {pv,C : D(pv,C kf+ ) ≥ D(pv,C kf− )} = (M + 1)q exp(−M min p:D(pkf+ )≥D(pkf− ) D(pkf+ )), where in the last step we have used Sanov’s theorem (see, Theorem 9). Due to lemma 10, we can replace the constraint of the optimization in the exponent above by an equality. Hence,   Pr D(pv,C kf+ ) ≥ D(pv,C kf− ) | v ∈ C ≤ (M + 1)q+1 exp(−M whenever min D(pkf+ )) ≤ p:D(pkf+ )=D(pkf− ) 1 , n3 8 log n . min D(pkf+ ) M= p:D(pkf+ )=D(pkf− ) This value of M is also sufficient to have,   Pr D(pv,C kf+ ) < D(pv,C kf− ) | v ∈ /C ≤ 1 . n3 While the rest of the analysis stays same as before, the overall query complexity of this modified algorithm is   k2 log n O . min D(pkf+ ) p:D(pkf+ )=D(pkf− ) If the divergence were a distance then in the denominator above we would have got D(f+ kf− )/2 and that would be same as the lower bound we have obtained. However, since that is not the case, we rely on the following chain of inequalities instead at the optimizing point of p. D(pkf+ ) + D(pkf− ) ≥ kp − f+ k2T V + kp − f− k2T V 2 + kp − f− kT V )2 kf+ − f− k2T V ≥ , 2 2 D(pkf+ ) = D(pkf− ) = ≥ (kp − f+ kT V where we have used the Pinsker’s inequality (Lemma 2), the convexity of the function x2 and the triangle inequality for the total variation distance respectively. Now as the last step we use the reverse Pinsker’s inequality (Lemma 3) to obtain, kf+ − f− k2T V ≥ ǫ ǫ∆(f+ , f− ) max{D(f+ kf− ), D(f− kf+ )} ≥ . 2 2 This completes the proof. Lemma 10. min p:D(pkf+ )≥D(pkf− ) D(pkf+ ) = 18 min D(pkf+ ). p:D(pkf+ )=D(pkf− ) Proof. Since the condition D(pkf+ ) ≥ D(pkf− ) can be written as to solve the constrained optimization P f− (i) i p(i) ln f+ (i) min D(pkf+ ) p such that X i p(i) ln f− (i) ≥ 0. f+ (i) ≥ 0 we need (3) (4) We claim that the inequality of (4) can be replaced by an equality without any change in the optimizing value. Suppose this is not true and the optimizing value p̃ is such that P f− (i) i p̃(i) ln f+ (i) = ǫ > 0. Let, λ = ǫ+D(fǫ− kf+ ) ∈ (0, 1). Note that for the value p∗ = λf+ + (1 − λ)p̃ we have, s X p∗ (i) ln i f− (i) = −λD(f+ kf− ) + (1 − λ)ǫ = 0. f+ (i) However, since D(pkf+ ) is a strictly convex function of p, we must have, D(p∗ kf+ ) < λD(f+ kf+ ) + (1 − λ)D(p̃kf+ ) = (1 − λ)D(p̃kf+ ), which is a contradiction of p̃ being the optimizing value. 6 Crowd-Cluster with Faulty Oracle We now consider the case when crowd may return erroneous answers. We do not allow resampling of the same query. By resampling one can always get correct answer for each query with high probability followed by which we can simply apply the algorithms for the perfect oracle. Hence, the oracle can be queried with a particular tuple only once in our setting. 6.1 6.1.1 No Side Information Lower bound for the faulty-oracle model Suppose, G(V, E) is a union of k disjoint cliques as before. We have, V = ⊔ki=1 Vi . We consider the following faulty-oracle model. We can query the oracle whether there exists an edge between vertex i and j. The oracle will give the correct answer with probability 1 − p and will give the incorrect answer with probability p. We would like to estimate the minimum number of queries one must make to the oracle so that we can recover the clusters with high probability. In this section we forbid the use of any side information that may be obtained from an automated system. The main goal of this section is to prove Theorem 2. As argued in the introduction, there is a need for a minimum cluster size. If there is no minimum size requirement on a cluster then the input graph can always consist of multiple clusters of very small size. Then consider the following two different clusterings. C1 : V = k−2 k−2 ⊔i=1 Vi ⊔ {v1 , v2 } ⊔ {v3 } and C2 : V = ⊔i=1 Vi ⊔ {v1 } ⊔ {v2 , v3 }. Now if one of these two clusterings are given to us uniformly at random, no matter how many queries we do, we will fail to recover the correct cluster with probability at least p (recall that, resampling is not allowed). The argument above does not hold for the case when p = 0. In that case any (randomized) algorithm has to use (on expectation) O(nk) queries for correct clustering (see the p = 0 case of Theorem 2 below). While for deterministic algorithm the proof of the above fact is straightforward, for randomized algorithms it was established in [22]. In [22], a clustering was called balanced if the minimum and maximum sizes of the clusters are only a constant factor way. In 19 particular, [22] observes that, for unbalanced input the lower bound for p = 0 case is easier. For randomized algorithms and balanced inputs, they left the lower bound as an open problem. Theorem 2 resolves this as a special case. Indeed, in Theorem 2, we provide lower bounds for 0 ≤ p < 1/2, assuming inputs such that either 1) the maximum size of the cluster is within a constant times away from the average size, or 2) the minimum size of the cluster is a constant fraction of the average size. Note that the average size of a cluster is nk . The technique to prove Theorem 2 is similar to the one we have used in Theorem 1. However we only handle binary random variables here (the answer to the queries). The significant difference is that, while designing the input we consider a balanced clustering with small sized clusters we can always fool any algorithm as exemplified above). This removes the constraint on the algorithm designer on how many times a cluster can be queried with a vertex. While Lemma 11 shows that enough number of queries must be made with a large number of vertices V ′ ⊂ V , either of the conditions on minimum or maximum sizes of a cluster ensures that V ′ contains enough vertices that do not satisfy this query requirement. As mentioned, Lemma 11 is crucial to prove Theorem 2. Lemma 11. Suppose, there are k clusters. There exist at least 4k 5 clusters such that a vertex v from any one of these clusters will be assigned to a wrong cluster by any randomized algorithm k with positive probability unless the number of queries involving v is more than 10D(pk1−p) when p > 0 and k 10 when p = 0. Proof. Let us assume that the k clusters are already formed, and we can moreover assume that all vertices except for the said vertex has already been assigned to a cluster. Note that, queries that do not involve the said vertex plays no role in this stage. Now the problem reduces to a hypothesis testing problem where the ith hypothesis Hi for i = 1, . . . , k, denote that the true cluster is Vi . We can also add a null-hypothesis H0 that stands for the vertex belonging to none of the clusters. Let Pi denote the joint probability distribution of our observations (the answers to the queries involving vertex v) when Hi is true, i = 0, 1, . . . , k. That is for any event A we have, Pi (A) = Pr(A|Hi ). Suppose Q denotes the total number of queries made by a (possibly randomized) algorithm at this stage. Let the random variable Qi denote the number of queries involving cluster Vi , i = 1, . . . , k. P We must have, ki=1 E0 Qi ≤ Q. Let, J1 ≡ {i ∈ {1, . . . , k} : E0 Qi ≤ 10Q }. k 9k Since, (k − |J1 |) 10Q k ≤ Q, we have |J1 | ≥ 10 . Let Ei ≡ { the algorithm outputs cluster Vi }. Let J2 = {i ∈ {1, . . . , n} : P0 (Ei ) ≤ 10 }. k 9k Moreover, since ki=1 P0 (Ei ) ≤ 1 we must have, (k − |J2 |) 10 k ≤ 1, or |J2 | ≥ 10 . Therefore, J = J1 ∩ J2 has size, 4k 9k −k = . |J| ≥ 2 · 10 5 Now let us assume that, we are given a vertex v ∈ Vj for some j ∈ J to cluster. The probability of correct clustering is Pj (Ej ). We must have, P Pj (Ej ) = P0 (Ej ) + Pj (Ej ) − P0 (Ej ) ≤ 20 10 + |P0 (Ej ) − Pj (Ej )| k 10 10 ≤ + kP0 − Pj kT V ≤ + k k r 1 D(P0 kPj ). 2 where we again used the definition of the total variation distance and in the last step we have used the Pinsker’s inequality (lemma 2). The task is now to bound the divergence D(P0 kPj ). Recall that P0 and Pj are the joint distributions of the independent random variables (answers to queries) that are identical to one of two Bernoulli random variables:Y , which is Bernoulli(p), or Z, which is Bernoulli(1 − p). Let X1 , . . . , XQ denote the outputs of the queries, all independent random variables. We must have, from the chain rule (lemma 1), D(P0 kPj ) = = Q X i=1 Q X D(P0 (xi |x1 , . . . , xi−1 )kPj (xi |x1 , . . . , xi−1 )) X i=1 (x1 ,...,xi−1 )∈{0,1}i−1 P0 (x1 , . . . , xi−1 )D(P0 (xi |x1 , . . . , xi−1 )kPj (xi |x1 , . . . , xi−1 )). Note that, for the random variable Xi , the term D(P0 (xi |x1 , . . . , xi−1 )kPj (xi |x1 , . . . , xi−1 )) will contribute to D(pk1 − p) only when the query involves the cluster Vj . Otherwise the term will contribute to 0. Hence, D(P0 kPj ) = Q X X i=1 (x1 ,...,xi−1 )∈{0,1}i−1 :ith query involves Vj = D(pk1 − p) Q X = D(pk1 − p) Q X P0 (x1 , . . . , xi−1 )D(pk1 − p) X P0 (x1 , . . . , xi−1 ) i=1 (x1 ,...,xi−1 )∈{0,1}i−1 :ith query involves Vj i=1 P0 (ith query involves Vj ) = D(pk1 − p)E0 Qj ≤ 10Q D(pk1 − p). k Now plugging this in, 10 + D(P0 kPj ) ≤ k if Q ≤ 10Q k k 10D(pk1−p) . s 10 1 10Q D(pk1 − p) ≤ + 2 k k r 1 , 2 On the other hand, when p = 0, Pj (Ej ) < 1 when E0 Qj < 1. Therefore ≥ 1 whenever p = 0. Now we are ready to prove Theorem 2. Proof of Theorem 2. We will show that claim by considering any input, with a restriction on either the maximum or the minimum cluster size. We consider the following two cases for the proof. Case 1: the maximum size of a cluster is ≤ 4n k . Suppose, total number of queries is = T . That means number of vertices involved in the queries is ≤ 2T . Note that, there are k clusters and n elements. Let U be the set of vertices that are involved in less than 16T n queries. Clearly, (n − |U |) 16T ≤ 2T, n or |U | ≥ 7n . 8 Now we know from Lemma 11 that there exists 4k 5 clusters such that a vertex v from any one of these clusters will be assigned to a wrong cluster by any randomized algorithm with positive 21 probability unless the expected number of queries involving this vertex is more than k 10D(pk1−p) , k for p > 0, and 10 when p = 0. We claim that U must have an intersection with at least one of these 4k 5 clusters. If not, 7n 4k k then more than 8 vertices must belong to less than k − 5 = 5 clusters. Or the maximum size 4n of a cluster will be 7n·5 8k > k , which is prohibited according to our assumption. Consider the case, p > 0. Now each vertex in the intersection of U and the 4k 5 clusters k are going to be assigned to an incorrect cluster with positive probability if, 16T ≤ n 10D(pk1−p) . Therefore we must have nk . T ≥ 160D(pk1 − p) Similarly, when p = 0 we must have, T ≥ nk 160 . n . Case 2: the minimum size of a cluster is ≥ 20k ′ Let U be the set of clusters that are involved in at most 16T k queries. That means, (k − 16T 7k ′ ′ |U |) k ≤ 2T. This implies, |U | ≥ 8 . ∗ Now we know from lemma 11 that there exists 4k 5 clusters (say U ) such that a vertex v from any one of these clusters will be assigned to a wrong cluster by any randomized algorithm with positive probability unless the expected number of queries involving this vertex is more k k , p > 0 and 10 for p = 0. than 10D(pk1−p) 4k 27k Quite clearly |U ∗ ∩ U | ≥ 7k 8 + 5 − k = 40 . ∗ Consider a cluster Vi such that i ∈ U ∩ U , which is always possible because the intersection is nonempty. Vi is involved in at most 16T k queries. Let the minimum size of any cluster be t. Now, at least half of the vertices of Vi must each be involved in at most 32T kt queries. Now each k of these vertices must be involved in at least 10D(pk1−p) queries (see Lemma 11) to avoid being assigned to a wrong cluster with positive probability (for the case of p = 0 this number would k ). be 10 This means,   nk k 32T ≥ , or T = Ω , kt 10D(pk1 − p) D(pk1 − p) for p > 0, since t ≥ 6.1.2 n 20k . Similarly when p = 0 we need T = Ω(nk). Upper Bound Now we provide an algorithm to retrieve the clustering with the help of the faulty oracle when no side information is present. The algorithm is summarized in Algorithm 2. The algorithm works as follows. It maintains an active list of clusters A, and a sample graph G′ = (V ′ , E ′ ) which is an induced subgraph of G. Initially, both of them are empty. The algorithm always maintains the invariant that any cluster in A has at least c log n members where c = λ62 , and p = 21 − λ. Note that the algorithm knows λ. Furthermore, all V ′ (G′ ) × V ′ (G′ ) queries have been made. Now, when a vertex v is considered by the algorithm (step 3), first we check if v can be included in any of the clusters in A. This is done by picking c log n distinct members from each cluster, and querying v with them. If majority of these questions return +1, then v is included in that cluster, and we proceed to the next vertex. Otherwise, if v cannot be included in any of the clusters in A, then we add it to V ′ (G′ ), and ask all possible queries to the rest of the vertices in G′ with v. Once G′ has been modified, we extract the heaviest weight subgraph from G′ where weight on an edge (u, v) ∈ E(G′ ) is defined as ωu,v = +1 if the query answer for that edge is +1 and −1 otherwise. If that subgraph contains c log n members then we include it as a cluster in A. At that time, we also check whether any other vertex u in G′ can join this newly formed cluster by counting if the majority of the (already) queried edges to 22 this new cluster gave answer +1. At the end, all the clusters in A, and the maximum likelihood clustering from G′ is returned. Before showing the correctness of Algorithm 2, we elaborate on finding the maximum likelihood estimate for the clusters in G. Finding the Maximum Likelihood Clustering of G with faulty oracle We have an undirected graph G(V ≡ [n], E), such that G is a union of k disjoint cliques Gi (Vi , Ei ), i = 1, . . . , k. The subsets Vi ∈ [n] are unknown to us. The adjacency matrix of G is a block-diagonal matrix. Let us denote this matrix by A = (ai,j ). Now suppose, each edge of G is erased independently with probability p, and at the same time each non-edge is replaced with an edge with probability p. Let the resultant adjacency matrix of the modified graph be Z = (zi,j ). The aim is to recover A from Z. The maximum likelihood recovery is given by the following: max Sℓ ,ℓ=1,···:V =⊔ℓ Sℓ = max Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ Y Y Y Y Y P+ (zi,j ) r,t,r6=t i∈Sr ,j∈St ℓ i,j∈Sℓ ,i6=j ℓ i,j∈Sℓ ,i6=j Y P− (zi,j ) P+ (zi,j ) Y P− (zi,j ). P− (zi,j ) i,j∈V,i6=j where, P+ (1) = 1 − p, P+ (0) = p, P− (1) = p, P− (0) = 1 − p. Hence, the ML recovery asks for, max Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ X X ln ℓ i,j∈Sℓ ,i6=j P+ (zi,j ) . P− (zi,j ) Note that, ln Hence the ML estimation is, P+ (0) P+ (1) p = − ln = ln . P− (0) P− (1) 1−p max Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ X X ωi,j , (5) ℓ i,j∈Sℓ ,i6=j where ωi,j = 2zi,j − 1, i 6= j, i.e., ωi,j = 1, when zi,j = 1 and ωi,j = −1 when zi,j = 0, i 6= j. Further ωi,i = zi,i = 0, i = 1, . . . , n. Note that (5) is equivalent to finding correlation clustering in G with the objective of maximizing the consistency with the edge labels, that is we want to maximize the total number of positive intra-cluster edges and total number of negative inter-cluster edges [8, 44, 42]. This can be seen as follows. max Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ X X ωi,j ℓ i,j∈Sℓ ,i6=j ≡ Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ = max max Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ X X ℓ i,j∈Sℓ ,i6=j X X  (i, j) : ωi,j = +1 − (i, j) : ωi,j = −1 + (i, j) : ωi,j = +1 + ℓ i,j∈Sℓ ,i6=j  X r,t:r6=t X i,j∈V,i6=j (i, j) : ωi,j = −1  (i, j) : i ∈ Sr , j ∈ St , ωi,j = −1 . Therefore (5) is same as correlation clustering, however viewing it as obtaining clusters with maximum intra-cluster weight helps us to obtain the desired running time of our algorithm. Also, note that, we have a random instance of correlation clustering here, and not a worst case instance. We are now ready to prove the correctness of Algorithm 2. 23 Algorithm 2 Crowd-Cluster with Error & No Side Information. Input: {V } 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: V ′ = ∅, E ′ = ∅, G′ = (V ′ , E ′ ) A=∅ while ∃v ∈ V yet to be clustered do for each cluster C ∈ A do ⊲ Set c = λ62 where λ ≡ 12 − p. Select u1 , u2 , .., ul , where l = c log n, distinct members from C and obtain Op (ui , v), i = 1, 2, .., l. If the majority of these queries return +, then include v in C. Break. end for if v is not included in any cluster in A then Add v to V ′ . For every u ∈ V ′ \ v, obtain Op (v, u). Add an edge (v, u) to E ′ (G′ ) with weight ωu,v = +1 if Op (u, v) == +1, else with ωu,v = −1 Find the heaviest weight subgraph S in G′ . If |S| ≥ c log n, then add S to the list of clusters in A, and remove the incident vertices and edges on S from V ′ , E ′ . P while ∃z ∈ V ′ with u∈S ωz,u > 0 do Include z in S and remove z and all edges incident on it from V ′ , E ′ . end while end if end while return all the clusters formed in A and the ML estimates from G′ Correctness of Algorithm 2 To establish the correctness of Algorithm 2, we show the  following. Suppose all n2 queries on V × V have been made. If the Maximum Likelihood (ML)  estimate of G with these n2 answers is same as the true clustering of G, then Algorithm 2 finds the true clustering with high probability. There are few steps to prove the correctness. The first step is to show that any set S that is retrieved in step 9 of Algorithm 2 from G′ , and added to A is a subcluster of G (Lemma 12). This establishes that all clusters in A at any time are subclusters of some original cluster in G. Next, we show that vertices that are added to a cluster in A, are added correctly, and no two clusters in A can be merged (Lemma 13). Therefore, clusters obtained from A, are the true clusters. Finally, the remaining of the clusters can be retrieved from G′ by computing a ML estimate on G′ in step 15, leading to theorem 12. Lemma 12. Let c′ = 6c = λ362 , where λ = 12 − p. Algorithm 2 in step 9 returns a subcluster of G of size at least c log n with high probability if G′ contains a subcluster of G of size at least c′ log n. Moreover, Algorithm 2 in step 9 does not return any set of vertices of size at least c log n if G′ does not contain a subcluster of G of size at least c log n. Proof. Let V ′ = Vi′ , i ∈ [1, k], Vi′ ∩ Vj′ = ∅ for i 6= j, and Vi′ ⊆ Vi (G). Suppose without loss of generality |V1′ | ≥ |V2′ | ≥ .... ≥ |Vk′ |. The lemma is proved via a series of claims. S Claim 1. Let |V1′ | ≥ c′ log n. Then in step 9, a set S ⊆ Vi for some i ∈ [1, k] will be returned with size at least c log n with high probability. For an i : |Vi′ | ≥ c′ log n, we have E X s,t∈Vi′ ,s<t ωs,t ! ! |Vi′ | |Vi′ | = ((1 − p) − p) = (1 − 2p) . 2 2 Since ωs,t are independent binary random variables, using the Hoeffding’s inequality (Lemma 24 4), Pr  X s,t∈Vi′ ,s<t ωs,t ≤ E −  X ωs,t − u ≤ e s,t∈Vi′ ,s<t ( 2 u2 |V ′ | i 2 ). Hence, Pr  X s,t∈Vi′ ,s<t ωs,t > (1 − δ)E Therefore with high probability c′2 3 (1 2 P X s,t∈Vi′ ,s<t s,t∈Vi′ ,s<t ωs,t  ωs,t ≥ 1 − e− > (1 − δ)(1 − 2p) 1 3 ). − 2p) log n, for an appropriately chosen δ (say δ = δ 2 (1−2p)2 2 |Vi′ | 2 (define c′′ = c′ q 2(1−2p) ) 3 with high probability - since otherwise X c′ ωi,j < i,j∈S,i<j q 2(1−2p) 3 ! log n 2 < . ≥ (1 − δ)(1 − 2p) c′ So, Algorithm 2 in step (9) must return a set S such that |S| ≥ ′ (|V2i |) q 2(1−2p) 3 c′ log n 2 > log n = c′′ log n c′2 (1 − 2p) log2 n. 3 Now let S * Vi for any i. Then S must have intersection with at least 2 clusters. Let Vi ∩ S = Ci and let j ∗ = arg mini:Ci 6=∅ |Ci |. We claim that, X X ωi,j < i,j∈S,i<j ωi,j , (6) i,j∈S\Cj ∗ ,i<j with high probability. Condition (6) is equivalent to, X X ωi,j + i,j∈Cj ∗ ,i<j ωi,j < 0. i∈Cj ∗ ,j∈S\Cj ∗ However this is true because, 1. E  P i,j∈Cj ∗ ,i<j ωi,j = (1−2p) |Cj ∗ | 2 and E  P i∈Cj ∗ ,j∈S\Cj ∗ ωi,j = −(1−2p)|Cj ∗ |·|S\Cj ∗ |. √ 2. As long as |Cj ∗ | ≥ 2 log n we have, from Hoeffding’s inequality (Lemma 4), Pr  X ωi,j i,j∈Cj ∗ ,i<j |C ∗ | λ2 (1−2p)2 ( j ) |Cj ∗ |  2 − 2 = on (1). ≥ (1 + λ)(1 − 2p) ≤e 2 ! While at the same time, Pr  X i∈Cj ∗ ,j∈S\Cj ∗  ωi,j ≥ −(1 − λ)(1 − 2p)|Cj ∗ | · |S \ Cj ∗ | ≤ e− λ2 (1−2p)2 |Cj ∗ |·|S\Cj ∗ | In this case of course with high probability X i,j∈Cj ∗ ,i<j ωi,j + X i∈Cj ∗ ,j∈S\Cj ∗ 25 ωi,j < 0. 2 = on (1). √ 3. When |Cj ∗ | < 2 log n, we have, X i,j∈Cj ∗ ,i<j ωi,j ≤ ! |Cj ∗ | ≤ 2 log2 n. 2 While at the same time, Pr  X i∈Cj ∗ ,j∈S\Cj ∗  ωi,j ≤ (1 − λ)(1 − 2p)|Cj ∗ | · |S \ Cj ∗ | ≤ e− λ2 (1−2p)2 |Cj ∗ |·|S\Cj ∗ | 2 = on (1). Hence, even in this case, with high probability, X i,j∈Cj ∗ ,i<j ωi,j + X ωi,j < 0. i∈Cj ∗ ,j∈S\Cj ∗ Hence (6) is true with high probability. But then the algorithm 2 in step 9 would not return S, but will return S \ Cj ∗ . Hence, we have run into a contradiction. This means S ⊆ Vi for some Vi . q log n, while |V1′ | ≥ c′ log n. In fact, with high probability, |S| ≥ We know |S| ≥ c′ 2(1−2p) 3 (1−δ) ′ 2 c log n. Since all the vertices in S belong to the same cluster in G, this holds again by the application of Hoeffding’s inequality. Otherwise, the probability that the weight of S is at least as high as the weight of V1′ is at most n12 . Claim 2. If |V1′ | < c log n. then in step 9 of Algorithm 2, no subset of size > c log n will be returned. If Algorithm 2 in step 9 returns a set S with |S| > c log n then S must have intersection with at least 2 clusters in G. Now following the same argument as in Claim 1 to establish Eq. (6), we arrive to a contradiction, and S cannot be returned. This establishes the lemma. Lemma 13. The collection A contains all the true clusters of G of size ≥ c′ log n at the end of Algorithm 2 with high probability. Proof. From Lemma 12, any cluster that is computed in step 9 and added to A is a subset of some original cluster in G, and has size at least c log n with high probability. Moreover, whenever G′ contains a subcluster of G of size at least c′ log n, it is retrieved by our Algorithm and added to A. A vertex v is added to a cluster in A either is step 5 or step 11. Suppose, v has been added to some cluster C ∈ A. Then in both the cases, |C| ≥ c log n at the time v is added, and there exist l = c log n distinct members of C, say, u1 , u2 , .., ul such that majority of the queries of v with these vertices returned +1. By the standard Chernoff-Hoeffding bound (Lemma 2 2λ2 λ2 4), Pr(v ∈ / C) ≤ exp(−c log n (1−2p) 12p ) = exp(−c log n 3(1+2λ) ) ≤ exp(−c log n 3 ), where the last inequality followed since λ < 21 . On the other hand, if there exists a cluster C ∈ A such that v ∈ C, and v has already been considered by the algorithm, then either in step 5 or step 11, v will be added to C. This again follows by the Chernoff-Hoeffding bound, as 2 λ2 λ2 Pr(v not included in C | v ∈ C) ≤ exp(−c log n (1−2p) 8(1−p) ) = exp(−c log n 1+2λ ) ≤ exp(−c log n 2 ). Therefore, if we set c = λ62 , then for all v, if v is included in a cluster in A, the assignment is correct with probability at least 1 − n2 . Also, the assignment happens as soon as such a cluster is formed in A. Furthermore, two clusters in A cannot be merged. Suppose, if possible there are two clusters C1 and C2 both of which are proper subset of some original cluster in G. Let without loss of generality C2 is added later in A. Consider the first vertex v ∈ C2 that is considered by our 26 Algorithm 2 in step 3. If C1 is already there in A at that time, then with high probability v will be added to C1 in step 5. Therefore, C1 must have been added to A after v has been considered by our algorithm and added to G′ . Now, at the time C1 is added to A in step 9, v ∈ V ′ , and again v will be added to C1 with high probability in step 11–thereby giving a contradiction. This completes the proof of the lemma. All this leads us to the following theorem. Theorem 12. If the ML estimate on G with all possible n2 queries return the true clustering, then Algorithm 2 returns the true clusters with high probability. Moreover, Algorithm 2 returns all the true clusters of G of size at least c′ log n with high probability.  Proof. From Lemma 12 and Lemma 13, A contains all the true clusters of G of size at least c′ log n with high probability. Any vertex that is not included in the clusters in A at the end of Algorithm 2 are in G′ , and G′ contains all possible pairwise queries among them. Clearly, then the ML estimate of G′ will be the true ML estimate of G restricted to these clusters. Query Complexity of Algorithm 2 1 2 ′ k Lemma 14. Let p = − λ. The query complexity of Algorithm 2 is 36nk log n . λ2 Proof. Let there be clusters in A when v is considered in step 3 of Algorithm 2. Then v is queried with at most ck′ log n current members, c log n each from these k′ clusters. If the membership of v does not get determined then v is queried with all the vertices in G′ . We have seen in the correctness proof (Lemma 12) that if G′ contains at least c′ log n vertices from any original cluster, then ML estimate on G′ retrieves those vertices as a cluster in step 9 with high probability. Hence, when v is queried with all vertices in G′ , |V ′ | ≤ (k − k′ )c′ log n. Thus the total number of queries made to determine the membership of v is at most c′ k log n, where c′ = 6c = λ362 when the error probability p = 12 −λ. This gives the query complexity of Algorithm 2 considering all the vertices. This matches the lower bound computed in Section 6.1.1 within a log n factor, since D(pk1− 1/2+λ 2λ 4λ2 2 p) = (1 − 2p) ln 1−p p = 2λ ln 1/2−λ = 2λ ln(1 + 1/2−λ ) ≤ 1/2−λ = O(λ ). Now combining all these we get the statement of Theorem 5. Theorem (5). Faulty Oracle with No Side Information. There exists an algorithm with query  complexity O( λ12 nk log n) for Crowd-Cluster that returns Ĝ, ML estimate of G with all n2 queries, with high probability when query answers are incorrect with probability p = 12 − λ. Noting that, 4λ2 D(pk1− p) ≤ 1/2−λ , this matches the information theoretic lower bound on the query complexity within a log n factor. Moreover, the algorithm returns all the true clusters of G of size at least 36 λ2 log n with high probability. Running Time of Algorithm 2 and Further Discussions In step 9 of Algorithm 2, we need to find a large cluster of size at least O( λ12 log n) of the original input G from G′ . By Lemma 12, if we can extract the heaviest weight subgraph in G′ where edges are labelled ±1, and that subgraph meets the required size bound, then with high probability, it is a subset of 1 an original cluster. This subset can of course be computed in O(n λ2 log n ) time. Since size of 1 G′ is bounded by O( λk2 log n), the running time is O([ λk2 log n] λ2 log n ). While, query complexity is independent of running time, it is unlikely that this running time can be improved to a polynomial. This follows from the planted clique conjecture. Conjecture 1 (Planted Clique Hardness). Given an Erdős-Rényi random graph G(n, p), with p = 12 , the planted clique conjecture states that if we plant in G(n, p) a clique of size t where √ t = [O(log n), o( n)], then there exists no polynomial time algorithm to recover the largest clique in this planted model. 27 Given such a graph with a planted clique of size t = Θ(log n), we can construct a new graph H by randomly deleting each edge with probability 13 . Then in H, there is one cluster of size t where edge error probability is 31 and the remaining clusters are singleton with inter-cluster edge error probability being (1 − 12 − 61 ) = 31 . So, if we can detect the heaviest weight subgraph in polynomial time in Algorithm 2, there will be a polynomial time algorithm for the planted clique problem. Polynomial time algorithm We can reduce the running time from quasi-polynomial to polynomial, by paying higher in the query-complexity. Suppose, we accept a subgraph extracted from G′ as valid and add it to A iff its size is Ω(k). Then note that since G′ can contain at most k2 vertices, such a subgraph can be obtained in polynomial time following the algorithm √ of correlation clustering with noisy input [44], where all the clusters of size at least O( n) are recovered on a n-vertex graph. Since our ML estimate is correlation clustering, we can employ [44]. For k ≥ λ12 log n, the entire analysis remains valid, and we get a query complexity of 1 1 Õ(nk2 ) as opposed to O( nk λ2 ). If k < λ2 log n, then clusters that have size less than λ2 log n are anyway not recoverable. Note that, any cluster that has size less than k are not recovered in √ √ this process, and this bound only makes sense when k < n. When k ≥ n, we can however √ recover all clusters of size at least O( n). Corollary (2). There exists a polynomial time algorithm with query complexity O( λ12 nk2 ) for Crowd-Cluster when query answers are incorrect with probability 12 −λ, which recovers all clusters of size at least O(max { λ12 log n, k}) in G. This also leads to an improved algorithm for correlation clustering over noisy graph. Pre√ viously, the works of [44, 8] can only recover cluster of size at least O( n). However, now if √ n k ∈ [Ω( log λ2 ), o( n)], using this algorithm, we can recover all clusters of size at least k. 6.1.3 With Side Information The algorithm for Crowd-Cluster with side information when crowd may return erroneous answers is a direct combination of Algorithm 1 and Algorithm 2. We assume side information is less accurate than querying because otherwise, querying is not useful. Or in other words ∆(fg , fr ) < ∆(p, 1 − p). We therefore use only the queried answers to extract the heaviest subgraph from G′ , and add that to the list A. For the clusters in list A, we follow the strategy of Algorithm 1 to recover the underlying clusters. The pseudocode is given in Algorithm 3. The correctness of the algorithm follows directly from the analysis of Algorithm 1 and Algorithm 2. We now analyze the query complexity. Consider a vertex v which needs to be included in a cluster. Let there be (r − 1) other vertices from the same cluster as v that have been considered by the algorithm prior to v. 1. Case 1. r ∈ [1, c log n], the number of queries is at most kc log n. In that case v is added to G′ according to Algorithm 2. 2. Case 2. r ∈ (c log n, 2M ], the number of queries can be k ∗ c log n. In that case, the cluster n ). In that v belongs to is in A, but has not grown to size 2M . Recall M = O( ∆(flog + ,f− ) that case, according to Algorithm 1, v may need to be queried with each cluster in A, and according to Algorithm 2, there can be at most c log n queries for each cluster in A. 3. Case 3. r ∈ (2R, |C|], the number of queries is at most c log n ∗ log n. In that case, according to Algorithm 1, v may need to be queried with at most ⌈log n⌉ clusters in A, and according to Algorithm 2, there can be at most c log n queries for each chosen cluster in A. 28 Hence, the total number of queries per cluster is at most O(kc2 (log n)2 + (2M − c log n)kc log n + (|C| − 2M )c(log n)2 ). So, over all the clusters, the query complexity is O(nc(log n)2 + k2 M c log n). Note that, if have instead insisted on a Monte Carlo algorithm with known f+ and f− , then the query complexity would have been O(k2 M c log n). Recall that ∆(pk(1 − p)) = O(λ2 ). Theorem (6). Let f+ and f− be pmfs and mini f+ (i), mini f− (i) ≥ ǫ for a constant ǫ. With side information and faulty oracle with error probability 21 − λ, there exist an algorithm for 2 n ) with known f+ and f− , and an algorithm Crowd-Cluster with query complexity O( λ2 k∆(flog + ,f− ) 2 n with expected query complexity O(n+ λ2 k∆(flog ) even when f+ and f− are unknown that recover + ,f− ) Ĝ, ML estimate of G with all 7 n 2 queries with high probability. Round Complexity So far we have discussed developing algorithms for Crowd-Cluster where queries are asked adaptively one by one. To use the crowd workers in the most efficient way, it is also important to incorporate as much parallelism as possible without affecting the query complexity by much. To formalize this, we allow at most Θ(n log n) queries simultaneously in a round, and then the goal is to minimize the number or rounds to recover the clusters. We show that the algorithms developed for optimizing query complexity naturally extends to the parallel version of minimizing the round complexity. 7.1 Crowd-Cluster with Perfect Oracle When crowd gives correct answers and there is no side information, then it is easy to get a round complexity of k which is optimal within a log n factor as Ω(nk) is a lower bound on the query complexity in this case. One can just pick a vertex v, and then for every other vertex issue a query involving v. This grows the cluster containing v completely. Thus in every round, one new cluster gets formed fully, resulting in a round complexity of k. We now explain the main steps of our algorithm when side information W is available. 1. Sample √ n log n vertices, and ask all possible √ n log n 2 queries involving them. 2. Suppose C1 , C2 , ..., Cl are the clusters formed so far. Arrange these clusters in nondecreasing size of their current membership. For every vertex v not yet clustered, choose the cluster Cj with j = maxi∈[1,l] Membership(v, Ci ), and select at most ⌈log n⌉ clusters using steps (11) and (13) of Algorithm 1. Issue all of these at most n log n queries simultaneously, and based on the results, grow clusters C1 , C2 , ..., Cl . √ 3. Among the vertices that have not been put into any cluster, pick n log n vertices uni√  formly at random, and ask all possible n 2log n queries involving them. Create clusters C1′ , C2′ , ..., Cl′′ based on the query results. ′ ll 4. Merge the clusters C1′ , C2′ , ..., Cl′′ with C1 , C2 , ..., Cl by issuing a total of ll′ queries in ⌈ n log n⌉ rounds. Goto step 2. Analysis First, the algorithm computes the clusters correctly. Every vertex that is included in a cluster, is done so based on a query result. Moreover, no clusters in step 2 can be merged. So all the clusters returned are correct. We now analyzed the number of rounds required to compute the clusters. 29 Algorithm 3 Crowd-Cluster with Error & Side Information. Input: {V, W } 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: 39: 40: 41: 42: V ′ = ∅, E ′ = ∅, G′ = (V ′ , E ′ ), A = ∅ while V 6= ∅ do If A is empty, then pick an arbitrary vertex v and Go to Step 23 ⊲ Let the number of current clusters in A be l ≥ 1 Order the existing clusters in A in nonincreasing size of current membership. ⊲ Let |C1 | ≥ |C2 | ≥ . . . ≥ |Cl | be the ordering (w.l.o.g). for j = 1 to l do If ∃v ∈ V such that j = maxi∈[1,l] Membership(v, Ci ), then select v and Break; end for Select u1 , u2 , .., ul ∈ Cj , where l = c log n, distinct members from Cj and obtain Op (ui , v), i = 1, 2, .., l. checked(v, j) = true if the majority of these queries return +1 then Include v in Cj . V = V \ v else ⊲ logarithmic search for membership in the large groups. Note s ≤ ⌈log k⌉ Group C1 , C2 , ..., Cj−1 into s consecutive classes H1 , H2 , ..., Hs such that the clusters 1 | |C1 | , 2i ) in group Hi have their current sizes in the range [ 2|Ci−1 for i = 1 to s do j = maxa:Ca ∈Hi Membership(v, Ca ) Select u1 , u2 , .., ul ∈ Cj , where l = c log n, distinct members from Cj and obtain Op (ui , v), i = 1, 2, .., l. checked(v, j) = true. if the majority of these queries return +1 then Include v in Cj . V = V \ v. Break. end if end for ⊲ exhaustive search for membership in the remaining groups in A if v ∈ V then for i = 1 to l + 1 do if i = l + 1 then ⊲ v does not belong to any of the existing clusters Add v to V ′ . Set V = V \ v For every u ∈ V ′ \ v, obtain Op (v, u). Add an edge (v, u) to E ′ (G′ ) with weight ω(u, v) = +1 if Op (v, u) == +1, else with ω(u, v) = −1 Find the heaviest weight subgraph S in G′ . If |S| ≥ c log n, then add S to the list of clusters in A, and remove the incident vertices and edges on S from V ′ , E ′ . P while ∃z ∈ V ′ with u∈S ω(z, u) > 0 do Include z in S and remove z and all edges incident on it from V ′ , E ′ . end while Break; else if checked(v, i) 6= true then Select u1 , u2 , .., ul ∈ Cj , where l = c log n, distinct members from Cj and Op (ui , v), i = 1, 2, .., l. checked(v, i) = true. if the majority of these queries return +1 then Include v in Cj . V = V \ v. Break. end if end if end if end for end if end if end while return all the clusters formed in A and the ML estimates from G′ 30 In one iteration of the algorithm (steps 1 to 4), steps 1 to 3 each require one round, and √ min (k 2 ,k n log n) rounds and issue at most issue at most n log n queries. Step 4 requires at most n log n √ √ 2 ′ min (k , k n log n) queries. This is because l ≤ n log n. n )), for i ∈ [1, l], then, at the end of that step, In step 2, if |Ci | ≥ 2M (recall M = O( ∆(flog + kf− ) Ci will be fully grown with high probability from the analysis of Algorithm 1. This happens since with high probability any vertex that belongs to Ci has been queried with some u already in Ci . However, since we do not know M , we cannot identify whether Ci has grown fully. Consider the case when steps 1 and 3 have picked 6kM random vertices. Consider all those n . Note that by Markov Inequality, at least n2 vertices are clusters that have size at least 2k n . contained in clusters of size at least 2k If we choose these 6kM vertices with replacement, then on expectation, the number of n members chosen from each cluster of size 2k is 3M , and with high probability above 2M . This same concentration bound holds even though here sampling is done without replacement (Lemma 5). Therefore, after 6kM vertices have been chosen, and step 2 has been performed, at least n2 vertices get clustered and removed. ⌉. If k2 ≥ n, then The number of iterations required to get 6kM random vertices is ⌈ √6kM n log n the number of rounds required in each iteration is 2 + ⌈ √n klog n ⌉. So the total number of rounds 2 M required to get 6kM vertices is O( nklog n ). And, finally to get all the vertices clustered, the 2 number of rounds required will be O( k nM ), whereas the optimum round complexity could be 2M O( nklog n ). If k2 < n, then the number of rounds in each√iteration is at most 3. Hence the total number . If kM ≤ n log n, then the number of rounds required of iterations is at most 3 + √6kM n log n √ √ is O(1). Else, we have kM > n log n and k < n. While our algorithm requires O( √nkM ) log n 2 rounds, we know the optimum round complexity is at least O( nklogMn ). Overall, the gap may be √ n at most O( n klog n ) = O(M ) = O( ∆(flog ). + kf− ) This leads to Theorem 7. Theorem (7). Perfect Oracle with Side Information. There exists an algorithm for CrowdCluster with perfect oracle and unknown side information f+ and f− such that it√achieves a √ round complexity within Õ(1) factor of the optimum when k = Ω( n) or k = O( ∆(f+nkf− ) ), and otherwise within Õ(∆(f+ kf− )). 7.2 Crowd-Cluster with Faulty Oracle We now move to the case of Crowd-Cluster with faulty oracle. We obtain an algorithm with close to optimal round complexity when no side information is provided. By combining this algorithm with the one in the previous section, one can easily obtain an algorithm for Crowd-Cluster with faulty oracle and side information. This is left as an exercise to the reader. We now give the algorithm for the case when crowd may return erroneous answer with probability p = 12 − λ (known), and there is no side information. √ 1. Sample n log n vertices uniformly at random, and ask all possible volving them to form a subgraph G′′ = (V ′′ , E ′′ ) √ n log n 2 queries in- 2. Extract the highest weighted subgraph S from G′′ after setting a weight of +1 for every positive answer and −1 for every negative answer like in Algorithm 2. If |S| ≥ c log n where c is set as in Algorithm 2, then for every vertex not yet clustered issue c log n queries to distinct vertices in S simultaneously in at most c rounds. Grow S by including any vertex where the majority of those queries returned is +1. Repeat step 2 as long as 31 the extracted subgraph has size at least c log n, else move to step 3 while not all vertices have been clustered or included in G′′ . 3. Among the vertices that have not been clustered yet, Pick r vertices Sr uniformly at r random, and ask all possible 2 + r|V ′′ | queries among Sr and across Sr and V ′′ . r is chosen such that the total number of queries is at most n log n. Goto step 2. Analysis By the analysis (Lemma 12) of Algorithm 2 the extracted subgraph S will have size ≥ c log n iff G′′ contains a subcluster of original G of size O(c log n). Moreover, by Lemma 13, once S is detected S will be fully grown at the end of that step, that is within the next c rounds. Now by the same analysis as in the previous section 7.1, once we choose 4kc log n vertices, 2 2 thus query 16k2 c2 log n edges in ⌈ 16kn c ⌉ rounds, then with high probability, each cluster with n size will have c log n representatives in G′′ and will be fully grown. We are then left at least 2k with at most n2 vertices and can apply the argument recursively. Thus the round complexity is 2 2 O(⌈ 16kn c ⌉ log n + kc) where the second term comes from using at most c rounds for growing cluster S in step 2. n , then we pick n2 edges in at most logn n rounds, and the optimum algorithm If kc ≥ 4√log n √ kc √ n log n factor of has round complexity at least Θ( log n ) = Θ( 4 log n log n ). So, we are within a the optimum. √ √ n If kc ≤ 4√log , but kc ≥ log n, then the round complexity of our algorithm is O(kc log n+ n √ √ log n) = O(kc √ log n), again within a log n log n factor of the optimum. √ If kc ≤ log n, then in the first round, all the clusters that have size at least c n will have enough representatives, and will be fully grown at the end of step 2. After that each cluster √ √ will have at most c n vertices. Hence, a total of at most kc n ≤ log n vertices will remain to be clustered. Thus the total number of rounds required will be O(kc), within log n factor of the optimum. 1 ), we get Theorem 8. Recalling that c = O( λ12 ) = O( ∆(pk(1−p)) Theorem (8). Faulty Oracle with no Side Information. There exists an algorithm for CrowdCluster with faulty oracle with error probability 21 −λ and no side information such that it achieves √ a round complexity within Õ( log n) factor of the optimum that recovers Ĝ, ML estimate of G  with all n2 queries with high probability. This also gives a new parallel algorithm for correlation clustering over noisy input where in each round n log n work is allowed. References [1] Emmanuel Abbe, Afonso S. Bandeira, and Georgina Hall. Exact recovery in the stochastic block model. IEEE Trans. Information Theory, 62(1):471–487, 2016. [2] Kook-Jin Ahn, Graham Cormode, Sudipto Guha, Andrew McGregor, and Anthony Ian Wirth. Correlation clustering in data streams. In Proceedings of the 32nd International Conference on Machine Learning, volume 37, 2015. [3] Nir Ailon, Moses Charikar, and Alantha Newman. Aggregating inconsistent information: ranking and clustering. Journal of the ACM (JACM), 55(5):23, 2008. [4] Miklos Ajtai, János Komlos, William L Steiger, and Endre Szemerédi. Deterministic selection in o (loglog n) parallel time. In Proceedings of the eighteenth annual ACM symposium on Theory of computing, pages 188–195. ACM, 1986. 32 [5] N. Alon and Y. Azar. The average complexity of deterministic and randomized parallel comparison sorting algorithms. In Proceedings of the 28th Annual Symposium on Foundations of Computer Science, FOCS ’87, pages 489–498, 1987. [6] Noga Alon and Yossi Azar. Sorting, approximate sorting, and searching in rounds. SIAM Journal on Discrete Mathematics, 1(3):269–280, 1988. [7] Peter Auer, Nicolo Cesa-Bianchi, Yoav Freund, and Robert E Schapire. The nonstochastic multiarmed bandit problem. SIAM Journal on Computing, 32(1):48–77, 2002. [8] Nikhil Bansal, Avrim Blum, and Shuchi Chawla. Correlation clustering. Machine Learning, 56(1-3):89–113, 2004. [9] Béla Bollobás and Graham Brightwell. Parallel selection with high probability. SIAM Journal on Discrete Mathematics, 3(1):21–31, 1990. [10] Mark Braverman, Jieming Mao, and Matthew S. Weinberg. Parallel algorithms for select and partition with noisy comparisons. In 48th Annual Symposium on the Theory of Computing, STOC. ACM, 2016. [11] Mark Braverman and Elchanan Mossel. Noisy sorting without resampling. In Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, pages 268–276. Society for Industrial and Applied Mathematics, 2008. [12] Mark Braverman and Elchanan Mossel. abs/0910.1191, 2009. Sorting from noisy information. CoRR, [13] Nicolo Cesa-Bianchi and Gábor Lugosi. Prediction, learning, and games. Cambridge university press, 2006. [14] Shuchi Chawla, Konstantin Makarychev, Tselil Schramm, and Grigory Yaroslavtsev. Near optimal lp rounding algorithm for correlationclustering on complete and complete k-partite graphs. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, pages 219–228. ACM, 2015. [15] Flavio Chierichetti, Nilesh Dalvi, and Ravi Kumar. Correlation clustering in mapreduce. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 641–650. ACM, 2014. [16] Peter Chin, Anup Rao, and Van Vu. Stochastic block model and community detection in the sparse graphs: A spectral algorithm with optimal rate of recovery. arXiv preprint arXiv:1501.05021, 2015. [17] Peter Christen. Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection. Springer Science & Business Media, 2012. [18] Richard Cole, Philip N. Klein, and Robert E. Tarjan. Finding minimum spanning forests in logarithmic time and linear work using random sampling. In Proceedings of the Eighth Annual ACM Symposium on Parallel Algorithms and Architectures, SPAA ’96, pages 243– 250, 1996. [19] Thomas M Cover and Joy A Thomas. Elements of information theory, 2nd Ed. John Wiley & Sons, 2012. [20] Imre Csiszár and Zsolt Talata. Context tree estimation for not necessarily finite memory processes, via bic and mdl. Information Theory, IEEE Transactions on, 52(3):1007–1016, 2006. 33 [21] Nilesh Dalvi, Anirban Dasgupta, Ravi Kumar, and Vibhor Rastogi. Aggregating crowdsourced binary ratings. In WWW, pages 285–294, 2013. [22] Susan B. Davidson, Sanjeev Khanna, Tova Milo, and Sudeepa Roy. Top-k and clustering with noisy comparisons. ACM Trans. Database Syst., 39(4):35:1–35:39, 2014. [23] Ahmed K Elmagarmid, Panagiotis G Ipeirotis, and Vassilios S Verykios. Duplicate record detection: A survey. IEEE Trans. Knowl. Data Eng., 19(1):1–16, 2007. [24] Alina Ene, Sungjin Im, and Benjamin Moseley. Fast clustering using mapreduce. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 681–689. ACM, 2011. [25] Uriel Feige, Prabhakar Raghavan, David Peleg, and Eli Upfal. Computing with noisy information. SIAM Journal on Computing, 23(5):1001–1018, 1994. [26] Ivan P Fellegi and Alan B Sunter. A theory for record linkage. Journal of the American Statistical Association, 64(328):1183–1210, 1969. [27] Donatella Firmani, Barna Saha, and Divesh Srivastava. Online entity resolution using an oracle. PVLDB, 9(5):384–395, 2016. [28] Hillel Gazit. An optimal randomized parallel algorithm for finding connected components in a graph. SIAM Journal on Computing, 20(6):1046–1067, 1991. [29] Lise Getoor and Ashwin Machanavajjhala. Entity resolution: theory, practice & open challenges. PVLDB, 5(12):2018–2019, 2012. [30] Arpita Ghosh, Satyen Kale, and Preston McAfee. Who moderates the moderators?: crowdsourcing abuse detection in user-generated content. In EC, pages 167–176, 2011. [31] Chaitanya Gokhale, Sanjib Das, AnHai Doan, Jeffrey F Naughton, Narasimhan Rampalli, Jude Shavlik, and Xiaojin Zhu. Corleone: Hands-off crowdsourcing for entity matching. In SIGMOD Conference, pages 601–612, 2014. [32] Michael T Goodrich, Nodari Sitchinava, and Qin Zhang. Sorting, searching, and simulation in the mapreduce framework. In Algorithms and Computation, pages 374–383. Springer, 2011. [33] John Greiner. A comparison of parallel algorithms for connected components. In Proceedings of the sixth annual ACM symposium on Parallel algorithms and architectures, pages 16–25. ACM, 1994. [34] Anja Gruenheid, Besmira Nushi, Tim Kraska, Wolfgang Gatterbauer, and Donald Kossmann. Fault-tolerant entity resolution with the crowd. CoRR, abs/1512.00537, 2015. [35] Bruce Hajek, Yihong Wu, and Jiaming Xu. Achieving exact cluster recovery threshold via semidefinite programming: Extensions. arXiv preprint arXiv:1502.07738, 2015. [36] Elad Hazan and Robert Krauthgamer. How hard is it to approximate the best nash equilibrium? SIAM J. Comput., 40(1):79–91, January 2011. [37] Thomas N. Herzog, Fritz J. Scheuren, and William E. Winkler. Data Quality and Record Linkage Techniques. Springer Publishing Company, Incorporated, 1st edition, 2007. [38] Wassily Hoeffding. Probability inequalities for sums of bounded random variables. Journal of the American statistical association, 58(301):13–30, 1963. 34 [39] David R Karger, Sewoong Oh, and Devavrat Shah. Iterative learning for reliable crowdsourcing systems. In NIPS, pages 1953–1961, 2011. [40] Howard Karloff, Siddharth Suri, and Sergei Vassilvitskii. A model of computation for mapreduce. In Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms, pages 938–948. Society for Industrial and Applied Mathematics, 2010. [41] Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. Sorting noisy data with partial information. In Proceedings of the 4th conference on Innovations in Theoretical Computer Science, pages 515–528. ACM, 2013. [42] Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. Correlation clustering with noisy partial information. In Proceedings of The 28th Conference on Learning Theory, pages 1321–1342, 2015. [43] Adam Marcus, Eugene Wu, David Karger, Samuel Madden, and Robert Miller. Humanpowered sorts and joins. Proceedings of the VLDB Endowment, 5(1):13–24, 2011. [44] Claire Mathieu and Warren Schudy. Correlation clustering with noisy input. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, Austin, Texas, USA, January 17-19, 2010, pages 712–728, 2010. [45] Elchanan Mossel, Joe Neeman, and Allan Sly. Consistency thresholds for binary symmetric block models. Arxiv preprint, 2014. [46] Xinghao Pan, Dimitris Papailiopoulos, Samet Oymak, Benjamin Recht, Kannan Ramchandran, and Michael I Jordan. Parallel correlation clustering on big graphs. In Advances in Neural Information Processing Systems, pages 82–90, 2015. [47] Rudiger Reischuk. A fast probabilistic parallel sorting algorithm. In Proceedings of the 22Nd Annual Symposium on Foundations of Computer Science, FOCS ’81, pages 212–219, 1981. [48] Igal Sason. On reverse pinsker inequalities. arXiv preprint arXiv:1503.07118, 2015. [49] Leslie G Valiant. Parallelism in comparison problems. SIAM Journal on Computing, 4(3):348–355, 1975. [50] Vasilis Verroios and Hector Garcia-Molina. Entity resolution with crowd errors. In 31st IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13-17, 2015, pages 219–230, 2015. [51] Norases Vesdapunt, Kedar Bellare, and Nilesh Dalvi. Crowdsourcing algorithms for entity resolution. PVLDB, 7(12):1071–1082, 2014. [52] Jiannan Wang, Tim Kraska, Michael J Franklin, and Jianhua Feng. Crowder: Crowdsourcing entity resolution. PVLDB, 5(11):1483–1494, 2012. 35
8cs.DS
arXiv:1511.01553v2 [math.AG] 29 Dec 2017 A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES VIA CORE OF IDEALS TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA Abstract. The notion of pg -ideals for normal surface singularities has been proved to be very useful. On the other hand, the core of ideals has been proved to be very important concept and also very mysterious one. However, the computation of the core of an ideal seems to be given only for very special cases. In this paper, we will give an explicit description of the core of pg -ideals of normal surface singularities. As a consequence, we give a characterization of rational singularities using the inclusion of the core of integrally closed ideals. 1. Introduction Let (A, m) be a two-dimensional excellent normal local domain containing an algebraically closed field. We always assume that (A, m) is not regular. When (A, m) is a rational singularity, Lipman [14] proved that any integrally closed mprimary ideal I is stable, namely, I 2 = QI for some (every) minimal reduction Q, and that if I and I ′ are integrally closed m-primary ideals, then the product II ′ is also integrally closed. (Later, Cutkosky [4] showed that this property characterizes the rational singularities for two-dimensional excellent normal local domains.) These facts play very important role to study ideal theory on a two-dimensional rational singularity. In [15], the authors introduced the notion of pg -ideals for two-dimensional excellent normal local domain containing an algebraically closed field and proved that the pg ideals inherit nice properties of integrally closed ideals of rational singularities (in a rational singularity, every integrally closed ideal is a pg -ideal by our definition). Namely, any pg -ideal I is stable and if I and I ′ are pg -ideals, then II ′ is integrally closed and also a pg -ideal. Let f : X → Spec A be a resolution of singularity. Then pg (A) := ℓA (H 1 (X, OX )) is independent of the choice of a resolution and an important invariant of A (here we denote by ℓA (M) the length of an A module M). The invariant pg (A) is called the geometric genus of A. A rational singularity is characterized by pg (A) = 0. Let I ⊂ A be an integrally closed m-primary ideal. Then there exists a resolution of singularities f : X → Spec A and an anti-nef cycle Z on X so that IOX = OX (−Z) and I = IZ := H 0 (X, OX (−Z)). In general, we can show that 2000 Mathematics Subject Classification. Primary 14B05; Secondary 13B22, 14J17, 13A15, 13H15. Key words and phrases. core of ideals, good ideal, pg -cycle, pg -ideal, surface singularity, rational singularity. This work was partially supported by JSPS KAKENHI Grant Numbers 26400064, 26400053, 25400050. 1 2 TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA ℓA (H 1 (X, OX (−Z))) ≤ pg (A) for any cycle Z such that OX (−Z) has no fixed components. If equality holds, then Z is called a pg -cycle and I = IZ is called a pg -ideal. The core of an ideal I is the intersection of all reductions of I. The notion of core of ideals was introduced by Rees and Sally [18], and many properties of the core have been shown by Corso–Polini–Ulrich [2], [3], Huneke–Swanson [8], Huneke– Trung [9], Hyry–Smith [10], Polini–Ulrich [17]. The core of ideals is related to coefficient, adjoint and multiplier ideals. However, it seems to the authors that the computation of the core is given only for very special cases. In this paper, we will show that if I = IZ is a pg -ideal and Q is a minimal reduction of I, there exists a cycle Y ≥ 0 on X such that Q : I = IZ−Y and core(I) = I2Z−Y . In particular, this implies that if A is rational, X0 is the minimal resolution, and K = KX/X0 (the relative canonical divisor), then core(I) = I2Z−K (see Theorem 4.6 for general case). Moreover, we obtain that if I and I ′ are pg -ideals and I ′ ⊂ I, then core(I ′ ) ⊂ core(I) (see Theorem 4.11). If A is not a rational singularity, then there exist a pg -ideal I ′ and an integrally closed non-pg -ideal I such that I ′ ⊂ I and core(I ′ ) 6⊂ core(I) (see Proposition 3.4). Therefore, we obtain a characterization of rational singularities in terms of core of ideals, which is our main theorem. Theorem 1.1 (See Theorem 3.2). The following conditions are equivalent if char(k) 6= 2 (1) For any integrally closed m-primary ideals I ′ ⊂ I, we have core(I ′ ) ⊂ core(I). (2) A is a rational singularity. An m-primary ideal I is said to be good if I 2 = QI and I = Q : I for some minimal reduction Q of I (see [6], [15]). As an application of the theorem, we show the following existence theorem for good ideals, which generalizes [15, Theorem 4.1] for non-Gorenstein local domains. Theorem 1.2 (See Theorem 4.6). Any two-dimensional excellent normal local domain A over an algebraically closed field admits a good pg -ideal. Let us explain the organization of this paper. In Section 2, we recall the definition and several basic properties of pg -ideals. In Section 3, we prove Theorem 1.1 using the property that taking the core preserves the inclusion of pg -ideals (Theorem 4.11), and will show that if I0 is not a pg -ideal, then for some n ≥ 1 we can construct a pg -ideal I ′ ⊂ I = I0n with core(I ′ ) 6⊂ core(I). In Section 4, we show that Q : I and core(I) are also pg -ideals for a pg -ideal I and its minimal reduction Q (Theorem 4.4), and give an algorithm for obtaining these ideals (Theorem 4.6). We also prove some characterization of good ideals and the existence of good ideals in A. In Section 5, we give a maximal pg -ideal contained in a given integrally closed m-primary ideal. 2. Preliminary on pg -ideals Throughout this paper, let (A, m) be a two-dimensional excellent normal local domain containing an algebraically closed field and f : X → Spec A a resolution of singularities with exceptional divisor E := f −1 (m) unless otherwise specified. Let Sr E = i=1 Ei be the decomposition into irreducible components of E. A Z-linear A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES Pr combination Z = i=1 ni Ei is called a cycle. We say a cycle Z = effective if ni ≥ 0 for every i. We denote Z ≥ Z ′ if Z − Z ′ is effective. Pr i=1 3 ni Ei is First, we recall the definition of pg -ideals. If I is an integrally closed m-primary ideal of A, then there exists a resolution X → Spec A and an effective cycle Z on X such that IOX = OX (−Z). In this case, we denote the ideal I by IZ ,1 and we say that I is represented on X by Z. Note that IZ = H 0 (X, OX (−Z)). Furthermore, if ZC < 0 for every (−1)-curve C on X, then we say that I is minimally represented. We obtain a unique minimal representation of I by contracting (−1)-curves C with ZC = 0 successively (cf. [15, §3]). We say that OX (−Z) has no fixed component if H 0 (X, OX (−Z)) 6= H 0 (X, OX (−Z− Ei )) for every Ei ⊂ E, i.e., the base locus of the linear system H 0 (X, OX (−Z)) does not contain any component of E. It is clear that OX (−Z) has no fixed component when I is represented by Z. We denote by h1 (OX (−Z)) the length ℓA (H 1 (X, OX (−Z))). We put pg (A) = h1 (OX ) and call it the geometric genus of A. The number h1 (OX (−Z)) is independent of the choice of representations of I = IZ (cf. [15]) and is an important invariant of the ideal for our theory. We have the following result for this invariant. Proposition 2.1 ([15, 2.5, 3.1]). Let Z ′ and Z be cycles on X and assume that OX (−Z) has no fixed components. Then we have h1 (OX (−Z ′ −Z)) ≤ h1 (OX (−Z ′ )). In particular, we have h1 (OX (−Z)) ≤ pg (A); if the equality holds, then OX (−Z) is generated. Definition 2.2. (1) Let I = IZ = H 0 (X, OX (−Z)) be an integrally closed ideal represented by Z > 0 on X. We call I a pg -ideal if h1 (OX (−Z)) = pg (A). (2) A cycle Z > 0 is called a pg -cycle if OX (−Z) is generated and h1 (OX (−Z)) = pg (A). Remark 2.3. If pg (A) = 0, then A is called a rational singularity. On a rational singularity, every integrally closed m-primary ideal is a pg -ideal by definition (cf. [14]) and conversely, this property characterizes a rational singularity because we always have integrally closed ideal I = IZ such that h1 (OX (−Z)) = 0 (cf. [5]). In [15], we have seen many good properties of pg -ideals. We will review some of these properties. Let Z and Z ′ be nonzero effective cycles on the resolution X → Spec A such that OX (−Z) and OX (−Z ′ ) are generated. Take general elements a ∈ IZ , b ∈ IZ ′ and put ε(Z, Z ′) := ℓA (IZ+Z ′ /aIZ ′ + bIZ ) = pg (A) − h1 (OX (−Z)) − h1 (OX (−Z ′ )) + h1 (OX (−Z − Z ′ )). Then 0 ≤ ε(Z, Z ′) ≤ pg (A); see [15, 2.6]. The following proposition gives an important property of pg -ideals. Proposition 2.4 (see [15, 3.5, 3.6]). Let Z and Z ′ be the cycles as above. 1When we write IZ , we assume that OX (−Z) is generated by global sections. 4 TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA (1) If Z is a pg -cycle, then ε(Z, Z ′) = 0 for any Z ′ , and IZ+Z ′ = aIZ ′ + bIZ for general elements a ∈ IZ and b ∈ IZ ′ . In particular, the product IZ IZ ′ is integrally closed and h1 (OX (−Z − Z ′ )) = h1 (OX (−Z ′ )). (2) Z and Z ′ are pg -cycles if and only if so is Z + Z ′ . Proof. The “if part” of (2) follows from Proposition 2.1. The other claims follow from [15, 3.5].  Recall that an ideal J ⊂ I is called a reduction of I if I is integral over J or, equivalently, I r+1 = I r J for some r (e.g., [20]). An ideal Q ⊂ I is called a minimal reduction of I if Q is minimal among the reductions of I. Any minimal reduction of an m-primary ideal is a parameter ideal. Corollary 2.5 (see [15, 3.6]). Let I and I ′ be any integrally closed m-primary ideals. (1) I and I ′ are pg -ideals if and only if so is II ′ . (2) Assume that I is a pg -ideal. Then I n is a pg -ideal for every n > 0. If Q is a minimal reduction of I, then I 2 = QI and I ⊂ Q : I. Assume that pg (A) > 0. Then we give a characterization of pg -ideals by cohomological cycle. Let KX denote the canonical divisor on X. Let ZKX denote the canonical cycle, i.e., the Q-divisor supported in E such that KX + ZKX ≡ 0. By [19, §4.8], there exists the smallest cycle CX > 0 on X such that h1 (OCX ) = pg (A), and CX = ZKX if A is Gorenstein and the resolution f : X → Spec A is minimal. The cycle CX is called the cohomological cycle on X. Proposition 2.6. Assume that pg (A) > 0 and let C ≥ 0 be the minimal cycle such that H 0 (X \ E, OX (KX )) = H 0 (X, OX (KX + C)). Then C is the cohomological cycle. Therefore if g : X ′ → X is the blowing-up at a point in Supp CX and E0 the exceptional set for g, then CX ′ = g ∗ CX − E0 . For any cycle D > 0 without common components with CX , we have h1 (OD ) = 0. Proof. By the Grauert-Riemenschneider vanishing theorem2 and the duality theorem, we have ℓA (H 0 (X \ E, OX (KX ))/H 0(X, OX (KX ))) = ℓA (HE1 (X, OX (KX ))) = pg (A), ℓA (H 0(X, OX (KX + C))/H 0(X, OX (KX ))) = h0 (OC (KX + C))) = h1 (OC ). Thus h1 (OC ) = pg (A).3 Let C ′ > 0 be a cycle such that C ′ < C. By the assumption, we have h1 (OC ′ ) = ℓA (H 0 (OX (KX + C ′ ))/H 0 (OX (KX ))) < ℓA (HE1 (OX (KX ))) = pg (A). Let D > 0 be a cycle without common components with C. As in the proof of [19, §4.8] (putting A = 0), we obtain the surjection H 1 (OC+D ) → H 1 (OC ) ⊕ H 1 (OD ). Since h1 (OC+D ) = h1 (OC ) = pg (A), it follows that H 1 (OD ) = 0.  We have the following characterization of pg -ideals in terms of cohomological cycle. 2Note that the Grauert-Riemenschneider vanishing theorem holds in any characteristic in dimension 2 ([5]). 3This result was already obtained by Tomari [21]. A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES 5 Proposition 2.7 ([15, 3.10]). Assume that pg (A) > 0. Let Z > 0 be a cycle such that OX (−Z) has no fixed component. Then Z is a pg -cycle if and only if OCX (−Z) ∼ = OCX . Now we will define the core of an ideal I of A. Definition 2.8. Let I be an m-primary ideal of A. (1) The core of I is defined by \ Q. core(I) = Q is a reduction of I (2) I is said to be stable if I 2 = QI for any minimal reduction Q of I. By this definition, if I is stable, then I ⊂ Q : I and I 2 ⊂ core(I). (3) I is said to be good if I is stable and Q : I = I for any minimal reduction Q of I ([6], [15]). If I is integrally closed and stable, then I 2 = core(I) if and only if I is a good ideal (see Lemma 4.1). Remark 2.9 ([6]). If A is Gorenstein, then I is good if and only if I is stable and e(I) = 2ℓA (A/I), where e(I) denotes the multiplicity of I (if I = IZ , then e(IZ ) = −Z 2 ). We have shown the existence of good pg -ideals when A is Gorenstein in [15]. We also have a characterization of pg -ideal in terms of the Rees algebras. Proposition 2.10 ([16]). Let I be an integrally closed m-primary ideal I. Then the following conditions are equivalent. (1) I is a pg -ideal. L (2) The Rees algebra n≥0 I n tn ⊂ A[t] is a Cohen-Macaulay normal domain. (3) I 2 = QI and I n = I n for every n > 0, where J denotes the integral closure of an ideal J. In Section 4, we will give the description of core(I) for a pg -ideal I. 3. A question on core of integrally closed ideals The core of an ideal I is the intersection of all the reductions of I, or, equivalent to say, the intersection of all the minimal reductions of I. We are interested whether taking the core preserves the inclusion of ideals. But it is obvious that if ideals I ′ ⊂ I have the same integral closure, then core(I ′ ) ⊃ core(I), since a reduction of I ′ is also a reduction of I. So, we ask the following question. Question 3.1. Let (A, m) be a two-dimensional excellent normal local domain and let I ′ ⊂ I be integrally closed m-primary ideals. Then is it always true that core(I ′ ) ⊂ core(I)? Question 3.1 was asked in [8] and then in [10, Question 5.5.2]. When A is twodimensional Gorenstein rational singularity this question was answered affirmatively (see [10, 5.5.1]). On the other hand, Kyungyong Lee [13] gave a counterexample to this question in a regular local ring of dimension 4. The answer to this question and the main theorem of this paper is the following. 6 TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA Theorem 3.2. Let (A, m) be a two-dimensional excellent normal local domain. Then the following conditions are equivalent if char(k) 6= 2. (1) For any integrally closed m-primary ideals I ′ ⊂ I, we have core(I ′ ) ⊂ core(I). (2) A is a rational singularity. Proof. If A is a rational singularity then every integrally closed ideal is a pg -ideal. We will show in Theorem 4.11 that the answer to Question 3.1 is positive if both I and I ′ are pg -ideals. Hence the implication (2) =⇒ (1) is true. The implication (1) =⇒ (2) follows from Proposition 3.4.  Remark 3.3. The implication (2) ⇒ (1) holds if char(k) = 2, since Theorem 4.11 does not depend on char(k). By applying some results in Section 4 and Section 5, we shall prove the following. Proposition 3.4. Assume that pg (A) > 0 and char(k) 6= 2. Let I = IZ be an integrally closed ideal such that I 2 6= QI for some minimal reduction Q of I and that I 2 is integrally closed. Then there exists a pg -ideal I ′ ⊂ I such that core(I ′ ) 6⊂ core(I). In particular, if I = IZ is an integrally closed ideal which is not a pg -ideal, then for some n > 0, there exists a pg -ideal I ′ ⊂ I n such that core(I ′ ) 6⊂ core(I n ). Proof. Suppose that a minimal reduction Q of I is generated by a system of parameters a, b ∈ I. Let us prove that I 2 6⊂ Q. If I 2 ⊂ Q holds, then I 2 = I 2 = I 2 ∩ Q = QI = QI by Huneke–Itoh theorem (see [7], [11]). This contradicts the assumption. Hence I 2 6⊂ Q. Now, since I 2 6⊂ Q and since char(k) 6= 2, for a general element f of I, f 2 6∈ Q and in particular, f 2 6∈ core(I). On the other hand, by Theorem 5.1, there exists a pg -ideal I ′ ⊂ I such that f ∈ I ′ . Then f 2 ∈ I ′2 ⊂ core(I ′ ), since I ′ is stable. This shows that core(I ′ ) 6⊂ core(I). k For a given I = IZ , which is not a pg -ideal, choose n so that I nk = I n and h1 (OX (−nZ)) = h1 (OX (−nkZ)) for every positive integer k. Such n exists since the normalized Rees algebra of I is Noetherian and h1 (OX (−nZ)) is a decreasing function of n (cf. Proposition 2.1). Clearly I n = InZ is not a pg -ideal by Proposition 2.4 (2). Let Qn be a minimal reduction of I n . Since h1 (OX (−nZ)) = h1 (OX (−2nZ)), from the exact sequence 0 → OX → OX (−nZ)⊕2 → OX (−2nZ) → 0, 2 we obtain ℓA (I n /Qn I n ) = pg (A) − h1 (OX (−nZ)) > 0. Therefore we can apply the  first claim to the ideal I n . Example 3.5. Let A = k[[x, y, z]]/(x2 + y 4 + z 4 ), where k is an algebraically closed field.4 Then core(m) = m2 since m is a good ideal (cf. Remark 2.9, Lemma 4.1). Note that core(m) is not integrally closed since x is integral over m2 . It is easy to show that for every integrally closed ideal I ′ ⊂ m, core(I ′ ) ⊂ core(m) = m2 . Let f0 : X0 → Spec A be the minimal resolution. Then f0−1 (m) = E0 is an elliptic curve {x2 + y 4 + z 4 = 0} in the weighted projective space P(2, 1, 1). We 4If char(k) = 2, then we change x2 + y 4 + z 4 to x2 + g(y, z), where g(y, z) is a form of degree 4 with no multiple roots. A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES 7 have pg (A) = 1, m = IE0 , h1 (OX0 (−nE0 )) = 0 for n > 0 by the vanishing theorem (cf. [5]). Now, let I := I2E0 = m2 , which is generated by m2 and x. Then I n is integrally closed (cf. [19, 4.24]) and not a pg -ideal for every n > 0. It is easy to see that ℓA (I 2 /QI) = pg (A) = 1 for any minimal reduction Q of I. Take a general element g of I and let P1 , . . . , P4 ∈ E0 be the intersection points of E0 and divX (g) − 2E0 . Let f1 : X → X0 be the blowing-up of these 4 points and let Ei = f1−1 (Pi ), i = 1, . . . , 4. We again denote by E0 the strict transform of E0 on X. P Then Z = 2E0 + 3 4i=1 Ei is a pg -cycle on X and KX Z = 0. By Kato’s RiemannRoch formula ([12], cf. [15, 2.8]), we have ℓA (A/IZ ) = 6 and ℓA (A/m3 ) = 7. Thus IZ = (g) + m3 ⊂ I. Since 2ℓA (A/IZ ) = −Z 2 , IZ is also a good ideal (cf. Remark 2.9) and core(IZ ) = IZ2 . On the other hand, as we have seen in the proof of Proposition 3.4, g 2 6∈ core(I). Thus we conclude that core(IZ ) 6⊂ core(I). 4. Computation of core(I) and Q : I of a pg -ideal I Let I = IZ be an integrally closed ideal of A represented on some resolution X, and let Q be any minimal reduction of I. We begin by recalling a description of core when I is stable. Lemma 4.1. Assume that I 2 = QI. Then (4.1) core(I) = Q2 : I = (Q : I)I = (Q : I)Q. Moreover, if core(I) is integrally closed, then so is Q : I. Proof. The formula (4.1) is obtained in [15, 5.6]. Assume that core(I) is integrally closed and Q is generated by a, b ∈ I. Let x ∈ A be integral over Q : I. Then ax is integral over Q(Q : I). Since (Q : I)Q = (Q : I)I = core(I), we have ax ∈ Q(Q : I). Thus ax = au + bv for some u, v ∈ Q : I. Since a(x − u) = bv, we have that x − u ∈ (b) ⊂ Q, and thus x ∈ Q : I. Hence Q : I is integrally closed.  Lemma 4.2. Let D > 0 be a cycle on X. Then we have the following. (1) H 0 (OD (D)) = 0. (2) h1 (OD (D)) = (−D 2 + KX D)/2. (3) pg (A) + h1 (OD (D)) = h1 (OX (D)). Therefore h1 (OX (D)) ≥ pg (A) and the equality holds if and only if h1 (OD (D)) = 0. (4) If h1 (OD (D)) = 0, then each connected component of the support of D contracts to a nonsingular point. More precisely, if E1 ≤ D is a (−1)-curve, g : X → X ′ the contraction of E1 , and if F := g∗ D 6= 0, then h1 (OF (F )) = 0 and D = g ∗ F + nE1 with n = 0 or 1. Proof. Although the claim (1) is stated in [22], we will give a short proof for the convenience of the readers. By adjunction, KD = (KX + D)|D and by duality on D, h0 (OD (D)) = h1 (OD (KX )). Since H 1 (X, OX (KX )) → H 1 (D, OD (KX )) is surjective and H 1 (X, OX (KX )) = 0 by Grauert-Riemenschneider vanishing theorem, we have the desired result. The statement (2) follows from (1) and the RiemannRoch formula: h1 (OD (D)) = −χ(OD (D)) = (−D 2 + KX D)/2. The assertion (3) follows from (1) and the exact sequence 0 → OX → OX (D) → OD (D) → 0. 8 TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA (4) If D contains no (−1)-curve, then KX D ≥ 0, and thus 2h1 (OD (D)) = −D 2 + KX D ≥ −D 2 > 0. Assume that 2h1 (OD (D)) = −D 2 + KX D = 0 and E1 be a (−1)-curve in D. Let g : X → X ′ be the contraction of E1 and F = g∗ D. Then there exists an integer n such that D = g ∗ F + nE1 . We have −D 2 + KX D = −F 2 + KX ′ F + n2 − n. Since n2 − n ≥ 0 for any n ∈ Z and −F 2 + KX ′ F ≥ 0 by (2), we obtain that −F 2 + KX ′ F = n2 − n = 0. Therefore we can inductively contract all components of D to nonsingular points.  The following lemma is essential for our main theorem of this section. Lemma 4.3. Let I = IZ be a pg -ideal represented on some resolution X, and Q a minimal reduction of I. Assume that OX (−Z + Y ) is generated for some cycle 0 < Y < Z on X. Then the following conditions are equivalent. (1) IZ IZ−Y = QIZ−Y . (2) h1 (OX (Y )) = pg (A) and IZ−Y is a pg -ideal. Note that the first condition implies IZ−Y ⊂ Q : IZ . Proof. Assume Q = (a, b) and consider the exact sequence 0 → OX → OX (−Z)⊕2 → OX (−2Z) → 0, where the map OX (−Z)⊕2 → OX (−2Z) is defined by (x, y) 7→ ax + by. Tensoring OX (Y ) to this exact sequence, we obtain 0 → OX (Y ) → OX (−Z + Y )⊕2 → OX (−2Z + Y ) → 0. Note that IZ IZ−Y = I2Z−Y and h1 (OX (−Z + Y )) = h1 (OX (−2Z + Y )) by Proposition 2.4. Now, taking the long exact sequence of this sequence, we see that IZ IZ−Y = QIZ−Y if and only if H 1 (OX (Y )) → H 1 (OX (−Z + Y )⊕2 ) is injective, and this is also equivalent to that 2h1 (OX (−Z + Y )) = h1 (OX (Y )) + h1 (OX (−2Z + Y )). Thus (1) is equivalent to that h1 (OX (−Z + Y )) = h1 (OX (Y )). On the other hand, we have h1 (OX (−Z +Y )) ≤ pg (A) ≤ h1 (OX (Y )) by Proposition 2.1 and Lemma 4.2. Therefore, the condition (1) is equivalent to the equalities h1 (OX (−Z + Y )) = pg (A) = h1 (OX (Y )), namely, the condition (2).  Now we can state the main theorem of this section. Theorem 4.4. Let I = IZ be a pg -ideal, where Z is a pg -cycle on a resolution X of Spec A. Then core(I) and Q : I are also represented on X. Furthermore, we can write Q : I = IZ−Y and core(I) = I2Z−Y , where Y is the maximal positive cycle on X satisfying the following two conditions: (1) h1 (OX (Y )) = pg (A) and (2) IZ−Y is a pg -ideal. In particular, if I is a pg -ideal, so are Q : I and core(I). A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES 9 Proof. By Proposition 2.10, the Rees algebra R(I) is normal and Cohen-Macaulay. Hence core(I) is integrally closed by [10, Proposition 5.5.3]. It follows from Lemma 4.1 that Q : I is also integrally closed. By Corollary 2.5, we have I ⊂ Q : I. Suppose that I and Q : I are represented by cycles Z ′ and Z ′ − Y on some resolution X ′ , respectively, where Y is an effective cycle on X ′ . Note that Y satisfies the condition (1) of Lemma 4.3 by (4.1). We may assume that Z ′ C < 0 or (Z ′ − Y )C < 0 for any (−1)-curve C on X ′ . If C is a (−1)-curve and Z ′ C = 0, then Y C > 0. However, this is impossible because Y blows down to a nonsingular point and Y C ≤ 0 if C ≤ Y by Lemma 4.2. Thus I is minimally represented on X ′ . Hence there exists a birational morphism α : X → X ′ and Q : I is also represented on the resolution X by α∗ (Z ′ − Y ) = Z − α∗ Y . Thus we can write Q : I = IZ−Y0 , where Y0 = α∗ Y ≥ 0. By (4.1) and Lemma 4.3, we see that core(I) = I2Z−Y0 and that Y0 satisfies our conditions (1) and (2). On the other hand, if a cycle Y ≥ 0 on X also satisfies our conditions, then Lemma 4.3 implies that IZ−Y ⊂ Q : I = IZ−Y0 . Hence we must have Y ≤ Y0 .  Note that even if I is minimally represented on X, Q : I is not necessarily minimally represented on X. In Theorem 4.6, we shall give an algorithm to calculate Q : I and a minimal good ideal containing I starting from a pg -ideal I = IZ . In the situation of Theorem 4.4, I is a good ideal if and only if Y = 0. Hence we obtain the following. Corollary 4.5. Assume that I is a pg -ideal. Then the following are equivalent. (1) I is a good ideal. (2) core(I) = I 2 . (3) core(I 2 ) = core(I)2 . Theorem 4.6. Let I = IZ be a pg -ideal represented on X and let Q be a minimal reduction of I. (1) Let X = X1 → X2 → · · · → Xn+1 be the sequence of contractions, where each fi : Xi → Xi+1 is a contraction of a (−1)-curve Ei on Xi , which does not intersect the cohomological cycle CXi . This process stops when every (−1)-curve on Xn+1 intersects CXn+1 . Let K be the relative canonical divisor KX/Xn+1 of the composite f : X → Xn+1 . Then Q : I = H 0 (X, OX (−Z + K)). Note that Z − K is anti-nef if and only if any (−1)-curve C on X satisfies ZC < 0; in this case, K coincides with Y in Theorem 4.4. Also, f∗ Z is a pg -cycle and If∗ Z is the minimal good ideal containing IZ . In particular, every two-dimensional excellent normal local domain has good ideals. (2) Let C be a (−1)-curve on X which does not intersect CX such that ZC = −m < 0 and g : X → X ′ the contraction of C. Then g∗ Z is also a pg -cycle. Let I ′ = Ig∗ Z and Q′ a minimal reduction of I ′ . In this case, if Q′ : I ′ = IZ ′ for some cycle Z ′ on X ′ , then Q : I = Ig∗ Z ′ +(m−1)C . Proof. Let Fi be the total transform of Ei on X. Then Fi Fj = 0 for i 6= j. Let n n X X bi . ai , and b = bi = −ZFi , ai = min{1, bi }, a = i=1 i=1 10 TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA P We will prove that a cycle Y := ni=1 ai Fi satisfies Q : I = IZ−Y . Since a2i = ai , we have n n X X 2 2 −Y + KX Y = ai (−Fi + KX Fi ) = ai (−Ei2 + KXi Ei ) = 0. i=1 i=1 From Lemma 4.2, we have h1 (OY (Y )) = 0 and that Y is the maximal cycle on X satisfying h1 (OX (Y )) = pg (A). By Theorem 4.4, it is sufficient to show that Z − Y is a pg -cycle. We have f∗ Z and f ∗ f∗ Z are pg -cycles by Proposition 2.7 and P Z = f ∗ f∗ Z + ni=1 bi Fi . Take any decreasing sequence of cycles {Z0 , . . . , Zb } such that Z0 = Z, Za = Z − Y, Zb = f ∗ f∗ Z, Ci := Zi − Zi+1 ∈ {F1 , . . . , Fn }. 1 Then every Zi is anti-nef. Let hi = h (OX (−Zi )). Consider the exact sequence 0 → OX (−Zi ) → OX (−Zi+1 ) → OCi (−Zi+1 ) → 0. Note that any nef invertible sheaf L on Ci is generated and satisfies H 1 (L) = 0 (cf. [14]). Since H 1 (OCi (−Zi+1 )) = 0, we have hi ≥ hi+1 ; however the equality holds for every 0 ≤ i < b because hb = h0 = pg (A). Thus H 0 (OX (−Zi+1 )) → H 0 (OCi (−Zi+1 )) is surjective and hi = pg (A) for each 0 ≤ i < b. Thus H 0 (OX (−Zi+1 )) has no base points on Supp Ci . Therefore if OX (−Zi ) is generated, so is OX (−Zi+1 ). Since OX (−Z0 ) is generated, OX (−Zi ) is also generated and Zi is a pg -cycle for every 0 ≤ i ≤ b. Hence Q : I = IZ−Y . Now it is clear that for any minimal reduction Q∗ of If∗ Z , we have Q∗ : If∗ Z = If∗ Z , namely, If∗ Z is a good ideal. The argument above also shows this is the minimal good ideal containing IZ . If ZC < 0 for every (−1)-curve C on X not intersecting CX , then ai = 1 for every 1 ≤ i ≤ n, and thus Y = K. Let C = E1 , g = f1 , and X ′ = X2 . We will show that if ZC = 0, we have 0 H (X, OX (−Z + K)) = H 0 (X ′ , OX ′ (−g∗ Z + K ′ )), where K ′ = KX ′ /Xn+1 . This claim implies the formula Q : I = H 0 (OX (−Z + K)); in fact, it can be reduced to the case n = 1. We have that g ∗ OX ′ (−g∗ Z + K ′ ) = OX (−Z + K − C) and the exact sequence 0 → OX (−Z + K − C) → OX (−Z + K) → OC (−Z + K) → 0. Since ZC = 0, we have OC (−Z) ∼ = H 0 (OP1 (−1)) = 0. = OC and H 0 (OC (−Z + K)) ∼ Hence we obtain the claim. Assume that m := −ZC > 0. By Proposition 2.7, g∗ Z is a pg -cycle on X ′ . Let I ′ = Ig∗ Z and Q′ a minimal reduction of I ′ . Let Y ′ be the effective cycle on X ′ such that Q′ : I ′ = Ig∗ Z−Y ′ . Then Y = g ∗ Y ′ + C. Thus Z − Y = g ∗g∗ Z + mC − (g ∗Y ′ + C) = g ∗ (g∗ Z − Y ′ ) + (m − 1)C.  Remark 4.7. (1) If I = IZ is a pg -ideal, then the minimal good ideal containing I (the “good closure” of I) is obtained by “taking Q : I” several times (cf. Theorem 4.11). Namely, if I1 = Q : I and Q1 is a minimal reduction of I1 , then I2 = Q1 : I1 is again a pg -ideal. We obtain Qm : Im = Im for some m > 0. The smallest positive integer m with this property is given by m = max{b1 , . . . , bn }, where bi ’s are the integers in the proof of Theorem 4.6. (2) If A is a rational singularity, then Xn+1 in Theorem 4.6 is always the minimal resolution since we may regard CX = 0 (cf. [15, 5.1]). If A is a rational Gorenstein A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES 11 singularity (i.e., rational double point), then K = KX and Q : I coincides with the multiplier ideal J (I). In this case, we have core(I) = J (I 2 ) = IJ (I) by Lemma 4.1. Example 4.8. Let X0 be the minimal resolution and f : X → X0 the natural morphism. Assume that the exceptional divisor F of X0 is a nonsingular P rational curve and F = f (E1 ). For any ideal I = IZ represented by Z = ni Ei on X, the good closure of I is If∗ Z = In1 F = mn1 (cf. [1]). Since good ideals in a rational singularity are integrally closed by [15, 2.4], the set of good ideals in A is {mn | n ∈ Z>0 }. Let us consider an explicit example of the procedure in Remark 4.7 (1). Suppose that A = k[[x, y, z]]/(x2 − yz) and X is obtained by the blowing up at the nodal points of divX0 (x). We write E = E0 + E1 + E2 , where E02 = −4 and E12 = E22 = −1. Then K := KX/X0 = E1 + E2 and E is the maximal ideal cycle. Let W = E0 + 2(E1 + E2 ). Then IW = (x) + m2 since ℓA (A/IW ) = 3 by Kato’s Riemann-Roch formula. Fix an integer n and let Z = nE0 + 2n(E1 + E2 ). For 0 ≤ k ≤ n, let Zk = nE0 + (2n − k)(E1 + E2 ). Since Zk = (n − k)W + kE, Ik := IZk = ((x) + m2 )n−k mk . From Theorem 4.6, for any minimal reduction Qk of Ik , we obtain that Qk : Ik = Ik+1 for 0 ≤ k < n and Qn : In = In . The next theorem follows from Theorem 4.6. Theorem 4.9. There always exist good pg -ideals in any two-dimensional excellent normal local domain containing an algebraically closed field. Let I = IZ be a pg -ideal minimally represented on X. Then IZ is good if and only if every (−1)-curve on X intersects the cohomology cycle CX . Corollary 4.10. Assume that I is a pg -ideal. Then I is a good ideal if and only if core(II ′ ) = core(I) core(I ′ ) for any pg -ideal I ′ . Proof. Assume that I and I ′ are represented on X by pg -cycles Z and Z ′ , respectively, and that I is a good ideal. By Theorem 4.9, we may assume that Z ′ C < 0 for every (−1)-curve C on X which does not intersect CX ; then Z + Z ′ has also this property. Let Q′ (resp. Q′′ ) be a minimal reduction of I ′ (resp. II ′ ). By Theorem 4.6 (1), we obtain that Q′′ : II ′ = IZ+Z ′ −K and Q′ : I ′ = IZ ′ −K . Since core(I) = I 2 = I2Z by Corollary 4.5, it follows from Theorem 4.4 that core(II ′ ) = I2(Z+Z ′ )−K = I2Z+(2Z ′ −K) = core(I) core(I ′ ). The converse follows from Corollary 4.5.  From (1) of Theorem 4.6 and Lemma 4.1, we have the following result concerning Question 3.1 of §2. Theorem 4.11. Let I1 ⊂ I2 be pg -ideals, and let Qi be a minimal reduction of Ii (i = 1, 2). Then Q1 : I1 ⊂ Q2 : I2 and also core(I1 ) ⊂ core(I2 ). Question 4.12. Let (A, m) be a two-dimensional excellent normal local domain and let I1 ⊂ I2 be integrally closed m-primary ideals and let Qi be a minimal reduction of Ii for i = 1, 2. Assume that I2 is a pg -ideal (we do not assume that I1 is a pg -ideal). Is it true that core(I1 ) ⊂ core(I2 ) and that Q1 : I1 ⊂ Q2 : I2 ? 12 TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA 5. Existence of pg -ideal containing a given element of I. We show that for any g ∈ m there exists a pg -ideal containing g. In fact, we prove the following. Theorem 5.1. Let I be an integrally closed m-primary ideal and g an arbitrary element of I. Then there exists h ∈ I such that the integral closure of the ideal (g, h) is a pg -ideal. Proof. Suppose that I is represented by a cycle Z > 0 on a resolution X. We write divX (g) = ZX + HX , where ZX is a cycle and HX is the strict transform of the divisor H := divSpec A (g). Let CX be the cohomological cycle on X. Then, by Proposition 2.7, ZX is a pg -cycle if and only if (5.1) Supp CX ∩ Supp HX = ∅. By Proposition 2.6, taking blowing-ups at the intersection of the cohomological cycle and the strict transform of H successively, we may assume that the condition (5.1) is satisfied. Since ZX ≥ Z, we have IZX ⊂ I. Since OX (−ZX ) is generated, there exists h ∈ IZX such that g and h generate OX (−ZX ). Then we obtain that IZX = (g, h).  The idea for obtaining the pg -ideal in the proof above is used in the last paragraph of Example 3.5, where the element “h ∈ I” in Theorem 5.1 can be g +h′ with general element h′ ∈ m3 . Definition 5.2. Let h ∈ m. There exists a unique resolution f : X → Spec A such that CX and the strict transform H ⊂ X of divSpec A (h) have no intersection, and that f is minimal among the resolutions with these properties. Note that such a resolution is obtained by taking blowing-ups successively from the minimal resolution. Then Z := divX (h) − H is a pg -cycle by Proposition 2.7 and every (−1)curve C on X satisfies ZC < 0 and CX C < 0.We call IZ the pg -ideal associated with h. From now on, we assume that the following condition holds for any integrally closed m-primary ideal I ⊂ A: (C1) If h ∈ I is a general element and I is represented by Z on X, and if divX (h) = Z + H, then the divisor H is a disjoint union of nonsingular curves and each component of H intersects the exceptional set transversally. This condition holds in case the singularity is defined over a field of characteristic zero, since Bertini’s theorem can be applied to the image of H 0 (OX (−Z)) → H 0 (OEi (−Z)). Theorem 5.3. Let J = IM be an integrally closed m-primary ideal represented by a cycle M on a resolution Y → Spec A, which is obtained by taking the minimal resolution of the blowing-up of J. Assume that h ∈ J satisfies the condition divY (h) = M + H, where H is the strict transform of divSpec(A) (h) on Y . If I is the pg -ideal associated to h, then we have e(I) − e(J) ≥ CY H = −CY M and ℓA (J/I) ≤ −CY M, A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES 13 where the latter inequality is strict if J is not a pg -ideal. If, moreover, h ∈ J is a general element, then we have the equalities e(I) − e(J) = CY H = −CY M, ℓA (J/I) = CY H − pg (A) − h1 (OY (−M))  and in this case I is a maximal pg -ideal contained in J. In particular, every pg -ideal is associated with its general element. Proof. First note that by definition, J is a pg -ideal if pg (A) − h1 (OY (−M)) = 0, and this condition is equivalent to that CY M = 0 by Proposition 2.7. We prove e(I) − e(J) ≥ CY H = −CY M by induction on CY H = −CY M. Our assertion is obvious if CY H = 0. In order to construct a resolution X → Y such that I = IZ is represented by a cycle Z on X, we proceed by successive blowing-ups at points X = Yr → Yr−1 → . . . → Y1 → Y0 = Y and take anti-nef cycles Z0 = M, Z1 , . . . , Zr = Z so that divYi (h) = Zi + Hi , where Hi is the strict transform of H on Yi . Note that CX H = 0. We assume CY H > 0 and take a point P ∈ CY ∩ H. We also assume that H has multiplicity a at P . Let π : Y1 → Y be the blowing-up at P and put E0 = π −1 (P ). Then Z1 = π ∗ (M) + aE0 , since divY1 (h) = π ∗ (divY (h)) = π ∗ (M) + aE0 + H1 = Z1 + H1 . We have seen in Proposition 2.6 that CY1 = π ∗ (CY ) − E0 . Since CY1 H1 = CY H − a < CY H, we may assume −Z 2 − (−Z1 )2 ≥ CY1 H1 by our induction hypothesis. Also, we have (−Z12 ) − (−M 2 ) = a2 . Hence we have (−Z12 ) − (−M 2 ) ≥ CY H − CY1 H1 with equality if and only if a = 1. If h ∈ J is a general element, by the condition (C1), we have a = 1 at every point P ∈ CY ∩ H and hence equality e(I) − e(J) = CY H. Furthermore, from the exact sequence 0 → OY1 (−Z1 ) → OY1 (−π ∗ (M)) → OE0 → 0, we have I1 := H 0 (Y1 , OY1 (−Z1 )) ⊂ IM with ℓA (IM /I1 ) ≤ 1 and h1 (Y1 , OY1 (−Z1 )) = h1 (Y, OY (−M)) or h1 (Y1 , OY1 (−Z1 )) = h1 (Y, OY (−M)) + 1, the latter holds if and only if I1 = IM . Hence we have the equality  ℓA (J/I) = CY H − pg (A) − h1 (OY (−M)) . Now, assume e(I) − e(J) = CY H and I ′ is a pg -ideal such that I ⊂ I ′ ⊂ J. We may assume that I = IZ and I ′ = IZ ′ with Z ≥ Z ′ are represented on a resolution X and we have a morphism φ : X → Y . Since I ′ ⊂ J, we have Z ′ ≥ φ∗ (M). Since M = φ∗ (Z) ≥ φ∗ (Z ′ ) ≥ φ∗ (φ∗ (M)) = M, we must have φ∗ (Z ′ ) = M. Take a general element h′ ∈ I ′ so that divX (h′ ) = Z ′ + H̃ ′, where H̃ ′ is the strict transform of divSpec(A) (h′ ) on X. Then we have divY (h′ ) = φ∗ (divX (h′ )) = M + H ′ , where H ′ = φ∗ (H̃ ′ ), and we have CY H ′ = −CY M. Since I ′ is a pg -ideal, we must have CX H̃ ′ = 0. By the argument as above, we have e(I ′ ) − e(J) ≥ CY H ′ = −CY M = e(I) − e(J). Since I ⊂ I ′ , we have I ′ = I and we have shown that I is a maximal pg -ideal contained in J.  14 TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA Corollary 5.4. Let I be a maximal pg -ideal of A. Then I is a good ideal with e(I) = e(m) − CX MX and µA (I) := ℓA (I/Im) = e(m) + 1, where f : X → Spec A is any resolution such that m and I are represented on X and mOX = OX (−MX ). Furthermore if A is Gorenstein, then ℓA (A/I) = e(I)/2 = e(m) + pa (MX ) − 1. Proof. We use the notation above and assume that J = IM = m. By Remark 4.7 (1), I is a good ideal. Let φ : X → Y be the natural morphism. Since φ∗ M = MX and φ∗ CY = CX + D for some cycle D ≥ 0 with φ∗ (D) = 0 by Proposition 2.6, we have CY M = (CX + D)(φ∗ M) = CX (φ∗ M) = CX MX . Hence the first equality follows from Theorem 5.3. Since Z = φ∗ M + D ′ with a cycle D ′ ≥ 0 satisfying φ∗ (D) = 0 and ZMX = (φ∗ M)2 = M 2 , it follows from [15, 6.2] that µA (I) = −M 2 + 1 = e(m) + 1. Suppose that A is Gorenstein. Then we may assume that KX and KY are cycles. It follows from Remark 2.9 and [15, 4.2] that ℓA (A/I) = −Z 2 /2 and KX Z = 0. By Proposition 2.6, there exists an effective cycle C ′ such that KY = −CY + C ′ and Supp CY ∩ Supp C ′ = ∅, and KX + CX = φ∗ (KY + CY ). Then we obtain that (KY + CY )M = φ∗ (KY + CY )Z = (KX + CX )Z = 0. Thus CY M = −KY M. Using the formulas above and pa (M) = (M 2 + KY M)/2 + 1, we obtain e(I) = −M 2 + KY M = 2(−M 2 ) + M 2 + KY M = 2(e(m) + pa (M) − 1). Clearly, pa (M) = pa (MX ), since φ∗ M = MX . Hence we obtain the last assertion.  Example 5.5. Let C be aL nonsingular curve with genus g and D a divisor on L C with deg D = e > 0. Let R = n≥0 Rn , where Rn = H 0 (OC (nD)), and m = n≥1 Rn . Let a = a(R), where  a(R) = max n ∈ Z H 1 (OC (nD)) 6= 0 (cf. [23, (2.2)]). Assume that a ≥ 0, aD ∼ KC , and that R is generated by R1 as R0 -algebra. Then R is Gorenstein by [23, (2.9)]. Let Y → Spec R be the blowing up of m and E ⊂ Y the exceptional set; we have E ∼ = C. Then Y is the minimal resolution with E 2 = −e and m is represented by M := E. Since R is Gorenstein, there exists an integer k such that KY = −kE. From (KY + E)E = deg KC = ae, we have KY = −CY = −(a + 1)E. We have −M 2 = e, CY M = (a + 1)e. Let I be a pg -ideal associated with a general element h ∈ m. Since pa (M) = g and h1 (OC ((a + 1)D)) = 0, from Theorem 5.3, we obtain that µR (I) = e + 1, ℓR (R/I) = e + g − 1 = h0 (OC ((a + 1)D)). We will show that I = ma+2 + (h). Let X → Spec R (A is replaced by R), Z, and H be as in Definition 5.2, and let φ : X → Y be the natural morphism. To obtain X from Y , we need a + 1 blowing ups at the intersection of the exceptional set and each irreducible component of the strict transform of divSpec R (h) (cf. the proof of Theorem 5.1). Since the coefficient of the irreducible component of the exceptional set of X intersecting H in the cycle Z is a + 2, we have (a + 2)φ∗ M ≥ Z. Therefore, A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES 15 Pa+1 ma+2 + (h) ⊂ I. L Note that Rn ∼ = mn /mn+1 and ℓR (R/ma+2 ) = n=0 dim Rn . Since h ∈ m \ m2 and n≥0 mn /mn+1 is a domain, the homomorphism ×h R/ma+1 −−−−→ (h) + ma+2 /ma+2 is bijective. Therefore ℓR (R/(h) + ma+2 ) = ℓR (ma+1 /ma+2 ) = ℓR (Ra+1 ) = h0 (OC ((a + 1)D)) = ℓR (R/I). Hence I = (h) + ma+2 . Acknowledgement. The authors thank the referee for careful reading of the paper and helpful comments. References [1] Michael Artin, On isolated rational singularities of surfaces, Amer. J. Math. 88 (1966), 129– 136. [2] Alberto Corso, Claudia Polini, and Bernd Ulrich, The structure of the core of ideals, Math. Ann. 321 (2001), no. 1, 89–105. [3] , Core and residual intersections of ideals, Trans. Amer. Math. Soc. 354 (2002), no. 7, 2579–2594 (electronic). [4] Steven Dale Cutkosky, A new characterization of rational surface singularities, Invent. Math. 102 (1990), no. 1, 157–177. [5] Jean Giraud, Improvement of Grauert-Riemenschneider’s theorem for a normal surface, Ann. Inst. Fourier (Grenoble) 32 (1982), no. 4, 13–23 (1983). [6] Shiro Goto, Sin-Ichiro Iai, and Kei-Ichi Watanabe, Good ideals in Gorenstein local rings, Trans. Amer. Math. Soc. 353 (2001), no. 6, 2309–2346 (electronic). [7] Craig Huneke, Hilbert functions and symbolic powers , Michigan Math. J. 34 (1987), 293–318. [8] Craig Huneke and Irena Swanson, Cores of ideals in 2-dimensional regular local rings, Michigan Math. J. 42 (1995), no. 1, 193–208. [9] Craig Huneke and Ngô Viêt Trung, On the core of ideals, Compos. Math. 141 (2005), no. 1, 1–18. [10] Eero Hyry and Karen E. Smith, On a non-vanishing conjecture of Kawamata and the core of an ideal, Amer. J. Math. 125 (2003), no. 6, 1349–1410. [11] Shiroh Itoh, Integral closure of ideals generated by regular sequence, J. Algebra 117 (1988), 390–401. [12] Masahide Kato, Riemann-Roch theorem for strongly pseudoconvex manifolds of dimension 2, Math. Ann. 222 (1976), no. 3, 243–250. [13] Kyungyong Lee, A short note on containment of cores, Comm. Algebra 36 (2008), no. 10, 3890–3892. [14] Joseph Lipman, Rational singularities, with applications to algebraic surfaces and unique factorization, Inst. Hautes Études Sci. Publ. Math. (1969), no. 36, 195–279. [15] Tomohiro Okuma, Kei-ichi. Watanabe, and Ken-ichi. Yoshida, Good ideals and pg -ideals in two-dimensional normal singularities, Manuscripta Math. 150 (2016), no. 3-4, 499–520. [16] , Rees algebras and pg -ideals in a two-dimensional normal local domain, Proc. Amer. Math. Soc. 145 (2017), no. 1, 39–47, arXiv:1511.00827. [17] Claudia Polini and Bernd Ulrich, A formula for the core of an ideal, Math. Ann. 331 (2005), no. 3, 487–503. [18] David Rees and Judith D. Sally, General elements and joint reductions, Michigan Math. J. 35 (1988), no. 2, 241–254. [19] Miles Reid, Chapters on algebraic surfaces, Complex algebraic geometry, IAS/Park City Math. Ser., vol. 3, Amer. Math. Soc., Providence, RI, 1997, pp. 3–159. 16 TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA [20] Irena Swanson and Craig Huneke, Integral Closure of Ideals, Rings, and Modules, London Mathematical Society, Lecture Note Series 336, Cambridge University Press, Cambridge/New York/Melbourne/Madrid/ Cape Town/Singapore/Sãn Paulo, 2006. [21] Masataka Tomari, A survey on normal surface singularities (in Japanese), Algebraic Geometry and Topology of Degenerations, Singularities and Coverings (Tagajo, March 1996). [22] Jonathan M. Wahl, Vanishing theorems for resolutions of surface singularities, Invent. Math. 31 (1975), no. 1, 17–41. [23] Kei-ichi Watanabe, Some remarks concerning Demazure’s construction of normal graded rings, Nagoya Math. J. 83 (1981), 203–211. (Tomohiro Okuma) Department of Mathematical Sciences, Faculty of Science, Yamagata University, Yamagata, 990-8560, Japan. E-mail address: [email protected] (Kei-ichi Watanabe) Department of Mathematics, College of Humanities and Sciences, Nihon University, Setagaya-ku, Tokyo, 156-8550, Japan E-mail address: [email protected] (Ken-ichi Yoshida) Department of Mathematics, College of Humanities and Sciences, Nihon University, Setagaya-ku, Tokyo, 156-8550, Japan E-mail address: [email protected]
0math.AC
Modelling Biochemical Operations on RNA Secondary Structures⋆ arXiv:cs/0306016v1 [cs.CE] 3 Jun 2003 Mercè Llabrés and Francesc Rosselló Dept. of Mathematics and Computer Science, Research Institute of Health Science (IUNICS), University of the Balearic Islands, 07122 Palma de Mallorca (Spain) {merce.llabres,cesc.rossello}@uib.es Abstract. In this paper we model several simple biochemical operations on RNA molecules that modify their secondary structure by means of a suitable variation of Große-Rhode’s Algebra Transformation Systems. 1 Introduction Biochemical processes are responsible for most of the information processing that takes place inside the cell. In the recent years, several representations and simulations of specific biochemical processes have been proposed using well known rewriting formalisms borrowed from Theoretical Computer Science. Let us mention, for instance, Fontana’s lambda calculus chemistry [3,4], recently revised by Müller [9] (for a recent survey on artificial chemistry, see [14]), the stochastic Petri net approach [5], the π-calculus representation of biochemical processes carried out by networks of proteins [10], and the graph replacement approach to DNA operations [8]. In the latter, an ad hoc graph replacement formalism is developed to formalize DNA biochemical operations like annealing or denaturing, by considering DNA double strands to be special graphs. There is another popular line of research in theoretical biochemistry that aims to represent the three-dimensional structure of biopolymers, and specially of DNA and RNA, by means of different kinds of formal grammars; see, for instance, [7,13] for two surveys on this topic. The ultimate goal of such a representation is to understand how the three-dimensional structure of a biopolymer is determined from its sequence of monomers (for instance, how the sequence of ribonucleotides of an RNA molecule determines its secondary structure; see below for the relevant details of RNA’s biochemistry), and how this structure evolves when the biopolymer is modified through biochemical processes. Sooner or later, this two lines of research should intersect, and the main goal of this paper is to move these two lines of research a step closer. We formalize some simple biochemical processes on RNA molecules, like for instance ⋆ This work has been partially supported by the Spanish DGES, grant BFM2000-1113C02-01. ribonucleotide removals or mutations, and their effect on their three-dimensional structures by means of a variant of Große Rhode’s Algebra Transformation Systems (ATS) [6] on partial algebras [1] representing RNA biomolecules. Before entering into more details, it is time to introduce a little biochemistry. As probably everybody knows, RNA molecules, together with DNA molecules and proteins, form the molecular basis of life. An RNA molecule can be viewed as a chain of ribonucleotides, and each ribonucleotide is characterized by the base attached to it, which can be either adenine (A), cytosine (C), guanine (G) or uracil (U ). An RNA molecule is uniquely determined by the sequence of bases along its chain, and it has a definite orientation. Such an oriented chain of ribonucleotides is called the primary structure of the RNA molecule. In the cell and in vitro, each RNA molecule folds into a specific threedimensional structure that determines its biochemical activity. To determine this structure from the primary structure of the molecule is one of the main open problems in computational biology, and partial solutions have been proposed using Stochastic Context Free Grammars and Dynamic Programming, among other tools; see, for instance, [2, Chaps. 9, 10]. This three-dimensional structure is held together by weak interactions called hydrogen bonds between pairs of non-consecutive bases.1 Almost all these bonds form between complementary bases, i.e., between A and U and between C and G, but other pairings do also occur sporadically. For simplicity, in this paper we shall only consider pairings between complementary bases. In most representations of RNA molecules, the detailed description of their three-dimensional structure is overlooked and the attention is focused on its secondary structure: the set of its base pairs, or contacts. Secondary structures are actually a simplified representation of RNA molecules’ three-dimensional structure, but that is enough in some applications, as different levels of “graining” are suitable for different problems. Two restrictions are usually added to the definition of secondary structure: – If two bases bi and bj are paired, then neither bi or bj can bond with any other base; this restriction is called the unique bonds condition. – If contacts exist between bases bi and bj and between bases bk and bl , and if bk lies between bi and bj , then bl also lies between bi and bj ; this restriction is called the no-pseudoknots condition. The unique bonds condition simply captures the fact that the “bond” between two consecutive bases is of different nature, as a part of the molecule’s backbone. The no-pseudoknots condition is usually added in order to enable the use of dynamic programming methods to predict RNA secondary structures and, although real three-dimensional RNA structures have (pseudo)knots, we impose it here to show the scope of our approach: if pseudoknots are allowed, one simply has to allow them in the algebraic representation of RNA secondary structures 1 Actually, for a hydrogen bond to be stable, the bases involved in it must be several nucleotides apart, but for simplicity we shall only consider the restriction that they must be non-consecutive. and to remove the corresponding production rules from the rewriting system. Thus, This allows traditionally to represent an RNA molecule as a labelled graph, with nodes representing the ribonucleotides, and their labels denoting the bases attached to them, and arcs of two different kinds: ones representing the order of the bases in the primary structure (the backbone) and the rest representing the bonds that form the secondary structure (the contacts) [11,12]. Our representation is slightly different: the backbone is represented by a partial algebra corresponding, essentially, to a labelled finite chain, and then the contacts are specified as arcs of a graph on the nodes of the backbone. There are some biochemical operations that can be carried out on an RNA molecule. For instance, a ribonucleotide can be added or removed somewhere in the primary structure, a contact can form between two complementary bases, or it can be removed, and a base can mutate into another base. These operations may have collateral effects: for instance, if a base mutates into another one and it was involved in a contact, then this contact will disappear, as the corresponding bases will no longer be complementary, and if a nucleotide is removed and as a consequence two nucleotides forming a contact become consecutive, then this contact will also break. It is precisely when we tried to specify these side effects that we were not able to use simple graph transformation systems in an easy way, and we decided to use the ATS approach. ATS is a very powerful algebra rewriting formalism, introduced by M. Große-Rhode in 1999 in order to specify the behavior of complex states software systems. It is operationally described, but not categorically formalized, and it takes care of side effects of the application of rules, similar to those found in our work. Unfortunately, even the ATS formalism as defined in [6], which was designed with software engineering specification applications in mind, was not suitable, as it stands, for our purposes. Thus we have slightly modified a simplified version of it, and we have dubbed the resulting formalism Withdrawal-based Algebra Transformation Systems (WATS). The reason is that, in our approach, the inconsistencies are eliminated by retreating, i.e., by removing, in a controlled way, the elements and operations that produce them, while in the original ATS approach the inconsistencies were eliminated by adding operations and identifying points. The rest of this paper is organized as follows. In Section 2 we represent RNA molecules as suitable partial algebras, in Section 3 we briefly introduce the WATS formalism, and then in Section 4 we show how to represent the aforementioned biochemical operations on RNA molecules by means of WATS production rules. A final section on Conclusions closes the paper. 2 RNA Molecules as Partial Algebras Roughly speaking, we represent the primary structure of an RNA molecule as a chain n of length n ∈ N with a label in {A, C, G, U } attached to each element of the chain, representing the base attached to the corresponding ribonucleotide, and its secondary structure by means of ordered pairs in n × n. Let Σps be the following many-sorted signature: Sorts : N at, Bases Opns : suc : N at → N at F irst, Last :→ N at A, C, G, U :→ Bases minor : N at, N at → N at label : N at → Bases κ : Bases → Bases An RNA primary structure is a finite partial Σps -algebra P = (PN at , PBases ; F irstP , LastP , AP , C P , GP , U P , sucP , minorP , labelP , κP ) such that: i) (PN at ; F irstP , LastP , sucP ) is a chain with successor operation sucP , first element F irstP and last element LastP . ii) The operation minorP models the strict minority relation on this chain: minorP (x, y) = x if and only if there exists some n ≥ 1 such that y = (sucP )n (x). iii) The values of the nullary operations AP , C P , GP , U P are pairwise different, PBases = {AP , C P , GP , U P }, and on this set the operation κP is given by the involution κP (AP ) = U P , κP (U P ) = AP , κP (C P ) = GP , κP (GP ) = C P . iv) The operation labelP is total. Notice that all these conditions except the last one cannot be specified through quasi-equations, since they are not satisfied by a trivial (with only one element of each sort) total Σps -algebra. Let Σss be now the signature containing Σps and, in addition, the following sorts and operation symbols: Sorts : Contacts Opns : p1 : Contacts → N at p2 : Contacts → N at An RNA secondary structure is a partial Σss -algebra B = (BN at , BBases , BContacts ; B F irstB , LastB , AB , C B , GB , U B , sucB , minorB , labelB, κB , pB 1 , p2 ) whose Σps -reduct is an RNA primary structure and it satisfies moreover the following quasi-equations: B (1) pB 1 and p2 are total B (2) pB 1 (x) = p1 (y) ⇒ x = y B (3) pB 2 (x) = p2 (y) ⇒ x = y B (4) pB 1 (x) = p2 (y) ⇒ x = y B B B (5) minor(succB (pB 1 (x)), p2 (x)) = succ (p1 (x)) B B B B B (6) minor(pB 1 (x), p1 (y)) = p1 (x) ∧ minor(p1 (y), p2 (x)) = p1 (y) B B B =⇒ minor(p2 (y), p2 (x)) = p2 (y) B B (7) κB (labelB(pB 1 (x))) = label (p2 (x)) In such an RNA secondary structure, each element c of sort Contacts repreB sents, of course, a contact between nucleotides pB 1 (c) and p2 (c). Equations (2), (3) and (4) represent the unique bonds condition, equation (5) represents the fact that there cannot exist a contact between a nucleotide and itself or its successor in the primary structure, equation (6) represents the no-pseudoknots condition, and equation (7) represents the fact that a contact can only pair complementary bases. Notice that, if we simply omit equation (6) then, pseudoknots are allowed in the representation of RNA molecules. Let Γss = (Σss , CE) be the specification whose set of consistence equations CE are the quasi-equations (1) to (7) above. Let AlgΓss the category whose objects are all partial Γss -algebras, i.e., those partial Σss -algebras satisfying equation (1) to (7), and the morphisms between them are the plain homomorphisms, and let AlgRN A be the full subcategory of AlgΓss supported on the RNA secondary structures. 3 Withdrawal-based Σss-Algebra Transformation Systems Our Withdrawal-based Algebra Transformation Systems (WATS) are a modification of a simplified version of the Algebra Transformation Systems (ATS) introduced in [6]. This modification only affects the last step in the definition of the application of a rewriting rule through a matching, and therefore all definitions previous to that one are the same as in the original ATS formalism. Since we are only interested in rewriting RNA secondary structures, we shall only give the main definitions for the signature Σss introduced in the previous section. So, to simplify the notations, let us denote by S, Ω and η the set of sorts, the set of operation symbols and the arity function of the signature Σss . For every ϕ ∈ Ω, set η(ϕ) = (ω(ϕ), σ(ϕ)) ∈ S ∗ × S. A Σss -presentation is a pair P = (PS , PE ) where PS = (Ps )s∈S is an Sset, whose elements will be called generators, and PE is a set of equations with variables in PS t = t′ , t, t′ ∈ TΣss (PS )s , s ∈ S. A special type of equations are the function entries, of the form ϕ(a) = b, ω(ϕ) ϕ ∈ Ω, a ∈ PS , b ∈ Pσ(ϕ) . A presentation is functional when all its equations are function entries, and a functional presentation is consistently functional when for every ϕ ∈ Ω and ω(ϕ) a ∈ PS , there is at most one function entry of the form ϕ(a) = b in PE . Let p : PS → PS′ be a mapping of S-sets. If e is an equation t = t′ with ′ t, t ∈ TΣss (PS )s , then we shall denote by e[p] the equation t(p) = t′ (p) where t(p), t′ (p) ∈ TΣss (PS′ )s are the terms obtained from t and t′ , respectively, by replacing all variables in them by their corresponding images under p. In particular, if e is the function entry ϕ(a) = b, then e[p] stands for the function entry ϕ(p(a)) = pσ(ϕ) (b). Given a mapping of S-sets p : Ps → Ps′ and any set E of equations with variables in PS , let E[p] = {e[p] | e ∈ E}. A morphism of Σss -presentations p : (PS , PE ) → (PS′ , PE′ ) is then a mapping of S-sets p : PS → PS′ such that PE [p] ⊆ PE′ . A Σss -rewriting rule is a pair of Σss -presentations, written r = (Pl ←→ Pr ), where Pl = (Xl , El ) and Pr = (Xr , Er ) are functional presentations. Informally, the left-hand side presentation in such a rule specifies the elements and operations that must be removed from the algebra which the rule is applied to, while its right-hand side presentation specifies the elements and operations to be added. The generators that occur in a rule play the role of variables (and therefore we shall usually call them variables): those appearing in the left-hand side presentation must be matched into the algebra to rewrite, and those appearing in the right-hand side presentation must be matched into the resulting algebra, in such a way that if a variable occurs in both parts of a rule, its image must be preserved. In the sequel, we shall assume that all variables that occur in rewriting rules are taken from a universal S-set X that is globally fixed and disjoint from all sets of operation symbols in the signatures we use. We shall also assume that X is large enough to contain equipotent copies of the carrier sets of all algebras we are interested in. For every Σss -rewriting rule r = (Pl ←→ Pr ), with Pl = (Xl , El ) and Pr = (Xr , Er ), let: Xr0 = Xr − Xl , Xl0 = Xl − Xr , 0 El = El − Er , Er0 = Er − El . For every Γss -algebra A = (A, (ϕA )ϕ∈Ωss )), let AS = A and Ae = {ϕ(a) = b | ϕ ∈ Ωss , a ∈ dom ϕA , ϕA (a) = b}. A match m for a Σss -rewriting rule r = (Pl ←→ Pr ) in A is simply a presentation morphism m : Pl → (AS , AE ). The extension m∗ : Xl ∪ Xr → AS ⊔ Xr0 of m is defined by2 ∗ m (x) =  m(x) ∈ AS if x ∈ Xl x ∈ Xr0 if x ∈ Xr0 = Xr − Xl The application of r to A through m rewrites then A into the partial Γss algebra B defined, step by step, as follows: 1) Set BS = (AS − m(Xl0 )) ⊔ Xr0 . This step removes from A the elements that are images of elements in Xl that do no longer belong to Xr , and adds to it the elements in Xr that did not belong to Xl . 2) Set BE = (AE − El0 [m]) ∪ Er0 [m∗ ]. This step removes from A the operations that are images of function entries in El that do no longer belong to Er , and adds to it the equations in Er that did not belong to El , with variables in BS . 3) Since the presentation (BS , BE ) is functional, it defines a partial Σss -algebra with carrier set B = BS by simply translating the function entries in BE into operations; if this presentation is not consistently functional, then we must identify elements in B in order to remove inconsistencies. This step can be formally described by means of a functor left adjoint to a functor that sends every Σss -algebra to its presentation (AS , AE ). 4) If the Σss -algebra defined in this way satisfies equations (1) to (7), we are done. Otherwise, there are two possibilities: – Every contact x ∈ BContacts that violates equations (1), (5) or (7) is removed. – After performing all removals in the previous step, if there are still pairs of contacts x, y ∈ BContacts that violate equations (2), (3), (4) or (6), then, if one of them comes from Xr0 and the other comes from AS , the one from Xr0 is removed and the other one preserved, and otherwise both are removed. It is in step (4) where the main difference between Große-Rhode’s original ATS formalism and our WATS formalism lies. In ATS, the Σss -algebra obtained in (3) would be forced to satisfy equations (1) to (7) by taking its universal solution in AlgΓss , and thus adding operations and identifying elements. In our formalism, violations of equations (1) to (7) are obviated by simply removing in a controlled way the contacts that yield them. 4 Biochemical operations modelled by means of WATS The biochemical operations considered in this paper are the addition, deletion and mutation of a ribonucleotide and the addition and deletion of a contact. Each of these biochemical operations can be modelled as a rewriting step of a 2 As always, we identify any set with its image into its disjoint union with any other set. WATS by the applications of a Σss -rewriting rule to a RNA secondary structure. The rewriting rules that model these biochemical operations are the following ones. Adding a nucleotide: We have to consider three different cases, corresponding to adding the new nucleotide at the beginning of the chain, at the end, or in the middle of it. In this case, each rule must be understood as having a parameter x which corresponds to the base attached to the new nucleotide. So, there are four different values of this parameter, the nullary operation symbols A, U , C and G. – Rule Padd−base−f irst (x) has: • as Pl the set of variables Xl = {k1 } of sort N at and the set of equations El = {F irst = k1 }; • as Pr the set of variables Xr = {t, k1 , k0 }, of sorts t ∈ Bases and k1 , k0 ∈ N at, and the set of equations Er = {F irst = k0 , suc(k0 ) = k1 , label(k0 ) = t, x = t}. – Rule Padd−base−last (x) has • as Pl the set of variables Xl = {kn } of sort N at and the set of equations El = {Last = kn }; • as Pr the set of variables Xr = {t, kn+1 , kn }, of sorts t ∈ Bases and kn+1 , kn ∈ N at, and the set of equations Er = {Last = kn+1 , suc(kn ) = kn+1 , label(kn+1) = t, x = t}. – Rule Padd−base−middle (x) has: • as Pl the set of variables Xl = {ki , kj } of sort N at and the set of equations El = {suc(ki ) = kj }; • as Pr the set of variables Xr = {t, ki , kj , k}, of sorts t ∈ Bases and ki , kj , k ∈ N at, and the set of equations Er = {suc(ki ) = k, suc(k) = kj , label(k) = t, x = t}. Remove a nucleotide: We have to consider again three different cases, corresponding to removing the nucleotide at the beginning of the chain, at the end, or in the middle of it. – Rule Pdel−base−f irst has: • as Pl the set of variables Xl = {k1 , k0 }, both of sort N at, and the set of equations El = {F irst = k0 , suc(k0 ) = k1 }; • as Pr the set of variables Xr = {k1 } of sort N at and the set of equations Er = {F irst = k1 }. – Rule Pdel−base−last has: • as Pl the set of variables Xl = {kn−1 , kn }, both of sort N at, and the set of equations El = {Last = kn , suc(kn−1 ) = kn }; • as Pr the set of variables Xr = {kn−1 } of sort N at and the set of equations Er = {Last = kn−1 }. – Rule Pdel−base−middle has: • as Pl the set of variables Xl = {ki , kj , kl }, all of them of sort N at, and the set of equations El = {suc(ki ) = kl , suc(kl ) = kj }; • as Pr the set of variables Xr = {ki , kj } of sort N at and the set of equations Er = {suc(ki ) = kj }. Mutating a base: The mutation of a base is specified by just redefining the operation label. Thus we consider the following rule: – Rule Pmutation has: • as Pl the set of variables Xl = {x, y, k}, of sorts x, y ∈ Bases and k ∈ N at, and the set of equations El = {label(k) = x}; • as Pr the set of variables Xr = {x, y, k}, of sorts x, y ∈ Bases and k ∈ N at and the set of equations Er = {label(k) = y}. Adding a contact: To add a contact we simply add a new element of sort Contact and the projections from it to the nucleotides it bonds. – Rule Padd−contact has: • as Pl the set of variables Xl = {x, y, ki , ki+1 , kj }, of sorts x, y ∈ Bases and ki , ki+1 , kj ∈ N at, and the set of equations El = {suc(ki ) = ki+1 , minor(ki+1 , kj ) = ki+1 , κ(x) = y, κ(y) = x, label(ki ) = x, label(kj ) = y}; • as Pr the set of variables Xr = {x, y, ki , ki+1 , kj , c}, of sorts x, y ∈ Bases, ki , ki+1 , kj ∈ N at and c ∈ Contacts, and the set of equations Er = {suc(ki ) = ki+1 , minor(ki+1 , kj ) = ki+1 , κ(x) = y, κ(y) = x, p1 (c) = ki , p2 (c) = kj , label(ki ) = x, label(kj ) = y}. Remove a contact: To remove a contact we simply delete it. – Rule Pdel−contact has: • as Pl the set of variables Xl = {ki , kj , c}, of sorts ki , kj ∈ N at and c ∈ Contacts, and the set of equations El = {p1 (c) = ki , p2 (c) = kj }; • as Pr the set of variables Xr = {ki , kj }, both of sort N at, and the set of equations Er = ∅. It is not difficult to check that an RNA secondary structure is always rewritten by the application of any one of these rules through any matching into an RNA secondary structure, and that in each case their effect is the desired one. This must be done rule by rule and case by case. 5 Conclusion We have modelled several simple biochemical operations on RNA molecules that modify their secondary structure by means of rewriting rules in a modified version of the Algebra Transformation Systems of Große-Rhode, which we have dubbed Withdrawal-based Algebra Transformation Systems. This modification has been made ad hoc for algebras representing RNA secondary structures, but we feel that the philosophy of removing inconsistencies by retreating should have applications in other contexts, and could probably be formalized for algebras over arbitrary specifications. In this paper we have made some simplifications on the RNA secondary structure that could perfectly be avoided. For instance, if we want to allow contacts between pairs of basis other than the usual complementary pairs, like for instance between G and U (they are called wobble pairs, not so uncommon), then we only have to replace the involution κ by a symmetric relation on the carrier of sort Bases. And if we want to impose that two bases paired by a contact must be at least at a fixed distance, we only have to modify in a suitable way equation (5). There are also other collateral effects that could, and probably should, be specified. For instance, isolated contacts tend to break, and pseudoknots should be allowed under certain circumstances. References 1. Burmeister, P., A Model Theoretic Oriented Approach to Partial Algebras. Mathematical Research 32, Akademie-Verlag (1986). 2. Durbin, R., Eddy, S., Krogh, A., Mitchison, G., Biological Sequence Analysis. Cambrideg Univ. Press (1998). 3. Fontana, W., “Algorithmic chemistry.” In Artificial Life II (Addison-Wesley, 1992), 159–210. Also Technical Report LA-UR 90-1959, Los Alamos National Lab. (1990). 4. Fontana, W., Buss, L. W. “The barrier of objects: from dynamical systems to bounded organization.” In Boundaries and Barriers (Addison-Wesley, 1996), 56– 116. 5. Goss, P., Peccoud, J. “Quantitative modeling of stochastic systems in molecular biology by using stochastic Petri nets.” Proc. Nat. Acad. Sicences USA 95 (1998), 6750–6755. 6. Große-Rhode, M. “Specification of State Based Systems by Algebra Rewrite Systems and Refinements.” Technical Report 99-04, TU Berlin (March 1999). 7. Mayoh, B. “DNA Pattern multigrammars.” Technical Report (1994). 8. McCaskill, J., Niemann, U. “Graph replacement chemistry for DNA processing.” In Proc. DNA6: 6th International Meeting on DNA based computers, DIMACS Series in Discrete Mathematics and Theoretical Computer Science (AMS, to appear), 89–99. 9. Müller, S. Functional Organization in Molecular Systems and the λ-calculus. PhD Thesis, Univ. Wien (1999). 10. Regev, A., Silverman, W., Shapiro, E. “Representation and simulation of biochemical processes using the π-calculus process algebra.” In Proc. Pacific Symposyum on Biocomputing 2001 (2001), 459–470. 11. C. Reidys, P. F. Stadler, Bio-molecular shapes and algebraic structures. Computers & Chemistry 20 (1996), 85–94. 12. P. Schuster, P. F. Stadler, Discrete models of biopolymers. Univ. Wien TBI Preprint No. pks-99-012 (1999). 13. Searls, D. B. “Formal Language and Biological Macromolecules”. In Mathematical Support for Molecular Biology, DIMACS Series in Discrete Mathematics and Theoretical Computer Science 47 (AMS, 1999), 117–140. 14. Speroni di Fenizio, P. “Artificial Chemistries.” Bulletin EATCS 76 (February 2002), 128–141.
5cs.CE
Generalizing the Convolution Operator to extend CNNs to Irregular Domains Jean-Charles Vialatte1,2 , Vincent Gripon2 , Grégoire Mercier2 arXiv:1606.01166v4 [cs.LG] 25 Oct 2017 1 Cityzen Data Guipavas, Brittany, France 2 Telecom Bretagne Brest, Brittany, France 1 2 [email protected] {jc.vialatte, vincent.gripon, gregoire.mercier}@telecom-bretagne.eu Abstract Convolutional Neural Networks (CNNs) have become the state-of-the-art in supervised learning vision tasks. Their convolutional filters are of paramount importance for they allow to learn patterns while disregarding their locations in input images. When facing highly irregular domains, generalized convolutional operators based on an underlying graph structure have been proposed. However, these operators do not exactly match standard ones on grid graphs, and introduce unwanted additional invariance (e.g. with regards to rotations). We propose a novel approach to generalize CNNs to irregular domains using weight sharing and graph-based operators. Using experiments, we show that these models resemble CNNs on regular domains and offer better performance than multilayer perceptrons on distorded ones. 1 Introduction CNNs[1] are state-of-the-art for performing supervised learning on data defined on lattices [2]. Contrary to classical multilayer perceptrons (MLPs) [3], CNNs take advantage of the underlying structure of the inputs. When facing data defined on irregular domains, CNNs cannot always be directly applied even if the data may present an exploitable underlying structure. An example of such data are spatio-temporal time series generated by a set of Internet of Things devices. They typically consist of datapoints irregularly spaced out on a Euclidean space. As a result, a graph G can be defined where the vertices are the devices and the edges connect neighbouring ones. Other examples include signals on graphs including brain imaging, transport networks, bag of words graphs. . . In all these examples, a signal can generally be seen as a vector in Rd where d is the order of the graph. As such, each vertex is associated with a coordinate, and the edges weights represent some association between the corresponding vertices. Disregarding the graph G, MLPs can be applied on these datasets. We are interested in defining convolutional operators that are able to exploit G as well as a possible embedding Euclidean space. Our motivation is to imitate the gain of performance allowed by CNNs over MLPs on irregular domains. In graph signal processing, extended convolutional operators using spectral graph theory [4] have been proposed [5]. These operators have been applied to deep learning [6] and obtain performance similar to CNNs on regular domains, despite the fact they differ from classical convolutions. However, for slightly distorted domains, the obtained operators become non-localized, thus failing taking account of the underlying structure. 1 We propose another approach that generalizes convolutional operators by taking into account G. Namely, we make sure that the proposed solution has properties inherent to convolutions: linearity, locality and kernel weight sharing. We then apply it directly to the graph structure. We use it as a substitution of a convolutional layer in a CNN and stress our resulting technique on comparative benchmarks, showing a significant improvement compared with a MLP. The obtained operator happens to exactly be the classical convolutional one when applied on regular domains. The outline of the paper is as follows. In Section 2, we discuss related work. In Section 3 we introduce our proposed operator. In Section 4 we explain how to apply it to CNN-like structures. Section 5 contains the experiments. Section 6 is a conclusion. 2 Related Works For graph-structured data, Bruna et al. [6] have proposed an extension of the CNN using graph signal processing theory [5]. Their convolution is defined in the spectral domain related to the Laplacian matrix of the graph. As such, in the case where the graph is a lattice, the construction is analogous to the regular convolution defined in the Fourier domain. The operation is defined as spectral multipliers obtained by smooth interpolation of a weight kernel, and they explain how it ensures the localization property. In that paper, they also define a construction that creates a multi-resolution structure of a graph, for allowing it to support a deep learning architecture. Henaff et al. [7] have extended Bruna’s spectral network to large scale classification tasks and have proposed both supervised and unsupervided methods to find an underlying graph structure when it isn’t already given. However, when the graph is irregular, they partly lose the localization property of their convolution is partially lost. As the spectral domain is undirected with respect to the graph domain, some sort of rotation invariances are also introduced. Hence, the results in the graph domain aren’t ressembling to those of a convolution. In our case, we want to define a convolution supported locally. Moreover, we want that every input can be defined on a different underlying graph structure, so that the learnt filters can be applied on data embedded in the same space regardless of what structure have supported the convolution during the training. These properties are also retained by the convolution defined in the ShapeNet paper[8], which defines a convolution for data living on non-euclidean manifolds. I.e their construction does maintain the locality and allow for reusing the learnt filters on other manifolds. However, it requires at least a manifold embedding of the data and a geodesic polar coordinates system. Although being less specific, our proposed method will be a strict generalization of CNN in the sense that CNNs are a special case of it. In the case where the data is sparse, Graham [9] has proposed a framework to implement a spatially sparse CNN efficiently. If the underlying graph structure is embedded into an Euclidean space, the convolution we propose in this paper can be seen as spatially sparse too, in the sense that the data has only non-zero coordinates on the vertices of the graph it is defined on. In our case we want to define a convolution for which the inputs can have values on any point of the embedding space, whereas in the regular case inputs can only have values on vertices of an underlying grid. 3 3.1 Proposed convolution operator Definitions Let S be a set of points, such that each one defines a set of neighbourhoods. An entry e of a dataset D is a column vector that can be of any size, for which each dimension represents a value taken by e at a certain point u ∈ S. u is said to be activated by e. A point u can be associated to at most one dimension of e. If it is the ith dimension of e, then we denote the value taken by e at u by either eu or ei . D is said to be embedded in S. We say that two entries e and e0 are homogeneous if they have the same size and if their dimensions are always associated to the same points. 2 3.2 Formal description of the generalized convolution Let’s denote by C a generalized convolution operator.We want it to observe the following conditions: • Linearity • Locality • Kernel weight sharing As C must be linear, then for any entry e, there is a matrix W e such that C(e) = W e e. Unless the entries are all homogeneous, W e depends on e. For example, in the case of regular convolutions on images, W is a Toeplitz matrix and doesn’t depend on e. In order to meet the locality condition, we first want that the coordinates of C(e) have a local meaning. To this end, we impose that C(e) lives in the same space as e, and that C(e) and e are homogeneous. Secondly, for each u, we want C(e)u to be only function of values taken by e at points contained in a certain neighbourhood of u. It results that rows of W e are generally sparse. Let’s attribute to C a kernel of n weights in the form of a row vector w = (w1 , w2 , .., wn ), and let’s define the set of allocation matrices A as the set of binary matrices that have at most one non-zero coordinate per column. As C must share its weights across the activated points, then for each row Wie of W e , there is an allocation matrix Aei ∈ A such that Wie = wAei . To maintain locality, the jth column of Aei must have a non-zero coordinate if and only if the ith and jth activated points are in a same neighbourhood. Let’s Ae denotes the block column vector that has the matrices Aei for attributes, and let’s ⊗ denotes the tensor product. Hence, C is defined by a weight kernel w and an allocation map e 7→ Ae that maintains locality, such that C(e) = (w ⊗ Ae ) . e 3.3 (1) The underlying graph that supports the generalized convolution As vertices, the set of activated points of an entry e defines a complete oriented graph that we call Ge . If all the entries are homogeneous, then Ge is said to be static. In this case, we note G. Otherwise, there can be one different graph per entry so the kernel of weights can be re-used for new entries defined on different graphs. Suppose we are given u 7→ Vu which maps each u ∈ S to a neighbourhood Vu . We then define GeV as the subgraph of Ge such that it contains the edge (u0 , u) if and only if u0 ∈ Vu . Let aV : e 7→ Ae be an allocation map such that the jth column of Aei have a non-zero coordinate if and only if (ei , ej ) is an edge of GeV . Then the generalized convolution of e by the couple (w, aV ) is supported by the underlying graph GeV in the sense that WVe = w ⊗ aV (e) is its adjacency matrix. Note that the underlying graph of a regular convolution is a lattice. Also note that the family (Vu )u∈S can be seen as local receptive fields for the generalized convolution, and that the map aV can be seen as if it were distributing the kernel weights into each Vu . Remarks The generalized convolution has been defined here as an operation between a kernel weight and a vector. If G = (E, V ) denotes a graph, then such operator ∗ with respect to a third rank tensor A could also have been defined as a bilinear operator between two graph signals f, g ∈ RE : f ∗ g = (f > ⊗ A) . g > ∀v ∈ V, (f ∗ g)(v) = f Av g, with Av ∈ A (2) (3) Note that the underlying graph depends on the entry. So the learnt filter w is reusable regardless of the entry’s underlying graph structure. This is not the case for convolutions defined on fixed graphs like in [6, 7]. 3 3.4 Example of a generalized convolution shaped by a rectangular window Let E be a two-dimensional Euclidean space and let’s suppose here that S = E. Let’s denote by CR , a generalized convolution shaped by a rectangular window R. We suppose that its weight kernel w is of size Nw = (2p + 1)(2q + 1) and that R is of width (2p + 1)µ and height (2q + 1)µ, where µ is a given unit scale. Let Gep,q be the subgraph of Ge such that it contains the edge (u0 , u) if and only if |u0x −ux | ≤ (p+ 12 )µ and |u0y − uy | ≤ (q + 12 )µ. In other terms, Gep,q connects a vertex u to every vertex contained in R when centered on u. Then, we define CR as being supported by Gep,q . As such, its adjacency matrix acts as the convolution operator. At this point, we still need to affect the kernel weights to its non-zero coordinates, via the edges of Gep,q . This amounts for defining explicitely the map e 7→ Ae for CR . To this end, let’s consider the grid of same size as that rectangle, which breaks it down into (2p + 1)(2q + 1) squares of side length µ, and let’s associate a different weight to each square. Then, for each edge (u0 , u), we affect to it the weight associated with the square within which u0 falls when the grid is centered on u. This procedure allows for the weights to be shared across the edges. It is illustrated on figure 1. Note that if the entries are homogeneous and the activated points are vertices of a regular grid, then the matrix W , independant of e, is a Toepliz matrix which acts as a regular convolution operator on the entries e. In this case, CR is just a regular convolution. For example, this is the case in section 3.5. µ µ (2p + 1)µ S=E S=E Figure 1: Example of a moving grid. The grid defines the allocation of the kernel weights. 3.5 Figure 2: On regular domains, the moving grid allocates the weights similarly to the moving window of a standard convolution. Link with the standard convolution on image datasets Let D be an image dataset. Entries of D are homogeneous and their dimensions represent the value at each pixel. In this case, we can set S = E, of dimension 2, such that each pixel is located at entire coordinates. More precisely, if the images are of width n and height m, then the pixels are located at coordinates (i, j) ∈ {0, 1, 2, ..., n}x{0, 1, 2, ..., m}. Hence, the pixels lie on a regular grid and thus are spaced out by a constant distance µ = 1. Let’s consider the static underlying graph Gp,q and the generalized convolution by a rectangular window CR , as defined in the former section. Then, applying the same weight allocation strategy will lead to affect every weight of the kernel into the moving window R. Except on the border, one and only one pixel will fall into each square of the moving grid at each position, as depicted in figure 2. Indeed, R behaves exactly like a moving window of the standard convolution, except that it considers that the images are padded with zeroes on the borders. 4 4 4.1 Application to CNNs Neural network interpretation Let Ld and Ld+1 be two layers of neurons, such that forward-propagation is defined from Ld to Ld+1 . Let’s define such layers as a set of neurons being located in S. These layers must contain as many neurons as points that can be activated. In other terms, S ∼ = Ld ∼ = Ld+1 . As such, we will abusively use the term of neuron instead of point. Ld Ld+1 Figure 3: Generalized convolution between two layers of neurons. The generalized convolution between these two layers can be interpreted as follow. An entry e activates the same N neurons in each layer. Then, a convolution shape takes N positions onto Ld , each position being associated to one of the activated neurons of Ld+1 . At each position, connections are drawn from the activated neurons located inside the convolution shape in destination to the associated neuron. And a subset of weights from w are affected to these connections, according to a weight sharing strategy defined by an allocation map. Figure 3 illustrates a convolution shaped by a rectangular window. The forward and backward propagation between Ld and Ld+1 are applied using the described neurons and connections. After a generalized convolution operation, an activation function is applied on the output neurons. Then a pooling operation is done spatially: the input layer is divided into patches of same size, and all activated neurons included in this patch are pooled together. Unlike a standard pooling operation, the number of activated neurons in a patch may vary. Generalized convolution layers can be vectorized. They can have multiple input channels and multiple feature maps. They shall naturally be placed into the same kind of deep neural network structure than in a CNN. Thus, they are for the irregular input spaces what the standard convolution layers are for regular input spaces. 4.2 Implementation There are two main strategies to implement the propagations. The first one is to start from (1), derive it and vectorize it. It implies handling semi-sparse representations to minimize memory consumption and to use adequate semi-sparse tensor products. Instead, we decide to use the neural network interpretation and the underlying graph structure whose edges amount for neurons connections. By this mean, the sparse part of the computations is included via the use of this graph. Also, computations on each edge can be parallelized. 5 4.3 Forward and back propagation formulae Let’s first recall the propagation formulae from a neural network point of view. Let’s denote by eu the value of a neuron of Ld located at u ∈ S, by fv for a neuron of Ld+1 , and by gv if this neuron is activated by the activation function σ. We denote by prev(v) the set neurons from the previous layer connected to v, and by next(u) those of the next layer connected to u. wuv is the weight affected to the connection between neurons u and v. b is the bias term associated to Ld+1 . After the forward propagation, values of neurons of Ld+1 are determined by those of Ld : X fv = eu wuv (4) u∈prev(v) gv = σ(fv + b) (5) Thanks to the chain rule, we can express derivatives of a layer with those of the next layer: δv = ∂E ∂E ∂gv = = ∂fv ∂gv ∂fv X ∂E ∂E = ∂eu ∂fv v∈next(u) ∂E 0 σ (fv + b) ∂gv X ∂fv = δv wuv ∂eu (6) (7) v∈next(u) We call edges(w) the set of edges to which the weight w is affected. If ω ∈ edges(w), fω+ denotes the value of the destination neuron, and eω− denotes the value of the origin neuron. The back propagation allows to express the derivative of any weight w: ∂E = ∂w X ω∈edges(w) ∂E ∂fω+ = ∂fω+ ∂w X δ ω + eω − (8) ω∈edges(w) X ∂E ∂gv X ∂E = = δv ∂b ∂gv ∂b v v (9) The sets prev(v), next(u) and edges(w) are determined by the graph structure, which in turn is determined beforehand by a procedure like the one described in section 3.4. The particularization of the propagation formulae with these sets is the main difference with the standard formlulae. 4.4 Vectorization Computations are done per batch of entries B. Hence, the graph structure used for the computations must contain the weighted edges of all entries e ∈ B. If necessary, entries of B are made homogeneous: if a neuron u is not activated by an entry e but is activated by another entry of B, then eu is defined and is set to zero. The third-rank tensor counterparts of e, f , and g are thus denoted by E, F and G. Their third dimension indexes the channels (input channels or feature maps). Their submatrix along the neuron located at x ∈ S are denoted Ex , Fx and Gx , rows are indexing entries and columns are indexing channels. The counterparts of w and b are W and β. The first being a third-rank tensor and the second being a vector with one value per feature map. βe denotes the 3D tensor obtained by broadcasting β along the two other dimensions of F. Ww denotes the submatrix of W along the kernel weight w. Its rows index the feature maps and its columns index the input channels. With these notations, the convolution formulae (1) rewrites: C(E) = (W ⊗ AE )  E (10) ⊗ and  being tensor products. ⊗ is contracted along the dimensions that index the kernel weights, and  is contracted along the dimensions that index the points present in the entries. 6 The vectorized counterparts of the formulae from section 4.3 can be obtained in the same way: X (11) Fv = Eu W> wuv u∈prev(v) e G = σ(F + β)    0 ∂E ∂E e ∆= = ◦ σ (F + β) ∂F ∂G   X ∂E ∆v Wuv = ∂E u v∈next(u)   X ∂E = ∆> ω + Eω − ∂W w ω∈edges(w) ! X X ∂E = ∆v ∂β v j (12)  (13) (14) (15) (16) j-th column Where ◦ and > respectively denotes Hadamard product and transpose. 5 Experiments In order to measure the gain of performance allowed by the generalized CNN over MLP on irregular domains, we made a series of benchmarks on distorded versions of the MNIST dataset [10], consisting of images of 28x28 pixels. To distort the input domain, we plunged the images into a 2-d euclidean space by giving entire coordinates to pixels. Then, we applied a gaussian displacement on each pixel, thus making the data irregular and unsuitable for regular convolutions. For multiple values of standard deviation of the displacement, we trained a generalized CNN and compared it with a MLP that has the same number of parameters. We choosed a simple yet standard architecture in order to better see the impact of generalized layers. The architecture used is the following: a generalized convolution layer with relu [11] and max pooling, made of 20 feature maps, followed by a dense layer and a softmax output layer. The generalized convolution is shaped by a rectangular window of width and height 5µ where the unit scale µ is chosen to be equal to original distance between two pixels. The max-pooling is done with square patches of side length 2µ. The dense layer is composed of 500 hidden units and is terminated by relu activation as well. In order to have the same number of parameters, the compared MLP have 2 dense layers of 500 hidden units each and is followed by the same output layer. For training, we used stochastic gradient descent [12] with Nesterov momentum [13] and a bit of L2 regularization [14]. 2.2 2 MLP G-CNN Error 1.8 1.6 1.4 1.2 CNN 1 + 0 1 2 3 4 5 6 10−1 100 101 102 Standard deviation used for the domain distortion Figure 4: Results for Generalized CNN and MLP The plot drawn on figure 4 illustrates the gain of performance of a generalized convolutional layer over a dense layer with equal number of parameters. After 15 epochs for both, it shows that the 7 generalized CNN on a distorded domain performs better than the MLP. Indeed, in the case of no domain distortion, the score is the same than a CNN with zero-padding. The error rate goes up a bit with distortion. But even at 200µ, the generalized CNN still performs better than the MLP. 6 Conclusion and future work In this paper, we have defined a generalized convolution operator. This operator makes possible to transport the CNN paradigm to irregular domains. It retains the proprieties of a regular convolutional operator. Namely, it is linear, supported locally and uses the same kernel of weights for each local operation. The generalized convolution operator can then naturally be used instead of convolutional layers in a deep learning framework. Typically, the created model is well suited for input data that has an underlying graph structure. The definition of this operator is flexible enough for it allows to adapt its weight-allocation map to any input domain, so that depending on the case, the distribution of the kernel weight can be done in a way that is natural for this domain. However, in some cases, there is no natural way but multiple acceptable methods to define the weight allocation. In further works, we plan to study these methods. We also plan to apply the generalized operator on unsupervised learning tasks. Acknowledgements I would like to thank my academic mentors, Vincent Gripon and Grégoire Mercier who helped me in this work, as well as my industrial mentor, Mathias Herberts who gave me insights in view of applying the designed model to industrial datasets. This work was partly funded by Cityzen Data, the company behind the Warp10 platform, and by the ANRT (Agence Nationale de la Recherche et de la Technologie) through a CIFRE (Convention Industrielle de Formation par la REcherche), and also by the European Research Council under the European Union’s Seventh Framework Program (FP7/2007-2013) / ERC grant agreement number 290901. References [1] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proceedings of the IEEE, vol. 86, no. 11, pp. 2278–2324, 1998. [2] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems, pp. 1097–1105, 2012. [3] K. Hornik, M. Stinchcombe, and H. White, “Multilayer feedforward networks are universal approximators,” Neural networks, vol. 2, no. 5, pp. 359–366, 1989. [4] F. R. K. Chung, Spectral Graph Theory (CBMS Regional Conference Series in Mathematics, No. 92). American Mathematical Society, 1996. [5] D. I. Shuman, S. K. Narang, P. Frossard, A. Ortega, and P. Vandergheynst, “The emerging field of signal processing on graphs: Extending high-dimensional data analysis to networks and other irregular domains,” IEEE Signal Processing Magazine, vol. 30, no. EPFL-ARTICLE-189192, pp. 83–98, 2013. [6] J. Bruna, W. Zaremba, A. Szlam, and Y. LeCun, “Spectral networks and locally connected networks on graphs,” arXiv preprint arXiv:1312.6203, 2013. [7] M. Henaff, J. Bruna, and Y. LeCun, “Deep convolutional networks on graph-structured data,” arXiv preprint arXiv:1506.05163, 2015. [8] J. Masci, D. Boscaini, M. Bronstein, and P. Vandergheynst, “Shapenet: Convolutional neural networks on non-euclidean manifolds,” tech. rep., 2015. [9] B. Graham, “Spatially-sparse convolutional neural networks,” arXiv preprint arXiv:1409.6070, 2014. [10] Y. LeCun, C. Cortes, and C. J. Burges, “The mnist database of handwritten digits,” 1998. [11] X. Glorot, A. Bordes, and Y. Bengio, “Deep sparse rectifier neural networks,” in International Conference on Artificial Intelligence and Statistics, pp. 315–323, 2011. 8 [12] L. Bottou, “Large-scale machine learning with stochastic gradient descent,” in Proceedings of COMPSTAT’2010, pp. 177–186, Springer, 2010. [13] I. Sutskever, J. Martens, G. Dahl, and G. Hinton, “On the importance of initialization and momentum in deep learning,” in Proceedings of the 30th international conference on machine learning (ICML-13), pp. 1139–1147, 2013. [14] A. Y. Ng, “Feature selection, l 1 vs. l 2 regularization, and rotational invariance,” in Proceedings of the twenty-first international conference on Machine learning, p. 78, ACM, 2004. 9
9cs.NE
arXiv:1110.0895v4 [cs.CE] 2 Jul 2012 Robust inversion, dimensionality reduction, and randomized sampling Aleksandr Aravkin Michael P. Friedlander Felix J. Herrmann Tristan van Leeuwen March 1, 2012 Abstract We consider a class of inverse problems in which the forward model is the solution operator to linear ODEs or PDEs. This class admits several dimensionality-reduction techniques based on data averaging or sampling, which are especially useful for large-scale problems. We survey these approaches and their connection to stochastic optimization. The data-averaging approach is only viable, however, for a least-squares misfit, which is sensitive to outliers in the data and artifacts unexplained by the forward model. This motivates us to propose a robust formulation based on the Student’s t-distribution of the error. We demonstrate how the corresponding penalty function, together with the sampling approach, can obtain good results for a large-scale seismic inverse problem with 50% corrupted data. Keywords inverse problems · seismic inversion · stochastic optimization · robust estimation 1 Introduction Consider the generic parameter-estimation scheme in which we conduct m experiments, recording the corresponding experimental input vectors {q1 , q2 , . . . , qm } and observation vectors {d1 , d2 , . . . , dm }. We model the data for given parameters x ∈ Rn by di = Fi (x)qi + i for i = 1, . . . , m, (1.1) This work was in part financially supported by the Natural Sciences and Engineering Research Council of Canada Discovery Grant (22R81254) and the Collaborative Research and Development Grant DNOISE II (375142-08). This research was carried out as part of the SINBAD II project with support from the following organizations: BG Group, BPG, BP, Chevron, Conoco Phillips, Petrobras, PGS, Total SA, and WesternGeco. A. Aravkin, F. J. Herrmann, and T. van Leeuwen Dept. of Earth and Ocean Sciences, University of British Columbia, Vancouver, BC, Canada E-mail: {saravkin,fherrmann,tleeuwen}@eos.ubc.ca M. P. Friedlander Dept. of Computer Science, University of British Columbia, Vancouver, BC, Canada E-mail: [email protected] 2 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen where observation di is obtained by the linear action of the forward model Fi (x) on known source parameters qi , and independent errors i capture the discrepancy between di and prediction Fi (x)qi . The class of models captured by this representation includes solution operators to any linear (partial) differential equation with boundary conditions, where the qi are the right-hand sides of the equations. A special case arises when Fi ≡ F , i.e., the forward model is the same for each experiment. Inverse problems based on these forward models arise in a variety of applications, including medical imaging and seismic exploration, in which the parameters x usually represent particular physical properties of a material. We are particularly motivated by the full-waveform inversion (FWI) application in seismology, which is used to image the earth’s subsurface [38]. In full-waveform inversion, the forward model F is the solution operator of the wave equation composed with a restriction of the full solution to the observation points (receivers); x represents sound-velocity parameters for a (spatial) 2- or 3-dimensional mesh; the vectors qi encode the location and signature of the ith source experiment; and the vectors di contain the corresponding measurements at each receiver. A typical survey in exploration seismology may contain thousands of experiments (shots), and global seismology relies on natural experiments provided by measuring thousands of earthquakes detected at seismic stations around the world. Standard data-fitting algorithms may require months of CPU time on large computing clusters to process this volume of data and yield coherent geological information. Inverse problems based on the forward models that satisfy (1.1) are typically solved by minimizing some measure of misfit, and have the general form m minimize x φ(x) := 1 X φi (x), m (1.2) i=1 where each φi (x) is some measure of the residual ri (x) := di − Fi (x)qi (1.3) between the observation and prediction of the ith experiment. The classical approach is based on the least-squares penalty φi (x) = kri (x)k2 . (1.4) This choice can be interpreted as finding the maximum likelihood (ML) estimate of x, given the assumptions that the errors i are independent and follow a Gaussian distribution. Formulation (1.2) is general enough to capture a variety of models, including many familiar examples. If the di and qi are scalars, and the forward model is linear, then standard least-squares 2 φi (x) = 12 (aT i x − di ) easily fits into our general formulation. More generally, ML estimation is based on the form  φi (x) = − log pi ri (x) , where pi is a particular probability density function of i . Robust inversion, dimensionality reduction, and randomized sampling 3 1.1 Dimensionality reduction Full-waveform inversion is a prime example of an application in which the cost of evaluating each element in the sum of φ is very costly: every residual vector ri (x)—required to evaluate one element in the sum of (1.2)—entails solving a partial differential equation on a 2D or 3D mesh with thousands of grid points in each dimension. The scale of such problems is a motivation for using dimensionality reduction techniques that address small portions of the data at a time. The least-squares objective (1.4) allows for a powerful form of data aggregation that is based on randomly fusing groups of experiments into “meta” experiments, with the effect of reducing the overall problem size. The aggregation scheme is based on Haber et al.’s [17] observation that for this choice of penalty, the objective is connected to the trace of a residual matrix. That is, we can represent the objective of (1.2) by m  1 X 1 kri (x)k2 ≡ φ(x) = trace R(x)T R(x) , (1.5) m m i=1 where R(x) := [r1 (x), r2 (x), . . . , rm (x)] collects the residual vectors (1.3). Now consider a small sample of s weighted averages of the data, i.e., dej = m X wij di and qej = i=1 m X wij qi , j = 1, . . . , s, i=1 where s  m and wij are random variables, and collect the corresponding s residuals rej (x) = dej − Fj (x)e qj into the matrix RW (x) := [e r1 (x), re2 (x), . . . , res (x)]. Because the residuals are linear in the data, we can write compactly RW (x) := R(x)W where W := (wij ). Thus, we may consider the sample function φW (x) = s  1 1X ke rj (x)k2 ≡ trace RW (x)TRW (x) s s (1.6) j=1 based on the s averaged residuals. Proposition 1.1 then follows directly from Hutchinson’s [22, §2] work on stochastic trace estimation. Proposition 1.1. If E[W W T ] = I, then   E φW (x) = φ(x) and E[∇φW (x)] = ∇φ(x). Hutchinson proves that if the weights wij are drawn independently from a Rademacher distribution, which takes the values ±1 with equal probability, then the stochastic-trace estimate has minimum variance. Avron and Toledo [4] compare the quality of stochastic estimators obtained from other distributions. Golub and von Matt [15] report the surprising result that the estimate obtained with even a single sample (s = 1) is often of high quality. Experiments that use the approach in FWI give evidence that good estimates of the true parameters can be obtained at a fraction of the computational cost required by the full approach [19, 24, 41]. 4 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen 1.2 Approach Although the least-squares approach enjoys widespread use, and naturally accommodates the dimensionality-reduction technique just described, it is known to be unsuitable for non-Gaussian errors, especially for cases with very noisy or corrupted data often encountered in practice. The least-squares formulation also breaks down in the face of systematic features of the data that are unexplained by the model Fi . Our aim is to characterize the benefits of robust inversion and to describe randomized sampling schemes and optimization algorithms suitable for large-scale applications in which even a single evaluation of the forward model and its action on qi is computationally expensive. (In practice, the product Fi (x)qi is evaluated as a single unit.) We interpret these sampling schemes, which include the wellknown incremental-gradient algorithm [28], as dimensionality-reduction techniques, because they allow algorithms to make progress using only a portion of the data. This paper is organized into the following components: Robust statistics (§2). We survey robust approaches from a statistical perspective, and present a robust approach based on the heavy-tailed Student’s t-distribution. We show that all log-concave error models share statistical properties that differentiate them from heavy-tailed densities (such as the Student’s t) and limit their ability to work in regimes with large outliers or significant systematic corruption of the data. We demonstrate that densities outside the log-concave family allow extremely robust formulations that yield reasonable inversion results even in the face of major data contamination. Sample average approximations (§3). We propose a dimensionality-reduction technique based on sampling the available data, and characterize the statistical properties that make it suitable as the basis for an optimization algorithm to solve the general inversion problem (1.2). These techniques can be used for the general robust formulation described in §2, and for formulations in which forward models Fi vary with i. Stochastic optimization (§4) We review stochastic-gradient, randomized incremental-gradient, and sample-average methods. We show how the assumptions required by each method fit with the class of inverse problems of interest, and can be satisfied by the sampling schemes discussed in §3. Seismic inversion (§5) We test the proposed sample-average approach on the robust formulation of the FWI problem. We compare the inversion results obtained with the new heavy-tailed approach to those obtained using robust log-concave models and conventional methods, and demonstrate that a useful synthetic velocity model can be recovered by the heavy-tailed robust method in an extreme case with 50% missing data. We also compare the performance of stochastic algorithms and deterministic approaches, and show that the robust result can be obtained using only 30% of the effort required by a deterministic approach. 2 Robust Statistics A popular approach in robust regression is to replace the least-squares penalty (1.4) on the residual with a penalty that increases more slowly than the 2-norm. (Virieux and Operto [42] discuss the difficulties with least-squares regression, which are especially egregious in seismic inversion.) Robust inversion, dimensionality reduction, and randomized sampling 5 One way to derive a robust approach of this form is to assume that the noise i comes from a particular non-Gaussian probability density, pi , and then find the maximum likelihood (ML) estimate of the parameters x that maximizes the likelihood that the residual vectors ri (x) are realizations of the random variable i , given the observations di . Because the negative logarithm is monotone decreasing, it is natural to minimize the negative log of the likelihood function rather than maximizing the likelihood itself. In fact, when the distribution of the errors i is modeled using a log-concave density  p(r) ∝ exp − ρ(r) , with a convex loss function ρ, the ML estimation problem is equivalent to the formulation (1.2), with φi (x) = ρ(ri (x)) for i = 1, . . . , m. (2.1) One could also simply start with a penalty ρ on ri (x), without explicitly modelling the noise density; estimates obtained this way are generally known as M-estimates [20]. A popular choice that follows this approach is the Huber penalty [20, 21, 27]. Robust formulations are typically based on convex penalties ρ—or equivalently, on log-concave densities for i —that look quadratic near 0 and increase linearly far from zero. Robust penalties, including the 1-norm and Huber, for electromagnetic inverse problems are discussed by Farquaharson and Oldenburg in [13]. Guitton and Symes [16] consider the Huber penalty in the seismic context, and they cite many previous examples of the use of 1-norm penalty in geophysics. Huber and 1-norm penalties are further compared on large-scale seismic problems by Brossier et al. [7], and a Huber-like (but strictly convex) hyperbolic penalty is described by Bube and Nemeth [9], with the aim of avoiding possible non-uniqueness associated with the Huber penalty. Clearly, practitioners have a preference for convex formulations. However, it is important to note that – for nonlinear forward models Fi , the optimization problem (1.2) is typically nonconvex even for convex penalties ρ (it is difficult to satisfy the compositional requirements for convexity in that case); – even for linear forward models Fi , it may be beneficial to choose a nonconvex penalty in order to guard against outliers in the data. We will justify the second point from a statistical perspective. Before we proceed with the argument, we introduce the Student’s t-density, which we use in designing our robust method for FWI. 2.1 Heavy-tailed distribution: Student’s t Robust formulations using the Student’s t-distribution have been shown to outperform log-concave formulations in various applications [1]. In this section, we introduce the Student’s t-density, explain its properties, and establish a result that underscores how different heavy-tailed distributions are from those in the log-concave family. 6 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen The scalar Student’s t-density function with mean µ and positive degrees-offreedom parameter ν is given by p( r | µ, ν ) ∝ 1 + (r − µ)2 /ν −(1+ν)/2 . (2.2) The density is depicted in Figure 1(a). The parameter ν can be understood by recalling the origins of the Student’s t-distribution. Given n i.i.d. Gaussian variables xi with mean µ, the normalized sample mean x̄ − µ √ S/ n (2.3) follows thePStudent’s t-distribution with ν = n − 1, where the sample variance 1 S 2 = n−1 (xi − x̄)2 is distributed as a χ2 random variable with n − 1 degrees of freedom. As ν → ∞, the characterization (2.3) immediately implies that the Student’s t-density converges pointwise to the density of N (0, 1). Thus, ν can be interpreted as a tuning parameter: for low values one expects a high degree of non-normality, but as ν increases, the distribution behaves more like a Gaussian distribution. This interpretation is highlighted in [25]. For a zero-mean Student’s t-distribution (µ = 0), the log-likelihood of the density (2.2) gives rise to the nonconvex penalty function ρ(r) = log(1 + r2 /ν), (2.4) which is depicted in Figure 1(b). The nonconvexity of this penalty is equivalent to the sub-exponential decrease of the tail of the Student’s t-distribution, which goes to 0 at the rate 1/rν+1 as r → ∞. The significance of these so-called heavy tails in outlier removal becomes clear when we consider the following question: Given that a scalar residual deviates from the mean by more than t, what is the probability that it actually deviates by more than 2t? The 1-norm is the slowest-growing convex penalty, and is induced by the Laplace distribution, which is proportional to exp(−k · k1 ). A basic property of the scalar Laplace distribution is that it is memory free. That is, given a Laplace distribution with mean 1/α, then the probability relationship Pr(|r| > t2 | |r| > t1 ) = Pr(|r| > t2 − t1 ) = exp(−α[t2 − t1 ]) (2.5) holds for all t2 > t1 . Hence, the probability that a scalar residual is at least 2t away from the mean, given that it is at least t away from the mean, decays exponentially fast with t. For large t, it is unintuitive to make such a strong claim for a residual already known to correspond to an outlier. Contrast this behavior with that of the Student’s t-distribution. When ν = 1, the Student’s t-distribution is simply the Cauchy distribution, with a density proportional to 1/(1 + r2 ). Then we have that π 2 − arctan(2t) t→∞ π − arctan(t) 2 lim Pr(|r| > 2t | |r| > t) = lim t→∞ = 1 . 2 Remarkably, the conditional probability is independent of t for large residuals. This cannot be achieved with any probability density arising from a convex penalty, Robust inversion, dimensionality reduction, and randomized sampling 7 because (2.5) provides a lower bound for this family of densities, as is shown in the following theorem. Theorem 2.1. Consider any scalar density p arising from a symmetric proper closed convex penalty ρ via p(t) = exp(−ρ(t)), and take any point t0 with positive right derivative α0 = ∂+ ρ(t0 ) > 0. Then for all t2 > t1 ≥ t0 , the conditional tail distribution induced by p(r) satisfies Pr(|r| > t2 | |r| > t1 ) ≤ exp(−α0 [t2 − t1 ]) . Proof. Define `(t) = ρ(t1 )+α1 (t−t1 ) to be the (global) linear under-estimate R ∞ for ρ at t1 , where α1 = ∂+ ρ(t1 ) is the right derivative of ρ at t1 . Define F (t) = t p(r) dr. We first note that F (t) is log-concave (apply [33, Theorem 3], taking the set A = {z | z ≥ 0}). Then log(F (t)) is concave, and so its derivative log(F (t))0 = p(t) −F (t) is non-increasing. Therefore, the ratio p(t)/F (t) is nondecreasing, and in particular p(t1 ) p(t2 ) ≤ , F (t1 ) F (t2 ) or equivalently, F (t2 ) p(t2 ) ≤ . F (t1 ) p(t1 ) By assumption on the functions ` and ρ, ρ(t2 ) − `(t2 ) ≥ ρ(t1 ) − `(t1 ) = 0, which implies that Pr(|r| > t2 | |r| > t1 ) = exp(−ρ(t2 )) F (t2 ) ≤ F (t1 ) exp(−ρ(t1 )) = exp(−[ρ(t2 ) − `(t1 )]) ≤ exp(−[`(t2 ) − `(t1 )]) = exp(−α1 [t2 − t1 ]) . To complete the proof, note that the right derivative ∂+ ρ(t) is nondecreasing [34, Theorem 24.1]. Then we have α0 ≤ α1 for t0 ≤ t1 . For differentiable log-concave densities, the influence function is defined to be ρ0 (t), and for a general distribution it is the derivative of the negative log of the density. These functions provide further insight into the difference between the behaviors of log-concave densities and heavy-tailed densities such as the Student’s. In particular, they measure the effect of the size of a residual on the negative log likelihood. The Student’s t-density has a so-called redescending influence function: as residuals grow larger, they are effectively ignored by the model. Figure 1 shows the relationships among densities, penalties, and influence functions of two logconcave distributions (Gaussian and Laplacian) and those of the Student’s t, which is not log-concave. If we examine the derivative ρ0 (r) = 2r ν + r2 8 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen 0 0 0 (a) (b) 0 (c) Fig. 1: The Gaussian (·−), Laplace (−−), and Student’s t- (—) distributions: (a) densities, (b) penalties, and (c) influence functions. of the Student’s t-penalty (2.4), it is clear that large residuals have a small influence when r2  ν. For small r, on the other hand, the derivative resembles that of the least-squares penalty. See Hampel et al. [18] for a discussion of influence-function approaches to robust statistics, and redescending influence functions in particular, and Shevlyakov et al. [35] for further connections. There is an implicit tradeoff between convex and non-convex penalties (and their log-concave and non-log-concave counterparts). Convex models are easier to characterize and solve, but may be wrong in a situation in which large outliers are expected. Nonconvex penalties are particularly useful with large outliers. 2.2 The Student’s t in practice Figure 2 compares the reconstruction obtained using the Student’s t-penalty, with those obtained using least-squares and Huber penalties, on an FWI experiment (described more fully in §5). These panels show histograms of the residuals (1.3) that are obtained at different solutions, including the true solution, and the solutions recovered by solving (1.2) where the subfunctions φi in (2.1) are defined by the least-squares, Huber, and Student’s t- penalties. The experiment simulates 50% missing data using a random mask that zeros out half of the data obtained via a forward model at the true value of x. A residual histogram at the true x therefore contains a large spike at 0, corresponding to the residuals for correct data, and a multimodal distribution of residuals for the erased data. The least-squares recovery yields a residual histogram that resembles a Gaussian distribution. The corresponding inversion result is useless, which is not surprising, because the residuals at the true solution are very far from Guassian. The reconstruction using the Huber penalty is a significant improvement over the conventional least-squares approach, and the residual has a shape that resembles the Laplace distribution, which is closer to the shape of the true residual. The Student’s t approach yields the best reconstruction, and, remarkably, produces a residual distribution that matches the multi-modal shape of the true residual histogram. This is surprising because the Student’s t-distribution is unimodal, but the residual shape obtained using the inversion formulation is not. It appears that the statistical prior implied by the Student’s t-distribution is weak enough to allow the model to converge to a solution that is almost fully consistent with the good data, and completely ignors the bad data. Robust inversion, dimensionality reduction, and randomized sampling 9 0 0.1 Frequency 5 10 15 20 0 −3 0 3 0 5 10 15 20 25 30 15 20 25 30 15 20 25 30 15 20 25 30 (a) True model residual and solution 0 0.1 Frequency 5 10 15 20 0 −3 0 3 0 5 10 (b) Least-squares residual and solution 0 0.1 Frequency 5 10 15 20 0 −3 0 3 0 5 10 (c) Huber residual and solution 0 0.1 Frequency 5 10 15 20 0 −3 0 3 0 5 10 (d) Student’s t residual and solution Fig. 2: Residual histograms (normalized) and solutions for an FWI problem. The histogram at (a) the true solution shows that the errors follow a tri-modal distribution (superimposed on the other histogram panels for reference). The residuals for (b) least-squares and (c) Huber reconstructions follow the model error densities (i.e., Gaussian and Laplace). The residuals for (d) the Student t reconstruction, however, closely match the distribution of the actual errors. 10 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen Despite several successful applications in statistics and control theory [12, 25], Student’s t-formulations do not enjoy widespread use, especially in the context of nonlinear regression and large-scale inverse problems. Recently, however, they were shown to work very well for robust recovery in nonlinear inverse problems such as Kalman smoothing and bundle adjustment [1], and to outperform the Huber penalty when inverting large synthetic models [2, 3]. Moreover, because the corresponding penalty function is smooth, it is usually possible to adapt existing algorithms and workflows to work with a robust formulation. In order for algorithms to be useful with industrial-scale problems, it is essential that they be designed for conventional and robust formulations that use a relatively small portion of the data in any computational kernel. We lay the groundwork for these algorithms in the next section. 3 Sample average approximations The data-averaging approach used to derive the approximation (1.6) may not be appropriate when the misfit functions φi are something other than the 2norm. In particular, a result such as Proposition 1.1, which reassures us that the approximations are unbiased estimates of the true functions, relies on the special structure of the 2-norm, and is not available to us in the more general case. In this section, we describe sampling strategies—analogous to the stochastic-trace estimation procedure of §1.1—that allow for more general misfit measures φi . In particular, we are interested in a sampling approach that allows for differential treatment across experiments i, and for robust functions. We adopt the useful perspective that each of the constituent functions φi and the gradients ∇φi are members of a fixed population of size m. The aggregate objective function and its gradient, m φ(x) = 1 X φi (x) m m and i=1 ∇φ(x) = 1 X ∇φi (x), m i=1 can then simply be considered to be population averages of the individual objectives and gradients, as reflected in the scaling factors 1/m. A common method for estimating the mean of a population is to sample only a small subset S ⊆ { 1, . . . , m } to derive the sample averages φS (x) = 1X φi (x) s and i∈S ∇φS (x) = 1X ∇φi (x), s (3.1) i∈S where s = |S| is the sample size. We build the subset S as a uniform random sampling of the full population, and in that case the sample averages are unbiased: E[φS (x)] = φ(x) and E[∇φS (x)] = ∇φ(x). (3.2) The cost of evaluating these sample-average approximations is about s/m times that for the true function and gradient. (Non-uniform schemes, such as importance and stratified sampling, are also possible, but require prior knowledge about the relative importance of the φi .) We use these quantities to drive the optimization procedure. Robust inversion, dimensionality reduction, and randomized sampling 11 This approach constitutes a kind of dimensionality-reduction scheme, and it is widely used by census takers to avoid the expense of measuring the entire population. In our case, measuring each element of the population means an evaluation of a function φi and its gradient ∇φi . The goal of probability sampling is to design randomized sampling schemes that estimate statistics—such as these sample averages—with quantifiable error; see, for example, Lohr’s introductory text [26]. The stochastic-optimization methods that we describe in §4 allow for approximate gradients, and thus can take advantage of these sampling schemes. The error analysis of the sample-average method described in §4.3 relies on the second moment of the error e = ∇φS − ∇φ (3.3) in the gradient. Because the sample averages are unbiased, the expected value of the squared error of the approximation reduces to the variance of the norm of the sample average:     E kek2 = V k∇φS k . (3.4) This error is key to the optimization process, because the accuracy of the gradient estimate ultimately determines the quality of the search directions available to the underlying optimization algorithm. 3.1 Sampling with and without replacement Intuitively, the size s of the random sample influences the norm of the error e in the gradient estimate. The difference between uniform sampling schemes with or without replacement greatly affects how the variance of the sample average decreases as the sample size increases. In both cases, the variance of the estimator is proportional to the sample variance m σg2 := 1 X k∇φi − ∇φk2 m−1 (3.5) i=1 of the population of gradients { ∇φ1 , . . . , ∇φm } evaluated at x. This quantity is inherent to the problem and independent of the chosen sampling scheme. When sampling from a finite population without replacement (i.e., every element in S occurs only once), then the error en of the sample average gradient satisfies 1 s 2 E[ken k2 ] = 1− σg ; (3.6) s m for example, see Cochran [11] or Lohr [26, §2.7]. Note that the expected error decreases with s, and—importantly—is exactly 0 when s = m. On the other hand, in a sample average gradient built by uniform sampling with replacement, every sample draw of the population is independent of the others, so that the error er of this sample average gradient satisfies E[ker k2 ] = 1 2 σg . s (3.7) This error goes to 0 as 1/s, and is never 0 when sampling over a finite population. 12 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen Comparing the expected error between sampling with and without replacement for finite populations, we note that  s E[ken k2 ] = 1 − E[ker k2 ], m and so sampling without replacement yields a uniformly lower expected error than independent finite sampling. 3.2 Data averaging The data-averaging approach discussed in §1.1 for the objective (1.5) does not immediately fit into the sample-average framework just presented, even though the function φW defined in (1.6) is a sample average. Nevertheless, for all sampling schemes described by Proposition 1.1, the sample average φW (x) = s 1Xe φi (x), s with φei (x) := kR(x)wi k2 , j=1 is in some sense a sample average of an infinite population. If the random vectors are uncorrelated—as required by Proposition 1.1—than, as with (3.7), the error ew = ∇φW − φ of the sample average gradient is proportional to the sample variance of the population of gradients of φW . That is, E[kew k2 ] = 1 2 σ eg , s where σ eg2 is the sample variance of the population of gradients { ∇φe1 , . . . , ∇φem }. The particular value of σ eg2 will depend on the distribution from which the weights wi are drawn; for some distributions of wi this quantity may even be infinite, as is shown by the following results. The sample variance (3.5) is always finite, and the analogous sample variance σ eg2 of the implicit functions ∇φei is finite under general conditions on w. Proposition 3.1. The sample variance σ eg2 of the population { ∇φe1 , . . . , ∇φem } of gradients is finite when the distribution for wi has finite fourth moments. Robust inversion, dimensionality reduction, and randomized sampling 13 Proof. The claim follows from a few simple bounds (all sums run from 1 to m): i h σ eg2 ≤ E k∇φei k2 ! ! " X X wi ∇ri (x) wi ri (x) = 4E i i X X !2 # " ≤ 4E wi ∇ri (x) 2 i kwi ∇ri (x)k2 X i wi ri (x) !2 # " X ≤ 4E 2# i kwi ri (x)k i !2 # " X = 4E |wi | k∇ri (x)k2 i X |wi | kri (x)k i X  wi2 wj2 . ≤ 4 max m2 k∇ri (x)k22 · max kri (x)k2 E i The quantity E P ij i ij  wi2 wj2 < ∞ when the fourth moments are finite. As long as σ eg2 is nonzero, the expected error of uniform sampling without replacement is asymptotically better than the expected error that results from data averaging. That is, E[ken k2 ] < E[kew k2 ] for all s large enough. At least as measured by the second moment of the error in the gradient, the simple random sampling without replacement has the benefit of yielding a good estimate when compared to these other sampling schemes. 4 Stochastic optimization Stochastic optimization, which naturally allows for inexact gradient calculations, meshes well with the various sampling and averaging strategies described in §3. We review several approaches that fall under the stochastic optimization umbrella, and describe their relative benefits. Although the full-waveform inversion application that we consider is nonconvex, the following discussion make the assumption that the optimization problem is convex; this expedient concedes the analytical tools that allow us to connect sampling with rates of convergence. It is otherwise difficult to connect a convergence rate to the sample size; see [14, §2.3]. The usefulness of the approach is justified by numerical experiments, both in the present paper and in [14, §5], where results for both convex and nonconvex models are presented. 14 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen 4.1 Stochastic gradient methods Stochastic gradient methods for minimizing a differentiable function φ, not necessarily of the form defined in (1.2), can be generically expressed by the iteration xk+1 = xk − αk dk with dk := sk + ek , (4.1) where αk is a positive stepsize, sk is a descent direction for φ, and ek is a random noise term. Bertsekas and Tsitsiklis [6, Prop. 3] give general conditions under which lim ∇φ(xk ) = 0, k→∞ and every limit point of {xk } is a stationary point of φ. Note that unless the minimizer is unique, this does not imply that the sequence of iterates {xk } converges. Chief among the required conditions are that ∇φ is globally Lipschitz, i.e., for some positive L, k∇φ(x) − ∇φ(y)k ≤ Lkx − yk for all x and y; that for all k, 2 sT k ∇φ(xk ) ≤ −µ1 k∇φ(xk )k , (4.2a) ksk k ≤ µ2 (1 + k∇φ(xk )k),   E[ek ] = 0 and E kek k2 < µ3 , (4.2b) (4.2c) for some positive constants µ1 , µ2 , and µ3 ; and that the steplengths satisfy the infinite travel and summable conditions ∞ X k=0 αk = ∞ and ∞ X αk2 < ∞. (4.3) k=0 Many authors have worked on similar stochastic-gradient methods, but the Bertsekas and Tsitsiklis [6] is particularly general; see their paper for further references. Note that the randomized sample average schemes (with or without replacement) from §3 can be immediately used to design a stochastic gradient that satisfies (4.2b). It suffices to choose the sample average of the gradient (3.1) as the search direction: dk = ∇φS (xk ). Because the sample average ∇φS is unbiased—cf. (3.2)—this direction is on average simply the steepest descent, and can be interpreted as having been generated from the choices sk = ∇φ(xk ) and ek = ∇φS (xk ) − ∇φ(xk ). Moreover, the sample average has finite variance—cf. (3.6)–(3.7)—and so the direction sk and the error ek clearly satisfy conditions (4.2). The same argument holds for the data-averaging scheme outlined in §1.1, as long as the distribution of the mixing vector admits an unbiased sample average with a finite variance. Propositions 1.1 and 3.1 establish conditions under which these requirements hold. Robust inversion, dimensionality reduction, and randomized sampling 15 Suppose that φ is strongly convex with parameter µ, which implies that µ kxk − x∗ k2 ≤ φ(xk ) − φ(x∗ ), 2 where x∗ is the unique minimizer of φ. Under this additional assumption, further statements can be made about the rate of convergence. In particular, the iteration (4.1), with sk = ∇φ(xk ), converges sublinearly, i.e., E[kxk − x∗ k] = O(1/k). (4.4) where the steplengths αk = O(1/k) are decreasing [30, §2.1]. This is in fact the optimal rate among all first-order stochastic methods [29, §14.1]. A strength of the stochastic algorithm (4.1) is that it applies so generally. All of the sampling approaches that we have discussed so far, and no doubt others, easily fit into this framework. The convergence guarantees are relatively weak for our purposes, however, because they do not provide guidance on how a sampling strategy might influence the speed of convergence. This analysis is crucial within the context of the sampling schemes that we consider, because we want to gain an understanding of how the sample size influences the speed of the algorithm. 4.2 Incremental-gradient methods Incremental-gradient methods, in their randomized form, can be considered a special case of stochastic gradient methods that are especially suited to optimizing sums of functions such as (1.2). They can be described by the iteration scheme xk+1 = xk − αk ∇φik (xk ), (4.5) for some positive steplengths αk , where the index ik selects among the m constituent functions of φ. In the deterministic version of the algorithm, the ordering of the subfunctions φi is predetermined, and the counter ik = (k mod m) + 1 makes a full sweep through all the functions every m iterations. In the randomized version, ik is at each iteration randomly selected with equal probability from the indices 1, . . . , m. (The Kaczmarz method for linear system [23] is closely related, and a randomized version of it is analyzed by Strohmer and Vershynin [37].) In the context of the sampling discussion in §3, the incremental-gradient algorithm can be viewed as an extreme sampling strategy that at each iteration uses only a single function φi (i.e., a sample of size s = 1) in order to form a sample average φS of the gradient. For the data-averaging case of §1.1, this corresponds to generating the approximation φW from a single weighted average of the data (i.e., using a single random vector wi to form R(x)wi ). Bertsekas and Tsitsiklis [5, Prop. 3.8] describe conditions for convergence of the incremental-gradient algorithm for functions with globally Lipschitz continuous gradients, when the steplengths αk → 0 as specified by (4.3). Note that it is necessary for the steplengths αk → 0 in order for the iterates xk produced by (4.5) to ensure stationarity of the limit points. Unless we assume that ∇φ(x̄) = 0 implies that ∇φi (x̄) = 0 for all i, a stationary point of φ is not a fixed point of the iteration process; Solodov [36] and Tseng [39] study this case. Solodov [36] further describes 16 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen how bounding the steplengths away from zero yields limit points x̄ that satisfy the approximate stationarity condition  k∇φ(x̄)k = O inf αk . k With the additional assumption of strong convexity of φ, it follows from Nedić and Bertsekas [28] that the randomized incremental-gradient algorithm with a decreasing stepsize αk = O(1/k) converges sublinearly accordingly to (4.4). They also show that keeping the stepsize constant as αk ≡ m/L implies that E[kxk − x∗ k2 ] ≤ O([1 − µ/L]k ) + O(m/L). This expression is interesting because the first term on the right-hand side decreases at a linear rate, and depends on the condition number µ/L of φ; this term is present for any deterministic first-order method with constant stepsize. Thus, we can see that with the strong-convexity assumption and a constant stepsize, the incrementalgradient algorithm has the same convergence characteristics as steepest descent, but with an additional constant error term. 4.3 Sampling methods The incremental-gradient method described in §4.2 has the benefit that each iteration costs essentially the same as evaluating only a single gradient element ∇φi . The downside is that they achieve only a sublinear convergence to the exact solution, or a linear convergence to an approximate solution. The sampling approach described in Friedlander and Schmidt [14] allows us to interpolate between the one-at-a-time incremental-gradient method at one extreme, and a full gradient method at the other. The sampling method is based on the iteration update xk+1 = xk − αgk , α = 1/L, (4.6) where L is the Lipschitz constant for the gradient, and the search direction gk = ∇φ(xk ) + ek (4.7) is an approximation of the gradient; the term ek absorbes the discrepancy between the approximation and the true gradient. We define the direction gk in terms of the sample average gradient (3.1), and then ek corresponds to the error defined in (3.3). When the function φ is strongly convex and has a globally Lipschitz continuous gradient, than the following theorem links the convergence of the iterates to the error in the gradient. Theorem 4.1. Suppose that E[kek k2 ] ≤ Bk , where limk→∞ Bk+1 /Bk ≤ 1. Then each iteration of algorithm (4.6) satisfies for each k = 0, 1, 2, . . . , E[kxk − x∗ k2 ] ≤ O([1 − µ/L]k ) + O(Ck ), where Ck = max{Bk , (1 − µ/L + )k } for any positive . (4.8) Robust inversion, dimensionality reduction, and randomized sampling 106 Cumulative samples Sample size (s/m) 1.0 0.5 0.0 17 0 20 40 60 Iteration (k) 80 100 103 100 replacement no replacement deterministic 0 (a) 20 40 60 Iteration (k) 80 100 (b) Fig. 3: Comparing the difference between the theoretical errors bounds in the sample averages for three sampling strategies (randomized with replacement, randomized without replacement, and deterministic). (a) Sample sizes, as fractions of the total population m = 1000, required to reduce the error linearly with error constant 0.9. (b) The corresponding cumulative number of samples used. See bounds (4.10). It is also possible to replace gk in (4.6) with a search direction pk that is the solution of the system Hk p = gk , (4.9) for any sequence of Hessian approximations Hk that are uniformly positive definite and bounded in norm, as can be enforced in practice. Theorem 4.1 continues to hold in this case, but with different constants µ and L that reflect the conditioning of the “preconditioned” function; see [14, §1.2]. It is useful to compare (4.4) and (4.8), which are remarkably similar. The distance to the solution, for both the incremental-gradient method (4.5) and the gradient-with-errors method (4.6), is bounded by the same linearly convergent term. The second terms in their bounds, however, are crucially different: the accuracy of the incremental-gradient method is bounded by a multiple of the fixed steplength; the accuracy of the gradient-with-errors method is bounded by the norm of the error in the gradient. Theorem 4.1 is significant because it furnishes a guide for refining the sample Sk that defines the average approximation gk = 1 X φi (xk ) sk i∈Sk of the gradient of φ, where sk is the size of the sample Sk ; cf. (3.1). In particular, (3.6) and (3.7) give the second moment of the errors of these sample averages, which correspond precisely to the gradient error defined by (4.7). If we wish to design a sampling strategy that gives a linear decrease with a certain rate, then a policy for the sample size sk needs to ensure that it grows fast enough to induce E[kek k2 ] to decrease with at least that rate. Also, from (4.8), it is clear that there is no benefit in increasing the sample size at a rate faster than the underlying “pure” first-order method without gradient error. If, for example, the function is poorly conditioned— i.e., µ/L is small—than the sample-size increase should be commensurately slow. 18 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen It is instructive to compare how the sample average error decreases in the randomized (with and without replacement) and deterministic cases. We can more easily compare the randomized and deterministic variants by following Bertsekas and Tsitsiklis [5, §4.2], and assuming that k∇φi (x)k2 ≤ β1 + β2 k∇φ(x)k2 for all x and i = 1, . . . , m, for some constants β1 ≥ 0 and β2 ≥ 1. Together with the Lipschitz continuity of φ, we can provide the following bounds:    1 sk m 2 1− βk (4.10a) randomized, without replacement E[kek k ] ≤ sk m m−1   1 m randomized, with replacement E[kek k2 ] ≤ βk (4.10b) sk m − 1  2 m − sk deterministic kek k2 ≤ 4 βk , (4.10c) m where βk = β1 + 2β2 L[φ(xk ) − φ(x∗ )]. These bounds follow readily from the derivation in [14, §§3.1–3.2]. Figure 3 illustrates the difference between these bounds on an example problem with m = 1000. The panel on the left shows how the sample size needs to be increased in order for the right-hand-side bounds in (4.10) to decrease linearly Pat a rate of 0.9. The panel on the right shows the cumulative sample size, i.e., ki=0 si . Uniform sampling without replacement yields a uniformly and significantly better bound than the other sampling strategies. Both types of sampling are admissible, but sampling without replacement requires a much slower rate of growth of s to guarantee a linear rate. The strong convexity assumption needed to derive the error bounds used in this section is especially strong because the inverse problem we use to motivate the sampling approach is not a convex problem. In fact, it is virtually impossible to guarantee convexity of a composite function such as (2.1) unless the penalty function ρ(·) is convex and each ri (·) is affine. This is not the case for many interesting inverse problems, such as full waveform inversion, and for nonconvex loss functions corresponding to distributions with heavy tails, such as Student’s t. Even relaxing the assumption on φ from strong convexity to just convexity makes it difficult to design a sampling strategy with a certain convergence rate. The full-gradient method for convex (but not strongly) functions has a sublinear convergence rate of O(1/k). Thus, all that is possible for a sampling-type approach that introduces errors into the gradient is to simply maintain that sublinear rate. P For example, if kek k2 ≤ Bk , and ∞ B k=1 k < ∞, then the iteration (4.6) maintains the sublinear rate of the gradient method [14, Theorem 2.6]. The theory for the strongly convex case is also supported by empirical evidence, where sampling strategies tend to outperform basic incremental-gradient methods. 5 Numerical experiments in seismic inversion A good candidate for the sampling approach we have discussed is the full waveform inversion problem from exploration geophysics, which we address using a robust formulation. The goal is to obtain an estimate of subsurface properties of the Robust inversion, dimensionality reduction, and randomized sampling 19 earth using seismic data. To collect the data, explosive charges are detonated just below the surface, and the energy that reflects back is recorded at the surface by a large array of geophones. The resulting data consist of a time-series collection for thousands of source positions. The estimate of the medium parameters is based on fitting the recorded and predicted data. Typically, the predicted data are generated by solving a PDE whose coefficients are the features of interest. The resulting PDE-constrained optimization problem can be formulated in either the time [38] or the frequency [32] domain. It is common practice to use a simple scalar wave equation to predict the data, effectively assuming that the earth behaves like a fluid—in this case, sound speed is the parameter we seek. Raw data are processed to remove any unwanted artifacts; this requires significant time and effort. One source of unwanted artifacts in the data is equipment malfunction. If some of the receivers are not working properly, the resulting data can be either zero or contaminated with an unusual amount of noise. And even if we were to have a perfect estimate of the sound speed, we still would not expect to be able to fit our model perfectly to the data. The presence of these outliers in the data motivates us (and many other authors, e.g., [7, 8, 16]) to use robust methods for this application. We compare the results of robust Student’s t-based inversion to those obtained using least-squares and Huber robust penalties, and we compare the performance of deterministic, incremental-gradient, and sampling methods in this setting. 5.1 Modelling and gradient computation for full waveform inversion The forward model for frequency-domain acoustic FWI, for a single source function q, assumes that wave propagation in the earth is described by the scalar Helmholtz equation Aω (x)u = [ω 2 x + ∇2 ]u = q, where ω is the angular frequency, x is the squared-slowness (seconds/meter)2 , and u represents the wavefield. The discretization of the Helmholtz operator includes absorbing boundary conditions, so that Aω (x) and u are complex-valued. The data are measurements of the wavefield obtained at the receiver locations d = P u. The forward modelling operator F (x) is then given by F (x) = P A−1 (x), where A is a sparse block-diagonal matrix, with blocks Aω indexed by the frequencies ω. Multiple sources qi are typically modeled as discretized delta functions with a frequency-dependent weight. The resulting data are then modeled by the equation di = F (x)qi , and the corresponding residual equals ri (x) = di − F (x)qi (cf. (1.3)). For a given loss function ρ, the misfit function and its gradient are defined as φ(x) = m X i=1 ρ(ri (x)) and ∇φ(x) = m X ∇F (x, qi )∗ ∇ρ(ri (x)), i=1 where ∇F (x, qi ) is the Jacobian of F (x)qi . The action of the adjoint of the Jacobian on a vector y can be efficiently computed via the adjoint-state method [38] as follows: ∇F (x, qi )∗ y = G(x, ui )∗ vi , 20 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen where G(x, ui ) is the (sparse) Jacobian of A(x)ui with respect to x, and ui and vi are solutions of the linear systems A(x)ui = qi and A(x)∗ vi = P y. The Huber penalty function for a vector r is ( X ri2 /2µ ρ(r) = ζi , where ζi = |ri | − µ/2 i if |ri | ≤ µ otherwise. The Student’s t penalty function (2.4) for a vector r is defined by X ρ(r) = log(1 + ri2 /ν). i 5.2 Experimental setup and results For the seismic velocity model x∗ ∈ R60501 on a 201-by-301 grid depicted in Figure 2(a), observed data d (a complex-valued vector of length 272,706) are generated using 6 frequencies, 151 point sources, and 301 receivers located at the surface. To simulate a scenario in which half of the receivers at unknown locations have failed, we multiply the data with a mask that zeroes out 50% of the data at random locations. We emphasize that the model was blind to this corruption, and so we could have equivalently added a large perturbation to the data, as was done for example in [3]. The resulting data thus differ from the prediction F (x∗ ) given by the true solution x∗ . A spike in the histogram of the residuals ri (x∗ ) evaluated at the true solution x∗ , shown in Figure 2(a), shows these outliers. The noise does not fit well with any simple prior distribution that one might like to use. We solve the resulting optimization problem with the least-squares, Huber, and Student tpenalties using a limited-memory BFGS method. Figure 4 tracks across iterations the relative model error kxk − x∗ k/kx∗ k for all three approaches. Histograms of the residuals after 50 iterations are plotted in Figures 2(c)–(e). The residuals for the least-squares and Huber approaches resemble Gaussian and Laplace distributions respectively. This fits well with the prior assumption on the noise, but does not fit the true residual at all. The residual for the Student’s t approach does not resemble the prior distribution at all. The slowly increasing penalty function allows for enough freedom to let the residual evolve into the true distribution. Next, we compare the performance of the incremental-gradient (§4.2) and sampling (§4.3) algorithms against the full-gradient method. For the incrementalgradient algorithm (4.5), at each iteration we randomly choose i uniformly over the set { 1, 2, . . . , m }, and use either a fixed stepsize αk ≡ α or a decreasing stepsize αk = α/bk/mc. The sampling method is implemented via the iteration xk+1 = xk − αk pk , where pk satisfies (4.9), and Hk is a limited-memory BFGS Hessian approximation. The quasi-Newton Hessian Hk is updated using the pairs (∆xk , ∆gk ), where ∆xk := xk+1 − xk and ∆gk := gk+1 − gk ; Robust inversion, dimensionality reduction, and randomized sampling Least−squares Huber Student’s t 1.1 rel. model error 21 1 0.9 0.8 0.7 0.6 0 10 20 30 iteration 40 50 Fig. 4: Relative error between the true and reconstructed models for least-squares, Huber, and Student t penalties. In the least-squares case, the model error is not reduced at all. Slightly better results are obtained with the Huber penalty, although the model error starts to increase after about 20 iterations. The Students t penalty gives the best result. 6 x 10 full incremental, const. step incremental, decr. step sampling misfit 3.4 3.2 3 2.8 2.6 0 0.5 0.4 rel. sample size 3.6 0.3 0.2 0.1 5 10 15 20 passes through the data 25 30 0 0 5 (a) 10 15 20 passes through the data 25 30 (b) Fig. 5: (a) Convergence of different optimization strategies on the Students t penalty: Limited-memory BFGS using the full gradient (“full”), incremental gradient with constant and decreasing step sizes, and the sampling approach. Different lines of the same color indicate independent runs with different random number streams. (b) The evolution of the amount of data used by the sampling method. the limited-memory Hessian is based on a history of length 4. Nocedal and Wright [31, §7.2] describe the recursive procedure for updating Hk . The batch size is increased at each iteration by only a single element, i.e., sk+1 = min{ m, sk + 1 }. The members of the batch are redrawn at every iteration, andPwe use an Armijo backtracking linesearch based on the sampled function (1/sk ) i∈Sk φi (x). The convergence plots for several runs of the sampling method and the stochastic gradient method with α = 10−6 are shown in Figure 5(a). Figure 5(b) plots the evolution of the amounts of data sampled. 22 A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen 6 Discussion and conclusions The numerical experiments we have conducted using the Student’s t-penalty are encouraging, and indicate that this approach can overcome some of the limitations of convex robust penalties such as the Huber norm. Unlike the least-squares and Huber penalties, the Student t-penalty does not force the residual into a shape prescribed by the corresponding distribution. The sampling method successfully combines the steady convergence rate of the full-gradient method with the inexpensive iterations provided by the incremental-gradient method. The convergence analysis of the sampling method, based on Theorem 4.1, relies on bounding the second moment of the error in the gradient, and hence the variance of the sample average (see (3.4)). The bound on the second-moment arises because of our reliance on the concept of an expected distance to optimality E[kxk − x∗ k2 ]. However, other probabilistic measures of distance to optimality may be more appropriate; this would influence our criteria for bounding the error in the gradient. For example, Avron and Toledo [4] measure the quality of a sample average using an “epsilon-delta” argument that provides a bound on the sample size needed to achieve a particular accuracy  with probability 1 − δ. Other refinements are possible. For example, van den Doel and Ascher [40] advocate an adaptive approach for increasing the sample size, and Byrd et al. [10] use a sample average-approximation of the Hessian. References 1. A. Aravkin, Robust Methods with Applications to Kalman Smoothing and Bundle Adjustment, PhD thesis, University of Washington, Seattle, WA, June 2010. 2. A. Aravkin, T. van Leeuwen, and M. P. Friedlander, Robust inversion via semistochastic dimensionality reduction, in Submitted to ICASSP 2012, arXiv:1110.0895, 2011. 3. A. Aravkin, T. van Leeuwen, and F. Herrmann, Robust full waveform inversion with students t-distribution, in Proceedings of the SEG, San Antonio, Texas, 2011, Society for Exploration Geophysics. 4. H. Avron and S. Toledo, Randomized algorithms for estimating the trace of an implicit symmetric positive semi-definite matrix, J. ACM, 58 (2011), pp. 8:1–8:34. 5. D. Bertsekas and J. Tsitsiklis, Neuro-dynamic programming, Athena Scientific, 1996. 6. D. P. Bertsekas and J. N. Tsitsiklis, Gradient convergence in gradient methods with errors, SIAM J. Optim., 10 (2000), pp. 627–642. 7. R. Brossier, S. Operto, and J. Virieux, Which data residual norm for robust elastic frequency-domain full waveform inversion?, Geophysics, 75 (2010), pp. R37–R46. 8. K. P. Bube and R. T. Langan, Hybrid `1 /`2 minimization with applications to tomography, Geophysics, 62 (1997), pp. 1183–1195. 9. K. P. Bube and T. Nemeth, Fast line searches for the robust solution of linear systems in the hybrid `1 /`2 and huber norms, Geophysics, 72 (2007), pp. A13–A17. 10. R. H. Byrd, G. M. Chin, W. Neveitt, and J. Nocedal, On the use of stochastic hessian information in optimization methods for machine learning, SIAM Journal on Optimization, 21 (2011), pp. 977–995. 11. W. G. Cochran, Sampling Techniques, Jon Wiley, third ed., 1977. 12. L. Fahrmeir and R. Kunstler, Penalized likelihood smoothing in robust state space models, Metrika, 49 (1998), pp. 173–191. 13. C. G. Farquharson and D. W. Oldenburg, Non-linear inversion using general measures of data misfit and model structure, Geophysical Journal International, 134 (1998), pp. 213– 227. 14. M. P. Friedlander and M. Schmidt, Hybrid deterministic-stochastic methods for data fitting, tech. rep., Univ. of British Columbia, April 2011. revised September 2011. Robust inversion, dimensionality reduction, and randomized sampling 23 15. G. H. Golub and U. von Matt, Quadratically constrained least squares and quadratic problems, Numer. Math., 59 (1991), pp. 561–580. 16. A. Guitton and W. W. Symes, Robust inversion of seismic data using the huber norm, Geophysics, 68 (2003), pp. 1310–1319. 17. E. Haber, M. Chung, and F. J. Herrmann, An effective method for parameter estimation with pde constraints with multiple right hand sides, Tech. Rep. TR-2010-4, UBC-Earth and Ocean Sciences Department, 2010. 18. F. R. Hampel, E. M. Ronchetti, P. J. Rousseeuw, and W. A. Stahel, Robust Statistics: The Approach Based on Influence Functions, Wiley Series in Probability and Statistics, 1986. 19. F. Herrmann, M. P. Friedlander, and O. Yılmaz, Fighting the curse of dimensionality: compressive sensing in exploration seismology, tech. rep., University of British Columbia, 2011. 20. P. J. Huber, Robust Statistics, John Wiley & Sons, Inc., New York, 1981. 21. P. J. Huber and E. M. Ronchetti, Robust Statistics, John Wiley and Sons, 2nd ed., 2009. 22. M. Hutchinson, A stochastic estimator of the trace of the influence matrix for laplacian smoothing splines, Communications in Statistics - Simulation and Computation, 19 (1990), pp. 433–450. 23. S. Kaczmarz, Angenäherte auflösung von systemen linearer gleichungen, Bull. Int. Acad. Polon. Sci. A, 355 (1937), p. 357. 24. J. R. Krebs, J. E. Anderson, D. Hinkley, R. Neelamani, S. Lee, A. Baumstein, and M.-D. Lacasse, Fast full-wavefield seismic inversion using encoded sources, Geophysics, 74 (2009), pp. WCC177–WCC188. 25. K. L. Lange, R. J. A. Little, and J. M. G. Taylor, Robust statistical modeling using the t distribution, Journal of the American Statistical Association, 84 (1989), pp. 881–896. 26. S. L. Lohr, Sampling: design and analysis, Duxbury Press, Pacific Grove, 1999. 27. R. A. Maronna, D. Martin, and Yohai, Robust Statistics, Wiley Series in Probability and Statistics, John Wiley and Sons, 2006. 28. A. Nedic and D. Bertsekas, Convergence rate of incremental subgradient algorithms, Stochastic Optimization: Algorithms and Applications, (2000), pp. 263–304. 29. A. Nemirovski, Efficient methods in convex programming, Lecture notes, (1994). 30. A. Nemirovski, A. Juditsky, G. Lan, and A. Shapiro, Robust stochastic approximation approach to stochastic programming, SIAM J. Optim., 19 (2009), pp. 1574–1609. 31. J. Nocedal and S. J. Wright, Numerical Optimization, Springer Series in Operations Research, Springer, 1999. 32. R. Pratt and M. Worthington, Inverse theory applied to multi-source cross-hole tomography. part i: Acoustic wave-equation method., Geophysical Prospecting, 38 (1990), pp. 287–310. 33. A. Prékopa, Logarithmic concave measures with application to stochastic programming, Acta Sci. Math. (Szeged), 32 (1971), pp. 301–316. 34. R. T. Rockafellar, Convex Analysis, Priceton Landmarks in Mathematics, Princeton University Press, 1970. 35. G. Shevlyakov, S. Morgenthaler, and A. Shurygin, Redescending m-estimators, Journal of Statistical Planning and Inference, 138 (2008), pp. 2906–2917. 36. M. Solodov, Incremental gradient algorithms with stepsizes bounded away from zero, Computational Optimization and Applications, 11 (1998), pp. 23–35. 37. T. Strohmer and R. Vershynin, A randomized Kaczmarz algorithm with exponential convergence, Journal of Fourier Analysis and Applications, 15 (2009), pp. 262–278. 38. A. Tarantola, Inversion of seismic reflection data in the acoustic approximation, Geophysics, 49 (1984), pp. 1259–1266. 39. P. Tseng, An incremental gradient(-projection) method with momentum term and adaptive stepsize rule, SIAM Journal on Optimization, 8 (1998), pp. 506–531. 40. K. van den Doel and U. M. Ascher, Adaptive and stochastic algorithms for electrical impedance tomography and dc resistivity problems with piecewise constant solutions and many measurements, SIAM J. Scientific Computing, 34 (2012). 41. T. van Leeuwen, A. Aravkin, and F. Herrmann, Seismic waveform inversion by stochastic optimization, International Journal of Geophysics, 2011 (2011), p. ID 689041. 42. J. Virieux and S. Operto, An overview of full-waveform inversion in exploration geophysics, Geophysics, 74 (2009), pp. 127–152.
5cs.CE
arXiv:cs/0503028v2 [cs.LO] 24 Mar 2005 Under consideration for publication in Theory and Practice of Logic Programming 1 Stabilization of Cooperative Information Agents in Unpredictable Environment: A Logic Programming Approach PHAN MINH DUNG, DO DUC HANH, PHAN MINH THANG Computer Science and Information Management Department Asian Institute of Technology Email: {dung,hanh,thangphm}@cs.ait.ac.th submitted 1 January 2003; revised 1 January 2003; accepted 1 January 2003 Abstract An information agent is viewed as a deductive database consisting of 3 parts: • an observation database containing the facts the agent has observed or sensed from its surrounding environment. • an input database containing the information the agent has obtained from other agents • an intensional database which is a set of rules for computing derived information from the information stored in the observation and input databases. Stabilization of a system of information agents represents a capability of the agents to eventually get correct information about their surrounding despite unpredictable environment changes and the incapability of many agents to sense such changes causing them to have temporary incorrect information. We argue that the stabilization of a system of cooperative information agents could be understood as the convergence of the behavior of the whole system toward the behavior of a “superagent”, who has the sensing and computing capabilities of all agents combined. We show that unfortunately, stabilization is not guaranteed in general, even if the agents are fully cooperative and do not hide any information from each other. We give sufficient conditions for stabilization. We discuss the consequences of our results. KEYWORDS: Stabilization, Cooperative Information Agents, Logic Programming 1 Introduction To operate effectively in a dynamic and unpredictable environment, agents need correct information about the environment. Often only part of this environment could be sensed by the agent herself. As the agent may need information about other part of the environment that she could not sense, she needs to cooperate with other agents to get such information. There are many such systems of cooperative information agents operating in the Internet today. A prominent example of such system is the system of routers that cooperate to deliver messages from one place to another in the Internet. One of the key characteristics of these systems is their resilience in the face of unpredictable changes in their environment and the 2 P. M. Dung, D. D. Hanh, and P. M. Thang incapability of many agents to sense such changes causing them to have temporary incorrect information. This is possible because agents in such systems cooperate by exchanging tentative partial results to eventually converge on correct and consistent global view of the environment. Together they constitute a stabilizing system that allows the individual agents to eventually get a correct view of their surrounding. Agent communications could be classified into push-based communications and pull-based communications. In the push-based communication, agents periodically send information to specific recipients. Push-based communications are used widely in routing system, network protocols, emails, videoconferencing calls, etc. A key goal of these systems is to guarantee that the agents have a correct view of their surrounding. On the other hand, in the pull-based communication, agents have to send a request for information to other agents and wait for a reply. Until now pull-based communications are the dominant mode of communication in research in multiagent systems, e.g. (Shoham 1993), (Satoh and Yamamoto 2002), (Ciampolini et al. 2003), (Kowalski and Sadri 1999), (Wooldridge 1997), (Wooldridge and Jennings 1995). In this paper, we consider multiagent systems where agent communications are based on push–technologies. A prominent example of a push-based multiagent system is the internet routing system. This paper studies the problem of stabilization of systems of cooperative information agents where an information agent is viewed as a deductive database which consists of 3 parts: • an observation database containing the facts the agent has observed or sensed from its surrounding environment. • an input database containing the information the agent was told by other agents • an intensional database which is a set of rules for computing derived information from the information stored in the observation and input databases. It turns out that in general, it is not possible to ensure that the agents will eventually have the correct information about the environment even if they honestly exchange information and do not hide any information that is needed by others and every change in the environment is immediately sensed by some of the agents. We also introduce sufficient conditions for stabilization. The stabilization of distributed protocols has been studied extensively in the literature ((Dijkstra 1974),(Flatebo et al. 1994),(Schneider 1993)) where agents are defined operationally as automata. Dijkstra (1974) defined a system as stabilizing if it is guaranteed to reach a legitimate state after a finite number of steps regardless of the initial state. The definition of what constitutes a legitimate state is left to individual algorithms. Thanks to the introduction of an explicit notion of environment, we could characterize a legitimate state as a state in which the agents have correct information about their environment. In this sense, we could say that our agents are a new form of situated agents ((Rosenschein and Kaelbling 1995), (Brooks 1991), (Brooks 1986)) that may sometimes act on wrong information but nonetheless will be eventually situated after getting correct information about their Stabilization of Cooperative Information Agents 3 surrounding. Further in our approach, agents are defined as logic programs, and hence it is possible for us to get general results about what kind of algorithms could be implemented in stabilizing multiagent systems in many applications. To the best of our knowledge, we believe that our work is the first work on stabilization of multiagent systems. The rest of this paper is organized as follows. Basic notations and definitions used in this paper are briefly introduced in section 2. We give an illustrating example and formalize the problem in section 3. Related works and conclusions are given in section 4. Proofs of theorems are given in Appendices. 2 Preliminaries: Logic Programs and Stable Models In this section we briefly introduce the basic notations and definitions that are needed in this paper. We assume the existence of a Herbrand base HB. A logic program is a set of ground clauses of the form: H ← L1 , . . . , Lm where H is an atom from HB, and L1 , . . . , Lm are literals (i.e., atoms or negations of an atoms) over HB, m ≥ 0. H is called the head, and L1 , . . . , Lm the body of the clause. Given a set of clauses S, the set of the heads of clauses in S is denoted by head(S). Note that clauses with variables are considered as a shorthand for the set of all their ground instantiations. Often the variables appearing in a non-ground clause have types that are clear from the context. In such cases these variables are instantiated by ground terms of corresponding types. For each atom a, the definition of a is the set of all clauses whose head is a. A logic program is bounded if the definition of every atom is finite. Let P be an arbitrary logic program. For any set S ⊆ HB, let P S be a program obtained from P by deleting 1. each rule that has a negative literal ¬B in its body with B ∈ S, and 2. all negative literals in the bodies of the remaining rules S is a stable model ((Gelfond and Lifschitz 1988)) of P if S is the least model of P S. The atom dependency graph of a logic program P is a graph, whose nodes are atoms in HB and there is an edge from a to b in the graph iff there is a clause in P whose head is a and whose body contains b or ¬b. Note that in the literature (Apt et al. 1988), the direction of the link is from the atom in the body to the head of a clause. We reverse the direction of the link for the ease of definition of acyclicity using the atom dependency graph. An atom b is said to be relevant to an atom a if there is a path from a to b in the atom dependency graph. A logic program P is acyclic iff there is no infinite path in its atom dependency graph. It is well known that 4 P. M. Dung, D. D. Hanh, and P. M. Thang Lemma 2.1 ((Gelfond and Lifschitz 1988)) Each acyclic logic program has exactly one stable model. 3 Examples and Problem Formalization Routing is one of the most important problems for internetworking. Inspired by RIP (Huitema 2000), one of the most well-known internet routing protocols, we will develop in this section, as an example, a multiagent system for solving the network routing problem to motivate our work. Example 3.1 Consider a network in Fig. 1. For simplicity we assume that all links have the same cost, say 1. A❜1 A❜2 ❜ ❜ A4 A5 A❜3 Fig. 1. A network example The problem for each agent is to find the shortest paths from her node to other nodes. The environment information an agent can sense is the availability of links connecting to her node. The agents use an algorithm known as “distance vector algorithm” ((Bellman 1957), (Ford and Fulkerson 1962)) to find the shortest paths from their nodes to other nodes. If the destination is directly reachable by a link, the cost is 1. If the destination is not directly reachable, an agent needs information from its neighbors about their shortest paths to the destination. The agent will select the route to the destination through a neighbor who offers a shortest path to the destination among the agent’s neighbors. Thus at any point of time, each agent needs three kinds of information: • The information about the environment, that the agent can acquire with her sensing capability. In our example, agent A1 could sense whether the links connecting her and her neighbors A2 , A4 are available. • The algorithm the agent needs to solve her problem. In our example the algorithm for agent A1 is represented by the following clauses: 1 1 Contrary to the convention in Prolog, in this paper we use lower–case letters for variables and upper–case letters for constants. Stabilization of Cooperative Information Agents 5 sp(A1 , A1 , 0) ← sp(A1 , y, d) ← spt(A1 , y, x, d) spt(A1 , y, x, d + 1) ← link(A1 , x), sp(x, y, d), not spl(A1 , y, d + 1) spl(A1 , A1 , d + 1) ← spl(A1 , y, d + 1) ← link(A1 , x), sp(x, y, d′ ), d′ < d where link(Ai , Aj ) is true iff there a link from Ai to Aj in the network and the link is intact. Links are undirected, i.e. we identify link(Ai , Aj ) and link(Aj , Ai ). sp(A1 , y, d) is true iff a shortest path from A1 to y has length d spt(A1 , y, x, d) is true iff the length of shortest paths from A1 to y is d and there is a shortest path from A1 to y that goes through x as the next node after A1 spl(A1 , y, d) is true iff there is a path from A1 to y whose length is less than d. • The information the agent needs from other agents. For agent A1 to calculate the shortest paths from her node to say A3 , she needs the information about the length of the shortest paths from her neighbors A2 , and A4 to A3 , that means she needs to know the values d, d′ such that sp(A2 , A3 , d), sp(A4 , A3 , d′ ) hold. 3.1 Problem Formalization The agents are situated in the environment. They may have different accessibility to the environment depending on their sensing capabilities. The environment is represented by a set of (ground) environment atoms, whose truth values could change in an unpredictable way. Definition 3.1 An agent is represented by a quad-tuple A = (IDB, HBE, HIN, δ) where • IDB, the intensional database, is an acyclic logic program. • HBE is the set of all (ground) environment atoms whose truth values the agent could sense, i.e. a ∈ HBE iff A could discover instantly any change in the truth value of a and update her extensional database accordingly. • HIN is the set of all atoms called input atoms, whose truth values the agent must obtain from other agents. No atom in HIN ∪ HBE appears in the head of the clauses in IDB and HIN ∩ HBE = ∅. • δ is the initial state of the agent. 6 P. M. Dung, D. D. Hanh, and P. M. Thang Definition 3.2 An agent state is a pair σ = (EDB, IN ) where • EDB ⊆ HBE represents what the agent has sensed from the environment. That means for each a ∈ HBE, a ∈ EDB iff a is true. • IN ⊆ HIN , the input database of A, represents the set of information A has obtained from other agents, i.e. a ∈ IN iff A was told that a is true. Given a state σ = (EDB, IN ), the stable model of A = (IDB, HBE, HIN, δ) at σ is defined as the stable model of IDB ∪ EDB ∪ IN . Note that δ and σ could be different states. Example 3.2 (Continuation of the network routing example) Imagine that initially the agents have not sent each other any information and all links are intact. In this situation, agent A1 is represented as follows: • IDB1 contains the clauses shown in Example 3.1. • HBE1 = {link(A1 , A2 ), link(A1 , A4 )} • HIN1 consists of ground atoms of the form sp(A2 , Y, D), sp(A4 , Y, D) where Y ∈ {A2 , . . . , A5 } and D is a positive integer. • The initial state δ1 = (EDB1,0 , IN1,0 ) where EDB1,0 = {link(A1 , A2 ), link(A1 , A4 )} IN1,0 = ∅ Definition 3.3 A cooperative multiagent system is a collection of n agents (A1 , . . . , An ), with Ai = (IDBi ,HBEi , HINi , δi ) such that the following conditions are satisfied • for each atom a, if a ∈ head(IDBi ) ∩ head(IDBj ) then a has the same definition in IDBi and IDBj . n S (head(IDBj ) ∪ HBEj ) • for each agent Ai , HINi ⊆ j=1 • No environment atom appears in the head of clauses in the intentional database of any agent, i.e. for all i,j: HBEi ∩ head(IDBj ) = ∅. For each agent Ai let HBi = head(IDBi ) ∪ HBEi ∪ HINi . 3.2 Agent Communication and Sensing Let Ai = (IDBi , HBEi , HINi , δi ) for 1 ≤ i ≤ n. We say that Ai depends on Aj if Ai needs input from Aj , i.e. HINi ∩ (head(IDBj ) ∪ HBEj ) 6= ∅. The dependency of Ai on Aj is defined to be the set D(i, j) = HINi ∩(head(IDBj )∪HBEj ). As we have mentioned before, the mode of communication for our agents corresponds to the “push–technology”. Formally, it means that if Ai depends on Aj Stabilization of Cooperative Information Agents 7 then Aj will periodically send Ai a set S = D(i, j) ∩ Mj where Mj is the stable model of Aj . When Ai obtains S, she knows that each atom a ∈ D(i, j) \ S is false with respect to Mj . Therefore she will update her input database INi to U pai,j (INi , S) as follows U pai,j (INi , S) = (INi \ D(i, j)) ∪ S Thus her state has changed from σi = (EDBi , INi ) to σi′ = (EDBi , U pai,j (INi , S)) accordingly. An environment change is represented by a pair C = (T, F ) where T (resp. F ) contains the atoms whose truth values have changed from false (resp. true) to true (resp. false). Therefore, given an environment change (T, F ), what Ai could sense of this change, is captured by the pair (Ti , Fi ) where Ti = T ∩ HBEi and Fi = F ∩ HBEi . Hence when a change C = (T, F ) occurs in the environment, agent Ai will update her sensing database EDBi to U pei (EDBi , C) as follows: U pei (EDBi , C) = (EDBi \ Fi ) ∪ Ti The state of agent Ai has changed from σi = (EDBi , INi ) to σi′ = (U pei (EDBi , C), INi ) accordingly. 3.3 Semantics of Multiagent Systems Let A = (A1 , . . . , An ) with Ai = (IDBi , HBEi , HINi , δi ) be a multiagent system. (δ1 , . . . , δn ) is called the initial state of A. A state of A is defined as △ = (σ1 , . . . , σn ) such that σi is a state of agent Ai . There are two types of transitions in a multiagent system. A environment transition happens when there is a change in the environment which is sensed by a set of agents and causes these agents to update their extensional databases accordingly. A communication transition happens when an agent sends information to another agent and causes the later to update her input database accordingly. For an environment change C = (T, F ), let SC be the set of agents which could sense parts of C, i.e. SC = {Ai | HBEi ∩ (T ∪ F ) 6= ∅} 8 P. M. Dung, D. D. Hanh, and P. M. Thang Definition 3.4 Let △ = (σ1 , . . . , σn ), △′ = (σ1′ , . . . , σn′ ) be states of A with σi = (EDBi , INi ), σi′ = (EDBi′ , INi′ ). 1. A environment transition C △− → △′ caused by an environment change C = (T, F ) is defined as follows (a) for every agent Ak such that Ak 6∈ SC : σk = σk′ , and (b) for each agent Ai ∈ SC : • EDBi′ = U pei (EDBi , C), • INi′ = INi . 2. A communication transition j i △ −−→ △′ caused by agent Aj sending information to agent Ai , where Ai depends on Aj , is defined as follows: (a) For all k such that k 6= i: σk = σk′ (b) EDBi′ = EDBi and INi′ = U pai,j (INi , S) where S = D(i, j)∩Mj and Mj is the stable model of Aj at σj . j C i We often simply write △ → △′ if there is a transition △ − → △′ or △ −−→ △′ . Definition 3.5 A run of a multiagent system A is an infinite sequence △0 → △1 → . . . → △m → . . . such that • △0 is the initial state of A and for all agents Ai , Aj such that Ai depends on Aj the following condition is satisfied: j i For each h, there is a k ≥ h such that △k −−→ △k+1 The above condition is introduced to capture the idea that agents periodically send the needed information to other agents. • There is a point h such that at every k ≥ h in the run, there is no more environment change. For a run R = △0 → △1 → . . . → △k → . . . where △k = (σ1,k , . . . , σn,k ) we often refer to the stable model of Ai at state σi,k as the stable model of Ai at point k and denote it by Mi,k . Stabilization of Cooperative Information Agents 9 Example 3.3 Consider the following multiagent system A = (A1 , A2 ) where IDB1 HBE1 HIN1 EDB1,0 IN1,0 = {a ← b, c f ← a} = {c} = {b} = {c} = ∅ IDB2 HBE2 HIN2 EDB2,0 IN2,0 = {b ← a, d b ← e} = {d, e} = {a} = {d, e} = ∅ Consider the following run R, where the only environment change occurs at point 2 such that the truth value of e becomes false: 2 1 1 (∅,{e}) 2 1 2 2 1 △0 −−−→ △1 −−−→ △2 −−−−→ △3 −−−→ △4 −−−→ △5 . . . The states and stable models of A1 and A2 at points 0, 1, 2, 3, and 4 are as follows k 0 1 2 3 4 EDB {c} {c} {c} {c} {c} IN ∅ {b} {b} {b} {b} A1 Stable Model {c} {a, b, c, f } {a, b, c, f } {a, b, c, f } {a, b, c, f } EDB {d, e} {d, e} {d, e} {d} {d} IN ∅ ∅ {a} {a} {a} A2 Stable Model {b, d, e} {b, d, e} {a, b, d, e} {a, b, d} {a, b, d} Example 3.4 (Continuation of example 3.2) Consider the following run R of the multiagent system given in Example 3.2. 2 (∅,{link(A1 ,A2 )}) 1 △0 −−−→ △1 −−−−−−−−−−−→ △2 → . . . Initially, all links are intact and all inputs of agents are empty, i.e. INi,0 = ∅ for i = 1, . . . , 5. At point 0 in the run, agent A2 sends to agent A1 information about shortest paths from her to other agents. At point 1 in the run, the link between A1 and A2 is down. The information (output) an agent needs to send to other agents consists of shortest paths from her to other agents. Thus from the stable model of an agent we are interested only in this output. Let SPi,k be the set {sp(Ai , Y, D)|sp(Ai , Y, D) ∈ Mi,k } where Mi,k is the stable model of Ai at point k. SPi,k denotes the output of Ai at point k. It is easy to see j i that if there is a transition △k −−→ △k+1 , then Aj sends to Ai : S = D(i, j) ∩ Mj,k = SPj,k 10 P. M. Dung, D. D. Hanh, and P. M. Thang At point 0, A1 and A2 have the following states and outputs: EDB1,0 IN1,0 SP1,0 EDB2,0 IN2,0 SP2,0 = = = = = = {link(A1 , A2 ), link(A1 , A4 )} ∅ {sp(A1 , A1 , 0)} {link(A2 , A1 ), link(A2 , A3 ), link(A2 , A5 )} ∅ {sp(A2 , A2 , 0)} 2 1 A2 sends S to A1 in the transition △0 −−−→ △1 where S = SP2,0 = {sp(A2 , A2 , 0)} Thus IN1,1 = U pa1,2 (IN1,0 , S) = U pa1,2 (∅, S) = S = {sp(A2 , A2 , 0)} The environment change C = (∅, {link(A1 , A2 )}) at point 1 is sensed by A1 and A2 . The states of A1 and A2 are changed as follows: IN1,2 EDB1,2 IN2,2 EDB2,2 = = = = = = IN1,1 U pe1 (EDB1,1 , C) = (EDB1,1 \ {link(A1 , A2 )}) ∪ ∅ {link(A1 , A4 )} IN2,1 U pe2 (EDB2,1 , C) = (EDB2,1 \ {link(A1 , A2 )}) ∪ ∅ {link(A2 , A3 ), link(A2 , A5 )} The following tables show the states and outputs of A1 and A2 at points 0, 1, and 2 respectively. k 0 1 2 EDB {link(A1 , A2 ), link(A1 , A4 )} {link(A1 , A2 ), link(A1 , A4 )} {link(A1 , A4 )} k 0 1 2 A1 IN ∅ {sp(A2 , A2 , 0)} {sp(A2 , A2 , 0)} A2 EDB {link(A2 , A1 ), link(A2 , A3 ), link(A2 , A5 )} {link(A2 , A1 ), link(A2 , A3 ), link(A2 , A5 )} {link(A2 , A3 ), link(A2 , A5 )} SP {sp(A1 , A1 , 0)} {sp(A1 , A1 , 0), sp(A1 , A2 , 1)} {sp(A1 , A1 , 0)} IN ∅ ∅ ∅ SP {sp(A2 , A2 , 0)} {sp(A2 , A2 , 0)} {sp(A2 , A2 , 0)} 3.4 Stabilization Consider a superagent whose sensing capability and problem solving capability are the combination of the sensing capabilities and problem solving capabilities of all agents, i.e. this agent can sense any change in the environment and her intensional database is the union of the intensional databases of all other agents. Formally, the Stabilization of Cooperative Information Agents 11 superagent of a multiagent system A = (A1 , . . . , An ) where Ai = (IDBi , HBEi , HINi , δi ), δi = (EDBi , INi ) is represented by PA = (IDBA , δ) where • IDBA = IDB1 ∪ · · · ∪ IDBn • δ, the initial state of PA , is equal to EDB1 ∪ · · · ∪ EDBn The superagent actually represents the multiagent system in the ideal case where each agent has obtained the correct information for its input atoms. Example 3.5 (Continuation of Example 3.3) Consider the multiagent system in Example 3.3. At point 0, the superagent PA is represented as follows: • IDBA consists of the following clauses: a ← b, c f ←a b ← a, d b←e • δ = {c, d, e}. Example 3.6 (Continuation of Example 3.4) Consider the multiagent system in Example 3.4. Initially, when all links between nodes are intact, the superagent PA is represented as follows: • IDBA consists of the following clauses: sp(x, x, 0) ← sp(x, y, d) ← spt(x, y, z, d) spt(x, y, z, d + 1) ← link(x, z), sp(z, y, d), not spl(x, y, d + 1) spl(x, x, d + 1) ← spl(x, y, d + 1) ← link(x, z), sp(z, y, d′), d′ < d • The initial state δ={ link(A1 , A2 ), link(A1 , A4 ), link(A2 , A3 ), link(A2 , A5 ), link(A3 , A5 ), link(A4 , A5 )} Note that the possible values of variables x, y, z are A1 , A2 , A3 , A4 , A5 . Definition 3.6 Let A be a multiagent system. The I/O graph of A denoted by GA is a graph obtained from the atom dependency graph of its superagent’s intensional database IDBA by removing all nodes that are not relevant for any input atom in HIN1 ∪ · · · ∪ HINn . 12 P. M. Dung, D. D. Hanh, and P. M. Thang A is IO-acyclic if there is no infinite path in its I/O graph GA . A is bounded if IDBA is bounded. A is IO-finite if its I/O graph is finite. Example 3.7 The atom dependency graph of IDBA and the I/O-graph GA of the multiagent system in Examples 3.3 and 3.5 is given in Fig. 2. Atom dependency graph f I/O graph a c b d e Fig. 2. The atom dependency graph and I/O graph It is obvious that the multiagent system in Examples 3.3 and 3.5 is bounded but not IO-acyclic and the multiagent system in Examples 3.1, 3.2, 3.4 and 3.6 is IO-acyclic and bounded. Proposition 3.1 If a multiagent system A is IO-acyclic then IDBA is acyclic. Proof Suppose IDBA is not acyclic. There is an infinite path η in its atom dependency graph starting from some atom a. There is some agent Ai such that a ∈ HBi . Since IDBi is acyclic, every path in its atom dependency graph is finite. η must go through some atom b ∈ INi to outside of Ai ’s atom dependency graph. Clearly starting from b, all atoms in η are relevant to b. The infinite path of η starting from b is a path in the I/O graph GA . Hence GA is not acyclic. Contradiction! Stabilization of Cooperative Information Agents 13 Definition 3.7 Let R = △0 → . . . △k → . . . be a run and Mi,k be the stable model of Ai at point k. 1. R is convergent for an atom a if either of the following conditions is satisfied. • There is a point h such that at every point k ≥ h, for every agent Ai with a ∈ HBi = head(IDBi ) ∪ HBEi ∪ HINi , a ∈ Mi,k In this case we write Conv(R, a) = true • There is a point h such that at every point k ≥ h, for every agent Ai with a ∈ HBi , a 6∈ Mi,k In this case we write Conv(R, a) = f alse 2. R is convergent if it is convergent for each atom. 3. R is strongly convergent if it is convergent and there is a point h such that at every point k ≥ h, for every agent Ai , Mi,k = Mi,h . It is easy to see that strong convergence implies convergence. Define Conv(R) = {a | Conv(R, a) = true} as the convergence model of R. Let R = △0 → △1 → . . . → △k → . . . be a run where △k = (σ1,k , . . . , σn,k ) with σi,k = (EDBi,k , INi,k ). As there is a point h such that the environment does not change after h, it is clear that ∀k ≥ h : EDBi,k = EDBi,h . The set n S EDBi,h is called the stabilized environment of R. EDB = i=1 Definition 3.8 • A multiagent system is said to be weakly stabilizing if every run R is convergent, and its convergence model Conv(R) is a stable model of PA in the stabilized environment of R, i.e. Conv(R) is a stable model of IDBA ∪ EDB where EDB is the stabilized environment of R. • A multiagent system is said to be stabilizing if it is weakly stabilizing and all of its runs are strongly convergent. Theorem 3.1 IO-acyclic and bounded multiagent systems are weakly stabilizing. Proof See Appendix A. Unfortunately, the above theorem does not hold for more general class of multiagent systems as the following example shows. 14 P. M. Dung, D. D. Hanh, and P. M. Thang Example 3.8 (Continuation of example 3.3 and 3.5) Consider the multiagent system A and run R in Example 3.3. It is obvious that A is bounded but not IO-acyclic. For every point k ≥ 4, M1,k = {a, b, c, f }, M2,k = {a, b, d}. Conv(R) = {a, b, c, d, f }. The stabilized environment of R is EBD = {c, d}. The stable model of PA in the stabilized environment of R is {c, d}, which is not the same as Conv(R). Hence the system is not weakly stabilizing. Boundedness is very important for the weak stabilization of multiagent systems. Consider a multiagent system in the following example which is IO-acyclic, but not bounded. Example 3.9 Consider the following multiagent system A = (A1 , A2 ) where IDB1 = {q ← ¬r(x) s(x) ← r(x)} HBE1 = {} HIN1 = {r(0), r(1), . . . } EDB1,0 = ∅ IN1,0 = ∅ IDB2 = {r(x + 1) ← s(x) r(0) ←} HBE2 = {} HIN2 = {s(0), s(1), . . . } EDB2,0 = ∅ IN2,0 = ∅ Since HBE = HBE1 ∪ HBE2 = ∅, for every run R the stabilized environment of R is empty. The stable model of PA in the stabilized environment of R is the set {r(0), r(1), . . . }∪{s(0), s(1), . . . }. It is easy to see that for each run, the agents need to exchange infinitely many messages to establish all the values of r(x). Hence for every run R, for every point h ≥ 0 in the run: q ∈ M1,h , but q is not in the stable model of PA in the stabilized environment of R. Thus the system is not weakly stabilizing. Are the boundedness and IO-acyclicity sufficient to guarantee the stabilization of a multiagent system? The following example shows that they are not. Example 3.10 (Continuation of Example 3.4 and 3.6) Consider the multiagent system in Example 3.2. Consider the following run R with no environment change after point 6. 4 2 1 (1) (∅,{link(A1 ,A2 )}) 4 1 (2) (∅,{link(A4 ,A5 )}) 1 4 (3) 5 2 5 △0 −−−→ △1 −−−→ △2 −−−→ △3 −−−−−−−−−−−→ △4 −−−→ △5 −−−−−−−−−−−→ △6 −−−→ 4 1 △7 −−−→ △8 → . . . (4) Initially all links in the network are intact. The states and outputs of agents are as follows: • EDB1,0 = {link(A1 , A2 ), link(A1 , A4 )}, Stabilization of Cooperative Information Agents 15 EDB2,0 = {link(A2 , A1 ), link(A2 , A3 ), link(A2 , A5 )} EDB3,0 = {link(A3 , A2 ), link(A3 , A5 )}. EDB4,0 = {link(A4 , A1 ), link(A4 , A5 )}. EDB5,0 = {link(A5 , A2 ), link(A5 , A3 ), link(A5 , A4 )}. • INi,0 = ∅ for i = 1, . . . , 5. • SPi,0 = {sp(Ai , Ai , 0)} for i = 1, . . . , 5. Recall that SPi,k denotes the output of Ai at point k and is defined as follows: SPi,k = {sp(Ai , Y, D)|sp(Ai , Y, D) ∈ Mi,k } The following transitions occur in R: • At point 0, A5 sends SP5,0 = {sp(A5 , A5 , 0)} to A2 . This causes the following changes in the input and output of A2 : IN2,1 = {sp(A5 , A5 , 0)} SP2,1 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1)} • At point 1, A5 sends SP5,1 = {sp(A5 , A5 , 0)} to A4 . This causes the following changes in the input and output of A4 : IN4,2 = {sp(A5 , A5 , 0)} SP4,2 = {sp(A4 , A4 , 0), sp(A4 , A5 , 1)} • At point 2, A2 sends SP2,2 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1)} to A1 . This causes the following changes in the input and output of A1 : IN1,3 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1)} SP1,3 = {sp(A1 , A1 , 0), sp(A1 , A2 , 1), sp(A1 , A5 , 2)} • At point 3, the link between A1 and A2 is down as shown in Fig. 3. This A❜1 A❜2 ❜ ❜ A4 A5 A❜3 Fig. 3. The network after the link between A1 and A2 is down causes the following changes in the states and outputs of A1 and A2 : EDB1,4 = {link(A1, A4 )} EDB2,4 = {link(A2 , A3 ), link(A2 , A5 )} IN1,4 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1)} IN2,4 = {sp(A5 , A5 , 0)} SP1,4 = {sp(A1 , A1 , 0)} SP2,4 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1)} 16 P. M. Dung, D. D. Hanh, and P. M. Thang • At point 4, A4 sends SP4,4 = {sp(A4 , A4 , 0), sp(A4 , A5 , 1)} to A1 . This causes the following changes in the input and output of A1 : IN1,5 = SP1,5 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1), sp(A4 , A4 , 0), sp(A4 , A5 , 1)} {sp(A1 , A1 , 0), sp(A1 , A4 , 1), sp(A1 , A5 , 2)} • At point 5, the link between A4 and A5 is down as shown in Fig. 4. This A❜1 A❜2 ❜ ❜ A4 A5 A❜3 Fig. 4. The network after the link between A4 and A5 is down causes the following changes in the states and outputs of A4 and A5 : EDB4,6 = {link(A4 , A1 )} IN4,6 = {sp(A5 , A5 , 0)} SP4,6 = {sp(A4 , A4 , 0)} EDB5,6 = {link(A5 , A2 ), link(A5 , A3 )} IN5,6 = ∅ SP5,6 = {sp(A5 , A5 , 0)} • At point 6, A1 sends SP1,6 = {sp(A1 , A1 , 0), sp(A1 , A5 , 2)} to A4 . This causes the following changes in the input and output of A4 : IN4,7 = {sp(A5 , A5 , 0), sp(A1 , A1 , 0), sp(A1 , A5 , 2)} SP4,7 = {sp(A4 , A4 , 0), sp(A4 , A1 , 1), sp(A4 , A5 , 3)} Note that at point 6, sp(A1 , A5 , 2) ∈ M1,6 , i.e. the length of the shortest path from A1 to A5 equals to 2, is wrong. But A1 sends this information to A4 . Now the length of the shortest paths to A5 of agents A1 , and A4 equal to 2, and 3 respectively (i.e. sp(A1 , A5 , 2) ∈ M1,7 and sp(A4 , A5 , 3) ∈ M4,7 , are all wrong. Later on A1 and A4 exchange wrong information, increase the shortest paths to A5 after each round by 2 and go into an infinite loop. The states and outputs of A1 and A4 at points 0 → 8 are shown in Fig. 5 and Fig. 6 respectively. This example shows that Theorem 3.2 IO-acyclicity and boundedness are not sufficient to guarantee the stabilization of a multiagent system. As we have pointed out before, the routing example in this paper models the popular routing RIP protocol that has been widely deployed in the internet. Example Stabilization of Cooperative Information Agents k 0 3 EDB {link(A1 , A2 ), link(A1 , A4 )} {link(A1 , A2 ), link(A1 , A4 )} {link(A1 , A2 ), link(A1 , A4 )} {link(A1 , A4 )} 4 5 {link(A1 , A4 )} {link(A1 , A4 )} 6 {link(A1 , A4 )} 7 {link(A1 , A4 )} 8 {link(A1 , A4 )} 1 2 IN ∅ SP {sp(A1 , A1 , 0)} ∅ {sp(A1 , A1 , 0)} ∅ {sp(A1 , A1 , 0)} {sp(A2 , A2 , 0), sp(A2 , A5 , 1)} {sp(A1 , A1 , 0), sp(A1 , A2 , 1), sp(A1 , A5 , 2)} {sp(A1 , A1 , 0)} {sp(A1 , A1 , 0), sp(A1 , A4 , 1), sp(A1 , A5 , 2)} {sp(A1 , A1 , 0), sp(A1 , A4 , 1), sp(A1 , A5 , 2)} {sp(A1 , A1 , 0), sp(A1 , A4 , 1), sp(A1 , A5 , 2)} {sp(A1 , A1 , 0), sp(A1 , A4 , 1), sp(A1 , A5 , 4)} {sp(A2 , A2 , 0), sp(A2 , A5 , 1)} {sp(A2 , A2 , 0), sp(A2 , A5 , 1), sp(A4 , A4 , 0), sp(A4 , A5 , 1)} {sp(A2 , A2 , 0), sp(A2 , A5 , 1), sp(A4 , A4 , 0), sp(A4 , A5 , 1)} {sp(A2 , A2 , 0), sp(A2 , A5 , 1), sp(A4 , A4 , 0), sp(A4 , A5 , 1)} {sp(A2 , A2 , 0), sp(A2 , A5 , 1), sp(A4 , A4 , 0), sp(A4 , A5 , 3)} 17 Fig. 5. State and output of A1 k 0 6 7 EDB {link(A4 , A1 ), link(A4 , A5 )} {link(A4 , A1 ), link(A4 , A5 )} {link(A4 , A1 ), link(A4 , A5 )} {link(A4 , A1 ), link(A4 , A5 )} {link(A4 , A1 ), link(A4 , A5 )} {link(A4 , A1 ), link(A4 , A5 )} {link(A4 , A1 )} {link(A4 , A1 )} 8 {link(A4 , A1 )} 1 2 3 4 5 IN ∅ SP {sp(A4 , A4 , 0)} ∅ {sp(A4 , A4 , 0)} {sp(A5 , A5 , 0)} {sp(A4 , A4 , 0), sp(A4 , A5 , 1)} {sp(A5 , A5 , 0)} {sp(A4 , A4 , 0), sp(A4 , A5 , 1)} {sp(A5 , A5 , 0)} {sp(A4 , A4 , 0), sp(A4 , A5 , 1)} {sp(A5 , A5 , 0)} {sp(A4 , A4 , 0), sp(A4 , A5 , 1)} {sp(A5 , A5 , 0)} {sp(A5 , A5 , 0), sp(A1 , A1 , 0), sp(A1 , A5 , 2)} {sp(A5 , A5 , 0), sp(A1 , A1 , 0), sp(A1 , A5 , 2)} {sp(A4 , A4 , 0)} {sp(A4 , A4 , 0), sp(A4 , A1 , 1), sp(A4 , A5 , 3} {sp(A4 , A4 , 0), sp(A4 , A1 , 1), sp(A4 , A5 , 3} Fig. 6. State and output of A4 3.10 shows that RIP is not stabilizing. In configuration 4, the routers at the nodes A1 , A4 go into a loop and continuously change the length of the shortest paths from them to A5 from 2 to infinite. This is because the router at node A1 believes that the shortest path from it to A5 goes through A4 while the router at A4 believes that the shortest path from it to A5 goes through A1 . None of them realizes that there is no more connection between them and A5 . 2 . The above theorem general2 This is one of the key reasons why RIP, a very simple internet routing protocol, is gradually replaced by OSPF, a much more complex routing protocol (Huitema 2000) 18 P. M. Dung, D. D. Hanh, and P. M. Thang izes this insight to multiagent systems. The conclusion is that in general it is not possible for an agent to get correct information about its environment if this agent can not sense all the changes in the environment by itself and has to rely on the communications with other agents. This is true even if all the agents involved are honest and do not hide their information. Obviously, if a multiagent system is IO-acyclic and IO-finite, every agent would obtain complete and correct information after finitely many exchanges of information with other agents. The system is stabilizing. Hence Theorem 3.3 IO-acyclic and IO-finite multiagent systems are stabilizing. Proof See Appendix B. 4 Related Works and Conclusions There are many research works on multiagent systems where agents are formalized in terms of logic programming such as (Ciampolini et al. 2003), (Kowalski and Sadri 1999), (Satoh and Yamamoto 2002). An agent in our framework could be viewed as an abductive logic program as in (Ciampolini et al. 2003), (Satoh and Yamamoto 2002) where atoms in the input database could be considered as abducibles. Satoh and Yamatomo formalized speculative computation with multiagent belief revision. The semantics of multiagent systems, which is defined based on belief sets and the union of logic programs of agents, is similar to our idea of “superagent”. An agent in (Ciampolini et al. 2003) is composed of two modules: the Abductive Reasoning Module (ARM), and the Agent Behaviour Module (ABM). Agents are grouped within bunches according to the requirements of interaction between agents. The coordination (collaboration) of agents is implicitly achieved through the semantics of the consistency operators. In both works ((Ciampolini et al. 2003) and (Satoh and Yamamoto 2002)) the communication for agents is based on pull-technologies. The authors did not address the stabilization issue of multiagent systems. Sadri, Toni and Torroni in (Sadri et al. 2001) used a logic-based framework for negotiation to tackle the resource reallocation problem via pull-based communication technology and the solution is considered as “stabilization” property. In this paper, we consider a specific class of cooperative information agents without considering effects of their actions on the environment e.g. in (Ciampolini et al. 2003), (Kowalski and Sadri 1999), (Satoh and Yamamoto 2002). We are currently working to extend the framework towards this generalized issue. In this paper, a logic programming based framework for cooperative multiagent systems is introduced, and the stabilization of multiagent systems is then formally defined. We introduced sufficient conditions in general for multiagent systems under which the stabilization is guaranteed. We showed that IO-acyclic and bounded multiagent systems are weakly stabilizing. But IO-acyclicity and boundedness are not sufficient to guarantee the stabilization of a multiagent system. We showed that Stabilization of Cooperative Information Agents 19 IO-acyclic and IO-finite multiagent systems are stabilizing. Unfortunately these conditions are strong. So it is not an easy task to ensure that agents eventually get right information in the face of unpredictable changes of the environment. Our research is inspired by the network routing applications. As the RIP ((Hedrick 1988), (Huitema 2000)) is very simple and had been widely accepted and implemented. But the RIP has many limitations such as the bouncing effect, counting to infinity, looping, etc. Many versions and techniques of the RIP have been introduced to reduce undesired features of the RIP, but the problem could not be solved thoroughly. With logic programming approach, we showed in this paper, the main reason is that in the RIP, the computation of the overall problem solving algorithm is distributed over the network, while the logic program which represents the routing algorithm is not IO-finite, the stabilization of the system is thus not guaranteed. It is also a reason why most experts prefer the OSPF ((Moy 1998), (Huitema 2000)), which is much more complicated and sophisticated protocol, to the RIP for network routing. We have assumed that information sent by an agent is obtained immediately by the recipients. But communications in real networks always have delay and errors in transmissions. We believe that the results presented in this paper could also be extended for the case of communication with delay and errors. In this paper communications for agents are based on push-technologies. It is interesting to see how the results could be extended to multiagent systems whose communication is based on pull-technologies ((Satoh and Yamamoto 2002), (Ciampolini et al. 2003)). Appendix A Proof of theorem 3.1 First it is clear that the following lemma holds. Lemma Appendix A.1 Let M be a stable model of a logic program P . For each atom a: a ∈ M iff there is a clause a ← Bd in P such that M |= Bd. Given an IO-acyclic and bounded multiagent system A = (A1 , . . . , An ). By proposition 3.1, IDBA is acyclic. Let R = △0 → · · · → △h → . . . be a run of A such that after point h there is no more change in the environment. The stabilized environment of R is EDB = EDB1,h ∪ · · · ∪ EDBn,h . Let [[PA ]] be the stable model of PA in the stabilized environment of R, i.e. the stable model of IDBA ∪ EDB. The height of an atom a in the atom dependency graph of PA denoted by π(a) is the length of a longest path from a to other atoms in the atom dependency graph of PA . Since IDBA is acyclic, there is no infinite path in the atom dependency graph of PA . From the boundedness of IDBA , π(a) is finite. Theorem 3.1 follows directly from the following lemma. 20 P. M. Dung, D. D. Hanh, and P. M. Thang Lemma Appendix A.2 For every atom a, R is convergent for a and conv(R, a) = true iff a ∈ [[PA ]]. It is easy to see that lemma Appendix A.2 follows immediately from the following lemma. Lemma Appendix A.3 For every atom a, there is a point k ≥ h, such that at every point p ≥ k in R, for every Ai such that a ∈ HBi , a ∈ Mi,p iff a ∈ [[PA ]]. Proof We prove by induction on π(a). For each i, let HBIi = head(IDBi ). • Base case: π(a) = 0 (a is a leaf in the dependency graph of PA ). Let Ai be an agent with a ∈ HBi . There are three cases: 1. a ∈ HBIi . There must be a clause of the form a ← in IDBi . a ← is also in IDBA . At every point m ≥ 0, a ∈ Mi,m and a ∈ [[PA ]]. 2. a ∈ HBEi . There is no change in the environment after h, at every point k ≥ h, a ∈ Mi,k iff a ∈ EDBi,k iff a ∈ [[PA ]]. 3. a ∈ HINi . There must be an agent Aj such that D(i, j) 6= ∅ and a ∈ HBEj ∪ HBIj . By definition 3.5 of the run, there must be a point p ≥ h such that there is a transition j i △p −−→ △p+1 Moreover, every transition that can delete (or insert) a from (or into) INi j i after point h must also have the form △q −−→ △q+1 for some Aj such that D(i, j) 6= ∅ and a ∈ HBEj ∪ HBIj . By the definition of transition of the j i form △ −−→ △′ in definition 3.5 and the operator U pa in section 3.2, for a j i transition △p −−→ △p+1 , Ai will update INi as follows INi,p+1 = (INi,p \ D(i, j)) ∪ S where S = D(i, j) ∩ Mj,p . Since a ∈ D(i, j), a ∈ Mi,p+1 iff a ∈ INi,p+1 iff a ∈ Mj,p . As shown in 1 and 2, at every point k ≥ h, for every Aj such that a ∈ HBIj ∪HBEj , a ∈ Mj,k iff a ∈ [[PA ]]. So at every point k ≥ p, a ∈ Mi,k+1 iff a ∈ [[PA ]]. We have proved that for each Ai such that a ∈ HBi there a point pi such that at every point k ≥ pi , a ∈ Mi,k iff a ∈ [[PA ]]. Take p = max(p1 , . . . , pn ). At every point k ≥ p, for every agent Ai such that a ∈ HBi , a ∈ Mi,k iff a ∈ [[PA ]]. • Inductive case: Suppose the lemma holds for every atom a with π(a) ≤ m, m ≥ 0. We show that the lemma also holds for a with π(a) = m + 1. Let Ai be an agent with a ∈ HBi . Clearly a 6∈ HBE ⊇ HBEi . There are two cases: 1. a ∈ HBIi . The atom dependency graph of PA is acyclic, every child b of a has π(b) ≤ m. By the inductive assumption, for each b there is a point pb such that at every point k ≥ pb , b ∈ Mi,pb iff b ∈ [[PA ]]. The set of children of a in the atom dependency graph of PA is the same as the set of atoms in the Stabilization of Cooperative Information Agents 21 body of all clauses of the definition of a. As IDBA is bounded, a has a finite number of children in the atom dependency graph of PA and the definition of a is finite. Let pa is the maximum number in the set of all such above pb where b is a child of a. At every point k ≥ pa , for every child b of a, by the inductive assumption, b ∈ Mi,k iff b ∈ [[PA ]]. We prove that a ∈ Mi,k iff a ∈ [[PA ]]. By lemma Appendix A.1, a ∈ Mi,k iff there is a rule a ← Bd in Pi,k = IDBi ∪ EDBi,k ∪ INi,k such that Mi,k |= Bd. By inductive assumption for every b ∈ atom(Bd), b ∈ Mi,k iff b ∈ [[PA ]]. Moreover a ← Bd is also a rule in PA . Thus a ∈ Mi,k iff there is a rule a ← Bd in PA such that [[PA ]] |= Bd iff a ∈ [[PA ]] (by lemma Appendix A.1). 2. a ∈ HINi . As shown in 1, for every Aj such that a ∈ HBIj there is a point pj , such that at every point k ≥ pj , a ∈ Mj,k iff a ∈ [[PA ]]. Let p be the maximum of all such pj . Clearly, at every point k ≥ p, for every Aj such that a ∈ HBIj , a ∈ Mj,k iff a ∈ [[PA ]]. Follow similarly as case 3 in base case of the proof, there is a point p′ ≥ p + 1 such that at every point k ≥ p′ , a ∈ Mi,k iff a ∈ Mj,k . It also means that at every point k ≥ p′ , a ∈ Mi,k iff a ∈ [[PA ]]. We have proved that for each Ai such that a ∈ HBi there a point pi such that at every point k ≥ pi , a ∈ Mi,k iff a ∈ [[PA ]]. Take p = max(p1 , . . . , pn ). At every point k ≥ p, for every agent Ai such that a ∈ HBi , a ∈ Mi,k iff a ∈ [[PA ]].  Appendix B Proof of theorem 3.3 Let A be an IO-acyclic and IO-finite multiagent system. Obviously A is also bounded. Let R be a run of A. By theorem 3.1, R is convergent. By lemma Appendix A.3, for every atom a in GA there is a point ka such that at every point p ≥ ka , for every agent Ai such that a ∈ HBi , a ∈ Mi,p iff a ∈ [[PA ]]. As GA is finite, take the largest number k of all such ka ’s for every atoms a in GA . Obviously, at every point p ≥ k, for every agent Ai , Mi,k = Mi,p . Thus R is strongly convergent. The system is stabilizing and theorem 3.3 follows immediately. References Apt K., Blair H., and Walker A.1988. Towards a theory of declarative knowledge, In J. Minker editor, Foundations of Deductive Databases and Logic Programming, pp. 89–148, Morgan Kaufman, San Mateo, CA., 1988. Bellman R. E., 1957, Dynamic Programming, Princeton University Press, Princeton, N.J., 1957. Brooks R. A., 2002, Robot: the future of flesh and machines, Penguin. 2002 Brooks. R.A., 1991, Intelligence without Representation, Artificial Intelligence, Vol.47, 1991, pp.139-159 Brooks, R. A, 1986, A robust layered control system for a mobile robot, IEEE Journal of Robotics and Automation. RA-2, April, 1986, pp. 14-23. 22 P. M. Dung, D. D. Hanh, and P. M. Thang Ciampolini A., Lamma E., Mello P., Toni F., and Torroni P., 2003, Co-operation and competition in ALIAS: a logic framework for agents that negotiate, Annals of Mathematics and Artificial Intelligence, Special Issue on Computational Logic in MultiAgent Systems, Volume 37, nos. 1-2, pp. 28-37, January 2003. Dijkstra E., 1974, Self-stabilizing systems in spite of distributed control, Communications of the ACM, 17(11), 1974. Durfee E.H., Lesser V. R., and Corkill D.D., 1995, Trends in Cooperative Distributed Problem Solving, IEEE Transactions on Knowledge and Data Engineering. July, 1995. Flatebo M., Datta A. K., and Ghosh S., 1994, Self-stabilization in distributed systems, Chapter 2, Readings in Distributed Computer Systems, pp. 100–114, IEEE Computer Society Press, 1994. Ford L. R. J. and Fulkerson D. R., 1962, Flows in Networks, Princeton University Press, Princeton, N.J., 1962 Gelfond M., and Lifschitz V., 1988, The stable model semantics for logic programming., In R. Kowalski and K. Bowen, editors, Logic Programming: Proc. of the Fifth International Conference and Symposium, pp. 1070–1080, 1988. Hedrick C., 1988, Routing Information Protocol, RFC–1058, Rutgers University, 1988. Huitema C., 2000, Routing in the Internet, 2nd Edition, Prentice Hall, 2000. Kowalski R. A. and Sadri F., 1999, From Logic Programming to Multiagent Systems, Annals of matematics and Artificial Intelligence, Baltzer Science Publishers, Editors: Dix J. and Lobo J., volume 25, pp. 391–420, 1999. Moy J., 1998, OSPF Version 2, RFC-2328, 1998. Rosenschein S. J. and Kaelbling L. P., 1995, A Situated View of Representation and Control, Artificial Intelligence, No. 73, pp. 149–173, 1995. Sadri F., Toni F. and Torroni P., 2001, Dialogues for Negotiation: Agent Varieties and Dialogue Sequences, Proc. ATAL’01, International workshop on Agents, theories, Architectures and Languages, J.J. Maher ed., and ”Intelligent Agents VIII”, LNAI 2333, pp. 405-421, Springer Verlag, 2001. Satoh K. and Yamamoto K., 2002, Speculative Computation with Multi-Agent Belief Revision, Proceedings of the First International Joint Conference on Autonomous Agent and Multiagent Systems, Bologna, Italy (2002). Schneider M., 1993, Self-stabilization, ACM Computing Surveys, 25(1), pp. 45–67, 1993. Shoham Y., 1993, Agent-oriented programming, Artificial Intelligence, No. 60, pp. 51–92, 1993. Steels L. and Brooks R. , 1995, The Artificial Life Route to Artificial Intelligence: building Embodied, Situated Agents, Lawrance Erlbaum Associates Publishers, 1995. Wooldridge M., 1997, Agent-Based Software Engineering, IEEE Proc. Software Engineering 144 (1), pp. 26-37. Wooldridge M. and Jennings N. R., 1995, Intelligent agents: Theory and practice, The Knowledge Engineering Review, 10 (2), pp. 115-152.
2cs.AI
arXiv:1210.5968v9 [cs.DS] 22 Dec 2015 A pair of universal sequence-set betting strategies Tomislav Petrović February 25, 2018 Abstract We introduce the sequence-set betting game, a generalization of An. A. Muchnik’s non-monotonic betting game [2]. Instead of successively partitioning the infinite binary strings by their value of a bit at a chosen position, as in the non-monotonic game, the player is allowed to partition the strings into any two clopen sets with equal measure. We show that, while there is no single computable sequence-set betting strategy that predicts all non-MartinLöf random strings, we can construct two strategies such that every non-Martin-Löf random string is predicted by at least one of them. 1 Introduction There is a long history of studying the nature of randomness, even the formal study goes back to at least von Mises [4]. One way of defining randomness is via a kind of a betting game, a martingale, first used by J. Ville [5]. Winning in a game against infinite string can be viewed as predictability of a string. The predictability of a string is formally defined in terms of betting games and computable strategies. A string is said to be predictable iff there is a computable strategy that, starting with unit capital, by successive betting, wins an unbounded amount of capital when betting against the string. In [2], An. A. Muchnik et al., introduce the non-monotonic-betting game. In this game, the player bets on the bits of the string, each bet consisting of the index (position) of the bit, wagered amount of capital and the value of the bit she is betting on. If the value of the bit at the chosen position was guessed correctly the wagered amount is doubled, otherwise it is lost. The strings for which there is no computable non-monotonic betting strategy that can predict them are called Kolmogorov-Loveland random, since they both independently proposed non-monotonic inspection of bits in a string [6, 7]. P. Martin-Löf gives his definition of randomness in terms of computably enumerable statistical tests in [8]. His seminal paper marks a point of departure from the unpredictability paradigm towards the incompressibility paradigm in defining the random strings. To define incompressibility, we use the prefix-free variant of Kolmogorov complexity, K, see [1]. An incompressible infinite string is such that for some constant c and all of its prefixes p, K(p) ≥ ℓ(p) − c, with ℓ(p) denoting the length of the prefix. It can be shown that Martin-Löf random strings are precisely the incompressible ones. Whether Kolmogorov-Loveland random sequences are a proper subset of Martin-Löf random strings is unknown, and is considered a major open problem in the field of algorithmic information theory [1, 9, 10, 11, 12, 13]. A characterization of Martin-Löf randomness can be given in terms of a certain betting game, we’ll call it prefix-betting. In this game in each iteration the player bets on a segment s of a string extending the known prefix of a string, p, and if the string she’s playing against starts with the prefix ps, she wins some money, if not, the wagered amount is lost. Since prefix-betting is a fair game, if the segment she bets on has length l, if she is right she wins 2l times the wagered amount. It is known that a single computable prefix-betting strategy can be constructed that predicts all compressible strings [3]. Note however, that in the case of a correct guess, we learn something about the string we are playing against, namely the next segment of its prefix. But in case we were wrong, we learn very little, only that it doesn’t begin with the prefix we had bet on. This asymmetry is twofold. Firstly, if the guess was correct, the measure of the set that we know contains the sequence reduces by a factor of 2−l , and if the guess was incorrect it is reduced by a factor of only (1 − 2−l ). Secondly, if we make an infinite number of correct guesses, we learn all of the bits of the string. On the other hand, if we make an infinite sequence of wrong guesses, we still might not learn a single bit of the string. To address the first kind of asymmetry we introduce a generalization of the non-monotonic betting game called the sequence-set betting game. This is a game where the player, initially starting with the set of all strings and unit capital, partitions the set of strings into two clopen sets of equal measure, and bets on 2 one of them. To see that there is no single computable sequence-set-betting strategy that predicts all compressible strings, at each bet choose the set on which the strategy looses and obtain a computable sequence of nested sets, each having a measure of 12 the previous set. The strings in the intersection of these sets are compressible since we obtained them by a computable procedure, have measure 0, and, by construction, the strategy doesn’t predict them. On the other hand, we show that it is possible to construct two such strategies such that every compressible string is predicted by at least one of them. 2 Definitions and main theorem Our base space is always the space Ω of infinite binary sequences, with the Lebesgue measure λ defined on it. For a set U ⊆ Ω with λ(U) > 0 we will define the conditional measure λU on U as usual by λU (A) = λ(A ∩ U) . λ(U) Definition 2.1 (Mass placement). A mass placement is a triple P = (U, A, µ) where A is a finite partition of the clopen ground set U ⊆ Ω into clopen sets, with a mass function µ : A → R+ defined on them. We will call A the partition of P . The above mass placement is called atomic if its partition consists of a single element. The mass function is extended to all unions of elements of A: µ(A1 ∪ · · · ∪ Ai ) = µ(A1 ) + · · · + µ(Ai ). The minimum capital of P is capi(P ) = min A∈A µ(A) . λ(A) The grain bound of P is maxA∈A λ(A). We will say that a mass placement Q = (U, B, ν) is a refinement of a mass placement P = (U, A, µ), writing Q  P , if each B ∈ B is subset of some A ∈ A, further µ(A) = ν(A) for all A ∈ A. y Definition 2.2 (Grid). Consider a pair of mass placements P = (P 0 , P 1 ), P j = (U, Aj , µj ), j = 0, 1 with the same ground set U = UP . We will call such an object a grid. In general, for any grid P we will denote its ground 3 set by UP , its partitions by AjP , and its mass functions by µjP for j = 0, 1. So P = (P 0 , P 1), P j = (UP , AjP , µjP ), j = 0, 1. Let capi(P) = min(capi(P 0 ), capi(P 1 )). The grain bound of P is the maximum of the grain bounds of P 0 and P 1. A grid is atomic if both of its elements are. We will say that grid P is a refinement of grid Q and write P  Q if P j  Qj for j = 0, 1. A set S is compatible with the grid P if it is the union of sets of the y form E 0 ∩ E 1 with E j ∈ AjP . Definition 2.3 (Sum). Let P, Q be grids with disjoint ground sets. Consider the mass placement R with UR = UP ∪ UQ , AjR = AjP ∪ AjQ , with µjR (E) = µjP (E) for E ∈ AjP and µjQ (E) for E ∈ AjQ , j = 0, 1. We will denote R = P + Q. Of course, capi(R) = min(capi(P), capi(Q)). A sum of three or more elements is defined similarly. A grid P is called diagonal y if A0P = A1P , or equivalently, if it is a sum of atomic grids. Definition 2.4 (Orthogonality). Somewhat dual to diagonality is the concept of orthogonality. The grid P is called orthogonal if for all A ∈ A0P and B ∈ A1P we have λU (A ∩ B) = λU (A)λU (B). (This means that the two algebras, defined by A0 and A1 are conditionally independent on UP .) Let P be a grid. Let j ∈ {0, 1}. We can replace an arbitrary element A ∈ AjP with 2 disjoint subsets A = A1 ∪ A2 with 1−j λ(Ai ∩ B) = λ(A ∩ B)/2 for all B ∈ AP , and choose µjP (Ai ) = µjP (A)/2. The new grid will be said to be obtained by an even split from P. Of course it has the same ground set and min and max capital and as the original one. Also, splitting conserves orthogonality. y Definition 2.5 (Mass placement test). We call a mass placement (Ω, {Ω}, µ(Ω) = 1) a unit mass placement and an infinite sequence of mass 4 placement refinements T = T0  T1  ... a mass placement test iff T0 is a unit mass placement. S Denote with AT = i ATi . The mass function µT : AT → R+ is defined by the mass placements Ti , for A ∈ ATi , µT (A) = µS The mass Ti (A). P function is extended to all unions of disjoint B ⊆ AT : µT ( B) = µT (B). B∈B S For brevity, we drop and write just µT (B). The capital of A ∈ AT is c(A) = µT (A) λ(A) For α ∈ Ω, denote with Tα , a set of elements of AT that contain α. We say that α fails the test T iff sup c(A) = ∞ A∈Tα We call a mass placement test a granular test iff the grain bound of Ti goes to zero in the limit. y Definition 2.6 (Sequence-set betting strategy). A mass placement test S is a sequence-set betting strategy if for all A ∈ ASi , λ(A) = 2−i . y Clearly, a sequence set betting strategy is a granular test. Definition 2.7 (Martin-Löf test). A nested sequence of open sets N = N1 ⊇ N2 ⊇ . . . with λ(Ni ) ≤ 2−i and Ni computably enumerable uniformly in i is called T a Martin-Löf test. An infinite binary sequence α fails the test N iff α ∈ i∈N Ni . A Martin-Löf test M is called universal if every α that fails some Martin-Löf test N also fails M. y It is well-known that there is an universal Martin-Löf test [8, 1]. Theorem 1. For a Martin-Löf test M, there are two computable sequenceset betting strategies S 0 , S 1 such that for every infinite binary sequence α that fails M, α fails at least one of S 0 , S 1 . 5 3 Proof Lemma 3.1. Consider a diagonal grid P with cP= capi(P), and a sequence 2 of disjoint clopen sets E1 , E2 , . . ., Ei ⊆ UP , i λ(Ei ) ≤ p λ(UP ) for a certain p < 1. Let K > 1 be a constant with Kp < 1. We can compute a sequence of disjoint diagonal grids Q1 , Q2 , . . . with UQi = Ei , and for each n > 0 a mass placement Rn disjoint from Q1 , Q2 , . . . , Qn , an even splitting Pn of P and even splittings Qi,n of Qi such that the following holds: Q1,n + · · · + Qn,n + Rn  Pn , Qn+1 + Rn+1  Rn , and for each i, for each atomic part T of Qi we have max(capi(T 0 ), capi(T 1 )) = cK, min(capi(T 0 ), capi(T 1 )) = capi(T) ≥ c′ , (1) (2) where c′ = c(1 − pK). Also the grain bound of Pn is ≤ 2−n . The 2−n grain bound is arbitrary, it only matters that it converges to 0 constructively. Proof. We construct the grids Qi and Rn explicitly and recursively. Suppose that Qi , Ri and Pi have been defined already for all i < n. Let R = Rn−1 , S = Rn (this is still to be defined). Denote Vn = E1 ∪ · · · ∪ En . Of course, US = UP \ Vn . It is possible to replace Pn−1 with a Pn obtained by repeated even splittings in such a way that it becomes compatible with the clopen set En (and also satisfies the grain bound). We obtain each Qi,n from Qi and R̃ from R similarly. Note that since Pn−1 was orthogonal, so is Pn . With these splittings we can achieve the following: for each j = 0, 1, for each B ∈ AjPn , and i < n we have B ∩ Ei ∈ AjQi,n , B \ Vn−1 ∈ AjR̃ . Now, as En is compatible with Pn , it can be written as a disjoint union En = F1 ∪ · · · ∪ Fm , where each Fk has the form B 0 ∩ B 1 , with B j ∈ AjPn . 6 The (diagonal) grid Qn will be a sum of atomic grids T1 + · · · + Tm , with UTk = Fk . Of course, US = UR \ En , and AjS = {A \ Vn : A ∈ AjPn } = {B \ En : B ∈ AjR̃ }. The interesting part is the definition of the new mass functions µjTk and µjS . Note that there is a common refinement P̂n of Pn and Q1,n , . . . , Qn,n , Rn . (We use P̂n only for the calculations in this proof, not the actual construction.) Wherever µjTk and µjS are defined, they are identical to µjP̂ . n Therefore from now on, we omit the subscript of µj when it signifies µjP̂ n (which is essentially in all cases). For j = 0, 1, for each B ∈ AjR̃ , we need to redistribute the mass µj (B) into B ∩ Vn and B \ Vn . The mass assigned to B ∩ Vn will be distributed among all the Fk with Fk ⊆ B, and the mass remaining is given to B \ Vn . Let M = {A ∈ A0Pn : λ(A ∩ Vn ) > pλ(A)}. First we determine the values of µ0 (·). Suppose A ∈ / M. Recalling A∩UR = (A \ Vn ) ∪ (A ∩ En ), a disjoint union, for Fk ⊆ A we set ( cKλ(Fk ) if A ∈ / M, µ0 (Fk ) = ′ c λ(Fk ) otherwise, (3) µ0 (A \ Vn ) = µ0 (A ∩ UR ) − µ0 (A ∩ En ). In other words, for each Fk ⊆ A, if A ∈ / M then we satisfy the require0 ment (1) by by capi(Tk ) = cK, otherwise we satisfy (2). Now we determine the values of µ1 (·). Let B ∈ A1Pn . Let Fk = A ∩ B with A ∈ A0Pn . We set ( cKλ(Fk ) if A ∈ M, µ1 (Fk ) = c′ λ(Fk ) otherwise, (4) µ1 (B \ Vn ) = µ1 (B ∩ UR ) − µ1 (B ∩ En ). These definitions satisfy conditions (2), (1) by design; what remains to prove is that they provide µj (A \ Vn ) ≥ 0 for A ∈ AjPn . We will actually prove the stronger inequality µj (A \ Vn ) ≥ c′ λ(A \ Vn ). 7 Consider the case j = 0, and first the case A ∈ / M. We will prove, inductively, the stronger statement   λ(A ∩ Vn ) 0 µ (A \ Vn ) ≥ c 1 − K λ(A) = cλ(A) − cKλ(A ∩ Vn ). (5) λ(A) If A ∈ / M = Mn then for all i < n, for A′ ⊇ A with A′ ∈ A0Pi we had A′ ∈ / Mi . Therefore by inductive assumption, for i = n − 1, µ0 (A′ \ Vn−1 ) ≥ cλ(A′ ) − cKλ(A′ ∩ Vn−1 ). This linear inequality is conserved by the splittings, therefore also µ0 (A \ Vn−1 ) ≥ cλ(A) − cKλ(A ∩ Vn−1 ). (6) Now by definition (3) µ0 (A \ Vn ) = µ0 (A \ Vn−1 ) − µ0 (A ∩ En ) = µ0 (A \ Vn−1 ) − cKλ(A ∩ En ), which together with (6) proves (5). Now consider the case A ∈ M. Let l be the last i < n where for A′ ⊇ A with A′ ∈ A0Pi we had A′ ∈ / Mi . If there is no such i then set l = 0, this case is trivial. Then by the above proof, for such A′ we have µ0 (A′ \ Vl−1 ) ≥ cλ(A′ ) − cKλ(A′ ∩ Vl−1 ) ≥ c′ λ(A′ ∩ Vl−1 ). From now on the process for all i > l will either split evenly or assign µ0 (A ∩ Ei ) = c′ λ(A ∩ Ei ) and µ0 (A \ Vi ) = µ0 (A \ Vi−1 ) − c′ λ(A ∩ Ei ). Both kinds of step conserve the lower bound c′ > 0 on capital. Now consider theS case j = 1; we want to prove µ1 (B \ Vn ) ≥ 0 for B ∈ A1Pn . Let M = M. We claim λ(B ∩ M) ≤ pλ(B). (7) For this, we will use the orthogonality of Pn and the assumption λ(Vn ) ≤ p2 λ(UP ) of the lemma. For every A ∈ M we have by definition of M, λ(A ∩ Vn ) > pλ(A). Let u = λ(UPn ). Then p2 u ≥ λ(Vn ) ≥ λ(M ∩ Vn ) > pλ(M), 8 implying λ(M) < pu. By orthogonality, λ(B ∩ M)/u = (λ(B)/u)(λ(M)/u) ≤ pλ(B)/u, implying (7). By definition (4), and using (7), µ1 (B ∩ M ∩ Vn ) ≤ cKλ(B ∩ M ∩ Vn ) ≤ cKpλ(B), hence µ1 (B \ (M ∩ Vn )) ≥ µ1 (B) − cKλ(B ∩ M) ≥ cλ(B)(1 − Kp) = c′ λ(B) ≥ c′ λ(B \ (M ∩ Vn )). By definition (4), µ1 (B ∩ Vn \ M) = c′ λ(B ∩ Vn \ M), hence µ1 (B \ Vn ) ≥ c′ λ(B \ (M ∩ Vn )) − c′ λ(B ∩ Vn \ M) = c′ λ(B \ Vn ), finishing the proof. Lemma 3.2. For any Martin-Löf test N we can computably construct two granular tests P 0 , P 1 such that every infinite binary sequence α that fails N, α fails P 0 or α fails P 1. Proof. We construct the granular tests explicitly and recursively. For some i, suppose that Q is a diagonal grid with UQ = H for some H ∈ Ni . Recall that a diagonal grid is a sum of atomic grids and let T1 , . . . , Tn be atomic grids such that T1 + · · ·+ Tn = Q. Let Tk = (Tk0 , Tk1 ) Denote m(Q) = min max(capi(Tk0 ), capi(Tk1 )) k and let c = capi(Q), K = 2m(Q)/c and r such that 2−r ≤ 1/(cK)2 . Let E1 , E2 , . . . be an enumeration of elements of Nr ∩ H. By Lemma 3.1, there is a sequence of disjoint diagonal grids QT,Q = Q1 , Q2 , . . . and a sequence of mass placements RT,Q = R1 , R2 , . . ., such that Ri is disjoint from Q1 , . . . , Qi , Q  Q1 + · · · + Qi + Ri , UQj = Ej , and m(Qj ) = Kc = 2m(Q). 9 Denote by P0 a grid consisting of a pair of unit mass placements. Let Q = P0 , denote with Qi1 ,...,in ,k the k-th element of QT,Qi1 ,...,in and with Ri1 ,...,in ,k the k-th element of RT,Qi1 ,...,in . Denote by X Pk = Qi1 ,...,in + Ri1 ,...,in i1 +···+in =k a sum of disjoint grids. We have that Pk  Pk+1 since Ri1 ,...,in  Qi1 ,...,in +1 + Ri1 ,...,in +1 and Qi1 ,...,in  Qi1 ,...,in ,1 + Ri1 ,...,in ,1 . We have obtained a sequence of grid refinements P0  P1  . . .. Note that since T is a test, N0 = {Ω} S and UP0 = N0 . Then for every sequence of clopen sets E = E0 ⊇ E1 ⊇ . . ., Ei ∈ Ni , there is an infinite subsequence E ′ = E0′ ⊇ E1′ ⊇ . . ., chosen in the following way: let E0′ = E0 and if for some i1 , . . . , in , Ei′ = UQi1 ,...,in , ′ then there is some k such that UQi1 ,...,in ,k ∈ E. Let Ei+1 = UQi1 ,...,in ,k . ′ a diagonal grid Then for every Ei there is a refinement Pi′ that contains T ′ i Q with UQ = Ei and m(Q) = 2 . Then for α ∈ i∈N Ei for at least one j ∈ {0, 1} we’ll have sup µj (A)/λ(A) = ∞. Let P 0 = P00  P10  . . . 1 and P = P01  P11 A∈AjP ,α∈A  . . . . We have that P 0 , P 1 satisfy the lemma. Lemma 3.3. For any granular test P we can computably construct a sequence-set betting strategy S such that for every infinite binary sequence α that fails P , α fails S. Proof. In this proof ⊂ means strict inclusion. Let h > 1, A ∈ AS for some sequence-set betting strategy S and B a finite, disjoint S subset of AP . We’ll say A corresponds to B, and write A ∼ B iff A ⊆ B and two conditions are satisfied: µP (B) < hµS (A) (8) ∀B ∈ B max c(B ′ ) < 2h max c(A′ ). ′ B⊂B ′ ∈AP A⊆A ∈AS (9) We’ll explicitly and recursively construct S with the property ∀A ∈ AS ∃B ⊆ AP A ∼ B (10) We claim that any sequence-set betting strategy with the property (10) satisfies the theorem. We prove the claim by contradiction. Suppose there is some infinite binary sequence α that fails P and passes S. For any α the following statement is either true or false: ∀B ∈ Pα ∀∞ A ∈ Sα ∀B ⊆ AP A ∼ B ⇒ B 6∈ B 10 (11) Suppose (11) is false. Then there is some B ∈ Pα such that for infinitely many A ∈ Sα there is some B ⊆ AP that contains B and A ∼ B. We cannot have that µP (B) = 0 as this is contrary to the assumption that α fails P . If µP (B) > 0 then since lim λ(A) = 0, by (8) we have that sup c(A) = ∞ A∈Sα A∈Sα contrary to the assumption that α passes S. Suppose (11) is true. Note that for any two elements of AP they are either disjoint or one contains the other. Then for every B ∈ Pα and A ∈ Sα let A ∼ BA for some BA ⊆ AP . For almost all A, then B 6∈ BA . But α ∈ B ′ for some B ′ ∈ BA , and then either B ⊂ B ′ or B ′ ⊂ B. Since there are finitely many B ′ ⊃ B in AP , and they can be only in BA for finitely many A’s, for all but finitely many A we have B ′ ⊂ B. From (9) there is some A′ ⊇ A with c(B) < 2hc(A′ ) and by the assumption that α fails P we have that sup c(A) = ∞, contrary to the assumption that α A∈Sα passes S. This proves the claim. Now to the construction of S. Since both P and S are tests, we have that S0 corresponds to {P0 }. Let A be the part of AS already constructed, and assume it satisfies (10). Then for all A ∈ A there is some B ⊆ AP with A ∼ B. Denote CB = {B ∈ B : c(B) < 2h max c(A′ )}. Then CB 6= ∅, ′ A⊆A ∈AS since 1 λ(B \ CB ) ≤ λ(A) 2 (12) is implied by (8). Let k be such that B ∈ CB , B ∈ APk−1 and B 6∈ APk . Replacing BS with S ′ ′ it’s partitions in APk we obtain B . We have A ∼ B since B = B′ , satisfying (8), and (9) is satisfied for elements B ′ 6= B of B′ due to (9) for B, and for B itself is due to B ∈ CB . Applying iteratively, since P is granular, for any ǫ we can obtain B′ such that for any B ∈ CB′ , λ(B) < ǫ. Note that there is at least one M ∈ CB′ with c(M) ≤ c(B′ ) and A ∩ M 6= ∅ since for all B ∈ B′ \ CB′ , c(B) ≥ c(B′ ). Note that (12) holds also for B′ . We now partition B′ into three sets B0′ , {M}, B1′ , having B′ \ CB′ ⊆ B0′ , and distributing the elements of CB′ \ {M} among B0′ , B1′ so that for j ∈ {0, 1}, S ′ λ( Bj ∩ A) ≤ 21 λ(A). Furthermore, we can partition M into M0 , M1 so that the sets A0 , A1 Aj = A ∩ ( [ Bj′ ∪ Mj ) for j = 0, 1 11 have λ(Aj ) = 21 λ(A). Let Bj = Bj′ ∪ {M} and µS (Aj ) = µP (Bj ) µS (A) µP (B0 ) + µP (B1 ) We have µP (B0 ) + µP (B1 ) = µP (B′ ) + µP (M) < (1 + ǫ)µP (B′ ). Let h′ = µP (B′ )/µS (A). Then µP (Bj ) < h′ (1 + ǫ)µS (Aj ), from (8) h′ < h, and by choosing small enough ǫ, (8) is satisfied for Aj , Bj . We have that (9) is satisfied for Aj , Bj since it is satisfied for A, B′ . We have shown from the inductive assumption that A ∼ B for some B ⊆ AP , we obtain two subsets of AP , B0 , B1 , a partition of A into two sets of equal measure, A0 , A1 , and their mass assignments such that A0 ∼ B0 and A1 ∼ B1 , proving that S has property (10). Proof of Theorem 1. By Lemmas 3.2 and 3.3 for any Martin-Löf test, and in particular the universal one, M, we can computably construct two sequenceset betting strategies S 0 , S 1 such that every infinite binary sequence that fails M also fails at least one of S 0 , S 1 . Acknowledgements I thank Wolfgang Merkle for our discussions and support, Jason Rute for his suggestions on improving the readability, Mark Lemay for proof reading and corrections, and Peter Gács for his most generous help in improving and streamlining the proof and helping form the final version of the paper. Bibliography [1] Ming Li, Paul M. B. Vitányi: An Introduction to Kolmogorov Complexity and Its Applications, Third Edition. Texts in Computer Science, Springer 2008, ISBN 978-0-387-33998-6, pp. i-xxiii, 1-790 1, 2 [2] Andrei A. Muchnik, Alexei L. Semenov, Vladimir A. Uspensky: Mathematical Metaphysics of Randomness. Theor. Comput. Sci. 207(2): 263317 (1998) (document), 1 12 [3] C.P. Schnorr. Zufälligkeit und Wahrscheinlichkeit; Eine algorithmische Begründung der Wahrscheinlichkeitstheorie, volume 218 of Lect. Notes Math. Springer-Verlag, Berlin, 1971. 1 [4] R. von Mises. Grundlagen der Wahrscheinlichkeitsrechnung. Mathematische Zeitschrift, 5:52–99, 1919. [xviii, 229] 1 [5] J. Ville. Etude Critique de la Notion de Collectif. Gauthier-Villars, Paris, 1939. 1 [6] A.N. Kolmogorov. On tables of random numbers. Sankhya , The Indian Journal of Statistics, Ser. A, 25:369–376, 1963. 1 [7] D.W. Loveland. A new interpretation of von Mises’ concept of a random sequence. Z. Math. Logik und Grundlagen Math., 12:279–294, 1966. 1 [8] P. Martin-Löf. The definition of random sequences. Inform. Contr., 9:602–619, 1966. 1, 2 [9] Wolfgang Merkle, Joseph S. Miller, André Nies, Jan Reimann, Frank Stephan: Kolmogorov-Loveland randomness and stochasticity. Ann. Pure Appl. Logic 138(1-3): 183-210 (2006) 1 [10] Rodney G. Downey, Denis R. Hirschfeldt: Algorithmic Randomness and Complexity. Theory and Applications of Computability, Springer 2010, ISBN 978-0-387-95567-4, pp. 1-766 1 [11] Joseph S. Miller, André Nies: Randomness and Computability: Open Questions. Bulletin of Symbolic Logic 12(3): 390-410 (2006) 1 [12] K. Ambos-Spies and A. Kučera. Randomness in computability theory. In P. Cholak, S. Lempp, M. Lerman, and R.A. Shore, editors, Computability Theory and Its Applications: Current Trends and Open Problems, vol- ume 257 of Contemporary Mathematics, pages 1–14. American Math. Society, 2000. 1 [13] Rodney G. Downey, Denis R. Hirschfeldt, André Nies, Sebastiaan Terwijn: Calibrating Randomness. Bulletin of Symbolic Logic 12(3): 411-491 (2006) 1 13
8cs.DS